home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 71.6 KB | 1,272 lines |
- ---[ Phrack Magazine Volume 8, Issue 52 January 26, 1998, article 05 of 20
-
-
- ---------[ EVERYTHING A HACKER NEEDS TO KNOW ABOUT GETTING BUSTED BY THE FEDS
-
-
- --------[ Agent Steal <agentsteal@usa.net>
-
-
- From Federal Prison, 1997
-
- Contributions and editing by Minor Threat
-
- Special thanks to Evian S. Sim
-
- NOTICE: The following document is to be construed as "Legal Material" as set
- forth in The Federal Bureau of Prisons policy statement, P.S. 1315.05, and as
- codified in 28 C.F.R. 543.10-16
-
- This article may be freely reproduced, in whole or in part, provided
- acknowledgments are given to the author. Any reproduction for profit, lame
- zines, (that means you t0mmy, el8, thief) or law enforcement use is prohibited.
- The author and contributor to this phile in no way advocate criminal behavior.
-
- ----------------
- CONTENTS
- ----------------
-
- INTRODUCTION
-
- PART I - FEDERAL CRIMINAL LAW PART II - FEDERAL PRISON
-
- A. Relevant Conduct A. State v. Federal
- B. Preparing for Trial B. Security Levels
- C. Plea Agreements and Attorneys C. Getting Designated
- D. Conspiracy D. Ignorant Inmates
- E. Sentencing E. Population
- F. Use of Special Skill F. Doing Time
- G. Getting Bail G. Disciplinary Action
- H. State v. Federal Charges H. Administrative Remedy
- I. Cooperating I. Prison Officials
- J. Still Thinking About Trial J. The Hole
- K. Search and Seizure K. Good Time
- L. Surveillance L. Halfway House
- M. Presentence Investigation M. Supervised Release
- N. Proceeding Pro Se
- O. Evidentiary Hearing
- P. Return of Property
- Q. Outstanding Warrants
- R. Encryption
- S. Summary
-
- Part III - 2600 Special Section:
-
- A. How to Avoid Detection
- B. The Stealth Box
- C. More Protection
-
- CLOSURE
-
-
-
- INTRODUCTION
-
- The likelihood of getting arrested for computer hacking has increased
- to an unprecedented level. No matter how precautionary or sage you are, you're
- bound to make mistakes. And the fact of the matter is if you have trusted
- anyone else with the knowledge of what you are involved in, you have made your
- first mistake.
-
- For anyone active in hacking I cannot begin to stress the importance
- of the information contained in this file. To those who have just been
- arrested by the Feds, reading this file could mean the difference between a
- three-year or a one-year sentence. To those who have never been busted,
- reading this file will likely change the way you hack, or stop you from
- hacking altogether.
-
- I realize my previous statements are somewhat lofty, but in the 35
- months I spent incarcerated I've heard countless inmates say it: "If I knew
- then what I know now..." I doubt that anyone would disagree: The criminal
- justice system is a game to be played, both by prosecution and defense. And if
- you have to be a player, you would be wise to learn the rules of engagement.
- The writer and contributors of this file have learned the hard way. As a
- result we turned our hacking skills during the times of our incarceration
- towards the study of criminal law and, ultimately, survival. Having filed our
- own motions, written our own briefs and endured life in prison, we now pass
- this knowledge back to the hacker community. Learn from our experiences...
- and our mistakes.
-
- - Agent Steal
-
-
- PART I - FEDERAL CRIMINAL LAW
-
- A. THE BOTTOM LINE - RELEVANT CONDUCT
-
- For those of you with a short G-phile attention span I'm going to
- cover the single most important topic first. This is probably the most
- substantial misunderstanding of the present criminal justice system. The
- subject I am talking about is referred to in legal circles as "relevant
- conduct." It's a bit complex and I will get into this... However, I have to
- make this crystal clear so that it will stick in your heads. It boils down to
- two concepts:
-
- I. ONCE YOU ARE FOUND GUILTY OF EVEN ONE COUNT, EVERY COUNT WILL BE USED TO
- CALCULATE YOUR SENTENCE
-
- Regardless of whether you plea bargain to one count or 100, your
- sentence will be the same. This is assuming we are talking about hacking,
- code abuse, carding, computer trespass, property theft, etc. All of these are
- treated the same. Other crimes you committed (but were not charged with) will
- also be used to calculate your sentence. You do not have to be proven guilty
- of every act. As long as it appears that you were responsible, or someone
- says you were, then it can be used against you. I know this sounds insane ,
- but it's true; it's the preponderance of evidence standard for relevant
- conduct. This practice includes using illegally seized evidence and
- acquittals as information in increasing the length of your sentence.
-
- II. YOUR SENTENCE WILL BE BASED ON THE TOTAL MONETARY LOSS
-
- The Feds use a sentencing table to calculate your sentence. It's
- simple; More Money = More Time. It doesn't matter if you tried to break in 10
- times or 10,000 times. Each one could be a count but it's the loss that
- matters. And an unsuccessful attempt is treated the same as a completed crime.
- It also doesn't matter if you tried to break into one company's computer or 10.
- The government will quite simply add all of the estimated loss figures up, and
- then refer to the sentencing table.
-
- B. PREPARING FOR TRIAL
-
- I've been trying to be overly simplistic with my explanation. The
- United States Sentencing Guidelines (U.S.S.G.), are in fact quite complex. So
- much so that special law firms are forming that deal only with sentencing. If
- you get busted, I would highly recommend hiring one. In some cases it might
- be wise to avoid hiring a trial attorney and go straight to one of these "Post
- Conviction Specialists." Save your money, plead out, do your time. This may
- sound a little harsh, but considering the fact that the U.S. Attorney's Office
- has a 95% conviction rate, it may be sage advice. However, I don't want to
- gloss over the importance of a ready for trial posturing. If you have a
- strong trial attorney, and have a strong case, it will go a long way towards
- good plea bargain negotiations.
-
- C. PLEA AGREEMENTS AND ATTORNEYS
-
- Your attorney can be your worst foe or your finest advocate. Finding
- the proper one can be a difficult task. Costs will vary and typically the
- attorney asks you how much cash you can raise and then says, "that amount will
- be fine". In actuality a simple plea and sentencing should run you around
- $15,000. Trial fees can easily soar into the 6 figure category. And finally,
- a post conviction specialist will charge $5000 to $15,000 to handle your
- sentencing presentation with final arguments.
-
- You may however, find yourself at the mercy of The Public Defenders
- Office. Usually they are worthless, occasionally you'll find one that will
- fight for you. Essentially it's a crap shoot. All I can say is if you don't
- like the one you have, fire them and hope you get appointed a better one. If
- you can scrape together $5000 for a sentencing (post conviction) specialist to
- work with your public defender I would highly recommend it. This specialist
- will make certain the judge sees the whole picture and will argue in the most
- effective manner for a light or reasonable sentence. Do not rely on your
- public defender to thoroughly present your case. Your sentencing hearing is
- going to flash by so fast you'll walk out of the court room dizzy. You and
- your defense team need to go into that hearing fully prepared, having already
- filed a sentencing memorandum.
-
- The plea agreement you sign is going to affect you and your case well
- after you are sentenced. Plea agreements can be tricky business and if you
- are not careful or are in a bad defense position (the case against you is
- strong), your agreement may get the best of you. There are many issues in a
- plea to negotiate over. But essentially my advice would be to avoid signing
- away your right to appeal. Once you get to a real prison with real jailhouse
- lawyers you will find out how bad you got screwed. That issue notwithstanding,
- you are most likely going to want to appeal. This being the case you need to
- remember two things: bring all your appealable issues up at sentencing and
- file a notice of appeal within 10 days of your sentencing. Snooze and loose.
