home *** CD-ROM | disk | FTP | other *** search
- _______________________________________________________________________________
-
- ==Phrack Inc.==
-
- Volume Four, Issue Forty, File 14 of 14
-
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
- PWN PWN
- PWN Phrack World News PWN
- PWN PWN
- PWN Issue 40 / Part 3 of 3 PWN
- PWN PWN
- PWN Compiled by Datastream Cowboy PWN
- PWN PWN
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
-
-
- Bellcore Threatens 2600 Magazine With Legal Action July 15, 1992
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- THE FOLLOWING CERTIFIED LETTER HAS BEEN RECEIVED BY 2600 MAGAZINE. WE WELCOME
- ANY COMMENTS AND/OR INTERPRETATIONS.
-
- Leonard Charles Suchyta
- General Attorney
- Intellectual Property Matters
-
- Emanuel [sic] Golstein [sic], Editor
- 2600 Magazine
- P.O. Box 752
- Middle Island, New York 11953-0752
-
- Dear Mr. Golstein:
-
- It has come to our attention that you have somehow obtained and published in
- the 1991-1992 Winter edition of 2600 Magazine portions of certain Bellcore
- proprietary internal documents.
-
- This letter is to formally advise you that, if at any time in the future you
- (or your magazine) come into possession of, publish, or otherwise disclose any
- Bellcore information or documentation which either (i) you have any reason to
- believe is proprietary to Bellcore or has not been made publicly available by
- Bellcore or (ii) is marked "proprietary," "confidential," "restricted," or with
- any other legend denoting Bellcore's proprietary interest therein, Bellcore
- will vigorously pursue all legal remedies available to it including, but not
- limited to, injunctive relief and monetary damages, against you, your magazine,
- and its sources.
-
- We trust that you fully understand Bellcore's position on this matter.
-
- Sincerely,
-
-
- LCS/sms
-
-
- LCS/CORR/JUN92/golstein.619
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Emmanuel Goldstein Responds
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~
- The following reply has been sent to Bellcore. Since we believe they have
- received it by now, we are making it public.
-
- Emmanuel Goldstein
- Editor, 2600 Magazine
- PO Box 752
- Middle Island, NY 11953
-
- July 20, 1992
-
- Leonard Charles Suchyta
- LCC 2E-311
- 290 W. Mt. Pleasant Avenue
- Livingston, NJ 07039
-
- Dear Mr. Suchyta:
-
- We are sorry that the information published in the Winter 1991-92 issue of 2600
- disturbs you. Since you do not specify which article you take exception to, we
- must assume that you're referring to our revelation of built-in privacy holes
- in the telephone infrastructure which appeared on Page 42. In that piece, we
- quoted from an internal Bellcore memo as well as Bell Operating Company
- documents. This is not the first time we have done this. It will not be the
- last.
-
- We recognize that it must be troubling to you when a journal like ours
- publishes potentially embarrassing information of the sort described above.
- But as journalists, we have a certain obligation that cannot be cast aside
- every time a large and powerful entity gets annoyed. That obligation compels
- us to report the facts as we know them to our readers, who have a keen interest
- in this subject matter. If, as is often the case, documents, memoranda, and/or
- bits of information in other forms are leaked to us, we have every right to
- report on the contents therein. If you find fault with this logic, your
- argument lies not with us, but with the general concept of a free press.
-
- And, as a lawyer specializing in intellectual property law, you know that you
- cannot in good faith claim that merely stamping "proprietary" or "secret" on a
- document establishes that document as a trade secret or as proprietary
- information. In the absence of a specific explanation to the contrary, we must
- assume that information about the publicly supported telephone system and
- infrastructure is of public importance, and that Bellcore will have difficulty
- establishing in court that any information in our magazine can benefit
- Bellcore's competitors, if indeed Bellcore has any competitors.
-
- If in fact you choose to challenge our First Amendment rights to disseminate
- important information about the telephone infrastructure, we will be compelled
- to respond by seeking all legal remedies against you, which may include
- sanctions provided for in Federal and state statutes and rules of civil
- procedure. We will also be compelled to publicize your use of lawsuits and the
- threat of legal action to harass and intimidate.
-
- Sincerely,
-
- Emmanuel Goldstein
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Exposed Hole In Telephone Network Draws Ire Of Bellcore July 24, 1992
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Taken from Communications Daily (Page 5)
-
- Anyone Can Wiretap Your Phone
-
- Major security hole in telephone network creates "self-serve" monitoring
- feature allowing anyone to listen in on any telephone conversation they choose.
- Weakness involves feature called Busy Line Verification (BLV), which allows
- phone companies to "break into" conversation at any time. BLV is used most
- often by operators entering conversation to inform callers of emergency
- message. But BLV feature can be used by anyone with knowledge of network's
- weakness to set up ad hoc 'wiretap' and monitor conversations, said Emmanuel
- Goldstein, editor of 2600 Magazine, which published article in its Winter 1991
- issue.
-
- 2600 Magazine is noted for finding and exposing weaknesses of
- telecommunications. It's named for frequency of whistle, at one time given
- away with Cap'n Crunch cereal, which one notorious hacker discovered could,
- when blown into telephone receiver, allow access to open 800 line. Phone
- companies have since solved that problem.
