home *** CD-ROM | disk | FTP | other *** search
-
-
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- = =
- - WELCOME TO THE PREMIER ISSUE OF -
- = =
- - -=>PHANTASY<=- -
- = =
- - A MONTHLY PUBLICATIOM AND NEWSLETTER OF -
- = =
- - THE -
- = INTERNATIONAL =
- - INFORMATION -
- = RETREIVAL =
- - GUILD -
- = =
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- Volume Number One,Issue Number One Dated 10/31/90
-
- Table of Discontents:
-
- [1] The IIRG meets the FBI (Part 1)
-
- [2] What is The IIRG and why should I support it?
-
- [3] PHANTASY NEWS
-
- [4] Listing of PHANTASY Distribution Sites
-
-
- OFFICIAL DISLAIMER...
-
- All information in PHANTASY is from USER contributed material
- The Publishers and Editors of PHANTASY and THE IIRG disclaim
- any liability from any damages of any type that reader or
- user of information contained within this newsletter may encounter
- from the use of said information.
-
- PHANTASY is (C) 1990 by The IIRG
- IIRG and INTERNATIONAL INFORMATION RETREIVAL GUILD is (C) 1982
-
-
- Editors Note- For Printing PHANTASY uses a 50 line
- page format by 80 Columns
-
-
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-END PAGE 1-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- THE INTERNATIONAL INFORMATION RETREIVAL GUILD MEETS THE FBI
- (PART ONE)
-
-
- The following is a translation of a tape of the IIRG's meeting with the
- Federal Bureau of Investigations. The IIRG attended this meeting with
- a local users group. Some portions have been deleted to protect the
- members of the groups Identity and some Handles have been changed
- to further protect those identities. Some handles are still correct
- as these members did not request anonymity.
- We would offer the date of this meeting but do not feel it is prudent
- as this would further risk some members to scrutiny.
-
- EDITORS NOTE- Please do not scream about the translation of the
- FBI Agents portions. This is the way he actually
- talked and we have brought it directly to text-form.
-
-
- Following a introduction by the President of the Local Users Group
- this is the way the meeting proceeded.
-
-
- FBI AGENT- I have a lot of information here,but first I'd like to thank
- (DELETED) and the (DELETED) for inviting me here tonight.
- Its a chance to share some information and maybe give you all
- some insight of maybe what we do know and what we don't know,
- and maybe relate a couple of cases the FBI's been involved in.
- There are not a whole lot, the ahhh law that governs computer
- crime has only been on the books since 1984,I think ahhh that
- Connecticut is one of the first states to ahhh, have a computer
- oriented law,ahhh as (DELETED) mentioned my name is BILL
- ATKINSON and I'm a special agent with the FBI and I'm assigned
- with the Hartford resident angency.
- I have a background in law enforcement,I spent nine and a half
- in Washington D.C. on the police department and I've been with
- the FBI since 1984.
- I dont have a computer background and you'll know that,
- That after i get done and you ask me one question and it just
- wipes me out right there.
-
- OLD TIMER- (ROBUST LAUGH)
-
- FBI AGENT- The cases that our office has been involved in,They have used
- computer experts from Washington D.C.,out of the Washington
- field office.
- I think they have two,who are court certified computer experts
-
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-END PAGE 2-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- FBI AGENT- So that lets you know as far as law enforcemaent goes its a,
- It's a brand new ball game, Ahhh I know the case I'm gonna
- tell you about or one of them. They had a whole room full of
- disks, Whatever the big brown tapes are. They had a whole room
- full of them. They needed a computer expert just to figure out
- what the evidence was that the seized.
-
- WHOLE ROOM- (LAUGHTER)
-
- FBI AGENT- Computer crime,the way it looks. Is going to affect everyone a
- lot more than your common neighborhood bank robberies.
- They last forever and ever and once they're detected,the people
- who are involved in it really don't want to report it.
- And the costs of changing the policies that allowed it to
- happen are just astronomical. We can see that with the Pratt
- and Whitney,different segments of government contract bidding.