-
- I should however, mention that you can appeal some issues even though
- you signed away your rights to appeal. For example, you can not sign away
- your right to appeal an illegal sentence. If the judge orders something that
- is not permissible by statute, you then have a constitutional right to appeal
- your sentence.
-
- I will close this subpart with a prison joke. Q: How can you tell when
- your attorney is lying? A: You can see his lips moving.
-
- D. CONSPIRACY
-
- Whatever happened to getting off on a technicality? I'm sorry to say
- those days are gone, left only to the movies. The courts generally dismiss
- many arguments as "harmless error" or "the government acted in good faith".
- The most alarming trend, and surely the root of the prosecutions success, are
- the liberally worded conspiracy laws. Quite simply, if two or more people
- plan to do something illegal, then one of them does something in furtherance
- of the objective (even something legal), then it's a crime. Yes, it's true.
- In America it's illegal to simply talk about committing a crime. Paging Mr.
- Orwell. Hello?
-
- Here's a hypothetical example to clarify this. Bill G. and Marc A. are
- hackers (can you imagine?) Bill and Marc are talking on the phone and
- unbeknownst to them the FBI is recording the call. They talk about hacking
- into Apple's mainframe and erasing the prototype of the new Apple Web Browser.
- Later that day, Marc does some legitimate research to find out what type of
- mainframe and operating system Apple uses. The next morning, the Feds raid
- Marc's house and seize everything that has wires. Bill and Marc go to trial
- and spend millions to defend themselves. They are both found guilty of
- conspiracy to commit unauthorized access to a computer system.
-
- E. SENTENCING
-
- At this point it is up to the probation department to prepare a report
- for the court. It is their responsibility to calculate the loss and identify
- any aggravating or mitigating circumstances. Apple Computer Corporation
- estimates that if Bill and Marc would have been successful it would have
- resulted in a loss of $2 million. This is the figure the court will use.
- Based on this basic scenario our dynamic duo would receive roughly three-year
- sentences.
-
- As I mentioned, sentencing is complex and many factors can decrease or
- increase a sentence, usually the latter. Let's say that the FBI also found a
- file on Marc's computer with 50,000 unauthorized account numbers and passwords
- to The Microsoft Network. Even if the FBI does not charge him with this, it
- could be used to increase his sentence. Generally the government places a
- $200-per-account attempted loss on things of this nature (i.e. credit card
- numbers and passwords = access devices). This makes for a $10 million loss.
- Coupled with the $2 million from Apple, Marc is going away for about nine
- years. Fortunately there is a Federal Prison not too far from Redmond, WA so
- Bill could come visit him.
-
- Some of the other factors to be used in the calculation of a sentence
- might include the following: past criminal record, how big your role in the
- offense was, mental disabilities, whether or not you were on probation at the
- time of the offense, if any weapons were used, if any threats were used, if
- your name is Kevin Mitnick (heh), if an elderly person was victimized, if you
- took advantage of your employment position, if you are highly trained and used
- your special skill, if you cooperated with the authorities, if you show
- remorse, if you went to trial, etc.
-
- These are just some of the many factors that could either increase or
- decrease a sentence. It would be beyond the scope of this article to cover
- the U.S.S.G. in complete detail. I do feel that I have skipped over some
- significant issues. Nevertheless, if you remember my two main points in
- addition to how the conspiracy law works, you'll be a long way ahead in
- protecting yourself.
-
- F. USE OF A SPECIAL SKILL
-
- The only specific "sentencing enhancement" I would like to cover would
- be one that I am responsible for setting a precedent with. In U.S. v Petersen,
- 98 F.3d. 502, 9th Cir., the United States Court of Appeals held that some
- computer hackers may qualify for the special skill enhancement. What this
- generally means is a 6 to 24 month increase in a sentence. In my case it
- added eight months to my 33-month sentence bringing it to 41 months.
- Essentially the court stated that since I used my "sophisticated" hacking
- skills towards a legitimate end as a computer security consultant, then the
- enhancement applies. It's ironic that if I were to have remained strictly a
- criminal hacker then I would have served less time.
-
- The moral of the story is that the government will find ways to give
- you as much time as they want to. The U.S.S.G. came into effect in 1987 in an
- attempt to eliminate disparity in sentencing. Defendants with similar crimes
- and similar backgrounds would often receive different sentences. Unfortunately,
- this practice still continues. The U.S.S.G. are indeed a failure.
-
- G. GETTING BAIL
-
- In the past, the Feds might simply have executed their raid and then
- left without arresting you. Presently this method will be the exception
- rather than the rule and it is more likely that you will be taken into custody
- at the time of the raid. Chances are also good that you will not be released
- on bail. This is part of the government's plan to break you down and win their
- case. If they can find any reason to deny you bail they will. In order to
- qualify for bail, you must meet the following criteria:
-
- - You must be a resident of the jurisdiction in which you were arrested.
- - You must be gainfully employed or have family ties to the area.
- - You cannot have a history of failure to appear or escape.
- - You cannot be considered a danger or threat to the community.
-
- In addition, your bail can be denied for the following reasons:
-
- - Someone came forward and stated to the court that you said you would flee if
- released.
- - Your sentence will be long if convicted.
- - You have a prior criminal history.
- - You have pending charges in another jurisdiction.
-
- What results from all this "bail reform" is that only about 20% of
- persons arrested make bail. On top of that it takes 1-3 weeks to process your
- bail papers when property is involved in securing your bond.
-
- Now you're in jail, more specifically you are either in an
- administrative holding facility or a county jail that has a contract with the
- Feds to hold their prisoners. Pray that you are in a large enough city to
- justify its own Federal Detention Center. County jails are typically the last
- place you would want to be.
-
- H. STATE VS. FEDERAL CHARGES
-
- In some cases you will be facing state charges with the possibility of
- the Feds "picking them up." You may even be able to nudge the Feds into
- indicting you. This is a tough decision. With the state you will do
- considerably less time, but will face a tougher crowd and conditions in prison.
- Granted, Federal Prisons can be violent too, but generally as a non-violent
- white collar criminal you will eventually be placed into an environment with
- other low security inmates. More on this later.
-
- Until you are sentenced, you will remain as a "pretrial inmate" in
- general population with other inmates. Some of the other inmates will be
- predatorial but the Feds do not tolerate much nonsense. If someone acts up,
- they'll get thrown in the hole. If they continue to pose a threat to the
- inmate population, they will be left in segregation (the hole). Occasionally
- inmates that are at risk or that have been threatened will be placed in
- segregation. This isn't really to protect the inmate. It is to protect the
- prison from a lawsuit should the inmate get injured.
-
- I. COOPERATING
-
- Naturally when you are first arrested the suits will want to talk to
- you. First at your residence and, if you appear to be talkative, they will
- take you back to their offices for an extended chat and a cup of coffee. My
- advice at this point is tried and true and we've all heard it before: remain
- silent and ask to speak with an attorney. Regardless of what the situation is,
- or how you plan to proceed, there is nothing you can say that will help you.
- Nothing. Even if you know that you are going to cooperate, this is not the
- time.
-
- This is obviously a controversial subject, but the fact of the matter
- is roughly 80% of all defendants eventually confess and implicate others. This
- trend stems from the extremely long sentences the Feds are handing out these
- days. Not many people want to do 10 to 20 years to save their buddies' hides
- when they could be doing 3 to 5. This is a decision each individual needs to
- make. My only advice would be to save your close friends and family. Anyone
- else is fair game. In the prison system the blacks have a saying "Getting
- down first." It's no secret that the first defendant in a conspiracy is
- usually going to get the best deal. I've even seen situations where the big
- fish turned in all his little fish and received 40% off his sentence.