-
- Security risks are outlined in article titled "U.S. Phone Companies Face Built-
- In Privacy Hole" that quotes from internal Bellcore memo and Bell Operating Co.
- documents: "'A significant and sophisticated vulnerability' exists that could
- affect the security and privacy of BLV." Article details how, after following 4
- steps, any line is susceptible to secret monitoring. One document obtained by
- 2600 said: "There is no proof the hacker community knows about the
- vulnerability."
-
- When Bellcore learned of article, it sent magazine harsh letter threatening
- legal action. Letter said that if at any time in future magazine "comes into
- possession of, publishes, or otherwise discloses any Bellcore information"
- organization will "vigorously pursue all legal remedies available to it
- including, but not limited to, injunctive and monetary damages." Leonard
- Suchyta, Bellcore General Attorney for Intellectual Property Matters, said
- documents in magazine's possession "are proprietary" and constitute "a trade
- secret" belonging to Bellcore and its members -- RBOCs. He said documents are
- "marked with 'Proprietary' legend" and "the law says you can't ignore this
- legend, its [Bellcore's] property." Suchyta said Bellcore waited so long to
- respond to publication because "I think the article, as we are not subscribers,
- was brought to our attention by a 3rd party." He said this is first time he
- was aware that magazine had published such Bellcore information.
-
- But Goldstein said in reply letter to Bellcore: "This is not the first time we
- have done this. It will not be the last." He said he thinks Bellcore is
- trying to intimidate him, "but they've come up against the wrong publication
- this time." Goldstein insisted that documents were leaked to his magazine:
- "While we don't spread the documents around, we will report on what's contained
- within." Suchyta said magazine is obligated to abide by legend stamped on
- documents. He said case law shows that the right to publish information hinges
- on whether it "has been lawfully acquired. If it has a legend on it, it's sort
- of hard to say it's lawfully acquired."
-
- Goldstein said he was just making public what already was known: There's known
- privacy risk because of BLV weakness: "If we find something out, our first
- instinct is to tell people about it. We don't keep things secret." He said
- information about security weaknesses in phone network "concerns everybody."
- Just because Bellcore doesn't want everyone to know about its shortcomings and
- those of telephone network is hardly reason to stifle that information,
- Goldstein said. "Everybody should know if their phone calls can be listened in
- on."
-
- Suchyta said that to be considered "valuable," information "need not be of
- super, super value," like proprietary software program "where you spent
- millions of dollars" to develop it. He said information "could well be your
- own information that would give somebody an advantage or give them some added
- value they wouldn't otherwise have had if they had not taken it from you."
- Goldstein said he was "sympathetic" to Bellcore's concerns but "fact is, even
- when such weaknesses are exposed, [phone companies] don't do anything about
- them." He cited recent indictments in New York where computer hackers were
- manipulating telephone, exploiting weaknesses his magazine had profiled long
- ago. "Is there any security at all [on the network]?" he said. "That's the
- question we have to ask ourselves."
-
- Letter from Bellcore drew burst of responses from computer community when
- Goldstein posted it to electronic computer conference. Lawyers specializing in
- computer law responded, weighing in on side of magazine. Attorney Lance Rose
- said: "There is no free-floating 'secrecy' right . . . Even if a document says
- 'confidential' that does not mean it was disclosed to you with an understanding
- of confidentiality -- which is the all-important question." Michael Godwin,
- general counsel for Electronic Frontier Foundation, advocacy group for the
- computer community, said: "Trade secrets can qualify as property, but only if
- they're truly trade secrets. Proprietary information can (sort of) qualify as
- property if there's a breach of a fiduciary duty." Both lawyers agreed that
- magazine was well within its rights in publishing information. "If Emmanuel
- did not participate in any way in encouraging or aiding in the removal of the
- document from Bellcore . . . that suggests he wouldn't be liable," Godwin said.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Bellcore And 2600 Dispute Publishing Of Article July 27, 1992
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By Barbara E. McMullen & John F. McMullen (Newsbytes)
-
- MIDDLE ISLAND, NY -- Eric Corley a/k/a "Emmanuel Goldstein", editor and
- publisher of 2600 Magazine: The Hacker Quarterly, has told Newsbytes that he
- will not be deterred by threats from Bellcore from publishing material which he
- considers important for his readership.
-
- Earlier this month, Corley received a letter (addressed to "Emanuel Golstein")
- from Leonard Charles Suchyta, General Attorney, Intellectual Property Matters
- at Bellcore taking issue with the publication by 2600 of material that Suchyta
- referred to as "portions of certain Bellcore proprietary internal documents."
-
- The letter continued "This letter is to formally advise you that, if at any
- time in the future you (or your magazine) come into possession of, publish, or
- otherwise disclose any Bellcore information or documentation which either (i)
- you have any reason to believe is proprietary to Bellcore or has not been made
- publicly available by Bellcore or (ii) is marked "proprietary," "confidential,"
- "restricted," or with any other legend denoting Bellcore's proprietary interest
- therein, Bellcore will vigorously pursue all legal remedies available to it
- including, but not limited to, injunctive relief and monetary damages, against
- you, your magazine, and its sources."
