home *** CD-ROM | disk | FTP | other *** search
-
- ==Phrack Classic==
-
- Volume Three, Issue 32, File #7 of 12
-
-
- 13th Annual National Computer Security Conference
- October 1-4, 1990
- Omni Shoreham Hotel
- Washington, D.C.
- A "Knight Lightning" Perspective
- by Craig M. Neidorf
-
- Dr. Dorothy Denning first hinted at inviting me to take part on her panel
- "Hackers: Who Are They?" in May 1990 when we first came into contact while
- preparing for my trial. At the time I did not feel that it was a very good
- idea since no one knew what would happen to me over the next few months. At
- the conclusion of my trial I agreed to participate and surprisingly, my
- attorney, Sheldon Zenner (of Katten, Muchin, & Zavis), accepted an invitation
- to speak as well.
-
- A few weeks later there was some dissension to the idea of having me appear at
- the conference from some professionals in the field of computer security. They
- felt that my presence at such a conference undermined what they stood for and
- would be observed by computer "hackers" as a reward of sorts for my notoriety
- in the hacker community. Fortunately Dr. Denning stuck to her personal values
- and did not exclude me from speaking.
-
- Unlike Gordon Meyer, I was unable to attend Dr. Denning's presentation
- "Concerning Hackers Who Break Into Computer Systems" and the ethics sessions,
- although I was informed upon my arrival of the intense interest from the
- conference participants and the reactions to my now very well known article
- announcing the "Phoenix Project."
-
- Not wishing to miss any more class than absolutely necessary, I arrived in
- Washington D.C. late in the day on Wednesday, October 4th. By some bizarre
- coincidence I ended up on the same flight with Sheldon Zenner.
-
- I had attended similar conventions before such as the Zeta Beta Tau National
- Convention in Baltimore the previous year, but there was something different
- about this one. I suppose considering what I have been through it was only
- natural for me to be a little uneasy when surrounded by computer security
- professionals, but oddly enough this feeling soon passed as I began to
- encounter friends both old and new.
-
- Zenner and I met up with Dorothy and Peter Denning and soon after I met Terry
- Gross, an attorney hired by the Electronic Frontier Foundation who had helped
- with my case in reference to the First Amendment issues. Emmanuel Goldstein,
- editor of 2600 Magazine and probably the chief person responsible for spreading
- the news and concern about my indictment last Spring, and Frank Drake, editor
- of W.O.R.M. showed up. I had met Drake once before. Finally I ran into Gordon
- Meyer.
-
- So for a while we all exchanged stories about different events surrounding our
- lives and how things had changed over the years only to be interrupted once by
- a odd gentleman from Germany who inquired if we were members of the Chaos
- Computer Club. At the banquet that evening, I was introduced to Peter Neumann
- (who among many other things is the moderator of the Internet Digest known as
- "RISKS") and Marc Rotenberg (Computer Professionals for Social Responsibility).
-
- Because of the great interest in the ethics sessions and comments I had heard
- from people who had attended, I felt a strange irony come into play. I've
- hosted and attended numerous "hacker" conventions over the years, the most
- notable being "SummerCon". At these conventions one of the main time consuming
- activities has always been to play detective and attempt to solve the mystery
- of which one of the guests or other people at the hotel were there to spy on us
- (whether they were government agents or some other form of security personnel).
-
- So where at SummerCon the youthful hackers were all racing around looking for
- the "feds," at the NCSC I wondered if the security professionals were reacting
- in an inverse capacity... Who Are The Hackers? Despite this attitude or maybe
- because of it, I and the other panelists, wore our nametags proudly with a
- feeling of excitement surrounding us.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- October 4, 1990
-
- Dorothy Denning had gathered the speakers for an early morning brunch and I
- finally got a chance to meet Katie Hafner in person. The panelists discussed
- some possibilities of discussion questions to start off the presentation and
- before I knew it, it was time to meet the public.
-
- As we gathered in the front of the conference room, I was dismayed to find that
- the people in charge of the setting up the nameboards (that would sit in front
- of each panelist) had attended the Cook school of spelling and labeled me as
- "Neirdorf." Zenner thought this was hysterical. Luckily they were able to
- correct the error before we began.
-
- Hackers: Who Are They?
-
- Dr. Denning started the presentation by briefly introducing each panelist and
- asking them a couple of questions.