-
- Incidentally, being debriefed or interrogated by the Feds can be an
- ordeal in itself. I would -highly- recommend reading up on interrogation
- techniques ahead of time. Once you know their methods it will be all quite
- transparent to you and the debriefing goes much more smoothly.
-
- When you make a deal with the government you're making a deal with the
- devil himself. If you make any mistakes they will renege on the deal and
- you'll get nothing. On some occasions the government will trick you into
- thinking they want you to cooperate when they are not really interested in
- anything you have to say. They just want you to plead guilty. When you sign
- the cooperation agreement there are no set promises as to how much of a
- sentence reduction you will receive. That is to be decided after your
- testimony, etc. and at the time of sentencing. It's entirely up to the judge.
- However, the prosecution makes the recommendation and the judge generally goes
- along with it. In fact, if the prosecution does not motion the court for your
- "downward departure" the courts' hands are tied and you get no break.
-
- As you can see, cooperating is a tricky business. Most people,
- particularly those who have never spent a day in jail, will tell you not to
- cooperate. "Don't snitch." This is a noble stance to take. However, in some
- situations this is just plain stupid. Saving someone's ass who would easily
- do the same to you is a tough call. It's something that needs careful
- consideration. Like I said, save your friends then do what you have to do to
- get out of prison and on with your life.
-
- I'm happy to say that I was able to avoid involving my good friends
- and a former employer in the massive investigation that surrounded my case. It
- wasn't easy. I had to walk a fine line. Many of you probably know that I
- (Agent Steal) went to work for the FBI after I was arrested. I was
- responsible for teaching several agents about hacking and the culture. What
- many of you don't know is that I had close FBI ties prior to my arrest. I was
- involved in hacking for over 15 years and had worked as a computer security
- consultant. That is why I was given that opportunity. It is unlikely however,
- that we will see many more of these types of arrangements in the future. Our
- relationship ran afoul, mostly due to their passive negligence and lack of
- experience in dealing with hackers. The government in general now has their
- own resources, experience, and undercover agents within the community. They
- no longer need hackers to show them the ropes or the latest security hole.
-
- Nevertheless, if you are in the position to tell the Feds something
- they don't know and help them build a case against someone, you may qualify
- for a sentence reduction. The typical range is 20% to 70%. Usually it's
- around 35% to 50%. Sometimes you may find yourself at the end of the
- prosecutorial food chain and the government will not let you cooperate. Kevin
- Mitnick would be a good example of this. Even if he wanted to roll over, I
- doubt it would get him much. He's just too big of a fish, too much media. My
- final advice in this matter is get the deal in writing before you start
- cooperating.
-
- The Feds also like it when you "come clean" and accept responsibility.
- There is a provision in the Sentencing Guidelines, 3E1.1, that knocks a little
- bit of time off if you confess to your crime, plead guilty and show remorse.
- If you go to trial, typically you will not qualify for this "acceptance of
- responsibility" and your sentence will be longer.
-
- J. STILL THINKING ABOUT TRIAL
-
- Many hackers may remember the Craig Neidorf case over the famous 911
- System Operation documents. Craig won his case when it was discovered that
- the manual in question, that he had published in Phrack magazine, was not
- proprietary as claimed but available publicly from AT&T. It was an egg in
- the face day for the Secret Service.
-
- Don't be misled by this. The government learned a lot from this
- fiasco and even with the laudable support from the EFF, Craig narrowly
- thwarted off a conviction. Regardless, it was a trying experience (no pun
- intended) for him and his attorneys. The point I'm trying to make is that it's
- tough to beat the Feds. They play dirty and will do just about anything,
- including lie, to win their case. If you want to really win you need to know
- how they build a case in the first place.
-
- K. SEARCH AND SEIZURE
-
- There is a document entitled "Federal Guidelines For Searching And
- Seizing Computers." It first came to my attention when it was published in
- the 12-21-94 edition of the Criminal Law Reporter by the Bureau of National
- Affairs (Cite as 56 CRL 2023 ). It's an intriguing collection of tips, cases,
- mistakes and, in general, how to bust computer hackers. It's recommended
- reading.
-
- Search and seizure is an ever evolving jurisprudence. What's not
- permissible today may, through some convoluted Supreme Court logic, be
- permissible and legal tomorrow. Again, a complete treatment of this subject
- is beyond the scope of this paper. But suffice it to say if a Federal agent
- wants to walk right into your bedroom and seize all of your computer equipment
- without a warrant he could do it by simply saying he had probable cause (PC).
- PC is anything that gives him an inkling to believe you were committing a
- crime. Police have been known to find PC to search a car when the trunk sat
- too low to the ground or the high beams were always on.
-
- L. SURVEILLANCE AND WIRETAPS
-
- Fortunately the Feds still have to show a little restraint when
- wielding their wiretaps. It requires a court order and they have to show that
- there is no other way to obtain the information they seek, a last resort if
- you will. Wiretaps are also expensive to operate. They have to lease lines
- from the phone company, pay agents to monitor it 24 hours a day and then
- transcribe it. If we are talking about a data tap, there are additional costs.
- Expensive interception/translation equipment must be in place to negotiate the
- various modem speeds. Then the data has to be stored, deciphered,
- decompressed, formatted, protocoled, etc. It's a daunting task and usually
- reserved for only the highest profile cases. If the Feds can seize the data
- from any other source, like the service provider or victim, they will take
- that route. I don't know what they hate worse though, asking for outside help
- or wasting valuable internal resources.
-
- The simplest method is to enlist the help of an informant who will
- testify "I saw him do it!," then obtain a search warrant to seize the evidence
- on your computer. Ba da boom, ba da busted.
-
- Other devices include a pen register which is a device that logs every
- digit you dial on your phone and the length of the calls, both incoming and
- outgoing. The phone companies keep racks of them at their security
- departments. They can place one on your line within a day if they feel you are
- defrauding them. They don't need a court order, but the Feds do.
-
- A trap, or trap and trace, is typically any method the phone company
- uses to log every number that calls a particular number. This can be done on
- the switching system level or via a billing database search. The Feds need a
- court order for this information too. However, I've heard stories of
- cooperative telco security investigations passing the information along to an
- agent. Naturally that would be a "harmless error while acting in good faith."
- (legal humor)...
-
- I'd love to tell you more about FBI wiretaps but this is as far as I
- can go without pissing them off. Everything I've told you thus far is public
- knowledge. So I think I'll stop here. If you really want to know more, catch
- Kevin Poulsen (Dark Dante) at a cocktail party, buy him a Coke and he'll give
- you an earful. (hacker humor)
-
- In closing this subpart I will say that most electronic surveillance
- is backed up with at least part-time physical surveillance. The Feds are
- often good at following people around. They like late model mid-sized
- American cars, very stock, with no decals or bumper stickers. If you really
- want to know if you're under surveillance, buy an Opto-electronics Scout or
- Xplorer frequency counter. Hide it on your person, stick an ear plug in your
- ear (for the Xplorer) and take it everywhere you go. If you hear people
- talking about you, or you continue to hear intermittent static (encrypted
- speech), you probably have a problem.
-
- M. YOUR PRESENTENCE INVESTIGATION REPORT, PSI OR PSR
-
- After you plead guilty you will be dragged from the quiet and comfort
- of your prison cell to meet with a probation officer. This has absolutely
- nothing to do with getting probation. Quite the contrary. The P.O. is
- empowered by the court to prepare a complete and, in theory, unbiased profile
- of the defendant. Everything from education, criminal history, psychological
- behavior, offense characteristics plus more will be included in this
- voluminous and painfully detailed report about your life. Every little dirty
- scrap of information that makes you look like a sociopath, demon worshiping,
- loathsome criminal will be included in this report. They'll put a few negative
- things in there as well.
