home *** CD-ROM | disk | FTP | other *** search
-
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Four, File 5 of 27
-
- ****************************************************************************
-
- Computer Cop Prophile
-
- by The Grimmace
-
-
-
- The following file is something I thought of and did
- a LOT of research on before writing. It's something that
- I haven't seen in PHRACK and I've been a devout fan of
- this zine since the beginning.
-
- The "PHRACK PROPHILES" on hackers and phreakers give
- readers an insight into the movers and shakers of the P/H
- world, but how about a profile or profiles on the
- anti-hacker/phreaker establishment that seems to be
- growing by leaps and bounds lately?
-
- In the past years we've seen cops and feds who know
- nothing about computers and/or telephone systems bungle their
- way through search warrants and arrests and have had some good
- laughs at their expense. But now it seems that the "computer
- cops", the feds especially, are putting a big push on training
- agents in the "tricks of the trade" and their conviction rate
- is getting better.
-
- The primary source of this training is the Federal Law
- Enforcement Training Center in Glynco, Georgia, where they're
- teaching computer seizure and analysis techniques,
- computer-targeted search warrants, and telecommunications fraud
- investigations. (They're very accommodating about giving out
- information on the phone as long as you tell them you're a
- cop). The FBI Academy in Quantico also has a computer crimes
- course.
-
- On the technical side of things, there's an organization
- called IACIS which stands for the International Association
- of Computer Investigative Specialists based in Portland,
- Oregon, and which consists of members of both local law
- enforcement agencies nationwide as well as various and
- sundry federal agencies. This group teaches and certifies
- cops in how to get evidence from computer systems that can't be
- attacked in court (Of course, anything CAN be attacked, but
- getting the evidence squashed is not always a sure thing unless
- the judge is a computerphobe).
-
- As much satisfaction as we've gained at the expense of
- the US Secret Service from the Steve Jackson Games case, it's
- widely publicized problems may prove to be a double-edged sword
- hanging over our heads. Law enforcement learned a LOT of lessons
- from mistakes made in that investigation.
-
- Like most of you, I've spent a lot of years
- exploring computer systems (usually those belonging to others)
- and personally feel that I've done nothing wrong (know the
- feeling?). I'm sure others across the country also can
- conduct a little socially-engineered reconnaissance and
- get the lowdown on some of the people we NEVER want to see
- knocking on our doors with a sledge hammer in the middle of the
- night.
-
- This profile contains information on the ONLY computer
- crime cop I could identify in the Louisville/Jefferson County
- area after calling all the major departments posing as a writer
- for a law enforcement magazine doing a survey. Information
- about him was obtained not only from his department, but from
- sources in the local and federal court systems, Ma Bell
- Security, and the Federal Law Enforcement Training Center. Lt.
- Baker is *not* a potential donor to the CPSR or EFF to say the
- least.
-
- I'm currently compiling similar information on other
- law enforcement types in the Secret Service, Columbus Ohio PD,
- Dallas PD, Georgia Bureau of Investigation and members of Ma
- Bell's Data Security Group in Atlanta. Baker was just the
- closest to me so I started with him. If I can get the
- information I've requested, then future submissions will
- also include lesson plans furnished by FLETC on their training
- courses and analysis protocols suggested by the USSS...heh...heh.
-
- Yours,
-
- The Grimmace
-
-
- *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
- COMPUTER-COP PROFILE I
-
- LT. BILL BAKER
-
- JEFFERSON COUNTY POLICE DEPARTMENT
- LOUISVILLE, KENTUCKY
-
-
- INFORMATION COMPILED BY:
-
- ** THE GRIMMACE **
-
- *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
-
-
- NAME: Bill Baker
- RANK: Lieutenant
-
- AGENCY: Jefferson County Police Department
- 768 Barret Ave.
- Louisville, Kentucky 40204
-
- AGE: 43
- YEARS OF COMPUTER EXP: 13
-
- YEARS AS A COP: 18
- YEARS IN COMPUTER/
- TELECOM CRIME: 8
-
- TRAINING: Federal Law Enforcement Training Ctr.
- Glynco, Ga.
- - Telecommunications Crime
- Telecom Fraud
- Cellular Fraud
- PBX Fraud
- - Computer Crime
- Illegal Access Crimes
- Computer Crime Inves.
- Seized System Analysis
-
- FBI Academy
- Quantico, Va.
