home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 107.8 KB | 2,272 lines |
- .oO Phrack 49 Oo.
-
- Volume Seven, Issue Forty-Nine
-
- 16 of 16
-
-
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
- PWN PWN
- PWN Phrack World News PWN
- PWN PWN
- PWN Issue 49 PWN
- PWN PWN
- PWN Compiled by DisordeR PWN
- PWN PWN
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
-
-
- Phrack World News #49 -- Index
-
- 01. CIA attacked, pulls plug on Internet site
- 02. Letter From Senator Patrick Leahy (D-VT) on Encryption
- 03. Java Black Widows - Sun Declares War
- 04. Jacking in from the "Smoked Filled Room" Port
- 05. Panix Attack
- 06. Massive Usenet Cancels
- 07. Mitnick Faces 25 More Federal Counts of Computer Hacking
- 08. Hacker is freed but he's banned from computers
- 09. Computer Hacker Severely Beaten after Criticizing Prison Conditions
- Target of Campaign by U.S. Secret Service
- 10. Bernie S. Released!
- 11. <The Squidge Busted>
- 12. School Hires Student to Hack Into Computers
- 13. Paranoia and Brit Hackers Fuel Infowar Craze in Spy Agencies
- 14. Hackers Find Cheap Scotland Yard Phone Connection
- 15. U.S. Official Warns OF "Electronic Pearl Harbor"
- 16. Suit Challenges State's Restraint of the Internet Via AP
- 17. U.S. Government Plans Computer Emergency Response Team
- 18. Hackers $50K challenge to break Net security system
- 19. Criminal cult begins PGP crack attempt
- 20. Hackers Bombard Internet
- 21. Crypto Mission Creep
- 22. Hacker posts nudes on court's Web pages
- 23. Hacking Into Piracy
- 24. Revealing Intel's Secrets
- 25. Internet Boom Puts Home PCs At Risk Of Hackers
- 26. Computer hacker Mitnick pleads innocent
- 27. Hackers Destroy Evidence of Gulf War Chemical/Biological Weapons
- 28. Criminals Slip Through The Net
-
-
- [=-------------------------------------------------------------------------=]
-
- title: CIA attacked, pulls plug on Internet site
- author: unknown
- source: Reuter
-
- WASHINGTON (Reuter) - The Central Intelligence Agency, that bastion of
- spy technology and computer wizardry, pulled the plug on its World
- Wide Web site on the Internet Thursday after a hacker broke in and
- replaced it with a crude parody.
-
- CIA officials said their vandalized homepage -- altered to read
- "Welcome to the Central Stupidity Agency" -- was in no way linked to
- any mainframe computers containing classified national security
- information.
-
- [* Excuse me for a minute while my erection goes down. *]
-
- The site was tampered with Wednesday evening and the CIA closed it
- Thursday morning while a task force looked into the security breach,
- CIA spokeswoman Jane Heishman said. Part of the hacker's text read
- "Stop Lying."
-
- "It's definitely a hacker" who pierced the system's security, she
- said. "The agency has formed a task force to look into what happend
- and how to prevent it."
-
- [* No shit?! It was a hacker that did that? *]
-
- The CIA web site (http://www.odci.gov/cia) showcases unclassified
- information including spy agency press releases, officials' speeches,
- historical rundowns and the CIA's World Fact Book, a standard
- reference work.
-
- The cyber-attack matched one that forced the Justice Department to
- close its Web site last month after hackers inserted a swastika and
- picture of Adolph Hitler. The penetration of the CIA homepage
- highlighted the vulnerability of Internet sites designed to attract
- the public and drove home the need for multiple layers of security.
-
- "You want people to visit, you want them to interact, but you don't
- want them to leave anything behind," said Jon Englund of the
- Information Technology Association of America, a trade group of
- leading software and telecommunications firms.
-
- [=-------------------------------------------------------------------------=]
-
- From: Senator_Leahy@LEAHY.SENATE.GOV
- Date: Thu, 02 May 96 12:04:07 EST
-
- -----BEGIN PGP SIGNED MESSAGE-----
-
- LETTER FROM SENATOR PATRICK LEAHY (D-VT) ON ENCRYPTION
-
- May 2, 1996
-
- Dear Friends:
-
- Today, a bipartisan group of Senators has joined me in supporting
- legislation to encourage the development and use of strong,
- privacy-enhancing technologies for the Internet by rolling back
- the out-dated restrictions on the export of strong cryptography.
-
- In an effort to demonstrate one of the more practical uses of
- encryption technology (and so that you all know this message
- actually came from me), I have signed this message using a
- digital signature generated by the popular encryption program
- PGP. I am proud to be the first member of Congress to utilize
- encryption and digital signatures to post a message to the
- Internet.
-
- [* The first?! We're doomed!! *]
-
- As a fellow Internet user, I care deeply about protecting
- individual privacy and encouraging the development of the Net as
- a secure and trusted communications medium. I do not need to
- tell you that current export restrictions only allow American
- companies to export primarily weak encryption technology. The
- current strength of encryption the U.S. government will allow out
- of the country is so weak that, according to a January 1996 study
- conducted by world-renowned cryptographers, a pedestrian hacker
- can crack the codes in a matter of hours! A foreign intelligence
- agency can crack the current 40-bit codes in seconds.
-
- [* That should read "As a fellow Internet user ..who doesn't read
- his own mail... *]
-
- Perhaps more importantly, the increasing use of the Internet and
- similar interactive communications technologies by Americans to
- obtain critical medical services, to conduct business, to be
- entertained and communicate with their friends, raises special
- concerns about the privacy and confidentiality of those
- communications. I have long been concerned about these issues,
- and have worked over the past decade to protect privacy and
- security for our wire and electronic communications. Encryption
- technology provides an effective way to ensure that only the
- people we choose can read our communications.
-
- I have read horror stories sent to me over the Internet about how
- human rights groups in the Balkans have had their computers
- confiscated during raids by security police seeking to find out
- the identities of people who have complained about abuses.
- Thanks to PGP, the encrypted files were undecipherable by the
- police and the names of the people who entrusted their lives to
- the human rights groups were safe.
-
- The new bill, called the "Promotion of Commerce On-Line in the
- Digital Era (PRO-CODE) Act of 1996," would:
-
- o bar any government-mandated use of any particular
- encryption system, including key escrow systems and affirm
- the right of American citizens to use whatever form of
- encryption they choose domestically;
-
- [* Thank you for permission to do that.. even though it is legal already *]
-
- o loosen export restrictions on encryption products so
- that American companies are able to export any generally
- available or mass market encryption products without
- obtaining government approval; and
-
- [* Loosen? Why not abolish? *]
-
- o limit the authority of the federal government to set
- standards for encryption products used by businesses and
- individuals, particularly standards which result in products
- with limited key lengths and key escrow.
-
- This is the second encryption bill I have introduced with Senator
- Burns and other congressional colleagues this year. Both bills
- call for an overhaul of this country's export restrictions on
- encryption, and, if enacted, would quickly result in the
- widespread availability of strong, privacy protecting
- technologies. Both bills also prohibit a government-mandated key
- escrow encryption system. While PRO-CODE would limit the
- authority of the Commerce Department to set encryption standards
- for use by private individuals and businesses, the first bill we
- introduced, called the "Encrypted Communications Privacy Act",
- S.1587, would set up stringent procedures for law enforcement to
- follow to obtain decoding keys or decryption assistance to read
- the plaintext of encrypted communications obtained under court
- order or other lawful process.
-
- It is clear that the current policy towards encryption exports is
- hopelessly outdated, and fails to account for the real needs of
- individuals and businesses in the global marketplace. Encryption
- expert Matt Blaze, in a recent letter to me, noted that current
- U.S. regulations governing the use and export of encryption are
- having a "deleterious effect ... on our country's ability to
- develop a reliable and trustworthy information infrastructure."
- The time is right for Congress to take steps to put our national
- encryption policy on the right course.
-
- I am looking forward to hearing from you on this important issue.
- Throughout the course of the recent debate on the Communications
- Decency Act, the input from Internet users was very valuable to
- me and some of my Senate colleagues.
-
- You can find out more about the issue at my World Wide Web home
- page (http://www.leahy.senate.gov/) and at the Encryption Policy
- Resource Page (http://www.crypto.com/). Over the coming months, I
- look forward to the help of the Net community in convincing other
- Members of Congress and the Administration of the need to reform
- our nation's cryptography policy.
-
- Sincerely,
-
- Patrick Leahy
- United States Senator
-
- [=-------------------------------------------------------------------------=]
-
- title: JAVA BLACK WIDOWS - SUN DECLARES WAR
- author: unknown
- from: staff@hpp.com
-
-
- Sun Microsystems' has declared war on Black Widow Java
- applets on the Web. This is the message from Sun in response
- to an extensive Online Business Consultant (OBC/May 96)
- investigation into Java security.
-
- OBC's investigation and report was prompted after renowned
- academics, scientists and hackers announced Java applets
- downloaded from the WWW presented grave security risks for
- users. Java Black Widow applets are hostile, malicious traps set
- by cyberthugs out to snare surfing prey, using Java as their technology.
- OBC received a deluge of letters asking for facts after OBC
- announced a group of scientists from Princeton University, Drew
- Dean, Edward Felten and Dan Wallach, published a paper declaring
- "The Java system in its current form cannot easily be made secure."
- The paper can be retrieved at
- http://www.cs.princeton.edu/sip/pub/secure96.html.
-
- Further probing by OBC found that innocent surfers on the Web who
- download Java applets into Netscape's Navigator and Sun's
- HotJava browser, risk having "hostile" applets interfere with their
- computers (consuming RAM and CPU cycles). It was also discovered
- applets could connect to a third party on the Internet and, without the
- PC owner's knowledge, upload sensitive information from the user's
- computer. Even the most sophisticated firewalls can be penetrated . . .
- "because the attack is launched from behind the firewall," said the
- Princeton scientists.
-
- One reader said, "I had no idea that it was possible to stumble on
- Web sites that could launch an attack on a browser." Another said,
- "If this is allowed to get out of hand it will drive people away from the
- Web. Sun must allay fears."
-
- [* Faster connections if people are driven from the web.. hmm... :) *]
-
- The response to the Home Page Press hostile applet survey led to the
- analogy of Black Widow; that the Web was a dangerous place where
- "black widows" lurked to snare innocent surfers. As a result the
- Princeton group and OBC recommended users should "switch off"
- Java support in their Netscape Navigator browsers. OBC felt that Sun
- and Netscape had still to come clean on the security issues. But
- according to Netscape's Product Manager, Platform, Steve Thomas,
- "Netscape wishes to make it clear that all known security problems with
- the Navigator Java and JavaScript environment are fixed in Navigator
- version 2.02."
-
- However, to date, Netscape has not answered OBC's direct questions
- regarding a patch for its earlier versions of Navigator that supported
- Java . . . the equivalent of a product recall in the 3D world. Netscape
- admits that flaws in its browsers from version 2.00 upwards were
- related to the Java security problems, but these browsers are still in use
- and can be bought from stores such as CompUSA and Cosco. A floor
- manager at CompUSA, who asked not to be named, said "its news to
- him that we are selling defective software. The Navigator walks off our
- floor at $34 a pop."
-
- OBC advised Netscape the defective software was still selling at
- software outlets around the world and asked Netscape what action was
- going to be taken in this regard. Netscape has come under fire recently
- for its policy of not releasing patches to software defects; but rather
- forcing users to download new versions. Users report this task to be a
- huge waste of time and resources because each download consists of
- several Mbytes. As such defective Navigators don't get patched.
-
- OBC also interviewed Sun's JavaSoft security guru, Ms. Marianne Mueller,
- who said "we are taking security very seriously and working on it very
- hard." Mueller said the tenet that Java had to be re-written from scratch or
- scrapped "is an oversimplification of the challenge of running executable
- content safely on the web. Security is hard and subtle, and trying to build
- a secure "sandbox" [paradigm] for running untrusted downloaded applets
- on the web is hard."
