mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
2291 lines
109 KiB
Text
2291 lines
109 KiB
Text
---[ Phrack Magazine Volume 8, Issue 54 Dec 25th, 1998, article 11 of 12
|
|
|
|
|
|
-------------------------[ P H R A C K W O R L D N E W S
|
|
|
|
|
|
--------[ Issue 54
|
|
|
|
|
|
Hi. A few changes have been made to Phrack World News (PWN) and will
|
|
probably change again in the future. Because of the increase of news on
|
|
the net, security, hackers and other PWN topics, it is getting more
|
|
difficult to keep Phrack readers informed of everything. To combat this
|
|
problem, PWN will include more articles, but only relevant portions (or
|
|
the parts I want to make smart ass remarks about). If you would like to
|
|
read the full article, look through the ISN (InfoSec News) archives
|
|
located at:
|
|
|
|
ftp.repsec.com /pub/text/digests/isn
|
|
|
|
If you would like timely news delivered with less smart ass remarks, you
|
|
can always subscribe to ISN by mailing majordomo@repsec.com with 'subscribe
|
|
isn' in the body of your mail.
|
|
|
|
The following articles have been accumulated from a wide variety of places.
|
|
When known, original source/author/date has been included. If the information
|
|
is absent, then it wasn't sent to us.
|
|
|
|
As usual, I am putting some of my own comments in brackets to help readers
|
|
realize a few things left out of the articles. Comments are my own, and
|
|
do not necessarily represent the views of Phrack, journalists, government
|
|
spooks, my cat, or anyone else. If you want to see more serious comments
|
|
about the piss poor journalism plagueing us today, visit the Security
|
|
Scene Errata web page: http://www.attrition.org/errata/
|
|
|
|
If you feel the need to send me love letters, please cc:
|
|
route@infonexus.com so he can see I really do have fans. If you would like
|
|
to mail my cat, don't, he hates you because you are a plebian in his eyes.
|
|
Meow.
|
|
|
|
This installment of PWN is dedicated to Feds, Hackers, and blatant stupidity.
|
|
It was brought to you by the letters that collectively spell 'dumb shit'.
|
|
|
|
- disorder
|
|
|
|
--------[ Issue 54
|
|
|
|
0x1: Teen Crackers Admit Guilt
|
|
0x2: FBI grads get gun, badge, and now, a laptop
|
|
0x3: Meet the Hacker Trackers
|
|
0x4: Justice Department to Hire Computer Hackers
|
|
0x5: A Cracker-Proofing Guarantee
|
|
0x6: First-Ever Insurance Against Hackers
|
|
0x7: New Unit to Combat High-Tech Crime (National Police Agency)
|
|
0x8: First 'Cyber Warrior' Unit is Poised for Operational Status (DOD)
|
|
0x9: Tracking Global Cybercrime (Chamber of Commerce)
|
|
0xa: FBI Opens High-Tech Crisis Center
|
|
0xb: Navy fights new hack method
|
|
0xc: Pentagon Blocks DoS Attack
|
|
0xd: Hackers Elude Accelerator Center Staff
|
|
0xe: Cyberattacks leave feds chasing 'vapor'
|
|
0xf: Congress Attacks Cyber Defense Funds
|
|
0x10: Mudge on Security Vendors
|
|
0x11: More delays for Mitnick trial
|
|
0x12: 'Back door' doesn't get very far
|
|
0x13: ICSA Goon Pretends to be a Hacker
|
|
0x14: Is Your kid a Hacker
|
|
0x15: Paging Network Hijacked
|
|
0x16: FBI busts hacker who sold clandestine accounts on PageNet system
|
|
0x17: EFF DES Cracker Machine Brings Honesty to Crypto Debate
|
|
0x18: Hacking site gets hacked
|
|
0x19: From Criminals to Web Crawlers
|
|
0x1a: Running a Microsoft OS on a Network? Our Condolences
|
|
0x1b: Security expert explains New York Times site break in
|
|
0x1c: Merriam-Webster Taken Offline Old Fashioned Way
|
|
0x1d: Long Haired Hacker Works Magic
|
|
0x1e: Body of Evidence
|
|
0x1f: The Golden Age of Hacktivism
|
|
0x20: Phrack straddles the world of hackers
|
|
0x21: Cops see little hope in controlling computer crime
|
|
|
|
0x1>-------------------------------------------------------------------------
|
|
|
|
Title: Teen Crackers Admit Guilt
|
|
Source: Wired
|
|
Date: 1:10pm 11.Jun.98.PDT
|
|
|
|
Two California teenagers have pleaded guilty to federal charges of
|
|
cracking Pentagon computers, the San Francisco Chronicle reports.
|
|
|
|
Terms of the plea are still being negotiated after a meeting last week
|
|
between attorneys for the youths and federal officials, the newspaper
|
|
said. Neither youth is expected to serve time in custody, sources close to
|
|
the case said.
|
|
|
|
In February, the FBI raided the Cloverdale homes of the two suspected
|
|
crackers -- nicknamed Makaveli, 16, and TooShort, 15 -- and seized
|
|
computers believed to have been used to break into unclassified computer
|
|
systems in government agencies, military bases, and universities.
|
|
|
|
[Sucks to be busted. Sucks worse to plead guilty to being a script
|
|
kiddie.]
|
|
|
|
The youths were never formally arrested in the FBI probe. US Deputy
|
|
Defense Secretary John Hamre called the breach "the most organized and
|
|
systematic attack" to date on Pentagon systems.
|
|
|
|
[Feds only enjoy sticking guns in the faces of these kids. Not actually
|
|
arresting them.]
|
|
|
|
0x2>-------------------------------------------------------------------------
|
|
|
|
Title: FBI grads get gun, badge, and now, a laptop
|
|
Source: TechWeb
|
|
Date: 7.22.98
|
|
|
|
When FBI special-agent trainees graduate from the bureau academy at
|
|
Quantico, Va., they are each issued a gun, a badge -- and now, a laptop
|
|
computer.
|
|
|
|
[Unfortunately, they don't always get a clue.]
|
|
|
|
Crime today often involves the use of sophisticated technology, and new
|
|
agents have to be able to shoot straight, learn the law, and be able to
|
|
use technology.
|
|
|
|
Part of the FBI's duty is to investigate computer-related crimes and
|
|
issues of national security. Because it needs these specialized skills,
|
|
the bureau is in competition with other agencies such as the Secret
|
|
Service and the Central Intelligence Agency (CIA) -- as well as the
|
|
private sector -- for recruits.
|
|
|
|
[Great low pay! Lots of travel! No respect! Come join the FBI!]
|
|
|
|
Attorney General Janet Reno, addressing a conference on children's safety
|
|
on the Internet in December, called on the technology community to help
|
|
law enforcement.
|
|
|
|
But Reno's call does not mean making a computer geek into a G-man. The
|
|
FBI recruits in the high-tech industry and in colleges and universities
|
|
for special agents with other attributes besides computer-science degrees.
|
|
|
|
"There is not a specific category [in the FBI] for someone with more
|
|
computer skills," said Special Agent Ron Van Vraken, an FBI spokesman.
|
|
"But someone with skills and experience is highly marketable. We've
|
|
recognized we need to attract those people into the FBI."
|
|
|
|
The FBI is not alone.
|
|
|
|
The CIA has a long listing of Web postings for technology-related jobs.
|
|
There are ongoing requirements for knowledge-based systems engineers,
|
|
software developers, and electronics engineers listed alongside jobs such
|
|
as theatrical-effects specialists and clandestine service trainees.
|
|
|
|
[Yet the CIA is scrambling to find jobs for all the cold-war spook
|
|
rejects...]
|
|
|
|
Although the CIA is not a law-enforcement agency like the FBI and the
|
|
Secret Service, it, too, chases "bad guys" and needs people trained in
|
|
technology, said Anya Guilsher, an agency spokeswoman. "We have a great
|
|
interest in people with advanced technology skills," she said.
|
|
|
|
The Secret Service, which investigates financially related crimes as well
|
|
as protects the president, is also looking. Its jobs listings include
|
|
openings for computer specialists and telecommunications specialists.
|
|
|
|
The ideal candidate for these agencies is not necessarily a computer wiz,
|
|
said Ron Williams, a former Secret Service agent and current CEO of
|
|
high-tech security company Talon Technology.
|
|
|
|
"The ideal candidate is well-rounded," he said, adding they should also
|
|
understand computers, have good communications skills, and know human
|
|
behavior.
|
|
|
|
"To catch a criminal, you have to think like one," Williams said. "You can
|
|
take agents, and if they have good street smarts and good computer skills,
|
|
you can make them into hacker sleuths."
|
|
|
|
[Hypothetically.. since they haven't done it yet.]
|
|
|
|
0x3>-------------------------------------------------------------------------
|
|
|
|
Title: Meet the Hacker Trackers
|
|
|
|
A gang of convicts dressed in cartoon-striped uniforms shuffle slowly
|
|
along a sidewalk, searing in the noon-day sun. This is downtown Phoenix, a
|
|
low-rise high-tech city with a decidedly old- fashioned approach to crime.
|
|
From her office on the sixth floor of the county attorney's office, the
|
|
prosecutor remains unmoved by the sight of the prisoners. "People 'round
|
|
here don't have much in the way of sympathy for criminals of any kind. And
|
|
most of those guys are real criminals, not jumped up nobodies screaming
|
|
for attention - the kind of people I deal with!"
|
|
|
|
Meet Gail Thackeray, the world's foremost legal expert on computer crime.
|
|
A former assistant attorney general of the state of Arizona, Thackeray has
|
|
been fighting hackers and fraudsters for nearly 25 years. Now she works as
|
|
a prosecutor for the Maricopa County attorney's office, a jurisdiction the
|
|
size of New England that takes in all of Phoenix. It's most famous as the
|
|
home of Sheriff Joe Arpaio, "the meanest sheriff in America". This is the
|
|
man responsible for the convicts in stripes. He has made his reputation by
|
|
toughening up prison conditions, to loud hollers of approval from
|
|
freedom-loving Arizonans.
|
|
|
|
Good citizens of Maricopa County can now walk the streets in safety, but
|
|
for the big technology companies that have moved to the "valley of the
|
|
sun", the unseen hand of hackers and computer phreaks is proving a major
|
|
distraction. Whether it's a left-over hippy feeling, the University campus
|
|
or just a reaction to the extreme heat, Phoenix is a top spot for computer
|
|
criminals. Thackeray is there to stop them.
|
|
|
|
Arizona has perhaps the United States' strongest legal code against the
|
|
activities of hackers, but sometimes Gail aches to fight fire with fire.
|
|
"We have to document every step of the way we investigate. They don't need
|
|
to have our education. They just need one other crook showing them, like
|
|
monkeys at a keyboard, how to imitate the crime. The bulletin boards were
|
|
the precursors to this, but the Net has exploded it down to the individual
|
|
level anywhere in the world. You don't need sophistication, you don't even
|
|
need very good equipment - one of the best hackers we've ever dealt with
|
|
had a Compaq luggable 286 and he was wreaking havoc around the world. Just
|
|
a list of his route on different systems attached to the Internet would
|
|
keep me in the hacker business for the rest of my life - it goes on for
|
|
pages."
|
|
|
|
Getting away with it
|
|
|
|
We move from her office to the conference room next door. Thackeray
|
|
proudly displays her new Compaq notebook. Her famous slide show is now
|
|
held on the notebook's hard disk. For more years than she'd care to
|
|
remember, Thackeray has been showing her slides to police forces and
|
|
prosecutors across the United States, advising them how to build a case
|
|
against hackers. She also trains police forces all over the country,
|
|
including secret service agents at the Georgia Federal training centre.
|
|
Even the bad guys have been known to call her to find out what the cops
|
|
have been up to.
|
|
|
|
Although she has been a hacker tracker for 25 years, Thackeray is more
|
|
depressed than ever by the escalating scale of computer crime. The Web,
|
|
she says, has made it impossible to catch the crooks. "Even if it's the
|
|
boy next door, we haven't a chance. He may be doing something rotten to
|
|
your high-tech consulting firm, he may be next door trying to steal your
|
|
stuff - but he's looping through a long-distance carrier, a corporate
|
|
phone system, three Internet providers and circling the world twice before
|
|
he hits you. That's the problem from our standpoint. Even assuming all
|
|
those parties can trace the links they're involved in, we have to go
|
|
through a different process, and probably a different law enforcement
|
|
agency, for every single one.
|
|
|
|
"In the old days out here, the Texas rangers were very famous for catching
|
|
bank robbers. They didn't stop at the Texas border when chasing a killer.
|
|
They'd jump on their horse and, even if they crossed the state line, they
|
|
would follow wherever the chase lead them. In the computer age we can't do
|
|
that at all. What we have now in the US is a mish-mash of laws and
|
|
agencies. Multiply that on the international level and it's completely out
|
|
of hand."
|
|
|
|
High-tech law enforcement
|
|
|
|
Thackeray moved to Arizona in 1986 after beginning her career as a
|
|
prosecutor in Philadelphia. She worked in the attorney general's office
|
|
running an organised crime and racketeering unit that won a national
|
|
reputation for its technical ability in the fight against hackers. She was
|
|
also the mastermind behind Operation Sundevil (see panel, overleaf), the
|
|
first nationally coordinated raid on hackers. But then democracy took a
|
|
turn and she became a victim of the strange process by which Americans
|
|
elect their most senior law officers. Her boss lost the race to be elected
|
|
attorney general. The victor wasn't interested in technology so 12 people
|
|
got sacked, including Thackeray.
|
|
|
|
Taking a break from the slide show for a moment, she shows me a little
|
|
number-generating program stored on her laptop. It generates random
|
|
numbers for Visa cards. Give it the four-digit code that identifies a card
|
|
issuer and within minutes you'll have hundreds of false credit card
|
|
numbers to play with. "Now supposing you had another little program that
|
|
made the bank think these numbers were legitimate - How much do you think
|
|
you could make?" We go on-line to see some of the hacker sites. Thackeray
|
|
believes that the Web is making a bigger range of crimes much easier to
|
|
commit. "In the future the good parts of the Internet will be bigger and
|
|
more complex and available to more people and that's great. But this means
|
|
all of those people will have victim potential. Thanks to the growth of
|
|
the Web, one criminal can now do an unprecedented amount of damage,
|
|
whether it's to corporations or to individual's feelings by threatening
|
|
and stalking, spam attacks or just shutting down ISPs.
