mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
286 lines
14 KiB
Text
286 lines
14 KiB
Text
![]() |
== Phrack Inc. ==
|
||
|
|
||
|
Volume Three, Issue Thirty-five, File 5 of 13
|
||
|
|
||
|
______________________________________________________________
|
||
|
|| ||
|
||
|
|| Don't let THIS happen to you! ||
|
||
|
|| ||
|
||
|
|| __________ ||
|
||
|
|| Heh | |/No life, no future... ||
|
||
|
|| /Heh! | 0 H S L Q I F X ||
|
||
|
|| O | --|-- ||
|
||
|
|| --|-- | / \ ||
|
||
|
|| / \ | / \ ||
|
||
|
|| / \____|____ E N _ R _ P M E N _ ||
|
||
|
|| Dale ^ ||
|
||
|
|| Drew | ||
|
||
|
|| Will this be YOU?! ||
|
||
|
||______________________________________________________________||
|
||
|
|
||
|
|
||
|
The following is a reprint of the article "Sting Operations" from the book
|
||
|
_Dedicated Computer Crime Units_ (pages 101-103) written by J. Thomas McEwen
|
||
|
for the U.S. Department of Justice and published in June 1989.
|
||
|
|
||
|
If you would like to get your own FREE copy of this book, or its companion
|
||
|
books:
|
||
|
|
||
|
- Organizing for Computer Crime Investigation and Prosecution
|
||
|
- Electronic Fund Transfer and Crime
|
||
|
- Electronic Fund Transfer Fraud
|
||
|
|
||
|
you can contact:
|
||
|
|
||
|
U.S. Department of Justice
|
||
|
Office of Justice Programs
|
||
|
National Institute of Justice
|
||
|
Washington, D.C. 20531
|
||
|
(301)251-5500
|
||
|
(800)851-3420
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
S T I N G O P E R A T I O N S
|
||
|
~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~
|
||
|
Will *YOU* Be The Next Victim?!
|
||
|
|
||
|
Transcribed by Sovereign Immunity
|
||
|
|
||
|
|
||
|
ELECTRONIC BULLETIN BOARDS
|
||
|
|
||
|
An electronic bulletin board allows for the storage of information which can be
|
||
|
retrieved by other systems calling into the board. It is essentially a
|
||
|
database maintained by a system that is accessible by others over telephone
|
||
|
lines. Most bulletin boards have been created for specific purposes, usually
|
||
|
for the exchange of messages and information among parties with common
|
||
|
interests. For example, members of computer clubs maintain bulletin boards for
|
||
|
communicating with each other between meetings.
|
||
|
|
||
|
Bulletin boards are especially popular among microcomputer users.
|
||
|
Establishment of a bulletin board is facilitated by programs that can be
|
||
|
purchased or obtained from public domain software. With one of these programs,
|
||
|
a user can establish tailored menus for anyone dialing into the board. These
|
||
|
menus will usually contain options on information about the board, bulletins,
|
||
|
news summaries, personal mail, conferences, and leaving messages.
|
||
|
|
||
|
In addition, most bulletin boards have different levels of access to restrict
|
||
|
users from certain parts of the board. The bulletin board owner, usually
|
||
|
called the System Operator (SYSOP), personally establishes the authorized
|
||
|
access levels for each user and enters this information into the system.
|
||
|
Access is determined by having a user provide their name and password when
|
||
|
signing on to the system. A telephone line into the system is the only other
|
||
|
requirement for establishing a board on a microcomputer.
|
||
|
|
||
|
Access to bulletin boards generally operates along the following lines:
|
||
|
|
||
|
- A user dials into the bulletin board.
|
||
|
- The board responds with a message asking for the person's name and password.
|
||
|
- The board then provides a menu showing the options available to the user.
|
||
|
- The user selects an option and starts interacting with the system.
|
||
|
- During a session, a user typically may read messages, leave messages,
|
||
|
download files, upload files, or join a conference.
|
||
|
- The user eventually "quits" the session and hangs up from the board.
|
||
|
|
||
|
While most bulletin boards have been established for legitimate purposes, there
|
||
|
are also "pirate" or "elite" boards that contain illegal information or have
|
||
|
been established to advance an illegal activity. Security on those boards is
|
||
|
tightly controlled by the owners. With these bulletin boards, users usually
|
||
|
have to contact the owner directly to obtain a password for access to different
|
||
|
levels of the system. A degree of trust must therefore be established before
|
||
|
the owner will allow access to the board, and the owners develop "power" over
|
||
|
who can use the system.