-
- While the letter did not mention any specific material published by 2600,
- Corley told Newsbytes that he believes that Suchyta's letter refers to an
- article entitled "U.S. Phone Companies Face Built-In Privacy Hole".that appears
- on page 42 of the Winter 1991 issue. Corley said "What we published was
- derived from a 1991 internal Bellcore memo as well as Bell Operating Company
- documents that were leaked to us. We did not publish the documents. However,
- we did read what was sent to us and wrote an article based upon that. The
- story focuses on how the phone companies are in an uproar over a 'significant
- and sophisticated vulnerability' that could result in BLV (busy line
- verification) being used to listen in on phone calls."
-
- The 650-word article said, in part, "By exploiting a weakness, it's possible
- to remotely listen in on phone conversations at a selected telephone number.
- While the phone companies can do this any time they want, this recently
- discovered self-serve monitoring feature has created a telco crisis of sorts."
-
- The article further explained how people might exploit the security hole,
- saying "The intruder can listen in on phone calls by following these four
- steps:
-
- "1. Query the switch to determine the Routing Class Code assigned to the BLV
- trunk group.
- "2. Find a vacant telephone number served by that switch.
- "3. Via recent change, assign the Routing Class Code of the BLV trunks to the
- Chart Column value of the DN (directory number) of the vacant telephone
- number.
- "4. Add call forwarding to the vacant telephone number (Remote Call Forwarding
- would allow remote definition of the target telephone number while Call
- Forwarding Fixed would only allow the specification of one target per
- recent change message or vacant line)."
-
- "By calling the vacant phone number, the intruder would get routed to the BLV
- trunk group and would then be connected on a "no-test vertical" to the target
- phone line in a bridged connection."
-
- The article added "According to one of the documents, there is no proof that
- the hacker community knows about the vulnerability. The authors did express
- great concern over the publication of an article entitled 'Central Office
- Operations - The End Office Environment' which appeared in the electronic
- newsletter Legion of Doom/Hackers Technical Journal. In this article,
- reference is made to the 'No Test Trunk'."
-
- The article concludes "even if hackers are denied access to this "feature",
- BLV networks will still have the capability of being used to monitor phone
- lines. Who will be monitored and who will be listening are two forever
- unanswered questions."
-
- Corley responded to to Suchyta's letter on July 20th, saying "I assume that
- you're referring to our revelation of built-in privacy holes in the telephone
- infrastructure which appeared on Page 42. In that piece, we quoted from an
- internal Bellcore memo as well as Bell Operating Company documents. This is
- not the first time we have done this. It will not be the last.
-
- "We recognize that it must be troubling to you when a journal like ours
- publishes potentially embarrassing information of the sort described above.
- But as journalists, we have a certain obligation that cannot be cast aside
- every time a large and powerful entity gets annoyed. That obligation compels
- us to report the facts as we know them to our readers, who have a keen interest
- in this subject matter. If, as is often the case, documents, memoranda, and/or
- bits of information in other forms are leaked to us, we have every right to
- report on the contents therein. If you find fault with this logic, your
- argument lies not with us, but with the general concept of a free press.
-
- "And, as a lawyer specializing in intellectual property law, you know that
- you cannot in good faith claim that merely stamping "proprietary" or "secret"
- on a document establishes that document as a trade secret or as proprietary
- information. In the absence of a specific explanation to the contrary, we must
- assume that information about the publicly supported telephone system and
- infrastructure is of public importance, and that Bellcore will have difficulty
- establishing in court that any information in our magazine can benefit
- Bellcore's competitors, if indeed Bellcore has any competitors.
-
- "If in fact you choose to challenge our First Amendment rights to disseminate
- important information about the telephone infrastructure, we will be compelled
- to respond by seeking all legal remedies against you, which may include
- sanctions provided for in Federal and state statutes and rules of civil
- procedure. We will also be compelled to publicize your use of lawsuits and the
- threat of legal action to harass and intimidate.
-
- Sincerely,
- Emmanuel Goldstein"
-
- Corley told Newsbytes "Bellcore would never have attempted this with the New
- York Times. They think that it would, however, be easy to shut us up by simple
- threats because of our size. They are wrong. We are responsible journalists;
- we know the rules and we abide by them. I will, by the way, send copies of the
- article in question to anyone who request it. Readers may then judge for
- themselves whether any boundaries have been crossed."
-
- Corley, who hosts the weekly "Off the Hook" show on New York City's WBAI radio
- station, said that he had discussed the issue on the air and had received
- universal support from his callers. Corley also told Newsbytes, that, although
- he prefers to be known by his nomme de plume (taken from George Orwell's
- 1984), he understands that the press fells bound to use his actual name. He
- said that, in the near future, he will "end the confusion by having my name
- legally changed."
-
- Bellcore personnel were unavailable for comment on any possible response to
- Corley's letter.
- _______________________________________________________________________________
-
- Interview With Ice Man And Maniac July 22, 1992
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By Joshua Quittner (New York Newsday)(Page 83)
-
- Ice Man and Maniac are two underground hackers in the New England area that
- belong to a group known as Micro Pirates, Incorporated. They agreed to be
- interviewed if their actual identities were not revealed.
-
- [Editor's Note: They are fools for doing this, especially in light of how
- Phiber Optik's public media statements and remarks will
- ultimately be used against him.]
-
- Q: How do you define computer hacking?