|
|
|
|
"We have had four incidents in the first six months of this year. These
|
|
people are attacking not just the little local service provider, but also
|
|
some of the 19 Internet backbone carriers. They're absolutely ruthless and
|
|
don't care who they hurt. In a case in Tucson, tens of thousands of users
|
|
were shut down just because some person with an adolescent level of
|
|
maturity decided he was mad at another ISP, so he took all of its
|
|
customers off-line. It's frighteningly easy to do and only took one
|
|
broadcast message. All the routers that run the Internet shake hands
|
|
periodically, so if you can infect one router, given time it will infect
|
|
the entire world. And that's what happened. It took just a few days for
|
|
the entire world to believe that this service provider, and all its
|
|
customers, didn't exist." Not only is the Web host to a whole new range
|
|
of crimes, it's also home to a brand new band of weirdos. "Unfortunately
|
|
the Web is the best playground ever invented for sociopaths. They can
|
|
hide, are anonymous and can't be traced. Nobody is in charge and it gives
|
|
them that power rush that psychologists say is what they live off. It's
|
|
their whole life's breath. It's the chest-beating power surge of being
|
|
able to do it and get away with it. We are just seeing more acts of wanton
|
|
destruction simply for the sake of showing that you can do it."
|
|
|
|
Does she think this new generation of Web hackers is a real threat to
|
|
people? "Every baby in America knows the 911 emergency system. If mommy's
|
|
drowning in the pool, we've had three-year- olds save her life by dialling
|
|
911. The hackers have attacked the 911 system and they're still doing it.
|
|
That's not for knowledge or for glory, that's just an act of vicious ego."
|
|
|
|
Rat's nests and technocrap
|
|
|
|
Personal liberty is taken very seriously in the western United States.
|
|
No-one likes the idea of "big government" interfering with people's lives.
|
|
Even hackers gain sympathy when they complain of harassment by police and
|
|
prosecutors. Some say they've been victimised by the authorities.
|
|
|
|
Thackeray denies this. "It's a hacker myth that we take away their
|
|
computers and sit on them forever. In one case we came across, the guy had
|
|
over 12Gb of data stored on his system - that's equivalent to 15,000
|
|
paperback books. It's better that we seize all that material - you might
|
|
have love letters, cook book recipes and your extortion kidnapping letter
|
|
on the same disk. We can't take one without taking the other. We cannot
|
|
physically copy that volume. It is far easier for us to take computers
|
|
away than for us to camp out in your house for six months."
|
|
|
|
A hovel of a bedroom fills the projector screen. Coke cans everywhere,
|
|
rubbish dotted across an unmade bed. In the corner sits a naked computer,
|
|
stripped of casing, wires exposed. Thackeray calls it a rat's nest. She
|
|
has hundreds of similar photos. "Back in Philadelphia I began collecting
|
|
pictures of computers with their wires hanging out. When the geeks speak
|
|
to a jury we call the language they use technocrap. What you have here is
|
|
the physical version of technocrap." She gestures at the screen. Typically
|
|
hackers will set up a stereo system within easy reach of the computer, and
|
|
often a drinks cabinet as well.
|
|
|
|
A recent innovation is the home network. "We've come up against four or
|
|
five houses recently where people have had multiple systems networked in
|
|
the house. And that's even without running a bulletin board. When we get
|
|
lucky and we're fast enough we can find the guilty computer - but the
|
|
hardest part of the job is finding the brain behind the computer. To find
|
|
that person is good old- fashioned low-tech police work."
|
|
|
|
Thackeray's team face another new problem caused by the huge increase in
|
|
storage capacity. "In the computer situation no one throws anything out.
|
|
That makes our life more difficult. We don't want to read the last five
|
|
year's worth of your e-mail, life's too short and frankly it's not that
|
|
interesting. But sometimes we're searching for one piece of evidence and
|
|
it's buried in a huge volume of stuff so what else can we do?"
|
|
|
|
Tracking or trailing?
|
|
|
|
The slide show draws to an end. We amble downstairs to the office of
|
|
another investigator. He shows us an array of hacker memorabilia on his
|
|
computer. I ask Gail about the future. She believes that unless there's a
|
|
fundamental change in the way police forces treat computer crime, there is
|
|
no hope at all. "The police departments and prosecutors around the country
|
|
are, frankly, paramilitary organisations with very bureaucratic, layered
|
|
decision- making processes. They see the need for more training in gangs;
|
|
they don't see the need for more training in computers because the
|
|
management came out of the knife and gun club.
|
|
|
|
"Police management is dominated by the physical crimes people. We've got
|
|
to dissolve some of these barriers. When we move we need to move fast like
|
|
the Texas rangers - both legally and bureaucratically we're just not there
|
|
yet. When I started 20 years ago law enforcement was behind the computer
|
|
crime wave. We're farther behind today than we were then."
|
|
|
|
Matt McGrath is an investigative journalist who works for Radio 5.
|
|
|
|
0x4>-------------------------------------------------------------------------
|
|
|
|
Title: Justice Department to Hire Computer Hackers
|
|
Source: Business Week
|
|
Date: Aug. 6, 1998
|
|
|
|
Wanted: Hackers to break into the Justice Dept. computer network. Under a
|
|
program known as Operation Get Cracking, the Justice Dept. sought members
|
|
of the computer underground at late July's Def Con hackers' conference in
|
|
Las Vegas, BUSINESS WEEK reports in its August 17 issue. Attorney General
|
|
Janet Reno has quietly committed $1 million to hire up to 16 hackers to
|
|
test the Department's networks, says a source at Justice, which would
|
|
neither confirm nor deny the operation.
|
|
|
|
[Uh... huh... I won't go there.]
|
|
|
|
0x5>-------------------------------------------------------------------------
|
|
|
|
Title: A Cracker-Proofing Guarantee
|
|
Source: Wired News Report
|
|
Date: 9:05 a.m. 5.Oct.98.PDT
|
|
|
|
CIGNA Secure Systems Insurance is offering a US$25 million liability
|
|
policy designed to cover losses resulting from attacks by computer
|
|
crackers, the company said Monday.
|
|
|
|
To qualify for coverage, a client must secure its systems or pass
|
|
inspection from a CIGNA-approved security-management company. Otherwise,
|
|
potential clients are encouraged to contract with security-management
|
|
company NetSolve, in conjunction with Cisco's NetRanger
|
|
intrusion-detection software, which is pre-approved by CIGNA.
|
|
|
|
CIGNA Secure Systems Insurance provides coverage for theft of money,
|
|
securities, and property; for damage done by crackers to a firm's data or
|
|
software; and for business losses caused by attacks on a company's
|
|
computer systems.
|
|
|
|
[And how do they put value on your information? Who audits the system
|
|
to make sure you are telling the truth about your policy?]
|
|
|
|
A recent survey by the Computer Security Institute and the FBI found a 36
|
|
percent increase from the previous year in losses stemming from
|
|
computer-security breaches. However, traditional property and liability
|
|
insurance policies do not address these risks, according to CIGNA.
|
|
|
|
"It's a nice marketing ploy," said computer security consultant Pete
|
|
Shiply. "But if someone is concentrating on breaking into a site,
|
|
eventually they will get in. There is no such thing as a secure site;
|
|
security is economics, it's a question of money and how much you want to
|
|
invest."
|
|
|
|
Asked what kind of intrusion might lead to a $25 million claim, Shiply was
|
|
skeptical.
|
|
|
|
"While I haven't read the agreements, I am pretty sure you would not get
|
|
that much," he said. "You would have to prove losses approaching that
|
|
figure, and that will likely be a difficult thing to do."
|
|
|
|
0x6>-------------------------------------------------------------------------
|
|
|
|
Title: First-Ever Insurance Against Hackers
|
|
Source: Reuters
|
|
Date: 14-JUN-98
|
|
By: Therese Poletti
|
|
|
|
A computer security firm is so certain of its security prowess that it is
|
|
offering to protect its customers with the first-ever hacker insurance, in
|
|
the event a customer is successfully invaded by hackers.
|
|
|
|
[So secure, hackers dumped logs of one of the ICSA's machines being
|
|
hacked to several IRC channels. Do as we say, not as we do.]
|
|
|
|
ICSA Inc., the International Computer Security Association, is now
|
|
offering as part of its TruSecure service, insurance against hacker
|
|
attacks. ISCA will pay up to $250,000 if a customer's network is hacked
|
|
into, after it has followed the TruSecure criteria.
|
|
|
|
``This is the first hacker-related insurance,'' said Peter Tibbett,
|
|
president of the ICSA, based in Carlisle, Penn. ``It puts our money where
|
|
our mouth is.''
|
|
|
|
ICSA sells its TruSecure service for $40,000 a year. The service, which it
|
|
has been offering for several years, is a series of steps, methods and
|
|
procedures that an ICSA client must adhere to. Some steps are simple,
|
|
common sense procedures, such as having the server which hosts your
|
|
company's Web site inside a locked room.
|
|
|
|
[You pay 40,000 a year, for up to 250,000 insurance. Pretty high
|
|
premium. 40,000 will buy you a lot of security consulting and additional
|
|
security precautions.]
|
|
|
|
Other steps are more complicated, such as the requirement to have a secure
|
|
firewall around an internal network.
|
|
|
|
But the ICSA does not sell products. Instead, it recommends a whole range
|
|
of software that it has approved as secure and meets its standards,
|
|
through open meetings and debates, with all its members, many of whom
|
|
develop security products.
|
|
|
|
Then, ICSA tests a client's security by using typical hacker methods,
|
|
through its 100 or so employees, none of whom are reformed hackers. ICSA
|
|
believes, along with executives at International Business Machines Corp.
|
|
who perform ``ethical'' hacking on its customers, that there is no such
|
|
thing as a reformed hacker.
|
|
|
|
``We spray them with hacker tools and see where their vulnerabilities
|
|
are,'' Tibbett said, referring to many of the widely-used hacker programs
|
|
that are available over the Internet or shared among hackers. ``The
|
|
average site took about two weeks to get to the place where they meet all
|
|
our requirements.''
|
|
|
|
After ICSA completes a six-step process to test and improve a company's
|
|
security, the customer is deemed secure and will then receive insurance.
|
|
|
|
The ICSA said it will pay its customers if they fall prey to a hacker,
|
|
even if they are not financially harmed from the attack.
|
|
|
|
``Whether you lose money or not, we will pay,'' Tibbett said. ''We believe
|
|
that we reduce the risk dramatically ... Yes, we expect to write some
|
|
checks, but we don't expect to write very many.''
|
|
|
|
Tibbett likens the ICSA to the Center for Disease Control, because it
|
|
tracks all hacker attacks and tests every hacker tool and virus its
|
|
progammers can find. The ICSA also is known for its emergency response
|
|
center, which tracks the fallout from known computer viruses and helps
|
|
companies in a crisis.
|
|
|
|
``Good enough is never going to be perfect,'' Tibbett said. ''But we have
|
|
a motivation to improve our service. If we have to write a check when
|
|
someone gets hacked, it gives us another emphasis.''
|
|
|
|
The company said it is partnering with major nationwide insurance carriers
|
|
who recognize the ICSA TruSecure certification as a requirement for hacker
|
|
policies.
|
|
|
|
0x7>-------------------------------------------------------------------------
|
|
|
|
Title: New Unit to Combat High-Tech Crime
|
|
By: Yomiuri Shimbun
|
|
Date: June 05, 1998
|
|
|
|
The National Police Agency plans to create a special "cyberpolice" unit to
|
|
combat the rise in high-tech crimes involving the Internet and other new
|
|
technologies, the agency said Wednesday in announcing its new high-tech
|
|
crime program. Information will be exchanged with its investigative
|
|
counterparts overseas on a 24-hour-a-day basis, it said. The program will
|
|
include special high-tech crime squads at the prefectural level, and
|
|
information security advisers at prefectural police stations who will
|
|
liaise directly with the private sector, with which the NPA wants to
|
|
coordinate its efforts. The agency will also request a budget for a
|
|
"hacker-proof" supercomputer next fiscal year.
|
|
|
|
The NPA recorded 263 high-tech crimes last year-eight times more than in
|
|
1992. High-tech crime was on the agenda of the Group of Eight summit
|
|
meeting in Britain last month, where the eight leaders agreed to report on
|
|
their efforts to combat high-tech crime at the G-8 summit in Cologne,
|
|
Germany, next year. The NPA said Japan's current laws are inadequate and
|
|
it would push to have new laws enacted to limit access to computers by
|
|
those with criminal intent.
|
|
|
|
0x8>-------------------------------------------------------------------------
|
|
|
|
Title: First 'Cyber Warrior' Unit is Poised for Operational Status
|
|
By: Bryan Bender
|
|
Date: June 17 1998
|
|
|
|
The US Department of Defense (DoD) plans to stand up its first operational
|
|
unit of `cyber warriors' by September to safeguard against and respond to
|
|
computer attacks aimed at the US military, according to defence officials.
|
|
|
|
The Joint Chiefs of Staff (JCS) is assessing several proposals for a
|
|
Computer Defense Joint Task Force and JCS chairman Gen Henry Shelton is
|
|
expected to make a recommendation to Defense Secretary William Cohen, who
|
|
will have direct authority over the organisation, in the near future.
|
|
|
|
The JCS has a computer attack response cell within its directorate of
|
|
operations, but it "has not been codified as a warfighting entity," said
|
|
JCS spokesman Lt Cdr Jim Brooks.
|
|
|
|
The task force, which will conduct defensive rather than offensive
|
|
information operations, will have the necessary authority to take action
|
|
in the event of information attacks. Officials are determining how the
|
|
unit should be structured, where it should be and how much it will cost.
|
|
|
|
They say that the new unit will have to have a high level of co-ordination
|
|
with other federal agencies, particularly the Federal Bureau of
|
|
Investigation, given the constitutional limitations placed on the US armed
|
|
forces in the area of law enforcement.
