mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
1272 lines
70 KiB
Text
1272 lines
70 KiB
Text
![]() |
---[ Phrack Magazine Volume 8, Issue 52 January 26, 1998, article 05 of 20
|
||
|
|
||
|
|
||
|
---------[ EVERYTHING A HACKER NEEDS TO KNOW ABOUT GETTING BUSTED BY THE FEDS
|
||
|
|
||
|
|
||
|
--------[ Agent Steal <agentsteal@usa.net>
|
||
|
|
||
|
|
||
|
From Federal Prison, 1997
|
||
|
|
||
|
Contributions and editing by Minor Threat
|
||
|
|
||
|
Special thanks to Evian S. Sim
|
||
|
|
||
|
NOTICE: The following document is to be construed as "Legal Material" as set
|
||
|
forth in The Federal Bureau of Prisons policy statement, P.S. 1315.05, and as
|
||
|
codified in 28 C.F.R. 543.10-16
|
||
|
|
||
|
This article may be freely reproduced, in whole or in part, provided
|
||
|
acknowledgments are given to the author. Any reproduction for profit, lame
|
||
|
zines, (that means you t0mmy, el8, thief) or law enforcement use is prohibited.
|
||
|
The author and contributor to this phile in no way advocate criminal behavior.
|
||
|
|
||
|
----------------
|
||
|
CONTENTS
|
||
|
----------------
|
||
|
|
||
|
INTRODUCTION
|
||
|
|
||
|
PART I - FEDERAL CRIMINAL LAW PART II - FEDERAL PRISON
|
||
|
|
||
|
A. Relevant Conduct A. State v. Federal
|
||
|
B. Preparing for Trial B. Security Levels
|
||
|
C. Plea Agreements and Attorneys C. Getting Designated
|
||
|
D. Conspiracy D. Ignorant Inmates
|
||
|
E. Sentencing E. Population
|
||
|
F. Use of Special Skill F. Doing Time
|
||
|
G. Getting Bail G. Disciplinary Action
|
||
|
H. State v. Federal Charges H. Administrative Remedy
|
||
|
I. Cooperating I. Prison Officials
|
||
|
J. Still Thinking About Trial J. The Hole
|
||
|
K. Search and Seizure K. Good Time
|
||
|
L. Surveillance L. Halfway House
|
||
|
M. Presentence Investigation M. Supervised Release
|
||
|
N. Proceeding Pro Se
|
||
|
O. Evidentiary Hearing
|
||
|
P. Return of Property
|
||
|
Q. Outstanding Warrants
|
||
|
R. Encryption
|
||
|
S. Summary
|
||
|
|
||
|
Part III - 2600 Special Section:
|
||
|
|
||
|
A. How to Avoid Detection
|
||
|
B. The Stealth Box
|
||
|
C. More Protection
|
||
|
|
||
|
CLOSURE
|
||
|
|
||
|
|
||
|
|
||
|
INTRODUCTION
|
||
|
|
||
|
The likelihood of getting arrested for computer hacking has increased
|
||
|
to an unprecedented level. No matter how precautionary or sage you are, you're
|
||
|
bound to make mistakes. And the fact of the matter is if you have trusted
|
||
|
anyone else with the knowledge of what you are involved in, you have made your
|
||
|
first mistake.
|
||
|
|
||
|
For anyone active in hacking I cannot begin to stress the importance
|
||
|
of the information contained in this file. To those who have just been
|
||
|
arrested by the Feds, reading this file could mean the difference between a
|
||
|
three-year or a one-year sentence. To those who have never been busted,
|
||
|
reading this file will likely change the way you hack, or stop you from
|
||
|
hacking altogether.
|
||
|
|
||
|
I realize my previous statements are somewhat lofty, but in the 35
|
||
|
months I spent incarcerated I've heard countless inmates say it: "If I knew
|
||
|
then what I know now..." I doubt that anyone would disagree: The criminal
|
||
|
justice system is a game to be played, both by prosecution and defense. And if
|
||
|
you have to be a player, you would be wise to learn the rules of engagement.
|
||
|
The writer and contributors of this file have learned the hard way. As a
|
||
|
result we turned our hacking skills during the times of our incarceration
|
||
|
towards the study of criminal law and, ultimately, survival. Having filed our
|
||
|
own motions, written our own briefs and endured life in prison, we now pass
|
||
|
this knowledge back to the hacker community. Learn from our experiences...
|
||
|
and our mistakes.
|
||
|
|
||
|
- Agent Steal
|
||
|
|
||
|
|
||
|
PART I - FEDERAL CRIMINAL LAW
|
||
|
|
||
|
A. THE BOTTOM LINE - RELEVANT CONDUCT
|
||
|
|
||
|
For those of you with a short G-phile attention span I'm going to
|
||
|
cover the single most important topic first. This is probably the most
|
||
|
substantial misunderstanding of the present criminal justice system. The
|
||
|
subject I am talking about is referred to in legal circles as "relevant
|
||
|
conduct." It's a bit complex and I will get into this... However, I have to
|
||
|
make this crystal clear so that it will stick in your heads. It boils down to
|
||
|
two concepts:
|
||
|
|
||
|
I. ONCE YOU ARE FOUND GUILTY OF EVEN ONE COUNT, EVERY COUNT WILL BE USED TO
|
||
|
CALCULATE YOUR SENTENCE
|
||
|
|
||
|
Regardless of whether you plea bargain to one count or 100, your
|
||
|
sentence will be the same. This is assuming we are talking about hacking,
|
||
|
code abuse, carding, computer trespass, property theft, etc. All of these are
|
||
|
treated the same. Other crimes you committed (but were not charged with) will
|
||
|
also be used to calculate your sentence. You do not have to be proven guilty
|
||
|
of every act. As long as it appears that you were responsible, or someone
|
||
|
says you were, then it can be used against you. I know this sounds insane ,
|
||
|
but it's true; it's the preponderance of evidence standard for relevant
|
||
|
conduct. This practice includes using illegally seized evidence and
|
||
|
acquittals as information in increasing the length of your sentence.
|
||
|
|
||
|
II. YOUR SENTENCE WILL BE BASED ON THE TOTAL MONETARY LOSS
|
||
|
|
||
|
The Feds use a sentencing table to calculate your sentence. It's
|
||
|
simple; More Money = More Time. It doesn't matter if you tried to break in 10
|
||
|
times or 10,000 times. Each one could be a count but it's the loss that
|
||
|
matters. And an unsuccessful attempt is treated the same as a completed crime.
|
||
|
It also doesn't matter if you tried to break into one company's computer or 10.
|
||
|
The government will quite simply add all of the estimated loss figures up, and
|
||
|
then refer to the sentencing table.
|
||
|
|
||
|
B. PREPARING FOR TRIAL
|
||
|
|
||
|
I've been trying to be overly simplistic with my explanation. The
|
||
|
United States Sentencing Guidelines (U.S.S.G.), are in fact quite complex. So
|
||
|
much so that special law firms are forming that deal only with sentencing. If
|
||
|
you get busted, I would highly recommend hiring one. In some cases it might
|
||
|
be wise to avoid hiring a trial attorney and go straight to one of these "Post
|
||
|
Conviction Specialists." Save your money, plead out, do your time. This may
|
||
|
sound a little harsh, but considering the fact that the U.S. Attorney's Office
|
||
|
has a 95% conviction rate, it may be sage advice. However, I don't want to
|
||
|
gloss over the importance of a ready for trial posturing. If you have a
|
||
|
strong trial attorney, and have a strong case, it will go a long way towards
|
||
|
good plea bargain negotiations.
|
||
|
|
||
|
C. PLEA AGREEMENTS AND ATTORNEYS
|
||
|
|
||
|
Your attorney can be your worst foe or your finest advocate. Finding
|
||
|
the proper one can be a difficult task. Costs will vary and typically the
|
||
|
attorney asks you how much cash you can raise and then says, "that amount will
|
||
|
be fine". In actuality a simple plea and sentencing should run you around
|
||
|
$15,000. Trial fees can easily soar into the 6 figure category. And finally,
|
||
|
a post conviction specialist will charge $5000 to $15,000 to handle your
|
||
|
sentencing presentation with final arguments.
|
||
|
|
||
|
You may however, find yourself at the mercy of The Public Defenders
|
||
|
Office. Usually they are worthless, occasionally you'll find one that will
|
||
|
fight for you. Essentially it's a crap shoot. All I can say is if you don't
|
||
|
like the one you have, fire them and hope you get appointed a better one. If
|
||
|
you can scrape together $5000 for a sentencing (post conviction) specialist to
|
||
|
work with your public defender I would highly recommend it. This specialist
|
||
|
will make certain the judge sees the whole picture and will argue in the most
|
||
|
effective manner for a light or reasonable sentence. Do not rely on your
|
||
|
public defender to thoroughly present your case. Your sentencing hearing is
|
||
|
going to flash by so fast you'll walk out of the court room dizzy. You and
|
||
|
your defense team need to go into that hearing fully prepared, having already
|
||
|
filed a sentencing memorandum.
|
||
|
|
||
|
The plea agreement you sign is going to affect you and your case well
|
||
|
after you are sentenced. Plea agreements can be tricky business and if you
|
||
|
are not careful or are in a bad defense position (the case against you is
|
||
|
strong), your agreement may get the best of you. There are many issues in a
|
||
|
plea to negotiate over. But essentially my advice would be to avoid signing
|
||
|
away your right to appeal. Once you get to a real prison with real jailhouse
|
||
|
lawyers you will find out how bad you got screwed. That issue notwithstanding,
|
||
|
you are most likely going to want to appeal. This being the case you need to
|
||
|
remember two things: bring all your appealable issues up at sentencing and
|
||
|
file a notice of appeal within 10 days of your sentencing. Snooze and loose.
