mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
2271 lines
108 KiB
Text
2271 lines
108 KiB
Text
.oO Phrack 49 Oo.
|
|
|
|
Volume Seven, Issue Forty-Nine
|
|
|
|
16 of 16
|
|
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN Phrack World News PWN
|
|
PWN PWN
|
|
PWN Issue 49 PWN
|
|
PWN PWN
|
|
PWN Compiled by DisordeR PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
|
|
Phrack World News #49 -- Index
|
|
|
|
01. CIA attacked, pulls plug on Internet site
|
|
02. Letter From Senator Patrick Leahy (D-VT) on Encryption
|
|
03. Java Black Widows - Sun Declares War
|
|
04. Jacking in from the "Smoked Filled Room" Port
|
|
05. Panix Attack
|
|
06. Massive Usenet Cancels
|
|
07. Mitnick Faces 25 More Federal Counts of Computer Hacking
|
|
08. Hacker is freed but he's banned from computers
|
|
09. Computer Hacker Severely Beaten after Criticizing Prison Conditions
|
|
Target of Campaign by U.S. Secret Service
|
|
10. Bernie S. Released!
|
|
11. <The Squidge Busted>
|
|
12. School Hires Student to Hack Into Computers
|
|
13. Paranoia and Brit Hackers Fuel Infowar Craze in Spy Agencies
|
|
14. Hackers Find Cheap Scotland Yard Phone Connection
|
|
15. U.S. Official Warns OF "Electronic Pearl Harbor"
|
|
16. Suit Challenges State's Restraint of the Internet Via AP
|
|
17. U.S. Government Plans Computer Emergency Response Team
|
|
18. Hackers $50K challenge to break Net security system
|
|
19. Criminal cult begins PGP crack attempt
|
|
20. Hackers Bombard Internet
|
|
21. Crypto Mission Creep
|
|
22. Hacker posts nudes on court's Web pages
|
|
23. Hacking Into Piracy
|
|
24. Revealing Intel's Secrets
|
|
25. Internet Boom Puts Home PCs At Risk Of Hackers
|
|
26. Computer hacker Mitnick pleads innocent
|
|
27. Hackers Destroy Evidence of Gulf War Chemical/Biological Weapons
|
|
28. Criminals Slip Through The Net
|
|
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: CIA attacked, pulls plug on Internet site
|
|
author: unknown
|
|
source: Reuter
|
|
|
|
WASHINGTON (Reuter) - The Central Intelligence Agency, that bastion of
|
|
spy technology and computer wizardry, pulled the plug on its World
|
|
Wide Web site on the Internet Thursday after a hacker broke in and
|
|
replaced it with a crude parody.
|
|
|
|
CIA officials said their vandalized homepage -- altered to read
|
|
"Welcome to the Central Stupidity Agency" -- was in no way linked to
|
|
any mainframe computers containing classified national security
|
|
information.
|
|
|
|
[* Excuse me for a minute while my erection goes down. *]
|
|
|
|
The site was tampered with Wednesday evening and the CIA closed it
|
|
Thursday morning while a task force looked into the security breach,
|
|
CIA spokeswoman Jane Heishman said. Part of the hacker's text read
|
|
"Stop Lying."
|
|
|
|
"It's definitely a hacker" who pierced the system's security, she
|
|
said. "The agency has formed a task force to look into what happend
|
|
and how to prevent it."
|
|
|
|
[* No shit?! It was a hacker that did that? *]
|
|
|
|
The CIA web site (http://www.odci.gov/cia) showcases unclassified
|
|
information including spy agency press releases, officials' speeches,
|
|
historical rundowns and the CIA's World Fact Book, a standard
|
|
reference work.
|
|
|
|
The cyber-attack matched one that forced the Justice Department to
|
|
close its Web site last month after hackers inserted a swastika and
|
|
picture of Adolph Hitler. The penetration of the CIA homepage
|
|
highlighted the vulnerability of Internet sites designed to attract
|
|
the public and drove home the need for multiple layers of security.
|
|
|
|
"You want people to visit, you want them to interact, but you don't
|
|
want them to leave anything behind," said Jon Englund of the
|
|
Information Technology Association of America, a trade group of
|
|
leading software and telecommunications firms.
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
From: Senator_Leahy@LEAHY.SENATE.GOV
|
|
Date: Thu, 02 May 96 12:04:07 EST
|
|
|
|
-----BEGIN PGP SIGNED MESSAGE-----
|
|
|
|
LETTER FROM SENATOR PATRICK LEAHY (D-VT) ON ENCRYPTION
|
|
|
|
May 2, 1996
|
|
|
|
Dear Friends:
|
|
|
|
Today, a bipartisan group of Senators has joined me in supporting
|
|
legislation to encourage the development and use of strong,
|
|
privacy-enhancing technologies for the Internet by rolling back
|
|
the out-dated restrictions on the export of strong cryptography.
|
|
|
|
In an effort to demonstrate one of the more practical uses of
|
|
encryption technology (and so that you all know this message
|
|
actually came from me), I have signed this message using a
|
|
digital signature generated by the popular encryption program
|
|
PGP. I am proud to be the first member of Congress to utilize
|
|
encryption and digital signatures to post a message to the
|
|
Internet.
|
|
|
|
[* The first?! We're doomed!! *]
|
|
|
|
As a fellow Internet user, I care deeply about protecting
|
|
individual privacy and encouraging the development of the Net as
|
|
a secure and trusted communications medium. I do not need to
|
|
tell you that current export restrictions only allow American
|
|
companies to export primarily weak encryption technology. The
|
|
current strength of encryption the U.S. government will allow out
|
|
of the country is so weak that, according to a January 1996 study
|
|
conducted by world-renowned cryptographers, a pedestrian hacker
|
|
can crack the codes in a matter of hours! A foreign intelligence
|
|
agency can crack the current 40-bit codes in seconds.
|
|
|
|
[* That should read "As a fellow Internet user ..who doesn't read
|
|
his own mail... *]
|
|
|
|
Perhaps more importantly, the increasing use of the Internet and
|
|
similar interactive communications technologies by Americans to
|
|
obtain critical medical services, to conduct business, to be
|
|
entertained and communicate with their friends, raises special
|
|
concerns about the privacy and confidentiality of those
|
|
communications. I have long been concerned about these issues,
|
|
and have worked over the past decade to protect privacy and
|
|
security for our wire and electronic communications. Encryption
|
|
technology provides an effective way to ensure that only the
|
|
people we choose can read our communications.
|
|
|
|
I have read horror stories sent to me over the Internet about how
|
|
human rights groups in the Balkans have had their computers
|
|
confiscated during raids by security police seeking to find out
|
|
the identities of people who have complained about abuses.
|
|
Thanks to PGP, the encrypted files were undecipherable by the
|
|
police and the names of the people who entrusted their lives to
|
|
the human rights groups were safe.
|
|
|
|
The new bill, called the "Promotion of Commerce On-Line in the
|
|
Digital Era (PRO-CODE) Act of 1996," would:
|
|
|
|
o bar any government-mandated use of any particular
|
|
encryption system, including key escrow systems and affirm
|
|
the right of American citizens to use whatever form of
|
|
encryption they choose domestically;
|
|
|
|
[* Thank you for permission to do that.. even though it is legal already *]
|
|
|
|
o loosen export restrictions on encryption products so
|
|
that American companies are able to export any generally
|
|
available or mass market encryption products without
|
|
obtaining government approval; and
|
|
|
|
[* Loosen? Why not abolish? *]
|
|
|
|
o limit the authority of the federal government to set
|
|
standards for encryption products used by businesses and
|
|
individuals, particularly standards which result in products
|
|
with limited key lengths and key escrow.
|
|
|
|
This is the second encryption bill I have introduced with Senator
|
|
Burns and other congressional colleagues this year. Both bills
|
|
call for an overhaul of this country's export restrictions on
|
|
encryption, and, if enacted, would quickly result in the
|
|
widespread availability of strong, privacy protecting
|
|
technologies. Both bills also prohibit a government-mandated key
|
|
escrow encryption system. While PRO-CODE would limit the
|
|
authority of the Commerce Department to set encryption standards
|
|
for use by private individuals and businesses, the first bill we
|
|
introduced, called the "Encrypted Communications Privacy Act",
|
|
S.1587, would set up stringent procedures for law enforcement to
|
|
follow to obtain decoding keys or decryption assistance to read
|
|
the plaintext of encrypted communications obtained under court
|
|
order or other lawful process.
|
|
|
|
It is clear that the current policy towards encryption exports is
|
|
hopelessly outdated, and fails to account for the real needs of
|
|
individuals and businesses in the global marketplace. Encryption
|
|
expert Matt Blaze, in a recent letter to me, noted that current
|
|
U.S. regulations governing the use and export of encryption are
|
|
having a "deleterious effect ... on our country's ability to
|
|
develop a reliable and trustworthy information infrastructure."
|
|
The time is right for Congress to take steps to put our national
|
|
encryption policy on the right course.
|
|
|
|
I am looking forward to hearing from you on this important issue.
|
|
Throughout the course of the recent debate on the Communications
|
|
Decency Act, the input from Internet users was very valuable to
|
|
me and some of my Senate colleagues.
|
|
|
|
You can find out more about the issue at my World Wide Web home
|
|
page (http://www.leahy.senate.gov/) and at the Encryption Policy
|
|
Resource Page (http://www.crypto.com/). Over the coming months, I
|
|
look forward to the help of the Net community in convincing other
|
|
Members of Congress and the Administration of the need to reform
|
|
our nation's cryptography policy.
|
|
|
|
Sincerely,
|
|
|
|
Patrick Leahy
|
|
United States Senator
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: JAVA BLACK WIDOWS - SUN DECLARES WAR
|
|
author: unknown
|
|
from: staff@hpp.com
|
|
|
|
|
|
Sun Microsystems' has declared war on Black Widow Java
|
|
applets on the Web. This is the message from Sun in response
|
|
to an extensive Online Business Consultant (OBC/May 96)
|
|
investigation into Java security.
|
|
|
|
OBC's investigation and report was prompted after renowned
|
|
academics, scientists and hackers announced Java applets
|
|
downloaded from the WWW presented grave security risks for
|
|
users. Java Black Widow applets are hostile, malicious traps set
|
|
by cyberthugs out to snare surfing prey, using Java as their technology.
|
|
OBC received a deluge of letters asking for facts after OBC
|
|
announced a group of scientists from Princeton University, Drew
|
|
Dean, Edward Felten and Dan Wallach, published a paper declaring
|
|
"The Java system in its current form cannot easily be made secure."
|
|
The paper can be retrieved at
|
|
http://www.cs.princeton.edu/sip/pub/secure96.html.
|
|
|
|
Further probing by OBC found that innocent surfers on the Web who
|
|
download Java applets into Netscape's Navigator and Sun's
|
|
HotJava browser, risk having "hostile" applets interfere with their
|
|
computers (consuming RAM and CPU cycles). It was also discovered
|
|
applets could connect to a third party on the Internet and, without the
|
|
PC owner's knowledge, upload sensitive information from the user's
|
|
computer. Even the most sophisticated firewalls can be penetrated . . .
|
|
"because the attack is launched from behind the firewall," said the
|
|
Princeton scientists.
|
|
|
|
One reader said, "I had no idea that it was possible to stumble on
|
|
Web sites that could launch an attack on a browser." Another said,
|
|
"If this is allowed to get out of hand it will drive people away from the
|
|
Web. Sun must allay fears."
|
|
|
|
[* Faster connections if people are driven from the web.. hmm... :) *]
|
|
|
|
The response to the Home Page Press hostile applet survey led to the
|
|
analogy of Black Widow; that the Web was a dangerous place where
|
|
"black widows" lurked to snare innocent surfers. As a result the
|
|
Princeton group and OBC recommended users should "switch off"
|
|
Java support in their Netscape Navigator browsers. OBC felt that Sun
|
|
and Netscape had still to come clean on the security issues. But
|
|
according to Netscape's Product Manager, Platform, Steve Thomas,
|
|
"Netscape wishes to make it clear that all known security problems with
|
|
the Navigator Java and JavaScript environment are fixed in Navigator
|
|
version 2.02."
|
|
|
|
However, to date, Netscape has not answered OBC's direct questions
|
|
regarding a patch for its earlier versions of Navigator that supported
|
|
Java . . . the equivalent of a product recall in the 3D world. Netscape
|
|
admits that flaws in its browsers from version 2.00 upwards were
|
|
related to the Java security problems, but these browsers are still in use
|
|
and can be bought from stores such as CompUSA and Cosco. A floor
|
|
manager at CompUSA, who asked not to be named, said "its news to
|
|
him that we are selling defective software. The Navigator walks off our
|
|
floor at $34 a pop."
|
|
|
|
OBC advised Netscape the defective software was still selling at
|
|
software outlets around the world and asked Netscape what action was
|
|
going to be taken in this regard. Netscape has come under fire recently
|
|
for its policy of not releasing patches to software defects; but rather
|
|
forcing users to download new versions. Users report this task to be a
|
|
huge waste of time and resources because each download consists of
|
|
several Mbytes. As such defective Navigators don't get patched.
|
|
|
|
OBC also interviewed Sun's JavaSoft security guru, Ms. Marianne Mueller,
|
|
who said "we are taking security very seriously and working on it very
|
|
hard." Mueller said the tenet that Java had to be re-written from scratch or
|
|
scrapped "is an oversimplification of the challenge of running executable
|
|
content safely on the web. Security is hard and subtle, and trying to build
|
|
a secure "sandbox" [paradigm] for running untrusted downloaded applets
|
|
on the web is hard."
