mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
439 lines
25 KiB
Text
439 lines
25 KiB
Text
![]() |
==Phrack Inc.==
|
||
|
|
||
|
Volume Three, Issue 25, File 10 of 11
|
||
|
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
PWN PWN
|
||
|
PWN P h r a c k W o r l d N e w s PWN
|
||
|
PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN
|
||
|
PWN Issue XXV/Part 2 PWN
|
||
|
PWN PWN
|
||
|
PWN March 29, 1989 PWN
|
||
|
PWN PWN
|
||
|
PWN Created, Written, and Edited PWN
|
||
|
PWN by Knight Lightning PWN
|
||
|
PWN PWN
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
|
||
|
|
||
|
German Hackers Break Into Los Alamos and NASA March 2, 1989
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
Three hours ago, a famous German TV-magazine revealed maybe one of the greatest
|
||
|
scandals of espionage in computer networks: They talk about some (three to
|
||
|
five) West German hackers breaking into several secret data networks (Los
|
||
|
Alamos, Nasa, some military databases, (Japanese) war industry, and many
|
||
|
others) in the interests of the KGB, USSR. They received sums of $50,000 to
|
||
|
$100,000 and even drugs, all from the KGB, the head of the political
|
||
|
television-magazine said.
|
||
|
|
||
|
The following news articles (and there are a lot) all deal with (directly and
|
||
|
indirectly) the recent Spy scandal situation that occurred in West Germany.
|
||
|
The majority of the articles shown here are taken from RISKS Digest, but they
|
||
|
have been edited for this presentation.
|
||
|
|
||
|
This presentation contains some information not previously seen (at least not
|
||
|
in this format).
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Computer Espionage: Three "Wily Hackers" Arrested March 2, 1989
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
Three hackers have been arrested in Berlin, Hamburg and Hannover, and they are
|
||
|
accused of computer espionage for the Soviet KGB. According to the television
|
||
|
magazine "Panorama" (whose journalists have first published the NASA and SPAN
|
||
|
hacks), they intruded scientific, military and industry computers and gave
|
||
|
passwords, access mechanisms, programs and data to 2 KGB officers; among
|
||
|
others, intrusion is reported of the NASA headquarters, the Los Alamos and
|
||
|
Fermilab computers, the United States Chief of Staff's data bank OPTIMIS, and
|
||
|
several more army computers. In Europe, computers of the French-Italian arms
|
||
|
manufacturer Thomson, the European Space Agency ESA, the Max Planck Institute
|
||
|
for Nuclear Physics in Heidelberg, CERN/GENEVA and the German Electron
|
||
|
Accelerator DESY/Hamburg are mentioned. The report says that they earned
|
||
|
several 100,000 DM plus drugs (one hacker evidently was drug addict) over about
|
||
|
3 years.
|
||
|
|
||
|
For the German Intelligence authorities, this is "a new quality of espionage."
|
||
|
The top manager said that they had awaited something similar but are
|
||
|
nevertheless surprised that it happened so soon and with such broad effects.
|
||
|
|
||
|
Summarizing the different events which have been reported earlier -- NASA and
|
||
|
SPAN hacks, Clifford Stoll's report of the "Wily Hacker" -- I regard this as
|
||
|
essentially the final outcome of the Wily Hackers story (with probably more
|
||
|
than the 3 which have now been imprisoned). It is surprising that the
|
||
|
Intelligence authorities needed so long time (after Cliff's Communications Of
|
||
|
The ACM report, in May 1988) to finally arrest and accuse these crackers.
|
||
|
Moreover, the rumors according to which design and production plans of a
|
||
|
Megabit chip had been stolen from Philips/France computers seems to become
|
||
|
justified; this was the background that CCC hacker Steffen Wernery had been
|
||
|
arrested, for several months, in Paris without being accused. CAD/CAM programs
|
||
|
have also been sold to KBG.
|
||
|
|
||
|
Information Provided By
|
||
|
Klaus Brunnstein
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
Computer Spy Ring Sold Top Secrets To Russia March 3, 1989
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
West German counter-intelligence has uncovered a spy ring centered on computer
|
||
|
hackers suspected of having supplied the Soviet Union with top secret military
|
||
|
and economic information.