|
||
|
|
||
|
I should however, mention that you can appeal some issues even though
|
||
|
you signed away your rights to appeal. For example, you can not sign away
|
||
|
your right to appeal an illegal sentence. If the judge orders something that
|
||
|
is not permissible by statute, you then have a constitutional right to appeal
|
||
|
your sentence.
|
||
|
|
||
|
I will close this subpart with a prison joke. Q: How can you tell when
|
||
|
your attorney is lying? A: You can see his lips moving.
|
||
|
|
||
|
D. CONSPIRACY
|
||
|
|
||
|
Whatever happened to getting off on a technicality? I'm sorry to say
|
||
|
those days are gone, left only to the movies. The courts generally dismiss
|
||
|
many arguments as "harmless error" or "the government acted in good faith".
|
||
|
The most alarming trend, and surely the root of the prosecutions success, are
|
||
|
the liberally worded conspiracy laws. Quite simply, if two or more people
|
||
|
plan to do something illegal, then one of them does something in furtherance
|
||
|
of the objective (even something legal), then it's a crime. Yes, it's true.
|
||
|
In America it's illegal to simply talk about committing a crime. Paging Mr.
|
||
|
Orwell. Hello?
|
||
|
|
||
|
Here's a hypothetical example to clarify this. Bill G. and Marc A. are
|
||
|
hackers (can you imagine?) Bill and Marc are talking on the phone and
|
||
|
unbeknownst to them the FBI is recording the call. They talk about hacking
|
||
|
into Apple's mainframe and erasing the prototype of the new Apple Web Browser.
|
||
|
Later that day, Marc does some legitimate research to find out what type of
|
||
|
mainframe and operating system Apple uses. The next morning, the Feds raid
|
||
|
Marc's house and seize everything that has wires. Bill and Marc go to trial
|
||
|
and spend millions to defend themselves. They are both found guilty of
|
||
|
conspiracy to commit unauthorized access to a computer system.
|
||
|
|
||
|
E. SENTENCING
|
||
|
|
||
|
At this point it is up to the probation department to prepare a report
|
||
|
for the court. It is their responsibility to calculate the loss and identify
|
||
|
any aggravating or mitigating circumstances. Apple Computer Corporation
|
||
|
estimates that if Bill and Marc would have been successful it would have
|
||
|
resulted in a loss of $2 million. This is the figure the court will use.
|
||
|
Based on this basic scenario our dynamic duo would receive roughly three-year
|
||
|
sentences.
|
||
|
|
||
|
As I mentioned, sentencing is complex and many factors can decrease or
|
||
|
increase a sentence, usually the latter. Let's say that the FBI also found a
|
||
|
file on Marc's computer with 50,000 unauthorized account numbers and passwords
|
||
|
to The Microsoft Network. Even if the FBI does not charge him with this, it
|
||
|
could be used to increase his sentence. Generally the government places a
|
||
|
$200-per-account attempted loss on things of this nature (i.e. credit card
|
||
|
numbers and passwords = access devices). This makes for a $10 million loss.
|
||
|
Coupled with the $2 million from Apple, Marc is going away for about nine
|
||
|
years. Fortunately there is a Federal Prison not too far from Redmond, WA so
|
||
|
Bill could come visit him.
|
||
|
|
||
|
Some of the other factors to be used in the calculation of a sentence
|
||
|
might include the following: past criminal record, how big your role in the
|
||
|
offense was, mental disabilities, whether or not you were on probation at the
|
||
|
time of the offense, if any weapons were used, if any threats were used, if
|
||
|
your name is Kevin Mitnick (heh), if an elderly person was victimized, if you
|
||
|
took advantage of your employment position, if you are highly trained and used
|
||
|
your special skill, if you cooperated with the authorities, if you show
|
||
|
remorse, if you went to trial, etc.
|
||
|
|
||
|
These are just some of the many factors that could either increase or
|
||
|
decrease a sentence. It would be beyond the scope of this article to cover
|
||
|
the U.S.S.G. in complete detail. I do feel that I have skipped over some
|
||
|
significant issues. Nevertheless, if you remember my two main points in
|
||
|
addition to how the conspiracy law works, you'll be a long way ahead in
|
||
|
protecting yourself.
|
||
|
|
||
|
F. USE OF A SPECIAL SKILL
|
||
|
|
||
|
The only specific "sentencing enhancement" I would like to cover would
|
||
|
be one that I am responsible for setting a precedent with. In U.S. v Petersen,
|
||
|
98 F.3d. 502, 9th Cir., the United States Court of Appeals held that some
|
||
|
computer hackers may qualify for the special skill enhancement. What this
|
||
|
generally means is a 6 to 24 month increase in a sentence. In my case it
|
||
|
added eight months to my 33-month sentence bringing it to 41 months.
|
||
|
Essentially the court stated that since I used my "sophisticated" hacking
|
||
|
skills towards a legitimate end as a computer security consultant, then the
|
||
|
enhancement applies. It's ironic that if I were to have remained strictly a
|
||
|
criminal hacker then I would have served less time.
|
||
|
|
||
|
The moral of the story is that the government will find ways to give
|
||
|
you as much time as they want to. The U.S.S.G. came into effect in 1987 in an
|
||
|
attempt to eliminate disparity in sentencing. Defendants with similar crimes
|
||
|
and similar backgrounds would often receive different sentences. Unfortunately,
|
||
|
this practice still continues. The U.S.S.G. are indeed a failure.
|
||
|
|
||
|
G. GETTING BAIL
|
||
|
|
||
|
In the past, the Feds might simply have executed their raid and then
|
||
|
left without arresting you. Presently this method will be the exception
|
||
|
rather than the rule and it is more likely that you will be taken into custody
|
||
|
at the time of the raid. Chances are also good that you will not be released
|
||
|
on bail. This is part of the government's plan to break you down and win their
|
||
|
case. If they can find any reason to deny you bail they will. In order to
|
||
|
qualify for bail, you must meet the following criteria:
|
||
|
|
||
|
- You must be a resident of the jurisdiction in which you were arrested.
|
||
|
- You must be gainfully employed or have family ties to the area.
|
||
|
- You cannot have a history of failure to appear or escape.
|
||
|
- You cannot be considered a danger or threat to the community.
|
||
|
|
||
|
In addition, your bail can be denied for the following reasons:
|
||
|
|
||
|
- Someone came forward and stated to the court that you said you would flee if
|
||
|
released.
|
||
|
- Your sentence will be long if convicted.
|
||
|
- You have a prior criminal history.
|
||
|
- You have pending charges in another jurisdiction.
|
||
|
|
||
|
What results from all this "bail reform" is that only about 20% of
|
||
|
persons arrested make bail. On top of that it takes 1-3 weeks to process your
|
||
|
bail papers when property is involved in securing your bond.
|
||
|
|
||
|
Now you're in jail, more specifically you are either in an
|
||
|
administrative holding facility or a county jail that has a contract with the
|
||
|
Feds to hold their prisoners. Pray that you are in a large enough city to
|
||
|
justify its own Federal Detention Center. County jails are typically the last
|
||
|
place you would want to be.
|
||
|
|
||
|
H. STATE VS. FEDERAL CHARGES
|
||
|
|
||
|
In some cases you will be facing state charges with the possibility of
|
||
|
the Feds "picking them up." You may even be able to nudge the Feds into
|
||
|
indicting you. This is a tough decision. With the state you will do
|
||
|
considerably less time, but will face a tougher crowd and conditions in prison.
|
||
|
Granted, Federal Prisons can be violent too, but generally as a non-violent
|
||
|
white collar criminal you will eventually be placed into an environment with
|
||
|
other low security inmates. More on this later.
|
||
|
|
||
|
Until you are sentenced, you will remain as a "pretrial inmate" in
|
||
|
general population with other inmates. Some of the other inmates will be
|
||
|
predatorial but the Feds do not tolerate much nonsense. If someone acts up,
|
||
|
they'll get thrown in the hole. If they continue to pose a threat to the
|
||
|
inmate population, they will be left in segregation (the hole). Occasionally
|
||
|
inmates that are at risk or that have been threatened will be placed in
|
||
|
segregation. This isn't really to protect the inmate. It is to protect the
|
||
|
prison from a lawsuit should the inmate get injured.
|
||
|
|
||
|
I. COOPERATING
|
||
|
|
||
|
Naturally when you are first arrested the suits will want to talk to
|
||
|
you. First at your residence and, if you appear to be talkative, they will
|
||
|
take you back to their offices for an extended chat and a cup of coffee. My
|
||
|
advice at this point is tried and true and we've all heard it before: remain
|
||
|
silent and ask to speak with an attorney. Regardless of what the situation is,
|
||
|
or how you plan to proceed, there is nothing you can say that will help you.
|
||
|
Nothing. Even if you know that you are going to cooperate, this is not the
|
||
|
time.
