home *** CD-ROM | disk | FTP | other *** search
- ==Phrack Magazine==
-
- Volume Five, Issue Forty-Six, File 28 of 28
-
- PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN
- PWN PWN
- PWN Phrack World News PWN
- PWN PWN
- PWN Compiled by Datastream Cowboy PWN
- PWN PWN
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
-
- Damn The Torpedoes June 6, 1994
- ~~~~~~~~~~~~~~~~~~
- by Loring Wirbel (Electronic Engineering Times) (Page 134)
-
- On May 3, a gargantuan satellite was launched with little press coverage
- from Cape Canaveral.
-
- The $1.5 billion satellite is a joint project of the NSA and the
- National Reconnaissance Office. At five tons, it is heavy enough to
- have required every bit of thrust its Titan IV launcher could
- provide--and despite the boost, it still did enough damage to the
- launch-pad water main to render the facility unusable for two months.
-
- The satellite is known as Mentor, Jeroboam and Big Bertha, and it has an
- antenna larger than a football field to carry out "hyper-spectral
- analysis" -- Reconnaissance Office buzzwords for real-time analysis of
- communications in a very wide swath of the electromagnetic spectrum.
-
- Clipper and Digital Signature Standard opponents should be paying
- attention to this one. Mentor surprised space analysts by moving into a
- geostationary rather than geosynchronous orbit. Geostationary orbit
- allows the satellite to "park" over a certain sector of the earth.
-
- This first satellite in a planned series was heading for the Ural
- Mountains in Russia at last notice. Additional launches planned for
- late 1994 will park future Mentors over the western hemisphere.
-
- According to John Pike of the Federation of American Scientists, those
- satellites will likely be controlled from Buckley Field (Aurora,
- Colorado), an NSA/Reconnaissance downlink base slated to become this
- hemisphere's largest intelligence base in the 1990s.
-
- [Able to hear a bug fart from space. DC to Daylight realtime analysis.
- And you Clipper whiners cry about someone listening to your phone calls.
- Puh-lease.]
-
- -----------------------------------------------------------------------------
-
- Discovery of 'Data Processing Virus Factory' In Italy February 17, 1994
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- AFP Sciences
-
- It was learned in Rome on 10 February that a data processing virus
- "factory" -- in fact, a program called VCL (Viruses Creation Laboratory),
- capable of triggering a virus epidemic--was discovered in Italy
-
- Mr. Fulvio Berghella, deputy directory-general of the Italian Institute
- for Bank Data Processing Security (ISTINFORM), discovered what it takes
- to enable just about anybody to fabricate data processing viruses; he told
- the press that its existence had been suspected for a year and a half and
- that about a hundred Italian enterprises had been "contaminated."
-
- An investigation was launched to try to determine the origin of the program,
- said Mr. Alessandro Pansa, chief of the "data processing crime" section
- of the Italian police. Several copies of VCL were found in various places,
- particularly in Rome and Milan.
-
- Producing viruses is very simple with the help of this program, but it is
- not easy to find. A clandestine Bulgarian data bank, as yet not identified,
- reportedly was behind all this. An international meeting of data processing
- virus "hunters" was organized in Amsterdam on 12 February to draft
- a strategy; an international police meeting on this subject will be held
- next week in Sweden.
-
- Since 1991, the number of viruses in circulation throughout the world
- increased 500% to a total of about 10,000 viruses. In Italy, it is not
- forbidden to own a program of this type, but dissemination of viruses
- is prosecuted.
-
- [So, I take it Nowhere Man cannot ever travel to Italy?]
-
- --------------------------------------------------------------------------
-
- DEFCON TV-News Coverage July 26, 1994
- by Hal Eisner (Real News at 10) (KCOP Channel 13 Los Angeles)
-
- [Shot of audience]
-
- Female Newscaster: "Hackers are like frontier outlaws. Look at what Hal
- Eisner found at a gathering of hackers on the Las
- Vegas strip."
-
- [Shot of "Welcome to Vegas" sign]
- [Shot of Code Thief Deluxe v3.5]
- [Shot of Dark Tangent talking]
-
- Dark Tangent: "Welcome to the convention!"