|
|
|
|
Ms. Mueller says Sun, together with their JavaSoft (Sun's Java division)
|
|
partners, have proposed a "sandbox model" for security in which "we
|
|
define a set of policies that restrict what applets can and cannot do---these
|
|
are the boundaries of the sandbox. We implement boundary checks---when
|
|
an applet tries to cross the boundary, we check whether or not it's allowed
|
|
to. If it's allowed to, then the applet is allowed on its way. If not, the
|
|
system throws a security exception.
|
|
|
|
"The 'deciding whether or not to allow the boundary to be crossed' is the
|
|
research area that I believe the Princeton people are working on," said
|
|
Mueller. "One way to allow applets additional flexibility is if the applet
|
|
is signed (for example, has a digital signature so that the identity of the
|
|
applet's distributor can be verified via a Certificate Authority) then allow
|
|
the applet more flexibility.
|
|
|
|
"There are two approaches: One approach is to let the signed applet
|
|
do anything. A second approach is to do something more complex and
|
|
more subtle, and only allow the applet particular specified capabilities.
|
|
Expressing and granting capabilities can be done in a variety of ways.
|
|
|
|
"Denial of service is traditionally considered one of the hardest security
|
|
problems, from a practical point of view. As [Java's creator] James
|
|
Gosling says, it's hard to tell the difference between an MPEG
|
|
decompressor and a hostile applet that consumes too many resources!
|
|
But recognizing the difficulty of the problem is not the same as 'passing
|
|
the buck.' We are working on ways to better monitor and control the
|
|
use (or abuse) of resources by Java classes. We could try to enforce
|
|
some resource limits, for example. These are things we are investigating.
|
|
|
|
"In addition, we could put mechanisms in place so that user interface
|
|
people (like people who do Web browsers) could add 'applet monitors'
|
|
so that browser users could at least see what is running in their browser,
|
|
and kill off stray applets. This kind of user interface friendliness (letting
|
|
a user kill of an applet) is only useful if the applet hasn't already grabbed
|
|
all the resources, of course."
|
|
|
|
The experts don't believe that the problem of black widows and hostile
|
|
applets is going to go away in a hurry. In fact it may get worse. The
|
|
hackers believe that when Microsoft releases Internet Explorer 3.00 with
|
|
support for Java, Visual Basic scripting and the added power of its
|
|
ActiveX technology, the security problem will become worse.
|
|
|
|
"There is opportunity for abuse, and it will become an enormous
|
|
problem," said Stephen Cobb, Director of Special Projects for the
|
|
National Computer Security Association (NCSA). "For example, OLE
|
|
technology from Microsoft [ActiveX] has even deeper access to a
|
|
computer than Java does."
|
|
|
|
JavaSoft's security guru Mueller agreed on the abuse issue: "It's going
|
|
to be a process of education for people to understand the difference
|
|
between a rude applet, and a serious security bug, and a theoretical
|
|
security bug, and an inconsequential security-related bug. In the case of
|
|
hostile applets, people will learn about nasty/rude applet pages, and
|
|
those pages won't be visited. I understand that new users of the Web
|
|
often feel they don't know where they're going when they point and click,
|
|
but people do get a good feel for how it works, pretty quickly, and I
|
|
actually think most users of the Web can deal with the knowledge that
|
|
not every page on the web is necessarily one they'd want to visit.
|
|
Security on the web in some sense isn't all that different from security
|
|
in ordinary life. At some level, common sense does come into play.
|
|
|
|
"Many people feel that Java is a good tool for building more secure
|
|
applications. I like to say that Java raises the bar for security on the
|
|
Internet. We're trying to do something that is not necessarily easy, but
|
|
that doesn't mean it isn't worth trying to do. In fact it may be worth
|
|
trying to do because it isn't easy. People are interested in seeing the
|
|
software industry evolve towards more robust software---that's the
|
|
feedback I get from folks on the Net."
|
|
|
|
# # #
|
|
|
|
The report above may be reprinted with credit provided as follows:
|
|
|
|
Home Page Press, Inc., http://www.hpp.com and Online Business ConsultantOE
|
|
Please refer to the HPP Web site for additional information about Java and
|
|
OBC.
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: Jacking in from the "Smoked Filled Room" Port
|
|
author: "Brock N. Meeks" <brock@well.com>
|
|
source: CyberWire Dispatch // September // Copyright (c) 1996 //
|
|
|
|
Washington, DC -- Federal provisions funding the digital telephony bill
|
|
and roving wiretaps, surgically removed earlier this year from an
|
|
anti-terrorism bill, have quietly been wedged into a $600 billion
|
|
omnibus spending bill.
|
|
|
|
The bill creates a Justice Department "telecommunications carrier
|
|
compliance fund" to pay for the provisions called for in the digital
|
|
telephony bill, formally known as the Communications Assistance in Law
|
|
Enforcement Act (CALEA). In reality, this is a slush fund.
|
|
|
|
Congress originally budgeted $500 million for CALEA, far short of the
|
|
billions actually needed to build in instant wiretap capabilities into
|
|
America's telephone, cable, cellular and PCS networks. This bill now
|
|
approves a slush fund of pooled dollars from the budgets of "any agency"
|
|
with "law enforcement, national security or intelligence
|
|
responsibilities." That means the FBI, CIA, NSA and DEA, among others,
|
|
will now have a vested interest in how the majority of your
|
|
communications are tapped.
|
|
|
|
The spending bill also provides for "multipoint wiretaps." This is the
|
|
tricked up code phase for what amounts to roving wiretaps. Where the
|
|
FBI can only tap one phone at a time in conjunction with an
|
|
investigation, it now wants the ability to "follow" a conversation from
|
|
phone to phone; meaning that if your neighbor is under investigation and
|
|
happens to use your phone for some reason, your phone gets tapped. It
|
|
also means that the FBI can tap public pay phones... think about that
|
|
next time you call 1-800-COLLECT.
|
|
|
|
In addition, all the public and congressional accountability provisions
|
|
for how CALEA money was spent, which were in the original House version
|
|
(H.R. 3814), got torpedoed in the Senate Appropriations Committee.
|
|
|
|
Provisions stripped out by the Senate:
|
|
|
|
-- GONE: Money isn't to be spent unless an implementation plan is sent
|
|
to each member of the Judiciary Committee and Appropriations committees.
|
|
|
|
-- GONE: Requirement that the FBI provide public details of how its new
|
|
wiretap plan exceeds or differs from current capabilities.
|
|
|
|
-- GONE: Report on the "actual and maximum number of simultaneous
|
|
surveillance/intercepts" the FBI expects. The FBI ran into a fire storm
|
|
earlier this year when it botched its long overdue report that said it
|
|
wanted the capability to tap one out of every 100 phones
|
|
*simultaneously*. Now, thanks to this funding bill, rather than having
|
|
to defend that request, it doesn't have to say shit.
|
|
|
|
-- GONE: Complete estimate of the full costs of deploying and
|
|
developing the digital wiretapping plan.
|
|
|
|
-- GONE: An annual report to Congress "specifically detailing" how all
|
|
taxpayer money -- YOUR money -- is spent to carry out these new wiretap
|
|
provisions.
|
|
|
|
"No matter what side you come down on this (digital wiretapping) issue,
|
|
the stakes for democracy are that we need to have public accountability,"
|
|
said Jerry Berman, executive director of the Center for Democracy and
|
|
Technology.
|
|
|
|
Although it appeared that no one in congress had the balls to take on
|
|
the issue, one stalwart has stepped forward, Rep. Bob Barr (R-Ga.). He
|
|
has succeeded in getting some of the accountability provisions back into
|
|
the bill, according to a Barr staffer. But the fight couldn't have been
|
|
an easy one. The FBI has worked congress relentlessly in an effort to
|
|
skirt the original reporting and implementation requirements as outlined
|
|
in CALEA. Further, Barr isn't exactly on the FBI's Christmas card list.
|
|
Last year it was primarily Barr who scotched the funding for CALEA
|
|
during the 104th Congress' first session.
|
|
|
|
But Barr has won again. He has, with backing from the Senate, succeeded
|
|
in *putting back* the requirement that the FBI must justify all CALEA
|
|
expenditures to the Judiciary Committee. Further, the implementation
|
|
plan, "though somewhat modified" will "still have some punch," Barr's
|
|
staffer assured me. That includes making the FBI report on its
|
|
expected capacities and capabilities for digital wiretapping. In other
|
|
words, the FBI won't be able to "cook the books" on the wiretap figures
|
|
in secret. Barr also was successful in making the Justice Department
|
|
submit an annual report detailing its CALEA spending to Congress.
|
|
|
|
However, the funding for digital wiretaps remains. Stuffing the funding
|
|
measures into a huge omnibus spending bill almost certainly assures its
|
|
passage. Congress is twitchy now, anxious to leave. They are chomping
|
|
at the bit, sensing the end of the 104th Congress' tortured run as the
|
|
legislative calender is due to run out sometime early next week. Then
|
|
they will all literally race from Capitol Hill at the final gavel,
|
|
heading for the parking lot, jumping in their cars like stock car
|
|
drivers as they make a made dash for National Airport to return to their
|
|
home districts in an effort to campaign for another term in the loopy
|
|
world of national politics.
|
|
|
|
Congress is "going to try to sneak this (spending bill) through the back
|
|
door in the middle of the night," says Leslie Hagan, legislative
|
|
director for the National Association of Criminal Defense Lawyers. She
|
|
calls this a "worst case scenario" that is "particularly dangerous"
|
|
because the "deliberative legislative process is short-ciricutied."
|
|
|
|
Such matters as wiretapping deserve to be aired in the full sunlight of
|
|
congressional hearings, not stuffed into an 11th hour spending bill.
|
|
This is legislative cowardice. Sadly, it will most likely succeed.
|
|
|
|
And through this all, the Net sits mute.
|
|
|
|
Unlike a few months ago, on the shameful day the Net cried "wolf" over
|
|
these same provisions, mindlessly flooding congressional switchboards
|
|
and any Email box within keyboard reach, despite the fact that the
|
|
funding provisions had been already been stripped from the
|
|
anti-terrorism bill, there has been no hue-and-cry about these most
|
|
recent moves.
|
|
|
|
Yes, some groups, such as the ACLU, EPIC and the Center for Democracy
|
|
and Technology have been working the congressional back channels,
|
|
buzzing around the frenzied legislators like crazed gnats.
|
|
|
|
But why haven't we heard about all this before now? Why has this bill
|
|
come down to the wire without the now expected flurry of "alerts"
|
|
"bulletins" and other assorted red-flag waving by our esteemed Net
|
|
guardians? Barr's had his ass hanging in the wind, fighting FBI
|
|
Director Louis "Teflon" Freeh; he could have used some political cover
|
|
from the cyberspace community. Yet, if he'd gone to that digital well,
|
|
he'd have found only the echo of his own voice.
|
|
|
|
And while the efforts of Rep. Barr are encouraging, it's anything from a
|
|
done deal. "As long as the door is cracked... there is room for
|
|
mischief," said Barr's staffer. Meaning, until the bill is reported
|
|
and voted on, some snapperhead congressman could fuck up the process yet
|
|
again.
|
|
|
|
We all caught a bit of a reprieve here, but I wouldn't sleep well. This
|
|
community still has a lot to learn about the Washington boneyard.
|
|
Personally, I'm a little tired of getting beat up at every turn. Muscle
|
|
up, folks, the fight doesn't get any easier.
|
|
|
|
Meeks out...
|
|
|
|
Declan McCullagh <declan@well.com> contributed to this report.
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: Panix Attack
|
|
author: Joshua Quittner
|
|
source: Time Magazine - September 30, 1996 Volume 148, No. 16
|
|
|
|
It was Friday night, and Alexis Rosen was about to leave work when one
|
|
of his computers sent him a piece of E-mail. If this had been the
|
|
movies, the message would have been presaged by something
|
|
dramatic--the woo-ga sound of a submarine diving into combat, say. But
|
|
of course it wasn't. This was a line of dry text automatically
|
|
generated by one of the machines that guard his network. It said
|
|
simply, "The mail servers are down." The alert told Rosen that his
|
|
6,000 clients were now unable to receive E-mail.
|
|
|
|
Rosen, 30, is a cool customer, not the type to go into cardiac arrest
|
|
when his mail server crashes. He is the co-founder of Panix, the
|
|
oldest and best-known Internet service provider in Manhattan. Years
|
|
before the Net became a cereal-box buzz word, Rosen would let people
|
|
connect to Panix free, or for only a few dollars a month, just
|
|
because--well, because that was the culture of the time. Rosen has
|
|
handled plenty of mail outages, so on this occasion he simply rolled
|
|
up his sleeves and set to work, fingers clacking out a flamenco on the
|
|
keyboard, looking for the cause of the glitch. What he uncovered sent
|
|
a chill down his spine--and has rippled across the Net ever since,
|
|
like a rumor of doom. Someone, or something, was sending at the rate
|
|
of 210 a second the one kind of message his computer was obliged to
|
|
answer. As long as the siege continued--and it went on for
|
|
weeks--Rosen had to work day and night to keep from being overwhelmed
|
|
by a cascade of incoming garbage.
|
|
|
|
It was the dread "syn flood," a relatively simple but utterly
|
|
effective means for shutting down an Internet service provider--or,
|
|
for that matter, anyone else on the Net. After Panix went public with
|
|
its story two weeks ago, dozens of online services and companies
|
|
acknowledged being hit by similar "denial of service" attacks. As of
|
|
late last week, seven companies were still under furious assault.
