mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
333 lines
16 KiB
Text
333 lines
16 KiB
Text
![]() |
==Phrack Inc.==
|
||
|
|
||
|
Volume Three, Issue Thirty-five, File 3 of 13
|
||
|
|
||
|
-*[ P H R A C K XXXV P R O P H I L E ]*-
|
||
|
|
||
|
-=>[ Presents ]<=-
|
||
|
|
||
|
Sincerely Yours, Chris Goggans
|
||
|
-===--===--===--===--===--===-
|
||
|
by S. Leonard Spitz
|
||
|
Associate Publisher
|
||
|
INFOSecurity Product News
|
||
|
|
||
|
"A provocative interview with a former member of the "Legion of Doom" suggests
|
||
|
that the ethics of hacking (or cracking) are often in the eye of the beholder."
|
||
|
|
||
|
Malicious hackers, even though most operate undercover, are often notorious for
|
||
|
the colorful pseudonyms they travel under. Reformed hackers, however, prefer a
|
||
|
low profile so as to shed their image of perceived criminality. Kevin Mitnick,
|
||
|
infamous for the DEC caper, is one of the foremost advocates of this strategy.
|
||
|
|
||
|
Now comes Chris Goggans, trailing his former "Legion of Doom" moniker, Erik
|
||
|
Bloodaxe, behind him, to try it his way. Goggans insists that where once he
|
||
|
may have bent the rules, he is now ready to give something back to society.
|
||
|
And coming across with a high degree of sincerity, he affirms his intention to
|
||
|
try. Are he and his colleagues, wearing their newly acquired information
|
||
|
security consultants hats, tilting at windmills, or does their embryonic,
|
||
|
cracker-breaking start-up, Comsec Data Security Co., stand a fighting chance?
|
||
|
We thought we would ask him.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
ISPNews: I am going to ask several legitimate questions. Please answer them
|
||
|
completely, truthfully, and honestly.
|
||
|
|
||
|
Chris Goggans: OK.
|
||
|
|
||
|
|
||
|
JUDGEMENT BY THE MEDIA
|
||
|
|
||
|
ISPNews: Would you react to Computerworld's July 29 piece, "Group Dupes
|
||
|
Security Experts," <also seen in Phrack World News issue 33, part 2
|
||
|
as part of the article called "Legion of Doom Goes Corporate> in
|
||
|
which members of your organization were accused of masquerading as
|
||
|
potential customers to obtain information, proposals, and prices from
|
||
|
other security consultants?
|
||
|
|
||
|
CG: We were all amazed that something like that would ever be printed
|
||
|
because, as we understand common business practices, we weren't doing
|
||
|
anything unusual.
|
||
|
|
||
|
ISPNews: Computerworld reported that the Legion of Doom was "one of the
|
||
|
nation's most notorious hacker groups, according to federal law
|
||
|
enforcers." Can you respond to that?
|
||
|
|
||
|
CG: Notorious is a relative term. There has always been a shroud of
|
||
|
mystery covering the Legion of Doom, because it was an organization
|
||
|
whose membership was private. When you keep people in the dark about
|
||
|
the activities of something, there is always going to be the
|
||
|
perception that more is going on than there really is.
|
||
|
|
||
|
ISPNews: Would you say then that the characterization of being notorious is
|
||
|
unfair?
|
||
|
|
||
|
CG: To some degree, yes. There certainly was activity going on within
|
||
|
the group that could be considered illegal. But most of this was
|
||
|
taking place when members of the group were all between the ages
|
||
|
of 14 and 17. While I don't want to blame immaturity, that's
|
||
|
certainly a factor to be considered.
|
||
|
|
||
|
The Legion of Doom put out four <issues of an> on-line electronic
|
||
|
newsletter <called the Legion of Doom Technical Journals> composed
|
||
|
of different files relating to various types of computer systems
|
||
|
or netware. They explained different operating systems or
|
||
|
outlined different procedures used by networks. They were always
|
||
|
informative and explained how to use a computer. We never said
|
||
|
"This is a computer and this is how to break into it."