|
|
|
|
JCS sources add that the task force is only expected to be an interim
|
|
solution to the rising need for a specialised unit to counter incidents of
|
|
cyber warfare. A permanent unit, possibly under the authority of one of
|
|
the US warfighting commanders-in-chief, is planned for the future.
|
|
|
|
The Pentagon has seen a steep rise in computer attacks and other attempts
|
|
either to access or contaminate DoD information networks. Art Money, the
|
|
DoD's senior civilian overseeing computer operations, said on 10 June that
|
|
the Pentagon experiences an average of 60 cyber attacks per week.
|
|
|
|
The US Department of Defense (DoD) plans to stand up its first operational
|
|
unit of `cyber warriors' by September to safeguard against and respond to
|
|
computer attacks aimed at the US military, according to defence officials.
|
|
|
|
The Joint Chiefs of Staff (JCS) is assessing several proposals for a
|
|
Computer Defense Joint Task Force and JCS chairman Gen Henry Shelton is
|
|
expected to make a recommendation to Defense Secretary William Cohen, who
|
|
will have direct authority over the organisation, in the near future.
|
|
|
|
The JCS has a computer attack response cell within its directorate of
|
|
operations, but it "has not been codified as a warfighting entity," said
|
|
JCS spokesman Lt Cdr Jim Brooks.
|
|
|
|
The task force, which will conduct defensive rather than offensive
|
|
information operations, will have the necessary authority to take action
|
|
in the event of information attacks. Officials are determining how the
|
|
unit should be structured, where it should be and how much it will cost.
|
|
|
|
They say that the new unit will have to have a high level of co-ordination
|
|
with other federal agencies, particularly the Federal Bureau of
|
|
Investigation, given the constitutional limitations placed on the US armed
|
|
forces in the area of law enforcement.
|
|
|
|
JCS sources add that the task force is only expected to be an interim
|
|
solution to the rising need for a specialised unit to counter incidents of
|
|
cyber warfare. A permanent unit, possibly under the authority of one of
|
|
the US warfighting commanders-in-chief, is planned for the future.
|
|
|
|
The Pentagon has seen a steep rise in computer attacks and other attempts
|
|
either to access or contaminate DoD information networks. Art Money, the
|
|
DoD's senior civilian overseeing computer operations, said on 10 June that
|
|
the Pentagon experiences an average of 60 cyber attacks per week.
|
|
|
|
0x9>-------------------------------------------------------------------------
|
|
|
|
Title: Tracking Global Cybercrime
|
|
By: Claudia Graziano
|
|
Date: 4:00 a.m. 25.Sep.98.PDT
|
|
|
|
The International Chamber of Commerce said Thursday that it will open a
|
|
new division to help companies around the world protect themselves against
|
|
cybercrime.
|
|
|
|
"Basically, any scams you can do terrestrially you can do even easier in
|
|
cyberspace," said Eric Ellen, the chamber's executive director, who will
|
|
take the reins of the new division.
|
|
|
|
[Oooh.. 'terrestrially'.. three point word.]
|
|
|
|
The London-based unit will work with Interpol to fight heavy-duty
|
|
technological thievery -- such as money laundering, industrial espionage,
|
|
and investment fraud -- as opposed to small-time consumer scams like
|
|
selling nonexistent goods online.
|
|
|
|
Interpol chief Ray Kendall said the international police agency had been
|
|
pushing for years for such an alliance with the private sector since it
|
|
could move more quickly than governments in purchasing the equipment
|
|
needed to investigate high-tech crime.
|
|
|
|
The cybercrime unit will provide the 7,000 International Chamber of
|
|
Commerce members with information about how and where the myriad types of
|
|
crimes are committed on the Net and what businesses can do to protect
|
|
themselves against crackers and fraud artists.
|
|
|
|
A Federal Trade Commission official praised the commission's efforts to
|
|
raise domestic awareness of Internet fraud.
|
|
|
|
"We welcome any international effort to crack down on cyberfraud, because
|
|
crime and fraud perpetrated against consumers or businesses only
|
|
undermines the electronic marketplace and stifles the great opportunities
|
|
available through Internet commerce," said Paul Luehr, an assistant
|
|
director at the commission.
|
|
|
|
The chamber said it hopes to persuade governments, including the United
|
|
States, to wipe out restrictions that limit the spread and availability of
|
|
strong encryption algorithms.
|
|
|
|
That position flies in the face of US law enforcement, which currently
|
|
limits the export of powerful crypto on the grounds that it might be used
|
|
by terrorists. Meanwhile, US crypto advocates have long said that ciphers
|
|
are better suited to fighting crime than hiding it.
|
|
|
|
"There will be some lobbying on our part, but many businesses can't wait
|
|
for laws," Ellen said. "Crimes cross international borders, yet existing
|
|
laws [against cybercrime] are national."
|
|
|
|
The chamber's cybercrime unit will meet regularly with Interpol in Lyon,
|
|
France, to exchange information and intelligence on cybercrime and its
|
|
perpetrators.
|
|
|
|
Additionally, the chamber division plans to exchange information with the
|
|
FBI's National Infrastructure Protection Center and the FBI's National
|
|
Security Awareness unit, which looks after the interests of US businesses.
|
|
|
|
Headquartered in Paris, the International Chamber of Commerce establishes
|
|
rules that govern the conduct of businesses worldwide. The nonprofit group
|
|
holds top-level consultative status with the United Nations, where it puts
|
|
forward the views of business in countries around the world.
|
|
|
|
0xa>-------------------------------------------------------------------------
|
|
|
|
Title: FBI Opens High-Tech Crisis Center
|
|
By: Michael J. Sniffen
|
|
Date: Friday, November 20, 1998; 9:29 a.m. EST
|
|
|
|
Entering its 91st year with new duties that extend around the world, the
|
|
FBI today opened a high-tech, $20 million operations center nearly the
|
|
size of a football field to allow headquarters to manage up to five crises
|
|
at once.
|
|
|
|
The new Strategic Information and Operations Center -- called ``sigh-ock''
|
|
after its initials -- has 35 separate rooms that can seat up 450 people
|
|
total and covers 40,000 square feet on the fifth floor of FBI headquarters
|
|
on Pennsylvania Avenue. It is 10 times bigger than its two-decade-old
|
|
predecessor that could, with difficulty, handle two crises simultaneously.
|
|
|
|
Bureau officials became convinced the old SIOC was outmoded in the summer
|
|
of 1996 when they tried to manage investigations of the Olympic bombing in
|
|
Atlanta, the explosion of TWA 800 and the Khobar Towers truck-bombing in
|
|
Saudi Arabia at the same time.
|
|
|
|
``There weren't enough rooms or enough telephones,'' FBI Director Louis J.
|
|
Freeh said. ``We had people working at desks in the hallway outside and
|
|
reading top secret material in the vending area across the hall.''
|
|
|
|
The supersecret facility with no windows to the street, or even any
|
|
outside walls, has a private ribbon-cutting today with former President
|
|
George Bush as the FBI celebrates its 90th birthday.
|
|
|
|
Introducing the new SIOC to reporters for a one-time-only tour, Freeh said
|
|
it was emblematic of the bureau's expanded responsibilities and
|
|
technology.
|
|
|
|
He noted that the bureau's fastest growing component, its Counterterrorism
|
|
Center, is arrayed in the offices around the SIOC -- as is its violent
|
|
crime unit, which handles domestic attacks such as the Oklahoma City
|
|
bombing or hijackings.
|
|
|
|
Much of the counterterrorism work now extends overseas, to Saudi Arabia
|
|
where U.S. soldiers have been killed in two bombings and East Africa
|
|
where two U.S. embassies were bombed, for example. In the last five years,
|
|
Freeh said, the FBI has nearly doubled its legal attaches working abroad
|
|
-- to 32 cities now. Eight more are to open soon -- in Almaty, Kazakhstan;
|
|
Ankara, Turkey; Brasilia, Brazil; Copenhagen, Denmark; Prague, Czech
|
|
Republic; Santo Domingo, Dominican Republic; Singapore and Seoul, Korea.
|
|
|
|
The computers at desks throughout the center and the 5-by-15-foot video
|
|
screens on the walls of almost every room can display not only U.S.
|
|
television broadcasts but also local TV channels from foreign countries.
|
|
The bank of red-lettered digital clocks in each room can display the local
|
|
time in five or six locations.
|
|
|
|
The FBI's new National Infrastructure Protection Center, tasked to prevent
|
|
and respond to attacks on government or private computer systems that keep
|
|
America running, will have three representatives on each of the 10-member
|
|
watch teams that staff the center at all times. Also present around the
|
|
clock: a representative of the National Security Agency's Cryptologic
|
|
Security Group to provide information from the government's worldwide
|
|
electronic eavesdropping.
|
|
|
|
Behind a series of blond wood doors, the complex warren of workrooms, many
|
|
of which can be combined or divided as need requires, have light gray
|
|
carpets, paler gray walls and dark gray metal desks with white plastic
|
|
tops. The desks are fixed in place only in two control rooms that manage
|
|
the flow of information to each room; elsewhere they are modular and can
|
|
be rearranged at will over floor-mounted electric and telephone plugs.
|
|
Interior windows allow views into conference rooms or the SIOC's hallways.
|
|
|
|
Ron Wilcox, deputy chief of the SIOC, said the compartmented areas would
|
|
allow bureau agents ``to work in one room with District of Columbia police
|
|
on a local kidnapping while another room works on a terrorist bombing with
|
|
top secret data.''
|
|
|
|
Each work station can receive data from three sets of phone and computer
|
|
links: unclassified, secret and top secret-sensitive compartmented
|
|
information.
|
|
|
|
While the center will draw information from around the world, information
|
|
will not leave without permission. The center is shielded to prevent
|
|
outside detection of electronic emissions, so cell phones do not work
|
|
inside it.
|
|
|
|
In Operations Group D and G, the largest room with capacity for 118
|
|
people, there are printers with yard-wide rolls of paper to print out city
|
|
maps. So the room will not be overcome with noise, the sound from video
|
|
screens is broadcast silently from black boxes around the room to
|
|
headphone sets available to each worker.
|
|
|
|
The chairs, most on wheels, have arm rests. They are blue-green cloth in
|
|
the workrooms; gray leather in the Executive Briefing Room, the center's
|
|
second largest room, with three blond wood semicircles seating 36 and
|
|
fixed theater seats at the back for 50 more.
|
|
|
|
Rather than increasing the burden on field agents to report to Washington,
|
|
Wilcox said the new center should reduce such demands, because ``we will
|
|
offer one-stop shopping for headquarters. Field agents can report to us,
|
|
and we will be responsible for making sure everybody is alerted who should
|
|
be.''
|
|
|
|
0xb>-------------------------------------------------------------------------
|
|
|
|
Title: Navy fights new hack method
|
|
By: Tim Clark
|
|
Source: CNET NEWS.COM
|
|
|
|
Hackers are banding together across the globe to mount low-visibility
|
|
attacks in an effort to sneak under the radar of security specialists and
|
|
intrusion detection software, a U.S. Navy network security team said
|
|
today.
|
|
|
|
Coordinated attacks from up to 15 different locations on several
|
|
continents have been detected, and Navy experts believe that the attackers
|
|
garner information by probing Navy Web sites and then share it among
|
|
themselves.
|
|
|
|
"These new patterns are really hard to decipher--you need expert forensics
|
|
to get the smoking gun," said Stephen Northcutt, head of the Shadow
|
|
intrusion detection team at the Naval Surface Warfare Center. "To know
|
|
what's really happening will require law enforcement to get hold of the
|
|
hackers' code so we can disassemble it."
|
|
|
|
The new method involves sending as few as two suspicious probes per hour
|
|
to a host computer, a level of interest that usually won't be detected by
|
|
standard countermeasures. But by pooling information learned from those
|
|
probes, hackers can garner considerable knowledge about a site.
|
|
|
|
0xc>-------------------------------------------------------------------------
|
|
|
|
Title: Pentagon Blocks DoS Attack
|
|
Source: Newsbytes via NewsEdge
|
|
|
|
The Pentagon launched an attack applet of its own this month to thwart a
|
|
denial-of-service attack against its DefenseLink Web site at
|
|
http://www.defenselink.mil .
|
|
|
|
DefenseLink was one of three sites targeted on Sept. 7 by a group that
|
|
calls itself the Electronic Disturbance Theater. The group claimed to be
|
|
acting in solidarity with Zapatista rebels in the Mexican state of Chiapas
|
|
to protest Defense Department funding of the School of the Americas.
|
|
|
|
Other target Web sites belonged to Germany's Frankfurt Stock Exchange and
|
|
Mexican President Ernesto Zedillo.
|
|
|
|
The theater group's Web site referred to the attacks as a virtual sit- in.
|
|
Visitors to the group's site received a hostile Java applet designed to
|
|
keep reloading the DefenseLink and other Web sites automatically as long
|
|
as the the visitors' browsers were open.
|
|
|
|
Multiple simultaneous reload requests can overwhelm a server, but the
|
|
attacks apparently had little impact, DOD officials said.
|
|
|
|
"Our support staff certainly was aware of the planned attack," Pentagon
|
|
spokeswoman Susan Hansen said. "They took preventive measures to thwart
|
|
the attack so that DefenseLink was available."
|
|
|
|
Hansen would not specify the preventive measures, but the theater group
|
|
reported, and a DOD official confirmed, that the Pentagon aimed its own
|
|
hostile applet back at the attackers.
|
|
|
|
Browsers "got back a message saying the (theater group's) server wasn't
|
|
available," Hansen said.
|
|
|
|
The Frankfurt exchange reported the reload requests had little or no
|
|
impact on its server, either.
|
|
|
|
The theater group has promised a second round of attacks, known as
|
|
FloodNet, between Sept. 16, Mexican Independence Day, and Oct. 12,
|
|
Columbus Day.
|
|
|
|
Representatives of security software vendor Finjan Inc. of Santa Clara,
|
|
Calif., said the attacks marked the first time Java applets have been used
|
|
in a political protest, although the theater group has claimed
|
|
participation in other virtual sit-ins against Zedillo and President
|
|
Clinton since April.