-
- Maniac: Hacking is not exploration of computer systems. It's more of an
- undermining of security. That's how I see it.
-
- Q: How many people are in your group, Micro Pirates Incorporated?
-
- Ice Man: Fifteen or 14.
-
- Maniac: We stand for similar interests. It's an escape, you know. If I'm not
- doing well in school, I sit down on the board and talk to some guy in
- West Germany, trade new codes of their latest conquest. Escape.
- Forget about the real world.
-
- Ice Man. It's more of a hobby. Why do it? You can't exactly stop. I came
- about a year-and-a-half ago, and I guess you could say I'm one of the
- ones on a lower rung, like in knowledge. I do all the -- you wouldn't
- call it dirty work -- phone calls. I called you -- that kind of
- thing.
-
- Q: You're a "social engineer"?
-
- Ice Man: Social engineering -- I don't know who coined the term. It's using
- conversation to exchange information under false pretenses. For
- example, posing as a telecommunications employee to gain more
- knowledge and insight into the different [phone network] systems.
-
- Q: What social engineering have you done?
-
- Maniac: We hacked into the system that keeps all the grades for the public
- school system. It's the educational mainframe at Kingsborough
- Community College. But we didn't change anything.
-
- Ice Man: They have the mainframe that stores all the schedules, Regents scores,
- ID numbers of all the students in the New York high school area. You
- have to log in as a school, and the password changes every week.
-
- Q: How did you get the password?
-
- Ice Man: Brute force and social engineering. I was doing some social
- engineering in school. I was playing the naive person with an
- administrator, asking all these questions toward what is it, where is
- it and how do you get in.
-
- Q: I bet you looked at your grades. How did you do?
-
- Ice Man: High 80s.
-
- Q. And you could have changed Regents scores?
-
- Ice Man: I probably wouldn't have gotten away with it, and I wouldn't say I
- chose not to on a moral basis. I'd rather say on a security basis.
-
- Q: What is another kind of social engineering?
-
- Maniac: There's credit-card fraud and calling-card fraud. You call up and
- say, "I'm from the AT&T Corporation. We're having trouble with your
- calling-card account. Could you please reiterate to us your four-
- digit PIN number?" People, being kind of God-fearing -- as AT&T is
- somewhat a God -- will say, "Here's my four-digit PIN number."
-
- Q: Hackers from another group, MOD, were arrested recently and charged with,
- among other things, selling inside information about how to penetrate
- credit bureaus. Have you cleaned up your act?
-
- Maniac: We understand the dangers of it now. We're not as into it. We
- understand what people go through when they find out a few thousand
- dollars have been charged to their credit-card account.
-
- Q: Have you hacked into credit bureaus?
-
- Ice Man: We were going to look up your name.
-
- Maniac: CBI [Credit Bureau International, owned by Equifax, one of the largest
- national credit bureaus], is pretty insecure, to tell you the truth.
-
- Q: Are you software pirates, too?
-
- Maniac: Originally. Way back when.
-
- Ice Man: And then we branched out and into the hacking area. Software piracy
- is, in the computer underground, the biggest thing. There are groups
- like THG and INC, which are international. THG is The Humble Guys.
- INC is International Network of Crackers, and I've recently found out
- that it's run by 14 and 15-year-olds. They have people who work in
- companies, and they'll take the software and they'll crack it -- the
- software protection -- and then distribute it.
-
- Q: Are there many hacking groups in New York?
-
- Maniac: Three or four. LOD [the Legion of Doom, named by hacker Lex Luthor],
- MOD, MPI and MOB [Men of Business].
-
- Q: How do your members communicate?
-
- Ice Man: The communication of choice is definitely the modem [to access
- underground electronic bulletin boards where members leave messages
- for each other or "chat" in real time]. After that is the voice mail
- box [VMB]. VMBs are for communications between groups.
-
- A company, usually the same company that has beepers and pagers and
- answering services, has a voice-mail-box service. You call up [after
- hacking out an access code that gives the user the ability to create
- new voice mail boxes on a system] and can enter in a VMB number.
- Occasionally they have outdial capabilities that allow you to call
- anywhere in the world. I call about five every day. It's not really
- my thing.
-
- Q: Is your group racially integrated?
-
- Ice Man: Half of them are Asian. Also we have, I think, one Hispanic. I never
- met him. Race, religion -- nobody cares. The only thing that would
- alienate you in any way would be if you were known as a lamer. If you
- just took, took, took and didn't contribute to the underground. It's
- how good you are, how you're respected.
-
- Maniac: We don't work on a racial basis or an ethnic basis. We work on a
- business basis. This is an organized hobby. You do these things for
- us and you get a little recognition for it.
-
- Ice Man: Yeah. If you're a member of our group and you need a high-speed
- modem, we'll give you one, on a loan basis.
-
- Q: How does somebody join MPI?
-
- Maniac: They have to contact either of us on the boards.
-
- Ice Man: And I'll go through the whole thing [with them], validating them,
- checking their references, asking them questions, so we know what
- they're talking about. And if it's okay, then we let them in. We
- have members in 516, 718, 212, 201, 408, and 908. We're talking to
- someone in Florida, but he's not a member yet.
-
- Q: Are any MPI members in other hacking groups?
-
- Ice Man: I know of no member of MPI that is in any other group. I wouldn't
- call it betrayal, but it's like being in two secret clubs at one time.