-
- Ms. Mueller says Sun, together with their JavaSoft (Sun's Java division)
- partners, have proposed a "sandbox model" for security in which "we
- define a set of policies that restrict what applets can and cannot do---these
- are the boundaries of the sandbox. We implement boundary checks---when
- an applet tries to cross the boundary, we check whether or not it's allowed
- to. If it's allowed to, then the applet is allowed on its way. If not, the
- system throws a security exception.
-
- "The 'deciding whether or not to allow the boundary to be crossed' is the
- research area that I believe the Princeton people are working on," said
- Mueller. "One way to allow applets additional flexibility is if the applet
- is signed (for example, has a digital signature so that the identity of the
- applet's distributor can be verified via a Certificate Authority) then allow
- the applet more flexibility.
-
- "There are two approaches: One approach is to let the signed applet
- do anything. A second approach is to do something more complex and
- more subtle, and only allow the applet particular specified capabilities.
- Expressing and granting capabilities can be done in a variety of ways.
-
- "Denial of service is traditionally considered one of the hardest security
- problems, from a practical point of view. As [Java's creator] James
- Gosling says, it's hard to tell the difference between an MPEG
- decompressor and a hostile applet that consumes too many resources!
- But recognizing the difficulty of the problem is not the same as 'passing
- the buck.' We are working on ways to better monitor and control the
- use (or abuse) of resources by Java classes. We could try to enforce
- some resource limits, for example. These are things we are investigating.
-
- "In addition, we could put mechanisms in place so that user interface
- people (like people who do Web browsers) could add 'applet monitors'
- so that browser users could at least see what is running in their browser,
- and kill off stray applets. This kind of user interface friendliness (letting
- a user kill of an applet) is only useful if the applet hasn't already grabbed
- all the resources, of course."
-
- The experts don't believe that the problem of black widows and hostile
- applets is going to go away in a hurry. In fact it may get worse. The
- hackers believe that when Microsoft releases Internet Explorer 3.00 with
- support for Java, Visual Basic scripting and the added power of its
- ActiveX technology, the security problem will become worse.
-
- "There is opportunity for abuse, and it will become an enormous
- problem," said Stephen Cobb, Director of Special Projects for the
- National Computer Security Association (NCSA). "For example, OLE
- technology from Microsoft [ActiveX] has even deeper access to a
- computer than Java does."
-
- JavaSoft's security guru Mueller agreed on the abuse issue: "It's going
- to be a process of education for people to understand the difference
- between a rude applet, and a serious security bug, and a theoretical
- security bug, and an inconsequential security-related bug. In the case of
- hostile applets, people will learn about nasty/rude applet pages, and
- those pages won't be visited. I understand that new users of the Web
- often feel they don't know where they're going when they point and click,
- but people do get a good feel for how it works, pretty quickly, and I
- actually think most users of the Web can deal with the knowledge that
- not every page on the web is necessarily one they'd want to visit.
- Security on the web in some sense isn't all that different from security
- in ordinary life. At some level, common sense does come into play.
-
- "Many people feel that Java is a good tool for building more secure
- applications. I like to say that Java raises the bar for security on the
- Internet. We're trying to do something that is not necessarily easy, but
- that doesn't mean it isn't worth trying to do. In fact it may be worth
- trying to do because it isn't easy. People are interested in seeing the
- software industry evolve towards more robust software---that's the
- feedback I get from folks on the Net."
-
- # # #
-
- The report above may be reprinted with credit provided as follows:
-
- Home Page Press, Inc., http://www.hpp.com and Online Business ConsultantOE
- Please refer to the HPP Web site for additional information about Java and
- OBC.
-
- [=-------------------------------------------------------------------------=]
-
- title: Jacking in from the "Smoked Filled Room" Port
- author: "Brock N. Meeks" <brock@well.com>
- source: CyberWire Dispatch // September // Copyright (c) 1996 //
-
- Washington, DC -- Federal provisions funding the digital telephony bill
- and roving wiretaps, surgically removed earlier this year from an
- anti-terrorism bill, have quietly been wedged into a $600 billion
- omnibus spending bill.
-
- The bill creates a Justice Department "telecommunications carrier
- compliance fund" to pay for the provisions called for in the digital
- telephony bill, formally known as the Communications Assistance in Law
- Enforcement Act (CALEA). In reality, this is a slush fund.
-
- Congress originally budgeted $500 million for CALEA, far short of the
- billions actually needed to build in instant wiretap capabilities into
- America's telephone, cable, cellular and PCS networks. This bill now
- approves a slush fund of pooled dollars from the budgets of "any agency"
- with "law enforcement, national security or intelligence
- responsibilities." That means the FBI, CIA, NSA and DEA, among others,
- will now have a vested interest in how the majority of your
- communications are tapped.
-
- The spending bill also provides for "multipoint wiretaps." This is the
- tricked up code phase for what amounts to roving wiretaps. Where the
- FBI can only tap one phone at a time in conjunction with an
- investigation, it now wants the ability to "follow" a conversation from
- phone to phone; meaning that if your neighbor is under investigation and
- happens to use your phone for some reason, your phone gets tapped. It
- also means that the FBI can tap public pay phones... think about that
- next time you call 1-800-COLLECT.
-
- In addition, all the public and congressional accountability provisions
- for how CALEA money was spent, which were in the original House version
- (H.R. 3814), got torpedoed in the Senate Appropriations Committee.
-
- Provisions stripped out by the Senate:
-
- -- GONE: Money isn't to be spent unless an implementation plan is sent
- to each member of the Judiciary Committee and Appropriations committees.
-
- -- GONE: Requirement that the FBI provide public details of how its new
- wiretap plan exceeds or differs from current capabilities.
-
- -- GONE: Report on the "actual and maximum number of simultaneous
- surveillance/intercepts" the FBI expects. The FBI ran into a fire storm
- earlier this year when it botched its long overdue report that said it
- wanted the capability to tap one out of every 100 phones
- *simultaneously*. Now, thanks to this funding bill, rather than having
- to defend that request, it doesn't have to say shit.
-
- -- GONE: Complete estimate of the full costs of deploying and
- developing the digital wiretapping plan.
-
- -- GONE: An annual report to Congress "specifically detailing" how all
- taxpayer money -- YOUR money -- is spent to carry out these new wiretap
- provisions.
-
- "No matter what side you come down on this (digital wiretapping) issue,
- the stakes for democracy are that we need to have public accountability,"
- said Jerry Berman, executive director of the Center for Democracy and
- Technology.
-
- Although it appeared that no one in congress had the balls to take on
- the issue, one stalwart has stepped forward, Rep. Bob Barr (R-Ga.). He
- has succeeded in getting some of the accountability provisions back into
- the bill, according to a Barr staffer. But the fight couldn't have been
- an easy one. The FBI has worked congress relentlessly in an effort to
- skirt the original reporting and implementation requirements as outlined
- in CALEA. Further, Barr isn't exactly on the FBI's Christmas card list.
- Last year it was primarily Barr who scotched the funding for CALEA
- during the 104th Congress' first session.
-
- But Barr has won again. He has, with backing from the Senate, succeeded
- in *putting back* the requirement that the FBI must justify all CALEA
- expenditures to the Judiciary Committee. Further, the implementation
- plan, "though somewhat modified" will "still have some punch," Barr's
- staffer assured me. That includes making the FBI report on its
- expected capacities and capabilities for digital wiretapping. In other
- words, the FBI won't be able to "cook the books" on the wiretap figures
- in secret. Barr also was successful in making the Justice Department
- submit an annual report detailing its CALEA spending to Congress.
-
- However, the funding for digital wiretaps remains. Stuffing the funding
- measures into a huge omnibus spending bill almost certainly assures its
- passage. Congress is twitchy now, anxious to leave. They are chomping
- at the bit, sensing the end of the 104th Congress' tortured run as the
- legislative calender is due to run out sometime early next week. Then
- they will all literally race from Capitol Hill at the final gavel,
- heading for the parking lot, jumping in their cars like stock car
- drivers as they make a made dash for National Airport to return to their
- home districts in an effort to campaign for another term in the loopy
- world of national politics.
-
- Congress is "going to try to sneak this (spending bill) through the back
- door in the middle of the night," says Leslie Hagan, legislative
- director for the National Association of Criminal Defense Lawyers. She
- calls this a "worst case scenario" that is "particularly dangerous"
- because the "deliberative legislative process is short-ciricutied."
-
- Such matters as wiretapping deserve to be aired in the full sunlight of
- congressional hearings, not stuffed into an 11th hour spending bill.
- This is legislative cowardice. Sadly, it will most likely succeed.
-
- And through this all, the Net sits mute.
-
- Unlike a few months ago, on the shameful day the Net cried "wolf" over
- these same provisions, mindlessly flooding congressional switchboards
- and any Email box within keyboard reach, despite the fact that the
- funding provisions had been already been stripped from the
- anti-terrorism bill, there has been no hue-and-cry about these most
- recent moves.
-
- Yes, some groups, such as the ACLU, EPIC and the Center for Democracy
- and Technology have been working the congressional back channels,
- buzzing around the frenzied legislators like crazed gnats.
-
- But why haven't we heard about all this before now? Why has this bill
- come down to the wire without the now expected flurry of "alerts"
- "bulletins" and other assorted red-flag waving by our esteemed Net
- guardians? Barr's had his ass hanging in the wind, fighting FBI
- Director Louis "Teflon" Freeh; he could have used some political cover
- from the cyberspace community. Yet, if he'd gone to that digital well,
- he'd have found only the echo of his own voice.
-
- And while the efforts of Rep. Barr are encouraging, it's anything from a
- done deal. "As long as the door is cracked... there is room for
- mischief," said Barr's staffer. Meaning, until the bill is reported
- and voted on, some snapperhead congressman could fuck up the process yet
- again.
-
- We all caught a bit of a reprieve here, but I wouldn't sleep well. This
- community still has a lot to learn about the Washington boneyard.
- Personally, I'm a little tired of getting beat up at every turn. Muscle
- up, folks, the fight doesn't get any easier.
-
- Meeks out...
-
- Declan McCullagh <declan@well.com> contributed to this report.
-
- [=-------------------------------------------------------------------------=]
-
- title: Panix Attack
- author: Joshua Quittner
- source: Time Magazine - September 30, 1996 Volume 148, No. 16
-
- It was Friday night, and Alexis Rosen was about to leave work when one
- of his computers sent him a piece of E-mail. If this had been the
- movies, the message would have been presaged by something
- dramatic--the woo-ga sound of a submarine diving into combat, say. But
- of course it wasn't. This was a line of dry text automatically
- generated by one of the machines that guard his network. It said
- simply, "The mail servers are down." The alert told Rosen that his
- 6,000 clients were now unable to receive E-mail.
-
- Rosen, 30, is a cool customer, not the type to go into cardiac arrest
- when his mail server crashes. He is the co-founder of Panix, the
- oldest and best-known Internet service provider in Manhattan. Years
- before the Net became a cereal-box buzz word, Rosen would let people
- connect to Panix free, or for only a few dollars a month, just
- because--well, because that was the culture of the time. Rosen has
- handled plenty of mail outages, so on this occasion he simply rolled
- up his sleeves and set to work, fingers clacking out a flamenco on the
- keyboard, looking for the cause of the glitch. What he uncovered sent
- a chill down his spine--and has rippled across the Net ever since,
- like a rumor of doom. Someone, or something, was sending at the rate
- of 210 a second the one kind of message his computer was obliged to
- answer. As long as the siege continued--and it went on for
- weeks--Rosen had to work day and night to keep from being overwhelmed
- by a cascade of incoming garbage.
-
- It was the dread "syn flood," a relatively simple but utterly
- effective means for shutting down an Internet service provider--or,
- for that matter, anyone else on the Net. After Panix went public with
- its story two weeks ago, dozens of online services and companies
- acknowledged being hit by similar "denial of service" attacks. As of
- late last week, seven companies were still under furious assault.