|
|
|
|
The group is a throwback to the 1960s guerrilla theater of the Yippies,
|
|
who once hosted an attempt to mentally levitate the Pentagon. The theater
|
|
group's Web site at http://www.nyu.edu/projects/wray/ecd.html advocates
|
|
electronic civil disobedience. Its attempted Pentagon attack was part of
|
|
Swarm, a project launched at the Ars Electronic Festival on InfoWar in
|
|
Linz, Austria.
|
|
|
|
The group's announced activities, in addition to the unspecified attacks
|
|
planned through mid-October, include radio protests against the Federal
|
|
Communications Commission on Oct. 4 and 5.
|
|
|
|
The Swarm attacks reportedly did not meet with much approval among
|
|
hackers, who view FloodNet as an abuse of network resources.
|
|
|
|
0xd>-------------------------------------------------------------------------
|
|
|
|
Title: Hackers Elude Accelerator Center Staff
|
|
Source: San Francisco Chronicle
|
|
Date: 06/11/98
|
|
|
|
Officials at Stanford Linear Accelerator Center are rethinking the
|
|
openness of their computer system a week after hackers forced them to shut
|
|
down outside access to the federal research facility's computer network.
|
|
|
|
External access to the center's computer system was suspended after staff
|
|
members failed to catch hackers who had intercepted a password and were
|
|
moving in and out of more than 30 of the facility's Unix servers.
|
|
|
|
"We traced the hackers around to the point that we weren't gaining on
|
|
them," said center spokeswoman P.A. Moore. "The person or persons were
|
|
successful in covering their tracks and in getting into and out of
|
|
accounts."
|
|
|
|
It is still unclear how the hackers got access to a password and the
|
|
system, Moore said.
|
|
|
|
But as a result of the breach, she said, officials are rethinking the
|
|
center's policy of being an open scientific research facility. She said
|
|
proposals are being considered to restrict the center's computer system.
|
|
|
|
"A number of options are being considered and they range from very mild to
|
|
more severe," she said.
|
|
|
|
Moore said that most of the center's Internet services were restored
|
|
Tuesday after security measures were put in place and that staff members
|
|
were instructed to change their passwords.
|
|
|
|
The shutdown did not create any serious problems, although it caused
|
|
delays in many projects and denied researchers from all over the world
|
|
access to the center's Web site, Moore said.
|
|
|
|
Established in 1962, the Linear Accelerator Center is funded by the
|
|
Department of Energy and operated by Stanford University. With a staff of
|
|
about 1,300 and 2,000 researchers worldwide, the center conducts basic
|
|
research on atomic and subatomic physics. The center's researchers use
|
|
colliders to study matter at the atomic level. "Mostly, we've lost time
|
|
on experiments," Moore said. "We do not see that any data has been
|
|
compromised. It's more of a setback than a major disaster."
|
|
|
|
But she said future break-ins will remain a problem for open scientific
|
|
facility. The center does not conduct any classified research, she said.
|
|
|
|
"Computer hackers are very sophisticated in terms of their knowledge and
|
|
ease in traveling through cyberspace," she said. "We're vulnerable. By
|
|
being an open facility, we are a target for vandals." Stephen Hansen, a
|
|
Stanford University computer security officer, said campus system
|
|
break-ins average at least two a month.
|
|
|
|
A common tool used by hackers is a computer program dubbed "the sniffer,"
|
|
which allows intruders to decode data in a system, specifically passwords
|
|
and log-on names.
|
|
|
|
"Sniffers are quite dangerous," Hansen said. "If they are not caught right
|
|
away, they can lead to break-ins to thousands of accounts, not just
|
|
locally, but across the Internet."
|
|
|
|
To minimize such break-ins, he said, more system operators are using
|
|
encryption programs that prevent hackers from determining sign-on names
|
|
and passwords. However, this is not an easy option for the Stanford center
|
|
because encryption programs are prohibited in some countries, including
|
|
France, where a number of center-affiliated researchers live.
|
|
|
|
0xe>-------------------------------------------------------------------------
|
|
|
|
Title: Cyberattacks leave feds chasing 'vapor'
|
|
By: Bob Brewin (antenna@fcw.com)
|
|
|
|
Top administration officials last week warned that the United States lacks
|
|
the capability to quickly identify the nature and scope of a continuing
|
|
series of cyberattacks against both federal and private systems that
|
|
support the country's telecommunications, financial and energy critical
|
|
infrastructures.
|
|
|
|
During a series of congressional hearings and in speeches last week,
|
|
federal security and information technology officials made it clear that
|
|
they anticipate a powerful ''Achilles' heel'' cyberattack that could
|
|
cripple the nation's vital systems because the government lacks the
|
|
ability to defend against such an attack.
|
|
|
|
John Hamre, deputy secretary of Defense, told the House National Security
|
|
Committee that such a paralyzing cyberattack against critical
|
|
infrastructures is inevitable. "There will be an electronic attack
|
|
sometime in our future," he said. "Should an attack come, it will likely
|
|
not be aimed at just military targets but at civilian [targets] as well."
|
|
Administration officials also reported that the attacks continue unabated.
|
|
|
|
Art Money, who is slated to take over as assistant secretary of Defense
|
|
for command, control, communications and intelligence later this year,
|
|
said in a speech at a conference in Washington, D.C., last week that DOD
|
|
"averages 60 intrusions a week" into its computer systems. An official of
|
|
the FBI's new National Infrastructure Protection Center (NIPC) said the
|
|
office is investigating a "half dozen" incidents, describing them as
|
|
''substantial.''
|
|
|
|
But security agencies said the process of chasing down and identifying
|
|
attackers is frustrating, as in the case of the highly publicized series
|
|
of hacks against DOD computers last February. The FBI and numerous DOD
|
|
agencies worked together to track down the hackers, but the agencies could
|
|
not "identify [until] the following week" the source and type of attack,
|
|
Ellie Padgett, deputy chief of the National Security Agency, told the
|
|
Senate Judiciary Committee's Subcommittee on Technology, Terrorism and
|
|
Government Information.
|
|
|
|
Padgett said it would still take the agency a "matter of days" to
|
|
determine if an attack was strategic or just a teenage prank.
|
|
|
|
Michael Vatis, director of NIPC, told the committee, "In most
|
|
cyberattacks, it's impossible to know the identity of the penetrator," be
|
|
it teenage hackers, criminals or a strategic attack by a hostile nation.
|
|
Vatis, in an interview, likened chasing down hackers to "tracking vapor."
|
|
|
|
Barry Collin, a senior researcher with the Institute for Security and
|
|
Intelligence, said it will become increasingly difficult to identify
|
|
strategic attacks because a nation that is sophisticated enough to mount a
|
|
cyberwar against the United States also will have the sophistication to
|
|
disguise that effort as a hacker attack mounted by teenagers. "They can
|
|
make it appear as if it is a game instead of a real attack," he said.
|
|
|
|
A "Predatory Phase"
|
|
|
|
Also frustrating security experts is the possibility that attacks will be
|
|
carried out in quick hits over a long period of time, Hamre said. "The
|
|
predatory phase could take place over several years, making it hard to
|
|
collate curious, seemingly unrelated events into a coherent picture," he
|
|
said. These long-term attacks "could take place over multiple
|
|
jurisdictions - [for example] power grids or air traffic control nodes in
|
|
various states. Our knowledge of the origin of such attacks and their
|
|
sponsorship is likely to be imprecise."
|
|
|
|
Hamre also presented classified testimony to a joint closed hearing of the
|
|
House National Security Committee's Military Procurement and the Military
|
|
Research and Development subcommittees. Hamre may have presented more
|
|
detailed evidence of computer vulnerabilities, based on remarks by Rep.
|
|
Curt Weldon (R.-Pa.), chairman of the Military Research and Development
|
|
Subcommittee, who called Hamre's classified testimony "the most
|
|
provocative briefing" he had ever received during his 12 years in
|
|
Congress.
|
|
|
|
The Clinton administration hopes to protect the critical infrastructures
|
|
with recently formed security organizations, including the National
|
|
Infrastructure Assurance Plan, the NSA Network Incident Analysis Cell and
|
|
the Critical Infrastructure Assurance Office in the Commerce Department.
|
|
CIAO will spearhead multiple-agency efforts to develop better policies,
|
|
processes, procedures and systems to detect and deter attacks.
|
|
|
|
The administration also plans to heavily involve the private sector -
|
|
banks, power companies and railroad companies - in "public/private
|
|
partnerships'' to protect the infrastructure.
|
|
|
|
Members of Congress on both sides of the Hill praised the administration's
|
|
initial efforts, but they also expressed some skepticism about the
|
|
approach. Sen. Diane Feinstein (D-Calif.) said she "wondered if the nexus
|
|
between the public and private sectors will work."
|
|
|
|
Rep. Herbert Bateman (R-Va.) said he is "deeply skeptical" about placing
|
|
the CIAO in Commerce rather than in DOD.
|
|
|
|
Bateman said Commerce's willingness to allow the exportation of critical
|
|
satellite and rocketry information to the Chinese left him "unconvinced"
|
|
that Commerce had the same "sensitivity" as the Pentagon has to the
|
|
requirements of national security.
|
|
|
|
0xf>-------------------------------------------------------------------------
|
|
|
|
Title: Congress Attacks Cyber Defense Funds
|
|
Source: Defense News
|
|
Date: 6/16/98
|
|
|
|
U.S. Congress Attacks Cyber Defense Funds By George I. Seffers Defense
|
|
News Staff Writer WASHINGTON-- Congress is taking millions of dollars from
|
|
the war chest intended to protect critical U.S. infrastructure from
|
|
potentially crippling cyber attacks, according to Defense Department and
|
|
White House sources. The House Appropriations Committee deleted the entire
|
|
$69.9 million the Defense Department had requested for infrastructure
|
|
protection in its 1999 budget. That funding should be restored, Linton
|
|
Wells, principal deputy for the assistant secretary of defense for
|
|
command, control, communications and intelligence, told lawmakers at a
|
|
June 11 hearing here on protecting national infrastructures--
|
|
telecommunications, banking and finance, energy, transportation, and
|
|
essential government services-- from cyber attack.
|
|
|
|
[So they make all these new groups to fight cybercrime.. then
|
|
this?]
|
|
|
|
0x10>------------------------------------------------------------------------
|
|
|
|
Title: Mudge on Security Vendors
|
|
From: Bugtraq
|
|
|
|
In the SAFER bulletin they mention compromising software that was
|
|
explicitly installed as an additional security measure.
|
|
|
|
While joking around I was mentioning to some colleagues about the
|
|
attrocity of some (most) of the security related products out there right
|
|
now. Not in what they are claiming to accomplish but in the lack of sound
|
|
coding in their own products. I thought it was pretty much understood but
|
|
the amazed looks on their faces told me otherwise. So I figured I might
|
|
point this out in case that was not an isolated assumption that these
|
|
people had. Hopefuly I'm already preaching to the choir on Bugtraq.
|
|
|
|
[Note - though I explicitly mention ISS and Axent they are by no means any
|
|
worse or better than others not mentioned here... in addition I am
|
|
referring to older versions of their products. I have not spent time
|
|
looking at their most current releases to verify whether things have
|
|
improved or gotten worse. Please take this for what it is meant to be - a
|
|
general rant about the security vendor world as it stands... not an attack
|
|
against particular vendors]
|
|
|
|
A few real world cases:
|
|
|
|
A few revs back in ISS' commercial security scanner there were several
|
|
vulnerabilities. One particular company contracted me to come in and give
|
|
them a report on the level of competance that an auditing company they had
|
|
hired were at.
|
|
|
|
Sure enough, when the auditor scanned the box that we had setup they were
|
|
using ISS (version 3? my memory isn't serving me very well right now).
|
|
Upon an attempt to connect to tcp/79 (fingerd) we fed them back a bunch of
|
|
'garbage' (well, you know... that garbage that is comprised of a long run
|
|
of NOPs followed by machine dependent opcodes and operands :). After a few
|
|
tries, root on the scanning machine was handed out as there were no checks
|
|
done on the data that was being retrieved (or more accurately assumptions
|
|
were being made about the length).
|
|
|
|
...
|
|
|
|
Axent swore up and down that their ESM systems were communicating via DES
|
|
encrypted channels. In reality the communications were simply XOR'd and
|
|
they would send the progressive XOR key every X packets. The DES
|
|
components were slated for the 'next rev'. Doesn't matter - the point is
|
|
that they shouldn't have done the XOR scheme to begin with when the
|
|
purpose of the communications between the client and server are "lists" of
|
|
vulnerabilities on said machines. Not something you want advertised to
|
|
anyone passivle monitoring.
|
|
|
|
...
|
|
|
|
I don't know how many "security" packages I've looked at that do
|
|
outrageously stupid things like chmod(777), popen(), or system() even!
|
|
Even if the program is running non-priveledged and is designed to be on a
|
|
system that does not have multiple users it is a demonstration that the
|
|
people writing the code to protect your systems (often at outrageous price
|
|
tags!) seem incapable of demonstrating sane coding techniques themselves.
|
|
|
|
How is one supposed to get 'warm fuzzies' that one is having their systems
|
|
"protected" when the products doing the protecting show no security
|
|
competence.
|
|
|
|
Vendors listen up!
|
|
|
|
.mudge
|
|
|
|
0x11>------------------------------------------------------------------------
|
|
|
|
Title: More delays for Mitnick trial
|
|
By: Kevin Poulsen
|
|
Date: November 25, 1998 3:33 PM PT
|
|
Source: ZDNet
|
|
|
|
Accusing government attorneys of stalling efforts to collect key documents
|
|
for his case, the defense attorney representing Kevin Mitnick, famed
|
|
criminal hacker, requested a continuance on Tuesday. According to Donald
|
|
Randolph's motion, the government missed a court-ordered deadline to
|
|
provide the defense with copies of prosecution witnesses statements. The
|
|
statements were finally handed over on Tuesday, almost a month late.
|
|
|
|
In addition, the prosecution is almost a week behind in handing over a
|
|
list of evidence to the defense. Some electronic evidence is being
|
|
withheld completely, claimed Randolph.
|
|
|
|
Prosecution delays
|
|
|
|
"Due to the government's significant delay in producing discovery as
|
|
ordered by this court, and due to its continuing failure to produce
|
|
certain discoverable evidence altogether, the defense cannot competently
|
|
complete its investigations and prepare for trial in this matter absent a
|
|
reasonable continuance in the trial date," stated the motion.
