mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
269 lines
15 KiB
Text
269 lines
15 KiB
Text
![]() |
==Phrack Classic==
|
||
|
|
||
|
Volume Three, Issue 32, File #7 of 12
|
||
|
|
||
|
|
||
|
13th Annual National Computer Security Conference
|
||
|
October 1-4, 1990
|
||
|
Omni Shoreham Hotel
|
||
|
Washington, D.C.
|
||
|
A "Knight Lightning" Perspective
|
||
|
by Craig M. Neidorf
|
||
|
|
||
|
Dr. Dorothy Denning first hinted at inviting me to take part on her panel
|
||
|
"Hackers: Who Are They?" in May 1990 when we first came into contact while
|
||
|
preparing for my trial. At the time I did not feel that it was a very good
|
||
|
idea since no one knew what would happen to me over the next few months. At
|
||
|
the conclusion of my trial I agreed to participate and surprisingly, my
|
||
|
attorney, Sheldon Zenner (of Katten, Muchin, & Zavis), accepted an invitation
|
||
|
to speak as well.
|
||
|
|
||
|
A few weeks later there was some dissension to the idea of having me appear at
|
||
|
the conference from some professionals in the field of computer security. They
|
||
|
felt that my presence at such a conference undermined what they stood for and
|
||
|
would be observed by computer "hackers" as a reward of sorts for my notoriety
|
||
|
in the hacker community. Fortunately Dr. Denning stuck to her personal values
|
||
|
and did not exclude me from speaking.
|
||
|
|
||
|
Unlike Gordon Meyer, I was unable to attend Dr. Denning's presentation
|
||
|
"Concerning Hackers Who Break Into Computer Systems" and the ethics sessions,
|
||
|
although I was informed upon my arrival of the intense interest from the
|
||
|
conference participants and the reactions to my now very well known article
|
||
|
announcing the "Phoenix Project."
|
||
|
|
||
|
Not wishing to miss any more class than absolutely necessary, I arrived in
|
||
|
Washington D.C. late in the day on Wednesday, October 4th. By some bizarre
|
||
|
coincidence I ended up on the same flight with Sheldon Zenner.
|
||
|
|
||
|
I had attended similar conventions before such as the Zeta Beta Tau National
|
||
|
Convention in Baltimore the previous year, but there was something different
|
||
|
about this one. I suppose considering what I have been through it was only
|
||
|
natural for me to be a little uneasy when surrounded by computer security
|
||
|
professionals, but oddly enough this feeling soon passed as I began to
|
||
|
encounter friends both old and new.
|
||
|
|
||
|
Zenner and I met up with Dorothy and Peter Denning and soon after I met Terry
|
||
|
Gross, an attorney hired by the Electronic Frontier Foundation who had helped
|
||
|
with my case in reference to the First Amendment issues. Emmanuel Goldstein,
|
||
|
editor of 2600 Magazine and probably the chief person responsible for spreading
|
||
|
the news and concern about my indictment last Spring, and Frank Drake, editor
|
||
|
of W.O.R.M. showed up. I had met Drake once before. Finally I ran into Gordon
|
||
|
Meyer.
|
||
|
|
||
|
So for a while we all exchanged stories about different events surrounding our
|
||
|
lives and how things had changed over the years only to be interrupted once by
|
||
|
a odd gentleman from Germany who inquired if we were members of the Chaos
|
||
|
Computer Club. At the banquet that evening, I was introduced to Peter Neumann
|
||
|
(who among many other things is the moderator of the Internet Digest known as
|
||
|
"RISKS") and Marc Rotenberg (Computer Professionals for Social Responsibility).
|
||
|
|
||
|
Because of the great interest in the ethics sessions and comments I had heard
|
||
|
from people who had attended, I felt a strange irony come into play. I've
|
||
|
hosted and attended numerous "hacker" conventions over the years, the most
|
||
|
notable being "SummerCon". At these conventions one of the main time consuming
|
||
|
activities has always been to play detective and attempt to solve the mystery
|
||
|
of which one of the guests or other people at the hotel were there to spy on us
|
||
|
(whether they were government agents or some other form of security personnel).