-
- [Shot of Voyager hanging with some people]
-
- Hal Eisner: "Well not everyone was welcome to this year's
- Def Con II, a national convention for hackers.
- Certainly federal agents weren't."
-
- [Shot DTangent searching for a fed]
-
- Dark Tangent: "On the right. Getting closer."
-
- Fed: "Must be me! Thank you."
-
- [Dark Tangent gives the Fed "I'm a Fed" t-shirt]
-
- Hail Eisner: "Suspected agents were ridiculed and given
- identifying t-shirts. While conventioneers, some of
- [Shot of someone using a laptop]
- which have violated the law, and many of which are
- [Shot of some guy reading the DefCon pamphlet]
- simply tech-heads hungry for the latest theory, got
- [Shot of a frequency counter, and a scanner]
- to see a lot of the newest gadgetry, and hear some
- tough talk from an Arizona Deputy DA that
- [Shot of Gail giving her speech]
- specializes on computer crime and actually
- recognized some of her audience."
-
- Gail: "Some people are outlaws, crooks, felons maybe."
-
- [Shot back of conference room. People hanging]
-
- Hal Eisner: "There was an Alice in Wonderland quality about all
- of this. Hackers by definition go where they are not
- invited, but so is the government that is trying to
- intrude on their privacy."
-
- Devlin: "If I want to conceal something for whatever reason.
- I'd like to have the ability to."
-
- Hal Eisner: "The bottom line is that many of the people here
- want to do what they want, when they want, and how
- they want, without restrictions."
-
- Deadkat: "What we are doing is changing the system, and if you
- have to break the law to change the system, so be it!"
-
- Hal Eisner: "That's from residents of that cyberspacious world
- [Shot of someone holding a diskette with what is supposed to be codez on the
- label]
- of behind the computer screen where the shy can be
- [Code Thief on the background]
- dangerous. Reporting from Las Vegas, Hal Eisner,
- Real News.
-
- ------------------------------------------------------------------------------
-
- Cyber Cops May 23, 1994
- ~~~~~~~~~~
- by Joseph Panettieri (Information Week) (Page 30)
-
- When Chris Myers, a software engineer at Washington University in
- St. Louis, arrived to work one Monday morning last month, he realized
- something wasn't quite right. Files had been damaged and a back door
- was left ajar. Not in his office, but on the university's computer network.
-
- Like Commissioner Gordon racing to the Batphone, Myers swiftly called the
- Internet's guardian, the Computer Emergency Response Team (CERT).
-
- The CERT team boasts impressive credentials. Its 14 team members are
- managed by Dain Gary, former director of corporate data security at
- Mellon Bank Corp. in Pittsburgh. While Gary is the coach of the CERT
- squad, Moira West is the scrambling on-field quarterback. As manager
- of CERT's incident-response team and coordination center, she oversees
- the team's responses to attacks by Internet hackers and its search for
- ways to reduce the Internet's vulnerabilities. West was formerly a
- software engineer at the University of York in England.
-
- The rest of the CERT team remains in the shadows. West says
- the CERT crew hails from various information-systems backgrounds,
- but declines to get more specific, possibly to hide any Achilles'
- heels from hackers.
-
- One thing West stresses is that CERT isn't a collection of reformed
- hackers combing the Internet for suspicious data. "People have to
- trust us, so hiring hackers definitely isn't an option," she says.
- "And we don't probe or log-on to other people's systems."
-
- As a rule, CERT won't post an alert until after it finds a
- remedy to the problem. But that can take months, giving hackers
- time to attempt similar breakins on thousands of Internet hosts
- without fear of detection. Yet CERT's West defends this policy:
- "We don't want to cause mass hysteria if there's no way to
- address a new, isolated problem. We also don't want to alert the
- entire intruder community about it."
-
- ------------------------------------
- Who You Gonna Call?
- How to reach CERT
-
- Phone: 412-268-7090
- Internet: cert@cert.org
- Fax: 412-268-6989
- Mail: CERT Coordination Center
- Software Engineering Institute
- Carnegie Mellon University
- Pittsburgh, PA 15213-3890
- ------------------------------------
-
- [Ask for that saucy British chippie. Her voice will melt you like
- butter.
