home *** CD-ROM | disk | FTP | other *** search
- Computer underground Digest Sat, Oct 19, 1991 Volume 3 : Issue 37 [orig 36]
-
- Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
-
- **** SPECIAL ISSUE: "GERALDO AND THE MAD HACKERS'S KEY PARTY" ****
-
- CONTENTS, #3.37 ( October 19, 1991) [originally numbered 3.36]
- File 1: Summary of Geraldo's _Now it can be Told_
- File 2: Excerpts from "Mad Hacker's Key Party"
- File 3: Review_of_Now_It_Can_Be_Told_
- File 4: Geraldo Rivera show on "Hacking"
- File 5: The_RISKS_of_Geraldo
- File 6: 2600 Magazine Exposes Security Holes (NEWSBYTE reprint)
-
- Issues of CuD can be found in the Usenet alt.society.cu-digest news
- group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
- and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
- 789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.20),
- chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of
- Chicago email server, send mail with the subject "help" (without the
- quotes) to archive-server@chsun1.spc.uchicago.edu.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source
- is cited. Some authors do copyright their material, and they should
- be contacted for reprint permission. It is assumed that non-personal
- mail to the moderators may be reprinted unless otherwise specified.
- Readers are encouraged to submit reasoned articles relating to the
- Computer Underground. Articles are preferred to short responses.
- Please avoid quoting previous posts unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: 12 Oct 91 11:21:19 CDT
- From: Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 1-- Summary of Geraldo's _Now it can be Told_
-
- On Sept 30, Geraldo Rivera's show focused on "hackers." Not
- surprisingly, the commentary was closer to sensationalistic fiction
- than fact. Those who saw the original airing described Rivera's
- framing of the issue as reprehensible, and his comments about Craig
- Neidorf were described as potentially slanderous. Even by Geraldo
- standards, Craig could not have expected the grotesque insults to
- which he was subjected and the bullying and inaccuracies that he
- endured, according to observers, with reserved dignity.
-
- We are indebted to an anonymous reader who provided us with excerpts
- from the transcripts. They reveal a consistent pattern of
- sensationalism--not surprising--but they also reflect that Rivera had
- little interest in accuracy and instead resorted to fabrication
- bordering on lies to depict Craig as a "Mad Hacker." His task was made
- considerably easier by Alameda County (California) prosecutor Don
- Ingraham, who contributed to the misconceptions of Craig and played
- into the sensationalistic "mad hacker" motif that was the format of
- the show.
-
- Those who viewed the program report, and the transcripts confirm, that
- the initial portion focused on the potential dangers of hacking to
- national security, and skillfully juxtaposed film images of terrorism
- and military violence with discussions and images of hackers.
-
- Rivera continually referred to Craig as the "Mad Hacker," described
- him as Ingraham's "arch-rival," and used the term "notorious hacker"
- to remind the audience that his guest was not some run of the mill
- evil-doer, but "mad," "notorious," and America's "most wanted" hacker.
- Ingraham implied that Craig was responsible for breaking into and
- endangering the nation's E911 system, but backed off slightly while
- leaving the connection between E911 and national security intact.
- Ingraham's analogy of rape and hacking was in poor taste, and he
- seemed to join Rivera in competing for outlandish sound-byte of the
- day.
-
- The media has played a major role in contributing to hacker hysteria
- by grossly exaggerating the exploits of suspects and defendants.
- Rivera has taken hyperbole to a new level by imputing dangers where
- none exist, by fabricating facts, and by leaving the audience with the
- impression that--in this case--Craig had actually broken into the E911
- system. In a time which Constitutionally protected liberties are
- threatened, when demogogues enact anti-crime legislation that expands
- definitions of punishable behavior and increases penalties for
- offenses, and when the public--still largely technophobic--does not
- understand hacking, Geraldo's portrayal is recklessly dangerous and
- unconscionably irresponsible. It is one thing to engage in
- self-serving sleaze for ratings. It is quite another to distort truth
- in ways that create false impressions and tarnish reputations by
- name-calling. We suggest that Geraldo Rivera has far more in common,
- both in his actions and in his consequences, with terrorists than do
- hackers. Rivera, like terrorists, seems to have no hesitation in doing
- violence if it serves his own narrow interests. On balance, society
- can survive a "hacker menace" far more easily than it can survive
- callous disregard of truth.