|
|
|
|
None of the victims have anything in common, leading investigators to
|
|
suspect that the attacks may stem from the same source: a pair of
|
|
how-to articles that appeared two months ago in 2600 and Phrack, two
|
|
journals that cater to neophyte hackers. Phrack's article was written
|
|
by a 23-year-old editor known as daemon9. He also crafted the code for
|
|
an easy-to-run, menu-driven, syn-flood program, suitable for use by
|
|
any "kewl dewd" with access to the Internet. "Someone had to do it,"
|
|
wrote daemon9.
|
|
|
|
[* WooWoo! Go Route! *]
|
|
|
|
That gets to the core of what may be the Net's biggest problem these
|
|
days: too many powerful software tools in the hands of people who
|
|
aren't smart enough to build their own--or to use them wisely. Real
|
|
hackers may be clever and prankish, but their first rule is to do no
|
|
serious harm. Whoever is clobbering independent operators like Panix
|
|
has as much to do with hacking as celebrity stalkers have to do with
|
|
cinematography. Another of the victims was the Voters
|
|
Telecommunications Watch, a nonprofit group that promotes free speech
|
|
online. "Going after them was like going after the little old lady who
|
|
helps people in the neighborhood and bashing her with a lead pipe,"
|
|
says Rosen.
|
|
|
|
[* Gee. Is that to say that if you can't write your own operating system
|
|
that you shouldn't have it or that it is a big problem? If so, poor
|
|
Microsoft... *]
|
|
|
|
Rosen was eventually able to repulse the attack; now he'd like to
|
|
confront his attacker. Since some of these Netwits don't seem to know
|
|
enough to wipe off their digital fingerprints, he may get his wish.
|
|
|
|
[* Wow, they did it for two weeks without getting caught. Two weeks of
|
|
24/7 abuse toward this ISP, and now he thinks he can track them down? *]
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: none
|
|
author: Rory J. O'Connor
|
|
source: Knight-Ridder Newspapers
|
|
|
|
WASHINGTON -- Vandals swept through the Internet last weekend, wiping
|
|
clean dozens of public bulletin boards used by groups of Jews, Muslims,
|
|
feminists and homosexuals, among others.
|
|
|
|
In one of the most widespread attacks on the international computer
|
|
network, the programs automatically erased copies of more than 27,000
|
|
messages from thousands of servers, before operators stopped the
|
|
damage.
|
|
|
|
The identity of those responsible for launching the apparent hate
|
|
attacks -- some of the programs were titled "fagcancel" and "kikecancel"
|
|
-- is unknown.
|
|
|
|
The incident further illustrates the shaky security foundation of the
|
|
Internet, which has mushroomed from academic research tool to
|
|
international communications medium in just three years.
|
|
|
|
And it raised the ire of many Internet users furious at the ease with
|
|
which a user can erase someone else's words from worldwide discussion
|
|
groups, known as Usenet newsgroups, in a matter of hours.
|
|
|
|
"There's nothing you can do as an individual user to prevent someone
|
|
from canceling your message," said John Gilmore, a computer security
|
|
expert in San Francisco. "We need something added to Usenet's software
|
|
that would only allow a cancellation from the originator."
|
|
|
|
[* Which can then be forged just like fakemail... *]
|
|
|
|
The incident follows closely three other well-publicized Internet
|
|
attacks.
|
|
|
|
In two cases, hackers altered the World Wide Web home pages of the
|
|
Justice Department and the CIA, apparently as political protests. In
|
|
the third, a hacker overloaded the computers of an Internet service
|
|
provider called Panix with hordes of phony requests for a connection,
|
|
thus denying use of the service to legitimate users.
|
|
|
|
The latest attacks -- called cancelbots -- were launched sometime over
|
|
the weekend from a variety of Internet service providers, including
|
|
UUNet Technologies in Fairfax, Va., and Netcom Inc. in San Jose,
|
|
Calif. One attack was launched from a tiny provider in Tulsa, Okla.,
|
|
called Cottage Software, according to its owner, William Brunton.
|
|
|
|
"The offending user has been terminated and the information has been
|
|
turned over to the proper (federal) authorities," Brunton said in a
|
|
telephone interview Wednesday. "It's now in their hands."
|
|
|
|
Legal experts said it's unclear if the attacks constitute a crime
|
|
under federal laws such as the Computer Fraud and Abuse Act.
|
|
|
|
"It's really a difficult issue," said David Sobel, legal counsel of
|
|
the Electronic Privacy Information Center in Washington. "Can you
|
|
assign value to a newsgroup posting? Because most of the computer
|
|
crime statutes assume you're ripping off something of value."
|
|
|
|
[* Hello? Several statutes don't assume that at all. You can be
|
|
charged with HAVING information and not using it. *]
|
|
|
|
A spokesman for the FBI in Washington said he was unaware of any
|
|
federal investigation of the incident, although it is the agency's
|
|
policy not to comment on investigations.
|
|
|
|
While some of the deleted messages have been restored on certain
|
|
servers, where operators have retrieved them from backup copies of
|
|
their disks, users of other servers where the messages haven't been
|
|
restored will never be able to read them.
|
|
|
|
The fact that a user can stamp out the words of someone else is an
|
|
artifact of the original design of the Internet, begun as a Department
|
|
of Defense project in 1969.
|
|
|
|
The Internet consists of tens of thousands of computers, called
|
|
servers, that act as repositories for public messages, private
|
|
electronic mail and World Wide Web home pages. Servers throughout the
|
|
world are interconnected through telephone lines so they can exchange
|
|
information and route messages to the individual users, or clients, of
|
|
a given server.
|
|
|
|
Each server stores a copy of the constantly changing contents of
|
|
newsgroups, which function as giant electronic bulletin boards
|
|
dedicated to particular subjects. There are thousands of them,
|
|
covering everything from particle physics to soap operas.
|
|
|
|
Any Internet user is free to post a contribution to nearly any
|
|
newsgroup, and the posting is rapidly copied from one server to
|
|
another, so the contents of a newsgroup are identical on every server.
|
|
|
|
Almost the only form of control over postings, including their
|
|
content, is voluntary adherence to informal behavior rules known as
|
|
"netiquette."
|
|
|
|
The idea of cancelbots originated when the Internet and its newsgroups
|
|
were almost exclusively the domain of university and government
|
|
scientists and researchers. Their purpose was to allow individuals to
|
|
rescind messages they later discovered to contain an error. The action
|
|
took the form of an automatic program, itself in the form of a
|
|
message, because it would be impossible for an individual to find and
|
|
delete every copy of the posting on every Internet server.
|
|
|
|
But the Usenet software running on servers doesn't verify that the
|
|
cancel message actually comes from the person who created the original
|
|
posting. All a malicious user need do is replace their actual e-mail
|
|
address with that of someone else to fool Usenet into deleting a
|
|
message. That counterfeiting is as simple as changing an option in the
|
|
browser software most people use to connect to the Internet.
|
|
|
|
"It's pretty easy. There's no authentication in the Usenet. So anybody
|
|
can pretend to be anybody else," Gilmore said.
|
|
|
|
It takes only slightly more sophistication to create a program that
|
|
searches newsgroups for certain keywords, and then issues a cancelbot
|
|
for any message that contains them. That is how the weekend attack
|
|
took place.
|
|
|
|
The use of counterfeit cancelbots is not new. The Church of
|
|
Scientology, embroiled in a legal dispute with former members, last
|
|
year launched cancelbots against the newsgroup postings of the
|
|
members. Attorneys for the church claimed the postings violated
|
|
copyright laws, because they contained the text of Scientology
|
|
teachings normally available only to longtime members who have paid
|
|
thousands of dollars.
|
|
|
|
Net users have also turned false cancelbots against those who violate
|
|
a basic rule of netiquette by "spamming" newsgroups -- that is,
|
|
posting a message to hundreds or even thousands of newsgroups, usually
|
|
commercial in nature and unrelated to the newsgroup topic.
|
|
|
|
"This technology has been used for both good and evil," Gilmore said.
|
|
|
|
But an individual launching a wholesale cancelbot attack on postings
|
|
because of content is considered a serious violation of netiquette --
|
|
although one about which there is little recourse at the moment.
|
|
|
|
"For everybody who takes the trouble and time to participate on the
|
|
Internet in some way, I think it is not acceptable for somebody else
|
|
to undo those efforts," Sobel said. "But what are the alternatives?
|
|
Not to pursue this means of communications? Unintended uses and
|
|
malicious uses seem to be inevitable."
|
|
|
|
What's needed, some say, is a fundamental change in the Internet that
|
|
forces individual users to "sign" their postings in such a way that
|
|
everyone has a unique identity that can't be forged.
|
|
|
|
[* And how about for the technically challenged who can't figure
|
|
out the point-and-drool America Online software? *]
|
|
|
|
"The fatal flaw is that newsgroups were set up at a time when
|
|
everybody knew everybody using the system, and you could weed out
|
|
anybody who did this," Brunton said. "This points out that flaw in the
|
|
system, and that there are unreasonable people out there who will
|
|
exploit it."
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: Mitnick Faces 25 More Federal Counts of Computer Hacking
|
|
source: nando.net - Los Angeles Daily News
|
|
|
|
LOS ANGELES (Sep 27, 1996 02:06 a.m. EDT) -- A computer hacker who
|
|
used his digital prowess to outrun FBI agents for three years has been
|
|
indicted on charges that he stole millions of dollars in software
|
|
through the Internet.
|
|
|
|
The 25-count federal indictment against Kevin Mitnick is the biggest
|
|
development in the sensational case since the self-taught computer
|
|
whiz was arrested in February 1995 in North Carolina.
|
|
|
|
The 33-year-old son of a waitress from suburban Los Angeles has been
|
|
held in custody in Los Angeles ever since.
|
|
|
|
With Thursday's indictment, federal prosecutors made good on their vow
|
|
to hold Mitnick accountable for what they say was a string of hacking
|
|
crimes that pushed him to the top of the FBI's most-wanted list.
|
|
|
|
"These are incredibly substantial charges. They involve conducts
|
|
spanning two and a half years. They involve a systematic scheme to
|
|
steal proprietary software from a range of victims," Assistant U.S.
|
|
Attorney David Schindler said in an interview.
|
|
|
|
Mitnick's longtime friend, Lewis De Payne, 36, also was indicted
|
|
Thursday on charges that he helped steal the software between June
|
|
1992 and February 1995 -- while Mitnick was on the run from the FBI.
|
|
|
|
"I would say it is an absurd fiction," said De Payne's attorney,
|
|
Richard Sherman. "I don't think the government is going to be able to
|
|
prove its case."
|
|
|
|
De Payne will surrender today to authorities in Los Angeles, Sherman
|
|
said.
|
|
|
|
Friends and relatives of Mitnick have defended his hacking, saying he
|
|
did it for the intellectual challenge and to pull pranks -- but never
|
|
for profit.
|
|
|
|
Los Angeles' top federal prosecutor sees it differently.
|
|
|
|
"Computer and Internet crime represents a major threat, with
|
|
sophisticated criminals able to wreak havoc around the world," U.S.
|
|
Attorney Nora M. Manella said in a written statement.
|
|
|
|
The indictment charges Mitnick and De Payne with having impersonated
|
|
officials from companies and using "hacking" programs to enter company
|
|
computers. Schindler said the software involved the operation of
|
|
cellular telephones and computer operating systems.
|
|
|
|
Their alleged victims include the University of Southern California,
|
|
Novell, Sun Microsystems and Motorola, Schindler said.
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: Hacker is freed but he's banned from computers
|
|
author: Brandon Bailey (Mercury News Staff Writer)
|
|
|
|
Convicted hacker Kevin Poulsen is out of prison after five years, but
|
|
he still can't touch a computer.
|
|
|
|
Facing a court order to pay more than $57,000 in restitution for
|
|
rigging a series of radio station call-in contests, Poulsen has
|
|
complained that authorities won't let him use his only marketable
|
|
skill -- programming.
|
|
|
|
Instead, Poulsen said, he's doomed to work for minimum wage at a
|
|
low-tech job for the next three years. Since his June release from
|
|
prison -- after serving more time behind bars than any other
|
|
U.S. hacker -- the only work he's found is canvassing door to door for
|
|
a liberal political action group.
|
|
|
|
It's a big change for the 30-year-old Poulsen, once among the most
|
|
notorious hackers on the West Coast. A former employee at SRI
|
|
International in Menlo Park, he was featured on television's
|
|
"America's Most Wanted" while living underground in Los Angeles as a
|
|
federal fugitive from 1989 to 1991.
|
|
|
|
Before authorities caught him, Poulsen burglarized telephone company
|
|
offices, electronically snooped through records of law enforcement
|
|
wiretaps and jammed radio station phone lines in a scheme to win cash,
|
|
sports cars and a trip to Hawaii.
|
|
|
|
Poulsen now lives with his sister in the Los Angeles area, where he
|
|
grew up in the 1970s and '80s. But he must remain under official
|
|
supervision for three more years. And it galls him that authorities
|
|
won't trust him with a keyboard or a mouse.
|
|
|
|
U.S. District Judge Manuel Real has forbidden Poulsen to have any
|
|
access to a computer without his probation officer's approval.
|
|
|
|
That's a crippling restriction in a society so reliant on computer
|
|
technology, Poulsen complained in a telephone interview after a
|
|
hearing last week in which the judge denied Poulsen's request to
|
|
modify his terms of probation.
|
|
|
|
To comply with those rules, Poulsen said, his parents had to put their
|
|
home computer in storage when he stayed with them. He can't use an
|
|
electronic card catalog at the public library. And he relies on
|
|
friends to maintain his World Wide Web site. He even asked his
|
|
probation officer whether it was OK to drive because most cars contain
|
|
microchips.
|
|
|
|
Living under government supervision apparently hasn't dampened the
|
|
acerbic wit Poulsen displayed over the years.