|
||
|
|
||
|
They are said to have penetrated computer networks in the United States,
|
||
|
Western Europe and Japan, according to a television report last night.
|
||
|
|
||
|
In a special program, the North German Broadcasting Network said that thousands
|
||
|
of computer codes, passwords and programs which allowed the Soviet Union access
|
||
|
to major computer centers in the Western world have been passed on by the
|
||
|
hackers. They had been recruited by the KGB in 1985 and are alleged to have
|
||
|
supplied the information in return for money and drugs.
|
||
|
|
||
|
In Karlsruhe, the West German Chief Public Prosecutor's Office, which is in
|
||
|
charge of spy cases, would only confirm last night that three arrests have been
|
||
|
made March 2nd during house searches in Hannover and West Berlin.
|
||
|
|
||
|
Those detained were suspected of "having obtained illegally, through hacking
|
||
|
and in exchange for money, information which was passed on to an Eastern secret
|
||
|
service."
|
||
|
|
||
|
But the spokesman did not share West German television's evaluation, which said
|
||
|
the case was the most serious since the unmasking in 1974 of an East German
|
||
|
agent in the office of ex-Chancellor Willy Brandt. The Interior Ministry in
|
||
|
Bonn last night also confirmed several arrests and said the suspects had
|
||
|
supplied information to the KGB. The arrests followed months of investigations
|
||
|
into the activities of young computer freaks based in Hamburg, Hannover and
|
||
|
West Berlin, the ministry said.
|
||
|
|
||
|
According to the television report, the hackers gained access to the data banks
|
||
|
of the Pentagon, NASA Space Center, and the nuclear laboratory in Los Alamos.
|
||
|
|
||
|
They also penetrated leading West European computer centers and armament
|
||
|
companies, including the French Thomson group, the European Nuclear Research
|
||
|
Center, CERN, in Geneva; the European Space Authority, ESA, and German
|
||
|
companies involved in nuclear research.
|
||
|
|
||
|
The Russians are alleged to have put pressure on the hackers because of their
|
||
|
involvement with drugs, and to have paid several hundred thousands marks for
|
||
|
information, the program said.
|
||
|
|
||
|
West German security experts on the evening of March 2nd described the new spy
|
||
|
case as "extremely grave." The KGB has been provided with a "completely new
|
||
|
possibility of attack" on Western high technology and NATO military secrets.
|
||
|
The sources said it was "sensational" that the hackers should have succeeded in
|
||
|
penetrating the US defense data systems from Western Europe.
|
||
|
|
||
|
The North German Broadcasting Network program said its research was based on
|
||
|
information given by two members of the suspected espionage ring.
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
KGB Computer Break-Ins Alleged In West Germany March 3, 1989
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
Taken From the International Herald Tribune
|
||
|
|
||
|
Bonn - Three West German computer hackers have been arrested on suspicion of
|
||
|
infiltrating computer networks worldwide to obtain secret data for an East
|
||
|
block intelligence service, prosecutors said on March 2nd.
|
||
|
|
||
|
A spokesman for the federal prosecutor, Alexander Prechtel, confirmed that
|
||
|
three men were arrested, but did not identify the East Block country involved
|
||
|
or the networks infiltrated.
|
||
|
|
||
|
The ARD television networks "Panorama" program, the thrust of which the
|
||
|
spokesman confirmed, said the hackers had passed secrets from a range of highly
|
||
|
sensitive U.S., French, and West German computer networks to the KGB, the
|
||
|
Soviet secret police.
|
||
|
|
||
|
The television report said it was the worst such espionage case to be uncovered
|
||
|
in West Germany since the 1974 exposure of Guenter Guillaume, an East German
|
||
|
spy who was a top aide to Willy Brandt, then the West German chancellor.
|
||
|
|
||
|
Among the systems believed to have been infiltrated were the U.S.: Defense
|
||
|
Department's staff data bank, the U.S. nuclear arms laboratory in Los Alamos,
|
||
|
New Mexico, the National Aeronautics and Space Administration, and U.S.
|
||
|
military supply depots.
|
||
|
|
||
|
The report said other systems entered were at the French arms and electronics
|
||
|
company Thomson SA, a European nuclear-research center in Geneva, the European
|
||
|
Space Agency and the Max-Planck Institute for Nuclear Physics in West Germany.
