| ==Phrack Inc.== | |
| Volume Four, Issue Forty-One, File 12 of 13 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN Phrack World News PWN | |
| PWN PWN | |
| PWN Issue 41 / Part 2 of 3 PWN | |
| PWN PWN | |
| PWN Compiled by Datastream Cowboy PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Government Cracks Down On Hacker November 2, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Donald Clark (The San Francisco Chronicle)(Page C1) | |
| "Civil Libertarians Take Keen Interest In Kevin Poulsen Case" | |
| Breaking new ground in the war on computer crime, the Justice Department plans | |
| to accuse Silicon Valley's most notorious hacker of espionage. | |
| Kevin Lee Poulsen, 27, touched off a 17-month manhunt before being arrested on | |
| charges of telecommunications and computer fraud in April 1991. A federal | |
| grand jury soon will be asked to issue a new indictment charging Poulsen with | |
| violating a law against willfully sharing classified information with | |
| unauthorized persons, assistant U.S. attorney Robert Crowe confirmed. | |
| A 1988 search of Poulsen's Menlo Park storage locker uncovered a set of secret | |
| orders from a military exercise, plus evidence that Poulsen may have tried to | |
| log onto an Army data network and eavesdropped on a confidential investigation | |
| of former Philippine President Ferdinand Marcos. It is not clear whether the | |
| new charge stems from these or other acts. | |
| Poulsen did not hand secrets to a foreign power, a more serious crime, Crowe | |
| noted. But by using an espionage statute against a U.S. hacker for the first | |
| time, prosecutors raise the odds of a record jail sentence that could be used | |
| to deter other electronic break-ins. | |
| They could use a stronger deterrent. Using personal computers connected to | |
| telephone lines, cadres of so-called cyberpunks have made a sport of tapping | |
| into confidential databases and voicemail systems at government agencies and | |
| corporations. Though there is no reliable way to tally the damage, a 1989 | |
| survey indicated that computer crimes may cost U.S. business $500 million a | |
| year, according to the Santa Cruz-based National Center for Computer Crime | |
| Data. | |
| Telephone companies, whose computers and switching systems have long been among | |
| hackers' most inviting targets, are among those most anxious to tighten | |
| security. Poulsen allegedly roamed at will through the networks of Pacific | |
| Bell, for example, changing records and even intercepting calls between Pac | |
| Bell security personnel who were on his trail. | |
| The San Francisco-based utility has been intimately involved in his | |
| prosecution; Poulsen was actually captured in part because one of the company's | |
| investigators staked out a suburban Los Angeles supermarket where the fugitive | |
| shopped. | |
| "Virtually everything we do these days is done in a computer --your credit | |
| cards, your phone bills," said Kurt von Brauch, a Pac Bell security officer who | |
| tracked Poulsen, in an interview last year. "He had the knowledge to go in | |
| there and alter them." | |
| BROAD LEGAL IMPACT | |
| Poulsen's case could have broad impact because of several controversial legal | |
| issues involved. Some civil libertarians, for example, question the Justice | |
| Department's use of the espionage statute, which carries a maximum 10-year | |
| penalty and is treated severely under federal sentencing guidelines. They | |
| doubt the law matches the actions of Poulsen, who seems to have been motivated | |
| more by curiosity than any desire to hurt national security. | |
| "Everything we know about this guy is that he was hacking around systems for | |
| his own purposes," said Mike Godwin, staff counsel for the Electronic Frontier | |
| Foundation, a public-interest group that has tracked Poulsen's prosecution. He | |
| termed the attempt to use the statute against Poulsen "brain-damaged." | |
| Poulsen, now in federal prison in Pleasanton, has already served 18 months in | |
| jail without being tried for a crime, much less convicted. Though federal | |
| rules are supposed to ensure a speedy trial, federal judges can grant extended | |
| time to allow pretrial preparation in cases of complex evidence or novel legal | |
| issues. | |
| Both are involved here. After he fled to Los Angeles to avoid prosecution, | |
| for example, Poulsen used a special scrambling scheme on one computer to make | |
| his data files unintelligible to others. It has taken months to decode that | |
| data, and the job isn't done yet, Crowe said. That PC was only found because | |
| authorities intercepted one of Poulsen's phone conversations from jail, other | |
| sources said. | |
| CHARGES LABELED ABSURD | |
| Poulsen declined requests for interviews. His attorney, Paul Meltzer, terms | |
| the espionage charge absurd. He is also mounting several unusual attacks on | |
| parts of the government's original indictment against Poulsen, filed in 1989. | |
| He complains, for example, that the entire defense team is being subjected to | |
| 15-year background checks to obtain security clearances before key documents | |
| can be examined. | |
| "The legal issues are fascinating," Meltzer said. "The court will be forced to | |
| make law." | |
| Poulsen's enthusiasm for exploring forbidden computer systems became known to | |
| authorities in 1983. The 17-year-old North Hollywood resident, then using the | |
| handle Dark Dante, allegedly teamed up with an older hacker to break into | |
| ARPAnet, a Pentagon-organized computer network that links researchers and | |
| defense contractors around the country. He was not charged with a crime because | |
| of his age. | |
| Despite those exploits, Poulsen was later hired by SRI International, a Menlo | |
| Park-based think tank and government contractor, and given an assistant | |
| programming job with a security clearance. Though SRI won't comment, one | |
| source said Poulsen's job involved testing whether a public data network, by | |
| means of scrambling devices, could be used to confidentially link classified | |
| government networks. | |
| But Poulsen apparently had other sidelines. Between 1985 and 1988, the Justice | |
| Department charges, Poulsen burglarized or used phony identification to sneak | |