|
|
|
|
Prankster humor
|
|
|
|
When authorities were tracking him, they found he'd kept photographs
|
|
of himself, taken while burglarizing phone company offices, and that
|
|
he'd created bogus identities in the names of favorite comic book
|
|
characters.
|
|
|
|
Today, you can click on Poulsen's web page (http://www.catalog.com/kevin)
|
|
and read his account of his troubles with the law. Until it was
|
|
revised Friday, you could click on the highlighted words "my probation
|
|
officer" -- and see the scary red face of Satan.
|
|
|
|
But though he's still chafing at authority, Poulsen insists he's ready
|
|
to be a law-abiding citizen.
|
|
|
|
"The important thing to me," he said, "is just not wasting the next
|
|
three years of my life." He said he's submitted nearly 70 job
|
|
applications but has found work only with the political group, which
|
|
he declined to identify.
|
|
|
|
Poulsen, who earned his high school diploma behind bars, said he wants
|
|
to get a college degree. But authorities vetoed his plans to study
|
|
computer science while working part-time because they want him to put
|
|
first priority on earning money for restitution.
|
|
|
|
Poulsen's federal probation officer, Marc Stein, said office policy
|
|
prevents him from commenting on the case. Poulsen's court-appointed
|
|
attorney, Michael Brennan, also declined comment.
|
|
|
|
Differing view
|
|
|
|
But Assistant U.S. Attorney David Schindler partly disputed Poulsen's
|
|
account.
|
|
|
|
"Nobody wants to see Mr. Poulsen fail," said Schindler, who has
|
|
prosecuted both Poulsen and Kevin Mitnick, another young man from the
|
|
San Fernando Valley whose interest in computers and telephones became
|
|
a passion that led to federal charges.
|
|
|
|
Schindler said Stein is simply being prudent: "It would be irresponsible
|
|
for the probation office to permit him to have unfettered access to
|
|
computers."
|
|
|
|
Legal experts say there's precedent for restricting a hacker's access
|
|
to computers, just as paroled felons may be ordered not to possess
|
|
burglary tools or firearms. Still, some say it's going too far.
|
|
|
|
"There are so many benign things one can do with a computer," said
|
|
Charles Marson, a former attorney for the American Civil Liberties
|
|
Union who handles high-tech cases in private practice. "If it were a
|
|
typewriter and he pulled some scam with it or wrote a threatening
|
|
note, would you condition his probation on not using a typewriter?"
|
|
|
|
But Carey Heckman, co-director of the Law and Technology Policy Center
|
|
at Stanford University, suggested another analogy: "Would you want to
|
|
put an arsonist to work in a match factory?"
|
|
|
|
Friends defend Poulsen.
|
|
|
|
Over the years, Poulsen's friends and defense lawyers have argued that
|
|
prosecutors exaggerated the threat he posed, either because law
|
|
officers didn't understand the technology he was using or because his
|
|
actions seemed to flaunt authority.
|
|
|
|
Hacking is "sort of a youthful rebellion thing," Poulsen says
|
|
now. "I'm far too old to get back into that stuff."
|
|
|
|
But others who've followed Poulsen's career note that he had earlier
|
|
chances to reform.
|
|
|
|
He was first busted for hacking into university and government
|
|
computers as a teen-ager. While an older accomplice went to jail,
|
|
Poulsen was offered a job working with computers at SRI, the private
|
|
think tank that does consulting for the Defense Department and other
|
|
clients.
|
|
|
|
There, Poulsen embarked on a double life: A legitimate programmer by
|
|
day, he began breaking into Pacific Bell offices and hacking into
|
|
phone company computers at night.
|
|
|
|
When he learned FBI agents were on his trail, he used his skills to
|
|
track their moves.
|
|
|
|
Before going underground in 1989, he also obtained records of secret
|
|
wiretaps from unrelated investigations. Though Poulsen said he never
|
|
tipped off the targets, authorities said they had to take steps to
|
|
ensure those cases weren't compromised.
|
|
|
|
According to Schindler, the probation office will consider Poulsen's
|
|
requests to use computers "on a case-by-case basis."
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
[* Blurb on Bernie's release follows this article. *]
|
|
|
|
title: Computer Hacker Severely Beaten after Criticizing Prison Conditions
|
|
Target of Campaign by U.S. Secret Service
|
|
|
|
A convicted hacker, in prison for nothing more than possession of
|
|
electronic parts easily obtainable at any Radio Shack, has been
|
|
savagely beaten after being transferred to a maximum security prison
|
|
as punishment for speaking out publicly about prison conditions.
|
|
Ed Cummings, recently published in Wired and Internet Underground, as
|
|
well as a correspondent for WBAI-FM in New York and 2600 Magazine,
|
|
has been the focus of an increasingly ugly campaign of harrassment
|
|
and terror from the authorities. At the time of this writing, Cummings
|
|
is locked in the infectious diseases ward at Lehigh County prison in
|
|
Allentown, Pennsylvania, unable to obtain the proper medical treatment
|
|
for the severe injuries he has suffered.
|
|
|
|
The Ed Cummings case has been widely publicized in the computer hacker
|
|
community over the past 18 months. In March of 1995, in what can only
|
|
be described as a bizarre application of justice, Cummings (whose pen
|
|
name is "Bernie S.") was targetted and imprisoned by the United States
|
|
Secret Service for mere possession of technology that could be used to
|
|
make free phone calls. Although the prosecution agreed there was no
|
|
unauthorized access, no victims, no fraud, and no costs associated with
|
|
the case, Cummings was imprisoned under a little known attachment to the
|
|
Digital Telephony bill allowing individuals to be charged in this fashion.
|
|
Cummings was portrayed by the Secret Service as a potential terrorist
|
|
because of some of the books found in his library.
|
|
|
|
A year and a half later, Cummings is still in prison, despite the
|
|
fact that he became eligible for parole three months ago. But things have
|
|
now taken a sudden violent turn for the worse. As apparent retribution for
|
|
Cummings' continued outspokenness against the daily harrassment and
|
|
numerous injustices that he has faced, he was transferred on Friday
|
|
to Lehigh County Prison, a dangerous maximum security facility. Being
|
|
placed in this facility was in direct opposition to his sentencing
|
|
order. The reason given by the prison: "protective custody".
|
|
|
|
A day later, Cummings was nearly killed by a dangerous inmate for not
|
|
getting off the phone fast enough. By the time the prison guards stopped
|
|
the attack, Cummings had been kicked in the face so many times that he
|
|
lost his front teeth and had his jaw shattered. His arm, which he tried
|
|
to use to shield his face, was also severely injured. It is expected that
|
|
his mouth will be wired shut for up to three months. Effectively,
|
|
Cummings has now been silenced at last.
|
|
|
|
>From the start of this ordeal, Cummings has always maintained his
|
|
composure and confidence that one day the injustice of his
|
|
imprisonment will be realized. He was a weekly contributor to a
|
|
radio talk show in New York where he not only updated listeners on
|
|
his experiences, but answered their questions about technology.
|
|
People from as far away as Bosnia and China wrote to him, having
|
|
heard about his story over the Internet.
|
|
|
|
Now we are left to piece these events together and to find those
|
|
responsible for what are now criminal actions against him. We are
|
|
demanding answers to these questions: Why was Cummings transferred
|
|
for no apparent reason from a minimum security facility to a very
|
|
dangerous prison? Why has he been removed from the hospital immediately
|
|
after surgery and placed in the infectious diseases ward of the very
|
|
same prison, receiving barely any desperately needed medical
|
|
attention? Why was virtually every moment of Cummings' prison stay a
|
|
continuous episode of harrassment, where he was severely punished for
|
|
such crimes as receiving a fax (without his knowledge) or having too
|
|
much reading material? Why did the Secret Service do everything in
|
|
their power to ruin Ed Cummings' life?
|
|
|
|
Had these events occurred elsewhere in the world, we would be quick
|
|
to condemn them as barbaric and obscene. The fact that such things are
|
|
taking place in our own back yards should not blind us to the fact that
|
|
they are just as unacceptable.
|
|
|
|
Lehigh County Prison will be the site of several protest actions as will
|
|
the Philadelphia office of the United States Secret Service. For more
|
|
information on this, email protest@2600.com or call our office at
|
|
(516) 751-2600.
|
|
|
|
9/4/96
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: Bernie S. Released!
|
|
|
|
As of Friday, September 13th, Bernie S. was released from prison on
|
|
an unprecedented furlough. He will have to report to probation and
|
|
he still has major medical problems as a result of his extended tour
|
|
of the Pennsylvania prison system. But the important thing is that
|
|
he is out and that this horrible ordeal has finally begun to end.
|
|
|
|
We thank all of you who took an interest in this case. We believe
|
|
it was your support and the pressure you put on the authorities that
|
|
finally made things change. Thanks again and never forget the power
|
|
you have.
|
|
|
|
emmanuel@2600.com
|
|
www.2600.com
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: <The Squidge Busted>
|
|
|
|
ENGLAND:
|
|
|
|
The Squidge was arrested at his home yesterday under the Computer Misuse
|
|
Act. A long standing member of the US group the *Guild, Squidge was silent
|
|
today after being released but it appears no formal charges will be made
|
|
until further interviews have taken place.
|
|
|
|
Included in the arrest were the confiscation of his computer equipment
|
|
including two Linux boxes and a Sun Sparc. A number of items described as
|
|
'telecommunications devices' were also seized as evidence.
|
|
|
|
Following the rumours of ColdFire's recent re-arrest for cellular fraud
|
|
this could mean a new crackdown on hacking and phreaking by the UK
|
|
authorities. If this is true, it could spell the end for a particularly
|
|
open period in h/p history when notable figures have been willing to
|
|
appear more in public.
|
|
|
|
We will attempt to release more information as it becomes available.
|
|
|
|
(not posted by Squidge)
|
|
|
|
--
|
|
Brought to you by The NeXus.....
|
|
|
|
[* Good luck goes out to Squidge.. we are hoping for the best. *]
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: School Hires Student to Hack Into Computers
|
|
source: The Sun Herald - 22 August 1996
|
|
|
|
Palisades Park, NJ - When in trouble, call an expert.
|
|
|
|
Students at Palisades Park's high school needed their
|
|
transcripts to send off to colleges. But they were in the computer
|
|
and no one who knew the password could be reached. So the school
|
|
hired a 16-year-old hacker to break in.
|
|
|
|
"They found this student who apparently was a whiz, and,
|
|
apparently, was able to go in and unlock the password," School Board
|
|
attorney Joseph R. Mariniello said.
|
|
|
|
Superintendent George Fasciano was forced to explain to the
|
|
School Board on Monday the $875 bill for the services of Matthew
|
|
Fielder.
|
|
|
|
[* He should have charged more :) *]
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: Paranoia and Brit Hackers Fuel Infowar Craze in Spy Agencies
|
|
author: unknown
|
|
source: Crypt Newsletter 38
|
|
|
|
Electronic doom will soon be visited on U.S. computer networks by
|
|
information warriors, hackers, pannational groups of computer-wielding
|
|
religious extremists, possible agents of Libya and Iran, international
|
|
thugs and money-mad Internet savvy thieves.
|
|
|
|
John Deutch, director of Central Intelligence, testified to the
|
|
truth of the matter, so it must be graven in stone. In a long statement
|
|
composed in the august tone of the Cold Warrior, Deutch said to the
|
|
Senate Permanent Subcommittee on Investigations on June 25, "My greatest
|
|
concern is that hackers, terrorist organizations, or other nations might
|
|
use information warfare techniques" to disrupt the national
|
|
infrastructure.
|
|
|
|
"Virtually any 'bad actor' can acquire the hardware and software
|
|
needed to attack some of our critical information-based infrastructures.
|
|
Hacker tools are readily available on the Internet, and hackers
|
|
themselves are a source of expertise for any nation or foreign
|
|
terrorist organization that is interested in developing an information
|
|
warfare capability. In fact, hackers, with or without their full
|
|
knowledge, may be supplying advice and expertise to rogue states such
|
|
as Iran and Libya."
|
|
|
|
In one sentence, the head of the CIA cast hackers -- from those more
|
|
expert than Kevin Mitnick to AOLHell-wielding idiots calling an America
|
|
On-Line overseas account -- as pawns of perennial international bogeymen,
|
|
Libya and Iran.
|
|
|
|
Scrutiny of the evidence that led to this conclusion was not possible
|
|
since it was classified, according to Deutch.
|
|
|
|
" . . . we have [classified] evidence that a number of countries
|
|
around the world are developing the doctrine, strategies, and tools
|
|
to conduct information attacks," said Deutch.
|
|
|
|
Catching glimpses of shadowy enemies at every turn, Deutch
|
|
characterized them as operating from the deep cover of classified
|
|
programs in pariah states. Truck bombs aimed at the telephone
|
|
company, electronic assaults by "paid hackers" are likely to
|
|
be part of the arsenal of anyone from the Lebanese Hezbollah
|
|
to "nameless . . . cells of international terrorists such as those
|
|
who attacked the World Trade Center."
|
|
|
|
Quite interestingly, a Minority Staff Report entitled "Security and
|
|
Cyberspace" and presented to the subcommittee around the same time as
|
|
Deutch's statement, presented a different picture. In its attempt to
|
|
raise the alarm over hacker assaults on the U.S., it inadvertently
|
|
portrayed the intelligence community responsible for appraising the
|
|
threat as hidebound stumblebums, Cold Warriors resistant to change and
|
|
ignorant or indifferent to the technology of computer networks and their
|
|
misuse.