-
- CERT -- Continually re-emphasizing the adage: "You get what you pay for!"]
-
- And remember, CERT doesn't hire hackers, they just suck the juicy bits
- out of their brains for free.
-
- ------------------------------------------------------------------------------
-
- Defining the Ethics of Hacking August 12, 1994
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Amy Harmon (Los Angeles Times) (page A1)
-
- Eric Corley, a.k.a Emmanuel Goldstein -- patron saint of computer
- hackers and phone phreaks -- is having a party.
-
- And perhaps it is just in time. 2600, the hacker magazine Corley
- started when he was 23, is a decade old. It has spawned monthly
- hacker meetings in dozens of cities. It has been the target of a
- Secret Service investigation. It has even gone aboveground, with
- newsstand sales of 20,000 last year.
-
- As hundreds of hackers converge in New York City this weekend to celebrate
- 2600's anniversary, Corley hopes to grapple with how to uphold the
- "hacker ethic," an oxymoron to some, in an era when many of 2600's devotees
- just want to know how to make free phone calls. (Less high-minded
- activities -- like cracking the New York City subway's new electronic
- fare card system -- are also on the agenda).
-
- Hackers counter that in a society increasingly dependent on
- technology, the very basis for democracy could be threatened by limiting
- technological exploration. "Hacking teaches people to think critically about
- technology," says Rop Gonggrijp, a Dutch hacker who will attend the Hackers
- on Planet Earth conference this weekend. "The corporations that are building
- the technology are certainly not going to tell us, because they're trying to
- sell it to us. Whole societies are trusting technology blindly -- they just
- believe what the technocrats say."
-
- Gonggrijp, 26, publishes a magazine much like 2600 called Hack-Tic,
- which made waves this year with an article showing that while tapping mobile
- phones of criminal suspects with radio scanners, Dutch police tapped into
- thousand of other mobile phones.
-
- "What society needs is people who are independent yet knowledgeable,"
- Gonggrijp said. 'That's mostly going to be young people, which society is
- uncomfortable with. But there's only two groups who know how the phone and
- computer systems work, and that's engineers and hackers. And I think that's
- a very healthy situation."
-
- [By the way Amy: Phrack always grants interviews to cute, female
- LA Times reporters.]
-
- ------------------------------------------------------------------------------
-
- Fighting Telephone Fraud August 1, 1994
- ~~~~~~~~~~~~~~~~~~~~~~~~
- by Barbara DePompa (Information Week) (Page 74)
-
- Local phone companies are taking an active role in warning customers of
- scams and cracking down on hackers.
-
- Early last month, a 17-year old hacker in Baltimore was caught
- red-handed with a list of more than 100 corporate authorization codes that
- would have enabled fraud artists to access private branch exchanges and
- make outgoing calls at corporate expanse.
-
- After the teenager's arrest, local police shared the list with Bell
- Atlantic's fraud prevention group. Within hours, the phone numbers were
- communicated to the appropriate regional phone companies and corporate
- customers on the list were advised to either change their authorization
- codes or shut down outside dialing privileges.
-
- "We can't curb fraud without full disclosure and sharing this type
- of vital information" points out Mary Chacanias, manager of
- telecommunications fraud prevention for Bell Atlantic in Arlington, VA.
-
- -----------------------------------------------------------------------------
-
- AT&T Forms Team to Track Hackers August 30, 1994
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- (Reuters News Wire)
-
- AT&T Corp.'s Global Business Communications Systems subsidiary said
- Wednesday it has formed an investigative unit to monitor, track and
- catch phone-system hackers in the act of committing toll fraud.
-
- The unit will profile hacker activity and initiate "electronic
- stakeouts" with its business communications equipment in cooperation
- with law enforcement agencies, and work with them to prosecute the
- thieves.
-
- "We're in a shoot-out between 'high-tech cops' -- like AT&T -- and
- 'high-tech robbers' who brazenly steal long distance service from our
- business customers," said Kevin Hanley, marketing director for business
- security systems for AT&T Global Business.