- - Computers in Narcotics Investigations
- - Computer Crime Investigations
-
- National Intelligence Academy
- Ft. Lauderdale, Fl.
- - Supervising Intelligence Operations
- Surveillance Techniques
- Electronic Tracking
- Electronic Eavesdroping
- Video Evidence Techniques
- - Telephone Systems
- Wiretaps
- Dialed Number Recorders
- Pager/Fax Intercepts
- Technical Telephony Course
-
- PREVIOUS ASSIGNMENTS: Patrol
- Criminal Investigations/Burglary
- Criminal Investigations/Homicide
- Crime Prevention
- Special Investigations/Vice-Intel
-
- MEMBER: Communications Fraud Control Association
- Washington, D.C.
-
- PUBLICATIONS: Various computer/telecommunications
- crime oriented articles for assorted
- law enforcement and computer industry
- magazines (i.e., POLICE CHIEF, DATA TODAY)
-
-
- Posing as a freelance writer from the "Law Enforcement
- Journal", I made calls to local police agencies all over this
- area asking about their Computer Crime Units and received
- replies ranging from "What are you talking about?" to "Maybe
- FRAUD handles that...hey, Charlie...do the FRAUD guys do
- anything with compoooters?". So much for the Louisville
- Division of Police...no fear there, right?
-
- But I decided to push on since Louisville, though not a
- hotbed of phreakers/hackers, IS the latest home of TAP MAGAZINE
- (a la Blitzkrieg BBS and the Predat0r) and has a smattering of
- "hometown" folks engaged in less than legal activities through
- the local phone lines.
-
- The call made to the Jefferson County Police got me a
- solid response of "You'll have to talk to Lt. Bill Baker. Hey,
- Charlie, where's Lt. Baker working now?" (This guy is so low
- key his own department doesn't even know where he works!) They
- finally decide he's someplace called "Adam Station" and
- through "various" contacts and a friendly local attorney who
- rarely pays for telephone calls himself, I managed to obtain
- quite a bit of information about Lt. Baker and his obviously
- misguided quest.
-
- Lt. Baker is fairly typical of the "new breed" of
- high-tech investigator currently being churned out by the
- various federal training schools. He's aggressive and, from
- talking to other members of his department, thought of as a
- "computer weenie" who was probably a hacker himself before he
- embraced the "dark side" of "the FORCE". (I personally believe
- that this may be more fact than fantasy after talking to him on
- the phone since he seems to know more about phreaking and
- hacking than one would think would be taught in the
- aforementioned federal institutes of higher learning.)
-
- I finally managed to speak with Lt. Baker on the phone
- and gave him my "writing about computer crime" rap which he
- bought with little suspicion. The following are excerpts from
- the recording I made of the conversation [comments in brackets
- are mine]:
-
- TG: How would you rate the progress of computer and
- telecommunications crime investigations in this area?
-
- Baker: There have been some good cases made here, but there's
- still a long way to go. The main problem is that there
- hasn't been a push from local businesses in this area to combat
- these types of crimes. Most of'em don't want to admit they've
- been hit from the outside. If there's no complaints,
- then the departments aren't likely to want to spend the money
- to dig up additional crime, right?
-
- TG: Of the hackers you've worked on, what kind of capabilities
- do they have and how good do you think they are?
-
- Baker: Well, hackers and phreaks are like any other cross-section
- of a criminal group...there are some that are very good
- and some that are pitiful. The best thing you can say
- about working hacker/phreaker cases is that a lot of them
- catch themselves. They have huge egos and tend to brag
- a good deal about what they've done and how they did it.
-
- TG: Does that mean that you don't think a computer crime
- investigator has to be as good as the criminals
- he chases...I mean, because a lot of these people leave
- so many clues behind? How would you rate your ability
- in this field?
-
- Baker: Nope...not at all. I think that as technology gets better
- so will the crooks. Let's keep the record straight here.
- Sure, there are bozos out there who read a how-to file in
- an old PHRACK and decide that they have the knowledge
- they need to nuke the phone company or ride a VAX like
- a Hell's Angel rides a Harley. Those are the easy ones.
- The ones who -write- [author's emphasis] the technical
- articles in PHRACK are the ones to worry about. There
- are some stomp-down [??] incredibly knowledgeable
- individuals in circulation blasting away with their modems
- at any target of opportunity.