|
||
|
|
||
|
Colorful names and words used to describe groups also add to
|
||
|
notoriety. If we had been the "Legion of Flower Pickers," the
|
||
|
"Legion of Good Guys," or the "SuperFriends," there probably
|
||
|
wouldn't be this dark cloud hanging over the group.
|
||
|
|
||
|
ISPNews: Could you be charged with intent to provide information to others
|
||
|
which would make it easier to gain unauthorized access?
|
||
|
|
||
|
CG: I don't see how that could be a charge. There's the first amendment.
|
||
|
I maintain that talking about something and encouraging or forcing
|
||
|
someone to do it are completely different.
|
||
|
|
||
|
|
||
|
EARNING AN "A" IN INFOSECURITY
|
||
|
|
||
|
ISPNews: What attracted you to computer security?
|
||
|
|
||
|
CG: The same thing that would attract anybody to being a hacker. For
|
||
|
half of my life I've been in front of a computer every day.
|
||
|
Sometimes from early in the morning until the wee hours of the night.
|
||
|
And my particular focus has been on computer security.
|
||
|
|
||
|
ISPNews: At least the dark side of that coin.
|
||
|
|
||
|
CG: I wouldn't say the dark side. I'd say the flip side. If you do
|
||
|
something for 11 years, you are going to pick up a lot of knowledge.
|
||
|
And I've always wanted to find some kind of productive career that I
|
||
|
thoroughly enjoyed. So this was just an obvious progression. No one
|
||
|
wants to be a 40-year-old hacker living in fear of the Secret
|
||
|
Service.
|
||
|
|
||
|
ISPNews: When you first applied to enter college, did you feel that it was the
|
||
|
right place to learn about information security?
|
||
|
|
||
|
CG: Yes, I thought it was the right place, mainly because college is the
|
||
|
most obvious choice to pursue an education in any field. I just
|
||
|
assumed that I would be able to find formal training leading to
|
||
|
certification or a degree in this field. Yet, at the University of
|
||
|
Texas, there wasn't anything along those lines.
|
||
|
|
||
|
ISPNews: Did you graduate from the University of Texas?
|
||
|
|
||
|
CG: No, I changed majors and then moved to Houston. I had started out in
|
||
|
computer science but it was completely unrelated to any kind of
|
||
|
career I wanted to pursue. I eventually changed my major to
|
||
|
journalism. There are only two things I like to do: Work on
|
||
|
computers, and write. So, if I wasn't going to get a degree in one,
|
||
|
it was going to be in the other. I'm a semester away, and I do plan
|
||
|
on finishing.
|
||
|
|
||
|
ISPNews: If you were to structure a college curriculum for studies in
|
||
|
information security, would you design it to focus on technical
|
||
|
issues, ethics, business issues, or legal matters?
|
||
|
|
||
|
CG: I would try to focus on all of these. If you don't have a technical
|
||
|
background, you can't understand the way the operating system works,
|
||
|
and you really can't focus on some of the issues that need to be
|
||
|
addressed with information security.
|
||
|
|
||
|
Ethics certainly come into play ass well for obvious reasons. I
|
||
|
don't think hackers are going to go away. Even with the advent of
|
||
|
newer technology, there are always going to be people who have an
|
||
|
interest in that technology and will learn how to manipulate it.
|
||
|
|
||
|
|
||
|
ETHICS, INTELLECTUAL PROPERTY RIGHTS, AND THE LAW
|
||
|
|
||
|
ISPNews: What is your definition of a hacker?
|
||
|
|
||
|
CG: A Hacker is someone who wants to find out everything that there is to
|
||
|
know about the workings of a particular computer system, and will
|
||
|
exhaust every means within his ability to do so.
|
||
|
|
||
|
ISPNews: Would you also comment on the ethics of hacking?
|
||
|
|
||
|
CG: There is an unwritten code of ethics that most people tend to adhere
|
||
|
to. It holds that: no one would ever cause damage to anything; and
|
||
|
no one would use any information found for personal gain of any kind.
|
||
|
|
||
|
For the most part, the only personal gain that I have ever seen from
|
||
|
any sort of hacking activity is the moderate fame from letting others
|
||
|
know about a particular deed. And even in these cases, the total
|
||
|
audience has been limited to just a few hundred.