-
- My advice is simple. Be careful what you tell them. Have your
- attorney present and think about how what you say can be used against you.
- Here's an example:
-
- P.O.: Tell me about your education and what you like to do in your spare time.
-
- Mr. Steal: I am preparing to enroll in my final year of college. In my spare
- time I work for charity helping orphan children.
-
- The PSR then reads "Mr. Steal has never completed his education and hangs
- around with little children in his spare time." Get the picture?
-
- J. PROCEEDING PRO SE
-
- Pro Se or Pro Per is when a defendant represents himself. A famous
- lawyer once said "a man that represents himself has a fool for a client."
- Truer words were never spoken. However, I can't stress how important it is to
- fully understand the criminal justice system. Even if you have a great
- attorney it's good to be able to keep an eye on him or even help out. An
- educated client's help can be of enormous benefit to an attorney. They may
- think you're a pain in the ass but it's your life. Take a hold of it.
- Regardless, representing yourself is generally a mistake.
-
- However, after your appeal, when your court appointed attorney runs
- out on you, or you have run out of funds, you will be forced to handle matters
- yourself. At this point there are legal avenues, although quite bleak, for
- post-conviction relief.
-
- But I digress. The best place to start in understanding the legal
- system lies in three inexpensive books. First the Federal Sentencing
- Guidelines ($14.00) and Federal Criminal Codes and Rules ($20.00) are
- available from West Publishing at 800-328-9352. I consider possession of
- these books to be mandatory for any pretrial inmate. Second would be the
- Georgetown Law Journal, available from Georgetown University Bookstore in
- Washington, DC. The book sells for around $40.00 but if you write them a
- letter and tell them you're a Pro Se litigant they will send it for free. And
- last but not least the definitive Pro Se authority, "The Prisoners Self Help
- Litigation Manual" $29.95 ISBN 0-379-20831-8. Or try
- http://www.oceanalaw.com/books/n148.htm
-
- O. EVIDENTIARY HEARING
-
- If you disagree with some of the information presented in the
- presentence report (PSR) you may be entitled to a special hearing. This can
- be instrumental in lowering your sentence or correcting your PSR. One
- important thing to know is that your PSR will follow you the whole time you
- are incarcerated. The Bureau of Prisons uses the PSR to decide how to handle
- you. This can affect your security level, your halfway house, your
- eligibility for the drug program (which gives you a year off your sentence),
- and your medical care. So make sure your PSR is accurate before you get
- sentenced!
-
- P. GETTING YOUR PROPERTY BACK
-
- In most cases it will be necessary to formally ask the court to have
- your property returned. They are not going to just call you up and say "Do
- you want this Sparc Station back or what?" No, they would just as soon keep it
- and not asking for it is as good as telling them they can have it.
-
- You will need to file a 41(e) "Motion For Return Of Property." The
- courts' authority to keep your stuff is not always clear and will have to be
- taken on a case-by-case basis. They may not care and the judge will simply
- order that it be returned.
-
- If you don't know how to write a motion, just send a formal letter to
- the judge asking for it back. Tell him you need it for your job. This should
- suffice, but there may be a filing fee.
-
- Q. OUTSTANDING WARRANTS
-
- If you have an outstanding warrant or charges pending in another
- jurisdiction you would be wise to deal with them as soon as possible -after-
- you are sentenced. If you follow the correct procedure chances are good the
- warrants will be dropped (quashed). In the worst case scenario, you will be
- transported to the appropriate jurisdiction, plead guilty and have your "time
- run concurrent." Typically in non-violent crimes you can serve several
- sentences all at the same time. Many Federal inmates have their state time
- run with their Federal time. In a nutshell: concurrent is good, consecutive
- bad.
-
- This procedure is referred to as the Interstate Agreement On Detainers
- Act (IADA). You may also file a "demand for speedy trial", with the
- appropriate court. This starts the meter running. If they don't extradite
- you within a certain period of time, the charges will have to be dropped. The
- "Inmates' Self-Help Litigation Manual" that I mentioned earlier covers this
- topic quite well.
-
- R. ENCRYPTION
-
- There are probably a few of you out there saying, "I triple DES
- encrypt my hard drive and 128 character RSA public key it for safety." Well,
- that's just great, but... the Feds can have a grand jury subpoena your
- passwords and if you don't give them up you may be charged with obstruction of
- justice. Of course who's to say otherwise if you forgot your password in all
- the excitement of getting arrested. I think I heard this once or twice before
- in a Senate Sub-committee hearing. "Senator, I have no recollection of the
- aforementioned events at this time." But seriously, strong encryption is
- great. However, it would be foolish to rely on it. If the Feds have your
- computer and access to your encryption software itself, it is likely they
- could break it given the motivation. If you understand the true art of code
- breaking you should understand this. People often overlook the fact that your
- password, the one you use to access your encryption program, is typically less
- than 8 characters long. By attacking the access to your encryption program
- with a keyboard emulation sequencer your triple DES/128 bit RSA crypto is
- worthless. Just remember, encryption may not protect you.
-
- S. LEGAL SUMMARY
-
- Before I move on to the Life in Prison subpart, let me tell you what
- this all means. You're going to get busted, lose everything you own, not get
- out on bail, snitch on your enemies, get even more time than you expected and
- have to put up with a bunch of idiots in prison. Sound fun? Keep hacking.
- And, if possible, work on those sensitive .gov sites. That way they can hang
- an espionage rap on you. That will carry about 12 to 18 years for a first
- time offender.
-
- I know this may all sound a bit bleak, but the stakes for hackers have
- gone up and you need to know what they are. Let's take a look at some recent
- sentences:
-
- Agent Steal (me) 41 months
- Kevin Poulsen 51 months
- Minor Threat 70 months
- Kevin Mitnick estimated 7-9 years
-
- As you can see, the Feds are giving out some time now. If you are
- young, a first-time offender, unsophisticated (like MOD), and were just
- looking around in some little company's database, you might get probation. But
- chances are that if that is all you were doing, you would have been passed
- over for prosecution. As a rule, the Feds won't take the case unless $10,000
- in damages are involved. The problem is who is to say what the loss is? The
- company can say whatever figure it likes and it would be tough to prove
- otherwise. They may decide to, for insurance purposes, blame some huge
- downtime expense on you. I can hear it now, "When we detected the intruder,
- we promptly took our system off-line. It took us two weeks to bring it up
- again for a loss in wasted manpower of $2 million." In some cases you might
- be better off just using the company's payroll system to cut you a couple of
- $10,000 checks. That way the government has a firm loss figure. This would
- result in a much shorter sentence. I'm not advocating blatant criminal actions.
- I just think the sentencing guidelines definitely need some work.
-
-
- PART II - FEDERAL PRISON
-
-
- A. STATE v. FEDERAL
-
- In most cases I would say that doing time in a Federal Prison is better
- than doing time in the state institutions. Some state prisons are such
- violent and pathetic places that it's worth doing a little more time in the
- Federal system. This is going to be changing however. The public seems to
- think that prisons are too comfortable and as a result Congress has passed a
- few bills to toughen things up.