|
||
|
|
||
|
This is obviously a controversial subject, but the fact of the matter
|
||
|
is roughly 80% of all defendants eventually confess and implicate others. This
|
||
|
trend stems from the extremely long sentences the Feds are handing out these
|
||
|
days. Not many people want to do 10 to 20 years to save their buddies' hides
|
||
|
when they could be doing 3 to 5. This is a decision each individual needs to
|
||
|
make. My only advice would be to save your close friends and family. Anyone
|
||
|
else is fair game. In the prison system the blacks have a saying "Getting
|
||
|
down first." It's no secret that the first defendant in a conspiracy is
|
||
|
usually going to get the best deal. I've even seen situations where the big
|
||
|
fish turned in all his little fish and received 40% off his sentence.
|
||
|
|
||
|
Incidentally, being debriefed or interrogated by the Feds can be an
|
||
|
ordeal in itself. I would -highly- recommend reading up on interrogation
|
||
|
techniques ahead of time. Once you know their methods it will be all quite
|
||
|
transparent to you and the debriefing goes much more smoothly.
|
||
|
|
||
|
When you make a deal with the government you're making a deal with the
|
||
|
devil himself. If you make any mistakes they will renege on the deal and
|
||
|
you'll get nothing. On some occasions the government will trick you into
|
||
|
thinking they want you to cooperate when they are not really interested in
|
||
|
anything you have to say. They just want you to plead guilty. When you sign
|
||
|
the cooperation agreement there are no set promises as to how much of a
|
||
|
sentence reduction you will receive. That is to be decided after your
|
||
|
testimony, etc. and at the time of sentencing. It's entirely up to the judge.
|
||
|
However, the prosecution makes the recommendation and the judge generally goes
|
||
|
along with it. In fact, if the prosecution does not motion the court for your
|
||
|
"downward departure" the courts' hands are tied and you get no break.
|
||
|
|
||
|
As you can see, cooperating is a tricky business. Most people,
|
||
|
particularly those who have never spent a day in jail, will tell you not to
|
||
|
cooperate. "Don't snitch." This is a noble stance to take. However, in some
|
||
|
situations this is just plain stupid. Saving someone's ass who would easily
|
||
|
do the same to you is a tough call. It's something that needs careful
|
||
|
consideration. Like I said, save your friends then do what you have to do to
|
||
|
get out of prison and on with your life.
|
||
|
|
||
|
I'm happy to say that I was able to avoid involving my good friends
|
||
|
and a former employer in the massive investigation that surrounded my case. It
|
||
|
wasn't easy. I had to walk a fine line. Many of you probably know that I
|
||
|
(Agent Steal) went to work for the FBI after I was arrested. I was
|
||
|
responsible for teaching several agents about hacking and the culture. What
|
||
|
many of you don't know is that I had close FBI ties prior to my arrest. I was
|
||
|
involved in hacking for over 15 years and had worked as a computer security
|
||
|
consultant. That is why I was given that opportunity. It is unlikely however,
|
||
|
that we will see many more of these types of arrangements in the future. Our
|
||
|
relationship ran afoul, mostly due to their passive negligence and lack of
|
||
|
experience in dealing with hackers. The government in general now has their
|
||
|
own resources, experience, and undercover agents within the community. They
|
||
|
no longer need hackers to show them the ropes or the latest security hole.
|
||
|
|
||
|
Nevertheless, if you are in the position to tell the Feds something
|
||
|
they don't know and help them build a case against someone, you may qualify
|
||
|
for a sentence reduction. The typical range is 20% to 70%. Usually it's
|
||
|
around 35% to 50%. Sometimes you may find yourself at the end of the
|
||
|
prosecutorial food chain and the government will not let you cooperate. Kevin
|
||
|
Mitnick would be a good example of this. Even if he wanted to roll over, I
|
||
|
doubt it would get him much. He's just too big of a fish, too much media. My
|
||
|
final advice in this matter is get the deal in writing before you start
|
||
|
cooperating.
|
||
|
|
||
|
The Feds also like it when you "come clean" and accept responsibility.
|
||
|
There is a provision in the Sentencing Guidelines, 3E1.1, that knocks a little
|
||
|
bit of time off if you confess to your crime, plead guilty and show remorse.
|
||
|
If you go to trial, typically you will not qualify for this "acceptance of
|
||
|
responsibility" and your sentence will be longer.
|
||
|
|
||
|
J. STILL THINKING ABOUT TRIAL
|
||
|
|
||
|
Many hackers may remember the Craig Neidorf case over the famous 911
|
||
|
System Operation documents. Craig won his case when it was discovered that
|
||
|
the manual in question, that he had published in Phrack magazine, was not
|
||
|
proprietary as claimed but available publicly from AT&T. It was an egg in
|
||
|
the face day for the Secret Service.
|
||
|
|
||
|
Don't be misled by this. The government learned a lot from this
|
||
|
fiasco and even with the laudable support from the EFF, Craig narrowly
|
||
|
thwarted off a conviction. Regardless, it was a trying experience (no pun
|
||
|
intended) for him and his attorneys. The point I'm trying to make is that it's
|
||
|
tough to beat the Feds. They play dirty and will do just about anything,
|
||
|
including lie, to win their case. If you want to really win you need to know
|
||
|
how they build a case in the first place.
|
||
|
|
||
|
K. SEARCH AND SEIZURE
|
||
|
|
||
|
There is a document entitled "Federal Guidelines For Searching And
|
||
|
Seizing Computers." It first came to my attention when it was published in
|
||
|
the 12-21-94 edition of the Criminal Law Reporter by the Bureau of National
|
||
|
Affairs (Cite as 56 CRL 2023 ). It's an intriguing collection of tips, cases,
|
||
|
mistakes and, in general, how to bust computer hackers. It's recommended
|
||
|
reading.
|
||
|
|
||
|
Search and seizure is an ever evolving jurisprudence. What's not
|
||
|
permissible today may, through some convoluted Supreme Court logic, be
|
||
|
permissible and legal tomorrow. Again, a complete treatment of this subject
|
||
|
is beyond the scope of this paper. But suffice it to say if a Federal agent
|
||
|
wants to walk right into your bedroom and seize all of your computer equipment
|
||
|
without a warrant he could do it by simply saying he had probable cause (PC).
|
||
|
PC is anything that gives him an inkling to believe you were committing a
|
||
|
crime. Police have been known to find PC to search a car when the trunk sat
|
||
|
too low to the ground or the high beams were always on.
|
||
|
|
||
|
L. SURVEILLANCE AND WIRETAPS
|
||
|
|
||
|
Fortunately the Feds still have to show a little restraint when
|
||
|
wielding their wiretaps. It requires a court order and they have to show that
|
||
|
there is no other way to obtain the information they seek, a last resort if
|
||
|
you will. Wiretaps are also expensive to operate. They have to lease lines
|
||
|
from the phone company, pay agents to monitor it 24 hours a day and then
|
||
|
transcribe it. If we are talking about a data tap, there are additional costs.
|
||
|
Expensive interception/translation equipment must be in place to negotiate the
|
||
|
various modem speeds. Then the data has to be stored, deciphered,
|
||
|
decompressed, formatted, protocoled, etc. It's a daunting task and usually
|
||
|
reserved for only the highest profile cases. If the Feds can seize the data
|
||
|
from any other source, like the service provider or victim, they will take
|
||
|
that route. I don't know what they hate worse though, asking for outside help
|
||
|
or wasting valuable internal resources.
|
||
|
|
||
|
The simplest method is to enlist the help of an informant who will
|
||
|
testify "I saw him do it!," then obtain a search warrant to seize the evidence
|
||
|
on your computer. Ba da boom, ba da busted.
|
||
|
|
||
|
Other devices include a pen register which is a device that logs every
|
||
|
digit you dial on your phone and the length of the calls, both incoming and
|
||
|
outgoing. The phone companies keep racks of them at their security
|
||
|
departments. They can place one on your line within a day if they feel you are
|
||
|
defrauding them. They don't need a court order, but the Feds do.
|
||
|
|
||
|
A trap, or trap and trace, is typically any method the phone company
|
||
|
uses to log every number that calls a particular number. This can be done on
|
||
|
the switching system level or via a billing database search. The Feds need a
|
||
|
court order for this information too. However, I've heard stories of
|
||
|
cooperative telco security investigations passing the information along to an
|
||
|
agent. Naturally that would be a "harmless error while acting in good faith."
|
||
|
(legal humor)...
|
||
|
|
||
|
I'd love to tell you more about FBI wiretaps but this is as far as I
|
||
|
can go without pissing them off. Everything I've told you thus far is public
|
||
|
knowledge. So I think I'll stop here. If you really want to know more, catch
|
||
|
Kevin Poulsen (Dark Dante) at a cocktail party, buy him a Coke and he'll give
|
||
|
you an earful. (hacker humor)
|
||
|
|
||
|
In closing this subpart I will say that most electronic surveillance
|
||
|
is backed up with at least part-time physical surveillance. The Feds are
|
||
|
often good at following people around. They like late model mid-sized
|
||
|
American cars, very stock, with no decals or bumper stickers. If you really
|
||
|
want to know if you're under surveillance, buy an Opto-electronics Scout or
|
||
|
Xplorer frequency counter. Hide it on your person, stick an ear plug in your
|
||
|
ear (for the Xplorer) and take it everywhere you go. If you hear people
|
||
|
talking about you, or you continue to hear intermittent static (encrypted
|
||
|
speech), you probably have a problem.