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
News From The KGB/Wily Hackers March 7, 1989
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
Now, five days after the "sensational" disclosure of the German (NDR) Panorama
|
||
|
Television team, the dust of speculations begins to rise and the facts become
|
||
|
slowly visible; moreover, some questions which could not be answered in
|
||
|
Clifford Stoll's Communications of the ACM paper may now be answered. Though
|
||
|
not all facts are known publicly, the following facts seem rather clear.
|
||
|
|
||
|
- In 1986, some hackers from West Berlin and Hannover discussed, in "hacker
|
||
|
parties" with alcohol and drugs, how to solve some personal financial
|
||
|
problems; at that time, first intrusions of scientific computers
|
||
|
(probably CERN/Geneva as hacker training camp) and Chaos Computer Club's
|
||
|
spectacular BTX-intrusion gave many hackers (assisted by newsmedia) the
|
||
|
*puerile impression* that they could intrude *into every computer
|
||
|
system*; I remember contemporary discussions on 1986/87 Chaos Computer
|
||
|
Conferences about possibilities, when one leading CCC member warned that
|
||
|
such hacks might also attract espionage (Steffen Wernery recently
|
||
|
mentioned that German counter-espionage had tried several times to hire
|
||
|
him and other CCC members as advisors -- unsuccessfully).
|
||
|
|
||
|
- A "kernel group" of 5 hackers who worked together, in some way, in the
|
||
|
"KGB case" are (according to Der SPIEGEL, who published the following
|
||
|
names in its Monday, March 6, 1989 edition):
|
||
|
|
||
|
-> Markus Hess, 27, from Hannover, Clifford Stoll's "Wily Hacker" who was
|
||
|
often referred to as the Hannover Hacker and uses the alias of Mathias
|
||
|
Speer; after having ended (unfinished) his studies in mathematics, he
|
||
|
works as programmer, and tries to get an Informatics diploma at the
|
||
|
University of Hagen (FRG); he is said to have good knowledge of VMS
|
||
|
and UNIX.
|
||
|
|
||
|
-> Karl Koch, 23, from Hannover, who works as programmer; due to his
|
||
|
luxurious lifestyle and his drug addiction, his permanent financial
|
||
|
problems have probably added to his desire to sell "hacker knowledge"
|
||
|
to interested institutions.
|
||
|
|
||
|
-> Hans Huebner, alias "Pengo," from Berlin, who after having received
|
||
|
his Informatics diploma from Technical University of West Berlin,
|
||
|
founded a small computer house; the SPIEGEL writes that he needed
|
||
|
money for investment in his small enterprise; though he does not
|
||
|
belong to the Chaos Computer Club, he holds close contacts to the
|
||
|
national hacker scenes (Hamburg: Chaos Computer Club; Munich: Bavarian
|
||
|
Hacker Post; Cologne: Computer Artists Cologne, and other smaller
|
||
|
groups), and he was the person to speak about UUCP as a future
|
||
|
communications medium at the Chaos Communication Congress.
|
||
|
|
||
|
-> Dirk Brezinski, from West Berlin, programmer and sometimes
|
||
|
"troubleshooter" for Siemens BS-2000 systems (the operating system of
|
||
|
Siemens mainframe computers), who earned, when working for Siemens or
|
||
|
a customer (BfA, a national insurance for employees) 20,000 DM (about
|
||
|
$10,800) a month; he is regarded (by an intelligence officer) as "some
|
||
|
kind of a genius."
|
||
|
|
||
|
-> Peter Carl, from West Berlin, a former croupier, who "always had
|
||
|
enough cocaine." No information about his computer knowledge or
|
||
|
experience is available.
|
||
|
|
||
|
After successfully stimulating KGB's interest, the group (mainly Hess and Koch)
|
||
|
committed their well-documented hacks [See Clifford Stoll's "Stalking the Wily
|
||
|
Hacker," Communications of the ACM, May 1988]. SPIEGEL writes that the group
|
||
|
*sold 5 diskettes full of passwords*, from May to December 1986, to KGB
|
||
|
officers which they met in East Berlin; when Bremen University computer center,
|
||
|
their favorite host for transatlantic hacks, asked the police to uncover the
|
||
|
reasons for their high telephone bills, they stopped the action.