|
|
|
|
Written by Congressional staff investigators Dan Gelber and Jim Christy,
|
|
the report quotes an unnamed member of the intelligence community likening
|
|
threat assessment in the area to "a toddler soccer game, where everyone
|
|
just runs around trying to kick the ball somewhere." Further, assessment
|
|
of the threat posed by information warriors was "not presently a priority
|
|
of our nation's intelligence and enforcement communities."
|
|
|
|
The report becomes more comical with briefings from intelligence
|
|
agencies said to be claiming that the threat of hackers and information
|
|
warfare is "substantial" but completely unable to provide a concrete
|
|
assessment of the threat because few or no personnel were working on
|
|
the subject under investigation. "One agency assembled [ten] individuals
|
|
for the Staff briefing, but ultimately admitted that only one person was
|
|
actually working 'full time' on intelligence collection and threat
|
|
analysis," write Gelber and Christy.
|
|
|
|
The CIA is one example.
|
|
|
|
"Central Intelligence Agency . . . staffs an 'Information Warfare
|
|
Center'; however, at the time of [the] briefing, barely a handful
|
|
of persons were dedicated to collection and on [sic] defensive
|
|
information warfare," comment the authors.
|
|
|
|
" . . . at no time was any agency able to present a national threat
|
|
assessment of the risk posed to our information infrastructure," they
|
|
continue. Briefings on the subject, if any and at any level of
|
|
classification, "consisted of extremely limited anecdotal information."
|
|
|
|
Oh no, John, say it ain't so!
|
|
|
|
The minority report continues to paint a picture of intelligence agencies
|
|
that have glommed onto the magic words "information warfare" and
|
|
"hackers" as mystical totems, grafting the subjects onto "pre-existing"
|
|
offices or new "working groups." However, the operations are based only
|
|
on labels. "Very little prioritization" has been done, there are
|
|
few analysts working on the subjects in question.
|
|
|
|
Another "very senior intelligence officer for science and technology"
|
|
is quoted claiming "it will probably take the intelligence community
|
|
years to break the traditional paradigms, and re-focus resources"
|
|
in the area.
|
|
|
|
Restated, intelligence director Deutch pronounced in June there was
|
|
classified evidence that hackers are in league with Libya and Iran and
|
|
that countries around the world are plotting plots to attack the U.S.
|
|
through information warfare. But the classified data is and was, at best,
|
|
anecdotal gossip -- hearsay, bullshit -- assembled by perhaps a handful of
|
|
individuals working haphazardly inside the labyrinth of the intelligence
|
|
community. There is no real threat assessment to back up the Deutch
|
|
claims. Can anyone say _bomber gap_?
|
|
|
|
The lack of solid evidence for any of the claims made by the intelligence
|
|
community has created an unusual stage on which two British hackers,
|
|
Datastream Cowboy and Kuji, were made the dog and pony in a ridiculous
|
|
show to demonstrate the threat of information warfare to members of
|
|
Congress. Because of a break-in at an Air Force facility in Rome, NY,
|
|
in 1994, booth hackers were made the stars of two Government Accounting
|
|
Office reports on network intrusions in the Department of Defense earlier
|
|
this year. The comings and goings of Datastream Cowboy also constitute the
|
|
meat of Gelber and Christy's minority staff report from the Subcommittee on
|
|
Investigations.
|
|
|
|
Before delving into it in detail, it's interesting to read what a
|
|
British newspaper published about Datastream Cowboy, a sixteen year-old,
|
|
about a year before he was made the poster boy for information
|
|
warfare and international hacking conspiracies in front of Congress.
|
|
|
|
In a brief article, blessedly so in contrast to the reams of propaganda
|
|
published on the incident for Congress, the July 5 1995 edition of The
|
|
Independent wrote, "[Datastream Cowboy] appeared before Bow Street
|
|
magistrates yesterday charged with unlawfully gaining access to a series
|
|
of American defense computers. Richard Pryce, who was 16 at the time of
|
|
the alleged offences, is accused of accessing key US Air Force systems
|
|
and a network owned by Lockheed, the missile and aircraft manufacturers."
|
|
|
|
Pryce, a resident of a northwest suburb of London did not enter a plea
|
|
on any of 12 charges levied against him under the British
|
|
Computer Misuse Act. He was arrested on May 12, 1994, by New Scotland
|
|
Yard as a result of work by the U.S. Air Force Office of Special
|
|
Investigations. The Times of London reported when police came for
|
|
Pryce, they found him at his PC on the third floor of his family's house.
|
|
Knowing he was about to be arrested, he "curled up on the floor and cried."
|
|
|
|
In Gelber and Christy's staff report, the tracking of Pryce, and to a
|
|
lesser extent a collaborator called Kuji -- real name Mathew Bevan, is
|
|
retold as an eight page appendix entitled "The Case Study: Rome
|
|
Laboratory, Griffiss Air Force Base, NY Intrusion."
|
|
|
|
Pryce's entry into Air Force computers was noticed on March 28, 1994,
|
|
when personnel discovered a sniffer program he had installed on one
|
|
of the Air Force systems in Rome. The Defense Information System
|
|
Agency (DISA) was notified. DISA subsequently called the Air
|
|
Force Office of Special Investigations (AFOSI) at the Air Force
|
|
Information Warfare Center in San Antonio, Texas. AFOSI then
|
|
sent a team to Rome to appraise the break-in, secure the system and
|
|
trace those responsible. During the process, the AFOSI team discovered
|
|
Datastream Cowboy had entered the Rome Air Force computers for the
|
|
first time on March 25, according to the report. Passwords had been
|
|
compromised, electronic mail read and deleted and unclassified
|
|
"battlefield simulation" data copied off the facility. The
|
|
Rome network was also used as a staging area for penetration of other
|
|
systems on the Internet.
|
|
|
|
AFOSI investigators initially traced the break-in back one step to
|
|
the New York City provider, Mindvox. According to the Congressional
|
|
report, this put the NYC provider under suspicion because "newspaper
|
|
articles" said Mindvox's computer security was furnished by two "former
|
|
Legion of Doom members." "The Legion of Doom is a loose-knit computer
|
|
hacker group which had several members convicted for intrusions into
|
|
corporate telephone switches in 1990 and 1991," wrote Gelber and Christy.
|
|
|
|
AFOSI then got permission to begin monitoring -- the equivalent of
|
|
wiretapping -- all communications on the Air Force network. Limited
|
|
observation of other Internet providers being used during the break-in
|
|
was conducted from the Rome facilities. Monitoring told the investigators
|
|
the handles of hackers involved in the Rome break-in were Datastream
|
|
Cowboy and Kuji.
|
|
|
|
Since the monitoring was of limited value in determining the whereabouts
|
|
of Datastream Cowboy and Kuji, AFOSI resorted to "their human intelligence
|
|
network of informants, i.e., stool pigeons, that 'surf the Internet.'
|
|
Gossip from one AFOSI 'Net stoolie uncovered that Datastream Cowboy was from
|
|
Britain. The anonymous source said he had e-mail correspondence with
|
|
Datastream Cowboy in which the hacker said he was a 16-year old living in
|
|
England who enjoyed penetrating ".MIL" systems. Datastream Cowboy also
|
|
apparently ran a bulletin board system and gave the telephone number to the
|
|
AFOSI source.
|
|
|
|
The Air Force team contacted New Scotland Yard and the British law
|
|
enforcement agency identified the residence, the home of Richard
|
|
Pryce, which corresponded to Datastream Cowboy's system phone number.
|
|
English authorities began observing Pryce's phone calls and noticed
|
|
he was making fraudulent use of British Telecom. In addition,
|
|
whenever intrusions at the Air Force network in Rome occurred, Pryce's
|
|
number was seen to be making illegal calls out of Britain.
|
|
|
|
Pryce travelled everywhere on the Internet, going through South America,
|
|
multiple countries in Europe and Mexico, occasionally entering the Rome
|
|
network. From Air Force computers, he would enter systems at Jet
|
|
Propulsion Laboratory in Pasadena, California, and the Goddard Space
|
|
Flight Center in Greenbelt, Maryland. Since Pryce was capturing the logins
|
|
and passwords of the Air Force networks in Rome, he was then able to
|
|
get into the home systems of Rome network users, defense contractors
|
|
like Lockheed.
|
|
|
|
By mid-April of 1994 the Air Force was monitoring other systems being
|
|
used by the British hackers. On the 14th of the month, Kuji logged on
|
|
to the Goddard Space Center from a system in Latvia and copied data
|
|
from it to the Baltic country. According to Gelber's report, the
|
|
AFOSI investigators assumed the worst, that it was a sign that someone
|
|
in an eastern European country was making a grab for sensitive
|
|
information. They broke the connection but not before Kuji had
|
|
copied files off the Goddard system. As it turned out, the Latvian
|
|
computer was just another system the British hackers were using as
|
|
a stepping stone; Pryce had also used it to cover his tracks when
|
|
penetrating networks at Wright-Patterson Air Force Base in Ohio, via
|
|
an intermediate system in Seattle, cyberspace.com.
|
|
|
|
The next day, Kuji was again observed trying to probe various
|
|
systems at NATO in Brussels and The Hague as well as Wright-Patterson.
|
|
On the 19th, Pryce successfully returned to NATO systems in The
|
|
Hague through Mindvox. The point Gelber and Christy seem to be trying
|
|
to make is that Kuji, a 21-year old, was coaching Pryce during some
|
|
of his attacks on various systems.
|
|
|
|
By this point, New Scotland Yard had a search warrant for Pryce
|
|
with the plan being to swoop down on him the next time he accessed
|
|
the Air Force network in Rome.
|
|
|
|
In April, Pryce penetrated a system on the Korean peninsula and copied
|
|
material off a facility called the Korean Atomic Research Institute
|
|
to an Air Force computer in Rome. At the time, the investigators had
|
|
no idea whether the system was in North or South Korea. The impression
|
|
created is one of hysteria and confusion at Rome. There was fear that the
|
|
system, if in North Korea, would trigger an international incident, with
|
|
the hack interpreted as an "aggressive act of war." The system turned
|
|
out to be in South Korea.
|
|
|
|
During the Korean break-in, New Scotland Yard could have intervened and
|
|
arrested Pryce. However, for unknown reasons, the agency did not. Those
|
|
with good memories may recall mainstream news reports concerning Pryce's
|
|
hack, which was cast as an entry into sensitive North Korean networks.
|
|
|
|
It's worth noting that while the story was portrayed as the work of
|
|
an anonymous hacker, both the U.S. government and New Scotland Yard knew
|
|
who the perpetrator was. Further, according to Gelber's report English
|
|
authorities already had a search warrant for Pryce's house.
|
|
|
|
Finally, on May 12 British authorities pounced. Pryce was arrested
|
|
and his residence searched. He crumbled, according to the Times of
|
|
London, and began to cry. Gelber and Christy write that Pryce promptly
|
|
admitted to the Air Force break-ins as well as others. Pryce
|
|
confessed he had copied a large program that used artificial intelligence
|
|
to construct theoretical Air Orders of Battle from an Air Force computer
|
|
to Mindvox and left it there because of its great size, 3-4 megabytes.
|
|
Pryce paid for his Internet service with a fraudulent credit card number.
|
|
At the time, the investigators were unable to find out the name and
|
|
whereabouts of Kuji. A lead to an Australian underground bulletin board
|
|
system failed to pan out.
|
|
|
|
On June 23 of this year, Reuters reported that Kuji -- 21-year-old Mathew
|
|
Bevan -- a computer technician, had been arrested and charged in
|
|
connection with the 1994 Air Force break-ins in Rome.
|
|
|
|
Rocker Tom Petty sang that even the losers get lucky some time. He
|
|
wasn't thinking of British computer hackers but no better words could be
|
|
used to describe the two Englishmen and a two year old chain of events that
|
|
led to fame as international computer terrorists in front of Congress
|
|
at the beginning of the summer of 1996.
|
|
|
|
Lacking much evidence for the case of conspiratorial computer-waged
|
|
campaigns of terror and chaos against the U.S., the makers of Congressional
|
|
reports resorted to telling the same story over and over, three
|
|
times in the space of the hearings on the subject. One envisions U.S.
|
|
Congressmen too stupid or apathetic to complain, "Hey, didn't we get that
|
|
yesterday, and the day before?" Pryce and Bevan appeared in "Security in
|
|
Cyberspace" and twice in Government Accounting Office reports AIMD-96-84
|
|
and T-AIMD96-92. Jim Christy, the co-author of "Security in Cyberspace"
|
|
and the Air Force Office of Special Investigations' source for the Pryce
|
|
case supplied the same tale for Jack Brock, author of the GAO reports.
|
|
Brock writes, ". . . Air Force officials told us that at least one of
|
|
the hackers may have been working for a foreign country interested in
|
|
obtaining military research data or areas in which the Air Force was
|
|
conducting advanced research." It was, apparently, more wishful
|
|
thinking.
|
|
|
|
|
|
Notes:
|
|
|
|
The FAS Web site also features an easy to use search engine which can
|
|
be used to pull up the Congressional testimony on hackers and
|
|
network intrusion. These example key words are effective: "Jim
|
|
Christy," "Datastream Cowboy".
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: Hackers Find Cheap Scotland Yard Phone Connection
|
|
source: Reuters/Variety
|
|
|
|
Monday August 5 12:01 AM EDT
|
|
|
|
LONDON (Reuter) - Computer hackers broke into a security system at
|
|
Scotland Yard, London's metropolitan police headquarters, to make
|
|
international calls at police expense, police said Sunday.
|
|
|
|
A police spokesman would not confirm a report in the Times newspaper
|
|
that the calls totaled one million pounds ($1.5 million). He said
|
|
the main computer network remained secure.
|
|
|
|
"There is no question of any police information being accessed," the
|
|
spokesman said. "This was an incident which was investigated by our
|
|
fraud squad and by AT&T investigators in the U.S."
|
|
|
|
AT&T Corp investigators were involved because most of the calls were
|
|
to the United States, the Times said.
|
|
|
|
According to The Times, the hackers made use of a system called PBX
|
|
call forwarding that lets employees to make business calls from home
|
|
at their employer's expense.