|
||
|
|
||
|
So where at SummerCon the youthful hackers were all racing around looking for
|
||
|
the "feds," at the NCSC I wondered if the security professionals were reacting
|
||
|
in an inverse capacity... Who Are The Hackers? Despite this attitude or maybe
|
||
|
because of it, I and the other panelists, wore our nametags proudly with a
|
||
|
feeling of excitement surrounding us.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
October 4, 1990
|
||
|
|
||
|
Dorothy Denning had gathered the speakers for an early morning brunch and I
|
||
|
finally got a chance to meet Katie Hafner in person. The panelists discussed
|
||
|
some possibilities of discussion questions to start off the presentation and
|
||
|
before I knew it, it was time to meet the public.
|
||
|
|
||
|
As we gathered in the front of the conference room, I was dismayed to find that
|
||
|
the people in charge of the setting up the nameboards (that would sit in front
|
||
|
of each panelist) had attended the Cook school of spelling and labeled me as
|
||
|
"Neirdorf." Zenner thought this was hysterical. Luckily they were able to
|
||
|
correct the error before we began.
|
||
|
|
||
|
Hackers: Who Are They?
|
||
|
|
||
|
Dr. Denning started the presentation by briefly introducing each panelist and
|
||
|
asking them a couple of questions.
|
||
|
|
||
|
Katie Hafner disputed the notion that her work has caused a glorification
|
||
|
of hacking because of the severe hardships the people she interviewed had to
|
||
|
endure. I found myself sympathizing with her as I knew what it was like to
|
||
|
be in their positions. Many people commented later that her defense of Mitnick
|
||
|
seemed a little insincere as he had indeed committed some serious acts. Not
|
||
|
knowing all of the details surrounding Mitnick's case and not relying on the
|
||
|
general newsmedia as a basis for opinion I withheld any sort of judgment.
|
||
|
|
||
|
Emmanuel Goldstein and Frank Drake appeared to take on the mantle of being the
|
||
|
spokespersons for the hackers, although I'm unsure if they would agree with
|
||
|
this characterization. Drake's main point of view dealt with the idea that
|
||
|
young hackers seek to be able to use resources that they are otherwise excluded
|
||
|
from. He claimed to once have been a system intruder, but now that he is in
|
||
|
college and has ample computing resources available to him, he no longer sees a
|
||
|
need to "hack."
|
||
|
|
||
|
Goldstein on the other hand sought to justify hacking as being beneficial to
|
||
|
society because the hackers are finding security holes and alerting security to
|
||
|
fix these problems before something catastrophic occurs.
|
||
|
|
||
|
Gordon Meyer tried to explain the hacker mind-set and how the average hackers
|
||
|
does not see using corporate resources as having a real financial burden to
|
||
|
today's companies. Some people misunderstood his remarks to be speaking from a
|
||
|
factual position and took offense, stating that the costs are great indeed.
|
||
|
He also explained the differences between Phrack and the Computer Underground
|
||
|
Digest. Most notable is that CuD does not print tutorials about computer
|
||
|
systems.
|
||
|
|
||
|
Sheldon Zenner focused on the freedom of the speech and press issues. He also
|
||
|
spoke about technical details of the U.S. v. Neidorf case and the court rulings
|
||
|
that resulted from it. One major point of interest was his quite reasonable
|
||
|
belief that the courts will soon be holding companies financially liable for
|
||
|
damages that may occur because of illegal intrusion into their systems. This
|
||
|
was not to suggest that a criminal defense strategy could be that a company did
|
||
|
not do enough to keep an intruder out, but instead that the company could be
|
||
|
held civilly liable by outside parties.
|
||
|
|
||
|
Zenner and Denning alike discussed the nature of Phrack's articles. They found
|
||
|
that the articles appearing in Phrack contained the same types of material
|
||
|
found publicly in other computer and security magazines, but with one
|
||
|
significant difference. The tone of the articles. An article named "How to
|
||
|
Hack Unix" in Phrack usually contained very similar information to an article
|
||
|
you might see in Communications of the ACM only to be named "Securing Unix
|
||
|
Systems." But the differences were more extreme than just the titles. Some
|
||
|
articles in Phrack seemed to suggest exploiting security holes while the
|
||
|
Communications of the ACM concentrated more on fixing the problem. The
|
||
|
information in both articles would be comparable, but the audiences reading and
|
||
|
writing these articles were often very different.