-
- Federal prisons are generally going to be somewhat less crowded,
- cleaner, and more laid back. The prison I was at looked a lot like a college
- campus with plenty of grass and trees, rolling hills, and stucco buildings. I
- spent most of my time in the library hanging out with Minor Threat. We would
- argue over who was more elite. "My sentence was longer," he would argue. "I
- was in more books and newspapers," I would rebut. (humor)
-
- Exceptions to the Fed is better rule would be states that permit
- televisions and word processors in your cell. As I sit here just prior to
- release scribbling this article with pen and paper I yearn for even a Smith
- Corona with one line display. The states have varying privileges. You could
- wind up someplace where everything gets stolen from you. There are also
- states that are abolishing parole, thus taking away the ability to get out
- early with good behavior. That is what the Feds did.
-
- B. SECURITY LEVELS
-
- The Bureau of Prisons (BOP) has six security levels. Prisons are
- assigned a security level and only prisoners with the appropriate ratings are
- housed there. Often the BOP will have two or three facilities at one location.
- Still, they are essentially separate prisons, divided by fences.
-
- The lowest level facility is called a minimum, a camp, or FPC.
- Generally speaking, you will find first time, non-violent offenders with less
- than 10 year sentences there. Camps have no fences. Your work assignment at
- a camp is usually off the prison grounds at a nearby military base. Other
- times camps operate as support for other nearby prisons.
-
- The next level up is a low Federal Correctional Institution (FCI).
- These are where you find a lot of people who should be in a camp but for some
- technical reason didn't qualify. There is a double fence with razor wire
- surrounding it. Again you will find mostly non-violent types here. You would
- really have to piss someone off before they would take a swing at you.
-
- Moving up again we get to medium and high FCI's which are often
- combined. More razor wire, more guards, restricted movement and a rougher
- crowd. It's also common to find people with 20 or 30+ year sentences.
- Fighting is much more common. Keep to yourself, however, and people generally
- leave you alone. Killings are not too terribly common. With a prison
- population of 1500-2000, about one or two a year leave on a stretcher and don't
- come back.
-
- The United States Penitentiary (U.S.P.) is where you find the murderers,
- rapists, spies and the roughest gang bangers. "Leavenworth" and "Atlanta" are
- the most infamous of these joints. Traditionally surrounded by a 40 foot
- brick wall, they take on an ominous appearance. The murder rate per prison
- averages about 30 per year with well over 250 stabbings.
-
- The highest security level in the system is Max, sometimes referred to
- as "Supermax." Max custody inmates are locked down all the time. Your mail is
- shown to you over a TV screen in your cell. The shower is on wheels and it
- comes to your door. You rarely see other humans and if you do leave your cell
- you will be handcuffed and have at least a three guard escort. Mr. Gotti, the
- Mafia boss, remains in Supermax. So does Aldridge Ames, the spy.
-
-
- C. GETTING DESIGNATED
-
- Once you are sentenced, the BOP has to figure out what they want to do
- with you. There is a manual called the "Custody and Classification Manual"
- that they are supposed to follow. It is publicly available through the
- Freedom of Information Act and it is also in most prison law libraries.
- Unfortunately, it can be interpreted a number of different ways. As a result,
- most prison officials responsible for classifying you do pretty much as they
- please.
-
- Your first classification is done by the Region Designator at BOP
- Regional Headquarters. As a computer hacker you will most likely be placed in
- a camp or a low FCI. This is assuming you weren't pulling bank jobs on the
- side. -IF- you do wind up in an FCI, you should make it to a camp after six
- months. This is assuming you behave yourself.
-
- Another thing the Region Designator will do is to place a "Computer
- No" on your file. This means you will not be allowed to operate a computer at
- your prison work assignment. In my case I wasn't allowed to be within 10 feet
- of one. It was explained to me that they didn't even want me to know the
- types of software they were running. Incidentally, the BOP uses PC/Server
- based LANs with NetWare 4.1 running on Fiber 10baseT Ethernet connections to
- Cabletron switches and hubs. PC based gateways reside at every prison. The
- connection to the IBM mainframe (Sentry) is done through leased lines via
- Sprintnet's Frame Relay service with 3270 emulation software/hardware resident
- on the local servers. Sentry resides in Washington, D.C. with SNA type
- network concentrators at the regional offices. ;-) And I picked all of this up
- without even trying to. Needless to say, BOP computer security is very lax.
- Many of their publicly available "Program Statements" contain specific
- information on how to use Sentry and what it's designed to do. They have other
- networks as well, but this is not a tutorial on how to hack the BOP. I'll save
- that for if they ever really piss me off. (humor)
-
- Not surprisingly, the BOP is very paranoid about computer hackers. I
- went out of my way not to be interested in their systems or to receive
- computer security related mail. Nevertheless, they tried restricting my mail
- on numerous occasions. After I filed numerous grievances and had a meeting
- with the warden, they decided I was probably going to behave myself. My 20 or
- so magazine subscriptions were permitted to come in, after a special screening.
- Despite all of that I still had occasional problems, usually when I received
- something esoteric in nature. It's my understanding, however, that many
- hackers at other prisons have not been as fortunate as I was.
-
- D. IGNORANT INMATES
-
- You will meet some of the stupidest people on the planet in prison. I
- suppose that is why they are there, too dumb to do anything except crime. And
- for some strange reason these uneducated low class common thieves think they
- deserve your respect. In fact they will often demand it. These are the same
- people that condemn everyone who cooperated, while at the same time feel it is
- fine to break into your house or rob a store at gunpoint. These are the types
- of inmates you will be incarcerated with, and occasionally these inmates will
- try to get over on you. They will do this for no reason other than the fact
- you are an easy mark.
-
- There are a few tricks hackers can do to protect themselves in prison.
- The key to your success is acting before the problem escalates. It is also
- important to have someone outside (preferably another hacker) that can do some
- social engineering for you. The objective is simply to have your problem
- inmate moved to another institution. I don't want to give away my methods but
- if staff believes that an inmate is going to cause trouble, or if they believe
- his life is in danger, they will move him or lock him away in segregation.
- Social engineered letters (official looking) or phone calls from the right
- source to the right department will often evoke brisk action. It's also quite
- simple to make an inmates life quite miserable. If the BOP has reason to
- believe that an inmate is an escape risk, a suicide threat, or had pending
- charges, they will handle them much differently. Tacking these labels on an
- inmate would be a real nasty trick. I have a saying: "Hackers usually have
- the last word in arguments." Indeed.
-
- Chances are you won't have many troubles in prison. This especially
- applies if you go to a camp, mind your own business, and watch your mouth.
- Nevertheless, I've covered all of this in the event you find yourself caught
- up in the ignorant behavior of inmates whose lives revolve around prison. And
- one last piece of advice, don't make threats, truly stupid people are too
- stupid to fear anything, particularly an intelligent man. Just do it.
-
- E. POPULATION
-
- The distribution of blacks, whites and Hispanics varies from
- institution to institution. Overall it works out to roughly 30% white, 30%
- Hispanic and 30% black. The remaining 10% are various other races. Some
- joints have a high percent of blacks and vice versa. I'm not necessarily a
- prejudiced person, but prisons where blacks are in majority are a nightmare.
- Acting loud, disrespectful, and trying to run the place is par for the course.
-
- In terms of crimes, 60% of the Federal inmate population are
- incarcerated for drug related crimes. The next most common would be bank
- robbery (usually for quick drug money), then various white collar crimes. The
- Federal prison population has changed over the years. It used to be a place
- for the criminal elite. The tough drug laws have changed all of that.
-
- Just to quell the rumors, I'm going to cover the topic of prison rape.
