[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: PWN/Part 1 ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ] [ 71 ]
Current issue : #40 | Release date : 1992-08-01 | Editor : Dispater
IntroductionDispater
Phrack LoopbackMind Mage & Dispater
Phrack Pro-Phile on Lex LuthorTaran King & Lex Luthor
Network MiscellanyThe Racketeer
Pirates CoveRambone
Cellular Telephony, Part IIBrian Oblivion
The Fine Art of TelephonyCrimson Flash
BT Tymnet, Part 1 of 3Toucan Jones
BT Tymnet, Part 2 of 3Toucan Jones
BT Tymnet, Part 3 of 3Toucan Jones
SummerCon 1992Knight Lightning & Dispater
PWN/Part 1Datastream Cowboy
PWN/Part 2Datastream Cowboy
PWN/Part 3Datastream Cowboy
Title : PWN/Part 1
Author : Datastream Cowboy
                                ==Phrack Inc.==

                    Volume Four, Issue Forty, File 12 of 14

              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
              PWN                                             PWN
              PWN              Phrack World News              PWN
              PWN                                             PWN
              PWN           Issue 40 / Part 1 of 3            PWN
              PWN                                             PWN
              PWN        Compiled by Datastream Cowboy        PWN
              PWN                                             PWN
              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


 Scantronics BBS Seized By San Diego Police Department             July 1, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 By Knight Lightning and The Gatsby
 Special Thanks to Bruce Bigelo (San Diego Union-Tribune)

                 "Multiplexor and The Crypt Keeper Spill Guts"

A lot of stories have been circulating in the press over the past two months
about hordes of credit card stealing computer hackers that were disrupting
the economy of the United States.  It all began with rumors about Multiplexor,
a small time hacker that was thought to have spent some time in Long Island,
New York and supposedly is from Indiana.  The story was that Multiplexor had
carded a plane ticket to San Diego to see a girl or meet some friends, but
when he landed, he was met by the police instead.

Where that information or the supposed "1,000 member hacker ring" theory came
from, we might never know, but we know do know the facts in this case thanks
to police reports and warrant affidavits supplied by the court and acquired by
The Gatsby with help.

That information and more is now available.

For purposes of understanding the following, "SEMENICK" and "MARCOV" are both
the same person.  You might know him better under the names of Multiplexor or
The Prisoner.  Later in this file, you will see references to a person named
Kevin Marcus who is better known to some as The Crypt Keeper.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

                          SAN DIEGO POLICE DEPARTMENT
                         Investigators Follow-Up Report

CASE NUMBER:  N/A
DATE:         March 23, 1992
TIME:         1300 Hours
SUBJECT:      Damage Assessment of and Intelligence gathering on Illegal entry
              (Hacking) Computer Systems and the Illegal use of Credit Cards.
SUSPECT:      SEMENICK, John Edward        AKA: MARCOV, Eric Edward
VICTIM:       Zales Jewelry Store
LOCATION:     4465 La Jolla Village Drive, San Diego, CA
DETECTIVE:    Dennis W. Sadler (I.D.# 2486)

On March 31, 1992, I received a ARJIS 4 form from Officer Smyth (I.D.# 3871)
regarding some papers found by a Mr. Maurice Osborne at his residence.

Mr. Osborne had asked an individual by the name of Eric MARCOV, who had rented
a room from him, to leave.  After MARCOV left the house, Mr. Osborne discovered
some papers with what appeared to be credit card information on them.  Mr.
Osborne called the police and reported what he found.

Officer Smyth collected the papers and wrote the attached report.  After
reviewing these papers, I learned that they did in fact contain some personal
information on individuals which included the person's name, address, credit
card number, card expiration date, and social security number.  It appeared
that the person who wrote these notes was possibly using this credit card
information illegally.

I contacted Mr. Osborne by phone on March 31st.  He verified the contents of
the report and he stated that he feels MARCOV may still be in town.  On April
2nd, I was contacted by Mr. Osborne who learned that MARCOV was staying at a
motel in the beach area named Sleepy Time.