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: U.S. Official Warns OF "Electronic Pearl Harbor"
|
|
source: BNA Daily Report - 17 Jul 96
|
|
|
|
Deputy U.S. Attorney General Jamie Gorelick told a Senate
|
|
subcommittee last week that the possibility of "an electronic Pearl
|
|
Harbor" is a very real danger for the U.S. She noted in her
|
|
testimony that the U.S. information infrastructure is a hybrid
|
|
public/private network, and warned that electronic attacks "can
|
|
disable or disrupt the provision of services just as readily as --
|
|
if not more than -- a well-placed bomb." On July 15 the Clinton
|
|
Administration called for a President's Commission on Critical
|
|
Infrastructure Protection, with the mandate to identify the nature
|
|
of threats to U.S. infrastructure, both electronic and physical, and
|
|
to work with the private sector in devising a strategy for
|
|
protecting this infrastructure. At an earlier hearing, subcommittee
|
|
members were told that about 250,000 intrusions into Defense
|
|
Department computer systems are attempted each year, with about a
|
|
65% success rate.
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: Suit Challenges State's Restraint of the Internet Via AP
|
|
author: Jared Sandberg
|
|
source: The Wall Street Journal
|
|
|
|
Can the state of Georgia hold sway over the global Internet?
|
|
|
|
A federal lawsuit filed against the state Tuesday by the American
|
|
Civil Liberties Union should eventually answer that question. The
|
|
suit, filed in federal district court in Georgia, challenges a new
|
|
Georgia law that makes it illegal in some instances to communicate
|
|
anonymously on the Internet and to use trademarks and logos without
|
|
permission.
|
|
|
|
The ACLU, joined by 13 plaintiffs including an array of public-
|
|
interest groups, contends that the Georgia law is "unconstitutionally
|
|
vague" and that its restraints on using corporate logos and trade
|
|
names are "impermissibly chilling constitutionally protected
|
|
expression." The plaintiffs also argue that the Georgia law, which
|
|
imposes a penalty of up to 12 months in jail and $1,000 in fines,
|
|
illegally tries to impose state restrictions on interstate commerce, a
|
|
right reserved for Congress.
|
|
|
|
The legal challenge is one of the first major assaults on state laws
|
|
that seek to rein in the Internet, despite its global reach and
|
|
audience. Since the beginning of 1995, 11 state legislatures have
|
|
passed Internet statutes and nine others have considered taking
|
|
action.
|
|
|
|
Connecticut passed a law last year that makes it a crime to send an
|
|
electronic-mail message "with intent to harass, annoy or alarm another
|
|
person" -- despite the Internet's hallowed tradition of "flaming"
|
|
users with messages designed to do just that. Virginia enacted a bill
|
|
this year making it illegal for a state employee -- including
|
|
professors who supposedly have academic freedom on state campuses --
|
|
to use state-owned computers to get access to sexually explicit
|
|
material. New York state has tried to resurrect prohibitions on
|
|
"indecent material" that were struck down as unconstitutional by a
|
|
federal appeals panel ruling on the federal Communications Decency Act
|
|
three months ago.
|
|
|
|
Most Internet laws target child pornographers and stalkers. Opponents
|
|
argue the well-intended efforts could nonetheless chill free speech
|
|
and the development of electronic commerce. They maintain that the
|
|
Internet, which reaches into more than 150 countries, shouldn't be
|
|
governed by state laws that could result in hundreds of different, and
|
|
often conflicting, regulations.
|
|
|
|
"We've got to nip this in the bud and have a court declare that states
|
|
can't regulate the Internet because it would damage interstate
|
|
commerce," says Ann Beeson, staff attorney for the ACLU. "Even though
|
|
it's a Georgia statute, it unconstitutionally restricts the ability of
|
|
anybody on the Internet to use a pseudonym or to link to a Web page
|
|
that contains a trade name or logo. It is unconstitutional on its
|
|
face."
|
|
|
|
Esther Dyson, president of high-tech publisher EDventure Holdings
|
|
Inc. and chairwoman of the Electronic Frontier Foundation, a high-tech
|
|
civil liberties organization that is a co-plaintiff in the lawsuit,
|
|
calls the Georgia law "brain-damaged and unenforceable" and adds: "How
|
|
are they going to stop people from using fake names? Anonymity
|
|
shouldn't be a crime. Committing crimes should be a crime."
|
|
|
|
But Don Parsons, the Republican state representative who sponsored the
|
|
Georgia bill, countered that the law is a necessary weapon to combat
|
|
fraud, forgery and other on-line misdeeds. The groups that oppose it,
|
|
he says, "want to present (the Internet) as something magical, as
|
|
something above and beyond political boundaries." It is none of these
|
|
things, he adds.
|
|
|
|
Nor does the Georgia law seek to ban all anonymity, Mr. Parsons says;
|
|
instead, it targets people who "fraudulently misrepresent their (Web)
|
|
site as that of another organization." Misrepresenting on-line medical
|
|
information, for example, could cause serious harm to an unsuspecting
|
|
user, he says.
|
|
|
|
But Mr. Parsons's critics, including a rival state lawmaker,
|
|
Rep. Mitchell Kaye, say political reprisal lies behind the new
|
|
law. They say Mr. Parsons and his political allies were upset by the
|
|
Web site run by Mr. Kaye, which displayed the state seal on its
|
|
opening page and provided voting records and sometimes harsh political
|
|
commentary. Mr. Kaye asserts that his Web site prompted the new law's
|
|
attack on logos and trademarks that are used without explicit
|
|
permission.
|
|
|
|
"We've chosen to regulate free speech in the same manner that
|
|
communist China, North Korea, Cuba and Singapore have," Mr. Kaye
|
|
says. "Legislators' lack of understanding has turned to fear. It has
|
|
given Georgia a black eye and sent a message to the world -- that we
|
|
don't understand and are inhospitable to technology."
|
|
|
|
Mr. Parsons denies that the political Web site was the primary reason
|
|
for his sponsorship of the new statute.
|
|
|
|
The very local dispute underscores the difficulty of trying to
|
|
legislate behavior on the Internet. "It creates chaos because I don't
|
|
know what rules are going to apply to me," says Lewis Clayton, a
|
|
partner at New York law firm Paul, Weiss, Rifkind, Wharton &
|
|
Garrison. "Whose laws are going to govern commercial transactions? You
|
|
don't want to have every different state with the ability to regulate
|
|
what is national or international commerce."
|
|
|
|
In the case of the Georgia statute, while its backers say it isn't a
|
|
blanket ban of anonymity, opponents fear differing interpretations of
|
|
the law could lead to the prosecution of AIDS patients and childabuse
|
|
survivors who use anonymity to ensure privacy when they convene on the
|
|
Internet.
|
|
|
|
"Being able to access these resources anonymously really is crucial,"
|
|
says Jeffery Graham, executive director of the AIDS Survival Project,
|
|
an Atlanta service that joined the ACLU in the lawsuit. His group's
|
|
members "live in small communities," he says, and if their identities
|
|
were known, "they would definitely suffer from stigmas and reprisals."
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: U.S. Government Plans Computer Emergency Response Team
|
|
source: Chronicle of Higher Education - 5 Jul 96
|
|
|
|
The federal government is planning a centralized emergency response team to
|
|
respond to attacks on the U.S. information infrastructure. The Computer
|
|
Emergency Response Team at Carnegie Mellon University, which is financed
|
|
through the Defense Department, will play a major role in developing the new
|
|
interagency group, which will handle security concerns related to the
|
|
Internet, the telephone system, electronic banking systems, and the
|
|
computerized systems that operate the country's oil pipelines and electrical
|
|
power grids.
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: Hackers $50K challenge to break Net security system
|
|
source: Online Business Today
|
|
|
|
World Star Holdings in Winnipeg, Canada is looking for
|
|
trouble. If they find it, they're willing to pay $50,000 to the
|
|
first person who can break their security system. The
|
|
company has issued an open invitation to take the "World
|
|
Star Cybertest '96: The Ultimate Internet Security Challenge,"
|
|
in order to demonstrate the Company's Internet security
|
|
system.
|
|
|
|
Personal email challenges have been sent to high profile
|
|
names such as Bill Gates, Ken Rowe at the National Center
|
|
for Super Computing, Dr. Paul Penfield, Department of
|
|
Computer Science at the M.I.T. School of Engineering and
|
|
researchers Drew Dean and Dean Wallach of Princeton
|
|
University.
|
|
|
|
[* Challenging Bill Gates to hack a security system is like
|
|
challenging Voyager to a knitting contest. *]
|
|
|
|
OBT's paid subscription newsletter Online Business
|
|
Consultant has recently quoted the Princeton team in several
|
|
Java security reports including "Deadly Black Widow On The
|
|
Web: Her Name is JAVA," "Java Black Widows---Sun
|
|
Declares War," Be Afraid. Be Very Afraid" and "The
|
|
Business Assassin." To read these reports go to Home Page
|
|
Press http://www.hpp.com and scroll down the front page.
|
|
|
|
Brian Greenberg, President of World Star said, "I personally
|
|
signed, sealed and emailed the invitations and am very
|
|
anxious to see some of the individuals respond to the
|
|
challenge. I am confident that our system is, at this time, the
|
|
most secure in cyberspace."
|
|
|
|
World Star Holdings, Ltd., is a provider of interactive
|
|
"transactable" Internet services and Internet security
|
|
technology which Greenberg claims has been proven
|
|
impenetrable. The Company launched its online contest
|
|
offering more than $50,000 in cash and prizes to the first
|
|
person able to break its security system.
|
|
|
|
According to the test's scenario hackers are enticed into a
|
|
virtual bank interior in search of a vault. The challenge is to
|
|
unlock it and find a list of prizes with inventory numbers and
|
|
a hidden "cyberkey" number. OBT staff used Home Page
|
|
Press's Go.Fetch (beta) personal agent software to retrieve the
|
|
World Star site and was returned only five pages.
|
|
|
|
If you're successful, call World Star at 204-943-2256. Get to
|
|
it hackers. Bust into World Star at http://205.200.247.10 to
|
|
get the cash!
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: Criminal cult begins PGP crack attempt
|
|
from: grady@netcom.com (Grady Ward)
|
|
|
|
The Special Master has informed me that Madame Kobrin has asked
|
|
her to retain a PC expert to attempt to "crack" a series of
|
|
pgp-encrypted multi-megabyte files that were seized along with
|
|
more than a compressed gigabyte of other material from my safety
|
|
deposit box.
|
|
|
|
Ironically, they phoned to ask for assistance in supplying them
|
|
with a prototype "crack" program that they could use in iterating
|
|
and permuting possibilities. I did supply them a good core
|
|
pgpcrack source that can search several tens of thousands of
|
|
possible key phrases a seconds; I also suggested that they should
|
|
at least be using a P6-200 workstation or better to make the
|
|
search more efficient.
|
|
|
|
The undercurrent is that this fresh hysterical attempt to "get"
|
|
something on me coupled with the daily settlement pleas reflects
|
|
the hopelessness of the litigation position of the criminal cult.
|
|
|
|
It looks like the criminal cult has cast the die to ensure that
|
|
the RTC vs Ward case is fought out to the bitter end. Which I
|
|
modestly predict will be a devastating, humiliating defeat for
|
|
them from a pauper pro per.
|
|
|
|
I have given them a final settlement offer that they can leave or
|
|
take. Actually they have a window of opportunity now to drop the
|
|
suit since my counterclaims have been dismissed (although Judge
|
|
Whyte invited me to re-file a new counterclaim motion on more
|
|
legally sufficiant basis).
|
|
|
|
I think Keith and I have found a successful counter-strategy to
|
|
the cult's system of litigation harassment.
|
|
|
|
Meanwhile, I could use some help from veteran a.r.s'ers. I need
|
|
any copy you have of the Cease and Desist letter that you may
|
|
have received last year from Eliot Abelson quondam criminal cult
|
|
attorney and Eugene Martin Ingram spokespiece.
|
|
|
|
|
|
Physical mail:
|
|
|
|
Grady Ward
|
|
3449 Martha Ct.
|
|
Arcata, CA 95521-4884
|
|
|
|
JP's BMPs or fax-images to:
|
|
|
|
grady@northcoast.com
|
|
|
|
Thanks.
|
|
|
|
Grady Ward
|
|
|
|
Ps. I really do need all of your help and good wishes after all.
|
|
Thanks for all of you keeping the net a safe place to insult
|
|
kook kults.