| into several Bay Area phone company offices to steal equipment and confidential | |
| access codes that helped him monitor calls and change records in Pac Bell | |
| computers, prosecutors say. | |
| CACHE OF PHONE GEAR | |
| The alleged activities came to light because Poulsen did not pay a bill at the | |
| Menlo/Atherton Storage Facility. The owner snipped off a padlock on a storage | |
| locker and found an extraordinary cache of telephone paraphernalia. A 19-count | |
| indictment, which also named two of Poulsen's associates, included charges of | |
| theft of government property, possession of wire-tapping devices and phony | |
| identification. | |
| One of Poulsen's alleged accomplices, Robert Gilligan, last year pleaded guilty | |
| to one charge of illegally obtaining Pac Bell access codes. Under a plea | |
| bargain, Gilligan received three years of probation, a $25,000 fine, and agreed | |
| to help authorities in the Poulsen prosecution. Poulsen's former roommate, | |
| Mark Lottor, is still awaiting trial. | |
| A key issue in Poulsen's case concerns CPX Caber Dragon, a code name for a | |
| military exercise in Fort Bragg, North Carolina. In late 1987 or early 1988, | |
| the government charges, Poulsen illegally obtained classified orders for the | |
| exercise. But Meltzer insists that the orders had been declassified by the | |
| time they were seized, and were reclassified after the fact to prosecute | |
| Poulsen. Crowe said Meltzer has his facts wrong. "That's the same as saying | |
| we're framing Poulsen," Crowe said. "That's the worst sort of accusation I can | |
| imagine." | |
| Another dispute focuses on the charge of unauthorized access to government | |
| computers. FBI agents found an electronic copy of the banner that a computer | |
| user sees on first dialing up an Army network called MASNET, which includes a | |
| warning against unauthorized use of the computer system. Meltzer says Poulsen | |
| never got beyond this computer equivalent of a "No Trespassing" sign. | |
| Furthermore, Meltzer argues that the law is unconstitutional because it does | |
| not sufficiently define whether merely dialing up a computer qualifies as | |
| illegal "access." | |
| Meltzer also denies that Poulsen could eavesdrop on calls. The indictment | |
| accuses him of illegally owning a device called a direct access test unit, | |
| which it says is "primarily useful" for surreptitiously intercepting | |
| communications. But Meltzer cites an equipment manual showing that the system | |
| is specifically designed to garble conversations, though it allows phone | |
| company technicians to tell that a line is in use. | |
| Crowe said he will soon file written rebuttals to Meltzer's motions. In | |
| addition to the new indictment he is seeking, federal prosecutors in Los | |
| Angeles are believed to be investigating Poulsen's activities while a fugitive. | |
| Among other things, Poulsen reportedly taunted FBI agents on computer bulletin | |
| boards frequented by hackers. | |
| PHONE COMPANIES WORRIED | |
| Poulsen's prosecution is important to the government -- and phone companies -- | |
| because of their mixed record so far in getting convictions in hacker cases. | |
| In one of the most embarrassing stumbles, a 19-year-old University of Missouri | |
| student named Craig Neidorf was indicted in February 1990 on felony charges for | |
| publishing a memorandum on the emergency 911 system of Bell South. The case | |
| collapsed when the phone company information -- which the government said was | |
| worth $79,940 -- was shown by the defense to be available from another Bell | |
| system for just $13.50. | |
| Author Bruce Sterling, whose "The Hacker Crackdown" surveys recent high-tech | |
| crime and punishment, thinks the phone company overstates the dangers from | |
| young hackers. On the other hand, a Toronto high school student electronically | |
| tampered with that city's emergency telephone dispatching system and was | |
| arrested, he noted. | |
| Because systems that affect public safety are involved, law enforcement | |
| officials are particularly anxious to win convictions and long jail sentences | |
| for the likes of Poulsen. | |
| "It's very bad when the government goes out on a case and loses," said one | |
| computer-security expert who asked not to be identified. "They are desperately | |
| trying to find something to hang him on." | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Computer Hacker Charged With Stealing Military Secrets December 8, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Taken from the Associated Press | |
| SAN FRANCISCO -- A computer hacker has been charged with stealing Air Force | |
| secrets that allegedly included a list of planned targets in a hypothetical | |
| war. | |
| Former Silicon Valley computer whiz Kevin Poulsen, who was accused in the early | |
| 1980s as part of a major hacking case, was named in a 14-count indictment | |
| issued Monday. | |
| He and an alleged accomplice already face lesser charges of unlawful use of | |
| telephone access devices, illegal wiretapping and conspiracy. | |
| Poulsen, 27, of Los Angeles, faces 7-to-10 years in prison if convicted of the | |
| new charge of gathering defense information, double the sentence he faced | |
| previously. | |
| His lawyer, Paul Meltzer, says the information was not militarily sensitive and | |
| that it was reclassified by government officials just so they could prosecute | |
| Poulsen on a greater charge. | |
| A judge is scheduled to rule February 1 on Meltzer's motion to dismiss the | |
| charge. | |
| In the early 1980s, Poulsen and another hacker going by the monicker Dark Dante | |
| were accused of breaking into UCLA's computer network in one of the first | |
| prosecutions of computer hacking. | |
| He escaped prosecution because he was then a juvenile and went to work at Sun | |
| Microsystems in Mountain View. | |
| While working for Sun, Poulsen illegally obtained a computer tape containing a | |
| 1987 order concerning a military exercise code-named Caber Dragon 88, the | |
| government said in court papers. The order is classified secret and contains | |
| names of military targets, the government said. | |