-
- None of the victims have anything in common, leading investigators to
- suspect that the attacks may stem from the same source: a pair of
- how-to articles that appeared two months ago in 2600 and Phrack, two
- journals that cater to neophyte hackers. Phrack's article was written
- by a 23-year-old editor known as daemon9. He also crafted the code for
- an easy-to-run, menu-driven, syn-flood program, suitable for use by
- any "kewl dewd" with access to the Internet. "Someone had to do it,"
- wrote daemon9.
-
- [* WooWoo! Go Route! *]
-
- That gets to the core of what may be the Net's biggest problem these
- days: too many powerful software tools in the hands of people who
- aren't smart enough to build their own--or to use them wisely. Real
- hackers may be clever and prankish, but their first rule is to do no
- serious harm. Whoever is clobbering independent operators like Panix
- has as much to do with hacking as celebrity stalkers have to do with
- cinematography. Another of the victims was the Voters
- Telecommunications Watch, a nonprofit group that promotes free speech
- online. "Going after them was like going after the little old lady who
- helps people in the neighborhood and bashing her with a lead pipe,"
- says Rosen.
-
- [* Gee. Is that to say that if you can't write your own operating system
- that you shouldn't have it or that it is a big problem? If so, poor
- Microsoft... *]
-
- Rosen was eventually able to repulse the attack; now he'd like to
- confront his attacker. Since some of these Netwits don't seem to know
- enough to wipe off their digital fingerprints, he may get his wish.
-
- [* Wow, they did it for two weeks without getting caught. Two weeks of
- 24/7 abuse toward this ISP, and now he thinks he can track them down? *]
-
- [=-------------------------------------------------------------------------=]
-
- title: none
- author: Rory J. O'Connor
- source: Knight-Ridder Newspapers
-
- WASHINGTON -- Vandals swept through the Internet last weekend, wiping
- clean dozens of public bulletin boards used by groups of Jews, Muslims,
- feminists and homosexuals, among others.
-
- In one of the most widespread attacks on the international computer
- network, the programs automatically erased copies of more than 27,000
- messages from thousands of servers, before operators stopped the
- damage.
-
- The identity of those responsible for launching the apparent hate
- attacks -- some of the programs were titled "fagcancel" and "kikecancel"
- -- is unknown.
-
- The incident further illustrates the shaky security foundation of the
- Internet, which has mushroomed from academic research tool to
- international communications medium in just three years.
-
- And it raised the ire of many Internet users furious at the ease with
- which a user can erase someone else's words from worldwide discussion
- groups, known as Usenet newsgroups, in a matter of hours.
-
- "There's nothing you can do as an individual user to prevent someone
- from canceling your message," said John Gilmore, a computer security
- expert in San Francisco. "We need something added to Usenet's software
- that would only allow a cancellation from the originator."
-
- [* Which can then be forged just like fakemail... *]
-
- The incident follows closely three other well-publicized Internet
- attacks.
-
- In two cases, hackers altered the World Wide Web home pages of the
- Justice Department and the CIA, apparently as political protests. In
- the third, a hacker overloaded the computers of an Internet service
- provider called Panix with hordes of phony requests for a connection,
- thus denying use of the service to legitimate users.
-
- The latest attacks -- called cancelbots -- were launched sometime over
- the weekend from a variety of Internet service providers, including
- UUNet Technologies in Fairfax, Va., and Netcom Inc. in San Jose,
- Calif. One attack was launched from a tiny provider in Tulsa, Okla.,
- called Cottage Software, according to its owner, William Brunton.
-
- "The offending user has been terminated and the information has been
- turned over to the proper (federal) authorities," Brunton said in a
- telephone interview Wednesday. "It's now in their hands."
-
- Legal experts said it's unclear if the attacks constitute a crime
- under federal laws such as the Computer Fraud and Abuse Act.
-
- "It's really a difficult issue," said David Sobel, legal counsel of
- the Electronic Privacy Information Center in Washington. "Can you
- assign value to a newsgroup posting? Because most of the computer
- crime statutes assume you're ripping off something of value."
-
- [* Hello? Several statutes don't assume that at all. You can be
- charged with HAVING information and not using it. *]
-
- A spokesman for the FBI in Washington said he was unaware of any
- federal investigation of the incident, although it is the agency's
- policy not to comment on investigations.
-
- While some of the deleted messages have been restored on certain
- servers, where operators have retrieved them from backup copies of
- their disks, users of other servers where the messages haven't been
- restored will never be able to read them.
-
- The fact that a user can stamp out the words of someone else is an
- artifact of the original design of the Internet, begun as a Department
- of Defense project in 1969.
-
- The Internet consists of tens of thousands of computers, called
- servers, that act as repositories for public messages, private
- electronic mail and World Wide Web home pages. Servers throughout the
- world are interconnected through telephone lines so they can exchange
- information and route messages to the individual users, or clients, of
- a given server.
-
- Each server stores a copy of the constantly changing contents of
- newsgroups, which function as giant electronic bulletin boards
- dedicated to particular subjects. There are thousands of them,
- covering everything from particle physics to soap operas.
-
- Any Internet user is free to post a contribution to nearly any
- newsgroup, and the posting is rapidly copied from one server to
- another, so the contents of a newsgroup are identical on every server.
-
- Almost the only form of control over postings, including their
- content, is voluntary adherence to informal behavior rules known as
- "netiquette."
-
- The idea of cancelbots originated when the Internet and its newsgroups
- were almost exclusively the domain of university and government
- scientists and researchers. Their purpose was to allow individuals to
- rescind messages they later discovered to contain an error. The action
- took the form of an automatic program, itself in the form of a
- message, because it would be impossible for an individual to find and
- delete every copy of the posting on every Internet server.
-
- But the Usenet software running on servers doesn't verify that the
- cancel message actually comes from the person who created the original
- posting. All a malicious user need do is replace their actual e-mail
- address with that of someone else to fool Usenet into deleting a
- message. That counterfeiting is as simple as changing an option in the
- browser software most people use to connect to the Internet.
-
- "It's pretty easy. There's no authentication in the Usenet. So anybody
- can pretend to be anybody else," Gilmore said.
-
- It takes only slightly more sophistication to create a program that
- searches newsgroups for certain keywords, and then issues a cancelbot
- for any message that contains them. That is how the weekend attack
- took place.
-
- The use of counterfeit cancelbots is not new. The Church of
- Scientology, embroiled in a legal dispute with former members, last
- year launched cancelbots against the newsgroup postings of the
- members. Attorneys for the church claimed the postings violated
- copyright laws, because they contained the text of Scientology
- teachings normally available only to longtime members who have paid
- thousands of dollars.
-
- Net users have also turned false cancelbots against those who violate
- a basic rule of netiquette by "spamming" newsgroups -- that is,
- posting a message to hundreds or even thousands of newsgroups, usually
- commercial in nature and unrelated to the newsgroup topic.
-
- "This technology has been used for both good and evil," Gilmore said.
-
- But an individual launching a wholesale cancelbot attack on postings
- because of content is considered a serious violation of netiquette --
- although one about which there is little recourse at the moment.
-
- "For everybody who takes the trouble and time to participate on the
- Internet in some way, I think it is not acceptable for somebody else
- to undo those efforts," Sobel said. "But what are the alternatives?
- Not to pursue this means of communications? Unintended uses and
- malicious uses seem to be inevitable."
-
- What's needed, some say, is a fundamental change in the Internet that
- forces individual users to "sign" their postings in such a way that
- everyone has a unique identity that can't be forged.
-
- [* And how about for the technically challenged who can't figure
- out the point-and-drool America Online software? *]
-
- "The fatal flaw is that newsgroups were set up at a time when
- everybody knew everybody using the system, and you could weed out
- anybody who did this," Brunton said. "This points out that flaw in the
- system, and that there are unreasonable people out there who will
- exploit it."
-
- [=-------------------------------------------------------------------------=]
-
- title: Mitnick Faces 25 More Federal Counts of Computer Hacking
- source: nando.net - Los Angeles Daily News
-
- LOS ANGELES (Sep 27, 1996 02:06 a.m. EDT) -- A computer hacker who
- used his digital prowess to outrun FBI agents for three years has been
- indicted on charges that he stole millions of dollars in software
- through the Internet.
-
- The 25-count federal indictment against Kevin Mitnick is the biggest
- development in the sensational case since the self-taught computer
- whiz was arrested in February 1995 in North Carolina.
-
- The 33-year-old son of a waitress from suburban Los Angeles has been
- held in custody in Los Angeles ever since.
-
- With Thursday's indictment, federal prosecutors made good on their vow
- to hold Mitnick accountable for what they say was a string of hacking
- crimes that pushed him to the top of the FBI's most-wanted list.
-
- "These are incredibly substantial charges. They involve conducts
- spanning two and a half years. They involve a systematic scheme to
- steal proprietary software from a range of victims," Assistant U.S.
- Attorney David Schindler said in an interview.
-
- Mitnick's longtime friend, Lewis De Payne, 36, also was indicted
- Thursday on charges that he helped steal the software between June
- 1992 and February 1995 -- while Mitnick was on the run from the FBI.
-
- "I would say it is an absurd fiction," said De Payne's attorney,
- Richard Sherman. "I don't think the government is going to be able to
- prove its case."
-
- De Payne will surrender today to authorities in Los Angeles, Sherman
- said.
-
- Friends and relatives of Mitnick have defended his hacking, saying he
- did it for the intellectual challenge and to pull pranks -- but never
- for profit.
-
- Los Angeles' top federal prosecutor sees it differently.
-
- "Computer and Internet crime represents a major threat, with
- sophisticated criminals able to wreak havoc around the world," U.S.
- Attorney Nora M. Manella said in a written statement.
-
- The indictment charges Mitnick and De Payne with having impersonated
- officials from companies and using "hacking" programs to enter company
- computers. Schindler said the software involved the operation of
- cellular telephones and computer operating systems.
-
- Their alleged victims include the University of Southern California,
- Novell, Sun Microsystems and Motorola, Schindler said.
-
- [=-------------------------------------------------------------------------=]
-
- title: Hacker is freed but he's banned from computers
- author: Brandon Bailey (Mercury News Staff Writer)
-
- Convicted hacker Kevin Poulsen is out of prison after five years, but
- he still can't touch a computer.
-
- Facing a court order to pay more than $57,000 in restitution for
- rigging a series of radio station call-in contests, Poulsen has
- complained that authorities won't let him use his only marketable
- skill -- programming.
-
- Instead, Poulsen said, he's doomed to work for minimum wage at a
- low-tech job for the next three years. Since his June release from
- prison -- after serving more time behind bars than any other
- U.S. hacker -- the only work he's found is canvassing door to door for
- a liberal political action group.
-
- It's a big change for the 30-year-old Poulsen, once among the most
- notorious hackers on the West Coast. A former employee at SRI
- International in Menlo Park, he was featured on television's
- "America's Most Wanted" while living underground in Los Angeles as a
- federal fugitive from 1989 to 1991.
-
- Before authorities caught him, Poulsen burglarized telephone company
- offices, electronically snooped through records of law enforcement
- wiretaps and jammed radio station phone lines in a scheme to win cash,
- sports cars and a trip to Hawaii.
-
- Poulsen now lives with his sister in the Los Angeles area, where he
- grew up in the 1970s and '80s. But he must remain under official
- supervision for three more years. And it galls him that authorities
- won't trust him with a keyboard or a mouse.
-
- U.S. District Judge Manuel Real has forbidden Poulsen to have any
- access to a computer without his probation officer's approval.
-
- That's a crippling restriction in a society so reliant on computer
- technology, Poulsen complained in a telephone interview after a
- hearing last week in which the judge denied Poulsen's request to
- modify his terms of probation.
-
- To comply with those rules, Poulsen said, his parents had to put their
- home computer in storage when he stayed with them. He can't use an
- electronic card catalog at the public library. And he relies on
- friends to maintain his World Wide Web site. He even asked his
- probation officer whether it was OK to drive because most cars contain
- microchips.
-
- Living under government supervision apparently hasn't dampened the
- acerbic wit Poulsen displayed over the years.