-
- "Our goal is not only to defend against hackers but to get them off the
- street."
-
- [Oh my God. Are you scared? Have you wet yourself? YOU WILL!]
-
- -----------------------------------------------------------------------------
-
- Former FBI Informant a Fugitive July 31, 1994
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Keith Stone (Daily News)
-
- Computer outlaw Justin Tanner Petersen and prosecutors
- cut a deal: The Los Angeles nightclub promoter known in
- the computer world as "Agent Steal" would work for the
- government in exchange for freedom.
-
- With his help, the government built its case against
- Kevin Lee Poulsen, a Pasadena native who pleaded guilty
- in June to charges he electronically rigged telephones at
- Los Angeles radio stations so he could win two Porsches,
- $22,000 and two trips to Hawaii.
-
- Petersen also provided information on Kevin Mitnick, a
- Calabasas man wanted by the FBI for cracking computer and
- telephone networks at Pacific Bell and the state Department
- of Motor Vehicles, according to court records.
-
- Petersen's deal lasted for nearly two years - until
- authorities found that while he was helping them undercover,
- he also was helping himself to other people's credit cards.
-
- Caught but not cornered, the 34-year-old "Agent Steal" had
- one more trick: He admitted his wrongdoing to a prosecutor
- at the Los Angeles U.S. Attorney's Office, asked to meet
- with his attorney and then said he needed to take a walk.
-
- And he never came back.
-
- A month after Petersen fled, he spoke with a magazine for
- computer users about his role as an FBI informant, who he
- had worked against and his plans for the future.
-
- "I have learned a lot about how the bureau works. Probably
- too much," he said in an interview that Phrack Magazine published
- Nov. 17, 1993. Phrack is available on the Internet, a worldwide
- network for computer users.
-
- Petersen told the magazine that working with the FBI was fun
- most of the time. "There was a lot of money and resources used.
- In addition, they paid me well," he said.
-
- "If I didn't cooperate with the bureau," he told Phrack, "I
- could have been charged with possession of government material."
-
- "Most hackers would have sold out their mother," he added.
-
- Petersen is described as 5 foot, 11 inches, 175 pounds, with
- brown hair - "sometimes platinum blond." But his most telling
- characteristic is that he walks with the aid of a prosthesis
- because he lost his left leg below the knee in a car accident.
-
- Heavily involved in the Hollywood music scene, Petersen's
- last known employer was Club "Velvet Jam," one of a string of
- clubs he promoted in Los Angeles.
-
- -----------------------------------------------------------------------------
-
- Hacker in Hiding July 31, 1994
- ~~~~~~~~~~~~~~~~
- by John Johnson (LA Times)
-
- First there was the Condor, then Dark Dante. The latest computer hacker to
- hit the cyberspace most wanted list is Agent Steal, a slender, good-looking
- rogue partial to Porsches and BMWs who bragged that he worked undercover
- for the FBI catching other hackers.
-
- Now Agent Steal, whose real name is Justin Tanner Petersen, is on the run
- from the very agency he told friends was paying his rent and flying him to
- computer conferences to spy on other hackers.
-
- Petersen, 34, disappeared Oct. 18 after admitting to federal prosecutors
- that he had been committing further crimes during the time when he was
- apparently working with the government "in the investigation of other
- persons," according to federal court records.
-
- Ironically, by running he has consigned himself to the same secretive life
- as Kevin Mitnick, the former North Hills man who is one of the nation's most
- infamous hackers, and whom Petersen allegedly bragged of helping to set up
- for an FBI bust. Mitnick, who once took the name Condor in homage to a
- favorite movie character, has been hiding for almost two years to avoid
- prosecution for allegedly hacking into computers illegally and posing as a
- law enforcement officer.
-
- Authorities say Petersen's list of hacks includes breaking into computers
- used by federal investigative agencies and tapping into a credit card
- information bureau. Petersen, who once promoted after-hours rock shows in
- the San Fernando Valley, also was involved in the hacker underground's most
- sensational scam - hijacking radio station phone lines to win contests with
- prizes ranging from new cars to trips to Hawaii.