- Quite simply, in medium and low security level Federal prisons it is unheard
- of. In the highs it rarely happens. When it does happen, one could argue
- that the victim was asking for it. I heard an inmate say once, "You can't
- make no inmate suck cock that don't wanta." Indeed. In my 41 months of
- incarceration, I never felt in any danger. I would occasionally have inmates
- that would subtly ask me questions to see where my preferences lie, but once I
- made it clear that I didn't swing that way I would be left alone. Hell, I got
- hit on more often when I was hanging out in Hollywood!
-
- On the other hand, state prisons can be a hostile environment for rape
- and fighting in general. Many of us heard how Bernie S. got beat up over use
- of the phone. Indeed, I had to get busy a couple of times. Most prison
- arguments occur over three simple things: the phone, the TV and money/drugs.
- If you want to stay out of trouble in a state prison, or Federal for that
- matter, don't use the phone too long, don't change the channel and don't get
- involved in gambling or drugs. As far as rape goes, pick your friends
- carefully and stick with them. And always, always, be respectful. Even if
- the guy is a fucking idiot (and most inmates are), say excuse me.
-
- My final piece of prison etiquette advice would be to never take your
- inmate problems to "the man" (prison staff). Despite the fact that most
- everyone in prison snitched on their co-defendants at trial, there is no
- excuse for being a prison rat. The rules are set by the prisoners themselves.
- If someone steps out of line there will likely be another inmate who will be
- happy to knock him back. In some prisons inmates are so afraid of being
- labeled a rat that they refuse to be seen talking alone with a prison staff
- member. I should close this paragraph by stating that this bit of etiquette
- is routinely ignored as other inmates will snitch on you for any reason
- whatsoever. Prison is a strange environment.
-
- F. DOING TIME
-
- You can make what you want to out of prison. Some people sit around
- and do dope all day. Others immerse themselves in a routine of work and
- exercise. I studied technology and music. Regardless, prisons are no longer
- a place of rehabilitation. They serve only to punish and conditions are only
- going to worsen. The effect is that angry, uneducated, and unproductive
- inmates are being released back into society.
-
- While I was incarcerated in 95/96, the prison band program was still
- in operation. I played drums for two different prison bands. It really helped
- pass the time and when I get out I will continue with my career in music. Now
- the program has been canceled, all because some senator wanted to be seen as
- being tough on crime. Bills were passed in Congress. The cable TV is gone,
- pornography mags are no longer permitted, and the weight piles are being
- removed. All this means is that prisoners will have more spare time on their
- hands, and so more guards will have to be hired to watch the prisoners. I
- don't want to get started on this subject. Essentially what I'm saying is
- make something out of your time. Study, get in to a routine and before you
- know you'll be going home, and a better person on top of it.
-
- G. DISCIPLINARY ACTIONS
-
- What fun is it if you go to prison and don't get into some mischief?
- Well, I'm happy to say the only "shots" (violations) I ever received were for
- having a friend place a call with his three-way calling for me (you can't call
- everyone collect), and drinking homemade wine. |-) The prison occasionally
- monitors your phone calls and on the seven or eight hundredth time I made a
- three-way I got caught. My punishment was ten hours of extra duty (cleaning
- up). Other punishments for shots include loss of phone use, loss of
- commissary, loss of visits, and getting thrown in the hole. Shots can also
- increase your security level and can get you transferred to a higher level
- institution. If you find yourself having trouble in this area you may want to
- pick up the book, "How to win prison disciplinary hearings", by Alan Parmelee,
- 206-328-2875.
-
- H. ADMINISTRATIVE REMEDY
-
- If you have a disagreement with the way staff is handling your case
- (and you will) or another complaint, there is an administrative remedy
- procedure. First you must try to resolve it informally. Then you can file a
- form BP-9. The BP-9 goes to the warden. After that you can file a BP-10
- which goes to the region. Finally, a BP-11 goes to the National BOP
- Headquarters (Central Office). The whole procedure is a joke and takes about
- six months to complete. Delay and conquer is the BOP motto. After you
- complete the remedy process to no avail, you may file your action in a civil
- court. In some extreme cases you may take your case directly to the courts
- without exhausting the remedy process. Again, the "Prisoners Self-Help
- Litigation Manual" covers this quite well.
-
- My best advice with this remedy nonsense is to keep your request brief,
- clear, concise and only ask for one specific thing per form. Usually if you
- "got it coming" you will get it. If you don't, or if the BOP can find any
- reason to deny your request, they will.
-
- For this reason I often took my problems outside the prison from the
- start. If it was a substantial enough issue I would inform the media, the
- director of the BOP, all three of my attorneys, my judge and the ACLU. Often
- this worked. It always pissed them off. But, alas I'm a man of principle and
- if you deprive me of my rights I'm going to raise hell. In the past I might
- have resorted to hacker tactics, like disrupting the BOP's entire
- communication system bringing it crashing down! But...I'm rehabilitated now.
- Incidentally, most BOP officials and inmates have no concept of the kind of
- havoc a hacker can wield on an individuals life. So until some hacker shows
- the BOP which end is up you will have to accept the fact most everyone you
- meet in prison will have only nominal respect for you. Deal with it, you're
- not in cyberspace anymore.
-
- I. PRISON OFFICIALS
-
- There are two types, dumb and dumber. I've had respect for several
- but I've never met one that impressed me as being particularly talented in a
- way other than following orders. Typically you will find staff that are
- either just doing their job, or staff that is determined to advance their
- career. The latter take their jobs and themselves way too seriously. They
- don't get anywhere by being nice to inmates so they are often quite curt.
- Ex-military and law enforcement wannabes are commonplace. All in all they're
- a pain in the ass but easy to deal with. Anyone who has ever been down
- (incarcerated) for awhile knows it's best to keep a low profile. If they don't
- know you by name you're in good shape.
-
- One of the problems that computer hackers will encounter with prison
- staff is fear and/or resentment. If you are a pretentious articulate educated
- white boy like myself you would be wise to act a little stupid. These people
- don't want to respect you and some of them will hate everything that you stand
- for. Many dislike all inmates to begin with. And the concept of you someday
- having a great job and being successful bothers them. It's all a rather
- bizarre environment where everyone seems to hate their jobs. I guess I've led
- a sheltered life.
-
- Before I move on, sometimes there will be certain staff members, like
- your Case Manager, that will have a substantial amount of control over your
- situation. The best way to deal with the person is to stay out of their way.
- Be polite, don't file grievances against them and hope that they will take
- care of you when it comes time. If this doesn't seem to work, then you need
- to be a total pain in the ass and ride them with every possible request you
- can muster. It's especially helpful if you have outside people willing to
- make calls. Strong media attention will usually, at the very least, make the
- prison do what they are supposed to do. If you have received a lot of bad
- press, this could be a disadvantage. If your care continues to be a problem,
- the prison will transfer you to another facility where you are more likely to
- get a break. All in all how you choose to deal with staff is often a
- difficult decision. My advice is that unless you are really getting screwed
- over or really hate the prison you are in, don't rock the boat.
-
- J. THE HOLE
-
- Segregation sucks, but chances are you will find yourself there at
- some point and usually for the most ridiculous of reasons. Sometimes you will
- wind up there because of what someone else did. The hole is a 6' x 10'
- concrete room with a steel bed and steel toilet. Your privileges will vary,
- but at first you get nothing but a shower every couple of days. Naturally they
- feed you but, it's never enough, and it's often cold. With no snacks you
- often find yourself quite hungry in-between meals. There is nothing to do
- there except read and hopefully some guard has been kind enough to throw you
- some old novel.
-
- Disciplinary actions will land you in the hole for typically a week or
- two. In some cases you might get stuck there for a month or three. It depends
- on the shot and on the Lieutenant that sent you there. Sometimes people never
- leave the hole....