| In 1989, Poulsen and two other men were charged with stealing telephone access | |
| codes from a Pacific Bell office, accessing Pacific Bell computers, obtaining | |
| unpublished phone numbers for the Soviet Consulate in San Francisco; dealing in | |
| stolen telephone access codes; and eavesdropping on two telephone company | |
| investigators. | |
| Poulsen remained at large until a television show elicited a tip that led to | |
| his capture in April 1991. | |
| He and Mark Lottor, 27, of Menlo Park, are scheduled to be tried in March. The | |
| third defendant, Robert Gilligan, has pleaded guilty and agreed to pay Pacific | |
| Bell $25,000. He is scheduled to testify against Lottor and Poulsen as part of | |
| a plea bargain. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| CA Computer Whiz Is First Hacker Charged With Espionage December 10, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by John Enders (The Associated Press) | |
| SAN JOSE, California -- A 28-year-old computer whiz who reportedly once tested | |
| Department of Defense security procedures has become the first alleged computer | |
| hacker to be charged with espionage. | |
| The government says Kevin Lee Poulsen stole classified military secrets and | |
| should go to prison. But his lawyer calls him "an intellectually curious | |
| computer nerd." | |
| Poulsen, of Menlo Park, California, worked in the mid-1980s as a consultant | |
| testing Pentagon computer security. Because of prosecution delays, he was held | |
| without bail in a San Jose jail for 20 months before being charged this week. | |
| His attorney, Paul Meltzer, says that Poulsen did not knowingly possess | |
| classified information. The military information had been declassified by the | |
| time prosecutors say Poulsen obtained it, Meltzer said. | |
| "They are attempting to make him look like Julius Rosenberg," Meltzer said of | |
| the man executed in 1953 for passing nuclear-bomb secrets to the Soviet Union. | |
| "It's just ridiculous." | |
| Poulsen was arrested in 1988 on lesser but related hacking charges. He | |
| disappeared before he was indicted and was re-arrested in Los Angeles in April | |
| 1991. Under an amended indictment, he was charged with illegal possession of | |
| classified government secrets. | |
| Poulsen also is charged with 13 additional counts, including eavesdropping on | |
| private telephone conversations and stealing telephone company equipment. | |
| If convicted on all counts, he faces up to 85 years in prison and fines | |
| totaling $3.5 million, said Assistant U.S. Attorney Robert Crowe in San | |
| Francisco. | |
| On Monday (12/7), Poulsen pleaded innocent to all charges. He was handed over | |
| to U.S. Marshals in San Jose on Wednesday (12/9) and was being held at a | |
| federal center in Pleasanton near San Francisco. | |
| He hasn't been available for comment, but in an earlier letter from prison, | |
| Poulsen called the charges "ludicrous" and said the government is taking | |
| computer hacking too seriously. | |
| U.S. Attorney John A. Mendez said Wednesday (12/9) that Poulsen is not | |
| suspected of turning any classified or non-classified information over to a | |
| foreign power, but he said Poulsen's alleged activities are being taken very | |
| seriously. | |
| "He's unique. He's the first computer hacker charged with this type of | |
| violation -- unlawful gathering of defense information," Mendez said. | |
| Assistant U.S. Attorney Robert Crowe said the espionage charge was entered only | |
| after approval from the Justice Department's internal security section in | |
| Washington. | |
| The indictment alleges that Poulsen: | |
| - Tapped into the Pacific Bell Co.'s computer and collected unpublished | |
| telephone numbers and employee lists for the Soviet Consulate in San | |
| Francisco. | |
| - Stole expensive telephone switching and other equipment. | |
| - Retrieved records of phone company security personnel and checked records of | |
| their own calls to see if they were following him. | |
| - Eavesdropped on telephone calls and computer electronic mail between phone | |
| company investigators and some of his acquaintances. | |
| - Tapped into an unclassified military computer network known as Masnet. | |
| - Obtained a classified document on flight orders for a military exercise | |
| involving thousands of paratroopers at the Army's Fort Bragg in North | |
| Carolina. | |
| The offenses allegedly took place between 1986 and 1988. | |
| In 1985, the Palo Alto, California, think tank SRI International hired Poulsen | |
| to work on military contracts, including a sensitive experiment to test | |
| Pentagon computer security, according to published reports. SRI has declined | |
| to comment on the case. | |
| _______________________________________________________________________________ | |
| Hacker For Hire October 19, 1992 | |
| ~~~~~~~~~~~~~~~ | |
| by Mark Goodman and Allison Lynn (People)(Page 151) | |
| "Real-life Sneaker Ian Murphy puts the byte on corporate spies." | |
| THERE'S NO PRIVACY THESE DAYS," says Ian Murphy. "Just imagine going into GM's | |
| or IBM's accounts and wiping them out. You can bring about economic collapse | |
| by dropping in a virus without them even knowing it." Scoff at your peril, | |
| Corporate America. Captain Zap -- as Murphy is known in the electronic | |
| underworld of computer hackers -- claims there's no computer system he can't | |
| crack, and hence no mechanical mischief he can't wreak on corporations or | |
| governments. And Murphy, 35, has the track record -- not to mention the | |
| criminal record -- to back up his boasts. | |
| Murphy's fame in his subterranean world is such that he worked as a consultant | |
| for Sneakers, the hit film about a gang of computer-driven spies (Robert | |
| Redford, Sidney Poitier, Dan Aykroyd) lured into doing some high-risk | |
| undercover work for what they believe is the National Security Agency. | |
| Murphy loved the way the movie turned out. "It's like a training film for | |
| hackers," he says, adding that he saw much of himself in the Aykroyd character, | |
| a pudgy, paranoid fantasist named Mother who, like Murphy, plows through | |
| people's trash for clues. In fact when Aykroyd walked onscreen covered with | |
| trash, Murphy recalls, "My friends turned to me and said, 'Wow, that's you!'" | |