- It's just astronomical the amount of money that it costs the
- taxpayers. It probably could pay my salary for at least six
- months anyway.
-
- OLD TIMER- (Extremely Sadistic laugh)
-
- FBI AGENT- Maybe when I get done you'll see at least what the FBI is
- trying to do,I'll try to touch the motives that generates the
- computer crime and the problems that it creates, and the
- problem it creates for the people trying to solve the crimes.
-
- First let me say that we are an asset that probably every
- segment of United States society can use the FBI.
- There are a lot of people who don't know just how helpful we
- can be. They think that if they call the FBI,they're gonna be
- recorded and theres gonna be a dossier opened on you
- immediatly.
- Some of the phone calls we get shold be recorded just for the
- pure craziness of them all.
-
- But don't hesitate,that if on your job site or somewhere down
- the line you come across something that appears to be
- suspicious or just out of the ordinary.
- Or some information that will help one of the people in our
- office. We have accountants who work white collar crime,we've
- had a couple of guys who worked on the Pratt and Whitney,
- STANGER case,which I'll get into later,who keep pretty much in
- touch with the people in Washington as to whats going on.
- But theres always someone out there that has a new wrinkle,
-
-
-
- -=-=-=-=-=-=-=-=--=-=-=-=-=-=-END PAGE 3-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- FBI AGENT- I'm sure theres a few people in this room,Whats the term?
- HACKERS, that come across things the rest of the country
- doesn't know is out there.
- And with Every crime,every computer crime,you probably have
- the Fraud By Wire Statutes that is violated and the
- Interstate Transportation of stolen property,bank fraud,
- embezzelment,and mail fraud.
- There all tied in,and where you might think where theres just
- a computer problem,it might go on and be a whole interstate
- system thats being worked,and it happens.
- It happened recently in Texas,we had some people along the
- whole SouthWest United States that was just being bounced from
- one system to another. It took them months and months to
- figure out and then they decided not to prosecute.
- So there might be something you'd like to give us or you
- might not want to get involved,or at least if you want to use
- us as a sounding board,feel free to do that.
-
- I know one of the things the agent who gave me this
- information said "Tell them about a definition of computer
- crime" So I went back to my books,I went back to Quantico
- two years ago,and I remembered one of the instructers down
- there said "I'm gonna give you a definition"
-
- So lets start out by saying,
-
- Really Computer Crime isn't really Computer Crime
- It's just a crime where a Computer happened to be in the Room
-
- With that,everyone looks like wheres this guy coming from?
- Nobodys gonna actully say the computer commited the crime!
- So we had figured this guy had punched one too many buttons
- along the way and had lost touch with reality.
- I don't know if you can consider the computer the criminal
- or the person programming the computer the criminal.
- Once the crime has been defined,if we're notified about one
- and determine whats been stolen or whats been altered or
- manipulated, We can pretty well tell who committed the crime.
- That parts the easy part.
- There will be instances where you know whats been done,and
- you know who did it. But as you are aware of,computer
- programs and manipulations you can do with computers,
- it's very difficult to prove a certain person commited the
- crime.
-
- Thats where I guess the problem lies in this day and age
- Its not knowing whats been done or knowing who did it,
-
- -=-=-=-=-=-=-=-=-=-=--=-=-=-=-END PAGE 4-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- FBI AGENT- Its being able to prove it.
- And what we know with these laws being on the books for
- two years,there is no case law and every time one of these
- cases goes to court its a whole new baliwick for the
- judge,the prosecuters,and the defense attornys.
- Theres no,NO precedent has been really set as to whats
- evidence,whats real evidence,are copies evidence?
- In federal court,copies can't be admitted as evidence.
- So a computer printout? Is the printout the evidence?
- Is the computer the evidence? Is the programmer the evidence?
- And every time you go to court in a different district
- you have a different opinion.
-
- KNIGHTHACK- So if your gonna do it,Do it now?