-
- Katie Hafner disputed the notion that her work has caused a glorification
- of hacking because of the severe hardships the people she interviewed had to
- endure. I found myself sympathizing with her as I knew what it was like to
- be in their positions. Many people commented later that her defense of Mitnick
- seemed a little insincere as he had indeed committed some serious acts. Not
- knowing all of the details surrounding Mitnick's case and not relying on the
- general newsmedia as a basis for opinion I withheld any sort of judgment.
-
- Emmanuel Goldstein and Frank Drake appeared to take on the mantle of being the
- spokespersons for the hackers, although I'm unsure if they would agree with
- this characterization. Drake's main point of view dealt with the idea that
- young hackers seek to be able to use resources that they are otherwise excluded
- from. He claimed to once have been a system intruder, but now that he is in
- college and has ample computing resources available to him, he no longer sees a
- need to "hack."
-
- Goldstein on the other hand sought to justify hacking as being beneficial to
- society because the hackers are finding security holes and alerting security to
- fix these problems before something catastrophic occurs.
-
- Gordon Meyer tried to explain the hacker mind-set and how the average hackers
- does not see using corporate resources as having a real financial burden to
- today's companies. Some people misunderstood his remarks to be speaking from a
- factual position and took offense, stating that the costs are great indeed.
- He also explained the differences between Phrack and the Computer Underground
- Digest. Most notable is that CuD does not print tutorials about computer
- systems.
-
- Sheldon Zenner focused on the freedom of the speech and press issues. He also
- spoke about technical details of the U.S. v. Neidorf case and the court rulings
- that resulted from it. One major point of interest was his quite reasonable
- belief that the courts will soon be holding companies financially liable for
- damages that may occur because of illegal intrusion into their systems. This
- was not to suggest that a criminal defense strategy could be that a company did
- not do enough to keep an intruder out, but instead that the company could be
- held civilly liable by outside parties.
-
- Zenner and Denning alike discussed the nature of Phrack's articles. They found
- that the articles appearing in Phrack contained the same types of material
- found publicly in other computer and security magazines, but with one
- significant difference. The tone of the articles. An article named "How to
- Hack Unix" in Phrack usually contained very similar information to an article
- you might see in Communications of the ACM only to be named "Securing Unix
- Systems." But the differences were more extreme than just the titles. Some
- articles in Phrack seemed to suggest exploiting security holes while the
- Communications of the ACM concentrated more on fixing the problem. The
- information in both articles would be comparable, but the audiences reading and
- writing these articles were often very different.
-
- I explained the concept and operation of Phrack and wandered into a discussion
- about lack of privacy concerning electronic mail on the Internet from
- government officials, system managers, and possibly even by hackers. I went on
- to remark that the security professionals were missing the point and the
- problem. The college and high-school students while perhaps doing some
- exploration and causing some slight disturbances are not the place to be
- focusing their efforts. The real danger comes from career criminals and
- company insiders who know the systems very well from being a part of it. These
- people are the source of computer crime in this country and are the ones who
- need to be dealt with. Catching a teenage hacker may be an easier task, but
- ultimately will change nothing. To this point I agreed that a hacker gaining
- entry and exposing holes on computer systems may be a service to some degree,
- but unlike Goldstein, I could not maintain that such activity should bring
- prosecutorial immunity to the hacker. This is a matter of discretion for
- security personnel and prosecutors to take into consideration. I hope they do.
-
- To a large degree I was rather silent on stage. Perhaps because I was cut off
- more than once or maybe even a little stagefright, but largely because many of
- the questions posed by the audience were wrong on their face for me to answer.
- I was not going to stand and defend hacking for its own sake nor was I there to
- explain the activities of every hacker in existence.
-
- So I let Goldstein and Drake handle questions geared to be answered by a system
- intruder and I primarily only spoke out concerning the First Amendment and
- Phrack distribution. In one instance a man upset both by Drake's comments
- about how the hackers just want to use resources they can't get elsewhere and
- by Goldstein's presentation of the Operation Sun-Devil raids and the attack on
- "Zod" in New York spoke up and accused us of being viciously one sided.
-
- He said that none of us (and he singled me out specifically) look to be age 14
- (he said he could believe I was 18) and that "our" statement that its ok for
- hackers to gain access to systems simply because they lacked the resources
- elsewhere meant it was ok for kids to steal money to buy drugs.
-
- I responded by asking him if he was suggesting that if these "kids" were rich
- and did not steal the money, it would be ok to purchase drugs? I was sure that
- it was just a bad analogy so I changed the topic afterwards. He was right to a
- certain extent, all of the hackers are not age 14 or even in highschool or
- college, but is this really all that important of a distinction?