|
||
|
|
||
|
Pirate boards have been found with a variety of illegal information on them
|
||
|
including the following:
|
||
|
|
||
|
- Stolen credit card account numbers
|
||
|
- Long distance telephone service codes
|
||
|
- Telephone numbers to mainframe computers, including passwords and account
|
||
|
numbers
|
||
|
- Procedures for making illegal drugs
|
||
|
- Procedures for making car bombs
|
||
|
- Hacking programs
|
||
|
- Tips on how to break into computer systems
|
||
|
- Schematics for electronic boxes (e.g., black box)
|
||
|
|
||
|
These boards obviously are a threat to communities, and their existence has
|
||
|
gained the attention of some police departments.
|
||
|
|
||
|
|
||
|
STING OPERATIONS WITH BULLETIN BOARDS
|
||
|
|
||
|
The experiences of the Maricopa County, Arizona, Sheriff's Department and the
|
||
|
Fremont, California, Police Department are very instructive on how local
|
||
|
departments can establish their own bulletin boards and become part of the
|
||
|
network with other boards. Members of the Maricopa County Sheriff's Department
|
||
|
were the first in the country to establish such a board. Their board resulted
|
||
|
in over 50 arrests with the usual charge being telecommunications fraud.
|
||
|
|
||
|
In September, 1985, the Fremont Police Department established a bulletin board
|
||
|
for the primary purpose of gathering intelligence on hackers and phreakers in
|
||
|
the area. The operation was partially funded by VISA, Inc. with additional
|
||
|
support from Wells Fargo Bank, Western Union, Sprint, MCI, and ITT.
|
||
|
|
||
|
After establishing their bulletin board, they advertised it on other boards as
|
||
|
the newest "phreak board" in the area. Within the first four days, over 300
|
||
|
calls were received on the board. During the next three months, the board
|
||
|
logged over 2,500 calls from 130 regular users. Through the bulletin board,
|
||
|
they persuaded these groups that they had stolen or hacked long-distance
|
||
|
telephone service codes and credit account numbers. They were readily accepted
|
||
|
and were allowed access to pirate boards in the area.
|
||
|
|
||
|
The board was operated for a total of three months. During that period, over
|
||
|
300 stolen credit card numbers and long-distance telephone service codes were
|
||
|
recovered. Passwords to many government, educational, and corporate computers
|
||
|
were also discovered on other boards.
|
||
|
|
||
|
The operation resulted in the apprehension of eight teenagers in the area who
|
||
|
were charged with trafficking in stolen credit card accounts, trafficking in
|
||
|
stolen long-distance telephone service codes, and possession of stolen
|
||
|
property. Within the next week, seven more teenagers in California and other
|
||
|
states were arrested on information from this operation.
|
||
|
|
||
|
It was established that this group had been illegally accessing between ten and
|
||
|
fifteen businesses and institutions in California. They were regularly
|
||
|
bypassing the security of these systems with stolen phone numbers and access
|
||
|
codes. One victim company estimated that it intended to spend $10,000 to
|
||
|
improve its security and data integrity procedures. Other victimized
|
||
|
businesses were proceeding along the same lines.
|
||
|
|
||
|
|
||
|
CONCLUSIONS
|
||
|
|
||
|
There are several reasons for conducting Sting operations of this type. One of
|
||
|
the most important is that it provides a proactive method of identifying
|
||
|
hackers and phreakers in the area. These groups are particularly hard to find
|
||
|
since they operate in closed circles with personal networks developed from
|
||
|
friendships.
|
||
|
|
||
|
Another byproduct of these operations is the publicity surrounding the cases.
|
||
|
Sting operations result in considerable amount of attention from the media.
|
||
|
The publicity has the effect of closing down other pirate boards in the area.
|
||
|
One of the greatest fears of these offenders in that their systems will be
|
||
|
taken, and in the Fremont operation over $12,000 of computer equipment was
|
||
|
seized. The publicity associated with these seizures seems to be the primary
|
||
|
reason for others to stop their pirate boards.
|
||
|
|
||
|
These operations also lead to other types of offenses. In Fremont, for
|
||
|
example, drug and alcohol cases were developed as a result of the Sting
|
||
|
operation. This has been typical of these operations.
|
||
|
|
||
|
The Sting operations with bulletin boards have been criticized because
|
||
|
teenagers, rather than hardened criminals, are arrested. Many hackers believe
|
||
|
that they have a right to the data in other systems and that their activities
|
||
|
are not illegal since the companies can afford the losses. On the other hand,
|
||
|
as one investigator observed, the hackers of today may be the sophisticated
|
||
|
computer criminals of tomorrow. It is therefore important to set a lesson
|
||
|
early in their careers steering them away from these offenses.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
RESPONSE FROM A MEMBER OF THE HACKER COMMUNITY:
|
||
|
|
||
|
Now lets take a look at this article and the ignorant author J. Thomas
|
||
|
McEwen.
|
||
|
|
||
|
"Pirate boards have been found with a variety of illegal
|
||
|
information on them..."