|
||
|
|
||
|
This statement of Der SPIEGEL is probably wrong because, as Cliff describes,
|
||
|
the "Wily Hacker" successfully worked until early 1988, when the path from his
|
||
|
PC/telephone was disclosed by TYMNET/German Post authorities. The German
|
||
|
public prosecutors did not find enough evidence for a trial, when examining
|
||
|
Hess' apartment; moreover, they had acquired the material in illegal actions,
|
||
|
so the existing evidence could not be used and finally had to be scratched!
|
||
|
|
||
|
In Hess' apartment, public prosecutors found (on March 3, 1989) password lists
|
||
|
from other hacks. On Monday, March 6, 1989, the Panorama team (who had
|
||
|
disclosed the NASA hack and basically the KGB connection) asked Klaus
|
||
|
Brunnstein to examine some of the password lists; the material which he saw
|
||
|
(for 30 minutes) consisted of about 100 photocopied protocols of a hack during
|
||
|
the night of July 27 to 28, 1987; it was the famous "NASA hack." From a VAX
|
||
|
750 (with VMS 4.3), which they entered via DATEX-P (the German packed-switched
|
||
|
data-exchange network, an X.25 version), where they evidently previously had
|
||
|
installed a Trojan horse (UETFORT00.EXE), they tried, via SET HOST... to
|
||
|
log-into other VAXes in remote institutes. They always used SYSTEM account and
|
||
|
the "proper" password (invisible).
|
||
|
|
||
|
Remark: Unfortunately, DEC's installation procedure works only if a SYSTEM
|
||
|
account is available; evidently, most system managers do not change
|
||
|
the preset default password MANAGER; since Version 4.7, MANAGER is
|
||
|
excluded, but on previous VMS versions, this hole probably exists in
|
||
|
many systems!
|
||
|
|
||
|
Since the hackers, in more than 40% of the cases, succeeded to login, their
|
||
|
first activities were to SET PRIV=ALL; SET PRIO=9, and then to install (via
|
||
|
trans-net copy) the Trojan horse. With the Trojan horse (not displayed under
|
||
|
SHow Users), they copied the password lists to their PCs. When looking through
|
||
|
the password list, Klaus observed the well-known facts: More than 25% female
|
||
|
or male first names, historical persons, countries, cities, or local dishes (in
|
||
|
the Universities of Pisa, Pavia, and Bologna, INSALATA was/is a favorite
|
||
|
password of several people). Only in CASTOR and POLLUX, the password lists
|
||
|
contained less than 5% passwords of such nature easy to guess!
|
||
|
|
||
|
Apart from many (about 39) unsuccessful logins, many different CERN/GENEVA,
|
||
|
NASA systems (CASTOR, POLLUX, Goddard and Ames Space Flight Centers), several
|
||
|
USA, GB, French, Italian and some German institutes connected in SPAN were
|
||
|
"visited." The documented session was from July 27, 10 p.m. to July 28, 1 a.m.
|
||
|
|
||
|
The media report that other hacks (probably not all committed by Hess and Koch
|
||
|
themselves) were sold to KGB. Among them, Electronic and Computer Industry
|
||
|
seem to be of dominant interest for the USSR. If special CAD/CAM programs and
|
||
|
Megabit designs (especially from Thomson/France, from VAX systems) have been
|
||
|
stolen, the advantage and value for the USSR cannot be (over)estimated.
|
||
|
|
||
|
In FRG, the current discussion is whether the hackers succeeded to get into
|
||
|
"kernel areas" or only "peripheral areas." This discussion is ridiculous since
|
||
|
most "peripheral systems" contain developments (methods, products) for future
|
||
|
systems, while the "kernel systems" mainly contain existing applications (of
|
||
|
past architectures).
|
||
|
|
||
|
The well-known hackers (especially CCC) have been seriously attacked by some
|
||
|
media. My best guess is that CCC was itself *a victim* because the group
|
||
|
succeeded to informally get much of the information which they needed for some
|
||
|
of the hacks, and which they finally sold to KGB. Apart from "Pengo," there
|
||
|
doesn't seem to be a close relation between CCC and the KGB/Wily Hackers.
|
||
|
Nevertheless, CCC and others, like Cheshire Catalyst in the USA, have prepared
|
||
|
a climate where espionage inevitably sprang-off.