On April 2, 1992, while in the beach area, I came across the Sleepy Time Motel.
I contacted the motel manager, William Gainok.  I asked Mr. Gainok if he had
a person registered there by the name of Eric MARCOV.  He said that he did and
that Marcov was in room number 108.

At approximately 8:40 am, I knocked on the door to room number 108.  A white
male answered the door.  I asked him if he was Eric MARCOV.  He said yes.  I
identified myself as a San Diego Police Detective and told him that I needed
to talk to him about some questionable credit card activity.

As he opened the motel room door, I saw more papers like <those> given to me by
Mr. Osborne laying on the floor near the door with more credit card information
on them.  After being invited into the motel room, I asked MARCOV if he knew
why I was here.  He said I think so.  I asked MARCOV why he thought so.  He
said the credit cards.

At this point, I was only interviewing MARCOV regarding the papers found at Mr.
Osborne's residence.  I had no active case or any evidence indicating that
MARCOV was involved in, or a suspect of any criminal or illegal activity.

I asked MARCOV if he had any I.D. on him.  He said that he did not.  MARCOV
gave me the following information; Eric Edward MARCOV, DOB 05-15-74, then
changed the year to 73.  He said he was 18 going on 19.  He did not know his
social security number.  When asked if he had a drivers' license, he said that
he has never had one.  MARCOV appeared to be between the age of 17 to 19 years
old.

While asking him about papers, he started talking about computers and gaining
information from various systems.  He talked for about 10 minutes.  After that,
I decided to call the FBI because hacking was involved in obtaining the credit
card information and numbers, plus the information was coming from out of
state.  MARCOV also sounded like he knew a lot about computer hacking and was
involved in it himself.

At 8:58 am, I called the local office of the FBI and told them what I had and
asked if they would be interested in talking with MARCOV.  I asked MARCOV prior
to calling the FBI, if he would be willing to talk with them about his computer
activities.  He agreed to talk with them.

A short later Special Agent Keith Moses called me back at the motel.  I
explained to him what I had and what MARCOV was willing to talk about.  After
going over the case with Moses, he agreed to come out and talk with MARCOV.

Both Moses and I interviewed MARCOV regarding his hacking activities and
knowledge.  MARCOV was extensively involved in the hacking community during
the last four years and had some superior knowledge about what was happening in
the hacker world.  We later learned that he had been arrested for computer
crimes in early 1991 in Indianapolis.  We attempted to contact the
investigators that worked that case, but we never received any calls back after
numerous attempts.

During the interview, I attempted to confirm MARCOV's true identity.  I asked
him for his parents' information.  He said he did not remember their home phone
numbers, but they had a phone.  He also could not remember their home
addresses.  I asked him for his parents' employment information.  He said that
his father worked for a local (his home town) turbine company.

I called the information number for the local phone company and then called the
company to verify this information.  However, the company's personnel office
could not locate any employee matching the name given to me by MARCOV.  MARCOV
also gave me the school and year he graduated.  I called the local school
district's administrative office and discovered they had no record of MARCOV
attending or graduating from their school system.

I confronted him with this information and he finally gave me his true
information.  His true name was John Edward SEMENICK, DOB 05-15-75.  I located
his father's work number and contacted him.  He was very uninterested about his
son's whereabouts or condition.  When asked if he would supply an airline or
bus ticket for transportation home, he said he would not.  His father further
stated that when his son decided to come home, he'll have to find his own way.
SEMENICK's parents are divorced and he lives with his father.  However, we
learned that his mother had filed a runaway report with the local sheriff's
office.

I contacted his mother and she seemed a little more concerned, but said she
would not provide a ticket or funds for his return.  I asked both parents if
while John was in San Diego would they have any problems if their son assisted
us in our investigation.  I explained to them that he was not facing any known
criminal charges at that point and that the information he would be giving us
would be for damage assessment and intelligence gathering purposes on hackers

Both parents stated that they had no problem with him assisting us if he was
not being charged.  Because SEMENICK was a juvenile and a runaway report was
filed on him, we contacted the U.S. Attorney's office, the District Attorney's
Juvenile Division, and the Juvenile Hall Probation Intake Officer for advice.