- I would want them faithful to my group, not any other group. There is
- something called merging, a combination of both groups that made them
- bigger and better. A lot of piracy groups did that.
-
- Q: Aren't you concerned about breaking the law?
-
- Maniac: Breaking the law? I haven't gotten caught. If I do get caught, I
- won't be stupid and say I was exploring -- I'm not exploring. I'm
- visiting, basically. If you get caught, you got to serve your time.
- I'm not going to fight it.
- _______________________________________________________________________________
-
- FBI Unit Helps Take A Byte Out Of Crime July 15, 1992
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By Bill Gertz (The Washington Times)(Page A4)
-
- FBI crime busters are targeting elusive computer criminals who travel the world
- by keyboard, telephone and computer screen and use such code names as "Phiber
- Optik," "Masters of Disaster," "Acid Phreak" and "Scorpion."
-
- "Law enforcement across the board recognizes that this is a serious emerging
- crime problem, and it's only going to continue to grow in the future," said
- Charles L. Owens, chief of the FBI's economic crimes unit.
-
- Last week in New York, federal authorities unsealed an indictment against five
- computer hackers, ages 18 to 22, who were charged with stealing long-distance
- phone service and credit bureau information and who penetrated a wide variety
- of computer networks.
-
- The FBI is focusing its investigations on major intrusions into banking and
- government computers and when the objective is stealing money, Mr. Owens said
- in an interview.
-
- FBI investigations of computer crimes have doubled in the past year, he said,
- adding that only about 11 percent to 15 percent of computer crimes are reported
- to law enforcement agencies. Because of business or personal reasons, victims
- often are reluctant to come forward, he said.
-
- Currently, FBI agents are working on more than 120 cases, including at least
- one involving a foreign intelligence agency. Mr. Owens said half of the active
- cases involve hackers operating overseas, but he declined to elaborate.
-
- The FBI has set up an eight-member unit in its Washington field office devoted
- exclusively to solving computer crimes.
-
- The special team, which includes computer scientists, electrical engineers and
- experienced computer system operators, first handled the tip that led to the
- indictment of the five hackers in New York, according to agent James C. Settle,
- who directs the unit.
-
- Computer criminals, often equipped with relatively unsophisticated Commodore 64
- or Apple II computers, first crack into international telephone switching
- networks to make free telephone calls anywhere in the world, Mr. Settle said.
-
- Hackers then can spend up to 16 hours a day, seven days a week, breaking into
- national and international computer networks such as the academic-oriented
- Internet, the National Aeronautics and Space Administration's Span-Net and the
- Pentagon's Milnet.
-
- To prevent being detected, unauthorized computer users "loop and weave" through
- computer networks at various locations in the process of getting information.
-
- "A lot of it is clearly for curiosity, the challenge of breaking into systems,"
- Mr. Settle said. "The problem is that they can take control of the system."
-
- Also, said Mr. Owens, computer hackers who steal such information from
- commercial data banks may turn to extortion as a way to make money.
-
- Mr. Settle said there are also "indications" that computer criminals are
- getting involved in industrial espionage.
-
- The five hackers indicted in New York on conspiracy, computer-fraud, computer
- tampering, and wire-fraud charges called themselves "MOD," for Masters of
- Deception or Masters of Disaster.
-
- The hackers were identified in court papers as Julio Fernandez, 18, John Lee,
- 21, Mark Abene, 20, Elias Ladopoulos, 22, and Paul Stira, 22. All live in the
- New York City area.
-
- Mr. Fernandez and Mr. Lee intercepted data communications from a computer
- network operated by the Bank of America, court papers said.
-
- They also penetrated a computer network of the Martin Marietta Electronics
- Information and Missile Group, according to the court documents.
-
- The hackers obtained personal information stored in credit bureau computers,
- with the intention of altering it "to destroy people's lives or make them look
- like saints," the indictment stated.
- _______________________________________________________________________________
-
- And Today's Password Is... May 26, 1992
- ~~~~~~~~~~~~~~~~~~~~~~~~~~
- By Robert Matthews (The Daily Telegraph)(page 26)
-
- "Ways Of Keeping Out The Determined Hacker"
-
- One of the late Nobel Prize-winning physicist Richard Feynman's favorite
- stories was how he broke into top-secret atomic bomb files at Los Alamos by
- guessing that the lock combination was 271828, the first six digits of the
- mathematical constant "e". Apart from being amusing, Feynman's anecdote stands
- as a warning to anyone who uses dates, names or common words for their computer
- password.
-
- As Professor Peter Denning, of George Mason University, Virginia, points out in
- American Scientist, for all but the most trivial secrets, such passwords simply
- aren't good enough. Passwords date back to 1960, and the advent of time-
- sharing systems that allowed lots of users access to files stored on a central
- computer. It was not long before the standard tricks for illicitly obtaining
- passwords emerged: Using Feynman-style educated guessing, standing behind
- computer users while they typed in their password or trying common system
- passwords like "guest" or "root". The biggest security nightmare is, however,
- the theft of the user-password file, which is used by the central computer to
- check any password typed in.
