home *** CD-ROM | disk | FTP | other *** search
-
- #######################################
- # #
- # #
- # ======== =\ = ====== #
- # == = \ = = #
- # == = \ = ====== #
- # == = \ = = #
- # == = \= ====== #
- # #
- # #
- # <Tolmes News Service> #
- # ''''''''''''''''''''' #
- # #
- # #
- # > Written by Dr. Hugo P. Tolmes < #
- # #
- # #
- #######################################
-
-
- Issue Number: 03
- Release Date: November 19, 1987
-
-
-
-
- TITLE: "Making Computers Snoop-Proof"
- FROM: Fortune
- DATE: March 17, 1987
-
-
- If a strange delivery truck appears to have been stuck across the
- street from your office for hours and the "workmen" seem to be spending a lot
- of time in the back fiddling with with fancy electronic equipment, it might be
- time to get nervous. That personal computer on the secretary's desk and
- the mainframeadown the hall leak information by the diskful. Each time a
- keyboard is tapped or a letter appears on a screen or a printer, computers
- emit radio frequency transmissions that can be picked up as much as half a mile
- away.
- While companies that are not in the defense business need not worry yet-
- there's evidence that garden-variety industrial espionage types engage in this
- kind of snooping- the Pentagon has become so concerned that it is spending
- $200 million a year to eliminate or muffle signals from machines used by the
- military, security agencies, and defense contractors. The name given to the
- government program: Tempest, as in the type that it can be contained in a
- teapot.
- Manufacturers use two methods to bring computers or peripheral equipment
- up to Tempest standards. The first, called suppression, consists of building
- a machine with special chips, wiring, and other components that do not give off
- as many emissions as standard components. For example, a Tempest machine
- might be built using optical fiber, which sends out no radio waves, rather
- than copper wire, which does. The second method, called containment,
- entails enclosing the machine in a leakproof case, perhaps made of special
- plastic that traps radio frequencies. A Tempest computer can cost twice as much
- as the civilian equivalent, although prices have begun to drop now that the
- military is ordering thousands at a time. Manufacturers say the high prices
- are justified by the cost of special materials, separate assembly lines, and
- elaborate testing.
- Industry predictions that sales of snoop-proof computers might reach $1
- billion a year by 1990 have lured more than 50 manufacturers into making
- products that meet Tempest standards. "The market has exploded," says James
- D'Arezzo, a vice president of Compaq Computer, which sells Tempest versions
- of its portables. "The market is estimated to grow from 30% to 35% a year
- and it's not letting up. It is lucrative."
- For newcomers to the business, getting started isn't easy, especially
- since the technical standards are classified. "You have to be qualified
- by the government to learn the specifications," Corp. "But it's hard to get qua
- lified if you don't
- understand the specs." Zenith solved the problem last year by buying Inteq,
- a small company that was already turning Zenith's personal computers
- into Tempest machines. Zenith now has orders from the Pentagon for 12,000
- personal computers built to Tempest standards.
- Many Tempest orders are secret, but industry watchers say Wang
- Laboratories is the biggest supplier. It sold an estimated $75 million of
- button-lipped computers, word processors, and other devices to the
- armed forces and military contractors in 1984. One reason for Wang's success
- is the variety of its offereings: more than 50 products meet Tempest standards
- , according to International Data Corp., a Massachussetts market research
- firm. IDC notes that by making the Tempest products operate just like its
- regular equipment, Wang has won Pentagon orders for standard machines
- as well.
- Another company prospering from Tempest wizardry is Iverson Technology
- Corp. For ten years Iverson has manufactured secure devices to
- electronically read special type; it built on that expertise to come up with
- a Tempest version of the IBM personal computer. Sales of the McLean, Virginia
- company tripled in 1985 to $17 million. Its return on shareholders' equity was
- also impressive: 25%. The company- the biggest pure play in the Tempest field
- -went public las year at $8 a share last July; its stock recently traded
- over the counter at around $14.
- The biggest payoff to Tempest manufacturers will come when, and if,
- corporations get worried about what computers are leaking and start buying
- secure machines. This probably won't happen soon. Executives at the
- companies that make secure computers report some civilian interest in the
- product but virtually no sales. "I've studied computer security for 16 years
- and never heard of anybody doing that kind of industrial espionage," says
- Donn Parker, a consultant at the SRI International consulting firm in Menlo
- Park, California. "The best way to get information is the old-fashioned way.