|
||
|
|
||
|
M. YOUR PRESENTENCE INVESTIGATION REPORT, PSI OR PSR
|
||
|
|
||
|
After you plead guilty you will be dragged from the quiet and comfort
|
||
|
of your prison cell to meet with a probation officer. This has absolutely
|
||
|
nothing to do with getting probation. Quite the contrary. The P.O. is
|
||
|
empowered by the court to prepare a complete and, in theory, unbiased profile
|
||
|
of the defendant. Everything from education, criminal history, psychological
|
||
|
behavior, offense characteristics plus more will be included in this
|
||
|
voluminous and painfully detailed report about your life. Every little dirty
|
||
|
scrap of information that makes you look like a sociopath, demon worshiping,
|
||
|
loathsome criminal will be included in this report. They'll put a few negative
|
||
|
things in there as well.
|
||
|
|
||
|
My advice is simple. Be careful what you tell them. Have your
|
||
|
attorney present and think about how what you say can be used against you.
|
||
|
Here's an example:
|
||
|
|
||
|
P.O.: Tell me about your education and what you like to do in your spare time.
|
||
|
|
||
|
Mr. Steal: I am preparing to enroll in my final year of college. In my spare
|
||
|
time I work for charity helping orphan children.
|
||
|
|
||
|
The PSR then reads "Mr. Steal has never completed his education and hangs
|
||
|
around with little children in his spare time." Get the picture?
|
||
|
|
||
|
J. PROCEEDING PRO SE
|
||
|
|
||
|
Pro Se or Pro Per is when a defendant represents himself. A famous
|
||
|
lawyer once said "a man that represents himself has a fool for a client."
|
||
|
Truer words were never spoken. However, I can't stress how important it is to
|
||
|
fully understand the criminal justice system. Even if you have a great
|
||
|
attorney it's good to be able to keep an eye on him or even help out. An
|
||
|
educated client's help can be of enormous benefit to an attorney. They may
|
||
|
think you're a pain in the ass but it's your life. Take a hold of it.
|
||
|
Regardless, representing yourself is generally a mistake.
|
||
|
|
||
|
However, after your appeal, when your court appointed attorney runs
|
||
|
out on you, or you have run out of funds, you will be forced to handle matters
|
||
|
yourself. At this point there are legal avenues, although quite bleak, for
|
||
|
post-conviction relief.
|
||
|
|
||
|
But I digress. The best place to start in understanding the legal
|
||
|
system lies in three inexpensive books. First the Federal Sentencing
|
||
|
Guidelines ($14.00) and Federal Criminal Codes and Rules ($20.00) are
|
||
|
available from West Publishing at 800-328-9352. I consider possession of
|
||
|
these books to be mandatory for any pretrial inmate. Second would be the
|
||
|
Georgetown Law Journal, available from Georgetown University Bookstore in
|
||
|
Washington, DC. The book sells for around $40.00 but if you write them a
|
||
|
letter and tell them you're a Pro Se litigant they will send it for free. And
|
||
|
last but not least the definitive Pro Se authority, "The Prisoners Self Help
|
||
|
Litigation Manual" $29.95 ISBN 0-379-20831-8. Or try
|
||
|
http://www.oceanalaw.com/books/n148.htm
|
||
|
|
||
|
O. EVIDENTIARY HEARING
|
||
|
|
||
|
If you disagree with some of the information presented in the
|
||
|
presentence report (PSR) you may be entitled to a special hearing. This can
|
||
|
be instrumental in lowering your sentence or correcting your PSR. One
|
||
|
important thing to know is that your PSR will follow you the whole time you
|
||
|
are incarcerated. The Bureau of Prisons uses the PSR to decide how to handle
|
||
|
you. This can affect your security level, your halfway house, your
|
||
|
eligibility for the drug program (which gives you a year off your sentence),
|
||
|
and your medical care. So make sure your PSR is accurate before you get
|
||
|
sentenced!
|
||
|
|
||
|
P. GETTING YOUR PROPERTY BACK
|
||
|
|
||
|
In most cases it will be necessary to formally ask the court to have
|
||
|
your property returned. They are not going to just call you up and say "Do
|
||
|
you want this Sparc Station back or what?" No, they would just as soon keep it
|
||
|
and not asking for it is as good as telling them they can have it.
|
||
|
|
||
|
You will need to file a 41(e) "Motion For Return Of Property." The
|
||
|
courts' authority to keep your stuff is not always clear and will have to be
|
||
|
taken on a case-by-case basis. They may not care and the judge will simply
|
||
|
order that it be returned.
|
||
|
|
||
|
If you don't know how to write a motion, just send a formal letter to
|
||
|
the judge asking for it back. Tell him you need it for your job. This should
|
||
|
suffice, but there may be a filing fee.
|
||
|
|
||
|
Q. OUTSTANDING WARRANTS
|
||
|
|
||
|
If you have an outstanding warrant or charges pending in another
|
||
|
jurisdiction you would be wise to deal with them as soon as possible -after-
|
||
|
you are sentenced. If you follow the correct procedure chances are good the
|
||
|
warrants will be dropped (quashed). In the worst case scenario, you will be
|
||
|
transported to the appropriate jurisdiction, plead guilty and have your "time
|
||
|
run concurrent." Typically in non-violent crimes you can serve several
|
||
|
sentences all at the same time. Many Federal inmates have their state time
|
||
|
run with their Federal time. In a nutshell: concurrent is good, consecutive
|
||
|
bad.
|
||
|
|
||
|
This procedure is referred to as the Interstate Agreement On Detainers
|
||
|
Act (IADA). You may also file a "demand for speedy trial", with the
|
||
|
appropriate court. This starts the meter running. If they don't extradite
|
||
|
you within a certain period of time, the charges will have to be dropped. The
|
||
|
"Inmates' Self-Help Litigation Manual" that I mentioned earlier covers this
|
||
|
topic quite well.
|
||
|
|
||
|
R. ENCRYPTION
|
||
|
|
||
|
There are probably a few of you out there saying, "I triple DES
|
||
|
encrypt my hard drive and 128 character RSA public key it for safety." Well,
|
||
|
that's just great, but... the Feds can have a grand jury subpoena your
|
||
|
passwords and if you don't give them up you may be charged with obstruction of
|
||
|
justice. Of course who's to say otherwise if you forgot your password in all
|
||
|
the excitement of getting arrested. I think I heard this once or twice before
|
||
|
in a Senate Sub-committee hearing. "Senator, I have no recollection of the
|
||
|
aforementioned events at this time." But seriously, strong encryption is
|
||
|
great. However, it would be foolish to rely on it. If the Feds have your
|
||
|
computer and access to your encryption software itself, it is likely they
|
||
|
could break it given the motivation. If you understand the true art of code
|
||
|
breaking you should understand this. People often overlook the fact that your
|
||
|
password, the one you use to access your encryption program, is typically less
|
||
|
than 8 characters long. By attacking the access to your encryption program
|
||
|
with a keyboard emulation sequencer your triple DES/128 bit RSA crypto is
|
||
|
worthless. Just remember, encryption may not protect you.
|
||
|
|
||
|
S. LEGAL SUMMARY
|
||
|
|
||
|
Before I move on to the Life in Prison subpart, let me tell you what
|
||
|
this all means. You're going to get busted, lose everything you own, not get
|
||
|
out on bail, snitch on your enemies, get even more time than you expected and
|
||
|
have to put up with a bunch of idiots in prison. Sound fun? Keep hacking.
|
||
|
And, if possible, work on those sensitive .gov sites. That way they can hang
|
||
|
an espionage rap on you. That will carry about 12 to 18 years for a first
|
||
|
time offender.
|
||
|
|
||
|
I know this may all sound a bit bleak, but the stakes for hackers have
|
||
|
gone up and you need to know what they are. Let's take a look at some recent
|
||
|
sentences:
|
||
|
|
||
|
Agent Steal (me) 41 months
|
||
|
Kevin Poulsen 51 months
|
||
|
Minor Threat 70 months
|
||
|
Kevin Mitnick estimated 7-9 years
|
||
|
|
||
|
As you can see, the Feds are giving out some time now. If you are
|
||
|
young, a first-time offender, unsophisticated (like MOD), and were just
|
||
|
looking around in some little company's database, you might get probation. But
|
||
|
chances are that if that is all you were doing, you would have been passed
|
||
|
over for prosecution. As a rule, the Feds won't take the case unless $10,000
|
||
|
in damages are involved. The problem is who is to say what the loss is? The
|
||
|
company can say whatever figure it likes and it would be tough to prove
|
||
|
otherwise. They may decide to, for insurance purposes, blame some huge
|
||
|
downtime expense on you. I can hear it now, "When we detected the intruder,
|
||
|
we promptly took our system off-line. It took us two weeks to bring it up
|
||
|
again for a loss in wasted manpower of $2 million." In some cases you might
|
||
|
be better off just using the company's payroll system to cut you a couple of
|
||
|
$10,000 checks. That way the government has a firm loss figure. This would
|
||
|
result in a much shorter sentence. I'm not advocating blatant criminal actions.
|
||
|
I just think the sentencing guidelines definitely need some work.
|
||
|
|
||
|
|
||
|
PART II - FEDERAL PRISON
|
||
|
|
||
|
|
||
|
A. STATE v. FEDERAL
|
||
|
|
||
|
In most cases I would say that doing time in a Federal Prison is better
|
||
|
than doing time in the state institutions. Some state prisons are such
|
||
|
violent and pathetic places that it's worth doing a little more time in the
|
||
|
Federal system. This is going to be changing however. The public seems to
|
||
|
think that prisons are too comfortable and as a result Congress has passed a
|
||
|
few bills to toughen things up.