-
- Petersen gave an interview last year to an on-line publication called Phrack
- in which he claimed to have tapped the phone of a prostitute working for
- Heidi Fleiss. He also boasted openly of working with the FBI to bust
- Mitnick.
-
- "When I went to work for the bureau I contacted him," Petersen said in the
- interview conducted by Mike Bowen. "He was still up to his old tricks, so
- we opened a case on him. . . . What a loser. Everyone thinks he is some
- great hacker. I outsmarted him and busted him."
-
- In the Phrack interview, published on the Internet, an international network
- of computer networks with millions of users, Agent Steal bragged about
- breaking into Pacific Bell headquarters with Poulsen to obtain information
- about the phone company's investigation of his hacking.
-
- Petersen was arrested in Texas in 1991, where he lived briefly. Court
- records show that authorities searching his apartment found computer
- equipment, Pacific Bell manuals and five modems.
-
- A grand jury in Texas returned an eight-count indictment against Petersen,
- accusing him of assuming false names, accessing a computer without
- authorization, possessing stolen mail and fraudulently obtaining and using
- credit cards.
-
- The case was later transferred to California and sealed, out of concern for
- Petersen's safety, authorities said. The motion to seal, obtained by
- Sherman, states that Petersen, "acting in an undercover capacity, currently
- is cooperating with the United States in the investigation of other persons
- in California."
-
- In the Phrack interview, Petersen makes no apologies for his choices in life.
-
- While discussing Petersen's role as an informant, Mike Bowen says, "I think
- that most hackers would have done the same as you."
-
- "Most hackers would have sold out their mother," Petersen responded.
-
- ------------------------------------------------------------------------------
-
- Computer Criminal Caught After 10 Months on the Run August 30, 1994
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Keith Stone (Daily News)
-
- Convicted computer criminal Justin Tanner Petersen was captured Monday in
- Los Angeles, 10 months after federal authorities said they discovered he
- had begun living a dual life as their informant and an outlaw hacker.
-
- Petersen, 34, was arrested about 3:30 a.m. outside a Westwood apartment
- that FBI agents had placed under surveillance, said Assistant U.S.
- Attorney David Schindler.
-
- A flamboyant hacker known in the computer world as "Agent Steal," Petersen
- was being held without bail in the federal detention center in Los Angeles.
- U.S. District Court Judge Stephen V. Wilson scheduled a sentencing hearing
- for Oct. 31.
-
- Petersen faces a maximum of 40 years in prison for using his sophisticated
- computer skills to rig a radio contest in Los Angeles, tap telephone lines
- and enrich himself with credit cards.
-
- Monday's arrest ends Petersen's run from the same FBI agents with whom he
- had once struck a deal: to remain free on bond in exchange for pleading
- guilty to several computer crimes and helping the FBI with other hacker
- cases.
-
- The one-time nightclub promoter pleaded guilty in April 1993 to six federal
- charges. And he agreed to help the government build its case against Kevin
- Lee Poulsen, who was convicted of manipulating telephones to win radio
- contests and is awaiting trial on espionage charges in San Francisco.
-
- Authorities said they later learned that Petersen had violated the deal by
- committing new crimes even as he was awaiting sentencing in the plea
- agreement.
-
- On Monday, FBI agents acting on a tip were waiting for Petersen when he parked
- a BMW at the Westwood apartment building. An FBI agent called Petersen's
- name, and Petersen began to run, Schindler said.
-
- Two FBI agents gave chase and quickly caught Petersen, who has a prosthetic
- lower left leg because of a car-motorcycle accident several years ago.
-
- In April 1993, Petersen pleaded guilty to six federal charges including
- conspiracy, computer fraud, intercepting wire communications, transporting
- a stolen vehicle across state lines and wrongfully accessing TRW credit
- files. Among the crimes that Petersen has admitted to was working with other
- people to seize control of telephone lines so they could win radio
- promotional contests. In 1989, Petersen used that trick and walked away with
- $10,000 in prize money from an FM station, court records show.
-
- When that and other misdeeds began to catch up with him, Petersen said, he
- fled to Dallas, where he assumed the alias Samuel Grossman and continued
- using computers to make money illegally.