- Go to the local bar and buy the employees a few drinks." - Brian O'Reilly
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- NOTA:
-
- The fear of this type of espionage has been expressed in many articles. The
- military has feared that something like this could jeopardize national security
- or something like that. The specifics for the standards on the protections
- are noted as being secret. This could mean that the radio emissions only have
- to be down to a certain level (and you might still be able to receive them.)
-
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
-
- TITLE: War Against Phone Hacking Heats Up
- FROM: ANTIC Magazine
- DATE: September 1987
-
-
- BY GREGG PEARLMAN, ANTIC ASSISTANT
- EDITOR
-
-
- Computer break-ins are no longer viewed as harmless pranks. For example,
- unauthorized computer access is a misdemeanor under 502PC of the
- California Penal Code if you just trespass and browse around -- and if
- it's your first offense.
-
- Butmaliciously accesses, alters, deletes, damages,
- destroys or disrupts the operation of any computer system, computer network,
- computer program or data is guilty of public offense" -- a felony under
- Section C of that code. Even changing a password to "Gotcha" is a felony if
- it can be proven that it was a "malicious access."
-
- In California, the maximum punishment is state imprisonment, a $10,000 fine
- and having your equipment confiscated. The penalty depends on who you are,
- your prior record and the seriousness of the crime.
-
- And you don't have to, for instance, breach national security to be guilty
- of a felony. Accessing even a simple system for a small company could damage
- vital data for more than a year's worth of business, especially if that company
- didn't properly back up its data. There are all kinds of computer crime.
- Stealing an automated teller machine card and withdrawing money from an
- account is a computer crime because you're using a computer to get money
- out of a system. But simply trespassing in a system and not doing
- any damage is normally a misdemeanor, according to Sgt. John McMullen of the
- Stanford University Police Services. This kind of crime has become very
- common. "Every kid with a computer is tempted," he said.
-
- Unfortunately, it can take months to complete an investigation. For
- instance, the so-called "LEGION OF DOOM" case, beginning in September,
- 1986, took 10 months to solve and involved people in Maryland, New York,
- Pennsylvania, Oregon and California. If someone breaks into the computers
- of, for example, California's Pacific
- Bell, and the break-in is severe,
- Pacific Bell Security gets warrants issued, and then, with the police,
- confiscates computers, manuals,
- telephone lists and directories -- all related equipment. It's common for the
- computer to be tied up for a few months as evidence. (And by the time Pacific
- Bell Security does get involved, the evidence is usually overwhelming -- the
- conviction rate is extremely high.) "Whenever I'm involved in a case," said
- McMullen, "I ask the judge for permission to confiscate the equipment.
- That's one big incentive for hackers not to do this kind of stuff. I haven't
- had any repeaters, but I know of one case where the guy probably WILL do it
- again when he gets out. "Usually the shock of what happens to a
- juvenile's parents -- who bought the equipment and watched it get
- confiscated -- is enough to make them stop. But we don't really have enough
- cases to know what the parents do." ACCESS
- "It's easy for hackers to find company phone numbers," said Daniel Suthers,
- Atari user and operations manager at Pacific Bell in Concord, California.
- "Most large companies have a block of 500 to 1,000 phone numbers set aside
- for their own use. At least one line will have a modem.
-
- "People post messages on hacker/phreaker bases on some BBS's and
- say 'I don't know who this phone number belongs to, but it's a business,
- judging by the prefix, and has a 1200-baud tone.' Then it's open season
- for the hackers ers aren't much different than
- hackers -- they're just specifically telephone-oriented. In "CompuTalk:
- Texas-Sized BBS" (Antic, August 1987), sysop Kris Meier discussed phreakers
- who appear to have called from phone numbers other than the ones they were
- actually using. A computer isn't needed to do this -- it's usually done
- with a "blue box." "The blue boxes were used mostly in the
- late 1960s and early '70s," said McMullen. "They fool the network and
- let people make free long distance calls
- -- a tone generator simulates the signalling codes used by long distance
- operators. The boxes were phased out a couple of years ago, though: they no
- longer let hackers access AT&T, but Sprint and MCI can be accessed by
- something similar. However, computer programs are normally used now."
- To get long-distance phone service, hackers now use one of several programs
- passed among other hackers (on bulletin boards, for example). They find the
- local access number for Sprint or MCI and then run the program -- perhaps for
- a few days. It generates and dials new phone numbers, and the hackers can
- check to see how many new or free codes they've turned up.
-
- They can post the codes on a BBS, and their friends will use them until they g
- et stopped by the long-distance
- company -- depending on how long it takes the company to realize that these
- numbers hadn't been issued yet -- or until the customers discover that their
- numbers have been accessed by someone who isn't "authorized."