-
- Prankster humor
-
- When authorities were tracking him, they found he'd kept photographs
- of himself, taken while burglarizing phone company offices, and that
- he'd created bogus identities in the names of favorite comic book
- characters.
-
- Today, you can click on Poulsen's web page (http://www.catalog.com/kevin)
- and read his account of his troubles with the law. Until it was
- revised Friday, you could click on the highlighted words "my probation
- officer" -- and see the scary red face of Satan.
-
- But though he's still chafing at authority, Poulsen insists he's ready
- to be a law-abiding citizen.
-
- "The important thing to me," he said, "is just not wasting the next
- three years of my life." He said he's submitted nearly 70 job
- applications but has found work only with the political group, which
- he declined to identify.
-
- Poulsen, who earned his high school diploma behind bars, said he wants
- to get a college degree. But authorities vetoed his plans to study
- computer science while working part-time because they want him to put
- first priority on earning money for restitution.
-
- Poulsen's federal probation officer, Marc Stein, said office policy
- prevents him from commenting on the case. Poulsen's court-appointed
- attorney, Michael Brennan, also declined comment.
-
- Differing view
-
- But Assistant U.S. Attorney David Schindler partly disputed Poulsen's
- account.
-
- "Nobody wants to see Mr. Poulsen fail," said Schindler, who has
- prosecuted both Poulsen and Kevin Mitnick, another young man from the
- San Fernando Valley whose interest in computers and telephones became
- a passion that led to federal charges.
-
- Schindler said Stein is simply being prudent: "It would be irresponsible
- for the probation office to permit him to have unfettered access to
- computers."
-
- Legal experts say there's precedent for restricting a hacker's access
- to computers, just as paroled felons may be ordered not to possess
- burglary tools or firearms. Still, some say it's going too far.
-
- "There are so many benign things one can do with a computer," said
- Charles Marson, a former attorney for the American Civil Liberties
- Union who handles high-tech cases in private practice. "If it were a
- typewriter and he pulled some scam with it or wrote a threatening
- note, would you condition his probation on not using a typewriter?"
-
- But Carey Heckman, co-director of the Law and Technology Policy Center
- at Stanford University, suggested another analogy: "Would you want to
- put an arsonist to work in a match factory?"
-
- Friends defend Poulsen.
-
- Over the years, Poulsen's friends and defense lawyers have argued that
- prosecutors exaggerated the threat he posed, either because law
- officers didn't understand the technology he was using or because his
- actions seemed to flaunt authority.
-
- Hacking is "sort of a youthful rebellion thing," Poulsen says
- now. "I'm far too old to get back into that stuff."
-
- But others who've followed Poulsen's career note that he had earlier
- chances to reform.
-
- He was first busted for hacking into university and government
- computers as a teen-ager. While an older accomplice went to jail,
- Poulsen was offered a job working with computers at SRI, the private
- think tank that does consulting for the Defense Department and other
- clients.
-
- There, Poulsen embarked on a double life: A legitimate programmer by
- day, he began breaking into Pacific Bell offices and hacking into
- phone company computers at night.
-
- When he learned FBI agents were on his trail, he used his skills to
- track their moves.
-
- Before going underground in 1989, he also obtained records of secret
- wiretaps from unrelated investigations. Though Poulsen said he never
- tipped off the targets, authorities said they had to take steps to
- ensure those cases weren't compromised.
-
- According to Schindler, the probation office will consider Poulsen's
- requests to use computers "on a case-by-case basis."
-
- [=-------------------------------------------------------------------------=]
-
- [* Blurb on Bernie's release follows this article. *]
-
- title: Computer Hacker Severely Beaten after Criticizing Prison Conditions
- Target of Campaign by U.S. Secret Service
-
- A convicted hacker, in prison for nothing more than possession of
- electronic parts easily obtainable at any Radio Shack, has been
- savagely beaten after being transferred to a maximum security prison
- as punishment for speaking out publicly about prison conditions.
- Ed Cummings, recently published in Wired and Internet Underground, as
- well as a correspondent for WBAI-FM in New York and 2600 Magazine,
- has been the focus of an increasingly ugly campaign of harrassment
- and terror from the authorities. At the time of this writing, Cummings
- is locked in the infectious diseases ward at Lehigh County prison in
- Allentown, Pennsylvania, unable to obtain the proper medical treatment
- for the severe injuries he has suffered.
-
- The Ed Cummings case has been widely publicized in the computer hacker
- community over the past 18 months. In March of 1995, in what can only
- be described as a bizarre application of justice, Cummings (whose pen
- name is "Bernie S.") was targetted and imprisoned by the United States
- Secret Service for mere possession of technology that could be used to
- make free phone calls. Although the prosecution agreed there was no
- unauthorized access, no victims, no fraud, and no costs associated with
- the case, Cummings was imprisoned under a little known attachment to the
- Digital Telephony bill allowing individuals to be charged in this fashion.
- Cummings was portrayed by the Secret Service as a potential terrorist
- because of some of the books found in his library.
-
- A year and a half later, Cummings is still in prison, despite the
- fact that he became eligible for parole three months ago. But things have
- now taken a sudden violent turn for the worse. As apparent retribution for
- Cummings' continued outspokenness against the daily harrassment and
- numerous injustices that he has faced, he was transferred on Friday
- to Lehigh County Prison, a dangerous maximum security facility. Being
- placed in this facility was in direct opposition to his sentencing
- order. The reason given by the prison: "protective custody".
-
- A day later, Cummings was nearly killed by a dangerous inmate for not
- getting off the phone fast enough. By the time the prison guards stopped
- the attack, Cummings had been kicked in the face so many times that he
- lost his front teeth and had his jaw shattered. His arm, which he tried
- to use to shield his face, was also severely injured. It is expected that
- his mouth will be wired shut for up to three months. Effectively,
- Cummings has now been silenced at last.
-
- >From the start of this ordeal, Cummings has always maintained his
- composure and confidence that one day the injustice of his
- imprisonment will be realized. He was a weekly contributor to a
- radio talk show in New York where he not only updated listeners on
- his experiences, but answered their questions about technology.
- People from as far away as Bosnia and China wrote to him, having
- heard about his story over the Internet.
-
- Now we are left to piece these events together and to find those
- responsible for what are now criminal actions against him. We are
- demanding answers to these questions: Why was Cummings transferred
- for no apparent reason from a minimum security facility to a very
- dangerous prison? Why has he been removed from the hospital immediately
- after surgery and placed in the infectious diseases ward of the very
- same prison, receiving barely any desperately needed medical
- attention? Why was virtually every moment of Cummings' prison stay a
- continuous episode of harrassment, where he was severely punished for
- such crimes as receiving a fax (without his knowledge) or having too
- much reading material? Why did the Secret Service do everything in
- their power to ruin Ed Cummings' life?
-
- Had these events occurred elsewhere in the world, we would be quick
- to condemn them as barbaric and obscene. The fact that such things are
- taking place in our own back yards should not blind us to the fact that
- they are just as unacceptable.
-
- Lehigh County Prison will be the site of several protest actions as will
- the Philadelphia office of the United States Secret Service. For more
- information on this, email protest@2600.com or call our office at
- (516) 751-2600.
-
- 9/4/96
-
- [=-------------------------------------------------------------------------=]
-
- title: Bernie S. Released!
-
- As of Friday, September 13th, Bernie S. was released from prison on
- an unprecedented furlough. He will have to report to probation and
- he still has major medical problems as a result of his extended tour
- of the Pennsylvania prison system. But the important thing is that
- he is out and that this horrible ordeal has finally begun to end.
-
- We thank all of you who took an interest in this case. We believe
- it was your support and the pressure you put on the authorities that
- finally made things change. Thanks again and never forget the power
- you have.
-
- emmanuel@2600.com
- www.2600.com
-
- [=-------------------------------------------------------------------------=]
-
- title: <The Squidge Busted>
-
- ENGLAND:
-
- The Squidge was arrested at his home yesterday under the Computer Misuse
- Act. A long standing member of the US group the *Guild, Squidge was silent
- today after being released but it appears no formal charges will be made
- until further interviews have taken place.
-
- Included in the arrest were the confiscation of his computer equipment
- including two Linux boxes and a Sun Sparc. A number of items described as
- 'telecommunications devices' were also seized as evidence.
-
- Following the rumours of ColdFire's recent re-arrest for cellular fraud
- this could mean a new crackdown on hacking and phreaking by the UK
- authorities. If this is true, it could spell the end for a particularly
- open period in h/p history when notable figures have been willing to
- appear more in public.
-
- We will attempt to release more information as it becomes available.
-
- (not posted by Squidge)
-
- --
- Brought to you by The NeXus.....
-
- [* Good luck goes out to Squidge.. we are hoping for the best. *]
-
- [=-------------------------------------------------------------------------=]
-
- title: School Hires Student to Hack Into Computers
- source: The Sun Herald - 22 August 1996
-
- Palisades Park, NJ - When in trouble, call an expert.
-
- Students at Palisades Park's high school needed their
- transcripts to send off to colleges. But they were in the computer
- and no one who knew the password could be reached. So the school
- hired a 16-year-old hacker to break in.
-
- "They found this student who apparently was a whiz, and,
- apparently, was able to go in and unlock the password," School Board
- attorney Joseph R. Mariniello said.
-
- Superintendent George Fasciano was forced to explain to the
- School Board on Monday the $875 bill for the services of Matthew
- Fielder.
-
- [* He should have charged more :) *]
-
- [=-------------------------------------------------------------------------=]
-
- title: Paranoia and Brit Hackers Fuel Infowar Craze in Spy Agencies
- author: unknown
- source: Crypt Newsletter 38
-
- Electronic doom will soon be visited on U.S. computer networks by
- information warriors, hackers, pannational groups of computer-wielding
- religious extremists, possible agents of Libya and Iran, international
- thugs and money-mad Internet savvy thieves.
-
- John Deutch, director of Central Intelligence, testified to the
- truth of the matter, so it must be graven in stone. In a long statement
- composed in the august tone of the Cold Warrior, Deutch said to the
- Senate Permanent Subcommittee on Investigations on June 25, "My greatest
- concern is that hackers, terrorist organizations, or other nations might
- use information warfare techniques" to disrupt the national
- infrastructure.
-
- "Virtually any 'bad actor' can acquire the hardware and software
- needed to attack some of our critical information-based infrastructures.
- Hacker tools are readily available on the Internet, and hackers
- themselves are a source of expertise for any nation or foreign
- terrorist organization that is interested in developing an information
- warfare capability. In fact, hackers, with or without their full
- knowledge, may be supplying advice and expertise to rogue states such
- as Iran and Libya."
-
- In one sentence, the head of the CIA cast hackers -- from those more
- expert than Kevin Mitnick to AOLHell-wielding idiots calling an America
- On-Line overseas account -- as pawns of perennial international bogeymen,
- Libya and Iran.
-
- Scrutiny of the evidence that led to this conclusion was not possible
- since it was classified, according to Deutch.
-
- " . . . we have [classified] evidence that a number of countries
- around the world are developing the doctrine, strategies, and tools
- to conduct information attacks," said Deutch.
-
- Catching glimpses of shadowy enemies at every turn, Deutch
- characterized them as operating from the deep cover of classified
- programs in pariah states. Truck bombs aimed at the telephone
- company, electronic assaults by "paid hackers" are likely to
- be part of the arsenal of anyone from the Lebanese Hezbollah
- to "nameless . . . cells of international terrorists such as those
- who attacked the World Trade Center."
-
- Quite interestingly, a Minority Staff Report entitled "Security and
- Cyberspace" and presented to the subcommittee around the same time as
- Deutch's statement, presented a different picture. In its attempt to
- raise the alarm over hacker assaults on the U.S., it inadvertently
- portrayed the intelligence community responsible for appraising the
- threat as hidebound stumblebums, Cold Warriors resistant to change and
- ignorant or indifferent to the technology of computer networks and their
- misuse.
-
- Written by Congressional staff investigators Dan Gelber and Jim Christy,
- the report quotes an unnamed member of the intelligence community likening
- threat assessment in the area to "a toddler soccer game, where everyone
- just runs around trying to kick the ball somewhere." Further, assessment
- of the threat posed by information warriors was "not presently a priority
- of our nation's intelligence and enforcement communities."
