home *** CD-ROM | disk | FTP | other *** search
-
- ==Phrack Inc.==
-
- Volume Three, Issue Thirty-five, File 3 of 13
-
- -*[ P H R A C K XXXV P R O P H I L E ]*-
-
- -=>[ Presents ]<=-
-
- Sincerely Yours, Chris Goggans
- -===--===--===--===--===--===-
- by S. Leonard Spitz
- Associate Publisher
- INFOSecurity Product News
-
- "A provocative interview with a former member of the "Legion of Doom" suggests
- that the ethics of hacking (or cracking) are often in the eye of the beholder."
-
- Malicious hackers, even though most operate undercover, are often notorious for
- the colorful pseudonyms they travel under. Reformed hackers, however, prefer a
- low profile so as to shed their image of perceived criminality. Kevin Mitnick,
- infamous for the DEC caper, is one of the foremost advocates of this strategy.
-
- Now comes Chris Goggans, trailing his former "Legion of Doom" moniker, Erik
- Bloodaxe, behind him, to try it his way. Goggans insists that where once he
- may have bent the rules, he is now ready to give something back to society.
- And coming across with a high degree of sincerity, he affirms his intention to
- try. Are he and his colleagues, wearing their newly acquired information
- security consultants hats, tilting at windmills, or does their embryonic,
- cracker-breaking start-up, Comsec Data Security Co., stand a fighting chance?
- We thought we would ask him.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- ISPNews: I am going to ask several legitimate questions. Please answer them
- completely, truthfully, and honestly.
-
- Chris Goggans: OK.
-
-
- JUDGEMENT BY THE MEDIA
-
- ISPNews: Would you react to Computerworld's July 29 piece, "Group Dupes
- Security Experts," <also seen in Phrack World News issue 33, part 2
- as part of the article called "Legion of Doom Goes Corporate> in
- which members of your organization were accused of masquerading as
- potential customers to obtain information, proposals, and prices from
- other security consultants?
-
- CG: We were all amazed that something like that would ever be printed
- because, as we understand common business practices, we weren't doing
- anything unusual.
-
- ISPNews: Computerworld reported that the Legion of Doom was "one of the
- nation's most notorious hacker groups, according to federal law
- enforcers." Can you respond to that?
-
- CG: Notorious is a relative term. There has always been a shroud of
- mystery covering the Legion of Doom, because it was an organization
- whose membership was private. When you keep people in the dark about
- the activities of something, there is always going to be the
- perception that more is going on than there really is.
-
- ISPNews: Would you say then that the characterization of being notorious is
- unfair?
-
- CG: To some degree, yes. There certainly was activity going on within
- the group that could be considered illegal. But most of this was
- taking place when members of the group were all between the ages
- of 14 and 17. While I don't want to blame immaturity, that's
- certainly a factor to be considered.
-
- The Legion of Doom put out four <issues of an> on-line electronic
- newsletter <called the Legion of Doom Technical Journals> composed
- of different files relating to various types of computer systems
- or netware. They explained different operating systems or
- outlined different procedures used by networks. They were always
- informative and explained how to use a computer. We never said
- "This is a computer and this is how to break into it."
-
- Colorful names and words used to describe groups also add to
- notoriety. If we had been the "Legion of Flower Pickers," the
- "Legion of Good Guys," or the "SuperFriends," there probably
- wouldn't be this dark cloud hanging over the group.
-
- ISPNews: Could you be charged with intent to provide information to others
- which would make it easier to gain unauthorized access?
-
- CG: I don't see how that could be a charge. There's the first amendment.
- I maintain that talking about something and encouraging or forcing
- someone to do it are completely different.
-
-
- EARNING AN "A" IN INFOSECURITY
-
- ISPNews: What attracted you to computer security?
-
- CG: The same thing that would attract anybody to being a hacker. For
- half of my life I've been in front of a computer every day.
- Sometimes from early in the morning until the wee hours of the night.
- And my particular focus has been on computer security.
-
- ISPNews: At least the dark side of that coin.
-
- CG: I wouldn't say the dark side. I'd say the flip side. If you do
- something for 11 years, you are going to pick up a lot of knowledge.