|
|
|
|
The original trial was scheduled for Jan. 19, 1999.
|
|
|
|
The prosecutors attacked any delay. "The contention that we have been late
|
|
with materials is disingenuous," says prosecutor David Schindler. "We've
|
|
provided thousands of pages of discovery."
|
|
|
|
Government mole?
|
|
|
|
The text of the motion also implied that the government had paid a
|
|
one-time Mitnick cohort and employee of Mitnick's previous attorney, Ron
|
|
Austin, to spy on his client.
|
|
|
|
"Austin was privy to confidential communications between Mr. Mitnick and
|
|
Mr. Sherman which he later disclosed to the government," said the
|
|
statement.
|
|
|
|
0x12>------------------------------------------------------------------------
|
|
|
|
Title: 'Back door' doesn't get very far
|
|
Source: San Jose Mercury News
|
|
|
|
A U.S. government panel has failed in a two-year effort to design a
|
|
federal computer security system that includes ''back doors,'' a feature
|
|
that would enable snooping by law enforcement agencies, people familiar
|
|
with the effort said this week. The failure casts further doubt on the
|
|
Clinton administration policy -- required for government agencies and
|
|
strongly encouraged for the private sector -- of including such back doors
|
|
in computer encryption technology used to protect computer data and
|
|
communications, according to outside experts.
|
|
|
|
But administration officials said the panel, which is set to expire in
|
|
July, simply needed more time. The 22-member panel appointed by the
|
|
secretary of commerce in 1996 concluded at a meeting last week that it
|
|
could not overcome the technical hurdles involved in creating a
|
|
large-scale infrastructure that would meet the needs of law enforcers,
|
|
panel members said. The group was tapped to write a formal government plan
|
|
known as a ''Federal Information Processing Standard,'' or FIPS, detailing
|
|
how government agencies should build systems including back doors.
|
|
|
|
0x13>------------------------------------------------------------------------
|
|
|
|
Title: ICSA Goon Pretends to be a Hacker [my title]
|
|
Source: Forbes Digital Tool
|
|
By: Adam Penenberg
|
|
|
|
J3 spends his days trolling around the hacker underground, monitoring
|
|
hacker channels on Internet Relay Chat, checking out the latest on
|
|
"phreaking,"--cracking the phone system-- dialing up bulletin boards and
|
|
checking out web sites that offer password-cracking software and how-to
|
|
guides.
|
|
|
|
For J3 this isn't just a hobby, it's a job.
|
|
|
|
ICSA, a computer security firm, hired J3 (not his real name nor his online
|
|
"nick", since his success depends on total anonymity) two years ago as the
|
|
company's lead underground analyst. His mission: to keep tabs on the
|
|
latest trends and tools in the hacker world. When he gets wind of a new
|
|
security hole, he passes the information on to ICSA's tech staff so that
|
|
the company can either develop a defense or tip off software makers before
|
|
the flaw can be exploited.
|
|
|
|
J3 is very busy. Recently, a group of European hackers released a Trojan
|
|
horse-like program that would enable them to set up backdoors in geeky
|
|
programs known only to network administrators, such as "named" programs
|
|
related to domain name servers, a basic component of any network connected
|
|
to the larger Internet. J3 found out about it in the course of his
|
|
monitoring, passed it on to ICSA, and the company informed CERT (Computer
|
|
Emergency Response Team) which posted an advisory.
|
|
|
|
The Internet is a lot like Lord of the Flies, a nasty, violent --yet
|
|
virtual--world where the strong intimidate the weak.
|
|
|
|
He was also instrumental in helping ICSA detect two types of denial of
|
|
service attack modes--Teardrop and Land--that were being used to exploit
|
|
vulnerabilities in the TCP/IP protocol. These new attacks took advantage
|
|
of tweaks that would beat existing patches, which made it difficult for
|
|
system administrators to stay ahead of hackers. But J3, because of his
|
|
links to the underground, was able to learn of these exploits shortly
|
|
after they were posted on hacker channels.
|
|
|
|
"I'm proud of a lot of the work we do," J3 says. "I've found a company's
|
|
entire password file posted to a web site, or that hackers have root in a
|
|
network or that a merchant site with a database of credit cards has been
|
|
compromised. I then contact the companies and warn them."
|
|
|
|
He says that the Internet is a lot like Lord of the Flies, a nasty,
|
|
violent--yet virtual--world where the strong intimidate the weak. Not all
|
|
hackers are destructive, of course. There are many good ones on a quest
|
|
for pure information, the lifeblood of their avocation, who post security
|
|
flaws because they believe it's the best way to fix them. It's the ones
|
|
who exploit these flaws to cause damage that irritate J3.
|
|
|
|
But they have a vulnerability: their need for self-aggrandizement, which
|
|
is key to J3's success. "If hackers didn't brag," he says, "I wouldn't
|
|
have a job."
|
|
|
|
J3, who works mostly nights since the Internet never sleeps, isn't just a
|
|
full-time worker. He's also a graduate student working on his Ph.D. in
|
|
psychology. And his area of study?
|
|
|
|
Hackers, of course.
|
|
|
|
0x14>------------------------------------------------------------------------
|
|
|
|
Title: Is Your kid a Hacker
|
|
Source: Family PC Magazine
|
|
Date: November 1998
|
|
By: Kevin Poulsen
|
|
|
|
If you suspect your kid is a computer hacker, here's some advice from a
|
|
convicted hacker on how to handle it
|
|
|
|
It starts with a knock on the door. A dozen men in suits and shoulder
|
|
holsters are outside, their Buicks and Broncos crammed into your driveway
|
|
and parked along the street. Over their shoulders you can see your
|
|
bathrobe-clad neighbors watching the spectacle from their lawns. It might
|
|
be the FBI, it may be the Secret Service, but whoever it is, the humorless
|
|
agents hand you a piece of paper and head toward your son or daughter's
|
|
room. You wonder, perhaps for the first time, what your kid has been
|
|
doing in there with the computer.
|
|
|
|
If you're a parent, you probably regard the Internet as a font of both
|
|
promise and peril for your children. It can be an invaluable learning
|
|
tool and a way to encourage your kids to develop the basic computer skills
|
|
they'll eventually need. But what if they take to it a little too eagerly
|
|
and enthusiastically and begin using it to get into places where they
|
|
don't belong? In that case, normal youthful rebellion, or simple
|
|
inquisitiveness, if it's expressed over the Internet, could turn your
|
|
family upside down.
|
|
|
|
It happened last February in Cloverdale, California, when surprised
|
|
parents found out their teenage son was suspected in a series of Pentagon
|
|
intrusions. It happened again in Massachusetts a week later, when the
|
|
Justice Department won its first juvenile conviction under the Federal
|
|
Computer Fraud and Abuse Act.
|
|
|
|
It happened to my family 15 years ago, in one of the first hacker raids in
|
|
the country. At that time, I was the teenage miscreant who was illegally
|
|
accessing federal computers. Now, in my early thirties, I've begun to
|
|
wonder how I would protect a kid of my own from becoming a poster child
|
|
for computer crime. I believe the best approach is to stay informed and
|
|
to communicate with your potential cyberpunks.
|
|
|
|
Open Communication Channels
|
|
|
|
Some of the things you might view as ominous warning signs are actually
|
|
quite harmless. For example, if your teenager calls himself a "hacker,"
|
|
he may not be headed for trouble. Despite the media's breathless
|
|
exhortation, hackers are not lawbreakers by definition. The word actually
|
|
describes someone with a talent for technology, a deep interest in how
|
|
things work, and a tendency to reject any limitations. If your son
|
|
disassembled the Giga Pet you gave him for Christmas, he's probably a
|
|
hacker. If he made it run better, he definitely is. Of course, some
|
|
hackers go further and test their skills against the adult world of
|
|
corporate and governmental computer systems.
|
|
|
|
If I thought my kids were cracking computers, I would want to put a stop
|
|
to it -- though not because it's the crime of the century. True hackers
|
|
live by an ethical code that precludes damaging systems or profiting from
|
|
their intrusions. There are worse values for a teenager to have. But
|
|
regardless of motives, a hacker who's caught in the act today is likely to
|
|
be treated as an industrial spy or a national security threat. A single
|
|
moment of rebellious exploration could land a teenager an early felony
|
|
conviction.
|
|
|
|
If you suspect that your kid may be crossing the line, there are various
|
|
software packages on the market that will allow you to monitor or control
|
|
his or her access to the Internet. Don't even think about using one. If
|
|
your teen really is a hacker, your technological solution will be a source
|
|
of amusement and derision, as well as an insult to his talents. Instead of
|
|
putting up barriers, I suggest you talk to your kids.
|
|
|
|
If your kid is reading underground Web sites for hackers, read them
|
|
yourself. If he has a subscription to a hacker magazine, go through it
|
|
and ask questions. Feel free to marvel at the cleverness of the latest
|
|
hacker technique. Then talk about consequences: the rising costs of legal
|
|
representation, the problems that a convicted felon encounters in academia
|
|
and the job market. Start looking at alternatives to a life of
|
|
cybercrime.
|
|
|
|
Constructive Alternatives
|
|
|
|
If your kid has a rebellious streak, I suggest giving up on trying to
|
|
suppress it; try to channel it instead. When hackers grow up, they often
|
|
find a reasonable substitute for the thrill of intrusion by working the
|
|
other side. Ask your teen how he would plug the latest security holes.
|
|
Get him thinking about it. Ask him for advice on protecting your own
|
|
e-mail or your ISP account.
|
|
|
|
The hacker tradition has always contained an element of disrespect for
|
|
authority. Up until 15 years ago, cracking systems was an acceptable rite
|
|
of passage in the industry, and some of the same people who pioneered
|
|
artificial intelligence and the personal computer also ushered in phone
|
|
phreaking, lock hacking, and computer intrusion. Early hackers believed
|
|
that computers were a public resource and that access to them and
|
|
knowledge about them should be free.
|
|
|
|
In a sense, the first-generation hackers won their battle when they
|
|
created the personal computer: It gave them free access to computing power
|
|
anytime they wanted. Today, kids can claim that victory on the Internet
|
|
by authoring a Web page. There is plenty of room for innovation and
|
|
creativity.
|
|
|
|
Today's PCs are as powerful as yesterday's mainframes. With today's PCs,
|
|
no one needs to break the law to explore technology. With the right tools,
|
|
and parental support, kids can earn the respect of their peers and get an
|
|
early start on their future by mastering the latest programming languages.
|
|
If my kid were a hacker, I'd encourage him to shun the instant
|
|
gratification of cracking a Fortune 500 company in favor of the greater
|
|
satisfaction of creating something unique from scratch.
|
|
|
|
Ultimately, that's what hacking really is all about.
|
|
|
|
0x15>------------------------------------------------------------------------
|
|
|
|
Title: Paging Network Hijacked
|
|
By: Chris Oakes
|
|
Date: 4:00am 24.Jul.98.PDT
|
|
|
|
[A non internet hacking article! Woohoo!]
|
|
|
|
Someone in Texas exploited a vulnerability in the PageMart paging network
|
|
this week, sending a flurry of mysterious pages to tiny screens
|
|
nationwide, confusing subscribers, and swamping the company's customer
|
|
service center with phone calls.
|
|
|
|
PageMart said a random discovery enabled the intruder to use a set of
|
|
pager addressing numbers to send messages to entire groups of customers,
|
|
rather than individual subscribers. But a security expert said the system
|
|
may have been hacked.
|
|
|
|
PageMart spokeswoman Bridget Cavanaugh detailed Wednesday's incident in an
|
|
email late Thursday. "A person, unknown to PageMart," she said,
|
|
"discovered that three PINs [personal identification numbers] on our
|
|
paging terminal in Dallas were actually mail drops."
|
|
|
|
[snip...]
|
|
|
|
On Wednesday, PageMart customer and San Francisco resident Jeremiah Kelly
|
|
reported that he received odd messages for a period of about an hour and a
|
|
half on Wednesday afternoon.
|
|
|
|
Upon receiving one incomprehensible page -- unrecognizable in source or
|
|
content -- he suspected a simple "wrong-number" message. "But then, all of
|
|
a sudden, I got a blitz" Kelly said. Most notable was a recurring
|
|
message: "There is only one blu bula."
|
|
|
|
"I received one of those several times," he said. Another pair of messages
|
|
said "Mike, you're Mom drives a Passat," and another was sexually
|
|
suggestive. Both of the latter pages were signed "Christian." Kelly said
|
|
he received about 30 of the senseless messages.
|
|
|
|
[snip...]
|
|
|
|
"The incident impacted about 1.5 percent of our customers nationwide,"
|
|
Cavanaugh said. "Statistically, it's a small number." PageMart provides
|
|
numeric and text paging service in all 50 states, Canada, Mexico, Central
|
|
America, and the Caribbean, serving approximately 2.7 million customers.
|
|
|
|
"It's a perfect example of how overconfidence can eventually cause a
|
|
problem," said Peter Shipley, who analyzes and bolsters system security
|
|
for accounting firm KPMG Peat Marwick.
|
|
|
|
Though it wasn't clear that PageMart's system was actually broken into,
|
|
Shipley said poor protection against break-ins is all too common. "I'm in
|
|
the business of doing these type of security audits, and a large number of
|
|
systems I've seen have easy password access -- under the assumption of
|
|
'why would somebody want to hack it?'"
|
|
|
|
In fact, paging services are responsible for enormously valuable data,
|
|
from billing addresses to credit card information and more, Shipley said.
|
|
Then there are the messages themselves, which can be easily netted as they
|
|
make their way through the airwaves.
|
|
|
|
"Smaller companies believe they are not targets [for hackers]," concluded
|
|
KPMG's Shipley. "But small companies are as equally targeted as large
|
|
companies. They're stepping stones -- the small fish that hackers start
|
|
on."
|
|
|
|
0x16>------------------------------------------------------------------------
|
|
|
|
Title: FBI busts hacker who sold clandestine accounts on PageNet system
|
|
Date: July 30, 1998 7:28 p.m. EDT
|
|
Source: Nando Times
|
|
|
|
PageNet Inc., one of the largest wireless message providers, said U.S.