| If that sounds like a nerd's fantasy, then check out Captain Zap's credentials. | |
| Among the first Americans to be convicted of a crime involving computer break- | |
| ins, he served only some easy community-service time in 1983 before heading | |
| down the semistraight, not necessarily narrow, path of a corporate spy. | |
| Today, Murphy, 35, is president of IAM Secure Data Systems, a security | |
| consultant group he formed in 1982. For a fee of $5,000 a day plus expenses, | |
| Murphy has dressed up as a phone-company employee and cracked a bank's security | |
| system, he has aided a murder investigation for a drug dealer's court defense, | |
| and he has conducted a terrorism study for a major airline. His specialty, | |
| though, is breaking into company security systems -- an expertise he applied | |
| illegally in his outlaw hacker days and now, legally, by helping companies | |
| guard against such potential break-ins. Much of his work lately, he says, | |
| involves countersurveillance -- that is, finding out if a corporation's | |
| competitors are searching its computer systems for useful information. "It's | |
| industrial spying," Murphy says, "and it's happening all over the place." | |
| Murphy came by his cloak-and-daggerish calling early. He grew up in Gladwyne, | |
| Pennsylvania, on Philadelphia's Main Line, the son of Daniel Murphy, a retired | |
| owner of a stevedoring business, and his wife, Mary Ann, an advertising | |
| executive. Ian recalls, "As a kid, I was bored. In science I did wonderfully. | |
| The rest of it sucked. And social skills weren't my thing." | |
| Neither was college. Ian had already begun playing around with computers at | |
| Archbishop Carroll High School; after graduation he joined the Navy. He got an | |
| early discharge in 1975 when the Navy didn't assign him to radio school as | |
| promised, and he returned home to start hacking with a few pals. In his | |
| heyday, he claims, he broke into White House and Pentagon computers. "In the | |
| Pentagon," he says, "we were playing in the missile department, finding out | |
| about the new little toys they were developing and trying to mess with their | |
| information. None of our break-ins had major consequences, but it woke them the | |
| hell up because they [had] all claimed it couldn't be done." | |
| Major consequences came later. Murphy and his buddies created dummy | |
| corporations with Triple-A credit ratings and ordered thousands of dollars' | |
| worth of computer equipment. Two years later the authorities knocked at | |
| Murphy's door. His mother listened politely to the charges, then earnestly | |
| replied, "You have the wrong person. He doesn't know anything about | |
| computers." | |
| Right. Murphy was arrested and convicted of receiving stolen property in 1982. | |
| But because there were no federal computer-crime laws at that time, he got off | |
| with a third-degree felony count. He was fined $1,000, ordered to provide | |
| 1,000 hours of community service (he worked in a homeless shelter) and placed | |
| on probation for 2 1/2 years. "I got off easy," he concedes. | |
| Too easy, by his own mother's standards. A past president of Republican Women | |
| of the Main Line, Mary Ann sought out her Congressman, Larry Coughlin, and put | |
| the question to him: "How would you like it if the next time you ran for | |
| office, some young person decided he was going to change all of your files?" | |
| Coughlin decided he wouldn't like it and raised the issue on the floor of | |
| Congress in 1983. The following year, Congress passed a national computer- | |
| crime law, making it illegal to use a computer in a manner not authorized by | |
| the owner. | |
| Meanwhile, Murphy, divorced in 1977 after a brief marriage, had married Carol | |
| Adrienne, a documentary film producer, in 1982. Marriage evidently helped set | |
| Murphy straight, and he formed his company -- now with a staff of 12 that | |
| includes a bomb expert and a hostage expert. Countersurveillance has been | |
| profitable (he's making more than $250,000 a year and is moving out of his | |
| parents' house), but it has left him little time to work on his social skills - | |
| - or for that matter his health. At 5 ft.6 in. and 180 lbs., wearing jeans, | |
| sneakers and a baseball cap, Murphy looks like a Hollywood notion of himself. | |
| He has suffered four heart attacks since 1986 but unregenerately smokes a pack | |
| of cigarettes a day and drinks Scotch long before the sun falls over the | |
| yardarm. | |
| He and Carol divorced in April 1991, after 10 years of marriage. "She got | |
| ethics and didn't like the work I did," he says. These days Murphy dates -- | |
| but not until he thoroughly "checks" the women he goes out with. "I want to | |
| know who I'm dealing with because I could be dealing with plants," he explains. | |
| "The Secret Service plays games with hackers." | |
| Murphy does retain a code of honor. He will work for corporations, helping to | |
| keep down the corporate crime rate, he says, but he won't help gather evidence | |
| to prosecute fellow hackers. Indeed his rogue image makes it prudent for him | |
| to stay in the background. Says Reginald Branham, 23, president of Cyberlock | |
| Consulting, with whom Murphy recently developed a comprehensive antiviral | |
| system: "I prefer not to take Ian to meetings with CEOs. They're going to | |
| listen to him and say, 'This guy is going to tear us apart.'" And yet Captain | |
| Zap, for all his errant ways, maintains a certain peculiar charm. "I'm like | |
| the Darth Vader of the computer world," he insists. "In the end I turn out to | |
| be the good guy." | |
| (Photograph 1 = Ian Murphy) | |
| (Photograph 2 = River Phoenix, Robert Redford, Dan Aykroyd, and Sidney Poitier) | |
| (Photograph 3 = Mary Ann Murphy <Ian's mom>) | |
| _______________________________________________________________________________ | |
| Yacking With A Hack August 1992 | |
| ~~~~~~~~~~~~~~~~~~~ | |
| by Barbara Herman (Teleconnect)(Page 60) | |
| "Phone phreaking for fun, profit & politics." | |
| Ed is an intelligent, articulate 18 year old. He's also a hacker, a self- | |
| professed "phreak" -- the term that's developed in a subculture of usually | |