They advised us that their was no problem with him giving us information.
SEMENICK was booked into Juvenile hall as a runaway and then released to a
halfway home for the evening.  The intake officer explained to us that because
his parents would not send for him, they would only keep him for one evening
and then he would be let go on his own again the next day.

After SEMENICK went through the runaway process and was being released, we
picked him back up.  The FBI agreed and furnished the fund's to put SEMENICK up
in a hotel, give him living expenses, and then provide transportation for him
home.  SEMENICK was put up in a suite at the Mission Valley Marriott.  He was
allowed to do what he wanted while staying at the hotel and to see his friends
at any time.

During SEMENICK's stay at the Marriott, either myself or Agent Moses stayed in
the hotel room next to SEMENICK's.  During the three day stay at the hotel,
SEMENICK was able to provide us with some very useful information and
intelligence.  It was not enough to make any arrest, but we obtained some very
valuable information.  We were not able to independently verify the information
by another source.

During the period of April 3rd to April 5th, 1992, SEMENICK contacted numerous
persons by phone who were involved in computer hacking.  SEMENICK willingly and
voluntarily signed an FBI consent form giving us permission to record his phone
calls during the course of our investigation.  There were numerous tape
recorded phone conversations involving at least 4 separate individuals.

During this same period of time, information in data format was also downloaded
from another individual's computer located on the East Coast to the computer
we had set up.  The information we received during the download was current
credit records just obtained from CBI credit reporting company by this person,
a CBI manual written in part by "Kludge" a San Diego hacker, and numerous
other files/documents involving illegal activity such as "carding."  "Carding"
is a term used by the hacker community regarding the illegal or fraudulent use
of credit cards or credit card numbers by hackers nationwide.

SEMENICK stated that he had been a member of a local BBS called Scantronics
when he was an active hacker.  He stated that the board is run by a guy named
"KLUDGE" and contains hundreds of files and documents.  He said that most of
these files and documents contained on "KLUDGE's" computer are "how to"
manuals.  This means that they instruct the person who obtains them through
Scantronics BBS on how to do various things both legal and illegal.  Some of
the illegal activities that are covered on this BBS is carding, phone hacking,
ATM fraud, and credit bureau information.

We obtained three documents written by or put out by either "KLUDGE" or
Scantronics BBS.

THIS INVESTIGATION IS ONGOING AT THIS TIME AND FURTHER INFORMATION AND EVIDENCE
WILL BE ADDED.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

                          SAN DIEGO POLICE DEPARTMENT
                         Investigators Follow-Up Report

CASE NUMBER:  N/A
DATE:         April 30, 1992
TIME:         0700 Hours
SUBJECT:      Computer Hacking
SUSPECT:      N/A
VICTIM:       N/A
LOCATION:     N/A
DETECTIVE:    Dennis W. Sadler (I.D.# 2486)

On April 16, 1992, I was contacted by Kevin Marcus.  Marcus learned that we
were investigating individuals who were illegally logging (hacking) into
various computer systems nationwide.  Marcus runs a local computer bulletin
board system (BBS) called The Programmer's Paradise.  Marcus was concerned
about the illegal activities had had seen on various local BBSs and contacted
me.

Marcus also said that he had received computer messages from a person who goes
by the name (handle) of Knight Lightning in New York who asked him if he heard
anything about our investigation.  Knight Lightning told Marcus that on April
3rd a reporter from San Diego by the name of Bigelo had contacted and talked to
him about our ongoing investigation.

--  --  --  --  --  --  --  --
Enclosure 1:

Date: Fri, 10 Apr 1992 18:14:11 -500
To: [email protected]
From: Craig Neidorf <[email protected]>
Subject: Runaway Teen Hacker Picked Up?

I was just contacted by a reporter in San Diego about a hacker case.

Apparently there is a teenage hacker from Indiana who ran away from home to
California to see some girl there.  The local police and the FBI supposedly
picked him up on April 3rd and he remains in their custody uncharged while he
is telling them all sorts of information on hacker rings across the nation.

Does anyone have any clues as to who this kid is or what's going on?