|
|
federal agents arrested a San Diego man Thursday who allegedly set up
|
|
unauthorized voice mailboxes and paging accounts on its system, costing
|
|
the company about $1 million.
|
|
|
|
[snip...]
|
|
|
|
0x17>------------------------------------------------------------------------
|
|
|
|
Title: EFF DES Cracker Machine Brings Honesty to Crypto Debate
|
|
Date: July 17, 1998
|
|
|
|
"EFF DES CRACKER" MACHINE BRINGS HONESTY TO CRYPTO DEBATE
|
|
ELECTRONIC FRONTIER FOUNDATION PROVES THAT DES IS NOT SECURE
|
|
|
|
SAN FRANCISCO, CA -- The Electronic Frontier Foundation (EFF) today raised
|
|
the level of honesty in crypto politics by revealing that the Data
|
|
Encryption Standard (DES) is insecure. The U.S. government has long
|
|
pressed industry to limit encryption to DES (and even weaker forms),
|
|
without revealing how easy it is to crack. Continued adherence to this
|
|
policy would put critical infrastructures at risk; society should choose a
|
|
different course.
|
|
|
|
To prove the insecurity of DES, EFF built the first unclassified hardware
|
|
for cracking messages encoded with it. On Wednesday of this week the EFF
|
|
DES Cracker, which was built for less than $250,000, easily won RSA
|
|
Laboratory's "DES Challenge II" contest and a $10,000 cash prize. It took
|
|
the machine less than 3 days to complete the challenge, shattering the
|
|
previous record of 39 days set by a massive network of tens of thousands
|
|
of computers. The research results are fully documented in a book
|
|
published this week by EFF and O'Reilly and Associates, entitled "Cracking
|
|
DES: Secrets of Encryption Research, Wiretap Politics, and Chip Design."
|
|
|
|
[snip...]
|
|
|
|
0x18>------------------------------------------------------------------------
|
|
|
|
Title: Hacking site gets hacked
|
|
By: Paul Festa
|
|
Source: CNET News.com
|
|
Date: October 28, 1998, 11:30 a.m. PT
|
|
|
|
Hacking and security news and information site Rootshell.com was the
|
|
subject of its own coverage today after suffering an early morning hack.
|
|
|
|
The hack, preserved here, occurred this morning at 5:12 a.m. PT, according
|
|
to Rootshell. Administrators took the site down after discovering the
|
|
attack at 6 a.m. PT. The site was restored two hours later.
|
|
|
|
"Steps have been taken to prevent re-entry, and full details are now being
|
|
turned over to law enforcement for what we hope will turn into arrests,"
|
|
Rootshell administrator Kit Knox said this morning in a statement.
|
|
|
|
[Hrm. Lets give out scripts that help every clueless script kiddie
|
|
break into thousands of sites worldwide.. then narc off the one
|
|
that breaks into us. Time to face the music. That's like the pot
|
|
calling the kettle black. Name your cliche', they deserved it.]
|
|
|
|
Knox later said that the matter had been turned over to the FBI.
|
|
|
|
The attacker replaced the Rootshell.com front page with a rambling screed
|
|
peppered with profanity as well as references to groups and luminaries in
|
|
the hacking world, including imprisoned hacker and perennial cause Kevin
|
|
Mitnick.
|
|
|
|
The attacker also threatened to hit another hacking news site, AntiOnline.
|
|
|
|
0x19>------------------------------------------------------------------------
|
|
|
|
Title: From Criminals to Web Crawlers
|
|
By: Kristen Philipkoski
|
|
Date: 4:00am 15.Jul.98.PDT
|
|
|
|
A crime-fighting search engine used to fight terrorism and insurance scams
|
|
may soon find a home at one of the Web's top search engines. The system,
|
|
called VCLAS, has helped detectives crack cases all over the world.
|
|
|
|
"In 11 days, the PhoneFraud software helped law-enforcement agencies in
|
|
New York uncover US$1.2 billion in stolen services," said Jay Valentine,
|
|
president and CEO of InfoGlide, the company that owns the VCLAS software
|
|
package.
|
|
|
|
The software is built around a "Similarity Search Engine," which thrives
|
|
on imperfect and complex information, data that engineer David Wheeler
|
|
said often stumps search algorithms based on neural networks.
|
|
|
|
Similarity searching is well-suited to crime work, Wheeler said, because
|
|
investigations are often inherently random and disconnected. For instance,
|
|
if police are looking for a red vehicle, but a witness says it was maroon,
|
|
a traditional keyword search wouldn't register a match since it couldn't
|
|
recognize that the colors are similar.
|
|
|
|
0x1a>------------------------------------------------------------------------
|
|
|
|
Title: Running a Microsoft OS on a Network? Our Condolences
|
|
Date: July 21, 1998
|
|
|
|
[The title alone made this worth including.]
|
|
|
|
The CULT OF THE DEAD COW (cDc) will release Back Orifice, a remote MS
|
|
Windows Administration tool at Defcon VI in Las Vegas (www.defcon.org) on
|
|
August 1. Programmed by Sir Dystic [cDc], Back Orifice is a
|
|
self-contained, self-installing utility which allows the user to control
|
|
and monitor computers running the Windows operating system over a network.
|
|
|
|
Sir Dystic sounded like an overworked sysadmin when he said, "The two main
|
|
legitimate purposes for BO are, remote tech support aid and employee
|
|
monitoring and administering [of a Windows network]."
|
|
|
|
Back Orifice is going to be made available to anyone who takes the time to
|
|
download it. So what does that mean for anyone who's bought into
|
|
Microsoft's Swiss cheese approach to security? Plenty according to Mike
|
|
Bloom, Chief Technical Officer for Gomi Media in Toronto.
|
|
|
|
[snip...]
|
|
|
|
None of this is lost on Microsoft. But then again, they don't care.
|
|
Security is way down on their list of priorities according to security
|
|
expert Russ Cooper of NT BUGTRAQ (www.ntbugtraq.com). "Microsoft doesn't
|
|
care about security because I don't believe they think it affects their
|
|
profit. And honestly, it probably doesn't." Nice. But regardless of which
|
|
side of the firewall you sit on, you can't afford not to have a copy of
|
|
Back Orifice. Here are the specs:
|
|
|
|
[snip...]
|
|
|
|
After August 3, Back Orifice will be available from www.cultdeadcow.com
|
|
free of charge.
|
|
|
|
0x1b>------------------------------------------------------------------------
|
|
|
|
Title: Security expert explains New York Times site break in
|
|
Date: September 18, 1998
|
|
By: Ellen Messmer
|
|
|
|
Although the New York Times is not revealing the details of what happened
|
|
last weekend when it was hijacked by a hacker group, one security expert
|
|
has it figured out.
|
|
|
|
A group of hackers calling themselves Hackers for Girlies broke into the
|
|
Times news site on Sunday. The hackers took control of the site to display
|
|
their own diatribe complete with nude images and to protest the arrest of
|
|
hacker Kevin Mitnick. The Times worked for half a day to regain command of
|
|
its server.
|
|
|
|
Hackers often break in by exploiting security vulnerabilities associated
|
|
with default Common Gateway Interface scripts that ship with Web servers,
|
|
according to Patrick Taylor, director of strategic marketing at Internet
|
|
Security Systems in Atlanta. They exploit these scripts to send a string
|
|
of long commands to cause a buffer overflow that lets them into the
|
|
operating system. They first give themselves an account in the system and
|
|
then stick in a backdoor Trojan horse program such as "rootkit" to gain
|
|
and maintain root control, he said.
|
|
|
|
"CGI scripts are intended to pass commands from the Web server to
|
|
something in the operating system, perhaps to pull database information,"
|
|
Taylor said. "But you should get rid of these superfluous CGI scripts and
|
|
depend on your own custom scripts."
|
|
|
|
The Times may have had a long struggle regaining control of its Web site
|
|
because the latest Trojan horses are designed so well that they hide
|
|
within the operating system, encrypted or even providing the same checksum
|
|
as the legitimate operating system.
|
|
|
|
"It's nefarious--the hacker essentially has remote administration of the
|
|
Web server," Taylor said. "You can't rely on a backup of the machine. You
|
|
may have to reinstall the entire operating system."
|
|
|
|
By coincidence, the Times had once looked at using the ISS security gear,
|
|
but decided not to, he said. The Times declined to discuss any aspect of
|
|
its Web operations, saying it was "a matter of security."
|
|
|
|
[The real reason for this article and quoting a PR person from
|
|
ISS maybe? Fact is, ISS didn't audit the network before OR
|
|
after the breakin. How would this guy know the method they used
|
|
to compromise the machine?]
|
|
|
|
The "Hackers for Girlies" ranted in its own posting to have "busted root"
|
|
on the Times, and directed some invective toward Times reporter John
|
|
Markoff and security expert Tsutomu Shimomura for their respective roles
|
|
in the investigation of hacker Kevin Mitnick, now held in jail. Markoff
|
|
and Shimomura two years ago collaborated on a book entitled "Takedown"
|
|
about the law enforcement pursuit of Mitnick. In its own account, the
|
|
Times said the hacker incident at nytimes.com may be related to an
|
|
upcoming trial in January of Mitnick.
|
|
|
|
While hacker rantings and pornography can be bad enough to discover on a
|
|
Web site, a far more serious scenario involves a hijacker more
|
|
surreptitiously posting information that has been slightly changed,
|
|
leading the reader to view it as authentic.
|
|
|
|
"This could end up like 'War of the Worlds,' where people went into a
|
|
panic because they didn't know what they were hearing on the radio was
|
|
made up," commented Doug Barney, Network World news editor.
|
|
|
|
0x1c>------------------------------------------------------------------------
|
|
|
|
Title: Merriam-Webster Taken Offline Old Fashioned Way
|
|
Date: Wed Aug 5 00:41:57 MDT 1998
|
|
Source: www.m-w.com
|
|
|
|
What happened?
|
|
|
|
On Thursday night, July 30th, the facility that hosts Merriam-Webster's
|
|
Web site was burglarized and its servers were stolen. We've managed to
|
|
restore limited capacity, but we need to obtain new hardware from our
|
|
suppliers before we can return to full service. We hope to have the entire
|
|
site active again in a few days. We apologize for the inconvenience and
|
|
hope you will bear with us as we deal with the situation.
|
|
|
|
Thank you for your patience.
|
|
|
|
--The Merriam-Webster Web Team
|
|
|
|
[Guess we shouldn't put the computer by the window...]
|
|
|
|
0x1d>------------------------------------------------------------------------
|
|
|
|
Title: Long Haired Hacker Works Magic [my title]
|
|
Source: Nando Times
|
|
Date: September 20, 1998
|
|
|
|
The hacker calling himself Mudge pushed his long hair back, scratched his
|
|
beard and stared at the computer screen. He knew there was something wrong
|
|
with the data traffic he was watching, but what was it?
|
|
|
|
A week earlier, Mudge and his fellow hackers in their hangout known as the
|
|
L0pht -- pronounced "loft" -- had acquired some software that was supposed
|
|
to let computers talk to each other in code. But as Mudge watched the data
|
|
he realized someone else was doing the same and maybe even decoding it,
|
|
which shouldn't happen.
|
|
|
|
"So you are saying that you're using DES to communicate between the
|
|
computers?" Mudge recalled asking representatives of the software maker.
|
|
Yes, they said, they were using DES, a standard encryption method that for
|
|
years was considered virtually uncrackable.
|
|
|
|
But this wasn't DES, thought Mudge. It's almost as if...
|
|
|
|
Whoa. He blinked and felt the adrenaline kick in. This wasn't secure at
|
|
all. In fact, the encoding was only slightly more complex than the simple
|
|
ciphers kids did in grade school -- where "A" is set to 1, "B" is set to
|
|
2, and so on.
|
|
|
|
The company was selling this software as a secure product, charging
|
|
customers up to $10,000. And yet, it had a security hole big enough to
|
|
waltz through.
|
|
|
|
Instead of exploiting this knowledge, Mudge confronted the company.
|
|
|
|
"You realize there isn't any secure or 'strong' encoding being used in
|
|
your communications between the computers, don't you?" he asked.
|
|
|
|
"Well..."
|
|
|
|
"And that you claimed you were using DES to encrypt the data," he pressed.
|
|
|
|
"That will go in the next revision."
|
|
|
|
Mudge is a "real" hacker -- one who used to snoop around the nation's
|
|
electronic infrastructure for the sheer love of knowing how it worked. His
|
|
kind today are sighted about as often as the timberwolf, and society has
|
|
attached to them the same level of legend.
|
|
|
|
Like the wolf, they were once considered a scourge. Law enforcement and
|
|
telecommunication companies investigated and arrested many of them during
|
|
the late 1980s and early '90s.
|
|
|
|
Today, many elite hackers of the past are making a go at legitimate work,
|
|
getting paid big bucks by Fortune 500 companies to explore computer
|
|
networks and find the weak spots.
|
|
|
|
And none too soon. The void left by the old hackers has been filled by a
|
|
new, more destructive generation.
|
|
|
|
So today, Mudge -- who uses a pseudonym like others in the hacker
|
|
community, a world where anonymity keeps you out of trouble -- wears a
|
|
white hat. As part of L0pht, the hacker think tank, he and six comrades
|
|
hole up in a South End loft space in Boston and spend their evenings
|
|
peeling open software and computer networks to see how they work.
|
|
|
|
When they find vulnerabilities in supposedly secure systems, they publish
|
|
their findings on the Web in hopes of embarrassing the companies into
|
|
fixing the problems. A recent example: They posted notice via the Internet
|
|
of a problem that makes Lotus Notes vulnerable to malicious hackers...
|
|
|
|
A Lotus spokesman said the company was aware of the flaw but it was
|
|
extremely technical and unlikely to affect anyone.
|
|
|
|
The hackers at L0pht have made enemies among industry people, but they
|
|
command respect. They were even called to testify before the U.S. Senate
|
|
Committee on Governmental Affairs in May.
|
|
|
|
Why do they publish what they find?
|
|
|
|
"If that information doesn't get out," Mudge replies, "then only the bad
|
|
guys will have it."