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: Hackers Bombard Internet
|
|
author: Dinah Zeiger
|
|
source: Denver Post
|
|
|
|
9/21/96
|
|
|
|
Computer hackers have figured out a new way to tie the Internet
|
|
in knots - flooding network computers with messages so other users can't
|
|
access them.
|
|
Late Thursday, the federally funded Computer Emergency Response
|
|
Team at Carnegie-Mellon University in Pittsburgh issued an advisory to
|
|
Internet service providers, universities and governments detailing the
|
|
nature of the attacks, which have spread to about 15 Internet services
|
|
over the past six weeks. Three were reported this week.
|
|
Thus far, none of the Colorado-based Internet providers contacted
|
|
has been victimized, but all are on alert and preparing defenses.
|
|
The worst of it is that there is no rock-solid defense, because
|
|
the attacks are launched using the same rules - or protocols- that allow
|
|
Internet computers to establish a connection.
|
|
The best the Computer Emergency Response Team can do so far is to
|
|
suggest modifications that can reduce the likelihood that a site will be
|
|
targeted.
|
|
In essence, hackers bombard their victim sites with hundreds of
|
|
messages from randomly generated, fictitious addresses. The targeted
|
|
computers overload when they try to establish a connection with the false
|
|
sites. It doesn't damage the network, it just paralyzes it.
|
|
The Computer Emergency Response Team traces the attacks to two
|
|
underground magazines, 2600 and Phrack, which recently published the code
|
|
required to mount the assaults.
|
|
|
|
[* Uh, wait.. above it said messages.. which sounds more like usenet,
|
|
not SYN Floods.. *]
|
|
|
|
"It's just mischief," said Ted Pinkowitz, president of Denver
|
|
based e-central. "They're just doing it to prove that it can be done."
|
|
One local Internet service provider, who declined to be identified
|
|
because he fears being targeted, said it goes beyond pranks.
|
|
"It's malicious," he said. "They're attacking the protocols that
|
|
are the most basic glue of the Internet and it will take some subtle work
|
|
to fix it. You can't just redesign the thing, because it's basic to the
|
|
operation of the entire network."
|
|
The response team says tracking the source of an attack is
|
|
difficult, but not impossible.
|
|
"We have received reports of attack origins being identified,"
|
|
the advisory says.
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: Crypto Mission Creep
|
|
author: Brock N. Meeks
|
|
|
|
The Justice Department has, for the first time, publicly acknowledged
|
|
using the code-breaking technologies of the National Security Agency, to
|
|
help with domestic cases, a situation that strains legal boundaries of
|
|
the agency.
|
|
|
|
Deputy Attorney General Jamie Gorelick admitted in July, during an open
|
|
hearing of the Senate's Governmental Affairs permanent subcommittee on
|
|
investigations, that the Justice Department: "Where, for example, we
|
|
are having trouble decrypting information in a computer, and the
|
|
expertise lies at the NSA, we have asked for technical assistance under
|
|
our control."
|
|
|
|
That revelation should have been a bombshell. But like an Olympic
|
|
diver, the revelation made hardly a ripple.
|
|
|
|
By law the NSA is allowed to spy on foreign communications without
|
|
warrant or congressional oversight. Indeed, it is one of the most
|
|
secretive agencies of the U.S. government, whose existence wasn't even
|
|
publicly acknowledged until the mid-1960s. However, it is forbidden to
|
|
get involved in domestic affairs.
|
|
|
|
During the hearing Sen. Sam Nunn (D-Ga.) asked Gorelick if the President
|
|
had the "the constitutional authority to override statutes where the
|
|
basic security of the country is at stake?" He then laid out a
|
|
scenario: "Let's say a whole part of the country is, in effect,
|
|
freezing to death in the middle of the winter [because a power grid has
|
|
been destroyed] and you believe it's domestic source, but you can't
|
|
trace it, because the FBI doesn't have the capability. What do you do?"
|
|
|
|
Gorelick replied that: "Well, one thing you could do -- let me say
|
|
this, one thing you could do is you could detail resources from the
|
|
intelligence community to the law enforcement community. That is, if
|
|
it's under -- if it's -- if you're talking about a technological
|
|
capability, we have done that." And then she mentioned that the NSA
|
|
had been called on to help crack some encrypted data.
|
|
|
|
But no one caught the significance of Gorelick's' statements. Instead,
|
|
the press focused on another proposal she outlined, the creation of what
|
|
amounts to a "Manhattan Project" to help thwart the threat of
|
|
information warfare. "What we need, then, is the equivalent of the
|
|
'Manhattan Project' for infrastructure protection, a cooperative venture
|
|
between the government and private sector to put our best minds together
|
|
to come up with workable solutions to one of our most difficult
|
|
challenges,'' Gorelick told Congress. Just a day earlier, President
|
|
Clinton had signed an executive order creating a blue-ribbon panel, made
|
|
up of several agencies, including the Justice Department, the CIA, the
|
|
Pentagon and the NSA and representatives of the private sector.
|
|
|
|
Though the press missed the news that day; the intelligence agency
|
|
shivered. When I began investigating Gorelick's statement, all I got
|
|
were muffled grumbling. I called an NSA official at home for comments.
|
|
"Oh shit," he said, and then silence. "Can you elaborate a bit on that
|
|
statement?" I asked, trying to stifle a chuckle. "I think my comment
|
|
says it all," he said and abruptly hung up the phone.
|
|
|
|
Plumbing several sources within the FBI drew little more insight. One
|
|
source did acknowledge that the Bureau had used the NSA to crack some
|
|
encrypted data "in a handful of instances," but he declined to
|
|
elaborate.
|
|
|
|
Was the Justice Department acting illegally by pulling the NSA into
|
|
domestic work? Gorelick was asked by Sen. Nunn if the FBI had the
|
|
legal authority to call on the NSA to do code-breaking work. "We have
|
|
authority right now to ask for assistance where we think that there
|
|
might be a threat to the national security," she replied. But her
|
|
answer was "soft." She continued: "If we know for certain that there
|
|
is a -- that this is a non-national security criminal threat, the
|
|
authority is much more questionable." Questionable, yes, but averted?
|
|
No.
|
|
|
|
If Gorelick's answers seem coy, maybe it's because her public statements
|
|
are at odds with one another. A month or so before her congressional
|
|
bombshell, she revealed the plans for the information age"Manhattan
|
|
Project" in a speech. In a story for Upside magazine, by
|
|
old-line investigative reporter Lew Koch, where he broke the story,
|
|
Gorelick whines in her speech about law enforcement going through "all
|
|
that effort" to obtain warrants to search for evidence only to find a
|
|
child pornography had computer files "encrypted with DES" that don't
|
|
have a key held in escrow. "Dead end for us," Gorelick says. "Is this
|
|
really the type of constraint we want? Unfortunately, this is not an
|
|
imaginary scenario. The problem is real."
|
|
|
|
All the while, Gorelick knew, as she would later admit to Congress, that
|
|
the FBI had, in fact, called the NSA to help break codes.
|
|
|
|
An intelligence industry insider said the NSA involvement is legal.
|
|
"What makes it legal probably is that when [the NSA] does that work
|
|
they're really subject to all the constraints that law enforcement is
|
|
subject to." This source went on to explain that if the FBI used any
|
|
evidence obtained from the NSA's code-breaking work to make it's case in
|
|
court, the defense attorney could, under oath, ask the NSA to "explain
|
|
fully" how it managed to crack the codes. "If I were advising NSA today
|
|
I would say, there is a substantial risk that [a defense attorney] is
|
|
going to make [the NSA] describe their methods," he said. "Which means
|
|
it's very difficult for the NSA to do its best stuff in criminal cases
|
|
because of that risk."
|
|
|
|
Some 20 years ago, Sen. Frank Church, then chairman of the Senate
|
|
Intelligence Committee, warned of getting the NSA involved in domestic
|
|
affairs, after investigating the agency for illegal acts. He said the
|
|
"potential to violate the privacy of Americans is unmatched by any other
|
|
intelligence agency." If the resources of the NSA were ever used
|
|
domestically, "no American would have any privacy left . . . There would
|
|
be no place to hide," he said. "We must see to it that this agency and
|
|
all agencies that possess this technology operate within the law and
|
|
under proper supervision, so that we never cross over that abyss. That
|
|
is an abyss from which there is no return," he said.
|
|
|
|
And yet, the Clinton Administration has already laid the groundwork for
|
|
such "mission creep" to take place, with the forming of this "Manhattan
|
|
Project."
|
|
|
|
But if the Justice Department can tap the NSA at will -- a position of
|
|
questionable legality that hasn't been fully aired in public debate --
|
|
why play such hardball on the key escrow encryption issue?
|
|
|
|
Simple answer: Key escrow is an easier route. As my intelligence
|
|
community source pointed out, bringing the NSA into the mix causes
|
|
problems when a case goes to court. Better to have them work in the
|
|
background, unseen and without oversight, the Administration feels. With
|
|
key escrow in place, there are few legal issues to hurdle.
|
|
|
|
In the meantime, the Justice Department has started the NSA down the
|
|
road to crypto mission creep. It could be a road of no return.
|
|
|
|
Meeks out...
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: Hacker posts nudes on court's Web pages
|
|
author: Rob Chepak
|
|
source: The Tampa Tribune
|
|
|
|
|
|
TALLAHASSEE - The Internet home of the Florida Supreme Court isn't
|
|
the kind of place you'd expect to find nudity.
|
|
But that's what happened Wednesday morning when a judge in
|
|
Tallahassee found a pornographic photo while he was looking for the latest
|
|
legal news.
|
|
A computer hacker broke into the high court's cyberhome, placing at
|
|
least three pornographic photos and a stream of obscenities on its Web pages.
|
|
``All I looked at was the one picture, then I checked with the
|
|
court,'' said a surprised Charles Kahn Jr., a 1st District Court of Appeal
|
|
judge.
|
|
The altered pages were immediately turned off. The Florida Department
|
|
of Law Enforcement is investigating the incident and the U.S. Justice
|
|
Department has been contacted. The hacker didn't tamper with any official
|
|
records, court officials said.
|
|
``We've got three photos and we're looking for more,'' said Craig
|
|
Waters, executive assistant to Chief Justice Gerald Kogan. The culprit
|
|
``could be anyone from someone in the building to the other side of
|
|
the world.''
|
|
|
|
[* I bet they are looking for more.. *]
|
|
|
|
The Florida Court's Web site is used to post information about court
|
|
opinions, state law and legal aid. Thousands of people, including children,
|
|
use the court system's more than 500 Internet pages each month, Waters said.
|
|
The court and other state agencies usually keep their most vital
|
|
information on separate computers that can't be accessed on the Internet.
|
|
Officials aren't sure how the culprit broke in, and FDLE had no
|
|
suspects Thursday afternoon. But court officials long have suspected their
|
|
Web site could be a target for hackers armed with the computer equipment to
|
|
impose photos on the Web. The Florida Supreme Court became the first state
|
|
Supreme Court in the nation to create its own Internet pages two years ago.
|
|
While the episode sounds like a well-crafted high school prank,
|
|
computer hackers are becoming a big problem for government agencies, which
|
|
increasingly are finding themselves the victims of criminal tampering on
|
|
the Internet. In August, someone placed swastikas and topless pictures of
|
|
a TV star on the U.S.
|
|
Department of Justice's home page. The Central Intelligence Agency
|
|
has been victimized, too.
|
|
``It's certainly a common problem,'' said P.J. Ponder, a lawyer for
|
|
the Information Resource Commission, which coordinates the state
|
|
government's computer networks. However, there are no statistics on
|
|
incidences of tampering with state computers.
|
|
The best way for anyone to minimize damage by computer hackers is by
|
|
leaving vital information off the Internet, said Douglas Smith, a consultant
|
|
for the resource commission. Most state agencies follow that advice, he added.
|
|
``I think you have to weigh the value of security vs. the value of
|
|
the information you keep there,'' he said.
|
|
Court officials would not reveal details of the sexually explicit
|
|
photos Thursday, but Liz Hirst, an FDLE spokeswoman, said none were of
|
|
children.
|
|
Penalties for computer tampering include a $5,000 fine and five
|
|
years in jail, but the punishment is much higher if it involves child
|
|
pornography, she said.
|
|
Without a clear motive or obvious physical evidence, FDLE
|
|
investigators, who also investigate child pornography on the Internet,
|
|
hope to retrace the culprit's steps in cyberspace. However, Ponder said
|
|
cases of Internet tampering are ``very difficult to solve.''
|
|
Thursday, the state's top legal minds, who are used to handing out
|
|
justice, seemed unaccustomed to being cast as victims.
|
|
``No damage was done,'' Kogan said in a statement. ``But this
|
|
episode did send a message that there was a flaw in our security that we
|
|
now are fixing.''
|
|
|
|
[* I tell you (and other agencies) I do security consulting!! Please?! *]
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: Hacking Into Piracy
|
|
source: The Telegraph
|
|
|
|
22nd October 1996
|
|
|
|
Computer crime investigators are using the techniques of their
|
|
adversaries to crack down on illegally traded software. Michael
|
|
McCormack reports.
|
|
|
|
The adage "Set a thief to catch a thief" is being updated for the
|
|
electronic age as online investigators use hackers' techniques to fight
|
|
a thriving trade in counterfeit and pirate software that is reckoned to
|
|
cost British program-makers more than 3 billion a year.
|
|
|
|
"Jason", a computer crime investigator employed by Novell to shut down
|
|
bulletin boards that trade pirate copies of its software, leads a
|
|
confusing double life. First he spends weeks in his office, surfing the
|
|
Internet and wheedling secrets from hackers around Europe; then he
|
|
compiles dossiers of evidence on the system operators who deal in Novell
|
|
wares, flies to their bases, presents the local police with his reports,
|
|
and accompanies them on the inevitable raid.
|
|
|
|
"Every day I'm on IRC [the Internet's chat lines, where information can
|
|
be exchanged quickly and relatively anonymously] looking for tips on new
|
|
bulletin boards that might have Novell products on them," he says.
|
|
|
|
"Our policy has been to go country by country through Europe and try to
|
|
take down the biggest boards in each one"
|
|
|
|
"It tends to be the biggest boards that have our products, and those can
|
|
be difficult to get on to. The operators have invested a lot of time and
|
|
cash in setting them up and they're sometimes quite careful who they'll
|
|
let on. I often start by joining dozens of little boards in the area to
|
|
get myself a good reputation, which I can use as a reference to get on
|
|
to the big board.