|
||
|
|
||
|
I explained the concept and operation of Phrack and wandered into a discussion
|
||
|
about lack of privacy concerning electronic mail on the Internet from
|
||
|
government officials, system managers, and possibly even by hackers. I went on
|
||
|
to remark that the security professionals were missing the point and the
|
||
|
problem. The college and high-school students while perhaps doing some
|
||
|
exploration and causing some slight disturbances are not the place to be
|
||
|
focusing their efforts. The real danger comes from career criminals and
|
||
|
company insiders who know the systems very well from being a part of it. These
|
||
|
people are the source of computer crime in this country and are the ones who
|
||
|
need to be dealt with. Catching a teenage hacker may be an easier task, but
|
||
|
ultimately will change nothing. To this point I agreed that a hacker gaining
|
||
|
entry and exposing holes on computer systems may be a service to some degree,
|
||
|
but unlike Goldstein, I could not maintain that such activity should bring
|
||
|
prosecutorial immunity to the hacker. This is a matter of discretion for
|
||
|
security personnel and prosecutors to take into consideration. I hope they do.
|
||
|
|
||
|
To a large degree I was rather silent on stage. Perhaps because I was cut off
|
||
|
more than once or maybe even a little stagefright, but largely because many of
|
||
|
the questions posed by the audience were wrong on their face for me to answer.
|
||
|
I was not going to stand and defend hacking for its own sake nor was I there to
|
||
|
explain the activities of every hacker in existence.
|
||
|
|
||
|
So I let Goldstein and Drake handle questions geared to be answered by a system
|
||
|
intruder and I primarily only spoke out concerning the First Amendment and
|
||
|
Phrack distribution. In one instance a man upset both by Drake's comments
|
||
|
about how the hackers just want to use resources they can't get elsewhere and
|
||
|
by Goldstein's presentation of the Operation Sun-Devil raids and the attack on
|
||
|
"Zod" in New York spoke up and accused us of being viciously one sided.
|
||
|
|
||
|
He said that none of us (and he singled me out specifically) look to be age 14
|
||
|
(he said he could believe I was 18) and that "our" statement that its ok for
|
||
|
hackers to gain access to systems simply because they lacked the resources
|
||
|
elsewhere meant it was ok for kids to steal money to buy drugs.
|
||
|
|
||
|
I responded by asking him if he was suggesting that if these "kids" were rich
|
||
|
and did not steal the money, it would be ok to purchase drugs? I was sure that
|
||
|
it was just a bad analogy so I changed the topic afterwards. He was right to a
|
||
|
certain extent, all of the hackers are not age 14 or even in highschool or
|
||
|
college, but is this really all that important of a distinction?
|
||
|
|
||
|
The activities of the Secret Service agents and other law enforcement officials
|
||
|
in Operation Sun-Devil and other investigations have been overwhelming and very
|
||
|
careless. True this is just their standard way of doing business and they may
|
||
|
not have even singled out the hackers as a group to focus excess zeal, but
|
||
|
recognizing that the hackers are in a worst case scenario "white-collar
|
||
|
offenders," shouldn't they alter their technique? Something that might be
|
||
|
important to make clear is that in truth my indictment and the indictments on
|
||
|
members of the Legion of Doom in Atlanta had absolutely nothing to do with
|
||
|
Operation Sun-Devil despite the general media creation.
|
||
|
|
||
|
Another interesting point that was brought out at the convention was that there
|
||
|
was so much activity and the Secret Service kept so busy in the state of
|
||
|
Arizona (possibly by some state official) concerning the hacker "problem" that
|
||
|
perhaps this is the reason the government did not catch on to the great Savings
|
||
|
& Loan multi-Billion dollar loss.