|
||
|
|
||
|
ISPNews: Are you unaware of hackers who have in fact accessed information,
|
||
|
then sold it or massaged it for money?
|
||
|
|
||
|
CG: No, certainly not. I am just acknowledging and defining a code of
|
||
|
ethics. We of the Legion of Doom tried to adhere to that code of
|
||
|
ethics. For example, members of the original nine who acted
|
||
|
unethically were removed from the group.
|
||
|
|
||
|
ISPNews: Do you believe that penetrating a computer system without either
|
||
|
making changes or removing information is ethical, or a least is not
|
||
|
unethical?
|
||
|
|
||
|
CG: At one time in the past I may have held that belief, but now I
|
||
|
certainly must not, because the whole idea of being involved in the
|
||
|
formation of my new company, Comsec Data Security, would show
|
||
|
otherwise.
|
||
|
|
||
|
ISPNews: So today, you believe that unauthorized entry is unethical.
|
||
|
|
||
|
CG: Exactly. As a hacker, I didn't particularly hold that. But as
|
||
|
things such as invasion of privacy, even though I never caused any
|
||
|
damage, and breach of trust became more apparent to me, I was able to
|
||
|
step back, see the picture, and realize it was wrong.
|
||
|
|
||
|
ISPNews: Can I conclude that you are speaking for you company and its
|
||
|
principals?
|
||
|
|
||
|
CG: Yes, I am speaking for all of the principals.
|
||
|
|
||
|
ISPNews: What are your views on the ownership of information?
|
||
|
|
||
|
CG: I feel that proprietary information, national-security-related
|
||
|
information, information that could be considered a trade secret, all
|
||
|
definitely have ownership, and access should be restricted.
|
||
|
|
||
|
In the past, I felt that information that affected me or had some
|
||
|
relevance to my life should be available to me. I felt that
|
||
|
information should be available to the people it affected, whether
|
||
|
that be phone company information, credit bureau information, banking
|
||
|
information, or computer system information in general. I am saying
|
||
|
this in the past tense.
|
||
|
|
||
|
In the present tense, I feel that the public is entitled only to
|
||
|
information in the public domain. Information not available legally
|
||
|
through normal channels is just going to have to be left at that.
|
||
|
|
||
|
ISPNews: Do you believe that software should always be in the public
|
||
|
domain.?
|
||
|
|
||
|
CG: No, I do not. If I wrote something as wonderful as Lotus, or any of
|
||
|
the Microsoft programs, or Windows, I would want people to pay for
|
||
|
them.
|
||
|
|
||
|
ISPNews: Then you do believe in private ownership of and protection for
|
||
|
software?
|
||
|
|
||
|
CG: Yes, definitely.
|
||
|
|
||
|
ISPNews: What are you views on current U.S. Computer crime laws?
|
||
|
|
||
|
CG: I think that the current laws are too broad. They do not make
|
||
|
distinctions between various types of computer crimes. I consider
|
||
|
breaking into a computer akin to trespassing. If someone simply
|
||
|
walks across my lawn, I might be upset because they trampled my
|
||
|
grass, but I would leave it at that. If someone drives across my
|
||
|
lawn and leaves big trenches, and then comes over and kicks down my
|
||
|
rosebush, well that's another thing. Then, if someone drives up my
|
||
|
steps, goes through my house, through my kitchen, steals all my
|
||
|
silverware, and then leaves, that's something completely different.
|
||
|
And while these physical representations of trespassing can't be
|
||
|
applied directly to an electronic format, distinctions are still
|
||
|
necessary.
|
||
|
|
||
|
ISPNews: And the present computer crime laws do not make these distinctions?
|
||
|
|
||
|
CG: I am no lawyer, but from my understanding they do not. They need to
|
||
|
be brought into focus.
|
||
|
|
||
|
ISPNews: If they were brought into the kind of focus you suggest, would they
|
||
|
be fair and equitable?