|
||
|
|
||
|
Information Provided By
|
||
|
Klaus Brunnstein
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Pengo Speaks Out About The KGB Hackers And More March 10, 1989
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
The following are statements made by Pengo to Phrack Inc. during an interview
|
||
|
with Knight Lightning;
|
||
|
|
||
|
KL: What is your response to the accusations of being a KGB spy?
|
||
|
|
||
|
P: I have been involved into this espionage circle throughout some months in
|
||
|
1986. I did not actually work for the KGB, nor did I hand out hacker
|
||
|
information to the East. All my hacking activities since then have been
|
||
|
for the pure purpose of personal enlightenment. I never hid my name
|
||
|
before, and I won't go undercover now that the real story comes to the
|
||
|
surface.
|
||
|
|
||
|
In the middle of 1988, I informed the West German authorities (secret
|
||
|
service) about my involvement with the KGB. This is one of the main
|
||
|
reasons for the big busts last week. I have to live with the fact that
|
||
|
some hackers now think I am working for the authorities now. I don't, and
|
||
|
I will try anything to avoid getting into all these secret
|
||
|
service/espionage problems again.
|
||
|
|
||
|
KL: What about the statements made in DER SPIEGEL?
|
||
|
|
||
|
P: They published my name and claimed that I was "very active" for the east,
|
||
|
but also that I am the :most hopeful head in West Berlin's hacking scene."
|
||
|
I now try to make the best out of this publicity.
|
||
|
|
||
|
KL: Klaus Brunnstein made some strong statements about you in RISKS Digest,
|
||
|
what did you think of that?
|
||
|
|
||
|
P: It really upsets me a lot. Klaus Brunnstein doesn't know anything
|
||
|
detailed about this case, but he seems to love seeing himself as the
|
||
|
insider in the German scene. At the last congress I got in kind of a
|
||
|
dispute with him. He could not understand why I, as a computer scientist,
|
||
|
still support hackers. Perhaps this is one of the reasons for his
|
||
|
publication.
|
||
|
|
||
|
KL: Any other comments?
|
||
|
|
||
|
P: What I would be interested in hearing about the reaction to this situation
|
||
|
from the United States hackers' point of view. I have already heard that
|
||
|
most people seem to believe that the whole Chaos Computer Club is an
|
||
|
association of spies. This is of course untrue.
|
||
|
|
||
|
KL: What do you intend to do about the bad press you have received?
|
||
|
|
||
|
P: I have posted a reply to Brunnstein's posting in RISKS (shown in next
|
||
|
article). Apart from Hagbard, those guys never were hackers, and it seems
|
||
|
to turn out that they have really been mere spies.
|
||
|
|
||
|
KL: Were there any other repercussions to this case besides bad publicity?
|
||
|
|
||
|
P: Currently, I'm puzzling out a new way of earning money, since my company
|
||
|
decided to fire me. That's what you get if you play with fire :-)
|
||
|
|
||
|
Luckily, I'm optimist!
|
||
|
|
||
|
-Pengo
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
Pengo Speaks In RISKS Digest March 10, 1989
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
In RISKS Digest, Klaus Brunnstein mentioned my name in the context of the
|
||
|
hacker/espionage case recently discovered by the German authorities. Since Mr.
|
||
|
Brunnstein is not competent to speak about the background of the case, I'd like
|
||
|
to add some clarification to prevent misunderstandings, especially concerning
|
||
|
my role. I think it is a very bad practice to just publish names of people
|
||
|
without giving background information.
|
||
|
|
||
|
I have been an active member of the net community for about two years now, and
|
||
|
I want to explicitly express that my network activities have in no way been
|
||
|
connected to any contacts to secret services, be it Western or Eastern ones.
|
||
|
|
||
|
On the other hand, it is a fact that when I was younger (I'm 20 years old now),
|
||
|
there had been a circle of people which tried to make deals with an eastern
|
||
|
secret service. I have been involved in this, but I hope that I did the right
|
||
|
thing by giving the German authorities detailed information about my
|
||
|
involvement in the case in the summer of 1988.
|
||
|
|
||
|
As long as the lawsuit on this case is still in progress, I am not allowed to
|
||
|
give out any details about it to the public. As soon as I have the freedom to
|
||
|
speak freely about all of this, I'll be trying to give a detailed picture about
|
||
|
the happenings to anyone who's interested.