-
- K. GOOD TIME
-
- You get 54 days per year off of your sentence for good behavior. If
- anyone tells you that a bill is going to be passed to give 108 days, they are
- lying. 54 days a year works out to 15% and you have to do something
- significant to justify getting that taken away. The BOP has come up with the
- most complicated and ridiculous way to calculate how much good time you have
- earned. They have a book about three inches thick that discusses how to
- calculate your exact release date. I studied the book intensely and came to
- the conclusion that the only purpose it serves is to covertly steal a few days
- of good time from you. Go figure.
-
- L. HALFWAY HOUSE
-
- All "eligible" inmates are to serve the last 10% of their sentence
- (not to exceed six months) in a Community Corrections Center (CCC). At the CCC
- , which is nothing more than a large house in a bad part of town, you are to
- find a job in the community and spend your evenings and nights at the CCC. You
- have to give 25% of the gross amount of your check to the CCC to pay for all of
- your expenses, unless you are a rare Federal prisoner sentenced to serve all of
- your time at the CCC in which case it is 10%. They will breathalyse and
- urinanalyse you routinely to make sure you are not having too much fun. If
- you're a good little hacker you'll get a weekend pass so you can stay out all
- night. Most CCCs will transfer you to home confinement status after a few
- weeks. This means you can move into your own place, (if they approve it) but
- still have to be in for the evenings. They check up on you by phone. And no,
- you are not allowed call forwarding, silly rabbit.
-
- M. SUPERVISED RELEASE
-
- Just when you think the fun is all over, after you are released from
- prison or the CCC, you will be required to report to a Probation Officer. For
- the next 3 to 5 years you will be on Supervised Release. The government
- abolished parole, thereby preventing convicts from getting out of prison early.
- Despite this they still want to keep tabs on you for awhile.
-
- Supervised Release, in my opinion, is nothing more than extended
- punishment. You are a not a free man able to travel and work as you please.
- All of your activities will have to be presented to your Probation Officer
- (P.O.). And probation is essentially what Supervised Release is. Your P.O.
- can violate you for any technical violations and send you back to prison for
- several months, or over a year. If you have ANY history of drug use you will
- be required to submit to random (weekly) urinalyses. If you come up dirty it's
- back to the joint.
-
- As a hacker you may find that your access to work with, or possession
- of computer equipment may be restricted. While this may sound pragmatic to
- the public, in practice it serves no other purpose that to punish and limit a
- former hacker's ability to support himself. With computers at libraries, copy
- shops, schools, and virtually everywhere, it's much like restricting someone
- who used a car to get to and from a bank robbery to not ever drive again. If a
- hacker is predisposed to hacking he's going to be able to do it with or
- without restrictions. In reality many hackers don't even need a computer to
- achieve their goals. As you probably know a phone and a little social
- engineering go a long way.
-
- But with any luck you will be assigned a reasonable P.O. and you will
- stay out of trouble. If you give your P.O. no cause to keep an eye on you,
- you may find the reins loosening up. You may also be able to have your
- Supervised Release terminated early by the court. After a year or so, with
- good cause, and all of your government debts paid, it might be plausible. Hire
- an attorney, file a motion.
-
- For many convicts Supervised Release is simply too much like being in
- prison. For those it is best to violate, go back to prison for a few months,
- and hope the judge terminates their Supervised Release. Although the judge
- may continue your supervision, he/she typically will not.
-
-
- PART III
-
-
- A. HOW TO AVOID DETECTION
-
- Now that you know what kind of trouble you are facing I'll go back to
- the beginning. If what I've just covered doesn't make you want to stop
- hacking then you had better learn how to protect yourself. Many hackers feel
- they have some god given constitutional right to hack. Many don't believe it
- should be illegal. Well, neurosis and personality disorders work in strange
- ways. Regardless, I'll cover the topic of stealth. Please note that I in no
- way advocate or encourage hacking. This technical information is being
- provided for educational purposes only. And as I mentioned you may feel you
- have a perfectly legitimate reason for avoiding detection, simply trying to
- stay clear of other hackers would be an acceptable reason. This paper (I'm
- sure) will also serve to educate law enforcement officials on the methods
- currently being deployed by hackers to avoid detection.
-
- Avoiding being identified while hacking is in actually a rather simple
- feat, assuming you follow a few simple rules. Unfortunately, very few
- people bother with them, due typically to arrogance and ego. Which as I have
- noticed, seems to be a trait that is a prerequisite to being a successful
- hacker. I've never met a hacker who didn't think he was the shit. And when
- it gets right down to it that was the reason that Mitnick got caught. I'll
- examine this incident a little later.
-
- So I will list here a few of the basic rules I used, and then I'll
- expound upon them a little later.
-
- * Most important of all, I would never tell another hacker who I was,
- where I lived, or give out my home phone number. (OK, I screwed up
- on that one.)
-
- * I didn't set up network access accounts up in my real name or use
- my real address.
-
- * I didn't set up phone numbers in my real name.
-
- * I would never dial directly in to anything I was hacking.
-
- * I would set up some kind of notification system that would let me
- know if someone was trying to figure out where I was connecting from.
-
- * I didn't transmit personal data on systems I had have hacked into.
-
- * When I used a network or computer for work or social objectives, I
- tried to keep it separate from my hacking.
-
- * I never assumed that just by connecting through a bunch of different
- networks or using cellular phones that I was safe. Even though most
- cellular networks do not have triangulation equipment installed they
- still have the ability to narrow a transmitting location down to a
- square mile of even a few blocks, this even well after you have dis-
- connected.
-
- * The minute I got into a system I would examine and edit all of the
- logs. I would also look for email daemons on admin or admin assoc-
- iated accts. that sent out copies of the system security logs.
-
- * When setting up accts. on systems I would use different login ID's.
-
- * I never went to hacker cons. (Until I worked with the FBI)
-
- * I would change network access dial up accts. and dial up numbers
- every so often. I would also change living locations every 8-12
- months.
-
- * I would keep in mind that the numbers I dialed on my phone could
- eventually be used to track me again. For example, if I called my
- girl friend frequently, after I changed numbers and location I might
- still be calling that number. The telcos now have toll record data
- base software that can cross reference and track this type of thing.
-
- * I rarely used IRC until I worked with the FBI. If -you- must, change
- your handle frequently, remain in invisible mode, and if you're leet
- enough, spoof your IP. Remember that you should never trust other
- hackers. Many times association with them will cause you as much
- trouble as a run in with the Feds.
-
- And yes the FBI logs all of the IRC channels and searches them for key
- words when they are looking for information on someone or some breech. There
- is a secret logging program running on a special irc.server that doesn't
- accept port 6667 connections, etc. Doesn't show up as a link either. Hmm. ;-)
-
- Following all of those rules would be tough. The fact of the matter
- is if you generate enough interest and piss off the right people, they will
- come after you. However, the FBI routinely passes over low level hackers.
- When I worked with the Bureau I was instructed that only the most malicious
- and aggressive hackers where to be investigated. Fine with me, wasn't my goal
- in life to put a bunch a little hacker dorks in jail. It's not real easy to
- catch an accomplished hacker but it can be done, it's really just a matter of
- contacting all of the right people and putting a little time into it.
- Typically hackers get caught because someone snitched. Thus the importance of
- my first rule, I never told anyone who I really was. The other primary reason
- for getting caught is arrogance or underestimating the abilities of the
- authorities. Poulsen didn't believe an investigator would sit outside of a
- grocery store for a week on the off chance he might show up. Poulsen had used
- the pay phones at that store a few times, which was determined by a toll
- record search. Mitnick didn't think someone would go through the trouble of
- doing toll searches on cell phone records then radio frequency triangulating
- his location.