-
- FBI AGENT- Yeah,do it while theres still time to figure out what the
- solution is....By the way,Your name please??
-
- WHOLE ROOM- (Laughter)
-
- FBI AGENT-When are you going to commit this crime?
-
- KNIGHTHACK- Tommorrow!
-
- FBI AGENT- Thats true,thats what the whole problem is.
- They've been passed,all the laws have been passed by the
- legislators and haven't been interpeted yet by the judges
- What little case law there is can change with every
- different program that comes up,because as the computer
- gets more refined,So do the crimes.
- What was a murder yesterday,is still a murder tommorrow,
- But what was a computer crime today,wasn't yesterday,and
- probably won't be tommorrow.
- I'm sure you can all think up different things you'd like to
- do, or in your case (POINTING AT KNIGHTHACK),have done and a
-
- WHOLE ROOM- (Laughter)
-
- KNIGHTHACK- I'm leaving now.
-
- FBI AGENT- Just the imagination,you can look at the different computer
- games,I have a case I'm trying to work on, COMPUTER PIRACY
- Just one of the computer boards themselves that are going into
- the games,and they say thats rather simple.
- Because you can look at a certain format and know the person,
- who put it together.
-
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-END PAGE 5-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
-
- FBI AGENT- And he basically initials the work by the way he puts it
- together. But now if he looks at it and you look at it,
- you would all say "Yeah you can tell thats what was done"
- But if you give it to a jury to look at,that doesn't know
- input from output,they would have no idea who put this
- transistor here.
-
- WHOLE ROOM- (Laughter)
-
- FBI AGENT- Are transistors still used,I don't know
-
- MERCENARY- AHHH, Not to often.
-
- WHOLE ROOM- (Laughter)
-
- FBI AGENT- So ahhh,thats the whole problem,another problem we have,
- I dont know if its as big a problem now as when,Oh I don't
- know you can tell me,with people under the ages of 17 and
- 16 getting into different databanks and manipulating those
- systems or just passing information around on the BBS's or
- whatever.
- The ahhh. federal prosecution of anyone under the age of 17
- is preety well unheard of, You have to get a specific request
- from the Department of Justice and a United States Attorny
- is gonna want to prosecute the case. And it has to be clear
- to the FBI and everyone else and if it doesn't really happen
- on the state level,They'll prosecute from 16 and under,
- They say they will here in Connecticut.
- But then you look at the crimes themselves and you know whats
- been done. Just to get into the bank and pass the information
- Will that be determined to be a crime?
- Maybe it will,Maybe it won't.
-
- One agent i know in our office that was working a local case
- involving an insurance company. Where a High-School student
- had gained access through getting initialy in the database
- and then he'd go to bed at night and programmed his computer
- to go through all the numbers and find the code, When he
- got up in the morning, Low and Behold,he was in this
- insurance companies database.
- Well when he did,he fooled around for a couple of months
- The Insurance company,(Whose name will go unmentioned),before
- you all go out and cancel your polocies tommorrow.
- He was in and out for about two months,and they got a trap on
- the call and placed him in East Hartford or Manchester area.
-
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-END PAGE 6-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
-
- FBI AGENT- and they really didn't know what to do with it,he really
- wasn't doing anything but they knew he was coming online,
- late at night and early in the morning. They were perplexed,
- How do we stop him,really who is he?
- Because all they really knew was it was coming back to a
- telephone in East Hartford or Manchester.
- Well I guess they got there answer in one short way,
- he put on a message one morning and lets see what did it say?
- It went something to this effect,
-
- He identified all there customers,and all there insurance
- users and he wanted a corvette or he would notify all the
- users the system was unsafe and he had access to all there
- accounts.
-
- Well I guess they sent him back a message,and they went
- back and forth till they narrowed down who they were
- dealing with through the telephone company with a trap on the
- line and they traced it to a specific phone.
-
- Anonymous- He shold have waited till they went on strike.