-
- When he as finally arrested in 1991, Petersen played his last card.
- "I called up the FBI and said: 'Guess what? I am in jail,' " he said.
- He said he spent the next four months in prison, negotiating for his freedom
- with the promise that he would act as an informant in Los Angeles.
-
- The FBI paid his rent and utilities and gave him $200 a week for spending
- money and medical insurance, Petersen said.
-
- They also provided him with a computer and phone lines to gather information
- on hackers, he said.
-
- Eventually, Petersen said, the FBI stopped supporting him so he turned to
- his nightclubs for income. But when that began to fail, he returned to
- hacking for profit.
-
- "I was stuck out on a limb. I was almost out on the street. My club
- was costing me money because it was a new club," he said. "So I did what
- I had to do. I an not a greedy person."
-
- [Broke, Busted, Distrusted. Turning in your friends leads to some
- seriously bad Karma, man. Negative energy like that returns ten-fold.
- You never know in what form either. You could end getting shot,
- thrown in jail, or worse, test HIV Positive. So many titty-dancers,
- so little time, eh dude? Good luck and God bless ya' Justin.]
-
- -----------------------------------------------------------------------------
-
- Fugitive Hacker Baffles FBI With Technical Guile July 5, 1994
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by John Markoff (New York Times)
-
- [Mitnik, Mitnik, Mitnik, and more Mitnik. Poor bastard. No rest for
- the wicked, eh Kevin?]
-
- -----------------------------------------------------------------------------
-
- Computer Outlaws Invade the Internet May 24, 1994
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Mike Toner (Atlanta Journal-Constitution)
-
- A nationwide wave of computer break-ins has law enforcement
- authorities scrambling to track down a sophisticated ring of
- "hackers" who have used the international "information
- highway," the Internet, to steal more than 100,000 passwords -- the
- electronic keys to vast quantities of information stored on
- government, university and corporate computer systems.
-
- Since the discovery of an isolated break-in last year at a
- single computer that provides a "gateway" to the Internet,
- operators of at least 30 major computer systems have found illicit
- password "sniffers" on their machines.
-
- The Federal Bureau of Investigation has been investigating the
- so-called "sniffer" attacks since February, but security experts
- say the intrusions are continuing -- spurred, in part, by the
- publication last month of line-by-line instructions for the
- offending software in an on-line magazine for hackers.
-
- Computer security experts say the recent rash of password piracy
- using the Internet is much more serious than earlier security
- violations, like the electronic "worm" unleashed in 1988 by
- Cornell University graduate student Robert Morris.
-
- "This is a major concern for the whole country," she says.
- "I've had some sleepless nights just thinking about what could
- happen. It's scary. Once someone has your ID and your password,
- they can read everything you own, erase it or shut a system down.
- They can steal proprietary information and sell it, and you might
- not even know it's gone."
-
- "Society has shifted in the last few years from just using
- computers in business to being absolutely dependent on them and the
- information they give us -- and the bad guys are beginning to
- appreciate the value of information," says Dain Gary, manager of
- the Computer Emergency Response Team (CERT), a crack team of
- software experts at Carnegie-Mellon University in Pittsburgh that
- is supported by the Defense Department's Advanced Research Projects
- Agency.
-
- Gary says the current rash of Internet crime appears to be the
- work of a "loosely knit but fairly organized group" of computer
- hackers adept not only at breaking and entering, but at hiding
- their presence once they're in.
-
- Most of the recent break-ins follow a similar pattern. The
- intruders gain access to a computer system by locating a weakness
- in its security system -- what software experts call an "unpatched
- vulnerability."
-
- Once inside, the intruders install a network monitoring program,
- a "sniffer," that captures and stores the first 128 keystrokes
- of all newly opened accounts, which almost always includes a user's
- log-on and password.
-
- "We really got concerned when we discovered that the code had
- been published in Phrack, an on-line magazine for hackers, on April
- 1," he says. "Putting something like that in Phrack is a little
- like publishing the instructions for converting semiautomatic
- weapons into automatics.