-
- The report becomes more comical with briefings from intelligence
- agencies said to be claiming that the threat of hackers and information
- warfare is "substantial" but completely unable to provide a concrete
- assessment of the threat because few or no personnel were working on
- the subject under investigation. "One agency assembled [ten] individuals
- for the Staff briefing, but ultimately admitted that only one person was
- actually working 'full time' on intelligence collection and threat
- analysis," write Gelber and Christy.
-
- The CIA is one example.
-
- "Central Intelligence Agency . . . staffs an 'Information Warfare
- Center'; however, at the time of [the] briefing, barely a handful
- of persons were dedicated to collection and on [sic] defensive
- information warfare," comment the authors.
-
- " . . . at no time was any agency able to present a national threat
- assessment of the risk posed to our information infrastructure," they
- continue. Briefings on the subject, if any and at any level of
- classification, "consisted of extremely limited anecdotal information."
-
- Oh no, John, say it ain't so!
-
- The minority report continues to paint a picture of intelligence agencies
- that have glommed onto the magic words "information warfare" and
- "hackers" as mystical totems, grafting the subjects onto "pre-existing"
- offices or new "working groups." However, the operations are based only
- on labels. "Very little prioritization" has been done, there are
- few analysts working on the subjects in question.
-
- Another "very senior intelligence officer for science and technology"
- is quoted claiming "it will probably take the intelligence community
- years to break the traditional paradigms, and re-focus resources"
- in the area.
-
- Restated, intelligence director Deutch pronounced in June there was
- classified evidence that hackers are in league with Libya and Iran and
- that countries around the world are plotting plots to attack the U.S.
- through information warfare. But the classified data is and was, at best,
- anecdotal gossip -- hearsay, bullshit -- assembled by perhaps a handful of
- individuals working haphazardly inside the labyrinth of the intelligence
- community. There is no real threat assessment to back up the Deutch
- claims. Can anyone say _bomber gap_?
-
- The lack of solid evidence for any of the claims made by the intelligence
- community has created an unusual stage on which two British hackers,
- Datastream Cowboy and Kuji, were made the dog and pony in a ridiculous
- show to demonstrate the threat of information warfare to members of
- Congress. Because of a break-in at an Air Force facility in Rome, NY,
- in 1994, booth hackers were made the stars of two Government Accounting
- Office reports on network intrusions in the Department of Defense earlier
- this year. The comings and goings of Datastream Cowboy also constitute the
- meat of Gelber and Christy's minority staff report from the Subcommittee on
- Investigations.
-
- Before delving into it in detail, it's interesting to read what a
- British newspaper published about Datastream Cowboy, a sixteen year-old,
- about a year before he was made the poster boy for information
- warfare and international hacking conspiracies in front of Congress.
-
- In a brief article, blessedly so in contrast to the reams of propaganda
- published on the incident for Congress, the July 5 1995 edition of The
- Independent wrote, "[Datastream Cowboy] appeared before Bow Street
- magistrates yesterday charged with unlawfully gaining access to a series
- of American defense computers. Richard Pryce, who was 16 at the time of
- the alleged offences, is accused of accessing key US Air Force systems
- and a network owned by Lockheed, the missile and aircraft manufacturers."
-
- Pryce, a resident of a northwest suburb of London did not enter a plea
- on any of 12 charges levied against him under the British
- Computer Misuse Act. He was arrested on May 12, 1994, by New Scotland
- Yard as a result of work by the U.S. Air Force Office of Special
- Investigations. The Times of London reported when police came for
- Pryce, they found him at his PC on the third floor of his family's house.
- Knowing he was about to be arrested, he "curled up on the floor and cried."
-
- In Gelber and Christy's staff report, the tracking of Pryce, and to a
- lesser extent a collaborator called Kuji -- real name Mathew Bevan, is
- retold as an eight page appendix entitled "The Case Study: Rome
- Laboratory, Griffiss Air Force Base, NY Intrusion."
-
- Pryce's entry into Air Force computers was noticed on March 28, 1994,
- when personnel discovered a sniffer program he had installed on one
- of the Air Force systems in Rome. The Defense Information System
- Agency (DISA) was notified. DISA subsequently called the Air
- Force Office of Special Investigations (AFOSI) at the Air Force
- Information Warfare Center in San Antonio, Texas. AFOSI then
- sent a team to Rome to appraise the break-in, secure the system and
- trace those responsible. During the process, the AFOSI team discovered
- Datastream Cowboy had entered the Rome Air Force computers for the
- first time on March 25, according to the report. Passwords had been
- compromised, electronic mail read and deleted and unclassified
- "battlefield simulation" data copied off the facility. The
- Rome network was also used as a staging area for penetration of other
- systems on the Internet.
-
- AFOSI investigators initially traced the break-in back one step to
- the New York City provider, Mindvox. According to the Congressional
- report, this put the NYC provider under suspicion because "newspaper
- articles" said Mindvox's computer security was furnished by two "former
- Legion of Doom members." "The Legion of Doom is a loose-knit computer
- hacker group which had several members convicted for intrusions into
- corporate telephone switches in 1990 and 1991," wrote Gelber and Christy.
-
- AFOSI then got permission to begin monitoring -- the equivalent of
- wiretapping -- all communications on the Air Force network. Limited
- observation of other Internet providers being used during the break-in
- was conducted from the Rome facilities. Monitoring told the investigators
- the handles of hackers involved in the Rome break-in were Datastream
- Cowboy and Kuji.
-
- Since the monitoring was of limited value in determining the whereabouts
- of Datastream Cowboy and Kuji, AFOSI resorted to "their human intelligence
- network of informants, i.e., stool pigeons, that 'surf the Internet.'
- Gossip from one AFOSI 'Net stoolie uncovered that Datastream Cowboy was from
- Britain. The anonymous source said he had e-mail correspondence with
- Datastream Cowboy in which the hacker said he was a 16-year old living in
- England who enjoyed penetrating ".MIL" systems. Datastream Cowboy also
- apparently ran a bulletin board system and gave the telephone number to the
- AFOSI source.
-
- The Air Force team contacted New Scotland Yard and the British law
- enforcement agency identified the residence, the home of Richard
- Pryce, which corresponded to Datastream Cowboy's system phone number.
- English authorities began observing Pryce's phone calls and noticed
- he was making fraudulent use of British Telecom. In addition,
- whenever intrusions at the Air Force network in Rome occurred, Pryce's
- number was seen to be making illegal calls out of Britain.
-
- Pryce travelled everywhere on the Internet, going through South America,
- multiple countries in Europe and Mexico, occasionally entering the Rome
- network. From Air Force computers, he would enter systems at Jet
- Propulsion Laboratory in Pasadena, California, and the Goddard Space
- Flight Center in Greenbelt, Maryland. Since Pryce was capturing the logins
- and passwords of the Air Force networks in Rome, he was then able to
- get into the home systems of Rome network users, defense contractors
- like Lockheed.
-
- By mid-April of 1994 the Air Force was monitoring other systems being
- used by the British hackers. On the 14th of the month, Kuji logged on
- to the Goddard Space Center from a system in Latvia and copied data
- from it to the Baltic country. According to Gelber's report, the
- AFOSI investigators assumed the worst, that it was a sign that someone
- in an eastern European country was making a grab for sensitive
- information. They broke the connection but not before Kuji had
- copied files off the Goddard system. As it turned out, the Latvian
- computer was just another system the British hackers were using as
- a stepping stone; Pryce had also used it to cover his tracks when
- penetrating networks at Wright-Patterson Air Force Base in Ohio, via
- an intermediate system in Seattle, cyberspace.com.
-
- The next day, Kuji was again observed trying to probe various
- systems at NATO in Brussels and The Hague as well as Wright-Patterson.
- On the 19th, Pryce successfully returned to NATO systems in The
- Hague through Mindvox. The point Gelber and Christy seem to be trying
- to make is that Kuji, a 21-year old, was coaching Pryce during some
- of his attacks on various systems.
-
- By this point, New Scotland Yard had a search warrant for Pryce
- with the plan being to swoop down on him the next time he accessed
- the Air Force network in Rome.
-
- In April, Pryce penetrated a system on the Korean peninsula and copied
- material off a facility called the Korean Atomic Research Institute
- to an Air Force computer in Rome. At the time, the investigators had
- no idea whether the system was in North or South Korea. The impression
- created is one of hysteria and confusion at Rome. There was fear that the
- system, if in North Korea, would trigger an international incident, with
- the hack interpreted as an "aggressive act of war." The system turned
- out to be in South Korea.
-
- During the Korean break-in, New Scotland Yard could have intervened and
- arrested Pryce. However, for unknown reasons, the agency did not. Those
- with good memories may recall mainstream news reports concerning Pryce's
- hack, which was cast as an entry into sensitive North Korean networks.
-
- It's worth noting that while the story was portrayed as the work of
- an anonymous hacker, both the U.S. government and New Scotland Yard knew
- who the perpetrator was. Further, according to Gelber's report English
- authorities already had a search warrant for Pryce's house.
-
- Finally, on May 12 British authorities pounced. Pryce was arrested
- and his residence searched. He crumbled, according to the Times of
- London, and began to cry. Gelber and Christy write that Pryce promptly
- admitted to the Air Force break-ins as well as others. Pryce
- confessed he had copied a large program that used artificial intelligence
- to construct theoretical Air Orders of Battle from an Air Force computer
- to Mindvox and left it there because of its great size, 3-4 megabytes.
- Pryce paid for his Internet service with a fraudulent credit card number.
- At the time, the investigators were unable to find out the name and
- whereabouts of Kuji. A lead to an Australian underground bulletin board
- system failed to pan out.
-
- On June 23 of this year, Reuters reported that Kuji -- 21-year-old Mathew
- Bevan -- a computer technician, had been arrested and charged in
- connection with the 1994 Air Force break-ins in Rome.
-
- Rocker Tom Petty sang that even the losers get lucky some time. He
- wasn't thinking of British computer hackers but no better words could be
- used to describe the two Englishmen and a two year old chain of events that
- led to fame as international computer terrorists in front of Congress
- at the beginning of the summer of 1996.
-
- Lacking much evidence for the case of conspiratorial computer-waged
- campaigns of terror and chaos against the U.S., the makers of Congressional
- reports resorted to telling the same story over and over, three
- times in the space of the hearings on the subject. One envisions U.S.
- Congressmen too stupid or apathetic to complain, "Hey, didn't we get that
- yesterday, and the day before?" Pryce and Bevan appeared in "Security in
- Cyberspace" and twice in Government Accounting Office reports AIMD-96-84
- and T-AIMD96-92. Jim Christy, the co-author of "Security in Cyberspace"
- and the Air Force Office of Special Investigations' source for the Pryce
- case supplied the same tale for Jack Brock, author of the GAO reports.
- Brock writes, ". . . Air Force officials told us that at least one of
- the hackers may have been working for a foreign country interested in
- obtaining military research data or areas in which the Air Force was
- conducting advanced research." It was, apparently, more wishful
- thinking.
-
-
- Notes:
-
- The FAS Web site also features an easy to use search engine which can
- be used to pull up the Congressional testimony on hackers and
- network intrusion. These example key words are effective: "Jim
- Christy," "Datastream Cowboy".
-
- [=-------------------------------------------------------------------------=]
-
- title: Hackers Find Cheap Scotland Yard Phone Connection
- source: Reuters/Variety
-
- Monday August 5 12:01 AM EDT
-
- LONDON (Reuter) - Computer hackers broke into a security system at
- Scotland Yard, London's metropolitan police headquarters, to make
- international calls at police expense, police said Sunday.
-
- A police spokesman would not confirm a report in the Times newspaper
- that the calls totaled one million pounds ($1.5 million). He said
- the main computer network remained secure.
-
- "There is no question of any police information being accessed," the
- spokesman said. "This was an incident which was investigated by our
- fraud squad and by AT&T investigators in the U.S."