-
- ------------------------------
-
- Date: Thu, 17 Oct 91 7:41:43 CDT
- From: anonymous@viewer
- Subject: File 2-- Excerpts from "Mad Hacker's Key Party"
-
- Excerpts from: _Now_It_Can_Be_Told_: "Mad Hackers' Key Party"
- Hosted by Geraldo Rivera (Sept. 30, 1991)
-
- Geraldo: I'm Geraldo rivera. And now, It can be told.
-
- <First part of the program includes comments and interviews with
- Emmanuel Goldstein, Krista Bradford, Cliff Stoll, Phiber Optik, Winn
- Schwartau, and other bit players. Focus of discussion is on hacking as
- "terrorism" and generous film and news clips of terrorism and war
- scenes interwoven amongst discussion of dangers of hackers to national
- security. We pick up the dialogue when Don Ingraham (Alameda County
- (Calif.) prosecutor and Craig Neidorf (former editor of PHRACK) join in>
-
- Geraldo: Joining us now via satellite from Oakland, CA is the
- Assistant District Attorney Don Ingraham ... for Alameda County and he
- has been prosecuting computer hackers for years.
-
- <Don is in the TV box, between Geraldo and Craig [KL]>
-
- Geraldo: Don, how do you respond to the feeling common among so many
- hackers that what they're doing is a public service; they're exposing
- the flaws in our security systems?
-
- Don: Right, and just like the people who rape a coed on campus are
- exposing the flaws in our nation's higher education security. It's
- absolute nonsense. They are doing nothing more than showing off to
- each other, and satisfying their own appetite to know something that
- is not theirs to know.
-
- Geraldo: Don, you stand by, Craig as well. And when we come back
- we'll hear more from prosecutor Ingraham and from, I guess his
- archrival here, the Mad Hacker Craig Neidorf.
-
- <Commercial>
-
- Geraldo: We're back with Craig Neidorf, a former University of
- Missouri student who ran a widely distributed electronic newsletter
- for computer hackers. He is so proud of being America's
- Most Wanted computer hacker that he has put together this very
- impressive scrapbook.
-
- <Geraldo holds up a colorful scrapbook..On the left page shows a
- lightning bolt hitting what looks to be a crown [Knight Lightning]
- ...And on the right it looks like a graphic saying "Knight Lightning"
- and below that is a black circle with a white lightning bolt, and
- next to that is a triangle that looks very similar to the triangle
- with an eye that appeared on the cover of _GURPS_Cyberpunk_ [which
- said in it, the book that was seized by the Secret Service! see page
- 4...- but the one on KL is illegible]>
-
- Geraldo: Knight Lightning I guess that was your code?
-
- KL: It was my editor handle.
-
- Geraldo: That's your handle. OK. And from Oakland, CA we are
- talking with the Assistant District Attorney Don Ingraham, who is hard
- driven, you might say, to put people like Craig behind bars. Don, do
- you think Craig's lucky that he's not behind bars right now?
-
- Don: Yes, I think he's extraordinarily lucky. He was part of a
- conspiracy, in my opinion, to take property that wasn't his and share
- it with others. They charged him with interstate transport of stolen
- property - couldn't make the threshold -and it came out that it had
- been compromised by, unfortunately, released by another Bellcore
- subsidiary. But was certainly not through any doing of HIS that he is
- a free man.
-
- Geraldo: So you think that his activities stink, then.
-
- Don: Absolutely. No Question about it.
-
- Geraldo: Craig, you wanna respond? Are you doing something for the
- greater good of society?