|
|
|
|
The "bad guys" are the hacker cliche: secretive teens lurking online,
|
|
stealing credit card numbers, breaking into Pentagon systems, and
|
|
generally causing trouble. One of L0pht's members, Kingpin, was just such
|
|
a cad when he was younger, extending his online shenanigans to real-world
|
|
breaking and entering. Today, L0pht keeps him out of mischief, he said.
|
|
|
|
"We're like midnight basketball for hackers," said Weld Pond, another
|
|
member.
|
|
|
|
****
|
|
|
|
Malicious hacking seems to be on the rise.
|
|
|
|
Nearly two out of three companies reported unauthorized use of their
|
|
computer systems in the past year, according to a study by the Computer
|
|
Security Institute and the FBI. Another study, from Software AG Americas,
|
|
said 7 percent of companies reported a "very serious" security breach,
|
|
and an additional 16 percent reported "worrisome" breaches. However, 72
|
|
percent said the intrusions were relatively minor with no damage.
|
|
|
|
American companies spent almost $6.3 billion on computer security last
|
|
year, according to research firm DataQuest. The market is expected to grow
|
|
to $13 billion by 2000.
|
|
|
|
Government computers are vulnerable, too. The Defense Department suffered
|
|
almost 250,000 hacks in 1995, the General Accounting Office reported. Most
|
|
were detected only long after the attack.
|
|
|
|
This is why business booms for good-guy hackers.
|
|
|
|
Jeff Moss, a security expert with Secure Computing Inc., runs a
|
|
$995-a-ticket professional conference for network administrators, where
|
|
hackers-cum-consultants mingle with military brass and CEOs.
|
|
|
|
"I don't feel like a sellout," said Moss, who wouldn't elaborate on his
|
|
hacking background. "People used to do this because they were really into
|
|
it. Now you can be into it and be paid."
|
|
|
|
News reports show why such services are needed:
|
|
|
|
----Earlier this month, hackers struck the Web site of The New York Times,
|
|
forcing the company to shutter it for hours. Spokeswoman Nancy Nielsen
|
|
said the break-in was being treated as a crime, not a prank. The FBI's
|
|
computer crime unit was investigating.
|
|
|
|
----This spring, two California teenagers were arrested for trying to hack
|
|
the Pentagon's computers. Israeli teen Ehud Tenebaum, also known as "The
|
|
Analyzer," said he mentored the two on how to do it. The two Cloverdale,
|
|
Calif., youths pleaded guilty in late July and were placed on probation.
|
|
|
|
----Kevin Mitnick, the only hacker to make the FBI's 10 Most Wanted list,
|
|
was arrested in 1995, accused of stealing 20,000 credit card numbers. He
|
|
remains in prison. A film called "TakeDown," about the electronic
|
|
sleuthing that led to Mitnick's capture, is in the works. Comments
|
|
protesting Mitnick's prosecution were left during the hack of the New York
|
|
Times Web site.
|
|
|
|
----In 1994, Vladimir Levin, a graduate of St. Petersburg Tekhnologichesky
|
|
University, allegedly masterminded a Russian hacker gang and stole $10
|
|
million from Citibank computers. A year later, he was arrested by Interpol
|
|
at Heathrow airport in London.
|
|
|
|
******
|
|
|
|
"Lemme tell ya," growled Mark Abene one night over Japanese steak skewers.
|
|
"Kids these days, they got no respect for their elders."
|
|
|
|
Abene, known among fellow hackers as Phiber Optik, should know. He was one
|
|
of those no-account kids in the 1980s when he discovered telephones and
|
|
computers. For almost 10 years, he wandered freely through the nation's
|
|
telephone computer systems and, oh, the things he did and saw.
|
|
|
|
Celebrities' credit reports were his for the taking. Unlimited free phone
|
|
calls from pilfered long-distance calling card numbers. Private phone
|
|
lines for his buddies, not listed anywhere. And the arcane knowledge of
|
|
trunk lines, switches, the entire glory of the network that connected New
|
|
York City to the rest of the world.
|
|
|
|
But Abene's ticket to ride was canceled in January 1994, when, at age 22,
|
|
he entered Pennsylvania's Schuylkill Prison to begin serving a
|
|
year-and-a-day sentence for computer trespassing. The FBI and the Secret
|
|
Service described him as a menace. The sentencing judge said Abene, as a
|
|
spokesman for the hacking community, would be made an example.
|
|
|
|
And yet, to many in the digital community, Abene's offenses amounted to
|
|
unbridled curiosity. He was just a kid poking around, doing what teen boys
|
|
do, going to places they're told to avoid.
|
|
|
|
"Phree Phiber Optik" pins appeared. Many felt Abene embodied the hacker
|
|
ethic espoused by his friend and fellow hacker, Paul Stira: "Thou Shalt
|
|
Not Destroy."
|
|
|
|
With black hair parted in the middle and falling to the center of his
|
|
back, a thin beard ringing his mouth, the 26-year-old Abene still looks
|
|
like a mischievous kid. Hacking, he said, is hardwired in boys. When they
|
|
play with toys when they're young, they break them, then try to figure out
|
|
how the parts fit back together.
|
|
|
|
He added, "For some of us, it just never goes away."
|
|
|
|
******
|
|
|
|
Still, the hackers of the 1980s and early '90s have grown up. Some got
|
|
busted, others simply graduated from college and fell out of the scene.
|
|
|
|
Today, many want to be seen as mainstream, said Jeremy Rauch, a network
|
|
security expert for Secure Computing Inc. When it's time to talk
|
|
consulting contracts with major corporations, the hair gets neatly combed,
|
|
the suit replaces the combat boots and black T-shirt, and the
|
|
counterculture rhetoric gets toned down.
|
|
|
|
A hacker in San Francisco who edits the online publication Phrack and goes
|
|
by the pseudonym Route talks about his job at a security firm as a sign of
|
|
maturity. Contentedly, he notes he can work from home, write as much code
|
|
as he can and never punch a clock.
|
|
|
|
"Are there still hackers out there?" asked Mike Godwin, counsel for the
|
|
Electronic Frontier Foundation, a cyber-rights group. In the early 1990s,
|
|
he pushed hard for the organization to champion Abene and other members of
|
|
the cyber gang Masters of Deception. By 1993, he said, hysteria
|
|
surrounding hackers began to sputter, to be replaced by a fear of
|
|
pornography.
|
|
|
|
"There never were very many hackers," he said, not major ones, anyway.
|
|
Mainly, they were and are "this tiny minority of 13- to 18-year-olds who
|
|
learned how to make toll-calls for free."
|
|
|
|
Today's younger hackers pull programs off the Web that sniff for passwords
|
|
and unlock backdoors automatically. It's the equivalent of rattling every
|
|
door on a street and finally getting lucky, chancing upon one that's
|
|
unlocked.
|
|
|
|
As for the true hackers of the first generation, Godwin said: "These guys
|
|
are genuinely smart and genuinely have a fascination with the technology.
|
|
And they're mostly harmless."
|
|
|
|
*********
|
|
|
|
What do younger hackers say to all this?
|
|
|
|
Not much, if you judge by interviews at DefCon6.0, the sixth annual hacker
|
|
forum and party held in Las Vegas at the end of July.
|
|
|
|
Some said they hack to learn. Others took a counter-culture stance:
|
|
hacking as civil disobedience. They wouldn't give names or talk
|
|
specifically about any criminal activities. It was as if they wanted to
|
|
present themselves as blank slates, upon which the fears of their
|
|
non-wired elders could be inscribed.
|
|
|
|
At DefCon, they set off stink bombs at one point, and pulled other
|
|
juvenile pranks.
|
|
|
|
"Paging Mr. Mitnick," the intercom droned through the hotel-casino's
|
|
meeting rooms. The unwitting hotel staff member repeated the call for the
|
|
jailed hacker. "Paging Mr. Kevin Mitnick."
|
|
|
|
Pony-tailed guys dressed in black smirked. Gotcha.
|
|
|
|
As hard house and techno music provided a soundtrack, they drooled over
|
|
new software and pawed through piles of stuff for sale: computer
|
|
equipment, of course, but also more books on conspiracy, privacy
|
|
protection, and police methods than any paranoid could want.
|
|
|
|
Among the titles: "Scanners & Secret Frequencies," "Secrets of a Super
|
|
Hacker," even "Throbbing Modems."
|
|
|
|
The kids flocked to DefCon's talk by the "white hat" hackers of L0pht.
|
|
|
|
"We're in the middle generation right now," said convention organizer
|
|
Moss. "You've got your original hackers from MIT -- the old school -- who
|
|
are established. They're the forefathers of this information revolution.
|
|
And you've got us who watched computers go from mainframe to desktop to
|
|
laptop. And you've got the younger generation that have always known
|
|
computers."
|
|
|
|
0x1e>------------------------------------------------------------------------
|
|
|
|
Title: Body of Evidence
|
|
By: Beverly Hanly
|
|
Date: 4:00am 5.Aug.98.PDT
|
|
|
|
Real criminals are tried in real courts, so why shouldn't virtual
|
|
criminals be tried in virtual courts?
|
|
|
|
A handful of legal scholars from the Institute on the Arts and Civic
|
|
Dialogue (IACD) are mulling over the question and will convene Wednesday
|
|
to discuss whether virtual courts are the best forum for cybercrime trials
|
|
and if a virtual legal system could lead to new legal processes regarding
|
|
real world crimes.
|
|
|
|
The experts will join multimedia artist Shu Lea Cheang, creator of the
|
|
Brandon project, for a webcast forum from 8 to 11 pm, EDT, at the Harvard
|
|
Law School.
|
|
|
|
The group will play out a fictitious courtroom drama based on several
|
|
disputes involving cyberetiquette, gender identity, and the hazy line
|
|
between fantasy vs. reality as the first public forum in the year-long
|
|
Brandon project commissioned by New York's Guggenheim Museum. Brandon
|
|
explores issues of gender identity and the consequences of experimenting
|
|
with sexuality in real life and in cyberspace.
|
|
|
|
The ongoing media and legal debate regarding hate speech and the
|
|
proliferation of sexual content on the Internet and whether or not these
|
|
are harmful -- and to whom -- is the territory the mock trial will cover.
|
|
|
|
Harvard theater director Liz Diamond will collaborate with Cheang to guide
|
|
the group as they dramatize elements drawn from real-life sexual assault
|
|
cases, including that of the project's namesake Teena Brandon, a
|
|
transsexual who was murdered in Nebraska in 1993. Other cases will involve
|
|
a virtual trial for "cyberrape," a MUD character named Mr. Bungle, and
|
|
the FBI arrest of Michigan student Jake Baker for his rape-and-murder
|
|
fantasy about a fellow student posted to a Usenet newsgroup in 1994.
|
|
|
|
Actors will play the roles of victims and perpetrators, while professors
|
|
from Harvard, University of Virginia, and Columbia law schools will act as
|
|
"standing jurors" to examine and comment on the legalities.
|
|
|
|
"This is a venue where you can experiment with the process and substance
|
|
of these [cyberlaw] cases," said Jennifer Mnookin, professor of law at
|
|
Virginia's School of Law in Charlottesville, who will sit in on the
|
|
session. She feels that virtual worlds like LambdaMOO can provide a new
|
|
and more appropriate arena for dispute resolution.
|
|
|
|
"Part of what's at issue here is how much someone can be hurt with words,"
|
|
said Mnookin. "Someone who commits a violation in cyberspace shouldn't
|
|
necessarily be subject to consequences in real courtrooms. Something like
|
|
the LambdaMOO 'cyberrape' was appropriately settled in a virtual court.
|
|
The perpetrator was expelled from that world, his virtual identity was
|
|
annihilated -- he was 'toaded.' What is a violation in one world might not
|
|
be in another."
|
|
|
|
Virtual penalties can translate from one world to the other as well.
|
|
Cheang, in her virtual court, suggests the idea of "virtual castration" as
|
|
an alternative to "chemical castration" advocated by some as a way of
|
|
dealing with sexual offenders.
|
|
|
|
The August public event in Cambridge, Massachusetts, is the first time
|
|
since the Brandon project began on 20 June that Cheang will be able to
|
|
interact with both a live and a Net audience.
|
|
|
|
"The test will serve as a base toward constructing a digiarchitextual
|
|
space of a virtual court at the Guggenheim's [proposed] virtual museum,"
|
|
said Cheang, who will collaborate with an architect of physical spaces to
|
|
create a "courtroom" at the museum. "My work has always fused actual and
|
|
virtual space."
|
|
|
|
Netizens need nothing more than an Internet connection to tune in to the
|
|
mock trial. But Cheang also wants to include a public that has no access
|
|
to Net technology.
|
|
|
|
Anyone in the Harvard area who's interested can physically attend the
|
|
staged trial. In New York, street audiences can visit the Guggenheim
|
|
SoHo's video wall, which is made up of 75 contiguous 40-inch projection
|
|
cubes. The video wall will display images from the Brandon project and
|
|
audiences will be able to interact at scheduled times.
|
|
|
|
"We're not sure how the 'experimentation' with the audience will go," said
|
|
Cheang. "Maybe we'll fail badly. But it is this uncertainty, this feeling
|
|
that we're exploring new ground in public interaction that is most
|
|
exciting for me and my collaborators here at the Institute."
|
|
|
|
Law professor Mnookin looks at the experiment as a venue that can open up
|
|
the dialog on cyberlaw issues. "What's interesting to me about 'virtual
|
|
law' is that it's much more obvious than in the real world that the rules
|
|
are malleable, that they're created by the participants.
|
|
|
|
"In the real world, it's easy to take the legal processes for granted, to
|
|
assume that [those processes] can't easily be transformed," she continued.
|
|
"If virtual worlds are used as laboratories, it's easier to recognize the
|
|
possibilities for change -- both within a virtual environment, and, just
|
|
maybe, in the real world as well."
|
|
|
|
The Brandon Project is hosted at Harvard in conjunction with the brand-new
|
|
IACD until 14 August. IACD puts artists in various media together with a
|
|
community of scholars, journalists, and civic activists to explore current
|
|
events and controversies.
|
|
|
|
After the test trial, Cheang will move on to Amsterdam, Netherlands, to
|
|
begin setting up the next live installation of the project: "Digi Gender,
|
|
Social Body: Under the Knife, Under the Spell of Anesthesia," to be
|
|
webcast in September 1998. "Would the Jurors Please Stand Up? Crime and
|
|
Punishment as Net Spectacle" is scheduled for May 1999.