-
- By the mid-1970s, ways of tackling this had been developed. Using so-called
- "one-way functions", each password was encrypted in a way that cannot be
- unscrambled. The password file then contains only apparently meaningless
- symbols, of no obvious use to the would-be hacker. But, as Denning warns, even
- this can be beaten if passwords are chosen sloppily. Instead of trying to
- unscramble the file, hackers can simply feed common names and dates -- or even
- the entire English dictionary -- through the one-way function to see if the end
- result matches anything on the scrambled password file. Far from being a
- theoretical risk, this technique was used during the notorious Project
- Equalizer case in 1987, when KGB-backed hackers in Hanover broke the passwords
- of Unix-based computers in America.
-
- Ultimately, the only way to solve the password problem is to free people of
- their fear of forgetting more complex ones. The long-term solution, says
- Denning, probably lies with the use of smart-card technology. One option is a
- card which generates different passwords once a minute, using a formula based
- on the time given by an internal clock. The user then logs on using this
- password. Only if the computer confirms that the password corresponds to the
- log-on time is the user allowed to continue. Another smart-card technique is
- the "challenge-response" protocol. Users first log on to their computer under
- their name, and are then "challenged" by a number appearing on the screen.
- Keying this into their smart card, a "response number" is generated by a
- formula unique to each smart card. If this number corresponds to the response
- expected from a particular user's smart card, the computer allows access. A
- number of companies are already marketing smart-card systems, although the
- technology has yet to become popular.
-
- In the meantime, Denning says that avoiding passwords based on English words
- would boost security. He highlights one simple technique for producing non-
- standard words that are nonetheless easy to remember: "Pass-phrases". For
- this, one merely invents a nonsensical phrase like "Martin says Unix gives gold
- forever", and uses the first letter of each word to generate the password:
- MSUGGF. Such a password will defeat hackers, even if the password file is
- stolen, as it does not appear in any dictionary. However, Denning is wary of
- giving any guarantees. One day, he cautions, someone may draw up a
- computerized dictionary of common phrases. "The method will probably be good
- for a year or two, until someone who likes to compile these dictionaries starts
- to attack it."
- _______________________________________________________________________________
-
- Outgunned "Computer Cops" Track High-Tech Criminals June 8, 1992
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By Tony Rogers (Associated Press)
-
- BOSTON -- The scam was simple. When a company ordered an airline ticket on its
- credit card, a travel agent entered the card number into his computer and
- ordered a few extra tickets.
-
- The extra tickets added up and the unscrupulous agent sold them for thousands
- of dollars.
-
- But the thief eventually attracted attention and authorities called in Robert
- McKenna, a prosecutor in the Suffolk County district attorney's office. He is
- one of a growing, but still outgunned posse of investigators who track high-
- tech villains.
-
- After the thief put a ticket to Japan on a local plumbing company's account, he
- was arrested by police McKenna had posing as temporary office workers. He was
- convicted and sentenced to a year in prison.
-
- But the sleuths who track high-tech lawbreakers say too many crimes can be
- committed with a computer or a telephone, and too few detectives are trained to
- stop them.
-
- "What we've got is a nuclear explosion and we're running like hell to escape
- the blast. But it's going to hit us," said Chuck Jones, who oversees high-tech
- crime investigations at the California Department of Justice.
-
- The problem is, investigators say, computers have made it easier to commit
- crimes like bank fraud. Money transfers that once required signatures and
- paperwork are now done by pressing a button.
-
- But it takes time to train a high-tech enforcer.
-
- "Few officers are adept in investigating this, and few prosecutors are adept
- in prosecuting it," Jones said.
-
- "You either have to take a cop and make him a computer expert, or take a
- computer expert and make him a cop. I'm not sure what the right approach is."
-
- In recent high-tech crimes:
-
- - Volkswagen lost almost $260 million because of an insider computer scam
- involving phony currency exchange transactions.
-
- - A former insurance firm employee in Fort Worth, Texas, deleted more than
- 160,000 records from the company's computer.
-
- - A bank employee sneaked in a computer order to Brinks to deliver 44
- kilograms of gold to a remote site, collected it, then disappeared.
-
- Still, computer cops have their successes.
-
- The Secret Service broke up a scheme to make counterfeit automatic teller
- machine cards that could have netted millions.
-
- And Don Delaney, a computer detective for the New York State Police, nabbed
- Jaime Liriano, who cracked a company's long-distance phone system.
-
- Many company phone systems allow employes to call an 800 number, punch in a
- personal identification number and then make long-distance calls at company
- expense.
-
- Some computer hackers use automatic speed dialers -- known as "demon dialers"
- -- to dial 800 numbers repeatedly and try different four-digit numbers until
- they crack the ID codes. Hackers using this method stole $12 million in phone
- service from NASA.
-
- Liriano did it manually, calling the 800 number of Data Products in
- Wallingford, Connecticut, from his New York City apartment. He cracked the
- company's code in two weeks.
-
- Liriano started selling the long distance service -- $10 for a 20-minute call
- anywhere -- and customers lined up inside his apartment.
-
- But Delaney traced the calls and on March 10, he and his troopers waited
- outside Liriano's apartment. On a signal from New York Telephone, which was
- monitoring Liriano's line, the troopers busted in and caught him in the act.
-
- Liriano pleaded guilty to a misdemeanor of theft of services, and was
- sentenced to three years' probation and community service.