| young, middle-class computer whizzes. | |
| I called him at his favorite phone booth. | |
| Although he explained how he hacks as well as what kinds of hacking he has been | |
| involved in, I was especially interested in why he hacks. | |
| First off, Ed wanted to make it clear he doesn't consider himself a | |
| "professional" who's in it only for the money. He kept emphasizing that | |
| "hacking is not only an action, it's a state of mind." | |
| Phreaks even have an acronym-based motto that hints at their overblown opinions | |
| of themselves. PHAC. It describes what they do: "phreaking," "hacking," | |
| "anarchy" and "carding." In other words, they get into systems over the | |
| telecom network (phreaking), gain access (hacking), disrupt the systems | |
| (political anarchy) and use peoples' calling/credit cards for their personal | |
| use. | |
| Throughout our talk, Ed showed no remorse for hacking. Actually, he had | |
| contempt for those he hacked. Companies were "stupid" because their systems' | |
| were so easy to crack. They deserved it. | |
| As if they should have been thankful for his mercy, he asked me to imagine what | |
| would have happened if he really hacked one railway company's system (he merely | |
| left a warning note), changing schedules and causing trains to collide. | |
| He also had a lot of disgust for the "system," which apparently includes big | |
| business (he is especially venomous toward AT&T), government, the FBI, known as | |
| "the Gestapo" in phreak circles, and the secret service, whose "intelligence | |
| reflects what their real jobs should be, secret service station attendants." | |
| He doesn't really believe any one is losing money on remote access toll fraud. | |
| He figures the carriers are angry not about money lost but rather hypothetical | |
| money, the money they could have charged for the free calls the hackers made, | |
| which he thinks are overpriced to begin with. | |
| He's also convinced (wrongly) that companies usually don't foot the bill for | |
| the free calls hackers rack up on their phone systems. "And, besides, if some | |
| multi-million dollar corporation has to pay, I'm certainly not going to cry for | |
| them." | |
| I know. A twisted kid. Weird. But besides his skewed ethics, there's also a | |
| bunch of contradictions. | |
| He has scorn for companies who can't keep him out, even though he piously warns | |
| them to try. | |
| He dismisses my suggestion that the "little guy" is in fact paying the bills | |
| instead of the carrier. And yet he says AT&T is overcharging them for the | |
| "vital" right to communicate with each other. | |
| He also contradicted his stance of being for the underdog by calling the | |
| railway company "stupid" for not being more careful with their information. | |
| Maybe a railway company is not necessarily the "little guy," but it hardly | |
| seems deserving of the insults Ed hurled at it. When I mentioned that a | |
| hospital in New York was taken for $100,000 by hackers, he defended the hackers | |
| by irrelevantly making the claim that doctors easily make $100,000 a year. | |
| Since when did doctors pay hospital phone bills? | |
| What Ed is good at is rationalizing. He lessens his crimes by raising them to | |
| the status of political statements, and yet in the same breath, for example, he | |
| talks about getting insider info on the stock market and investing once he | |
| knows how the stock is doing. He knows it's morally wrong, he told me, but | |
| urged me to examine this society that "believes in making a buck any way you | |
| can. It's not a moral society." | |
| Amazingly enough, the hacker society to which Ed belongs, if I can | |
| unstatistically use him as a representative of the whole community, is just as | |
| tangled in the contradictions of capitalism as the "system" they supposedly | |
| loathe. In fact, they are perhaps more deluded and hypocritical because they | |
| take a political stance rather than recognizing their crimes for what they are. | |
| How can Ed or anyone else in the "phreaking" community take seriously their | |
| claims of being against big business and evil capitalism when they steal | |
| people's credit-card and calling-card numbers and use them for their own | |
| profit? | |
| The conversation winded down after Ed rhapsodized about the plight of the | |
| martyred hacker who is left unfairly stigmatized after he is caught, or "taken | |
| down." | |
| One time the Feds caught his friend hacking ID codes, had several phone | |
| companies and police search his house, and had his computer taken away. Even | |
| though charges were not filed, Ed complained, "It's not fair." | |
| That's right, phreak. They should have thrown him in prison. | |
| _______________________________________________________________________________ | |
| Computer Hacker On Side Of Law September 23, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Shelby Grad (Los Angeles Times)(Page B3) | |
| COSTA MESA, CA -- Philip Bettencourt's formal title is photo lab supervisor for | |
| the Costa Mesa Police Department. But on Tuesday afternoon, he served as the | |
| department's official computer hacker. | |
| Bettencourt, pounding the keyboard excitedly as other officers looked on, was | |
| determined to find information within a stolen computer's vast memory that | |
| would link the machine to its owner. | |
| So far, he had made matches for all but two of the 26 computers recovered | |
| earlier this month by police as part of a countywide investigation of stolen | |
| office equipment. This would be number 25. | |
| First, he checked the hard drive's directory, searching for a word-processing | |
| program that might include a form letter or fax cover sheet containing the | |
| owner's name, address or phone number. | |
| When that failed, he tapped into an accounting program, checking for clues on | |
| the accounts payable menu. | |
| "Bingo!" Bettencourt yelled a few minutes into his work. He found an invoice | |
| account number to a Fountain Valley cement company that might reveal the | |
| owner's identity. Seconds later, he came across the owner's bank credit-card | |
| number. | |
| And less than a minute after that, Bettencourt hit pay dirt: The name of a | |