-
- KL: Well I was merely publishing a newsletter. I didn't go out and
- find this document. Rather it was sent to me. In many ways it could
- be compared to Daniel Ellsberg sending the Pentagon Papers to the New
- York Times.
-
- Geraldo: Do you figure it that way Don? Is he like Daniel Ellsberg?
-
- Don: No, Ellsberg went to court to deal with it. Daniel Ellsberg's
- release of the Pentagon Papers is the subject of a published court
- decision to point out it was a matter of national security and
- national interest. The E911 codes, which is the citizen's link to the
- police department are not a matter of national security. They're a
- matter of the central service to the community.......
-
- Geraldo: You broke into the 911 system? He broke into the 911
- system!
-
- KL: No, that's not correct. I never entered any 911 telephone
- system.
-
- Don: I didn't say he entered into it. What I said was that he and
- Riggs conspired together to take a code that they knew was necessary
- to 911 and to take it apart to see how it worked. They never had the
- owner's permission, they never asked for it.
-
- Geraldo: Alright, lemme ask you this....
-
- KL: The court found that there was no conspiracy here.
-
- Geraldo: You were acquitted. You were vindicated at least from
- criminal responsibility. Lemme just quickly ask you this: hackers
- have been inside the White House computer.
-
- KL: Yes they have.
-
- Geraldo: And they've been inside the Pentagon computer.
-
- KL: Yes.
-
- Geraldo: And if Saddam Hussein hired some hackers whether they're
- from Holland or any other place, he could've gotten into these
- computers, presumably.
-
- KL: Presumably, he could've.
-
- Geraldo: And gotten some valuable information.
-
- KL: It's definitely possible.
-
- Geraldo: And you still think hackers are performing a public service?
-
- KL: That's not what I said. I think that those kind of activities
- are wrong. But by the same token, the teenagers, or some of the
- people here that are not performing malicious acts, while they should
- be punished should not be published as extreme as the law currently
- provides.
-
- Geraldo: You're response to that Don?
-
- Don: I don't think they're being punished very much at all. We're
- having trouble even taking away their gear. I don't know one of them
- has done hard time in a prison. The book, Hafner's book on
- _Cyberpunk_, points out that even Mitnick who is a real electronic
- Hannibal Lecter ... did not get near any of the punishment that what
- he was doing entitled him to.
-
- Geraldo: <laughing> An electronic Hannibal Lecter. OK, stand by,
- we'll be back with more of this debate in a moment...
-
- <commercials>
-
- Geraldo: Back with Craig Neidorf and prosecutor Don Ingraham. Craig,
- do you think hackers are voyeurs or are they potentially terrorists?
-
- KL: I think they resemble voyeurs more than terrorists. They are
- often times looking at places where they don't belong, but most
- hackers do not intend to cause any damage.
-
- Geraldo: Do you buy that Don?
-
- Don: If they stopped at voyeurism they would be basically
- sociopathic, but not doing near the harm they do now. But they don't
- stop at looking, that's the point. They take things out and share
- them with others, and they are not being accountable and being
- responsible as to whom they are sharing this information. That is the
- risk.
-
- Geraldo: Can they find out my credit rating? I know that's not a
- national security issue, but I'm concerned about it.
-
- Don: Piece of cake.
-
- Geraldo: No problem.
-
- Don: Assuming....
-
- Geraldo: Go ahead. Assuming I have a credit rating...hahahah....
-
- Don: Assume that the credit is not carried by someone who is using
- adequate security.
-
- Geraldo: But you think Craig it's not problem.
-
- KL: I think it's no problem.
-
- Geraldo: Give me quickly the worst case scenario. Say Abu Nidal had
- you working for him.
-
- KL: I'm sorry?
-
- Geraldo: Abu Nidal, notorious .....
-
- KL: As far as your credit rating?
-
- Geraldo: No, not as far as my credit rating.. The world, national
- security.
-
- KL: Well, hackers have gotten into computer systems owned by the
- government before. At this point they've never acknowledged that it
- was anything that was ever classified. But even some unclassified
- information could be used to the detriment of our country.