- And I've always wanted to find some kind of productive career that I
- thoroughly enjoyed. So this was just an obvious progression. No one
- wants to be a 40-year-old hacker living in fear of the Secret
- Service.
-
- ISPNews: When you first applied to enter college, did you feel that it was the
- right place to learn about information security?
-
- CG: Yes, I thought it was the right place, mainly because college is the
- most obvious choice to pursue an education in any field. I just
- assumed that I would be able to find formal training leading to
- certification or a degree in this field. Yet, at the University of
- Texas, there wasn't anything along those lines.
-
- ISPNews: Did you graduate from the University of Texas?
-
- CG: No, I changed majors and then moved to Houston. I had started out in
- computer science but it was completely unrelated to any kind of
- career I wanted to pursue. I eventually changed my major to
- journalism. There are only two things I like to do: Work on
- computers, and write. So, if I wasn't going to get a degree in one,
- it was going to be in the other. I'm a semester away, and I do plan
- on finishing.
-
- ISPNews: If you were to structure a college curriculum for studies in
- information security, would you design it to focus on technical
- issues, ethics, business issues, or legal matters?
-
- CG: I would try to focus on all of these. If you don't have a technical
- background, you can't understand the way the operating system works,
- and you really can't focus on some of the issues that need to be
- addressed with information security.
-
- Ethics certainly come into play ass well for obvious reasons. I
- don't think hackers are going to go away. Even with the advent of
- newer technology, there are always going to be people who have an
- interest in that technology and will learn how to manipulate it.
-
-
- ETHICS, INTELLECTUAL PROPERTY RIGHTS, AND THE LAW
-
- ISPNews: What is your definition of a hacker?
-
- CG: A Hacker is someone who wants to find out everything that there is to
- know about the workings of a particular computer system, and will
- exhaust every means within his ability to do so.
-
- ISPNews: Would you also comment on the ethics of hacking?
-
- CG: There is an unwritten code of ethics that most people tend to adhere
- to. It holds that: no one would ever cause damage to anything; and
- no one would use any information found for personal gain of any kind.
-
- For the most part, the only personal gain that I have ever seen from
- any sort of hacking activity is the moderate fame from letting others
- know about a particular deed. And even in these cases, the total
- audience has been limited to just a few hundred.
-
- ISPNews: Are you unaware of hackers who have in fact accessed information,
- then sold it or massaged it for money?
-
- CG: No, certainly not. I am just acknowledging and defining a code of
- ethics. We of the Legion of Doom tried to adhere to that code of
- ethics. For example, members of the original nine who acted
- unethically were removed from the group.
-
- ISPNews: Do you believe that penetrating a computer system without either
- making changes or removing information is ethical, or a least is not
- unethical?
-
- CG: At one time in the past I may have held that belief, but now I
- certainly must not, because the whole idea of being involved in the
- formation of my new company, Comsec Data Security, would show
- otherwise.
-
- ISPNews: So today, you believe that unauthorized entry is unethical.
-
- CG: Exactly. As a hacker, I didn't particularly hold that. But as
- things such as invasion of privacy, even though I never caused any
- damage, and breach of trust became more apparent to me, I was able to
- step back, see the picture, and realize it was wrong.
-
- ISPNews: Can I conclude that you are speaking for you company and its
- principals?
-
- CG: Yes, I am speaking for all of the principals.
-
- ISPNews: What are your views on the ownership of information?
-
- CG: I feel that proprietary information, national-security-related
- information, information that could be considered a trade secret, all
- definitely have ownership, and access should be restricted.
-
- In the past, I felt that information that affected me or had some
- relevance to my life should be available to me. I felt that
- information should be available to the people it affected, whether
- that be phone company information, credit bureau information, banking
- information, or computer system information in general. I am saying
- this in the past tense.
-
- In the present tense, I feel that the public is entitled only to
- information in the public domain. Information not available legally
- through normal channels is just going to have to be left at that.
-
- ISPNews: Do you believe that software should always be in the public
- domain.?
-
- CG: No, I do not. If I wrote something as wonderful as Lotus, or any of
- the Microsoft programs, or Windows, I would want people to pay for
- them.
-
- ISPNews: Then you do believe in private ownership of and protection for
- software?
-
- CG: Yes, definitely.
-
- ISPNews: What are you views on current U.S. Computer crime laws?