-
- TG: You didn't mention your own ability for investigating
- these people.
-
- Baker: (Laughs) Yeah, well...let's say I know enough to get by
- and am smart enough to know that there are no absolute
- experts.
-
- TG: How would you comment on the Steve Jackson Games case?
- Do you think the Secret Service set a lot of bad
- precedents?
-
- Baker: (Laughs) Noooooooo....sorry, pal. That's been jawed to death
- in every phreak/hack mag, legal journal, and Internet
- newsgroup in existence and I'm not about to stick my
- neck out on that one, OK? I will say that everyone learned
- a lot from that case and I seriously doubt if you'll see the
- same set of problems reoccurring in future cases. Maybe
- the CSPR or EFF hired guns can come up with a new group
- of loopholes, in which case we'll have to find new ways
- to circumvent those attacks.
-
- TG: You sound a little critical of the EFF and CSPR efforts
- in their defense of so-called "computer criminals".
-
- Baker: Well, I'm sure that they believe in what they're doing.
- They must to invest that much cash and energy. But I
- think there has to be some middle ground agreed upon
- rather than just whining about "all information should
- be free" and "if I can get into your system then I should
- be allowed to look around". I'm not going to launch into
- a diatribe on organizations that I don't agree with. I'm
- simply going to work harder at dotting every "i" and
- crossing every "t" to make my cases more secure. Stealing
- telephone service is a crime, defrauding businesses is a
- crime, gaining unauthorized access into someone else's
- computer system is, in most states, a crime, and even if
- there's no law on the books making it a crime, it's
- wrong.
-
- TG: Since by your own statement, you feel that high-tech
- crime investigation is still in its infancy, what groups
- or organizations would you say are in the lead in trying
- to combat this type of crime?
-
- Baker: The most significant two I know are the Federal Law
- Enforcement Training Center in Glynco, Georgia, and the
- Communications Fraud Control Association based out of
- Washington, D.C. FLETC [he pronounces it FLET-SEE]
- probably has the finest computer crimes training program
- in the country. They bring in acknowledged experts and
- don't cut the students any slack as far as learning to
- do things correctly and, most importantly, legally. The
- CFCA is the leader in Telecommunications security and
- provide training and assistance to telecom and computer
- companies along with law enforcement agencies all over
- the country.
-
- TG: Why do you think so few law enforcement agencies know
- anything about computer crime investigations? Are they
- going to leave the phreaks to the feds?
-
- Baker: Nah...I don't think you can simplify it that easily.
- Most departments don't have dedicated computer crime units
- because of lack of funds to support such a unit, lack of
- trained personnel, lack of understanding of the magnitude
- of the problem, fear of increasing their crime stats or
- any combination of those reasons. When I first got into
- this, there weren't any experts. John Maxfield and his
- BOARDSCAN operation got a lot of talk in the hack/phreak
- journals and there were a small handful of others, but
- no real standout authorities. I talked to an awful lot
- of people before I hooked up with Clo Fleming at SPRINT
- Security who helped me a lot.
-
- TG: Do you still trade information with SPRINT?
-
- Baker: I have contacts with all the major telecom carriers.
- The training I got at FLETC really helped make some valuable
- contacts. But I guess SPRINT and Clo Fleming would be
- my first choice simply because they were willing to help
- me when no one else would. You can't operate in this
- environment without contacts in the OCC's. It can't be
- done and the OCC's [Other Common Carriers] are a lot
- more willing to assist law enforcement now than they
- were in 1985. Of course, the telecommunications industry
- is taking a $4-5 billion hit a year from fraud and that
- has a lot to do with it.
-
- TG: Do you subscribe to the hacker/phreaker magazines?
-
- Baker: Sure...I subscribe to 2600 and get copies of some
- others. I think PHRACK's probably the best overall,
- but I can't afford the subscription rate they've imposed
- on government agencies since Craig Neidorf took the hit
- for publishing the "golden" E911 document. I've learned
- a ton of stuff over the years from PHRACK and wish it
- were still free, but they have a right to their info
- just like the people who own the systems attacked by
- hackers. It'd be kind of hypocritical for me to rip off
- PHRACK and then turn and prosecute some other guy for
- ripping off information from another source, right?
-
- TG: What problems do you foresee in the future in computer
- and telecom crime investigations?