-
- AT&T Corp investigators were involved because most of the calls were
- to the United States, the Times said.
-
- According to The Times, the hackers made use of a system called PBX
- call forwarding that lets employees to make business calls from home
- at their employer's expense.
-
- [=-------------------------------------------------------------------------=]
-
- title: U.S. Official Warns OF "Electronic Pearl Harbor"
- source: BNA Daily Report - 17 Jul 96
-
- Deputy U.S. Attorney General Jamie Gorelick told a Senate
- subcommittee last week that the possibility of "an electronic Pearl
- Harbor" is a very real danger for the U.S. She noted in her
- testimony that the U.S. information infrastructure is a hybrid
- public/private network, and warned that electronic attacks "can
- disable or disrupt the provision of services just as readily as --
- if not more than -- a well-placed bomb." On July 15 the Clinton
- Administration called for a President's Commission on Critical
- Infrastructure Protection, with the mandate to identify the nature
- of threats to U.S. infrastructure, both electronic and physical, and
- to work with the private sector in devising a strategy for
- protecting this infrastructure. At an earlier hearing, subcommittee
- members were told that about 250,000 intrusions into Defense
- Department computer systems are attempted each year, with about a
- 65% success rate.
-
- [=-------------------------------------------------------------------------=]
-
- title: Suit Challenges State's Restraint of the Internet Via AP
- author: Jared Sandberg
- source: The Wall Street Journal
-
- Can the state of Georgia hold sway over the global Internet?
-
- A federal lawsuit filed against the state Tuesday by the American
- Civil Liberties Union should eventually answer that question. The
- suit, filed in federal district court in Georgia, challenges a new
- Georgia law that makes it illegal in some instances to communicate
- anonymously on the Internet and to use trademarks and logos without
- permission.
-
- The ACLU, joined by 13 plaintiffs including an array of public-
- interest groups, contends that the Georgia law is "unconstitutionally
- vague" and that its restraints on using corporate logos and trade
- names are "impermissibly chilling constitutionally protected
- expression." The plaintiffs also argue that the Georgia law, which
- imposes a penalty of up to 12 months in jail and $1,000 in fines,
- illegally tries to impose state restrictions on interstate commerce, a
- right reserved for Congress.
-
- The legal challenge is one of the first major assaults on state laws
- that seek to rein in the Internet, despite its global reach and
- audience. Since the beginning of 1995, 11 state legislatures have
- passed Internet statutes and nine others have considered taking
- action.
-
- Connecticut passed a law last year that makes it a crime to send an
- electronic-mail message "with intent to harass, annoy or alarm another
- person" -- despite the Internet's hallowed tradition of "flaming"
- users with messages designed to do just that. Virginia enacted a bill
- this year making it illegal for a state employee -- including
- professors who supposedly have academic freedom on state campuses --
- to use state-owned computers to get access to sexually explicit
- material. New York state has tried to resurrect prohibitions on
- "indecent material" that were struck down as unconstitutional by a
- federal appeals panel ruling on the federal Communications Decency Act
- three months ago.
-
- Most Internet laws target child pornographers and stalkers. Opponents
- argue the well-intended efforts could nonetheless chill free speech
- and the development of electronic commerce. They maintain that the
- Internet, which reaches into more than 150 countries, shouldn't be
- governed by state laws that could result in hundreds of different, and
- often conflicting, regulations.
-
- "We've got to nip this in the bud and have a court declare that states
- can't regulate the Internet because it would damage interstate
- commerce," says Ann Beeson, staff attorney for the ACLU. "Even though
- it's a Georgia statute, it unconstitutionally restricts the ability of
- anybody on the Internet to use a pseudonym or to link to a Web page
- that contains a trade name or logo. It is unconstitutional on its
- face."
-
- Esther Dyson, president of high-tech publisher EDventure Holdings
- Inc. and chairwoman of the Electronic Frontier Foundation, a high-tech
- civil liberties organization that is a co-plaintiff in the lawsuit,
- calls the Georgia law "brain-damaged and unenforceable" and adds: "How
- are they going to stop people from using fake names? Anonymity
- shouldn't be a crime. Committing crimes should be a crime."
-
- But Don Parsons, the Republican state representative who sponsored the
- Georgia bill, countered that the law is a necessary weapon to combat
- fraud, forgery and other on-line misdeeds. The groups that oppose it,
- he says, "want to present (the Internet) as something magical, as
- something above and beyond political boundaries." It is none of these
- things, he adds.
-
- Nor does the Georgia law seek to ban all anonymity, Mr. Parsons says;
- instead, it targets people who "fraudulently misrepresent their (Web)
- site as that of another organization." Misrepresenting on-line medical
- information, for example, could cause serious harm to an unsuspecting
- user, he says.
-
- But Mr. Parsons's critics, including a rival state lawmaker,
- Rep. Mitchell Kaye, say political reprisal lies behind the new
- law. They say Mr. Parsons and his political allies were upset by the
- Web site run by Mr. Kaye, which displayed the state seal on its
- opening page and provided voting records and sometimes harsh political
- commentary. Mr. Kaye asserts that his Web site prompted the new law's
- attack on logos and trademarks that are used without explicit
- permission.
-
- "We've chosen to regulate free speech in the same manner that
- communist China, North Korea, Cuba and Singapore have," Mr. Kaye
- says. "Legislators' lack of understanding has turned to fear. It has
- given Georgia a black eye and sent a message to the world -- that we
- don't understand and are inhospitable to technology."
-
- Mr. Parsons denies that the political Web site was the primary reason
- for his sponsorship of the new statute.
-
- The very local dispute underscores the difficulty of trying to
- legislate behavior on the Internet. "It creates chaos because I don't
- know what rules are going to apply to me," says Lewis Clayton, a
- partner at New York law firm Paul, Weiss, Rifkind, Wharton &
- Garrison. "Whose laws are going to govern commercial transactions? You
- don't want to have every different state with the ability to regulate
- what is national or international commerce."
-
- In the case of the Georgia statute, while its backers say it isn't a
- blanket ban of anonymity, opponents fear differing interpretations of
- the law could lead to the prosecution of AIDS patients and childabuse
- survivors who use anonymity to ensure privacy when they convene on the
- Internet.
-
- "Being able to access these resources anonymously really is crucial,"
- says Jeffery Graham, executive director of the AIDS Survival Project,
- an Atlanta service that joined the ACLU in the lawsuit. His group's
- members "live in small communities," he says, and if their identities
- were known, "they would definitely suffer from stigmas and reprisals."
-
- [=-------------------------------------------------------------------------=]
-
- title: U.S. Government Plans Computer Emergency Response Team
- source: Chronicle of Higher Education - 5 Jul 96
-
- The federal government is planning a centralized emergency response team to
- respond to attacks on the U.S. information infrastructure. The Computer
- Emergency Response Team at Carnegie Mellon University, which is financed
- through the Defense Department, will play a major role in developing the new
- interagency group, which will handle security concerns related to the
- Internet, the telephone system, electronic banking systems, and the
- computerized systems that operate the country's oil pipelines and electrical
- power grids.
-
- [=-------------------------------------------------------------------------=]
-
- title: Hackers $50K challenge to break Net security system
- source: Online Business Today
-
- World Star Holdings in Winnipeg, Canada is looking for
- trouble. If they find it, they're willing to pay $50,000 to the
- first person who can break their security system. The
- company has issued an open invitation to take the "World
- Star Cybertest '96: The Ultimate Internet Security Challenge,"
- in order to demonstrate the Company's Internet security
- system.
-
- Personal email challenges have been sent to high profile
- names such as Bill Gates, Ken Rowe at the National Center
- for Super Computing, Dr. Paul Penfield, Department of
- Computer Science at the M.I.T. School of Engineering and
- researchers Drew Dean and Dean Wallach of Princeton
- University.
-
- [* Challenging Bill Gates to hack a security system is like
- challenging Voyager to a knitting contest. *]
-
- OBT's paid subscription newsletter Online Business
- Consultant has recently quoted the Princeton team in several
- Java security reports including "Deadly Black Widow On The
- Web: Her Name is JAVA," "Java Black Widows---Sun
- Declares War," Be Afraid. Be Very Afraid" and "The
- Business Assassin." To read these reports go to Home Page
- Press http://www.hpp.com and scroll down the front page.
-
- Brian Greenberg, President of World Star said, "I personally
- signed, sealed and emailed the invitations and am very
- anxious to see some of the individuals respond to the
- challenge. I am confident that our system is, at this time, the
- most secure in cyberspace."
-
- World Star Holdings, Ltd., is a provider of interactive
- "transactable" Internet services and Internet security
- technology which Greenberg claims has been proven
- impenetrable. The Company launched its online contest
- offering more than $50,000 in cash and prizes to the first
- person able to break its security system.
-
- According to the test's scenario hackers are enticed into a
- virtual bank interior in search of a vault. The challenge is to
- unlock it and find a list of prizes with inventory numbers and
- a hidden "cyberkey" number. OBT staff used Home Page
- Press's Go.Fetch (beta) personal agent software to retrieve the
- World Star site and was returned only five pages.
-
- If you're successful, call World Star at 204-943-2256. Get to
- it hackers. Bust into World Star at http://205.200.247.10 to
- get the cash!
-
- [=-------------------------------------------------------------------------=]
-
- title: Criminal cult begins PGP crack attempt
- from: grady@netcom.com (Grady Ward)
-
- The Special Master has informed me that Madame Kobrin has asked
- her to retain a PC expert to attempt to "crack" a series of
- pgp-encrypted multi-megabyte files that were seized along with
- more than a compressed gigabyte of other material from my safety
- deposit box.
-
- Ironically, they phoned to ask for assistance in supplying them
- with a prototype "crack" program that they could use in iterating
- and permuting possibilities. I did supply them a good core
- pgpcrack source that can search several tens of thousands of
- possible key phrases a seconds; I also suggested that they should
- at least be using a P6-200 workstation or better to make the
- search more efficient.
-
- The undercurrent is that this fresh hysterical attempt to "get"
- something on me coupled with the daily settlement pleas reflects
- the hopelessness of the litigation position of the criminal cult.
-
- It looks like the criminal cult has cast the die to ensure that
- the RTC vs Ward case is fought out to the bitter end. Which I
- modestly predict will be a devastating, humiliating defeat for
- them from a pauper pro per.
-
- I have given them a final settlement offer that they can leave or
- take. Actually they have a window of opportunity now to drop the
- suit since my counterclaims have been dismissed (although Judge
- Whyte invited me to re-file a new counterclaim motion on more
- legally sufficiant basis).
-
- I think Keith and I have found a successful counter-strategy to
- the cult's system of litigation harassment.
-
- Meanwhile, I could use some help from veteran a.r.s'ers. I need
- any copy you have of the Cease and Desist letter that you may
- have received last year from Eliot Abelson quondam criminal cult
- attorney and Eugene Martin Ingram spokespiece.
-
-
- Physical mail:
-
- Grady Ward
- 3449 Martha Ct.
- Arcata, CA 95521-4884
-
- JP's BMPs or fax-images to:
-
- grady@northcoast.com
-
- Thanks.
-
- Grady Ward
-
- Ps. I really do need all of your help and good wishes after all.
- Thanks for all of you keeping the net a safe place to insult
- kook kults.
-
- [=-------------------------------------------------------------------------=]
-
- title: Hackers Bombard Internet
- author: Dinah Zeiger
- source: Denver Post
-
- 9/21/96
-
- Computer hackers have figured out a new way to tie the Internet
- in knots - flooding network computers with messages so other users can't
- access them.
- Late Thursday, the federally funded Computer Emergency Response
- Team at Carnegie-Mellon University in Pittsburgh issued an advisory to
- Internet service providers, universities and governments detailing the
- nature of the attacks, which have spread to about 15 Internet services
- over the past six weeks. Three were reported this week.
- Thus far, none of the Colorado-based Internet providers contacted
- has been victimized, but all are on alert and preparing defenses.