-
- Even more disturbing to security experts is the absence of a
- foolproof defense. CERT has been working with computer system
- administrators around the country to shore up electronic security,
- but the team concedes that such "patches" are far from perfect.
-
- [Look for plans on converting semiautomatic weapons into automatics
- in the next issue.]
- ------------------------------------------------------------------------------
-
- Information Superhighwaymen - Hacker Menace Persists May 1994
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- (Open Computing) (Page 25)
-
- Once again the Internet has been labeled a security problem. And a new
- breed of hackers has attracted attention for breaking into systems.
- "This is a group of people copying what has been done for years," says
- Chris Goggans, aka Erik Bloodaxe. "There's one difference: They don't
- play nice."
-
- Goggans was a member of the hacker gang called the Legion of Doom in the
- late '80s to early '90s. Goggans says the new hacking group, which goes
- by the name of "The Posse," has broken into numerous Business Week 1000
- companies including Sun Microsystems Inc., Boeing, and Xerox. He says
- they've logged onto hundreds of universities and online services like
- The Well. And they're getting root access on all these systems.
-
- For their part, The Posse--a loose band of hackers--isn't talking.
-
- ------------------------------------------------------------------------------
-
- Security Experts: Computer Hackers a Growing Concern July 22, 1994
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- New York Times News Wire (Virginian-Pilot and Ledger Star) (2A)
-
- Armed with increasing sophisticated snooping tools, computer programmers
- operating both in the United States and abroad have gained unauthorized
- access to hundreds of sensitive but unclassified government and military
- computer networks called Internet, computer security experts said.
-
- Classified government and military data, such as those that control
- nuclear weapons, intelligence and other critical functions, are not
- connected to the Internet and are believed to be safe from the types of
- attacks reported recently.
-
- The apparent ease with which hackers are entering military and government
- systems suggests that similar if not greater intrusions are under way on
- corporate, academic and commercial networks connected to the Internet.
-
- Several sources said it was likely that only a small percentage of
- intrusions, perhaps fewer than 5 percent, have been detected.
-
- ------------------------------------------------------------------------------
-
- NSA Semi-confidential Rules Circulate
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By Keay Davidson (San Francisco Examiner) (Page A1)
-
- It arrived mysteriously at an Austin, Texas, post office box by "snail
- mail" - computerese for the Postal Service. But once the National Security
- Agency's employee handbook was translated into bits and bytes, it took
- only minutes to circulate across the country.
-
- Thus did a computer hacker in Texas display his disdain for government
- secrecy last week - by feeding into public computer networks the
- semiconfidential document, which describes an agency that, during the darkest
- days of the Cold War, didn't officially "exist."
-
- Now, anyone with a computer, telephone, modem and basic computer skills
- can read the 36-page manual, which is stamped "FOR OFFICIAL USE ONLY" and
- offers a glimpse of the shadowy world of U.S. intelligence - and the personal
- price its inhabitants pay.
-
- "Your home, car pool, and public places are not authorized areas to
- conduct classified discussions - even if everyone involved in the discussion
- possesses a proper clearance and "need-to-know.' The possibility that a
- conversation could be overheard by unauthorized persons dictates the need to
- guard against classified discussions in non-secure areas."
-
- The manual is "so anal retentive and paranoid. This gives you some
- insight into how they think," said Chris Goggans, the Austin hacker who
- unleashed it on the computer world. His on-line nom de plume is "Erik
- Bloodaxe" because "when I was about 11, I read a book on Vikings, and that
- name really struck me."
-
- NSA spokeswoman Judi Emmel said Tuesday that "apparently this document is
- an (NSA) employee handbook, and it is not classified." Rather, it is an
- official NSA employee manual and falls into a twilight zone of secrecy. On
- one hand, it's "unclassified." On the other hand, it's "FOR OFFICIAL USE
- ONLY" and can be obtained only by filing a formal request under the U.S.
- Freedom of Information Act, Emmel said.
-
- "While you may take this handbook home for further study, remember that
- it does contain "FOR OFFICIAL USE ONLY' information which should be
- protected," the manual warns. Unauthorized release of such information could
- result in "appropriate administrative action ... (and) corrective and/or
- disciplinary measures."