|
||
|
|
||
|
I define myself as a hacker. I acquired most of my knowledge by playing around
|
||
|
with computers and operating systems, and yes, many of these systems were
|
||
|
private property of organizations that did not even have the slightest idea
|
||
|
that I was using their machines. I think that hackers (people who creatively
|
||
|
handle technology and not just see computing as their job) do a service for the
|
||
|
computing community in general. It has been pointed out by other people that
|
||
|
most of the "interesting" modern computer concepts have been developed or
|
||
|
outlined by people who define themselves as "hackers."
|
||
|
|
||
|
When I started hacking foreign systems, I was 16 years old. I was just
|
||
|
interested in computers, not in the data which has been kept on their disks.
|
||
|
As I was going to school at that time, I didn't even have the money to buy my
|
||
|
own computer. Since CP/M (which was the most sophisticated OS I could use on
|
||
|
machines which I had legal access to) didn't turn me on anymore, I enjoyed the
|
||
|
lax security of the systems I had access to by using X.25 networks.
|
||
|
|
||
|
You might point out that I should have been patient and wait until I could go
|
||
|
to the university and use their machines. Some of you might understand that
|
||
|
waiting was just not the thing I was keen on in those days. Computing had
|
||
|
become an addiction for me, and thus I kept hacking. I hope this clears the
|
||
|
question "why."
|
||
|
|
||
|
It was definitely NOT to give the Russians any advantage over the USA, nor to
|
||
|
become rich and get a flight to the Bahamas as soon as possible. The results
|
||
|
of the court trial will reveal this again, but until then I want to keep rumors
|
||
|
out that the German hackers were just the long (?) arm of the KGB to harm
|
||
|
Western computer security or defense power.
|
||
|
|
||
|
It should also be pointed out that the Chaos Computer Club has in no way been
|
||
|
connected to this recent case, and again, that the CCC as an organization has
|
||
|
never been a "hacker group." The CCC merely handles the press for hackers, and
|
||
|
tries to point out implications of computers and communications for society in
|
||
|
general.
|
||
|
|
||
|
I have already lost my current job, because of my name being published in DER
|
||
|
SPIEGEL and in RISKS. My business partners became anxious about my involvement
|
||
|
in the case. Several projects I was about to complete in the near future have
|
||
|
been cancelled, which forces me to start again at the beginning in some way.
|
||
|
|
||
|
-Hans Huebner
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
Klaus Brunnstein Reacts To Pengo In RISKS Digest March 14, 1989
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
"Pengo" Hans Huebner stated that he had no share in the KBG case as I mentioned
|
||
|
in my report. Since I myself had no share in the KGB case (and in this sense,
|
||
|
I am not as good a source as Pengo!), I tried to transmit only information
|
||
|
where I had at least *two independent sources* of *some credibility*. In
|
||
|
Pengo's case (where I was rather careful because I could not believe what I
|
||
|
read), my two sources were:
|
||
|
|
||
|
- The SPIEGEL report (I personally agree that names should be avoided as
|
||
|
long as current investigations are underway; yet in this cases, the names
|
||
|
have been widely published in FRG and abroad);
|
||
|
|
||
|
- A telephone conversation with a leading Chaos Computer Club person after
|
||
|
he had informed me about a public debate at Hannover fair (where the
|
||
|
German daily business newspaper, Wirtschafts, which had organized a
|
||
|
discussion with data protection people and CCC).
|
||
|
|
||
|
I asked him whether he knew of Pengo's contribution; he told me that
|
||
|
he directly asked Pengo, "Did you, without pressure and at your own
|
||
|
will, work for the Russians?" Pengo answered, "Yes." He told me that
|
||
|
he immediately cut-off any contact to Pengo. Evidently, there was a
|
||
|
controversial discussion in Chaos Computer Club whether on should react
|
||
|
in such a strict manner. I understand the strong reaction because the
|
||
|
KGB hackers severely damaged the CCC's attempt to seriously contribute to
|
||
|
the public discussion of some of the social consequences of computers.
|
||
|
They now face, more seriously than before, the problem of being regarded
|
||
|
as members of a criminal gang.
|
||
|
|
||
|
-Klaus Brunnstein
|
||
|
_______________________________________________________________________________
|