|
|
|
|
"Our policy has been to go country by country through Europe and try to
|
|
take down the biggest boards in each one. That has a chilling effect on
|
|
the other operators. They think, 'If he could get caught, I'm doomed.'
|
|
Within days of us taking down a big board, Novell products disappear off
|
|
the smaller ones."
|
|
|
|
Once Jason gains entry to a big board, the game begins in earnest:
|
|
"Bulletin boards work on the principle that if you want to take
|
|
something off, you first have to put something in. Obviously I can't put
|
|
in Novell's products, or any other company's; instead, we use a program
|
|
we wrote ourselves. It's huge, and it has an impressive front end full
|
|
of colour screen indicators and menus. It doesn't actually do anything
|
|
but it looks impressive and it lets you start pulling things off the
|
|
site."
|
|
|
|
Once Jason finds company products on a board, he makes a video of
|
|
himself logging on and retrieving a copy of the software.
|
|
|
|
[* Talk about freako bizarre narc fetishes.. *]
|
|
|
|
Bulletin boards often have restricted areas closed to all but a few
|
|
trusted members, and these are where the most illegal products - such as
|
|
expensive business or word-processing packages copied from beta releases
|
|
or pirate disks - are kept. Penetrating these areas takes a skill
|
|
learned from the hackers. "It's called social engineering," says Jason.
|
|
"It just means chatting up the operator until he decides to trust you
|
|
with the goodies."
|
|
|
|
Once Jason finds company products on a board, he makes a video of
|
|
himself logging on and retrieving a copy of the software. Then it's on
|
|
to a plane to go and lodge a complaint with the local police.
|
|
|
|
He is helped by Simon Swale, a fellow Novell investigator and former
|
|
Metropolitan Police detective who uses his experience of international
|
|
police procedures and culture to ensure that foreign forces get all the
|
|
technical help they need.
|
|
|
|
In the past six months, Jason's investigations have shut down seven
|
|
bulletin boards across Europe, recovering software valued at more than
|
|
500,000. The company reckons the closed boards would have cost it more
|
|
than 2.5 million in lost sales over the next year.
|
|
|
|
Jason has vivid memories of the early-morning raid on the operator's
|
|
house.
|
|
|
|
One of the Jason's biggest successes came earlier this year in Antwerp,
|
|
when he guided Belgian police to the Genesis bulletin board, which held
|
|
more than 45,000 worth of Novell products and a slew of other pirate
|
|
software. Jason has vivid memories of the early-morning raid on the
|
|
operator's house: "The first thing he said was, 'I have nothing illegal
|
|
on my system.' So I set up my laptop and mobile and dialled into it from
|
|
his kitchen. All the police watched as I tapped into my keyboard and
|
|
everything popped up on his screen across the room. I went straight
|
|
in to the Novell stuff and he said, 'Okay, maybe I have a little'."
|
|
|
|
The system operator, Jean-Louis Piret, reached a six-figure out-of-court
|
|
settlement with Novell. More importantly for the company, its products
|
|
have all but disappeared from Belgium's boards in the wake of the raid.
|
|
|
|
There are, however, many more fish to fry. Jason already has another
|
|
three raids lined up for autumn . . .
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: Revealing Intel's Secrets
|
|
|
|
The Intel's Secrets site may not be around for long if Intel has anything
|
|
to say about it. The site provides a look at details, flaws, and programming
|
|
tips that the giant chip manufacturer would rather not share with the general
|
|
public. One particular page exposes some unflattering clitches of the P6
|
|
chip and a bug in the Intel486 chip. The site even has two separate hit
|
|
counters: one for the average visitor, and one that counts the number of
|
|
times Intel has stopped by.
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: Internet Boom Puts Home PCs At Risk Of Hackers
|
|
author: Nick Nuttall
|
|
source: The London Times
|
|
|
|
18th October 1996
|
|
|
|
Home computers, which carry everything from private banking details to
|
|
love letters, are becoming vulnerable to hackers as more households
|
|
connect to the Internet.
|
|
|
|
The boom in electronic services is making the home PC as open to attack
|
|
as company and government systems, a survey of hackers has disclosed.
|
|
The Internet is also helping hackers to become more skilful as they
|
|
exchange tips and computer programs around the globe.
|
|
|
|
[* Survey of hackers?! Bullshit. *]
|
|
|
|
A spokesman for Kinross and Render, which carried out the survey for
|
|
Computacenter, said: "Breaking into home computers is now increasingly
|
|
possible and of great interest to hackers. It may be a famous person's
|
|
computer, like Tony Blair's or a sports personality. Equally it could be
|
|
yours or my computer carrying personal details which they could use for
|
|
blackmailing."
|
|
|
|
Passwords remain easy to break despite warnings about intrusion.
|
|
Companies and individuals frequently use simple name passwords such as
|
|
Hill for Damon Hill or Blair for the Labour leader. Hackers also said
|
|
that many users had failed to replace the manufacturer's password with
|
|
their own.
|
|
|
|
Hackers often use programs, downloaded from the Internet, which will
|
|
automatically generate thousands of likely passwords. These are called
|
|
Crackers and have names such as Satan or Death.
|
|
|
|
[* Satan? Death? Ahhhh! *]
|
|
|
|
John Perkins, of the National Computing Centre in Manchester, said
|
|
yesterday: "The linking of company and now home computers to the
|
|
global networks is making an expanding market for the hackers." The
|
|
Computacenter survey was based on interviews with more than 130
|
|
hackers, supplemented by interviews over the Internet. The average
|
|
hacker is 23, male and a university student. At least one of those
|
|
questioned began hacking ten years ago, when he was eight.
|
|
|
|
[* No offense to anyone out there, but how in the hell could they
|
|
validate any claims in a survey like that? And especially with
|
|
that amount? *]
|
|
|
|
Most said it was getting easier, rather than harder, to break in and
|
|
many hackers would relish tighter computer security because this would
|
|
increase the challenge. Existing laws are held in contempt and almost 80
|
|
per cent said tougher laws and more prosecutions would not be a
|
|
deterrent. Eighty-five per cent of those questioned had never been
|
|
caught.
|
|
|
|
Most said the attraction of hacking lay in the challenge, but a hard
|
|
core were keen to sabotage computer files and cause chaos, while others
|
|
hoped to commit fraud.
|
|
|
|
[* Excuse me while I vomit. *]
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: Computer hacker Mitnick pleads innocent
|
|
|
|
September 30, 1996
|
|
|
|
LOS ANGELES (AP) -- The notorious computer hacker Kevin Mitnick pleaded
|
|
innocent Monday to charges he mounted a multimillion-dollar crime wave
|
|
in cyberspace during 2 1/2 years as a fugitive.
|
|
|
|
Mitnick, 33, held without bail on a fraud conviction, told the judge
|
|
not to bother reading the indictment, which includes 25 new counts of
|
|
computer and wire fraud, possessing unlawful access devices, damaging
|
|
computers and intercepting electronic messages.
|
|
|
|
"Not guilty," Mitnick said. His indictment, handed up Friday by a
|
|
federal grand jury, follows an investigation by a national task force
|
|
of FBI, NASA and federal prosecutors with high-tech expertise.
|
|
|
|
It charges Mitnick with using stolen computer passwords, damaging
|
|
University of Southern California computers and stealing software
|
|
valued at millions of dollars from technology companies, including
|
|
Novell, Motorola, Nokia, Fujitsu and NEC.
|
|
|
|
...........
|
|
|
|
Mitnick pleaded guilty in April to a North Carolina fraud charge of
|
|
using 15 stolen phone numbers to dial into computer databases.
|
|
Prosecutors then dropped 22 other fraud charges but warned that new
|
|
charges could follow.
|
|
|
|
Mitnick also admitted violating probation for a 1988 conviction in Los
|
|
Angeles where he served a year in jail for breaking into computers at
|
|
Digital Equipment Corp. At 16, he served six months in a youth center
|
|
for stealing computer manuals from a Pacific Bell switching center.
|
|
|
|
Mitnick also got a new lawyer Monday, Donald C. Randolph, who
|
|
represented Charles Keating Jr.'s top aide, Judy J. Wischer, in the
|
|
Lincoln Savings swindle.
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: Hackers Destroy Evidence of Gulf War Chemical/Biological Weapons
|
|
source: WesNet News
|
|
|
|
Saturday, Nov. 2, 5:00 p.m.
|
|
|
|
WASHINGTON DC -- Hackers broke into a Web site (http://insigniausa.com)
|
|
containing suppressed evidence of Gulf War chemical and biological weapons
|
|
Friday, erasing all files.
|
|
|
|
"Someone hacked in Friday around 4 p.m. and completely trashed our
|
|
machine," said Kenneth Weaver, webmaster of W3 Concepts, Inc.
|
|
(http://ns.w3concepts.com) of Poolesville, Maryland (a suburb of Washington
|
|
D.C.), which houses the site.
|
|
|
|
The Web site contained recently-released supressed Department of Defense
|
|
documents exposing biological and chemical warfare materials that U.S.
|
|
companies allegedly provided to Iraq before the war.
|
|
|
|
Bruce Klett, publisher, Insignia Publishing said they are now restoring the
|
|
files. "We plan to be operational again Saturday evening or Sunday," he
|
|
said. "We encourage anyone to copy these files and distribute them." There
|
|
are over 300 files, requiring 50 MB of disk space.
|
|
|
|
The Department of Defense has its own version of these files on its
|
|
Gulflink Web site (http://www.dtic.dla.mil/gulflink/).
|
|
|
|
Insignia plans to publish Gassed In the Gulf, a book on the government's
|
|
coverup by former CIA analyst Patrick Eddington, in six to eight weeks,
|
|
Klett added.
|
|
|
|
Hackers also brought down SNETNEWS and IUFO, Internet mailing lists
|
|
covering conspiracies and UFOs, on Oct. 25, according to list administrator
|
|
Steve Wingate. He plans to move the lists to another Internet service
|
|
provider be be back in operation soon.
|
|
|
|
"We've seen this happen regularly when we get too close to sensitive
|
|
subjects," Wingate said. "The election is Tuesday. This is a factor."
|
|
|
|
He also said a "quiet" helicopter buzzed and illuminated his Marin County
|
|
house and car Thursday night for several minutes.
|
|
|
|
[=-------------------------------------------------------------------------=]
|
|
|
|
title: Criminals Slip Through The Net
|
|
source: The Telegraph, London
|
|
|
|
5th November 1996
|
|
|
|
Britain is way behind in the fight against computer crime and it's time
|
|
to take it seriously, reports Michael McCormack
|
|
|
|
|
|
BRITAIN'S police forces are lagging behind the rest of the world in
|
|
combating computer crime, according to one of the country's most
|
|
experienced computer investigators - who has just returned to walking
|
|
the beat.
|
|
|
|
Police Constable John Thackray, of the South Yorkshire Police, reached
|
|
this grim conclusion after a three-month tour of the world's leading
|
|
computer crime units, sponsored by the Winston Churchill Memorial Trust.
|
|
|
|
All of the five countries he studied, he says, are putting Britain's
|
|
efforts against electronic crime to shame.
|
|
|
|
"The level of education and understanding of computer crime is far more
|
|
advanced outside Britain," said Thackray.
|
|
|
|
"Here, police forces are shying away from even attempting to investigate
|
|
computer crimes. You see experienced detectives who lose all interest in
|
|
pursuing cases where there are computers involved.
|
|
|
|
"We know that computer crime, particularly software piracy, is closely
|
|
connected with organised crime - they like the high profits and the low
|
|
risk - but those connections aren't followed up."
|
|
|
|
He adds:"We are far behind our own criminals on these matters. We only
|
|
catch them when they get complacent and keep using old technology and
|
|
old methods. If they simply keep up with current technology, they are so
|
|
far ahead they are safe." Thackray was one of the officers responsible
|
|
for closing down one of the largest pirate bulletin boards in the
|
|
country, estimated to have stolen software worth thousands last year and
|
|
has assisted officers from other forces in several similar cases.
|
|
Pirates recently named a new offering of bootleg software "Thackray1 and
|
|
2" in his honour.
|
|
|
|
He has seen how seriously such crimes are taken by police forces abroad:
|
|
"In America there are specialist units in every state and a similar
|
|
system is being put in place in Australia. There's nothing nearly as
|
|
comprehensive in in Britain.
|
|
|
|
"We have the Computer Crimes Unit at Scotland Yard and a small forensic
|
|
team at Greater Manchester, but they're both badly under-resourced and
|
|
there's little interest in, or support for, investigating computer
|
|
crimes in other forces.
|
|
|
|
"Our officers must get a better education, to start with, on what
|
|
computer crime is, how it works and who is being hurt by it. We need to
|
|
bury the impression that this is a victimless crime with no serious
|
|
consequences."
|
|
|
|
Thackray is preparing a report on his impressions of anti-crime
|
|
initiatives in other countries and what must be done in Britain to equal
|
|
them. "In my view, we need specially detailed officers who are educated
|
|
in computer crime issues.
|
|
|
|
"We also need to become much more pro-active in our approach. It's not
|
|
good enough to sit back and wait for the complaints."
|
|
|
|
But perhaps symptomatic of Britain's efforts is the way Thackray's
|
|
valuable experience is being used. He is putting away his laptop and
|
|
getting out his boots.
|
|
|
|
"I'm now being moved back into uniform. The two year experience I have
|
|
gained in investigating these matters is not going to be used to its
|
|
full potential."
|
|
|
|
"We pride ourselves on being an effective police service in Britain, and
|
|
other countries look up to us. But when it comes to computer crime, we
|
|
have to start following their lead."
|
|
|
|
-EOF
|