-
- Whole Room- (Laughter)
-
- FBI AGENT- Then they delivered the corvette and he came to pick it up,
- and he was only 14 or 15 and couldn't have driven anyway
- But they said shame on you and don't do it again,he was
- scared
-
- MERCENARY- A good little slap on the wrist.
-
- FBI AGENT- And now he's probably 18 or whatever and shooting for a rolls
-
- KNIGHTHACK- No, now he's probably in the FBI's Computer.
-
- FBI AGENT- Yeah,thats probably right,now thatcase was easy,that was
- extortion, he made a demand,then said what he was going to do
- and he was going to try to hurt there business.
- So in that case,they had extortion and had he been over
- 17 they could have prosecuted him easily.
-
- ANONYMOUS- Almost more effective than a gun!
-
- FBI AGENT- Yes, It really is when your dealing with the millions they're
- dealing with and the amount of loss they could under go.
- If they decided to go with the prosecution,that would have
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-END PAGE 7-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
-
- FBI AGENT- been easy. But since he was that age and they didn't even
- do that, Now had he done something less extreme or more
- extereme,whatever the case may be.
- What would they have done with him? Thats still the question.
- Theres never been a computer crime in Connecticut and thats
- one of the bolder statutes as far as computer crime goes.
- One of the problems investigators have encounterd when
- facing computer crime is just what I said,
- What laws have been violated,I know if a high-school hacker
- gains access to a database, Whats the worth?
- Thats what prosecuters look for. How much did he get?
- Can the penalty be equal or greater than what he obtained?
- Did the person really obtain anything?
- If he hurts you business or causes you to use a computer
- analyist to try to track him down?
- He's hurt the company but not made any monetary gain?
- Thats what they'll still be looking at until they finally put
- a few experts into an area,Computer experts like yourselves
- that say hey and become police officers or investigators
- and can attack the problem where it is,and it is a problem.
- Until they do that they'll have guys like me or other
- ex-policeman or accountants who will have to take the word of
- everybody else and basically hope and pray they guess
- correctly on how were gonna catch the persons doing it.
- I know theres gotta be all different kinds of ways to corrupt
- the system and one of the biggest problems,that movie,ahhh
- about the kid who got into..
-
- KNIGHTHACK- Wargames?
-
- FBI AGENT- Thats one of the biggest fears especially with the FBI
- going to computer files and computer finger-print systems.
- The fedreal government has all its pricing statistics and
- bids on computer also.
- So if you can imagine a 15 or 16 year old on his computer all
- night,imagine the professional criminal or the proffessional
- spy or whatever,he has his whole life,eight hours a day and
- he gets paid and if he wants to put in overtime thats a free
- shot. And if you have to figure, for every program written
- theres somebody who can figure it out,because someone had to
- put it in the computer.
-
- ANONYMOUS- No system is 100 per cent foolproof. if somone wants to work
- hard and long enough,he can get in any system.
-
- FBI AGENT- Yes,Right but what do you do when he gets in??
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-END PAGE 8-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
-
- That Ends Part one of: THE IIRG MEETS THE FBI
- Be sure to get next months issue for the conclusion.
-
-
- |=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=|
- | PHANTASY FEATURE ARTICLE TWO: |
- | |
- | THE |
- | INTERNATIONAL |
- | INFORMATION |
- | RETREIVAL |
- | GUILD |
- | |
- | What is it,and why should I support it |
- | |
- |=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=--=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- The International Information Retreival Guild is a group of hackers,
- who are still bonded together in the earliest traditions of the art.
- We ask for No money,No contributions and the only thing we've ever
- charged for, are the costs of disks or tapes.
- We believe that the Guild should be supported by its actions and that
- if individuals are happy with our performance, voluntary contributions
- will follow. We are once again happy to join the mainstream hacking
- community and look forward to communicating with the world once more.
- The IIRG has been almost silent for three years now,but several members
- after reviewing present conditions have reactivated the group.