- The worst of it is that there is no rock-solid defense, because
- the attacks are launched using the same rules - or protocols- that allow
- Internet computers to establish a connection.
- The best the Computer Emergency Response Team can do so far is to
- suggest modifications that can reduce the likelihood that a site will be
- targeted.
- In essence, hackers bombard their victim sites with hundreds of
- messages from randomly generated, fictitious addresses. The targeted
- computers overload when they try to establish a connection with the false
- sites. It doesn't damage the network, it just paralyzes it.
- The Computer Emergency Response Team traces the attacks to two
- underground magazines, 2600 and Phrack, which recently published the code
- required to mount the assaults.
-
- [* Uh, wait.. above it said messages.. which sounds more like usenet,
- not SYN Floods.. *]
-
- "It's just mischief," said Ted Pinkowitz, president of Denver
- based e-central. "They're just doing it to prove that it can be done."
- One local Internet service provider, who declined to be identified
- because he fears being targeted, said it goes beyond pranks.
- "It's malicious," he said. "They're attacking the protocols that
- are the most basic glue of the Internet and it will take some subtle work
- to fix it. You can't just redesign the thing, because it's basic to the
- operation of the entire network."
- The response team says tracking the source of an attack is
- difficult, but not impossible.
- "We have received reports of attack origins being identified,"
- the advisory says.
-
- [=-------------------------------------------------------------------------=]
-
- title: Crypto Mission Creep
- author: Brock N. Meeks
-
- The Justice Department has, for the first time, publicly acknowledged
- using the code-breaking technologies of the National Security Agency, to
- help with domestic cases, a situation that strains legal boundaries of
- the agency.
-
- Deputy Attorney General Jamie Gorelick admitted in July, during an open
- hearing of the Senate's Governmental Affairs permanent subcommittee on
- investigations, that the Justice Department: "Where, for example, we
- are having trouble decrypting information in a computer, and the
- expertise lies at the NSA, we have asked for technical assistance under
- our control."
-
- That revelation should have been a bombshell. But like an Olympic
- diver, the revelation made hardly a ripple.
-
- By law the NSA is allowed to spy on foreign communications without
- warrant or congressional oversight. Indeed, it is one of the most
- secretive agencies of the U.S. government, whose existence wasn't even
- publicly acknowledged until the mid-1960s. However, it is forbidden to
- get involved in domestic affairs.
-
- During the hearing Sen. Sam Nunn (D-Ga.) asked Gorelick if the President
- had the "the constitutional authority to override statutes where the
- basic security of the country is at stake?" He then laid out a
- scenario: "Let's say a whole part of the country is, in effect,
- freezing to death in the middle of the winter [because a power grid has
- been destroyed] and you believe it's domestic source, but you can't
- trace it, because the FBI doesn't have the capability. What do you do?"
-
- Gorelick replied that: "Well, one thing you could do -- let me say
- this, one thing you could do is you could detail resources from the
- intelligence community to the law enforcement community. That is, if
- it's under -- if it's -- if you're talking about a technological
- capability, we have done that." And then she mentioned that the NSA
- had been called on to help crack some encrypted data.
-
- But no one caught the significance of Gorelick's' statements. Instead,
- the press focused on another proposal she outlined, the creation of what
- amounts to a "Manhattan Project" to help thwart the threat of
- information warfare. "What we need, then, is the equivalent of the
- 'Manhattan Project' for infrastructure protection, a cooperative venture
- between the government and private sector to put our best minds together
- to come up with workable solutions to one of our most difficult
- challenges,'' Gorelick told Congress. Just a day earlier, President
- Clinton had signed an executive order creating a blue-ribbon panel, made
- up of several agencies, including the Justice Department, the CIA, the
- Pentagon and the NSA and representatives of the private sector.
-
- Though the press missed the news that day; the intelligence agency
- shivered. When I began investigating Gorelick's statement, all I got
- were muffled grumbling. I called an NSA official at home for comments.
- "Oh shit," he said, and then silence. "Can you elaborate a bit on that
- statement?" I asked, trying to stifle a chuckle. "I think my comment
- says it all," he said and abruptly hung up the phone.
-
- Plumbing several sources within the FBI drew little more insight. One
- source did acknowledge that the Bureau had used the NSA to crack some
- encrypted data "in a handful of instances," but he declined to
- elaborate.
-
- Was the Justice Department acting illegally by pulling the NSA into
- domestic work? Gorelick was asked by Sen. Nunn if the FBI had the
- legal authority to call on the NSA to do code-breaking work. "We have
- authority right now to ask for assistance where we think that there
- might be a threat to the national security," she replied. But her
- answer was "soft." She continued: "If we know for certain that there
- is a -- that this is a non-national security criminal threat, the
- authority is much more questionable." Questionable, yes, but averted?
- No.
-
- If Gorelick's answers seem coy, maybe it's because her public statements
- are at odds with one another. A month or so before her congressional
- bombshell, she revealed the plans for the information age"Manhattan
- Project" in a speech. In a story for Upside magazine, by
- old-line investigative reporter Lew Koch, where he broke the story,
- Gorelick whines in her speech about law enforcement going through "all
- that effort" to obtain warrants to search for evidence only to find a
- child pornography had computer files "encrypted with DES" that don't
- have a key held in escrow. "Dead end for us," Gorelick says. "Is this
- really the type of constraint we want? Unfortunately, this is not an
- imaginary scenario. The problem is real."
-
- All the while, Gorelick knew, as she would later admit to Congress, that
- the FBI had, in fact, called the NSA to help break codes.
-
- An intelligence industry insider said the NSA involvement is legal.
- "What makes it legal probably is that when [the NSA] does that work
- they're really subject to all the constraints that law enforcement is
- subject to." This source went on to explain that if the FBI used any
- evidence obtained from the NSA's code-breaking work to make it's case in
- court, the defense attorney could, under oath, ask the NSA to "explain
- fully" how it managed to crack the codes. "If I were advising NSA today
- I would say, there is a substantial risk that [a defense attorney] is
- going to make [the NSA] describe their methods," he said. "Which means
- it's very difficult for the NSA to do its best stuff in criminal cases
- because of that risk."
-
- Some 20 years ago, Sen. Frank Church, then chairman of the Senate
- Intelligence Committee, warned of getting the NSA involved in domestic
- affairs, after investigating the agency for illegal acts. He said the
- "potential to violate the privacy of Americans is unmatched by any other
- intelligence agency." If the resources of the NSA were ever used
- domestically, "no American would have any privacy left . . . There would
- be no place to hide," he said. "We must see to it that this agency and
- all agencies that possess this technology operate within the law and
- under proper supervision, so that we never cross over that abyss. That
- is an abyss from which there is no return," he said.
-
- And yet, the Clinton Administration has already laid the groundwork for
- such "mission creep" to take place, with the forming of this "Manhattan
- Project."
-
- But if the Justice Department can tap the NSA at will -- a position of
- questionable legality that hasn't been fully aired in public debate --
- why play such hardball on the key escrow encryption issue?
-
- Simple answer: Key escrow is an easier route. As my intelligence
- community source pointed out, bringing the NSA into the mix causes
- problems when a case goes to court. Better to have them work in the
- background, unseen and without oversight, the Administration feels. With
- key escrow in place, there are few legal issues to hurdle.
-
- In the meantime, the Justice Department has started the NSA down the
- road to crypto mission creep. It could be a road of no return.
-
- Meeks out...
-
- [=-------------------------------------------------------------------------=]
-
- title: Hacker posts nudes on court's Web pages
- author: Rob Chepak
- source: The Tampa Tribune
-
-
- TALLAHASSEE - The Internet home of the Florida Supreme Court isn't
- the kind of place you'd expect to find nudity.
- But that's what happened Wednesday morning when a judge in
- Tallahassee found a pornographic photo while he was looking for the latest
- legal news.
- A computer hacker broke into the high court's cyberhome, placing at
- least three pornographic photos and a stream of obscenities on its Web pages.
- ``All I looked at was the one picture, then I checked with the
- court,'' said a surprised Charles Kahn Jr., a 1st District Court of Appeal
- judge.
- The altered pages were immediately turned off. The Florida Department
- of Law Enforcement is investigating the incident and the U.S. Justice
- Department has been contacted. The hacker didn't tamper with any official
- records, court officials said.
- ``We've got three photos and we're looking for more,'' said Craig
- Waters, executive assistant to Chief Justice Gerald Kogan. The culprit
- ``could be anyone from someone in the building to the other side of
- the world.''
-
- [* I bet they are looking for more.. *]
-
- The Florida Court's Web site is used to post information about court
- opinions, state law and legal aid. Thousands of people, including children,
- use the court system's more than 500 Internet pages each month, Waters said.
- The court and other state agencies usually keep their most vital
- information on separate computers that can't be accessed on the Internet.
- Officials aren't sure how the culprit broke in, and FDLE had no
- suspects Thursday afternoon. But court officials long have suspected their
- Web site could be a target for hackers armed with the computer equipment to
- impose photos on the Web. The Florida Supreme Court became the first state
- Supreme Court in the nation to create its own Internet pages two years ago.
- While the episode sounds like a well-crafted high school prank,
- computer hackers are becoming a big problem for government agencies, which
- increasingly are finding themselves the victims of criminal tampering on
- the Internet. In August, someone placed swastikas and topless pictures of
- a TV star on the U.S.
- Department of Justice's home page. The Central Intelligence Agency
- has been victimized, too.
- ``It's certainly a common problem,'' said P.J. Ponder, a lawyer for
- the Information Resource Commission, which coordinates the state
- government's computer networks. However, there are no statistics on
- incidences of tampering with state computers.
- The best way for anyone to minimize damage by computer hackers is by
- leaving vital information off the Internet, said Douglas Smith, a consultant
- for the resource commission. Most state agencies follow that advice, he added.
- ``I think you have to weigh the value of security vs. the value of
- the information you keep there,'' he said.
- Court officials would not reveal details of the sexually explicit
- photos Thursday, but Liz Hirst, an FDLE spokeswoman, said none were of
- children.
- Penalties for computer tampering include a $5,000 fine and five
- years in jail, but the punishment is much higher if it involves child
- pornography, she said.
- Without a clear motive or obvious physical evidence, FDLE
- investigators, who also investigate child pornography on the Internet,
- hope to retrace the culprit's steps in cyberspace. However, Ponder said
- cases of Internet tampering are ``very difficult to solve.''
- Thursday, the state's top legal minds, who are used to handing out
- justice, seemed unaccustomed to being cast as victims.
- ``No damage was done,'' Kogan said in a statement. ``But this
- episode did send a message that there was a flaw in our security that we
- now are fixing.''
-
- [* I tell you (and other agencies) I do security consulting!! Please?! *]
-
- [=-------------------------------------------------------------------------=]
-
- title: Hacking Into Piracy
- source: The Telegraph
-
- 22nd October 1996
-
- Computer crime investigators are using the techniques of their
- adversaries to crack down on illegally traded software. Michael
- McCormack reports.
-
- The adage "Set a thief to catch a thief" is being updated for the
- electronic age as online investigators use hackers' techniques to fight
- a thriving trade in counterfeit and pirate software that is reckoned to
- cost British program-makers more than ú3 billion a year.
-
- "Jason", a computer crime investigator employed by Novell to shut down
- bulletin boards that trade pirate copies of its software, leads a
- confusing double life. First he spends weeks in his office, surfing the
- Internet and wheedling secrets from hackers around Europe; then he
- compiles dossiers of evidence on the system operators who deal in Novell
- wares, flies to their bases, presents the local police with his reports,
- and accompanies them on the inevitable raid.
-
- "Every day I'm on IRC [the Internet's chat lines, where information can
- be exchanged quickly and relatively anonymously] looking for tips on new
- bulletin boards that might have Novell products on them," he says.
-
- "Our policy has been to go country by country through Europe and try to
- take down the biggest boards in each one"
-
- "It tends to be the biggest boards that have our products, and those can
- be difficult to get on to. The operators have invested a lot of time and
- cash in setting them up and they're sometimes quite careful who they'll
- let on. I often start by joining dozens of little boards in the area to
- get myself a good reputation, which I can use as a reference to get on
- to the big board.