|
||
|
|
||
|
CG: Definitely, depending on the punishment that went along with them. I
|
||
|
don't think that people who own and operate computer systems would
|
||
|
view someone who has logged into their system using a guest account
|
||
|
that was deliberately left with no password to be as serious an
|
||
|
intrusion as someone who got the system administrator password and
|
||
|
then went through and deleted all the files. I don't think that
|
||
|
simple intrusion would be considered as serious as unauthorized
|
||
|
penetration along with the wholesale theft and sale to a competitor
|
||
|
of marketing information, and advertising plans, and financial
|
||
|
projections for the next quarter.
|
||
|
|
||
|
ISPNews: What are your views on security training for users?
|
||
|
|
||
|
CG: People need to be taught what the computer operating system is and
|
||
|
how it works. After that, they need to establish some sort of
|
||
|
channel by which information can be transmitted to others. Direct
|
||
|
physical contact between communicating parties, covered by official,
|
||
|
standard company procedures, is the best way to do this.
|
||
|
|
||
|
People need to be aware that their account, no matter the level of
|
||
|
importance, is a link in a chain that makes up the security of the
|
||
|
system. Information from one account can be used as a springboard to
|
||
|
other, more powerful accounts. All users within a network must
|
||
|
understand that their information is just as important in the
|
||
|
security chain as is that of the next person.
|
||
|
|
||
|
ISPNews: Given where you are coming from, why should a potential client trust
|
||
|
you?
|
||
|
|
||
|
CG: I know that is a natural question. Just the very nature of creating
|
||
|
a company should project an image that we are trying to come out of
|
||
|
the shadows, out of the underground. We are saying, "Look everybody,
|
||
|
we've been doing this for a long time, now we want to help. We have
|
||
|
11 years of working information about how people compromise existing
|
||
|
security, and we can help with your particular situation."
|
||
|
|
||
|
ISPNews: I am sure that you understand the natural suspicion that people have.
|
||
|
|
||
|
CG: No, that's what I don't understand. If we at Comsec were out to
|
||
|
compromise information from an existing company's computer network,
|
||
|
we wouldn't have incorporated. We could have done that, and someone
|
||
|
else out there probably has already done so. Then the information
|
||
|
would be available to from one hacker to another.
|
||
|
|
||
|
ISPNews: Are you suggesting there is no system out there that you can't break
|
||
|
into?
|
||
|
|
||
|
CG: No, I'm not suggesting that. But I am saying the vast majority can
|
||
|
be penetrated.
|
||
|
|
||
|
ISPNews: Which system is easiest to crack; and which is most difficult?
|
||
|
|
||
|
CG: It is hard to say which system is more inherently penetrable than
|
||
|
another. From the initial log-in, it's not the operating system;
|
||
|
rather it's the system's operating environment that is the problem.
|
||
|
Users may not have addressed security measures. Certain types of
|
||
|
security holes may not have been closed. That's where a technical
|
||
|
background comes into play: to understand the way the applications
|
||
|
work; how different systems are accessed; to close holes in the
|
||
|
system which have become apparent. You have to deal with human
|
||
|
factors and technical issues. You must understand the way the
|
||
|
computer works and the way programs are run.
|
||
|
|
||
|
ISPNews: What is the best way to foil hackers?
|
||
|
|
||
|
CG: It depends on the hacker. There are different types. Some people
|
||
|
hack with modems. The casual hacker may just stumble across your
|
||
|
particular computer system, and may be foiled with something as
|
||
|
simple as good external security. He may be turned off by physical
|
||
|
security devices such as a call-back modem, some sort of code access,
|
||
|
or smart card.
|
||
|
|
||
|
These measures will not stop a serious hacker who is after your
|
||
|
company specifically. In this case, you have to beef up security,
|
||
|
and take additional steps to ensure the safety of your computer. And
|
||
|
you must make certain that security on the inside is as tight as on
|
||
|
the outside.
|
||
|
|
||
|
ISPN Editor's Note: Chris Goggans will respond, in every other issue of
|
||
|
ISPNews, to your questions on hacking computer systems.
|
||
|
His answers promise to be problem-solving, interesting,
|
||
|
and even entertaining. We invite you to write Chris c/o:
|
||
|
|
||
|
"Hackers' Mailbag"
|
||
|
ISPNews
|
||
|
498 Concord Street
|
||
|
Framingham, MA 01701-2357
|
||
|
_______________________________________________________________________________
|