-
- Bulletin boards can be especially easy prey. "If a hacker knew your BBS
- program intimately, he could probably figure it out, but that's messy," said
- Suthers. "If he can find a back door, it's easier. Sysops are notorious for
- putting in their own back doors because, though they have all the
- security under the sun on the FRONT doors, they still want to get in
- without problems. It's just like what happened in the films Tron and Wargames
- -- which probably taught a whole generation a lot of things."
-
- Meier had said in the August, 1987 issue of Antic that someone once called
- his board COLLECT. Simply put, the caller fooled the operator. McMullen
- says that's been around for a long time. "It's common in prisons and
- situations where the phones are restricted."
-
- McMullen also said that if the timing is just right, as soon as the modem
- answers, the phreaker can wait for an operator to say "Will
- you accept the charges," then say "Yes." The operator can't tell which
- end said yes, and if the modem has a long delay before the connect tone, the
- phreaker can get away with it. It couldn't be done entirely
- electronically -- the voice contact is needed.
-
- "I've never run across people accessing online services such as CompuServe in
- this way, but I'm sure it happens," said McMullen. "People suddenly get
- strange charges on their phone bills. "The hackers I've dealt with are very
- brilliant and good at what they do. Of course, when you do something all day
- that you're really interested in, you're GOING to be good at itmost recent hack
- er case at Stanford University dealt with the
- Legion of Doom, an elite group of hackers who broke into computers --
- some containing national defense-related items.
- "As I understand it, they're supposed to be the top hackers in the nation,"
- McMullen said. "I started investigating the case when it began
- crossing state lines, getting a bit too big. I contacted the FBI, who said
- that because of the Secret Service's jurisdiction over credit card and
- telephone access fraud, they'd taken over computer crime investigations that
- are across state lines -- actually, anything involving a
- telephone access code. This case, of course, involved access codes, because
- the Sprint and AT&T systems were used, and it was the Secret Service, not the
- FBI, that made the arrests. "I think that the publicity from this
- case will scare people, and there'll be a lot less hacking for a while. Some
- hackers are afraid to do anything: they're afraid that the Secret Service
- is watching them, too."
-
- TRACING
-
- AT&T, Sprint and MCI now have ANI -- Automatic Number Identification -- as
- does Pacific Bell. It aids a great deal in detecting hackers. Pacific
- Bell usually just assists in this type of investigation and identifies the
- hackers. "It's easy to trace a call if the caller logs in more than once,"
- said Suthers. "The moment they dial in, a message is printed out -- before the
- phone even answers -- pinpointing where it came from, where it went to, the
- whole shmeer.
-
- "A blue box made it much harder to detect, but if a hacker used it
- consistently, we could eventually trace it back. So if someone is in
- California and makes it look as if he'd called from New York, we can trace it
- across the country one way, and then back across. Generally, though if the
- call IS billed to a New York number, the caller is actually somewhere like
- Florida. But we can back-trace the call itself, especially if it's
- extremely long."
-
- But recently someone broke into Pacific Bell "through a fluke of
- circumstances." Suthers said, "We closed down that whole area, so they
- can't get back in that way, but if they dial the number again, they're in
- trouble."
-
- If Pacific Bell Security detects a break-in, the area is secured
- immediately. Sometimes hackers are steered toward a kind of
- "pseudo-system" that makes them THINK they've broken in -- but in fact
- they're being monitored and traced. As to how many hackers there are, who
- knows? There's a lot of misuse and inside work that's never detected or
- reported.
-
- SECURITY
-
- Security systems are expensive, but someone with a lot of data and an
- important system should seriously look into one. Very few hackers are caught,
- simply because few corporations have good security systems.
- "Passwords should never be names, places or anything that can be found in
- a dictionary," said Suthers. "People shouldn't be able to just write a
- program to send words from their AtariWriter Plus dictionary disk.
- Normally there should be a letter here, a few numbers there -- garbage. tes a pr
- ogram to generate random symbols and keeps calling back
- until he breaks in, he'll probably be traced.
-
- "Some corporations aren't very computer literate and don't worry about things
- like passwords until they've been hit, which is a shame. But it's all out
- there in the books. TRICKS OF THE UNIX MASTER (by Russell Sage, published by
- SAMS Publications, $22.95) is a beautiful book that tells you exactly
- what to do to avoid break-ins." McMullen said that Stanford is trying
- to tighten up security by emphasizing the importance of better passwords.