| Santa Ana building company that, when contacted, revealed that it had indeed | |
| been the victim of a recent computer burglary. | |
| "This is great," said Bettencourt, who has been interested in computers for | |
| nearly two decades now, ever since Radio Shack put its first model on the | |
| market. "I love doing this. This is hacking, but it's in a good sense, not | |
| trying to hurt someone. This is helping people." | |
| Few computer owners who were reunited with their equipment would contest that. | |
| When Costa Mesa police recovered $250,000 worth of computers, fax machines, | |
| telephones and other office gadgets, detectives were faced with the difficult | |
| task of matching machines bearing few helpful identifying marks to their | |
| owners, said investigator Bob Fate. | |
| Enter Bettencourt, who tapped into the computers' hard drives, attempting to | |
| find the documents that would reveal from whom the machines were taken. | |
| As of Tuesday, all but $50,000 worth of equipment was back in owners' hands. | |
| Investigators suggested that people who recently lost office equipment call the | |
| station to determine if some of the recovered gadgetry belongs to them. | |
| Ironically, the alleged burglars tripped themselves up by not erasing the data | |
| from the computers before reselling the machines, authorities said. A college | |
| student who purchased one of the stolen computers found data from the previous | |
| owner, whom he contacted. Police were then called in, and a second "buy" was | |
| scheduled in which several suspects were arrested, Fate said. | |
| Three people were arrested September 15 and charged with receiving and | |
| possessing stolen property. Police are still searching for the burglars. | |
| The office equipment was recovered from an apartment and storage facility in | |
| Santa Ana. | |
| Bettencourt matched the final stolen computer to its owner before sundown | |
| Tuesday. | |
| _______________________________________________________________________________ | |
| CuD's 1992 MEDIA HYPE Award To FORBES MAGAZINE | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Jim Thomas (Computer Underground Digest) | |
| In recent years, media depiction of "hackers" has been criticized for | |
| inaccurate and slanted reporting that exaggerates the public dangers of the | |
| dread "hacker menace." As a result, CuD annually recognizes the year's most | |
| egregious example of media hype. | |
| The 1992 annual CuD GERALDO RIVERA MEDIA HYPE award goes to WILLIAM G. FLANAGAN | |
| AND BRIGID McMENAMIN for their article "The Playground Bullies are Learning how | |
| to Type" in the 21 December issue of Forbes (pp 184-189). The authors improved | |
| upon last year's winner, Geraldo himself, in inflammatory rhetoric and | |
| distorted narrative that seems more appropriate for a segment of "Inside | |
| Edition" during sweeps week than for a mainstream conservative periodical. | |
| The Forbes piece is the hands-down winner for two reasons. First, one reporter | |
| of the story, Brigid McMenamin, was exceptionally successful in creating for | |
| herself an image as clueless and obnoxious. Second, the story itself was based | |
| on faulty logic, rumors, and some impressive leaps of induction. Consider the | |
| following. | |
| The Reporter: Brigid McMenamin | |
| It's not only the story's gross errors, hyperbole, and irresponsible distortion | |
| that deserve commendation/condemnation, but the way that Forbes reporter Brigid | |
| McMenamin tried to sell herself to solicit information. | |
| One individual contacted by Brigid McM claimed she called him several times | |
| "bugging" him for information, asking for names, and complaining because | |
| "hackers" never called her back. He reports that she explicitly stated that | |
| her interest was limited to the "illegal stuff" and the "crime aspect" and was | |
| oblivious to facts or issues that did not bear upon hackers-as-criminals. | |
| Some persons present at the November 2600 meeting at Citicorp, which she | |
| attended, suggested the possibility that she used another reporter as a | |
| credibility prop, followed some of the participants to dinner after the | |
| meeting, and was interested in talking only about illegal activities. One | |
| observer indicated that those who were willing to talk to her might not be the | |
| most credible informants. Perhaps this is one reason for her curious language | |
| in describing the 2600 meeting. | |
| Another person she contacted indicated that she called him wanting names of | |
| people to talk to and indicated that because Forbes is a business magazine, it | |
| only publishes the "truth." Yet, she seemed not so much interested in "truth," | |
| but in finding "evidence" to fit a story. He reports that he attempted to | |
| explain that hackers generally are interested in Unix and she asked if she | |
| could make free phone calls if she knew Unix. Although the reporter stated to | |
| me several times that she had done her homework, my own conversation with her | |
| contradicted her claims, and if the reports of others are accurate, here claims | |
| of preparation seem disturbingly exaggerated. | |
| I also had a rather unpleasant exchange with Ms. McM. She was rude, abrasive, | |
| and was interested in obtaining the names of "hackers" who worked for or as | |
| "criminals." Her "angle" was clearly the hacker-as-demon. Her questions | |
| suggested that she did not understand the culture about which she was writing. | |
| She would ask questions and then argue about the answer, and was resistant to | |
| any "facts" or responses that failed to focus on "the hacker criminal." She | |
| dropped Emmanuel Goldstein's name in a way that I interpreted as indicating a | |
| closer relationship than she had--an incidental sentence, but one not without | |
| import -- which I later discovered was either an inadvertently misleading | |
| choice of words or a deliberate attempt to deceptively establish credentials. | |
| She claimed she was an avowed civil libertarian. I asked why, then, she didn't | |
| incorporate some of those issues. She invoked publisher pressure. Forbes is a | |
| business magazine, she said, and the story should be of interest to readers. | |
| She indicated that civil liberties weren't related to "business." She struck | |