-
- Poulsen and I went through some rather elaborate anti-detection
- procedures. Since I had physical access to my local telco Central Office I
- would activate, connect, and wire all of my own phone services. There was
- essentially no record of my phone number or cable and pair data. In addition,
- I ran the wires going into my apartment through a trash chute, over the roof
- covered by tar, and down a vent pipe into my bathroom. The connection to the
- bridging terminal (F2) was through a hole drilled into the back of the
- junction box. Examination of the telephone box in the basement of my building
- revealed no connections, you would have had to take the box apart to see it.
- And if that wasn't enough over at the C.O. I tapped on to the output channel
- (SC1, which was the feed to SCCS) of the 1AESS telephone switch and ran it up
- to my apartment. There I had an old PC-XT with a Bell 202 modem watching the
- 1AESS output. Poulsen wrote a small basic program that looked for call traces
- and any other suspicious activity. The XT would start beeping and print out
- any of those output messages. Elaborate indeed.
-
-
- B. THE STEALTH BOX
-
-
- But a truly good anti-detection system would notify you absolutely if
- someone was attempting to trace your connection. In addition, it would
- terminate the connection before it allowed someone to see where it was going.
- What I am suggesting is some type of dial in/dial out mechanism. For example,
- 2 modems connected back to back, with their 232 ports connected. They would
- then be placed in a generic wall mounted box in anonymous phone closet
- somewhere. In addition, a stun gun would be wired to give the modems a death
- shock if the box was opened by an unauthorized person. A password would be
- set on the modem for dial out and the phone lines feeding the two modems would
- have to be set up under separate accounts. This would require anyone
- investigating, to come out and take a gander at this device to determine that,
- it's not the location of the hacker, and that yet another call trace is in
- order to see who is dialing in. However, having opened the box the
- investigator has disabled the device and when you dial in you'll know that
- something is up. Even if they attempt to replace the device, they could never
- know the original password, or even if there was one. It would be further
- advisable to disguise the telephone lines feeding the device, making it
- necessary to open the box to identify them.
-
- Well that's just an idea for the design of an anti-detection device.
- It's obviously a bit complex, but you get the idea. My point being that
- avoiding detection is not a simple task. If someone wants you they can get
- you. There really isn't such a thing as a secure connection; virtually
- everything can be traced, short of a highly directional data burst satellite
- uplink. At that point the Air Force National Reconnaissance Office (NRO) or
- the NSA would have to get involved, big bucks.
-
- Aside from setting up physical hardware another idea would be to find
- a Sysadmin that will let you use his system to connect through. If you trust
- him to tell you if there has been an inquiry regarding your connection then
- you might be OK. It would also be wise to set up background processes that
- monitor finger and other related probes of your account. Watch them watch you.
-
- As I mentioned earlier if you fall under surveillance there will be
- 2-way radio traffic in your vicinity. Using the Opto-Electronics Explorer
- will detect this and you can further investigate to see who it may be. Good
- physical surveillance is difficult to detect. Bad physical surveillance is
- comical.
-
-
- C. MORE PROTECTION
-
-
- I covered encryption earlier and as I mentioned it really is not safe
- to assume that it will protect you from someone who takes possession of your
- computer. The only truly safe encryption would be a military spec.
- hardware/software implementation. When people talk about secure encryption
- they are not taking into account that all the power of a Government might be
- trying to crack it, and that they will have physical access to the encryption
- device, your computer! This leaves us with one other method, destroying the
- data. Now this in and of it's self can be construed as obstruction of
- justice. However, should you feel the need to instantly destroy all of the
- data on your hard drive, for oh.. lets say educational purposes. I would
- suggest mounting a bulk magnetic tape eraser next to your hard drive. You can
- pick one up at Radio Hack, err Shack. One flip of the panic switch, thus
- powering up the eraser while the drive is turning, and ZAP! Mount a switch
- next to your bed. ;-)
-
- This may or may not destroy all of the data on your drive. If the
- drive disk is removed and placed on a special reader some data may still be
- recovered. This is a science in itself. DOD spec. requires that a hard drive
- be written to with O's 7 times before it is considered erased. Simply erasing
- a file, formatting, or defragging will not suffice. Look for a shareware
- utility named "BCwipe". This will erase to military spec. You may also want
- to install some type of program that auto erases under certain conditions.
- Regardless, computer specialists that work with computer crime are trained to
- look for this.
-
- There are still a lot of issues that could be covered with respect to
- avoiding detection and keeping clear of hackers. In fact I could fill a book,
- and in retrospect I probably should have. But I told a lot of people I would
- write this file and make it public. Hope you found it of some assistance.
-
-
- CLOSURE
-
- What a long strange trip it's been. I have a great deal of mixed
- emotions about my whole ordeal. I can however, say that I HAVE benefited
- from my incarceration. However, it certainly was not on the behalf of how I
- was handled by the government. No, despite their efforts to kick me when I
- was down, use me, turn their backs after I had assisted them, and in general,
- just violate my rights, I was still able to emerge better educated than when I
- went in. But frankly, my release from prison was just in the nick of time.
- The long term effects of incarceration and stress were creeping up on me, and
- I could see prison conditions were worsening. It's hard to express the
- poignancy of the situation but the majority of those incarcerated feel that if
- drastic changes are not made America is due for some serious turmoil, perhaps
- even a civil war. Yes, the criminal justice system is that screwed up. The
- Nation's thirst for vengeance on criminals is leading us into a vicious
- feedback loop of crime and punishment, and once again crime. Quite simply,
- the system is not working. My purpose in writing this article was not to send
- any kind of message. I'm not telling you how not to get caught and I'm not
- telling you to stop hacking. I wrote this simply because I feel like I owe it
- to whomever might get use of it. For some strange reason I am oddly compelled
- to tell you what happened to me. Perhaps this is some kind or therapy,
- perhaps it's just my ego, perhaps I just want to help some poor 18 year old
- hacker who really doesn't know what he is getting himself in to. Whatever the
- reason, I just sat down one day and started writing.
-
- If there is a central theme to this article it would be how ugly your
- world can become. Once you get grabbed by the law, sucked into their vacuum,
- and they shine the spotlight on you, there will be little you can do to
- protect yourself. The vultures and predators will try to pick what they can
- off of you. It's open season for the U.S. Attorneys, your attorney, other
- inmates, and prison officials. You become fair game. Defending yourself from
- all of these forces will require all of your wits, all of your resources, and
- occasionally your fists.
-
- Furthering the humiliation, the press, as a general rule, will not be
- concerned with presenting the truth. They will print what suits them and
- often omit many relevant facts. If you have read any of the 5 books I am
- covered in you will no doubt have a rather jaded opinion of me. Let me assure
- you that if you met me today you would quickly see that I am quite likable and
- not the villain many (especially Jon Littman) have made me out to be. You may
- not agree with how I lived my life, but you wouldn't have any trouble
- understanding why I chose to live it that way. Granted I've made my mistakes,
- growing up has been a long road for me. Nevertheless, I have no shortage of
- good friends. Friends that I am immensely loyal to. But if you believe
- everything you read you'd have the impression that Mitnick is a vindictive
- loser, Poulsen a furtive stalker, and I a two faced rat. All of those
- assessments would be incorrect.
-
- So much for first impressions. I just hope I was able to enlighten
- you and in some way to help you make the right choice. Whether it's
- protecting yourself from what could be a traumatic life altering experience,
- or compelling you to focus your computer skills on other avenues, it's
- important for you to know the program, the language, and the rules.
-
- See you in the movies.
-
- Agent Steal
- 1997
-
- ----[ EOF
-
-