:Knight Lightning

--  --  --  --  --  --  --  --

Enclosure 2:

Date: Thu, 16 Apr 1992 22:25:17 -0400
From: Craig Neidorf <[email protected]>
To: [email protected]
Subject: Re: Hi.

Bruce Bigelo, Union Tribune.  Left his number at the office.  Nothing going on,
but I understand that you called him.

Craig

--  --  --  --  --  --  --  --

Marcus offered to assist us.  I asked if he knew of a BBS called Scantronics.
He said that he did and that he had been a member of that BBS and view the
files on that board in the past to see what the board carried.  Marcus is a
computer science major at a local college and is doing research in the anti-
virus field.  Marcus stated that the board carried a lot of technical data, but
had nothing regarding his subject.  Marcus also belongs to other local and out-
of-state BBSs where he talks with other individuals with his same interest.

Marcus stated that he was last on Scantronics BBS about a month ago and he had
seen numerous computer files that involved CBI and carding.  Carding is a term
used by hackers who are involved in the illegal or fraudulent use of credit
cards and their numbers.  These credit card numbers are obtained from credit
reporting companies such as CBI and TRW, by illegally accessing (hacking) their
way into those company computers and reading or copying private individuals
credit reports and information.

Most copies of credit reports from these companies will show a person's name,
current and previous addresses, social security number, employer, salary, and
all current credit history including all credit cards and their account
numbers.  They <the hackers> then use these credit card numbers to obtain
goods.

If one of the hackers used an account number he found on a credit report that
he illegally pulled from the credit reporting company, the victim would most
likely not find out that their card had been illegally used until the next
billing cycle which could be as much as 45 days after the illegal transaction
took place.  According to the credit card industry, this is one of the most
risk free and safest way to commit credit card fraud.

Marcus said that the person's name who ran this BBS was Jeremy.  He did not
know his last name, but the handle he is known by is "KLUDGE."  I asked if he
knew the phone number to this BBS and he gave me 423-4852.  The BBS phone
number, the operator's first name, and <the operator's> handle matched the
information we had learned earlier.

Marcus also gave me two disks <that> contained some files which had been
downloaded (left on his BBS) by other persons on his system.  He regularly
checks his board and removes or deletes files regarding questionable or illegal
activity such as carding.

I viewed both of these disks and they contained some very interesting files.
These files included various topics <such as> an auto theft manual, CBI manual,
TRW manual, American Express card info, and many other files which if
downloaded or copied by another person, that person could easily gain illegal
access to various credit reporting companies and commit various other illegal
types of activity.

I told Marcus if he came across any further information regarding this type of
activity or further information about the BBS called Scantronics to please
contact me.

On April 17, 1992, I met Marcus and he said that he had logged onto Scantronics
last night by using an access number a friend gave him.  This same friend had
let him use his access number to gain access to this BBS on many prior
occasions.  He did this on his own, without any direction whatsoever from me or
any other law enforcement official.

Marcus handed me a 5 1/4" computer disk and said that it contained some file
listings and a list of all validated users.  Marcus also stated that the disk
contained a copy of the messages that were sent to him through his BBS by the
person in New York regarding our investigation [those messages displayed above
from Knight Lightning].

He asked me if I wanted him to log on and see for myself what was on "KLUDGE's"
BBS.  I told him that I would have to consult with the D.A.'s office first.
However, I was unable to get a hold of our D.A. liaison.  I told <Marcus> that
I'd get back with him later.

After talking to D.A. Mike Carlton, I advised Marcus not to go into Scantronics
BBS unless it was for his own information.  However he said that if he came
across any further information during his normal course of running his own BBS,
he would notify me.

--  --  --  --  --  --  --  --

[The police report also contained 60 pages of printouts of postings and text
files found on Scantronics BBS.  It is also made very clear that Kevin Marcus
(aka The Crypt Keeper) accessed Scantronics BBS by using the password and
account number of The Gatsby.  Files include:

-  "Credit Bureau Information" which sounds harmless enough to begin with and
    turns out is actually a reprint of an article from the September 27, 1992
    issue of Business Week Magazine

-  "Advanced Carding" by The Disk Jockey, which dates back to 1987.