-
- Geraldo: Like the counter-terrorist strategy on January 15th, the day
- of the deadline expired in the Persian Gulf.
-
- KL: Perhaps if Saddam Hussein had somehow known for sure that we were
- going to launch an attack, it might have benefited him in some way,
- but I'm really not sure.
-
- Geraldo: Don, worst case scenario, 30 seconds?
-
- Don: They wipe out our communications system. Rather easily done.
- Nobody talks to anyone else, nothing moves, patients don't get their
- medicine. We're on our knees.
-
- Geraldo: What do you think of Craig, quickly, and people like him?
-
- Don: What do I think of Craig? I have a lot of respect for Craig, I
- think he's probably going to be an outstanding lawyer someday. But he
- is contributing to a disease, and a lack of understanding ethically,
- that is causing a lot of trouble.
-
- Geraldo: One word answer. As the computer proliferate won't hackers
- also proliferate? Won't there be more and more people like you to
- deal with?
-
- Knight Lightning: I think we're seeing a new breed of hacker. And
- some of them will be malicious.
-
- Geraldo: Some of them will be malicious. Yes, well, that's it...for
- now. I'm Geraldo Rivera.
-
- [End of Program]
-
- ------------------------------
-
- Date: Wed, 16 Oct 91 18:42:51 MDT
- From: ahawks@ISIS.CS.DU.EDU.CS.DU.EDU(Andy Hawks)
- Subject: File 3-- Review_of_Now_It_Can_Be_Told_
-
- If you look past the obvious sensationalism (hey, what do you expect
- from Geraldo?) the ''Now It can Be Told'' program on hackers was
- actually quite good, and quite informative.
-
- However, as expected, the program served to enhance the stereotypes
- that hackers are always destroyers of information. Words such as
- terrorist, thief, mad hacker, notorious, sociopath, et al were often
- substituted for ''hacker''.
-
- >From a hacker's point of view, the show was great. First we see
- ''home video'' of Dutch hackers hacking into US Department of Defense
- (military) computers. Emmanuel Goldstein (editor of 2600) is present
- among them, and describes in-depth what they are doing, and how they
- are getting into these computers.
-
- The Dutch hackers success rate was astounding! Goldstein says that
- they "literally picked a computer at random among a list and used
- various means to get in". First, they fail with a login of guest.
- Then, they succeeded in gaining superuser privileges with the sync
- login and proceeded to create a new account under the name Dan Quayle,
- and gave him superuser privileges.
-
- I thought Emmanuel Goldstein was an excellent defender of the hacker's
- position, successfully refuting Cliff Stoll's comment that compared
- hackers to thieves breaking into someone's house
- (yaaaaaawwwwwwwnnnnnnnnn.......) by stating hackers are not interested
- in personnel files - they're interested in huge databases and computer
- systems. Hopefully, (however doubtful) Emmanuel Goldstein has forever
- put the "breaking into a house" argument to rest.
-
- Next we see a scene that is truly cyberpunk: Japanese Kanji
- characters in neon colors spread over the screen as we hear a voice
- say "My handle is Phiber Optik. I'm a computer hacker from the East
- Coast.", standing on a dimly lit street in the middle of the night.
- The Phiber Optik portion of the program is interesting, and shows (for
- the first time?) hacking from a pay-phone with a laptop. (Note: if
- you freeze-frame at the right moment, you can see Emmanuel Goldstein
- and a g-man type in sunglasses [??] during this segment.)
-
- Phiber Optik: "The Hacker's goal is to become one with the machine"
-
- The next segment features an anonymous hacker (most likely Phiber) who
- says "we'd just be coexisting with the other users of the machine" and
- states once again that hackers are not interested in personal files.
- We also learn that this hackers has most likely entered the White
- House systems.
-
- What follows the hacker profiles is a segment on computer-terrorism,
- which focuses on viruses, interception, ''computer guns'', and
- eavesdropping.