|
||
|
|
||
|
The author names:
|
||
|
|
||
|
"Telephone numbers to mainframe computers" -- There is nothing illegal in
|
||
|
having the telephone number to a mainframe computer. It is illegal to access a
|
||
|
computer without authorization.
|
||
|
|
||
|
"Procedures for making illegal drugs" -- It is NOT illegal to know how to
|
||
|
manufacture illegal drugs, only to actually manufacture or use them.
|
||
|
|
||
|
"Procedures for making car bombs" -- It is NOT illegal to know how to
|
||
|
manufacture car bombs, only to actually manufacture or use them.
|
||
|
|
||
|
"Hacking programs" -- Indeed most security companies, private security
|
||
|
consultants, or mainframe owners and operators use these to test their systems
|
||
|
very often. It would only be illegal to use one on a machine that you are not
|
||
|
authorized to use it on.
|
||
|
|
||
|
"Tips on how to break into computer systems" -- Again, it is NOT illegal to
|
||
|
know how to break into a computer... although for a change, according to a
|
||
|
section of the Computer Fraud & Abuse Act of 1986 (Federal Law), it would be
|
||
|
illegal to traffic in passwords, codes, and theoretically any instructions that
|
||
|
would be the equivalent of passwords or codes for the unauthorized entry into
|
||
|
computer systems.
|
||
|
|
||
|
"Schematics for electronic boxes (e.g., black box)" -- This is getting boring.
|
||
|
It is NOT illegal to know how to build these devices, only the actual
|
||
|
construction or use of them is illegal.
|
||
|
|
||
|
|
||
|
"These boards obviously are a threat to communities, and their
|
||
|
existence has gained the attention of some police departments."
|
||
|
|
||
|
How are they obviously a threat?
|
||
|
|
||
|
The author would like us to believe that if the information on how to make
|
||
|
telephone devices, explosives, or narcotics is available on bulletin boards,
|
||
|
this is enough to make them a threat to communities.
|
||
|
|
||
|
What he ignores is that the same information can be found in public and
|
||
|
university libraries, text books, and technical journals;
|
||
|
|
||
|
He ignores that the mere possession of information on how a crime MIGHT be
|
||
|
committed is NOT a crime; and finally,
|
||
|
|
||
|
He fails to recognize any First Amendment rights whatsoever of computer
|
||
|
bulletin boards to have all such information to begin with.
|
||
|
|
||
|
|
||
|
"It is therefore important to set a lesson early in the careers
|
||
|
steering them away from these offenses."
|
||
|
|
||
|
Of course an arrest for some minor computer mischief is not going to be great
|
||
|
resume material when these teenagers start applying for jobs, even though the
|
||
|
establishment has inspired within them the socially acceptable goal of
|
||
|
conforming to society's expectations.
|
||
|
|
||
|
|
||
|
CONCLUSIONS
|
||
|
|
||
|
The author, J. Thomas McEwen, does not know much about freedom of speech and
|
||
|
for that matter, he does not know much about the law. He does know a lot about
|
||
|
how to sensationalize very benign conduct into dangerous conspiracy. Perhaps
|
||
|
he is close friends with Geraldo Rivera.
|
||
|
|
||
|
Bulletin board operators and users take note of the law and your rights. Don't
|
||
|
let yourself get taken in by Sting boards or ignorant law enforcement officers
|
||
|
looking for some gratification on the job since they aren't getting it at home.
|
||
|
|
||
|
|
||
|
S o v e r e i g n I m m u n i t y
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Editor's Comments by: Dispater
|
||
|
|
||
|
Sting boards have been a popular topic in Phrack and Phrack World News over the
|
||
|
years. In this file, Sovereign Immunity, showed us an excerpt that discussed a
|
||
|
Sting bulletin board in Fremont, California. As it turns out, Knight Lightning
|
||
|
had some material about this way back in Phrack World News Issue 3 (which
|
||
|
actually appeared in Phrack Issue 4). The article was titled "Phoenix
|
||
|
Phortress Stings 7." There have also been many other articles in Phrack World
|
||
|
News about sting operations and bulletin boards.
|
||
|
|
||
|
Additionally, Phrack Issues 21-23 each carried one part of Knight Lightning's
|
||
|
"Vicious Circle" Trilogy. The first two parts of which ("Shadows Of A Future
|
||
|
Past" and "The Judas Contract") contained a lot of material about sting boards
|
||
|
and informants.
|
||
|
|
||
|
Although Phrack has not presented material concerning Sting boards in Maricopa
|
||
|
County, Arizona, there was discussion about a bulletin board (The Dark Side) in
|
||
|
Arizona (602) run by "The Dictator" (Dale Drew) as a sting operation revealed
|
||
|
in Computer Underground Digest 3.02 and recently we heard that he was back in
|
||
|
action under the name "Blind Faith."
|
||
|
|
||
|
Dispater
|
||
|
_____________________________________________________________________________?_
|