|
||
|
|
||
|
Federal prisons are generally going to be somewhat less crowded,
|
||
|
cleaner, and more laid back. The prison I was at looked a lot like a college
|
||
|
campus with plenty of grass and trees, rolling hills, and stucco buildings. I
|
||
|
spent most of my time in the library hanging out with Minor Threat. We would
|
||
|
argue over who was more elite. "My sentence was longer," he would argue. "I
|
||
|
was in more books and newspapers," I would rebut. (humor)
|
||
|
|
||
|
Exceptions to the Fed is better rule would be states that permit
|
||
|
televisions and word processors in your cell. As I sit here just prior to
|
||
|
release scribbling this article with pen and paper I yearn for even a Smith
|
||
|
Corona with one line display. The states have varying privileges. You could
|
||
|
wind up someplace where everything gets stolen from you. There are also
|
||
|
states that are abolishing parole, thus taking away the ability to get out
|
||
|
early with good behavior. That is what the Feds did.
|
||
|
|
||
|
B. SECURITY LEVELS
|
||
|
|
||
|
The Bureau of Prisons (BOP) has six security levels. Prisons are
|
||
|
assigned a security level and only prisoners with the appropriate ratings are
|
||
|
housed there. Often the BOP will have two or three facilities at one location.
|
||
|
Still, they are essentially separate prisons, divided by fences.
|
||
|
|
||
|
The lowest level facility is called a minimum, a camp, or FPC.
|
||
|
Generally speaking, you will find first time, non-violent offenders with less
|
||
|
than 10 year sentences there. Camps have no fences. Your work assignment at
|
||
|
a camp is usually off the prison grounds at a nearby military base. Other
|
||
|
times camps operate as support for other nearby prisons.
|
||
|
|
||
|
The next level up is a low Federal Correctional Institution (FCI).
|
||
|
These are where you find a lot of people who should be in a camp but for some
|
||
|
technical reason didn't qualify. There is a double fence with razor wire
|
||
|
surrounding it. Again you will find mostly non-violent types here. You would
|
||
|
really have to piss someone off before they would take a swing at you.
|
||
|
|
||
|
Moving up again we get to medium and high FCI's which are often
|
||
|
combined. More razor wire, more guards, restricted movement and a rougher
|
||
|
crowd. It's also common to find people with 20 or 30+ year sentences.
|
||
|
Fighting is much more common. Keep to yourself, however, and people generally
|
||
|
leave you alone. Killings are not too terribly common. With a prison
|
||
|
population of 1500-2000, about one or two a year leave on a stretcher and don't
|
||
|
come back.
|
||
|
|
||
|
The United States Penitentiary (U.S.P.) is where you find the murderers,
|
||
|
rapists, spies and the roughest gang bangers. "Leavenworth" and "Atlanta" are
|
||
|
the most infamous of these joints. Traditionally surrounded by a 40 foot
|
||
|
brick wall, they take on an ominous appearance. The murder rate per prison
|
||
|
averages about 30 per year with well over 250 stabbings.
|
||
|
|
||
|
The highest security level in the system is Max, sometimes referred to
|
||
|
as "Supermax." Max custody inmates are locked down all the time. Your mail is
|
||
|
shown to you over a TV screen in your cell. The shower is on wheels and it
|
||
|
comes to your door. You rarely see other humans and if you do leave your cell
|
||
|
you will be handcuffed and have at least a three guard escort. Mr. Gotti, the
|
||
|
Mafia boss, remains in Supermax. So does Aldridge Ames, the spy.
|
||
|
|
||
|
|
||
|
C. GETTING DESIGNATED
|
||
|
|
||
|
Once you are sentenced, the BOP has to figure out what they want to do
|
||
|
with you. There is a manual called the "Custody and Classification Manual"
|
||
|
that they are supposed to follow. It is publicly available through the
|
||
|
Freedom of Information Act and it is also in most prison law libraries.
|
||
|
Unfortunately, it can be interpreted a number of different ways. As a result,
|
||
|
most prison officials responsible for classifying you do pretty much as they
|
||
|
please.
|
||
|
|
||
|
Your first classification is done by the Region Designator at BOP
|
||
|
Regional Headquarters. As a computer hacker you will most likely be placed in
|
||
|
a camp or a low FCI. This is assuming you weren't pulling bank jobs on the
|
||
|
side. -IF- you do wind up in an FCI, you should make it to a camp after six
|
||
|
months. This is assuming you behave yourself.
|
||
|
|
||
|
Another thing the Region Designator will do is to place a "Computer
|
||
|
No" on your file. This means you will not be allowed to operate a computer at
|
||
|
your prison work assignment. In my case I wasn't allowed to be within 10 feet
|
||
|
of one. It was explained to me that they didn't even want me to know the
|
||
|
types of software they were running. Incidentally, the BOP uses PC/Server
|
||
|
based LANs with NetWare 4.1 running on Fiber 10baseT Ethernet connections to
|
||
|
Cabletron switches and hubs. PC based gateways reside at every prison. The
|
||
|
connection to the IBM mainframe (Sentry) is done through leased lines via
|
||
|
Sprintnet's Frame Relay service with 3270 emulation software/hardware resident
|
||
|
on the local servers. Sentry resides in Washington, D.C. with SNA type
|
||
|
network concentrators at the regional offices. ;-) And I picked all of this up
|
||
|
without even trying to. Needless to say, BOP computer security is very lax.
|
||
|
Many of their publicly available "Program Statements" contain specific
|
||
|
information on how to use Sentry and what it's designed to do. They have other
|
||
|
networks as well, but this is not a tutorial on how to hack the BOP. I'll save
|
||
|
that for if they ever really piss me off. (humor)
|
||
|
|
||
|
Not surprisingly, the BOP is very paranoid about computer hackers. I
|
||
|
went out of my way not to be interested in their systems or to receive
|
||
|
computer security related mail. Nevertheless, they tried restricting my mail
|
||
|
on numerous occasions. After I filed numerous grievances and had a meeting
|
||
|
with the warden, they decided I was probably going to behave myself. My 20 or
|
||
|
so magazine subscriptions were permitted to come in, after a special screening.
|
||
|
Despite all of that I still had occasional problems, usually when I received
|
||
|
something esoteric in nature. It's my understanding, however, that many
|
||
|
hackers at other prisons have not been as fortunate as I was.
|
||
|
|
||
|
D. IGNORANT INMATES
|
||
|
|
||
|
You will meet some of the stupidest people on the planet in prison. I
|
||
|
suppose that is why they are there, too dumb to do anything except crime. And
|
||
|
for some strange reason these uneducated low class common thieves think they
|
||
|
deserve your respect. In fact they will often demand it. These are the same
|
||
|
people that condemn everyone who cooperated, while at the same time feel it is
|
||
|
fine to break into your house or rob a store at gunpoint. These are the types
|
||
|
of inmates you will be incarcerated with, and occasionally these inmates will
|
||
|
try to get over on you. They will do this for no reason other than the fact
|
||
|
you are an easy mark.
|
||
|
|
||
|
There are a few tricks hackers can do to protect themselves in prison.
|
||
|
The key to your success is acting before the problem escalates. It is also
|
||
|
important to have someone outside (preferably another hacker) that can do some
|
||
|
social engineering for you. The objective is simply to have your problem
|
||
|
inmate moved to another institution. I don't want to give away my methods but
|
||
|
if staff believes that an inmate is going to cause trouble, or if they believe
|
||
|
his life is in danger, they will move him or lock him away in segregation.
|
||
|
Social engineered letters (official looking) or phone calls from the right
|
||
|
source to the right department will often evoke brisk action. It's also quite
|
||
|
simple to make an inmates life quite miserable. If the BOP has reason to
|
||
|
believe that an inmate is an escape risk, a suicide threat, or had pending
|
||
|
charges, they will handle them much differently. Tacking these labels on an
|
||
|
inmate would be a real nasty trick. I have a saying: "Hackers usually have
|
||
|
the last word in arguments." Indeed.
|
||
|
|
||
|
Chances are you won't have many troubles in prison. This especially
|
||
|
applies if you go to a camp, mind your own business, and watch your mouth.
|
||
|
Nevertheless, I've covered all of this in the event you find yourself caught
|
||
|
up in the ignorant behavior of inmates whose lives revolve around prison. And
|
||
|
one last piece of advice, don't make threats, truly stupid people are too
|
||
|
stupid to fear anything, particularly an intelligent man. Just do it.
|
||
|
|
||
|
E. POPULATION
|
||
|
|
||
|
The distribution of blacks, whites and Hispanics varies from
|
||
|
institution to institution. Overall it works out to roughly 30% white, 30%
|
||
|
Hispanic and 30% black. The remaining 10% are various other races. Some
|
||
|
joints have a high percent of blacks and vice versa. I'm not necessarily a
|
||
|
prejudiced person, but prisons where blacks are in majority are a nightmare.
|
||
|
Acting loud, disrespectful, and trying to run the place is par for the course.
|
||
|
|
||
|
In terms of crimes, 60% of the Federal inmate population are
|
||
|
incarcerated for drug related crimes. The next most common would be bank
|
||
|
robbery (usually for quick drug money), then various white collar crimes. The
|
||
|
Federal prison population has changed over the years. It used to be a place
|
||
|
for the criminal elite. The tough drug laws have changed all of that.
|
||
|
|
||
|
Just to quell the rumors, I'm going to cover the topic of prison rape.