-
- Emmanuel Goldstein: "The computer is a tool. And any tool can be
- used as a weapon."
-
- A. Hacker: "I wouldn't so much call it a weapon as an extension of
- one's own mind;"
-
- This segment somewhat vaguely attempts to separate hackers from
- terrorists, but since the distinction is not made clear, it is obvious
- that the makers of the show think that some hackers would qualify
- under this category. Krista Bradford hints that these activities are
- done by our own government, as well.
-
- A neat demonstration is given by Winn Schwartau, an information
- security expert, who demonstrates TEMPEST technology (picking up the
- radio waves from a monitor, and being able to display what's being
- typed up to 1.5 miles away). In this fake scenario, credit
- information is being intercepted. It is most unlikely that hackers
- would use this type of interception, since it requires a lot of
- expensive equipment. (In case your interested, the frequency the
- signal was picked up on is 19.9217)
-
- Intermixed in this segment are clips from Die Hard II (remember, the
- terrorists take over the airport computers).
-
- The third segment involves a 'debate' between Craig Neidorf (Knight
- Lightning of Phrack fame) and Don Ingraham, an assistant District
- Attorney in California. Geraldo informs us that Craig Neidorf is a
- ''mad hacker'' who is proud of his hacking achievements.
-
- Geraldo holds up an interesting portfolio that CRaig Neidorf has
- created, which hackers might find interesting, if you can get your
- hands on it.
-
- Geraldo engages in his usual sensationalism. He wrongly assumes that
- Craig Neidorf 'broke into' the 911 system. He wants to confirm that
- hackers have broken into the White House and Pentagon, and tries to
- put terror into the hearts of the masses. One of the great shames of
- this program is that the host is nothing more than a sensationalist
- seeking to get ratings, and doesn't care one bit about the truth,
- which only serves to further the stereotypes all hackers have been
- stuck with.
-
- Don Ingraham is there, basically representing the Operation Sundevil
- opinion. He thinks that hackers have not been punished enough, and
- that their crimes are very serious. It is obvious that Mr. Ingraham
- has never even considered for a moment the idea that hackers are only
- interested in knowledge and most of them would not knowingly harm
- systems or files. He ought to take a look at the other side before
- forming his ignorant opinions.
-
- In my opinion, Craig Neidorf does not represent the common hacker as
- well as he is capable of in this program. But, obviously he was
- constrained by the format of the show and the ignorance he was forced
- to deal with on behalf of the host and Mr. Ingraham. He is not given
- opportunity to explain that not all hackers are malicious, and the
- subject of hackers informing system administrators of security flaws
- in their systems is not even brought up.
-
- In summary, the Now It Can Be Told program contained sensationalist
- aspects that was to be expected. However, from a hacker's point of
- view it was interesting to see the exploits of other hackers. Most
- interesting was the cyberpunk atmosphere of Phiber Optik hacking, as
- well as the home video of the Dutch hackers and their exploits. It
- was encouraging to hear Emmanuel Goldstein's opinions on hackers and
- he did well to represent them; he did not make them out to be saints,
- yet he defended them from the stereotype of being destructive. Cliff
- Stoll got one or two sentences in, which is all he deserved, IMHO. He
- only spews out the rhetoric we've all heard time and time again. The
- segment on computer terrorism was interesting, but not of much use to
- hackers; the demonstration on eavesdroppping was especially worth
- watching. The final segment, the 'debate' between Craig Neidorf and
- Don Ingraham was not as interesting as it could've (SHOULD'VE) been.
- Geraldo succeeded in disallowing Craig Neidorf to make the points it
- appeared he wished to make, and Mr. Ingraham succeeded in perpetuating
- stereotypes of hackers.
-
- Craig Neidorf ended the show by saying "We're seeing a new breed of
- hacker." And if you look past the obvious sensationalism of Now It Can
- Be Told, that new breed of hacker was well profiled.