| me as exceptionally ill-informed and not particularly good at soliciting | |
| information. She also left a post on Mindvox inviting "hackers" who had been | |
| contacted by "criminals" for services to contact her. | |
| >Post: 150 of 161 | |
| >Subject: Hacking for Profit? | |
| >From: forbes (Forbes Reporter) | |
| >Date: Tue, 17 Nov 92 13:17:34 EST | |
| > | |
| >Hacking for Profit? Has anyone ever offered to pay you (or | |
| >a friend) to get into a certain system and alter, destroy or | |
| >retrieve information? Can you earn money hacking credit | |
| >card numbers, access codes or other information? Do you know | |
| >where to sell it? Then I'd like to hear from you. I'm | |
| >doing research for a magazine article. We don't need you | |
| >name. But I do want to hear your story. Please contact me | |
| >Forbes@mindvox.phantom.com. | |
| However, apparently she wasn't over-zealous about following up her post or | |
| reading the Mindvox conferences. When I finally agreed to send her some | |
| information about CuD, she insisted it be faxed rather than sent to Mindvox | |
| because she was rarely on it. Logs indicate that she made only six calls to | |
| the board, none of which occurred after November 24. | |
| My own experience with the Forbes reporter was consistent with those of others. | |
| She emphasized "truth" and "fact-checkers," but the story seems short on both. | |
| She emphasized explicitly that her story would *not* be sensationalistic. She | |
| implied that she wanted to focus on criminals and that the story would have the | |
| effect of presenting the distinction between "hackers" and real criminals. | |
| Another of her contacts also appeared to have the same impression. After our | |
| less-than-cordial discussion, she reported it to the contact, and he attempted | |
| to intercede on her behalf in the belief that her intent was to dispel many of | |
| the media inaccuracies about "hacking." If his interpretation is correct, then | |
| she deceived him as well, because her portrayal of him in the story was | |
| unfavorably misleading. | |
| In CuD 4.45 (File #3), we ran Mike Godwin's article on "How to Talk to the | |
| Press," which should be required reading. His guidelines included: | |
| 1) TRY TO THINK LIKE THE REPORTER YOU'RE TALKING TO. | |
| 2) IF YOU'RE GOING TO MEET THE REPORTER IN PERSON, TRY TO | |
| BRING SOMETHING ON PAPER. | |
| 3) GIVE THE REPORTER OTHER PEOPLE TO TALK TO, IF POSSIBLE. | |
| 4) DON'T ASSUME THAT THE REPORTER WILL COVER THE STORY THE WAY | |
| YOU'D LIKE HER TO. | |
| Other experienced observers contend that discussing "hacking" with the press | |
| should be avoided unless one knows the reporter well or if the reporter has | |
| established sufficient credentials as accurate and non-sensationalist. Using | |
| these criteria, it will probably be a long while before any competent | |
| cybernaught again speaks to Brigid McMenamin. | |
| The Story | |
| Rather than present a coherent and factual story about the types of computer | |
| crime, the authors instead make "hackers" the focal point and use a narrative | |
| strategy that conflates all computer crime with "hackers." | |
| The story implies that Len Rose is part of the "hacker hood" crowd. The lead | |
| reports Rose's prison experience and relates his feeling that he was "made an | |
| example of" by federal prosecutors. But, asks the narrative, if this is so, | |
| then why is the government cracking down? Whatever else one might think of Len | |
| Rose, no one ever has implied that he as a "playground bully" or "hacker hood." | |
| The story also states that 2600 Magazine editor Emmanuel Goldstein "hands | |
| copies <of 2600> out free of charge to kids. Then they get arrested." (p. 188- | |
| -a quote attributed to Don Delaney), and distorts (or fabricates) facts to fit | |
| the slant: | |
| According to one knowledgeable source, another hacker brags | |
| that he recently found a way to get into Citibank's | |
| computers. For three months he says he quietly skimmed off a | |
| penny or so from each account. Once he had $200,000, he quit. | |
| Citibank says it has no evidence of this incident and we | |
| cannot confirm the hacker's story. But, says computer crime | |
| expert Donn Parker of consultants SRI International: "Such a | |
| 'salami attack' is definitely possible, especially for an | |
| insider" (p. 186). | |
| Has anybody calculated how many accounts one would have to "skim" a few pennies | |
| from before obtaining $200,000? At a dime apiece, that's over 2 million. If | |
| I'm figuring correctly, at one minute per account, 60 accounts per minute non- | |
| stop for 24 hours a day all year, it would take nearly 4 straight years of on- | |
| line computer work for an out-sider. According to the story, it took only 3 | |
| months. At 20 cents an account, that's over a million accounts. | |
| Although no names or evidence are given, the story quotes Donn Parker of SRI as | |
| saying that the story is a "definite possibility." Over the years, there have | |
| been cases of skimming, but as I remember the various incidents, all have been | |
| inside jobs and few, if any, involved hackers. The story is suspiciously | |
| reminiscent of the infamous "bank cracking" article published in Phrack as a | |
| spoof several years ago. | |
| The basis for the claim that "hacker hoods" (former "playground bullies") are | |
| now dangerous is based on a series of second and third-hand rumors and myths. | |
| The authors then list from "generally reliable press reports" a half-dozen or | |
| so non-hacker fraud cases that, in context, would seem to the casual reader to | |
| be part of the "hacker menace." I counted in the article at least 24 instances | |
| of half-truths, inaccuracies, distortions, questionable/spurious links, or | |
| misleading claims that are reminiscent of 80s media hype. For example, the | |
| article attributes to Phiber Optik counts in the MOD indictment that do not | |
| include him, misleads on the Len Rose indictment and guilty plea, uses second | |
| and third hand information as "fact" without checking the reliability, and | |
| presents facts out of context (such as attributing the Morris Internet worm to | |
| "hackers). | |