- We hope those of you who do remember us,and those of you who would like
- to come to know us and communicate with us will do so.
- Listed at the end of this issue will be several BBS systems where we
- we can be contacted and where PHANTASY will be distributed.
- Since this issue has been a little rushed,and we have not had much time
- to prepare for our new resurgence more information will be forthcoming
- in following issues.
- We hope to bring you all the hacking and phreaking news possible
- as well as programming, and insider reports.
- Most of our former contacts with several larger computer companies
- are still in place and we hope to be bringing you there inside
- dirt as to whats going on.
- So enjoy our forthcoming issues and we hope to be hearing from you...
-
-
- The IIRG-1990
-
-
-
-
- -=-=-=-=--=-=-=-=-=-=-=-=-=-=-=End Page 9=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
-
-
- PHANTASY NEWS......
-
-
- Well as we stated we've not had much time to prepare but here's
- what we do have for now...
-
- Date-Line Nov 6th through 15th
-
- Microsoft to hold free WINDOWS computing Seminars in the following
- cities on the following dates....
-
- Nov 6-Hartford,Ct.-9am to 11:30am-Ramada Inn,Meriden,275 Research Pkwy
- Nov 8-Denver,CO-9am to 11:30am and 1:30pm to 4:00pm at the
- Westin Hotel Tabor Center,1672 Lawrence St.
- Nov 8-Dallas Texas-9am to 11:30am and 1:30pm to 4:00pm at the
- Southland Center Hotel,400 N. Olive St.
- Nov 13-Minneapolis,MN-9:00am to 11:30am and 1:30pm to 4:00pm at the
- Radisson Hotel Metrodome,615 Washington Ave S. E.
- Nov 15-Detroit,MI-9:00am to 11:30am and 1:30pm to 4:00pm at the
- Westin Hotel Detroit,Renaissance Center
-
- Date-Line Nov 12th through January 9th,1991
-
- VMS Systems Security V5 Seminars to be held at
-
- Nov 12-14 Denver,Co at the Digital Training Center
- 212-702-4300
- December 3-5 San Diego,CA at the Humphreys 1/2 Moon Inn
- 619-224-3411
- January 7-9 Boston MA at the Bay Back Hilton
- 617-236-1100
-
- We hear the course fee is $995 and is 3 days long
- One of our members was able to get in for free by
- lurking around back in October and tells us the
- Seminar offers an:
-
- 1.Overview of System Security
- 2.Security Threats discussion covering:
- (User-based attacks,Operating system penetration,trap doors,
- worms,viruses Trojans and Indirect Hacker attacks)
- 3.Type of Security Controls
- 4.Log in Controls
- 5.Files and Other Protection
-
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-END PAGE 10-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
-
-
- 6.Security Implemenatation Methods
- 7.Security Auditing
- 8.VAXcluster Security
-
- A listing of DEC's DECnet-Vax Network security seminars will
- be forthcoming in the next issue.
-
-
-
- PHANTASY DISTRIBUTION SITES
-
- This is the List of BBS's that will be carrying Phantasy as of
- October 31,1990...
- --------------------------------------------------------------------------
- The Rune Stone BBS
- IIRG NODE #1 203-485-0088
- 1200/2400 Baud
- --------------------------------------------------------------------------
- Lightning Systems
- 1200/2400 Baud 414-363-4282
- --------------------------------------------------------------------------
- Prismatic Sphere
- 1200/2400 Baud 518-372-8045
- --------------------------------------------------------------------------
- Northeast Survival BBS
- 1200/2400 Baud 216-442-0879
- --------------------------------------------------------------------------
- MiniHost BBS
- 1200/2400 Baud 203-496-9183
- --------------------------------------------------------------------------
- If you would like your BBS to be a distributor of Phantasy
- Call The Rune Stone and State so in Feedback to Sysop
-
- May Odin Guide Your way....
- The IIRG-10/90
-
-
- End This Issue.............
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- Downloaded From P-80 International Information Systems 304-744-2253
-