-
- ------------------------------
-
- Date: Fri, 18 Oct 91 2:33:25 CDT
- From: bei@DOGFACE.AUSTIN.TX.US(Bob Izenberg)
- Subject: File 4-- Geraldo Rivera show on "Hacking"
-
- <The Geraldo show on hacking was> a piece of tripe! Sorry, this just
- isn't journalism. It's barely in the back-fence gossip class. Here's
- my favorite part:
-
- > KL: Well I was merely publishing a newsletter. I didn't go out and
- > find this document. Rather it was sent to me. In many ways it could
- > be compared to Daniel Ellsberg sending the Pentagon Papers to the New
- > York Times.
- >
- > Geraldo: Do you figure it that way Don? Is he like Daniel Ellsberg?
- >
- > Don: No, Ellsberg went to court to deal with it. Daniel Ellsberg's
- > release of the Pentagon Papers is the subject of a published court
- > decision to point out it was a matter of national security and
- > national interest. The E911 codes, which is the citizen's link to the
- > police department are not a matter of national security. They're a
- > matter of the central service to the community.......
-
- Right, not a matter of national security. It's not the size of the
- sacred cow that you gore, it's how loud it bellows that gets
- attention.
-
- > Don: I don't think they're being punished very much at all. We're
- > having trouble even taking away their gear.
-
- Yeah, that due process sure gets in the way.
-
- > I don't know one of them
- > has done hard time in a prison.
-
- Maybe he doesn't know John Draper, who in addition to his tone stuff
- played with Apple ][s quite a bit... He and others did some very
- interesting things with the DTMF capabilities of the early MicroModem
- ][s...
-
- > The book, Hafner's book on
- > _Cyberpunk_, points out that even Mitnick who is a real electronic
- > Hannibal Lecter ... did not get near any of the punishment that what
- > he was doing entitled him to.
-
- Judge, jury and executioner... Somebody might want to tell this
- gentleman that he's in the 20th century, and is not a judge.
-
- > Don: If they stopped at voyeurism they would be basically
- > sociopathic, but not doing near the harm they do now. But they don't
- > stop at looking, that's the point. They take things out and share
- > them with others, and they are not being accountable and being
- > responsible as to whom they are sharing this information. That is the
- > risk.
-
- If, if, if. It's the potential crime that he's interested in. Off
- with their heads! Sentence first, trial later, and the crime done
- last if done at all.
-
- > Geraldo: Can they find out my credit rating? I know that's not a
- > national security issue, but I'm concerned about it.
-
- > Don: They wipe out our communications system. Rather easily done.
- > Nobody talks to anyone else, nothing moves, patients don't get their
- > medicine. We're on our knees.
-
- Worst case scenario: They disable all billing mechanisms, letting
- everyone make free calls (if only for a day) and the phone company
- forgets all about being a public utility, closes its doors and gets
- nationalized ten minutes later. Bob Allen goes up the river, along
- with his MCI and Sprint counterparts, or moves on to a real job
- destroying the environment for Union Carbide or somebody... PUCs all
- over the country have 75% work force cuts, with their biggest
- time-waster (and source of perqs) gone. But, worst case for whom?
-
- Cheech and Chong had this boy pegged. What a job they could do on
- "Gerondo Revolver" now... ;-)
-
- ------------------------------
-
- Date: Wed, 16 Oct 91 18:41:23 MDT
- From: ahawks@ISIS.CS.DU.EDU.CS.DU.EDU(Andy Hawks)
- Subject: File 5-- The_RISKS_of_Geraldo
-
- I'm sure many of you saw or have heard/read about Geraldo Rivera's Now
- It Can Be Told Program which featured a show on hackers a couple of
- weeks or so ago.
-
- Well, by airing this program, it appears that Geraldo (or actually the
- producers/editors of the show) have put at least one military computer
- at risk.
-
- One segment of the program featured a "home video" of Dutch teenagers
- hacking. This home video would occasionally focus in on the computer
- screen as the hackers hacked. As reporter Krista Bradford describes
- what is going on, the screen shows:
-
- >
- | quit
- | 221 Goodbye.