| Featured as a key "hacker hood" is "Kimble," a German hacker said by some to be | |
| sufficiently media-hungry and self-serving that he is ostracized by other | |
| German hackers. His major crime reported in the story is hacking into PBXes. | |
| While clearly wrong, his "crime" hardly qualifies him for the "hacker | |
| hood/organized crime" danger that's the focus of the story. Perhaps he is | |
| engaged in other activities unreported by the authors, but it appears he is | |
| simply a run-of-the-mill petty rip-off artist. In fact, the authors do not make | |
| much of his crimes. Instead, they leap to the conclusion that "hackers" do the | |
| same thing and sell the numbers "increasingly" to criminals without a shred of | |
| evidence for the leap. To be sure the reader understands the menace, the | |
| authors also invoke unsubstantiated images of a hacker/Turkish Mafia connection | |
| and suggest that during the Gulf war, one hacker was paid "millions" to invade | |
| a Pentagon computer and retrieve information from a spy satellite (p. 186). | |
| Criminals use computers for crime. Some criminals may purchase numbers from | |
| others. But the story paints a broader picture, and equates all computer crime | |
| with "hacking." The authors' logic seems to be that if a crime is committed | |
| with a computer, it's a hacking crime, and therefore computer crime and | |
| "hackers" are synonymous. The story ignores the fact that most computer crime | |
| is an "inside job" and it says nothing about the problem of security and how | |
| the greatest danger to computer systems is careless users. | |
| One short paragraph near the end mentions the concerns about civil liberties, | |
| and the next paragraph mentions that EFF was formed to address these concerns. | |
| However, nothing in the article articulates the bases for these concerns. | |
| Instead, the piece promotes the "hacker as demon" mystique quite creatively. | |
| The use of terms such as "new hoods on the block," "playground bullies," and | |
| "hacker hoods" suggests that the purpose of the story was to find facts to fit | |
| a slant. | |
| In one sense, the authors might be able to claim that some of their "facts" | |
| were accurate. For example, the "playground bullies" phrase is attributed to | |
| Cheshire Catalyst. "Gee, *we* didn't say it!" But, they don't identify | |
| whether it's the original CC or not. The phrase sounds like a term used in | |
| recent internecine "hacker group" bickering, and if this was the context, it | |
| hardly describes any new "hacker culture." Even so, the use of the phrase | |
| would be akin to a critic of the Forbes article referring to it as the product | |
| of "media whores who are now getting paid for doing what they used to do for | |
| free," and then applying the term "whores" to the authors because, hey, I | |
| didn't make up the term, somebody else did, and I'm just reporting (and using | |
| it as my central metaphor) just the way it was told to me. However, I suspect | |
| that neither Forbes' author would take kindly to being called a whore because | |
| of the perception that they prostituted journalistic integrity for the pay-off | |
| of a sexy story. And this is what's wrong with the article: The authors take | |
| rumors and catch-phrases, "merely report" the phrases, but then construct | |
| premises around the phrases *as if* they were true with little (if any) | |
| evidence. They take an unconfirmed "truth" (where are fact checkers when you | |
| need them) or an unrelated "fact" (such as an example of insider fraud) and | |
| generalize from a discrete fact to a larger population. The article is an | |
| excellent bit of creative writing. | |
| Why Does It All Matter? | |
| Computer crime is serious, costly, and must not be tolerated. Rip-off is no | |
| joke. But, it helps to understand a problem before it can be solved, and lack | |
| of understanding can lead to policies and laws that are not only ineffective, | |
| but also a threat to civil liberties. The public should be accurately informed | |
| of the dangers of computer crime and how it can be prevented. However, little | |
| will be served by creating demons and falsely attributing to them the sins of | |
| others. It is bad enough that the meaning" of the term "hacker" has been used | |
| to apply both to both computer delinquents and creative explorers without also | |
| having the label extended to include all other forms of computer criminals as | |
| well. | |
| CPSR, the EFF, CuD, and many, many others have worked, with some success, to | |
| educate the media about both dangers of computer crime and the dangers of | |
| inaccurately reporting it and attributing it to "hackers." Some, perhaps most, | |
| reporters take their work seriously, let the facts speak to them, and at least | |
| make a good-faith effort not to fit their "facts" into a narrative that--by one | |
| authors' indication at least -- seems to have been predetermined. | |
| Contrary to billing, there was no evidence in the story, other than | |
| questionable rumor, of "hacker" connection to organized crime. Yet, this type | |
| of article has been used by legislators and some law enforcement agents to | |
| justify a "crackdown" on conventional hackers as if they were the ultimate | |
| menace to society. Forbes, with a paid circulation of over 735,000 (compared | |
| to CuDs unpaid circulation of only 40,000), reaches a significant and | |
| influential population. Hysterical stories create hysterical images, and these | |
| create hysteria-based laws that threaten the rights of law-abiding users. When | |
| a problem is defined by irresponsibly produced images and then fed to the | |
| public, it becomes more difficult to overcome policies and laws that restrict | |
| rights in cyberspace. | |
| The issue is not whether "hackers" are or are not portrayed favorably. Rather, | |
| the issue is whether images reinforce a witch-hunt mentality that leads to the | |
| excesses of Operation Sun Devil, the Steve Jackson Games fiasco, or excessive | |
| sentences for those who are either law-abiding or are set up as scapegoats. | |
| The danger of the Forbes article is that it contributes to the persecution of | |
| those who are stigmatized not so much for their acts, but rather for the signs | |
| they bear. | |