-
- The activities of the Secret Service agents and other law enforcement officials
- in Operation Sun-Devil and other investigations have been overwhelming and very
- careless. True this is just their standard way of doing business and they may
- not have even singled out the hackers as a group to focus excess zeal, but
- recognizing that the hackers are in a worst case scenario "white-collar
- offenders," shouldn't they alter their technique? Something that might be
- important to make clear is that in truth my indictment and the indictments on
- members of the Legion of Doom in Atlanta had absolutely nothing to do with
- Operation Sun-Devil despite the general media creation.
-
- Another interesting point that was brought out at the convention was that there
- was so much activity and the Secret Service kept so busy in the state of
- Arizona (possibly by some state official) concerning the hacker "problem" that
- perhaps this is the reason the government did not catch on to the great Savings
- & Loan multi-Billion dollar loss.
-
- One gentleman spoke about his son being in a hospital where all his treatments
- were being run by computer. He added that a system intruder might quite by
- accident disrupt the system inadvertently endangering his son's life. Isn't
- this bad? Obviously yes it is bad, but what was worse is that a critical
- hospital computer system would be hooked up to a phoneline anyway. The main
- reason for treatment in a hospital is so that the doctors are *there* to
- monitor and assist patients. Could you imagine a doctor dialing in from home
- with a modem to make his rounds?
-
- There was some discussion about an editor's responsibility to inform
- corporations if a hacker were to drop off material that he/she had breached
- their security. I was not entirely in opposition to the idea, but the way I
- would propose to do it was probably in the pages of a news article. This may
- seem a little roundabout, but when you stop and consider all of the private
- security consultants out there, they do not run around providing information to
- corporations for free. They charge enormous fees for their services. There
- are some organizations that do perform services for free (CERT comes to mind),
- but that is the reason they were established and they receive funding from the
- government which allows them to be more generous.
-
- It is my belief that if a hacker were to give me some tips about security holes
- and I in turn reported this information to a potential victim corporation, the
- corporation would be more concerned with how and from whom I got the
- information than with fixing the problem.
-
- One of the government's expert witnesses from U.S. v. Neidorf attended this
- session and he prodded Zenner and I with questions about the First Amendment
- that were not made clear from the trial. Zenner did an excellent job of
- clarifying the issues and presenting the truth where this Bellcore employee
- sought to show us in a poor light.
-
- During the commentary on the First Amendment, Hafner, Zenner, and I discussed a
- July 22, 1988 article containing a Pacific Bell telephone document copied by a
- hacker and sent to John Markoff that appeared on the front page of the New York
- Times. A member of the audience said that this was ok, but the Phrack article
- containing the E911 material was not because Phrack was only sent to hackers.
- Zenner went on to explain that this was far from true since private security,
- government employees, legal scholars, reporters, and telecom security personnel
- all received Phrack without discrimination. There really is a lot that both
- the hackers and security professionals have to learn about each other.
-
- It began to get late and we were forced to end our session. I guess what
- surprised me the most were all of the people that stayed behind to speak with
- us. There were representatives from NASA, U.S. Sprint, Ford Aerospace, the
- Department of Defense, a United States Army Lt. Colonel who all thanked us
- for coming to speak. It was a truly unique experience in that a year ago I
- would have presumed these people to be fighting against me and now it seems
- that they are reasonable, decent people, with an interest in trying to learn
- and help end the problems. I also met Mrs. Gail Meyer for the first time in
- person as well.
-
- I was swamped with people asking me how they could get Phrack and for the most
- part I referred them to Gordon Meyer and CuD (and the CuD ftp). Just before we
- went to lunch I met Donn Parker and Art Brodsky, an editor from Communications
- Daily. So many interesting people to speak with and so little time. I spent a
- couple hours at the National Gallery of Art with Emmanuel Goldstein, flew back
- to St. Louis, and returned to school.
-
- It was definitely an enLightening experience.
-
- ++++++++++++++++++++++++++++++
-
- A very special thank you goes to Dorothy Denning, a dear friend who made it
- possible for me to attend the conference.
-
- :Craig M. Neidorf a/k/a Knight Lightning
-
- C483307 @ UMCVMB.MISSOURI.EDU
- C483307 @ UMCVMB.BITNET
- _______________________________________________________________________________
-