- | rugrcx>
- | telnet tracer.army.mil
- | Trying 192.33.5.135....
- | Connected to tracer.army.mil
- | Escape character is '^]'.
- |
- |
- |
- | Xenix K3-4 (tracer.army.mil)
- |
- |
- |
- | login:
- | dquayle
- | Password:_
- >
-
- Then we learn that previously, the hackers have gained superuser
- privileges to the system. As Krista Bradford is describing the
- superuser access, we see the computer screen again and the hackers are
- attempting to login to the same site with the 'sync' login (so, this
- is apparently how they gained superuser access).
-
- Later in the show (about 1 minute or so after the hackers have gained
- superuser privileges) Emmanuel Goldstein (2600) states that the
- hackers proceeded to create a new account. The account they create is
- 'dquayle' (Dan Quayle) and has superuser privileges. Then, the
- screen focuses in on the new record in /etc/passwd for 'dquayle', and
- Mr. Goldstein tells us that the new account has no password (the
- screen focuses in on: "dquayle::")
-
- Thus, anyone who has telnet access could've repeated this same
- process, logging in to this tracer.army.mil site with the username
- 'dquayle' (and no password) and would have gained superuser access.
-
- It is obvious that in this situation, whoever allowed the show to be
- aired in its final form had no knowledge of the Internet, otherwise
- this definite "how to hack" security breach would have been omitted.
-
- Thanks Geraldo, for showing all of us how to hack into military
- computers.
-
- (Note: I avoided sending this in for submission earlier to prevent
- any other hackers from repeating the same experiment. Hopefully,
- tracer.army.mil has now had enough time to plug up the obvious hole.)
-
- ------------------------------
-
- Date: Sat, 19 Oct 91 11:12:11 CDT
- From: jmcmullen@well.sf.ca.us(John McMullen)
- Subject: File 6-- 2600 Magazine Exposes Security Holes (NEWSBYTE reprint)
-
- 2600 Magazine Exposes Security Holes 10/18/91
- ARMONK, NEW YORK, U.S.A., 1991 OCT 18 (NB) -- Supported by videotape
- examples, Emmanuel Goldstein, editor and publisher of 2600 Magazine:
- The Hacker Quarterly, told those in attendance at an October 17th New
- York City press conference that "the American public is often lulled
- into a false sense of security; a security that is often not supported
- by the facts of specific cases."
-
- The videotapes, produced by 2600 and provided to the press show both
- the intrusion of a Dutch "hacker" in to United States Military
- computers and what Goldstein alleges is the fallability of a brand of
- mechanical, pushbutton locks used by, among others, New York State
- University sites, Federal Express, United Parcel Service, JFK
- International Airport, IBM and NASA.
-
- Goldstein told Newsbytes "We invested considerable time and money to
- wake people up to the fact that we have a false sense of security when
- it comes not only to computer networks but to physical safety as
- well."
-
- The tape of the Dutch "hacker" was made by Goldstein while in Europe.
- and shows the intrusion into a Unites States Army computer system. The
- intruder was able to set up a fictitious account called "danquayle"
- and, once into the system, was able to obtain "root" privileges thus
- giving him total control of the workings of the system.
-
- A portion of this tape had previously been shown with Goldstein's
- approval on an episode of the Gerald Rivera television show "Now It
- Can Be Told". Goldstein told Newsbytes that one reason for his release
- of the entire tape to the press was his feeling that the Rivera
- episode entitled "The Mad Hacker's Key Party" had distorted the
- message of the tape - "This was not a case of a terrorist break-in but
- was rather simply a demonstration of the lack of security of our
- systems. To find root accounts with password like "Kuwait" and lack of
- sophisticated security in our military computers should be of real
- concern and should not be lost in an explotation of the 'hacker'
- issue."