|
||
|
|
||
|
One gentleman spoke about his son being in a hospital where all his treatments
|
||
|
were being run by computer. He added that a system intruder might quite by
|
||
|
accident disrupt the system inadvertently endangering his son's life. Isn't
|
||
|
this bad? Obviously yes it is bad, but what was worse is that a critical
|
||
|
hospital computer system would be hooked up to a phoneline anyway. The main
|
||
|
reason for treatment in a hospital is so that the doctors are *there* to
|
||
|
monitor and assist patients. Could you imagine a doctor dialing in from home
|
||
|
with a modem to make his rounds?
|
||
|
|
||
|
There was some discussion about an editor's responsibility to inform
|
||
|
corporations if a hacker were to drop off material that he/she had breached
|
||
|
their security. I was not entirely in opposition to the idea, but the way I
|
||
|
would propose to do it was probably in the pages of a news article. This may
|
||
|
seem a little roundabout, but when you stop and consider all of the private
|
||
|
security consultants out there, they do not run around providing information to
|
||
|
corporations for free. They charge enormous fees for their services. There
|
||
|
are some organizations that do perform services for free (CERT comes to mind),
|
||
|
but that is the reason they were established and they receive funding from the
|
||
|
government which allows them to be more generous.
|
||
|
|
||
|
It is my belief that if a hacker were to give me some tips about security holes
|
||
|
and I in turn reported this information to a potential victim corporation, the
|
||
|
corporation would be more concerned with how and from whom I got the
|
||
|
information than with fixing the problem.
|
||
|
|
||
|
One of the government's expert witnesses from U.S. v. Neidorf attended this
|
||
|
session and he prodded Zenner and I with questions about the First Amendment
|
||
|
that were not made clear from the trial. Zenner did an excellent job of
|
||
|
clarifying the issues and presenting the truth where this Bellcore employee
|
||
|
sought to show us in a poor light.
|
||
|
|
||
|
During the commentary on the First Amendment, Hafner, Zenner, and I discussed a
|
||
|
July 22, 1988 article containing a Pacific Bell telephone document copied by a
|
||
|
hacker and sent to John Markoff that appeared on the front page of the New York
|
||
|
Times. A member of the audience said that this was ok, but the Phrack article
|
||
|
containing the E911 material was not because Phrack was only sent to hackers.
|
||
|
Zenner went on to explain that this was far from true since private security,
|
||
|
government employees, legal scholars, reporters, and telecom security personnel
|
||
|
all received Phrack without discrimination. There really is a lot that both
|
||
|
the hackers and security professionals have to learn about each other.
|
||
|
|
||
|
It began to get late and we were forced to end our session. I guess what
|
||
|
surprised me the most were all of the people that stayed behind to speak with
|
||
|
us. There were representatives from NASA, U.S. Sprint, Ford Aerospace, the
|
||
|
Department of Defense, a United States Army Lt. Colonel who all thanked us
|
||
|
for coming to speak. It was a truly unique experience in that a year ago I
|
||
|
would have presumed these people to be fighting against me and now it seems
|
||
|
that they are reasonable, decent people, with an interest in trying to learn
|
||
|
and help end the problems. I also met Mrs. Gail Meyer for the first time in
|
||
|
person as well.
|
||
|
|
||
|
I was swamped with people asking me how they could get Phrack and for the most
|
||
|
part I referred them to Gordon Meyer and CuD (and the CuD ftp). Just before we
|
||
|
went to lunch I met Donn Parker and Art Brodsky, an editor from Communications
|
||
|
Daily. So many interesting people to speak with and so little time. I spent a
|
||
|
couple hours at the National Gallery of Art with Emmanuel Goldstein, flew back
|
||
|
to St. Louis, and returned to school.
|
||
|
|
||
|
It was definitely an enLightening experience.
|
||
|
|
||
|
++++++++++++++++++++++++++++++
|
||
|
|
||
|
A very special thank you goes to Dorothy Denning, a dear friend who made it
|
||
|
possible for me to attend the conference.
|
||
|
|
||
|
:Craig M. Neidorf a/k/a Knight Lightning
|
||
|
|
||
|
C483307 @ UMCVMB.MISSOURI.EDU
|
||
|
C483307 @ UMCVMB.BITNET
|
||
|
_______________________________________________________________________________
|