-
- CG: I think that the current laws are too broad. They do not make
- distinctions between various types of computer crimes. I consider
- breaking into a computer akin to trespassing. If someone simply
- walks across my lawn, I might be upset because they trampled my
- grass, but I would leave it at that. If someone drives across my
- lawn and leaves big trenches, and then comes over and kicks down my
- rosebush, well that's another thing. Then, if someone drives up my
- steps, goes through my house, through my kitchen, steals all my
- silverware, and then leaves, that's something completely different.
- And while these physical representations of trespassing can't be
- applied directly to an electronic format, distinctions are still
- necessary.
-
- ISPNews: And the present computer crime laws do not make these distinctions?
-
- CG: I am no lawyer, but from my understanding they do not. They need to
- be brought into focus.
-
- ISPNews: If they were brought into the kind of focus you suggest, would they
- be fair and equitable?
-
- CG: Definitely, depending on the punishment that went along with them. I
- don't think that people who own and operate computer systems would
- view someone who has logged into their system using a guest account
- that was deliberately left with no password to be as serious an
- intrusion as someone who got the system administrator password and
- then went through and deleted all the files. I don't think that
- simple intrusion would be considered as serious as unauthorized
- penetration along with the wholesale theft and sale to a competitor
- of marketing information, and advertising plans, and financial
- projections for the next quarter.
-
- ISPNews: What are your views on security training for users?
-
- CG: People need to be taught what the computer operating system is and
- how it works. After that, they need to establish some sort of
- channel by which information can be transmitted to others. Direct
- physical contact between communicating parties, covered by official,
- standard company procedures, is the best way to do this.
-
- People need to be aware that their account, no matter the level of
- importance, is a link in a chain that makes up the security of the
- system. Information from one account can be used as a springboard to
- other, more powerful accounts. All users within a network must
- understand that their information is just as important in the
- security chain as is that of the next person.
-
- ISPNews: Given where you are coming from, why should a potential client trust
- you?
-
- CG: I know that is a natural question. Just the very nature of creating
- a company should project an image that we are trying to come out of
- the shadows, out of the underground. We are saying, "Look everybody,
- we've been doing this for a long time, now we want to help. We have
- 11 years of working information about how people compromise existing
- security, and we can help with your particular situation."
-
- ISPNews: I am sure that you understand the natural suspicion that people have.
-
- CG: No, that's what I don't understand. If we at Comsec were out to
- compromise information from an existing company's computer network,
- we wouldn't have incorporated. We could have done that, and someone
- else out there probably has already done so. Then the information
- would be available to from one hacker to another.
-
- ISPNews: Are you suggesting there is no system out there that you can't break
- into?
-
- CG: No, I'm not suggesting that. But I am saying the vast majority can
- be penetrated.
-
- ISPNews: Which system is easiest to crack; and which is most difficult?
-
- CG: It is hard to say which system is more inherently penetrable than
- another. From the initial log-in, it's not the operating system;
- rather it's the system's operating environment that is the problem.
- Users may not have addressed security measures. Certain types of
- security holes may not have been closed. That's where a technical
- background comes into play: to understand the way the applications
- work; how different systems are accessed; to close holes in the
- system which have become apparent. You have to deal with human
- factors and technical issues. You must understand the way the
- computer works and the way programs are run.
-
- ISPNews: What is the best way to foil hackers?
-
- CG: It depends on the hacker. There are different types. Some people
- hack with modems. The casual hacker may just stumble across your
- particular computer system, and may be foiled with something as
- simple as good external security. He may be turned off by physical
- security devices such as a call-back modem, some sort of code access,
- or smart card.
-
- These measures will not stop a serious hacker who is after your
- company specifically. In this case, you have to beef up security,
- and take additional steps to ensure the safety of your computer. And
- you must make certain that security on the inside is as tight as on
- the outside.
-
- ISPN Editor's Note: Chris Goggans will respond, in every other issue of
- ISPNews, to your questions on hacking computer systems.
- His answers promise to be problem-solving, interesting,
- and even entertaining. We invite you to write Chris c/o:
-
- "Hackers' Mailbag"
- ISPNews
- 498 Concord Street
- Framingham, MA 01701-2357
- _______________________________________________________________________________
-
-