-
- A background paper provided at the conference by 2600 explains the
- entire intrusion effort in detail and states "The purpose of this
- demonstration is to show just how easy it really was. Great care was
- taken to ensure that no damage or alteration of data occurred on this
- particular system. No military secrets were taken and no files were
- saved to a disk by the hackers. What is frightening is that nobody
- knows who else has access to this information or what their
- motivations might be. This is a warning that cannot be taken lightly."
-
- The second videotape show Goldstein and other 2600 staff opening
- seemingly at will locks manufactured by Simplex Security Systems. The
- locks of the mechanical pushbutton combination variety were shown to
- be installed at the State of New York University at Stony Brook, JFK
- International Airport and on Federal Express and United Parcel pick-up
- boxes throughout the New York Metropolitan area.
-
- In the film, Goldstein is shown filling out a Federal Express envelope
- for delivery to 2600 Magazine and inserting in the Fedex dropbox. He
- then lifts the weather protection cover on the box's lock and keys a
- combination that allows him to open the lock and remove his envelope.
- Scott Skinner, a SUNY student and 2600 staff member told Newsbytes
- that it had actually taken the staff 10 minutes to determine the
- proper code combinations to open the lock.
-
- Skinner explained, "While Simplex prefers people to think that there
- is an endless number of permutations to the lock, there are actually
- only 1,085. In most cases, even this number is greatly reduced -- if
- one knows that only three buttons are being used, it reduces the
- possibilities to 135. Additionally, we found that, once we had the
- combination to one Federal Express dropbox, it worked in every other
- one that we tried in the New York area."
-
- Goldstein told Newsbytes "When we contacted Simplex, they first denied
- that the locks were unsafe and then said that the permutations were
- much greater. After some discussion, they admitted that the 1,085
- figure was correct but said that it would take a person with a
- complete listing of the combinations over four hours to try them all.
- Our experience obviously shows that they may be opened in a much
- shorter time than that."
-
- Goldstein also pointed out that, "although a $5 Master combination
- lock may be broken by a crowbar, it is a much more secure combination
- device. It has 64,000 combinations compared to the 1,085 with the
- Simplex."
-
- Goldstein continued, "One of the real problems is that, should a
- person have the misfortune to be robbed, entry due to a failure of the
- Simplex lock gives no evidence of a forcible break-in and police and
- insurance companies often put the blame on the homeowner or office
- manager for 'giving away the combination.' It really can create a
- problem."
-
- Skinner told Newsbytes "I'm really concerned about this. I'm a student
- at SUNY, Stony Brook and all our dormitories use these locks as the
- only means of security. I've shown the problem to Scott Law who is
- responsible for residence security but he has discounted the problem
- and said that the locks were installed at the recommendation of the
- campus locksmith. The locksmith, Garry Lenox contradicts Law and says
- that he recommended against these locks years ago and said that they
- were not secure for dormitory use." Skinner said that he will write an
- article for the college newspaper in an attempt to raise consciousness
- about this problem.
-
- Goldstein also said that he intends to publish the list of valid
- combinations in an up-coming issue of 2600 to demonstrate to the
- public the problems with the lock. He further said that he will raise
- the issue on his weekly radio show, "Off The Hook", heard on New
- York's WBAI-FM.
-
- In response to a Newsbytes question concerning how the 2600 staff
- happened to become involved in a problem with locks, Goldstein said,
- "We're hackers and when we see something with buttons on it, whether
- it's a computer or not, we tend to try it. While the average person
- tends to accept that things are secure just because he is told that
- they are, hackers will usually try them out. It's because of this
- 'trying out' that we can point out the problems with both the US
- military computer security and this lock -- and we feel that, in both
- cases, we have performed a service. People should be aware when they
- are at risk so that they may take action to correct it."
-
- (Barbara E. McMullen & John F. McMullen/Press Contact: Emmanuel
- Goldstein, 2600 Magazine., 516-751-2749/19911018)
-
- ------------------------------
-
- End of Computer Underground Digest #3.37
- ************************************
-
-