|
||
|
Quite simply, in medium and low security level Federal prisons it is unheard
|
||
|
of. In the highs it rarely happens. When it does happen, one could argue
|
||
|
that the victim was asking for it. I heard an inmate say once, "You can't
|
||
|
make no inmate suck cock that don't wanta." Indeed. In my 41 months of
|
||
|
incarceration, I never felt in any danger. I would occasionally have inmates
|
||
|
that would subtly ask me questions to see where my preferences lie, but once I
|
||
|
made it clear that I didn't swing that way I would be left alone. Hell, I got
|
||
|
hit on more often when I was hanging out in Hollywood!
|
||
|
|
||
|
On the other hand, state prisons can be a hostile environment for rape
|
||
|
and fighting in general. Many of us heard how Bernie S. got beat up over use
|
||
|
of the phone. Indeed, I had to get busy a couple of times. Most prison
|
||
|
arguments occur over three simple things: the phone, the TV and money/drugs.
|
||
|
If you want to stay out of trouble in a state prison, or Federal for that
|
||
|
matter, don't use the phone too long, don't change the channel and don't get
|
||
|
involved in gambling or drugs. As far as rape goes, pick your friends
|
||
|
carefully and stick with them. And always, always, be respectful. Even if
|
||
|
the guy is a fucking idiot (and most inmates are), say excuse me.
|
||
|
|
||
|
My final piece of prison etiquette advice would be to never take your
|
||
|
inmate problems to "the man" (prison staff). Despite the fact that most
|
||
|
everyone in prison snitched on their co-defendants at trial, there is no
|
||
|
excuse for being a prison rat. The rules are set by the prisoners themselves.
|
||
|
If someone steps out of line there will likely be another inmate who will be
|
||
|
happy to knock him back. In some prisons inmates are so afraid of being
|
||
|
labeled a rat that they refuse to be seen talking alone with a prison staff
|
||
|
member. I should close this paragraph by stating that this bit of etiquette
|
||
|
is routinely ignored as other inmates will snitch on you for any reason
|
||
|
whatsoever. Prison is a strange environment.
|
||
|
|
||
|
F. DOING TIME
|
||
|
|
||
|
You can make what you want to out of prison. Some people sit around
|
||
|
and do dope all day. Others immerse themselves in a routine of work and
|
||
|
exercise. I studied technology and music. Regardless, prisons are no longer
|
||
|
a place of rehabilitation. They serve only to punish and conditions are only
|
||
|
going to worsen. The effect is that angry, uneducated, and unproductive
|
||
|
inmates are being released back into society.
|
||
|
|
||
|
While I was incarcerated in 95/96, the prison band program was still
|
||
|
in operation. I played drums for two different prison bands. It really helped
|
||
|
pass the time and when I get out I will continue with my career in music. Now
|
||
|
the program has been canceled, all because some senator wanted to be seen as
|
||
|
being tough on crime. Bills were passed in Congress. The cable TV is gone,
|
||
|
pornography mags are no longer permitted, and the weight piles are being
|
||
|
removed. All this means is that prisoners will have more spare time on their
|
||
|
hands, and so more guards will have to be hired to watch the prisoners. I
|
||
|
don't want to get started on this subject. Essentially what I'm saying is
|
||
|
make something out of your time. Study, get in to a routine and before you
|
||
|
know you'll be going home, and a better person on top of it.
|
||
|
|
||
|
G. DISCIPLINARY ACTIONS
|
||
|
|
||
|
What fun is it if you go to prison and don't get into some mischief?
|
||
|
Well, I'm happy to say the only "shots" (violations) I ever received were for
|
||
|
having a friend place a call with his three-way calling for me (you can't call
|
||
|
everyone collect), and drinking homemade wine. |-) The prison occasionally
|
||
|
monitors your phone calls and on the seven or eight hundredth time I made a
|
||
|
three-way I got caught. My punishment was ten hours of extra duty (cleaning
|
||
|
up). Other punishments for shots include loss of phone use, loss of
|
||
|
commissary, loss of visits, and getting thrown in the hole. Shots can also
|
||
|
increase your security level and can get you transferred to a higher level
|
||
|
institution. If you find yourself having trouble in this area you may want to
|
||
|
pick up the book, "How to win prison disciplinary hearings", by Alan Parmelee,
|
||
|
206-328-2875.
|
||
|
|
||
|
H. ADMINISTRATIVE REMEDY
|
||
|
|
||
|
If you have a disagreement with the way staff is handling your case
|
||
|
(and you will) or another complaint, there is an administrative remedy
|
||
|
procedure. First you must try to resolve it informally. Then you can file a
|
||
|
form BP-9. The BP-9 goes to the warden. After that you can file a BP-10
|
||
|
which goes to the region. Finally, a BP-11 goes to the National BOP
|
||
|
Headquarters (Central Office). The whole procedure is a joke and takes about
|
||
|
six months to complete. Delay and conquer is the BOP motto. After you
|
||
|
complete the remedy process to no avail, you may file your action in a civil
|
||
|
court. In some extreme cases you may take your case directly to the courts
|
||
|
without exhausting the remedy process. Again, the "Prisoners Self-Help
|
||
|
Litigation Manual" covers this quite well.
|
||
|
|
||
|
My best advice with this remedy nonsense is to keep your request brief,
|
||
|
clear, concise and only ask for one specific thing per form. Usually if you
|
||
|
"got it coming" you will get it. If you don't, or if the BOP can find any
|
||
|
reason to deny your request, they will.
|
||
|
|
||
|
For this reason I often took my problems outside the prison from the
|
||
|
start. If it was a substantial enough issue I would inform the media, the
|
||
|
director of the BOP, all three of my attorneys, my judge and the ACLU. Often
|
||
|
this worked. It always pissed them off. But, alas I'm a man of principle and
|
||
|
if you deprive me of my rights I'm going to raise hell. In the past I might
|
||
|
have resorted to hacker tactics, like disrupting the BOP's entire
|
||
|
communication system bringing it crashing down! But...I'm rehabilitated now.
|
||
|
Incidentally, most BOP officials and inmates have no concept of the kind of
|
||
|
havoc a hacker can wield on an individuals life. So until some hacker shows
|
||
|
the BOP which end is up you will have to accept the fact most everyone you
|
||
|
meet in prison will have only nominal respect for you. Deal with it, you're
|
||
|
not in cyberspace anymore.
|
||
|
|
||
|
I. PRISON OFFICIALS
|
||
|
|
||
|
There are two types, dumb and dumber. I've had respect for several
|
||
|
but I've never met one that impressed me as being particularly talented in a
|
||
|
way other than following orders. Typically you will find staff that are
|
||
|
either just doing their job, or staff that is determined to advance their
|
||
|
career. The latter take their jobs and themselves way too seriously. They
|
||
|
don't get anywhere by being nice to inmates so they are often quite curt.
|
||
|
Ex-military and law enforcement wannabes are commonplace. All in all they're
|
||
|
a pain in the ass but easy to deal with. Anyone who has ever been down
|
||
|
(incarcerated) for awhile knows it's best to keep a low profile. If they don't
|
||
|
know you by name you're in good shape.
|
||
|
|
||
|
One of the problems that computer hackers will encounter with prison
|
||
|
staff is fear and/or resentment. If you are a pretentious articulate educated
|
||
|
white boy like myself you would be wise to act a little stupid. These people
|
||
|
don't want to respect you and some of them will hate everything that you stand
|
||
|
for. Many dislike all inmates to begin with. And the concept of you someday
|
||
|
having a great job and being successful bothers them. It's all a rather
|
||
|
bizarre environment where everyone seems to hate their jobs. I guess I've led
|
||
|
a sheltered life.
|
||
|
|
||
|
Before I move on, sometimes there will be certain staff members, like
|
||
|
your Case Manager, that will have a substantial amount of control over your
|
||
|
situation. The best way to deal with the person is to stay out of their way.
|
||
|
Be polite, don't file grievances against them and hope that they will take
|
||
|
care of you when it comes time. If this doesn't seem to work, then you need
|
||
|
to be a total pain in the ass and ride them with every possible request you
|
||
|
can muster. It's especially helpful if you have outside people willing to
|
||
|
make calls. Strong media attention will usually, at the very least, make the
|
||
|
prison do what they are supposed to do. If you have received a lot of bad
|
||
|
press, this could be a disadvantage. If your care continues to be a problem,
|
||
|
the prison will transfer you to another facility where you are more likely to
|
||
|
get a break. All in all how you choose to deal with staff is often a
|
||
|
difficult decision. My advice is that unless you are really getting screwed
|
||
|
over or really hate the prison you are in, don't rock the boat.
|
||
|
|
||
|
J. THE HOLE
|
||
|
|
||
|
Segregation sucks, but chances are you will find yourself there at
|
||
|
some point and usually for the most ridiculous of reasons. Sometimes you will
|
||
|
wind up there because of what someone else did. The hole is a 6' x 10'
|
||
|
concrete room with a steel bed and steel toilet. Your privileges will vary,
|
||
|
but at first you get nothing but a shower every couple of days. Naturally they
|
||
|
feed you but, it's never enough, and it's often cold. With no snacks you
|
||
|
often find yourself quite hungry in-between meals. There is nothing to do
|
||
|
there except read and hopefully some guard has been kind enough to throw you
|
||
|
some old novel.
|
||
|
|
||
|
Disciplinary actions will land you in the hole for typically a week or
|
||
|
two. In some cases you might get stuck there for a month or three. It depends
|
||
|
on the shot and on the Lieutenant that sent you there. Sometimes people never
|
||
|
leave the hole....