-
- "Our policy has been to go country by country through Europe and try to
- take down the biggest boards in each one. That has a chilling effect on
- the other operators. They think, 'If he could get caught, I'm doomed.'
- Within days of us taking down a big board, Novell products disappear off
- the smaller ones."
-
- Once Jason gains entry to a big board, the game begins in earnest:
- "Bulletin boards work on the principle that if you want to take
- something off, you first have to put something in. Obviously I can't put
- in Novell's products, or any other company's; instead, we use a program
- we wrote ourselves. It's huge, and it has an impressive front end full
- of colour screen indicators and menus. It doesn't actually do anything
- but it looks impressive and it lets you start pulling things off the
- site."
-
- Once Jason finds company products on a board, he makes a video of
- himself logging on and retrieving a copy of the software.
-
- [* Talk about freako bizarre narc fetishes.. *]
-
- Bulletin boards often have restricted areas closed to all but a few
- trusted members, and these are where the most illegal products - such as
- expensive business or word-processing packages copied from beta releases
- or pirate disks - are kept. Penetrating these areas takes a skill
- learned from the hackers. "It's called social engineering," says Jason.
- "It just means chatting up the operator until he decides to trust you
- with the goodies."
-
- Once Jason finds company products on a board, he makes a video of
- himself logging on and retrieving a copy of the software. Then it's on
- to a plane to go and lodge a complaint with the local police.
-
- He is helped by Simon Swale, a fellow Novell investigator and former
- Metropolitan Police detective who uses his experience of international
- police procedures and culture to ensure that foreign forces get all the
- technical help they need.
-
- In the past six months, Jason's investigations have shut down seven
- bulletin boards across Europe, recovering software valued at more than
- ú500,000. The company reckons the closed boards would have cost it more
- than ú2.5 million in lost sales over the next year.
-
- Jason has vivid memories of the early-morning raid on the operator's
- house.
-
- One of the Jason's biggest successes came earlier this year in Antwerp,
- when he guided Belgian police to the Genesis bulletin board, which held
- more than ú45,000 worth of Novell products and a slew of other pirate
- software. Jason has vivid memories of the early-morning raid on the
- operator's house: "The first thing he said was, 'I have nothing illegal
- on my system.' So I set up my laptop and mobile and dialled into it from
- his kitchen. All the police watched as I tapped into my keyboard and
- everything popped up on his screen across the room. I went straight
- in to the Novell stuff and he said, 'Okay, maybe I have a little'."
-
- The system operator, Jean-Louis Piret, reached a six-figure out-of-court
- settlement with Novell. More importantly for the company, its products
- have all but disappeared from Belgium's boards in the wake of the raid.
-
- There are, however, many more fish to fry. Jason already has another
- three raids lined up for autumn . . .
-
- [=-------------------------------------------------------------------------=]
-
- title: Revealing Intel's Secrets
-
- The Intel's Secrets site may not be around for long if Intel has anything
- to say about it. The site provides a look at details, flaws, and programming
- tips that the giant chip manufacturer would rather not share with the general
- public. One particular page exposes some unflattering clitches of the P6
- chip and a bug in the Intel486 chip. The site even has two separate hit
- counters: one for the average visitor, and one that counts the number of
- times Intel has stopped by.
-
- [=-------------------------------------------------------------------------=]
-
- title: Internet Boom Puts Home PCs At Risk Of Hackers
- author: Nick Nuttall
- source: The London Times
-
- 18th October 1996
-
- Home computers, which carry everything from private banking details to
- love letters, are becoming vulnerable to hackers as more households
- connect to the Internet.
-
- The boom in electronic services is making the home PC as open to attack
- as company and government systems, a survey of hackers has disclosed.
- The Internet is also helping hackers to become more skilful as they
- exchange tips and computer programs around the globe.
-
- [* Survey of hackers?! Bullshit. *]
-
- A spokesman for Kinross and Render, which carried out the survey for
- Computacenter, said: "Breaking into home computers is now increasingly
- possible and of great interest to hackers. It may be a famous person's
- computer, like Tony Blair's or a sports personality. Equally it could be
- yours or my computer carrying personal details which they could use for
- blackmailing."
-
- Passwords remain easy to break despite warnings about intrusion.
- Companies and individuals frequently use simple name passwords such as
- Hill for Damon Hill or Blair for the Labour leader. Hackers also said
- that many users had failed to replace the manufacturer's password with
- their own.
-
- Hackers often use programs, downloaded from the Internet, which will
- automatically generate thousands of likely passwords. These are called
- Crackers and have names such as Satan or Death.
-
- [* Satan? Death? Ahhhh! *]
-
- John Perkins, of the National Computing Centre in Manchester, said
- yesterday: "The linking of company and now home computers to the
- global networks is making an expanding market for the hackers." The
- Computacenter survey was based on interviews with more than 130
- hackers, supplemented by interviews over the Internet. The average
- hacker is 23, male and a university student. At least one of those
- questioned began hacking ten years ago, when he was eight.
-
- [* No offense to anyone out there, but how in the hell could they
- validate any claims in a survey like that? And especially with
- that amount? *]
-
- Most said it was getting easier, rather than harder, to break in and
- many hackers would relish tighter computer security because this would
- increase the challenge. Existing laws are held in contempt and almost 80
- per cent said tougher laws and more prosecutions would not be a
- deterrent. Eighty-five per cent of those questioned had never been
- caught.
-
- Most said the attraction of hacking lay in the challenge, but a hard
- core were keen to sabotage computer files and cause chaos, while others
- hoped to commit fraud.
-
- [* Excuse me while I vomit. *]
-
- [=-------------------------------------------------------------------------=]
-
- title: Computer hacker Mitnick pleads innocent
-
- September 30, 1996
-
- LOS ANGELES (AP) -- The notorious computer hacker Kevin Mitnick pleaded
- innocent Monday to charges he mounted a multimillion-dollar crime wave
- in cyberspace during 2 1/2 years as a fugitive.
-
- Mitnick, 33, held without bail on a fraud conviction, told the judge
- not to bother reading the indictment, which includes 25 new counts of
- computer and wire fraud, possessing unlawful access devices, damaging
- computers and intercepting electronic messages.
-
- "Not guilty," Mitnick said. His indictment, handed up Friday by a
- federal grand jury, follows an investigation by a national task force
- of FBI, NASA and federal prosecutors with high-tech expertise.
-
- It charges Mitnick with using stolen computer passwords, damaging
- University of Southern California computers and stealing software
- valued at millions of dollars from technology companies, including
- Novell, Motorola, Nokia, Fujitsu and NEC.
-
- ...........
-
- Mitnick pleaded guilty in April to a North Carolina fraud charge of
- using 15 stolen phone numbers to dial into computer databases.
- Prosecutors then dropped 22 other fraud charges but warned that new
- charges could follow.
-
- Mitnick also admitted violating probation for a 1988 conviction in Los
- Angeles where he served a year in jail for breaking into computers at
- Digital Equipment Corp. At 16, he served six months in a youth center
- for stealing computer manuals from a Pacific Bell switching center.
-
- Mitnick also got a new lawyer Monday, Donald C. Randolph, who
- represented Charles Keating Jr.'s top aide, Judy J. Wischer, in the
- Lincoln Savings swindle.
-
- [=-------------------------------------------------------------------------=]
-
- title: Hackers Destroy Evidence of Gulf War Chemical/Biological Weapons
- source: WesNet News
-
- Saturday, Nov. 2, 5:00 p.m.
-
- WASHINGTON DC -- Hackers broke into a Web site (http://insigniausa.com)
- containing suppressed evidence of Gulf War chemical and biological weapons
- Friday, erasing all files.
-
- "Someone hacked in Friday around 4 p.m. and completely trashed our
- machine," said Kenneth Weaver, webmaster of W3 Concepts, Inc.
- (http://ns.w3concepts.com) of Poolesville, Maryland (a suburb of Washington
- D.C.), which houses the site.
-
- The Web site contained recently-released supressed Department of Defense
- documents exposing biological and chemical warfare materials that U.S.
- companies allegedly provided to Iraq before the war.
-
- Bruce Klett, publisher, Insignia Publishing said they are now restoring the
- files. "We plan to be operational again Saturday evening or Sunday," he
- said. "We encourage anyone to copy these files and distribute them." There
- are over 300 files, requiring 50 MB of disk space.
-
- The Department of Defense has its own version of these files on its
- Gulflink Web site (http://www.dtic.dla.mil/gulflink/).
-
- Insignia plans to publish Gassed In the Gulf, a book on the government's
- coverup by former CIA analyst Patrick Eddington, in six to eight weeks,
- Klett added.
-
- Hackers also brought down SNETNEWS and IUFO, Internet mailing lists
- covering conspiracies and UFOs, on Oct. 25, according to list administrator
- Steve Wingate. He plans to move the lists to another Internet service
- provider be be back in operation soon.
-
- "We've seen this happen regularly when we get too close to sensitive
- subjects," Wingate said. "The election is Tuesday. This is a factor."
-
- He also said a "quiet" helicopter buzzed and illuminated his Marin County
- house and car Thursday night for several minutes.
-
- [=-------------------------------------------------------------------------=]
-
- title: Criminals Slip Through The Net
- source: The Telegraph, London
-
- 5th November 1996
-
- Britain is way behind in the fight against computer crime and it's time
- to take it seriously, reports Michael McCormack
-
-
- BRITAIN'S police forces are lagging behind the rest of the world in
- combating computer crime, according to one of the country's most
- experienced computer investigators - who has just returned to walking
- the beat.
-
- Police Constable John Thackray, of the South Yorkshire Police, reached
- this grim conclusion after a three-month tour of the world's leading
- computer crime units, sponsored by the Winston Churchill Memorial Trust.
-
- All of the five countries he studied, he says, are putting Britain's
- efforts against electronic crime to shame.
-
- "The level of education and understanding of computer crime is far more
- advanced outside Britain," said Thackray.
-
- "Here, police forces are shying away from even attempting to investigate
- computer crimes. You see experienced detectives who lose all interest in
- pursuing cases where there are computers involved.
-
- "We know that computer crime, particularly software piracy, is closely
- connected with organised crime - they like the high profits and the low
- risk - but those connections aren't followed up."
-
- He adds:"We are far behind our own criminals on these matters. We only
- catch them when they get complacent and keep using old technology and
- old methods. If they simply keep up with current technology, they are so
- far ahead they are safe." Thackray was one of the officers responsible
- for closing down one of the largest pirate bulletin boards in the
- country, estimated to have stolen software worth thousands last year and
- has assisted officers from other forces in several similar cases.
- Pirates recently named a new offering of bootleg software "Thackray1 and
- 2" in his honour.
-
- He has seen how seriously such crimes are taken by police forces abroad:
- "In America there are specialist units in every state and a similar
- system is being put in place in Australia. There's nothing nearly as
- comprehensive in in Britain.
-
- "We have the Computer Crimes Unit at Scotland Yard and a small forensic
- team at Greater Manchester, but they're both badly under-resourced and
- there's little interest in, or support for, investigating computer
- crimes in other forces.
-
- "Our officers must get a better education, to start with, on what
- computer crime is, how it works and who is being hurt by it. We need to
- bury the impression that this is a victimless crime with no serious
- consequences."
-
- Thackray is preparing a report on his impressions of anti-crime
- initiatives in other countries and what must be done in Britain to equal
- them. "In my view, we need specially detailed officers who are educated
- in computer crime issues.
-
- "We also need to become much more pro-active in our approach. It's not
- good enough to sit back and wait for the complaints."
-
- But perhaps symptomatic of Britain's efforts is the way Thackray's
- valuable experience is being used. He is putting away his laptop and
- getting out his boots.
-
- "I'm now being moved back into uniform. The two year experience I have
- gained in investigating these matters is not going to be used to its
- full potential."
-
- "We pride ourselves on being an effective police service in Britain, and
- other countries look up to us. But when it comes to computer crime, we
- have to start following their lead."
-
- -EOF
-