-
- Data Products lost at least $35,000. "And we don't know what he made,"
- Delaney said of Liriano.
- _______________________________________________________________________________
-
- Who Pays For Calls By Hackers? June 12, 1992
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By Kent Gibbons (The Washington Times)(Page C1)
-
- ICF International Inc. doesn't want to pay $82,000 for unauthorized calls by
- hackers who tapped the company's switchboard.
-
- AT&T says the Fairfax engineering firm owns the phone system and is responsible
- for the calls, mostly to Pakistan.
-
- Now their dispute and others like it are in Congress' lap. A House
- subcommittee chairman believes a law is needed to cap the amount a company can
- be forced to pay for fraudulent calls, the same way credit card users are
- protected.
-
- Edward Markey, the Massachusetts Democrat who held hearings on the subject
- said long-distance carriers and local telephone companies should absorb much of
- those charges.
-
- Victims who testified said they didn't know about the illegal calls until the
- phone companies told them, sometimes weeks after strange calling patterns
- began. But since the calls went through privately owned switchboards before
- entering the public telephone network, FCC rules hold the switchboard owners
- liable.
-
- "This is one of the ongoing dilemmas caused by the breakup of AT&T," Mr. Markey
- said. Before the 1984 Bell system breakup, every stage of a call passed
- through the American Telephone & Telegraph Co. network and AT&T was liable for
- fraudulent calls.
-
- Estimates of how much companies lose from this growing form of telephone fraud
- range from $300 million to more than $2 billion per year.
-
- The range is so vast because switchboard makers and victims often don't report
- losses to avoid embarrassment or further fraud, said James Spurlock of the
- Federal Communications Commission.
-
- Long-distance carriers say they have stepped up their monitoring of customer
- calls to spot unusual patterns such as repeated calls to other countries in a
- short period. In April, Sprint Corp. added other protective measures,
- including, for a $100 installation charge and $100 monthly fee, a fraud
- liability cap of $25,000 per incident.
-
- AT&T announced a similar plan last month.
-
- Robert Fox, Sprint assistant vice president of security, said the new plans cut
- the average fraud claim from more than $20,000 in the past to about $2,000
- during the first five months of this year.
-
- But the Sprint and AT&T plans don't go far enough, Mr. Markey said.
-
- ICF's troubles started in March 1988. At the time, the portion of ICF that was
- hit by the fraud was an independent software firm in Rockville called Chartways
- Technologies Inc. ICF bought Chartways in April 1991.
-
- As with most cases of fraud afflicting companies with private phone systems,
- high-tech bandits broke into the Chartways switchboard using a toll-free number
- set up for the company's customers.
-
- Probably aided by a computer that randomly dials phone numbers, the hackers
- got through security codes to obtain a dial tone to make outside calls.
-
- The hackers used a fairly common feature some companies offer out-of-town
- employees to save on long-distance calls. Ironically, Chartways never used the
- feature because it was too complicated, said Walter Messick, ICF's manager of
- contract administration.
-
- On March 31, AT&T officials told Chartways that 757 calls were made to Pakistan
- recently, costing $42,935.
-
- The phone bill arrived later that day and showed that the Pakistan calls had
- begun 11 days before, Mr.Messick said.
-
- Because of the Easter holiday and monitoring of calls by Secret Service agents,
- ICF's outside-calling feature was not disconnected until April 4. By then, ICF
- had racked up nearly $82,000 in unauthorized calls.
-
- A year ago, the FCC's Common Carrier Bureau turned down ICF's request to erase
- the charges. The full commission will hear an appeal this fall.
- _______________________________________________________________________________
-
- Dutch Hackers Feel Data Security Law Will Breed Computer Crime July 7, 1992
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By Oscar Kneppers (ComputerWorld Netherland)
-
- HAARLEM, the Netherlands -- Dutch hackers will be seriously reprimanded for
- breaking and entering computer systems, if a new law on computer crime is
- passed in the Netherlands.
-
- Discussed recently in Dutch parliament and under preparation for more than two
- years, the proposed law calls hacking "a crime against property." It is
- expected to be made official in next spring at the earliest and will consist of
- the following three parts:
-
- - The maximum penalty for hackers who log on to a secured computer system
- would be six months' imprisonment.
-
- - If they alter data in the system, they could spend up to four years in
- prison.
-
- - Those who illegally access a computer system that serves a "common use" --
- like that in a hospital or like a municipal population database -- could soon
- risk a prison sentence of six years.
-
- This pending law does not differentiate between computer crimes committed
- internally or externally from an office. For example, cracking the password of
- a colleague could lead to prosecution.
-
- Hackers believe this law will only provoke computer crime, because the hackers
- themselves will no longer offer "cheap warnings" to a computer system with poor
- security.
-
- Rop Gonggrijp, who is sometimes called the King of Hacking Holland, and is
- currently editor-in-chief of Dutch computer hacker magazine "Hack-tic" warns
- that this law could produce unexpected and unwanted results.
-
- "Students who now just look around in systems not knowing that it [this
- activity] is illegal could then suddenly end up in jail," he said. Gonggrijp
- equates hacking to a big party, where you walk in uninvited.