|
||
|
|
||
|
K. GOOD TIME
|
||
|
|
||
|
You get 54 days per year off of your sentence for good behavior. If
|
||
|
anyone tells you that a bill is going to be passed to give 108 days, they are
|
||
|
lying. 54 days a year works out to 15% and you have to do something
|
||
|
significant to justify getting that taken away. The BOP has come up with the
|
||
|
most complicated and ridiculous way to calculate how much good time you have
|
||
|
earned. They have a book about three inches thick that discusses how to
|
||
|
calculate your exact release date. I studied the book intensely and came to
|
||
|
the conclusion that the only purpose it serves is to covertly steal a few days
|
||
|
of good time from you. Go figure.
|
||
|
|
||
|
L. HALFWAY HOUSE
|
||
|
|
||
|
All "eligible" inmates are to serve the last 10% of their sentence
|
||
|
(not to exceed six months) in a Community Corrections Center (CCC). At the CCC
|
||
|
, which is nothing more than a large house in a bad part of town, you are to
|
||
|
find a job in the community and spend your evenings and nights at the CCC. You
|
||
|
have to give 25% of the gross amount of your check to the CCC to pay for all of
|
||
|
your expenses, unless you are a rare Federal prisoner sentenced to serve all of
|
||
|
your time at the CCC in which case it is 10%. They will breathalyse and
|
||
|
urinanalyse you routinely to make sure you are not having too much fun. If
|
||
|
you're a good little hacker you'll get a weekend pass so you can stay out all
|
||
|
night. Most CCCs will transfer you to home confinement status after a few
|
||
|
weeks. This means you can move into your own place, (if they approve it) but
|
||
|
still have to be in for the evenings. They check up on you by phone. And no,
|
||
|
you are not allowed call forwarding, silly rabbit.
|
||
|
|
||
|
M. SUPERVISED RELEASE
|
||
|
|
||
|
Just when you think the fun is all over, after you are released from
|
||
|
prison or the CCC, you will be required to report to a Probation Officer. For
|
||
|
the next 3 to 5 years you will be on Supervised Release. The government
|
||
|
abolished parole, thereby preventing convicts from getting out of prison early.
|
||
|
Despite this they still want to keep tabs on you for awhile.
|
||
|
|
||
|
Supervised Release, in my opinion, is nothing more than extended
|
||
|
punishment. You are a not a free man able to travel and work as you please.
|
||
|
All of your activities will have to be presented to your Probation Officer
|
||
|
(P.O.). And probation is essentially what Supervised Release is. Your P.O.
|
||
|
can violate you for any technical violations and send you back to prison for
|
||
|
several months, or over a year. If you have ANY history of drug use you will
|
||
|
be required to submit to random (weekly) urinalyses. If you come up dirty it's
|
||
|
back to the joint.
|
||
|
|
||
|
As a hacker you may find that your access to work with, or possession
|
||
|
of computer equipment may be restricted. While this may sound pragmatic to
|
||
|
the public, in practice it serves no other purpose that to punish and limit a
|
||
|
former hacker's ability to support himself. With computers at libraries, copy
|
||
|
shops, schools, and virtually everywhere, it's much like restricting someone
|
||
|
who used a car to get to and from a bank robbery to not ever drive again. If a
|
||
|
hacker is predisposed to hacking he's going to be able to do it with or
|
||
|
without restrictions. In reality many hackers don't even need a computer to
|
||
|
achieve their goals. As you probably know a phone and a little social
|
||
|
engineering go a long way.
|
||
|
|
||
|
But with any luck you will be assigned a reasonable P.O. and you will
|
||
|
stay out of trouble. If you give your P.O. no cause to keep an eye on you,
|
||
|
you may find the reins loosening up. You may also be able to have your
|
||
|
Supervised Release terminated early by the court. After a year or so, with
|
||
|
good cause, and all of your government debts paid, it might be plausible. Hire
|
||
|
an attorney, file a motion.
|
||
|
|
||
|
For many convicts Supervised Release is simply too much like being in
|
||
|
prison. For those it is best to violate, go back to prison for a few months,
|
||
|
and hope the judge terminates their Supervised Release. Although the judge
|
||
|
may continue your supervision, he/she typically will not.
|
||
|
|
||
|
|
||
|
PART III
|
||
|
|
||
|
|
||
|
A. HOW TO AVOID DETECTION
|
||
|
|
||
|
Now that you know what kind of trouble you are facing I'll go back to
|
||
|
the beginning. If what I've just covered doesn't make you want to stop
|
||
|
hacking then you had better learn how to protect yourself. Many hackers feel
|
||
|
they have some god given constitutional right to hack. Many don't believe it
|
||
|
should be illegal. Well, neurosis and personality disorders work in strange
|
||
|
ways. Regardless, I'll cover the topic of stealth. Please note that I in no
|
||
|
way advocate or encourage hacking. This technical information is being
|
||
|
provided for educational purposes only. And as I mentioned you may feel you
|
||
|
have a perfectly legitimate reason for avoiding detection, simply trying to
|
||
|
stay clear of other hackers would be an acceptable reason. This paper (I'm
|
||
|
sure) will also serve to educate law enforcement officials on the methods
|
||
|
currently being deployed by hackers to avoid detection.
|
||
|
|
||
|
Avoiding being identified while hacking is in actually a rather simple
|
||
|
feat, assuming you follow a few simple rules. Unfortunately, very few
|
||
|
people bother with them, due typically to arrogance and ego. Which as I have
|
||
|
noticed, seems to be a trait that is a prerequisite to being a successful
|
||
|
hacker. I've never met a hacker who didn't think he was the shit. And when
|
||
|
it gets right down to it that was the reason that Mitnick got caught. I'll
|
||
|
examine this incident a little later.
|
||
|
|
||
|
So I will list here a few of the basic rules I used, and then I'll
|
||
|
expound upon them a little later.
|
||
|
|
||
|
* Most important of all, I would never tell another hacker who I was,
|
||
|
where I lived, or give out my home phone number. (OK, I screwed up
|
||
|
on that one.)
|
||
|
|
||
|
* I didn't set up network access accounts up in my real name or use
|
||
|
my real address.
|
||
|
|
||
|
* I didn't set up phone numbers in my real name.
|
||
|
|
||
|
* I would never dial directly in to anything I was hacking.
|
||
|
|
||
|
* I would set up some kind of notification system that would let me
|
||
|
know if someone was trying to figure out where I was connecting from.
|
||
|
|
||
|
* I didn't transmit personal data on systems I had have hacked into.
|
||
|
|
||
|
* When I used a network or computer for work or social objectives, I
|
||
|
tried to keep it separate from my hacking.
|
||
|
|
||
|
* I never assumed that just by connecting through a bunch of different
|
||
|
networks or using cellular phones that I was safe. Even though most
|
||
|
cellular networks do not have triangulation equipment installed they
|
||
|
still have the ability to narrow a transmitting location down to a
|
||
|
square mile of even a few blocks, this even well after you have dis-
|
||
|
connected.
|
||
|
|
||
|
* The minute I got into a system I would examine and edit all of the
|
||
|
logs. I would also look for email daemons on admin or admin assoc-
|
||
|
iated accts. that sent out copies of the system security logs.
|
||
|
|
||
|
* When setting up accts. on systems I would use different login ID's.
|
||
|
|
||
|
* I never went to hacker cons. (Until I worked with the FBI)
|
||
|
|
||
|
* I would change network access dial up accts. and dial up numbers
|
||
|
every so often. I would also change living locations every 8-12
|
||
|
months.
|
||
|
|
||
|
* I would keep in mind that the numbers I dialed on my phone could
|
||
|
eventually be used to track me again. For example, if I called my
|
||
|
girl friend frequently, after I changed numbers and location I might
|
||
|
still be calling that number. The telcos now have toll record data
|
||
|
base software that can cross reference and track this type of thing.
|
||
|
|
||
|
* I rarely used IRC until I worked with the FBI. If -you- must, change
|
||
|
your handle frequently, remain in invisible mode, and if you're leet
|
||
|
enough, spoof your IP. Remember that you should never trust other
|
||
|
hackers. Many times association with them will cause you as much
|
||
|
trouble as a run in with the Feds.
|
||
|
|
||
|
And yes the FBI logs all of the IRC channels and searches them for key
|
||
|
words when they are looking for information on someone or some breech. There
|
||
|
is a secret logging program running on a special irc.server that doesn't
|
||
|
accept port 6667 connections, etc. Doesn't show up as a link either. Hmm. ;-)
|
||
|
|
||
|
Following all of those rules would be tough. The fact of the matter
|
||
|
is if you generate enough interest and piss off the right people, they will
|
||
|
come after you. However, the FBI routinely passes over low level hackers.
|
||
|
When I worked with the Bureau I was instructed that only the most malicious
|
||
|
and aggressive hackers where to be investigated. Fine with me, wasn't my goal
|
||
|
in life to put a bunch a little hacker dorks in jail. It's not real easy to
|
||
|
catch an accomplished hacker but it can be done, it's really just a matter of
|
||
|
contacting all of the right people and putting a little time into it.
|
||
|
Typically hackers get caught because someone snitched. Thus the importance of
|
||
|
my first rule, I never told anyone who I really was. The other primary reason
|
||
|
for getting caught is arrogance or underestimating the abilities of the
|
||
|
authorities. Poulsen didn't believe an investigator would sit outside of a
|
||
|
grocery store for a week on the off chance he might show up. Poulsen had used
|
||
|
the pay phones at that store a few times, which was determined by a toll
|
||
|
record search. Mitnick didn't think someone would go through the trouble of
|
||
|
doing toll searches on cell phone records then radio frequency triangulating
|
||
|
his location.