- "When researchers want to do their work, however, they don't want to mess
- with passwords and codes," he said. "Universities seem to want to make
- their systems easier for researchers to use. The more accessible it is,
- obviously, the less security there is in terms of passwords. It's easier to
- use your name as a password than some complicated character string.
- "So any hacker worth his salt can go onto any computer system and pull out
- an account. Especially with UNIX, it's very easy to access it, entering as the
- password the first name of the person who has the account. These Legion of
- Doom hackers used a program that actually found out what the passwords
- were: it began by just checking the names. They were very successful -- it
- was just unbelievable."
-
- But McMullen feels that security fell way behind the advances made in
- computers, and several avenues were left open for people to explore.
- "Often these hackers don't mean to be malicious or destructive," he said,
- "but I think they really feel triumphant at getting on. Sometimes
- they do damage without realizing it, just by tramping through the system:
- shutting down phone lines, programs and accounting systems."
-
- However, the strides made in security since then have accounted for arrests,
- confiscations and convictions all over the country -- but there are still many
- more who haven't been caught.
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- NOTA:
-
- Most real hackers are familiar with LOD/H (Legion of Doom/Legion of Hackers).
- Currently there is a technical journal being put out by LOD/H. It can
- be found on most of the finer boards.
-
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
-
- TITLE: Toll Fraud Trial Sets New Tone
- FROM: Network World
- DATE: May 25, 1987
-
-
- DALLAS-
-
- The recent jury conviction of a Texas man for the theft and sale of
- long-distance access codes may make it easier for long-haul carriers to stem
- the tide of toll fraud, which costs the industry and estimated $500 million a
- year. On May 11, a U.S. District Court jury here found Dallas resident Jack
- Brewer guilty on two counts each of trafficking and possession of telephone
- access codes stolen from Texas National Telecommunications, Inc. (TNT), a Texas
- long-distance carrier. Brewer was charged under a section of the federal
- Comprehensive Crime Control Act of 1984. Sources close to the the case
- said Brewer may be the first person to be convil fraud
- in the U.S. The case is also seen as important because it indicates growing
- recognition of toll fraud as a serious crime. Brewer was selling the stolen
- codes, which telephone callers use to access long-distance circuits of
- carriers other than AT&T and which those carriers use for billing,
- according to Terry K. Ray, the assistant U.S. attorney who prosecuted
- Brewer. TNT officials said use of the stolen codes cost the company $30,000.
- Ray said he met with representatives of MCI Communications Corp. last week to
- discuss the investigative techniques used to apphrehend Brewer and legal
- methods used to win the conviction. Brewer will be sentenced by a judge on
- June 4 and faces a maximum sentence of 50 years imprisonment and a $1 million
- fine. Toll fraud places a heavy financial burden on MCI and other
- carriers Neither MCI nor AT&T would divulge what toll fraud costs them, but
- US Sprint Communications Co. said fraudulent use of access codes lowered
- its first-quarter 1987 revenue by $19 million.
-
- Brewer was apprehended through a sting operation conducted with the
- help of TNT, Southwestern Bell Corp. and the U.S. Secret Service.
- Southwestern Bell monitored Brewer's private telephone as he dialed numbers
- sequentially in a trial-and-error attempt to ascertain active access
- numbers. The regional Bell holding company kept a list of the working
- access codes obtained by Brewer. Secret Service agents then contacted
- Brewer, posing as buyers of access numbers. For $3,000, Brewer sold them
- a list of 15 numbers, which matched the list made by the RBHC. MCI has joined
- with AT&T, US Sprint and some smaller carriers to form the Communications
- Fraud Control Association. Rami Abuhamdeh, executive director of the
- Tysons Corner, Va.-based group, said there have been several convictions for
- toll fraud to date, but those cases were decided by judges, not juries. A
- number of federal and state statutes apply in stolen code cases, depending
- on how and where the offender defrauds a carrier, Abuhamdeh said. Gaston
- Sigue, a lawyer for the antifraud association, said the TNT case is
- significant because jury convictions are more difficult to get than
- convictions from a judge, and it indicates that Americans have come to
- recognize telephone fraud as a serious crime. Abuhamdeh said that as carriers
- gain equal access to local exchanges, they will phase out code numbers as a
- way of accessing long-distance circuits and the level of toll fraud will
- decline.
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- NOTA:
-
- This type of code-selling has gone on a lot. Many times, the sellers are
- homeless who just go up to a telephone and randomly hack codes out. The people
- who sell the codes can usually be found in airports and bus terminals.
-
-