-
- Gonggrijp is concerned about the repercussions the new law may have on existing
- hackers. He said he thinks the current relationship between computer hackers
- and systems managers in companies is favorable. "[Hackers] break into, for
- example, an E-mail system to tell the systems manager that he has to do
- something about the security. If this law is introduced, they will be more
- careful with that [move]. The cheap warning for failures in the system will,
- therefore, no longer take place, and you increase chances for so-called real
- criminals with dubious intentions," he added.
-
- According to a spokesman at the Ministry of Justice in The Hague, the law gives
- the Dutch police and justice system a legal hold on hackers that they currently
- lack.
-
- "Computer criminals [now] have to be prosecuted via subtle legal tricks and
- roundabout routes. A lot of legal creativity was [previously] needed. But
- when this law is introduced, arresting the hackers will be much easier," he
- said.
-
- The Dutch intelligence agency Centrale Recherche Informatiedienst (CRI) in The
- Hague agreed with this. Ernst Moeskes, CRI spokesman, said, "It's good to see
- that we can handle computer crime in a directed way now."
- _______________________________________________________________________________
-
- PWN Quicknotes
- ~~~~~~~~~~~~~~
- 1. Printer Avoids Jail In Anti-Hacking Trial (By Melvyn Howe, Press
- Association Newsfile, June 9, 1992) -- A printer avoided a jail sentence
- in Britain's first trial under anti-hacking legislation. Freelance
- typesetter Richard Goulden helped put his employers out of business with a
- pirate computer program -- because he said they owed him L2,275 in back
- pay. Goulden, 35, of Colham Avenue, Yiewsley, west London, was
- conditionally discharged for two years after changing his plea to guilty on
- the second day of the Southwark Crown Court hearing. He was ordered to pay
- L1,200 prosecution costs and L1,250 compensation to the company's
- liquidators. Goulden had originally denied the charge of unauthorized
- modification of computer material under the 1990 Computer Misuse Act.
- After his change of plea Judge John Hunter told him: "I think it was plain
- at a very early stage of these proceedings that you had no defence to this
- allegation." Mr. Warwick McKinnon, prosecuting, told the jury Goulden added
- a program to a computer belonging to Ampersand Typesetters, of Camden,
- north-west London, in June last year which prevented the retrieval of
- information without a special password. Three months later the company
- "folded". Mr Jonathan Seitler, defending, said Goulden had changed his
- plea after realizing he had inadvertently broken the law.
- _______________________________________________________________________________
-
- 2. ICL & GM Hughes In Joint Venture To Combat Computer Hackers (Extel Examiner,
- June 15, 1992) -- General Motors Corporation unit, Hughes STX, and ICL have
- set up a joint venture operation offering ways of combating computer
- hackers. Hughes STX is part of GM's GM Hughes Electronics Corporation
- subsidiary. ICL is 80% owned by Fujitsu. Industry sources say the venture
- could reach $100 million in annual sales within four years.
- _______________________________________________________________________________
-
- 3. Another Cornell Indictment (Ithaca Journal, June 17, 1992) -- Mark Pilgrim,
- David Blumenthal, and Randall Swanson -- all Cornell students -- have each
- been charged with 4 felony counts of first-degree computer tampering, 1
- count of second-degree computer tampering, and 7 counts of second-degree
- attempted computer tampering in connection with the release of the MBDF
- virus to the Internet and to various BBSs.
-
- David Blumenthal has also been charged with two counts of second-degree
- forgery and two counts of first-degree falsifying business records in
- connection with unauthorized account creation on Cornell's VAX5 system. He
- was also charged with a further count of second-degree computer tampering
- in connection with an incident that occurred in December of 1991.
- _______________________________________________________________________________
-
- 4. Computer Watchdogs Lead Troopers To Hacker (PR Newswire, July 17, 1992) --
- Olympia, Washington -- State Patrol detectives served a search warrant at an
- East Olympia residence Thursday evening, July 16, and confiscated a personal
- computer system, programs and records, the Washington State Patrol said.
-
- The resident, who was not on the premises when the warrant was served, is
- suspected of attempts to break into computer files at the Department of
- Licensing and the State Insurance Commissioner's office.
-
- The "hacker's" attempts triggered computerized security devices which
- alerted officials someone was attempting to gain access using a telephone
- modem. Patrol detectives and computer staff monitored the suspect's
- repeated attempts for several weeks prior to service of the warrant.
-
- Placement of a telephone call by a non-recognized computer was all that was
- required to trigger the security alert. The internal security system then
- stored all attempted input by the unauthorized user for later retrieval and
- use by law enforcement. Integrity of the state systems was not breached.
-
- The investigation is continuing to determine if several acquaintances may be
- linked to the break in. Charges are expected to be filed as early as next
- week in the case.
-
- CONTACT: Sgt. Ron Knapp of the Washington State Patrol, (206)459-6413
- _______________________________________________________________________________
-
- 5. UPI reports that the 313 NPA will split to a new 810 NPA effective
- August 10, 1994.
-
- Oakland, Macomb, Genesee, Lapeer, St. Clair and Sanilac counties as well as
- small sections of Saginaw, Shiawassee and Livingston counties will go into
- 810. Wayne, Washtenaw, Monroe, and small parts of Jackson and Lenawee
- counties will remain in 313. The city of Detroit is in Wayne County and
- won't change.
- _______________________________________________________________________________
-