-
- Baker: Jeez...why don't you ask me when we'll have world peace
- or something easy? OK, I think we'll probably see the
- larger departments being forced to play catch-up with
- the current trends and always being a little behind in
- this area. I also think you'll see more officers losing
- cases and being sued, a la SJG, until they get the
- specific training required to handle these cases the
- right way. Turning seized systems over to the local
- "computer guy" in the department is going to cost'em in
- the long run because every lawyer who gets one of these
- cases is going to compare it bit by bit with the SJG
- case to see if there's anything there he can use for
- his client's defense.
-
- TG: There has been a lot of discussion about whether or not
- computer systems should be seized rather than just
- making copies of the data for evidence. What is your
- policy on equipment seizures when working cases like
- this?
-
- Baker: First of all, I don't go on fishing expeditions with
- search warrants. If I have enough to convict a guy then
- I get the warrant. I take everything that's there and
- do the analysis. I've had cases where the defendant has
- requested copies of data he needed for various reasons
- and I've had no problems with furnishing them as long
- as the request is reasonable. I ask for forfeiture of
- the equipment if I can link it to the crime because the
- law says I can. If I can't link the computers, then I
- give them back...simple as that. I think it's kind of
- interesting that most hackers or phreaks will refuse to
- take a guilty plea for a reduced charge, even if I have
- them stone cold and they're looking at a 99.999999%
- chance of conviction in a jury trial, if it means
- they'll lose their equipment in the deal. It makes good
- leverage in certain situations.
-
- TG: Did you have any part in Operation Sun-Devil?
-
- Baker: Nope. Though I'd have liked to. I was on a lot of the
- systems taken down in Sun-Devil.
-
- TG: You said you were on some of the systems busted in the
- Sun-Devil operation, are you still on phreak/hack
- boards and would you name any?
-
- Baker: (Laughs a lot) I think I'll pass on naming systems I'm
- on, OK? That'd be cheating. (Laughs again) But I get
- around enough to know what's going on. There are lots
- of investigators out there calling the boards.
-
- TG: I appreciate your time, Lt. Baker, and would like to ask
- one last question. What motivates you in these cases
- since the alleged "theft" involves pretty intangible
- property?
-
- Baker: Motivation? Hmmmm...I suppose you could say it's the
- chase that motivates me more than the catch, though
- the catch is pretty good, too. These cases tend to
- be more one-on-one than some other types and the
- adversaries can be very good at covering their tracks.
- Hell, I probably have more in common with the people
- I target than they'd like to believe. As for the
- "intangibility" of the stolen goods, well, that's why
- we have court systems, isn't it...to define those
- little details.
-
- TG: A lot of computer crime investigators would rather stay
- in the background, but you don't seem to have taken that
- position. Why not?
-
- Baker: Well, like anyone involved in anything relatively new,
- as opposed to the old standard type crimes like murder
- and armed robbery, it's to my benefit to have anything
- printed informing people of the problems created by
- this type of activity. We all pay the price for telecom
- fraud, credit card fraud, data loss due to illegal
- access to computers and all the rest. But the people
- involved in these crimes, for the most part, don't
- exhibit the same profiles as the so-called "violent"
- criminals. In fact, I've had some very friendly
- conversations with a number of phreaks and hackers.
- Investigators who have problems would probably have
- them no matter what crimes they were investigating.
- I never assume that I'm smarter than anyone I'm
- chasing and I don't rub their noses in it when I make
- a case. Just like I don't lose sleep when I just can't
- seem to get that last piece of the puzzle and one gets
- away. It's hide-and-seek in cyberspace. Pretty good
- game, actually.
-
- For what it's worth, there it is. The interview printed here
- doesn't contain a lot of the bullshit that was thrown back and
- forth during our conversation, just the relevant details which
- tend to give an insight into this guy.
-
- Frankly, I was impressed by the fact that he didn't seem
- anything like I had expected after reading horror stories about
- other agencies and investigators. This guy was personable and
- maybe that's an indicator that he's dangerous. Never, ever
- underestimate your opponents -- even if they do sound like
- "good ole boys" and talk to you like you're the best friend
- they ever had. Always remember that COPS INVENTED SOCIAL
- ENGINEERING!
-
- My next "computer cop" profile will deal with a rising star in
- the U.S. Secret Service and his connections to the Guidry
- Group, a consulting organization working for the cellular phone
- industry in combating cellular fraud.
-
-