|
||
|
|
||
|
Poulsen and I went through some rather elaborate anti-detection
|
||
|
procedures. Since I had physical access to my local telco Central Office I
|
||
|
would activate, connect, and wire all of my own phone services. There was
|
||
|
essentially no record of my phone number or cable and pair data. In addition,
|
||
|
I ran the wires going into my apartment through a trash chute, over the roof
|
||
|
covered by tar, and down a vent pipe into my bathroom. The connection to the
|
||
|
bridging terminal (F2) was through a hole drilled into the back of the
|
||
|
junction box. Examination of the telephone box in the basement of my building
|
||
|
revealed no connections, you would have had to take the box apart to see it.
|
||
|
And if that wasn't enough over at the C.O. I tapped on to the output channel
|
||
|
(SC1, which was the feed to SCCS) of the 1AESS telephone switch and ran it up
|
||
|
to my apartment. There I had an old PC-XT with a Bell 202 modem watching the
|
||
|
1AESS output. Poulsen wrote a small basic program that looked for call traces
|
||
|
and any other suspicious activity. The XT would start beeping and print out
|
||
|
any of those output messages. Elaborate indeed.
|
||
|
|
||
|
|
||
|
B. THE STEALTH BOX
|
||
|
|
||
|
|
||
|
But a truly good anti-detection system would notify you absolutely if
|
||
|
someone was attempting to trace your connection. In addition, it would
|
||
|
terminate the connection before it allowed someone to see where it was going.
|
||
|
What I am suggesting is some type of dial in/dial out mechanism. For example,
|
||
|
2 modems connected back to back, with their 232 ports connected. They would
|
||
|
then be placed in a generic wall mounted box in anonymous phone closet
|
||
|
somewhere. In addition, a stun gun would be wired to give the modems a death
|
||
|
shock if the box was opened by an unauthorized person. A password would be
|
||
|
set on the modem for dial out and the phone lines feeding the two modems would
|
||
|
have to be set up under separate accounts. This would require anyone
|
||
|
investigating, to come out and take a gander at this device to determine that,
|
||
|
it's not the location of the hacker, and that yet another call trace is in
|
||
|
order to see who is dialing in. However, having opened the box the
|
||
|
investigator has disabled the device and when you dial in you'll know that
|
||
|
something is up. Even if they attempt to replace the device, they could never
|
||
|
know the original password, or even if there was one. It would be further
|
||
|
advisable to disguise the telephone lines feeding the device, making it
|
||
|
necessary to open the box to identify them.
|
||
|
|
||
|
Well that's just an idea for the design of an anti-detection device.
|
||
|
It's obviously a bit complex, but you get the idea. My point being that
|
||
|
avoiding detection is not a simple task. If someone wants you they can get
|
||
|
you. There really isn't such a thing as a secure connection; virtually
|
||
|
everything can be traced, short of a highly directional data burst satellite
|
||
|
uplink. At that point the Air Force National Reconnaissance Office (NRO) or
|
||
|
the NSA would have to get involved, big bucks.
|
||
|
|
||
|
Aside from setting up physical hardware another idea would be to find
|
||
|
a Sysadmin that will let you use his system to connect through. If you trust
|
||
|
him to tell you if there has been an inquiry regarding your connection then
|
||
|
you might be OK. It would also be wise to set up background processes that
|
||
|
monitor finger and other related probes of your account. Watch them watch you.
|
||
|
|
||
|
As I mentioned earlier if you fall under surveillance there will be
|
||
|
2-way radio traffic in your vicinity. Using the Opto-Electronics Explorer
|
||
|
will detect this and you can further investigate to see who it may be. Good
|
||
|
physical surveillance is difficult to detect. Bad physical surveillance is
|
||
|
comical.
|
||
|
|
||
|
|
||
|
C. MORE PROTECTION
|
||
|
|
||
|
|
||
|
I covered encryption earlier and as I mentioned it really is not safe
|
||
|
to assume that it will protect you from someone who takes possession of your
|
||
|
computer. The only truly safe encryption would be a military spec.
|
||
|
hardware/software implementation. When people talk about secure encryption
|
||
|
they are not taking into account that all the power of a Government might be
|
||
|
trying to crack it, and that they will have physical access to the encryption
|
||
|
device, your computer! This leaves us with one other method, destroying the
|
||
|
data. Now this in and of it's self can be construed as obstruction of
|
||
|
justice. However, should you feel the need to instantly destroy all of the
|
||
|
data on your hard drive, for oh.. lets say educational purposes. I would
|
||
|
suggest mounting a bulk magnetic tape eraser next to your hard drive. You can
|
||
|
pick one up at Radio Hack, err Shack. One flip of the panic switch, thus
|
||
|
powering up the eraser while the drive is turning, and ZAP! Mount a switch
|
||
|
next to your bed. ;-)
|
||
|
|
||
|
This may or may not destroy all of the data on your drive. If the
|
||
|
drive disk is removed and placed on a special reader some data may still be
|
||
|
recovered. This is a science in itself. DOD spec. requires that a hard drive
|
||
|
be written to with O's 7 times before it is considered erased. Simply erasing
|
||
|
a file, formatting, or defragging will not suffice. Look for a shareware
|
||
|
utility named "BCwipe". This will erase to military spec. You may also want
|
||
|
to install some type of program that auto erases under certain conditions.
|
||
|
Regardless, computer specialists that work with computer crime are trained to
|
||
|
look for this.
|
||
|
|
||
|
There are still a lot of issues that could be covered with respect to
|
||
|
avoiding detection and keeping clear of hackers. In fact I could fill a book,
|
||
|
and in retrospect I probably should have. But I told a lot of people I would
|
||
|
write this file and make it public. Hope you found it of some assistance.
|
||
|
|
||
|
|
||
|
CLOSURE
|
||
|
|
||
|
What a long strange trip it's been. I have a great deal of mixed
|
||
|
emotions about my whole ordeal. I can however, say that I HAVE benefited
|
||
|
from my incarceration. However, it certainly was not on the behalf of how I
|
||
|
was handled by the government. No, despite their efforts to kick me when I
|
||
|
was down, use me, turn their backs after I had assisted them, and in general,
|
||
|
just violate my rights, I was still able to emerge better educated than when I
|
||
|
went in. But frankly, my release from prison was just in the nick of time.
|
||
|
The long term effects of incarceration and stress were creeping up on me, and
|
||
|
I could see prison conditions were worsening. It's hard to express the
|
||
|
poignancy of the situation but the majority of those incarcerated feel that if
|
||
|
drastic changes are not made America is due for some serious turmoil, perhaps
|
||
|
even a civil war. Yes, the criminal justice system is that screwed up. The
|
||
|
Nation's thirst for vengeance on criminals is leading us into a vicious
|
||
|
feedback loop of crime and punishment, and once again crime. Quite simply,
|
||
|
the system is not working. My purpose in writing this article was not to send
|
||
|
any kind of message. I'm not telling you how not to get caught and I'm not
|
||
|
telling you to stop hacking. I wrote this simply because I feel like I owe it
|
||
|
to whomever might get use of it. For some strange reason I am oddly compelled
|
||
|
to tell you what happened to me. Perhaps this is some kind or therapy,
|
||
|
perhaps it's just my ego, perhaps I just want to help some poor 18 year old
|
||
|
hacker who really doesn't know what he is getting himself in to. Whatever the
|
||
|
reason, I just sat down one day and started writing.
|
||
|
|
||
|
If there is a central theme to this article it would be how ugly your
|
||
|
world can become. Once you get grabbed by the law, sucked into their vacuum,
|
||
|
and they shine the spotlight on you, there will be little you can do to
|
||
|
protect yourself. The vultures and predators will try to pick what they can
|
||
|
off of you. It's open season for the U.S. Attorneys, your attorney, other
|
||
|
inmates, and prison officials. You become fair game. Defending yourself from
|
||
|
all of these forces will require all of your wits, all of your resources, and
|
||
|
occasionally your fists.
|
||
|
|
||
|
Furthering the humiliation, the press, as a general rule, will not be
|
||
|
concerned with presenting the truth. They will print what suits them and
|
||
|
often omit many relevant facts. If you have read any of the 5 books I am
|
||
|
covered in you will no doubt have a rather jaded opinion of me. Let me assure
|
||
|
you that if you met me today you would quickly see that I am quite likable and
|
||
|
not the villain many (especially Jon Littman) have made me out to be. You may
|
||
|
not agree with how I lived my life, but you wouldn't have any trouble
|
||
|
understanding why I chose to live it that way. Granted I've made my mistakes,
|
||
|
growing up has been a long road for me. Nevertheless, I have no shortage of
|
||
|
good friends. Friends that I am immensely loyal to. But if you believe
|
||
|
everything you read you'd have the impression that Mitnick is a vindictive
|
||
|
loser, Poulsen a furtive stalker, and I a two faced rat. All of those
|
||
|
assessments would be incorrect.
|
||
|
|
||
|
So much for first impressions. I just hope I was able to enlighten
|
||
|
you and in some way to help you make the right choice. Whether it's
|
||
|
protecting yourself from what could be a traumatic life altering experience,
|
||
|
or compelling you to focus your computer skills on other avenues, it's
|
||
|
important for you to know the program, the language, and the rules.
|
||
|
|
||
|
See you in the movies.
|
||
|
|
||
|
Agent Steal
|
||
|
1997
|
||
|
|
||
|
----[ EOF
|
||
|
|