-
- Goggans, 25, runs an on-line electronic "magazine" for computer hackers
- called Phrack, which caters to what he calls the "computer underground." He
- is also a computer engineer at an Austin firm, which he refuses to name.
-
- The manual recently arrived at Goggans' post office box in a white
- envelope with no return address, save a postmark from a Silicon Valley
- location, he says. Convinced it was authentic, he typed it into his computer,
- then copied it into the latest issue of Phrack.
-
- Other hackers, like Grady Ward of Arcata, Humboldt County, and Jeff
- Leroy Davis of Laramie, Wyo., redistributed the electronic files to computer
- users' groups. These included one run by the Cambridge, Mass.-based
- Electronic Frontier Foundation, which fights to protect free speech on
- computer networks.
-
- Ward said he helped redistribute the NSA manual "to embarrass the NSA"
- and prove that even the U.S. government's most covert agency can't keep
- documents secret.
-
- The action also was aimed at undermining a federal push for
- data-encryption regulations that would let the government tap into computer
- networks, Ward said.
-
- [Yeah...sure it was, Grady.]
- ------------------------------------------------------------------------------
-
- Hackers Stored Pornography in Computers at Weapons Lab July 13, 1994
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Adam S. Bauman (Virginian-Pilot and Ledger-Star) (Page A6)
-
- One of the nation's three nuclear weapons labs has confirmed that
- computer hackers were using its computers to store and distribute
- hard-core pornography.
-
- The offending computer, which was shut down after a Los Angeles Times
- reporter investigating Internet hacking alerted lab officials, contained
- more than 1,000 pornographic images. It was believed to be the largest
- cache of illegal hardcore pornography ever found on a computer network.
-
- At Lawrence Livermore, officials said Monday that they believed at least
- one lab employee was involved in the pornography ring, along with an
- undetermined number of outside collaborators.
-
- [Uh, let me see if I can give this one a go:
-
- A horny lab technician at LLNL.GOV uudecoded gifs for days on end
- from a.b.p.e. After putting them up on an FSP site, a nosey schlock
- reporter blew the whistle, and wrote up a big "hacker-scare" article.
-
- The top-notch CIAC team kicked the horn-dog out the door, and began
- frantically scouring the big Sun network at LLNL for other breaches,
- all the while scratching their heads at how to block UDP-based apps
- like FSP at their firewall. MPEGs at 11.
-
- How does shit like this get printed????]
-
- ------------------------------------------------------------------------------
-
- Clipper Flaw May Thwart Fed Effort June 6, 1994
- by Aaron Zitner (Boston Globe)
-
- Patents, Technical Snares May Trip Up the 'Clipper' June 6, 1994
- by Sharon Fisher (Communications Week) (Page 1)
-
- [Clipper, Flipper, Slipper. It's all a big mess, and has obsoleted
- itself. But, let's sum up the big news:
-
- How the Clipper technology is SUPPOSED to work
-
- 1) Before an encoded message can be sent, a clipper computer chip
- assigns and tests a scrambled group of numbers called a LEAF, for
- Law Enforcement Access Field. The LEAF includes the chip's serial
- number, a "session key" number that locks the message and a "checksum"
- number that verifies the validity of the session key.
-
- 2) With a warrant to wiretap, a law-enforcement agency like the FBI
- could record the message and identify the serial number of a Clipper
- chip. It would then retrieve from custodial agencies the two halves of
- that chip's decoding key.
-
- 3) Using both halves of the decoding key, the FBI would be able to
- unscramble the session key number, thus unlocking the messages or data
- that had been protected.
-
- How the Clipper technology is FLAWED (YAY, Matt Blaze!)
-
- 1) Taking advantage of design imperfections, people trying to defeat
- the system could replace the LEAF until it erroneously passed the
- "checksum" verification, despite an invalid session-key number.
-
- 2) The FBI would still be able to retrieve a decoding key, but it would
- prove useless.
-
- 3) Because the decoding key would not be able to unscramble the invalid
- session key, the message would remain locked.]
-