|
|
|
|
0x1f>------------------------------------------------------------------------
|
|
|
|
Title: The Golden Age of Hacktivism
|
|
By: Niall McKay
|
|
Date: 4:00a.m. 22.Sep.98.PDT
|
|
|
|
On the eve of Sweden's general election, Internet saboteurs targeted the
|
|
Web site of that country's right-wing Moderates political party, defacing
|
|
pages and establishing links to the homepages of the left-wing party and a
|
|
pornography site.
|
|
|
|
But the Scandanavian crack Saturday was not the work of bored juveniles
|
|
armed with a Unix account, a slice of easily compiled code, and a few
|
|
hours to kill. It advanced a specific political agenda.
|
|
|
|
"The future of activism is on the Internet," said Stanton McCandlish,
|
|
program director of the Electronic Frontier Foundation. "More and more,
|
|
what is considered an offline issue, such as protesting the treatment of
|
|
the Zapatistas in Mexico, is being protested on the Net."
|
|
|
|
In the computer-security community, it's called "hacktivism," a kind of
|
|
electronic civil disobedience in which activists take direct action by
|
|
breaking into or protesting with government or corporate computer systems.
|
|
It's a kind of low-level information warfare, and it's on the rise.
|
|
|
|
Last week, for example, a group of hackers called X-pilot rewrote the home
|
|
page of a Mexican government site to protest what they said were instances
|
|
of government corruption and censorship. The group, which did not reply
|
|
to several emails, made the claims to the Hacker News Network. The
|
|
hacktivists were bringing an offline issue into the online world,
|
|
McClandish said.
|
|
|
|
The phenomenon is becoming common enough that next month, the longtime
|
|
computer-security group, the Cult of the Dead Cow will launch the resource
|
|
site hacktivism.org. The site will host online workshops, demonstrations,
|
|
and software tools for digital activists.
|
|
|
|
"We want to provide resources to empower people who want to take part in
|
|
activism on the Internet," said Oxblood Ruffian, a former United Nations
|
|
consultant who belongs to the Cult of the Dead Cow.
|
|
|
|
Oxblood Ruffian's group is no newcomer to hacktivism. They have been
|
|
working with the Hong Kong Blondes, a near-mythical group of Chinese
|
|
dissidents that have been infiltrating police and security networks in
|
|
China in an effort to forewarn political targets of imminent arrests.
|
|
|
|
In a recent Wired News article, a member of the group said it would target
|
|
the networks and Web sites of US companies doing business with China.
|
|
|
|
Other recent hacktivist actions include a wave of attacks in August that
|
|
drew attention to alleged human rights abuses in Indonesia. In June,
|
|
attacks on computer systems in India's atomic energy research lab
|
|
protested that country's nuclear bomb tests.
|
|
|
|
More recently, on Mexican Independence Day, a US-based group called
|
|
Electronic Disturbance Theater targeted the Web site of Mexican President
|
|
Ernesto Zedillo. The action was intended to protest Zedillo's alleged
|
|
mistreatment of the Zapatista rebels in Chiapas. Nearly 8,000 people
|
|
participated in the digital sit-in, which attempted to overwhelm the
|
|
Mexican president's Web servers.
|
|
|
|
"What we are trying to do is to find a place where the public can register
|
|
their dissatisfaction in cyberspace, so that your everyday [mouse] clicker
|
|
can participate in a public protest," said EDT co-founder Ricardo.
|
|
|
|
The apparent increase in hacktivism may be due in part to the growing
|
|
importance of the Internet as a means of communication. As more people go
|
|
online, Web sites become high-profile targets.
|
|
|
|
It also demonstrates that many government sites are fairly easy to crack,
|
|
said one former member of Milw0rm, the now defunct group that defaced the
|
|
Indian research lab's Web site. In an interview in Internet Relay Chat,
|
|
the cracker rattled off a list of vulnerable US government Web sites --
|
|
including one hosting an electron particle accelerator and another of a US
|
|
politician -- and their susceptibility to bugs.
|
|
|
|
"They don't pay enough for computer people," said the cracker, who goes by
|
|
the name t3k-9. "You get $50,000 for a $150,000 job."
|
|
|
|
Some security experts also believe that there is a new generation of
|
|
crackers emerging. "The rise in political cracking in the past couple of
|
|
years is because we now have the first generation of kids that have grown
|
|
up with the Net," John Vranesevich, founder of the computer security Web
|
|
site AntiOnline. "The first generation of the kids that grew up hacking
|
|
are now between 25 and 35 - often the most politically active years in
|
|
peoples' lives."
|
|
|
|
"When the Cult of the Dead Cow was started in 1984, the average age [of
|
|
our members] was 14, and they spent their time hacking soda machines,"
|
|
said Oxblood Ruffian. "But the last couple of years has marked a turning
|
|
point for us. Our members are older, politicized, and extremely
|
|
technically proficient."
|
|
|
|
While hacktivists are lining up along one border, police and law
|
|
enforcement officials are lining up along another.
|
|
|
|
This year the FBI will establish a cyber warfare center called the
|
|
National Infrastructure Protection Center. The US$64 million organization
|
|
will replace the Computer Investigations and Infrastructure Threat
|
|
Assessment Center and involve the intelligence community and the military.
|
|
|
|
Allan Paller, director of research for the SANS Institute, said the FBI is
|
|
staffing the new facility with the government's top security experts.
|
|
"They are stealing people from good places, including a woman from the
|
|
Department of Energy who was particularly good," he said in a recent
|
|
interview. "They are taking brilliant people."
|
|
|
|
Paller also said that a grassroots effort is under way in Washington to
|
|
establish a National Intrusion Center, modeled after the Centers for
|
|
Disease Control.
|
|
|
|
"There is definitely an increased threat of cyber terrorism," said Stephen
|
|
Berry, spokesman for the FBI press office in Washington.
|
|
|
|
As offline protests -- which are protected in the United States by the
|
|
constitution -- enter the next digital age, the question remains: How will
|
|
the FBI draw the distinction between relatively benign online political
|
|
protests and cyber terrorism?
|
|
|
|
0x20>------------------------------------------------------------------------
|
|
|
|
Title: Phrack straddles the world of hackers
|
|
Source: Nando Times
|
|
Date: September 20, 1998
|
|
|
|
The lines of text scrolled off the screen quickly, but the bleached-blond
|
|
hacker snatched quick glances at the visitors' log on his Web page. Lots
|
|
of visitors using military and government computers. The hacker, who calls
|
|
himself Route, said he always gets a kick out of the feds' visits. He
|
|
smiled.
|
|
|
|
The FBI, the CIA and the others "wouldn't be doing their job if they
|
|
weren't tracking computer information both legitimate and illegitimate,"
|
|
Route said. "I guess Phrack falls somewhere in between."
|
|
|
|
Phrack is an online publication called a 'zine. It's a digital chimera:
|
|
written for hackers but read by law enforcement, too. It's been the
|
|
subject of federal prosecution, yet it still operates in the open. Its
|
|
name combines "hack" and "phreak," which refers to phone hacking.
|
|
|
|
It's got attitude, technical know-how and in many ways defines today's
|
|
hacker scene. It first hit the electronic bulletin boards Nov. 17, 1985,
|
|
ages ago in hacker years.
|
|
|
|
To put its longevity in perspective, Phrack came out two years after the
|
|
movie "WarGames" in which actor Matthew Broderick established the
|
|
now-cliched image of the hacker as the lonely kid who altered his grades
|
|
with a computer. Phrack predates the World Wide Web by almost a decade.
|
|
And Phrack is older than many of its readers, who number about 8,000, said
|
|
Route, who refuses to give his real name.
|
|
|
|
Route, 24, doesn't look like the scrawny computer nerd with the
|
|
cathode-ray pallor so many think of when the word hacker is mentioned.
|
|
Silver earrings dangle from each ear and a bar pierces his tongue. Spidery
|
|
tattoos creep down his shoulders and over biceps grown solid with hours of
|
|
iron work.
|
|
|
|
Behind his glower lies a keen mind that cuts through computer network
|
|
problems like a digital knife, an invaluable skill for his day job at a
|
|
computer security firm with Fortune 500 companies for clients. Route
|
|
refused to name his company.
|
|
|
|
Phrack's improbable history begins in 1985 when a hacker with the handle
|
|
Taran King cobbled together various subversive texts that had been
|
|
circulating like Soviet-era samizdat on the archipelago of underground
|
|
electronic bulletin boards. It included all sorts of mischief-making:
|
|
"How to Pick Master Locks," "How to Make an Acetylene Bomb" and
|
|
"School/College Computer Dial-Ups."
|
|
|
|
But Phrack found itself the focus of federal prosecution in 1990, when
|
|
editor Craig Neidorf, also known as Knight Lightning, was prosecuted by
|
|
the Chicago Computer Fraud and Abuse Task Force. His alleged crime? He
|
|
published a document in Phrack with certain details of the emergency 911
|
|
systems in use around the country. It had been given to him by another
|
|
hacker who had copied it from computers owned by BellSouth, which valued
|
|
it at almost $80,000.
|
|
|
|
But the task force wanted to prove the document was more than valuable.
|
|
Assistant U.S. Attorney William J. Cook said it put dangerous information
|
|
in the hands of hackers.
|
|
|
|
The case fell apart when Neidorf's lawyer proved that more detailed
|
|
information about the system had appeared in other publications. You could
|
|
order them from phone company technical catalogs for $13. The charges were
|
|
dropped. Neidorf's trial was over.
|
|
|
|
If today's Phrack is a bit less confrontational, that's understandable.
|
|
Like many of the older hackers, Route is shifting his focus away from
|
|
anarchy texts and phone hacking to computer security. Its "how-to" days
|
|
are pretty much over.
|
|
|
|
"Phrack is not meant to be a manual of vulnerabilities," he said.
|
|
|
|
As the editor, Route knows that Phrack can still be used for illegal
|
|
purposes. "But you can't hold people completely liable for just putting
|
|
information out there."
|
|
|
|
He said he has had "blatantly illegal stuff" sent to him. Once, he said he
|
|
received the technical specifications for most pager systems used in the
|
|
country, complete with how to hack those systems. He didn't publish.
|
|
|
|
"It's a judgment call," he said. "I have no intention of running up
|
|
against the law or (upsetting) the military."
|
|
|
|
But it's almost guaranteed that something gleaned from Phrack will be used
|
|
against the computer system of a big and powerful organization or
|
|
business.
|
|
|
|
"The scene is going to do what the scene is going to do," he said. "It's
|
|
like any clique in society. You have good people and you have bad people."
|
|
|
|
0x21>------------------------------------------------------------------------
|
|
|
|
Title: Cops see little hope in controlling computer crime
|
|
By: Rob Lemos,
|
|
Source: ZDNN
|
|
Date: August 6, 1998 10:16 AM PT
|
|
|
|
Despite making headway combating high-tech criminals, law enforcement
|
|
officials say they remain worried about their ability to investigate and
|
|
prosecute cyber crimes. Encryption, anonymity, and the jurisdictional
|
|
problems posed by a global Internet are quickly turning from small
|
|
headaches to full-blown migraines for local, state, and federal police
|
|
forces.
|
|
|
|
"It's hard to predict where we will be in 10 years," said Scott Charney,
|
|
chief of the computer crime and intellectual property section of the U.S.
|
|
Department of Justice. "But there are going to be all sorts of birthing
|
|
pains." Charney gathered here with other computer-savvy law enforcement
|
|
officials to attend an international symposium on criminal justice issues
|
|
at the University of Illinois at Chicago. The symposium focused on
|
|
high-tech crime, cyber-terrorism, and information warfare.
|
|
|
|
Invisible criminals Law enforcement officers say one of their biggest
|
|
challenges paradoxically remains knowing when a crime is committed.
|
|
|
|
According to the General Accounting Office, there were 250,000 attempted
|
|
break-ins at the Department of Defense in 1995. NASA estimates that
|
|
crackers -- hacker criminals -- broke in to over 120,000 of its systems in
|
|
1996. Yet, few of those incidents are detected, much less reported. When
|
|
DOD hackers broke into their own servers in 1996 and 1997, they attacked
|
|
38,000 machines. Only four percent of the incidents were detected. Out of
|
|
that number, only 27 percent of detected break-ins were reported.
|
|
|
|
"We will get better," said Doris Gardner, an investigator with the
|
|
National Infrastructure Protection Center, a new federal agency
|
|
established to fight computer crime. "We need to educate -- to work better
|
|
with each other."
|
|
|
|
Pandora's box
|
|
|
|
Yet, even as law enforcement is educating itself on the challenges ahead,
|
|
experts here said cyber-criminals continue to refine their abilities.
|
|
|
|
According to the DOJ's Charney, the number of cases involving encrypted
|
|
data climbed from three percent in 1996 to seven percent in 1997. If that
|
|
trend continues, he said, the only tactic left for law enforcement is to
|
|
increase its surveillance capabilities.
|
|
|
|
"If privacy advocates get their way on encryption," said Charney, "they
|
|
may not be happy."
|
|
|
|
With no way to read into encrypted electronic documents, he added, the FBI
|
|
and others will have to rely on capturing the evidence at the source. "And
|
|
that could really decrease privacy."
|
|
|
|
Even so, there are other ways around encryption. In 1996, when an ISP
|
|
reported that its system had been cracked, all FBI leads ran into brick
|
|
walls. Luckily, the cracker, Carlos Salgado Jr. -- who had stolen over
|
|
100,000 credit card numbers worth more than an estimated $160 million --
|
|
found a potential buyer who suspected his credit card was one of the ones
|
|
on the block to be sold. The "buyer" contacted the FBI and became a
|
|
cooperative witness in the case.
|
|
|
|
Despite Salgado's extensive use of encryption -- both his e-mails and the
|
|
actual credit-card data were encrypted -- the FBI had no problems
|
|
collecting evidence, because their witness received all the codes from
|
|
Salgado.
|
|
|
|
Luck, or a trend? It's too early to tell, but Gardner, for one, seems
|
|
positive on the FBI's ability to prosecute. "If we know about it," she
|
|
said, "we can usually prosecute it."
|
|
|
|
----[ EOF
|