-  "The Complete CBI Manual of Operations" by Video Vindicator and Kludge,
    dated October 10, 1991.

 Aftermath
 ~~~~~~~~~
On April 23, 1992, a search warrant was issued in the municipal court of the State of California in the county of San Diego which authorized the seizure of:

A.  All telephone company subscriber information to include service start date,
    copy of most current billing statement, current credit information, and
    location of telephone service to the following telephone numbers;
    (619)XXX-XXXX and (619)XXX-XXXX and any other telephone number information
    in any chain of call forwarding, to or from the listed phone numbers.

B.  All telephone company records which includes subscriber information,
    service start date, copy of most current billing statement, current credit
    information, and location of telephone service phone numbers to which calls
    are being forwarded to or from, from the listed phone numbers.

               CERTIFICATION TO DEFER NOTIFICATION TO SUBSCRIBER

     The Court finds there is substantial probable cause to believe
     notification to the subscriber whose activities are recorded in the
     records described above would impede or destroy this investigation.
     Accordingly, the court certifies the request of the San Diego Police
     Department that notification to the subscriber be deferred pending
     further order of this court.


On April 30, 1992, a search warrant was issued in the municipal court of the
State of California in the county of San Diego which authorized the search of
Kludge's residence and the seizure of:

     All computer equipment and paraphernalia use in computer hacking, or apart
     of the BBS known as Scantronics which includes, but is not limited to
     monitor(s), keyboard(s), CPU(s), which may or may not contain hard disk
     drive(s), floppy drive(s), tape drive(s), CD rom drive(s), modem(s),
     fax/modem(s), all hard copies (paper copies) of any computer files which
     have been stored or currently stored on/in a computer system, all
     documents whether in hard or data form which show how to operate any
     computer program or computer file, all memory storage devices which may
     include hard disk drive(s), 5 1/4" and 3 1/2" computer memory storage
     disks, all computer memory storage and computer back up tapes, and all
     computer CD rom disks capable of computer data storage; and, documents and
     effects which tend to show dominion and control over said premises and
     computer system, including fingerprints, records, handwritings, documents
     and effects which bear a form of identification such as a person's name,
     photograph, social security number, or driver's license number and keys.

The warrant was used immediately and Scantronics BBS and much more was seized.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 The Crypt Keeper Responds
 ~~~~~~~~~~~~~~~~~~~~~~~~~
Date: Wed, 17 Jun 92 09:13:50 PDT
From: [email protected] (Kevin Marcus)
To: [email protected]
Subject: Hmm.

I'll start at the beginning...

On April 3rd, I arrived at my workplace (a computer store) around 3 pm.
Multiplexor is sitting in the back with some FBI agent and Detective Dennis
Sadler.  The reason they chose my store for technical support is because Dennis
and one of my managers are very good friends.

I saw what was happening, and I saw Multiplexor call up Kludge's board and try
to log on, but alas he was not validated.  Nonetheless, that same day I told
Gatsby and Kludge what was up, because they are/were my friends and I didn't
want something bad to happen to them.

A few days later, my boss suggested that I tell Dennis that I was on Kludge's
board awhile ago, but that I was not anymore because they might have found
something on me.  So the next time I saw him (he comes in about once a week,
still), I told him that I was on the board awhile ago, but that I wasn't
anymore.  He asked a few stupid questions and I didn't really say a whole bunch
about.

He eventually found out that I had warned Kludge about his board.  I am not
really sure how, I sure as heck didn't tell him.  He then told me that I
nearly blew their investigation and for interfering with an investigation the
maximum penalty was like 5 years or something like that.  He was getting ready
to arrest me and take me down to the county courthouse when my boss was able to
convince him that I was a good kid, not looking for trouble, and that I would
get him something to re-strengthen.  So, even though Dennis didn't tell me
specifically to get something from Kludge's board, he told me that what he
needed to get his case back up to par was an idea of what was on the board,
like a buffering of his system.

That night I called up Gatsby and got his password from him.  I called and
buffered.  The next time that I saw him [Sadler], I told him what I had done.
He wanted to know how I got on Kludge's board, and I told him through a
friend's account.  He asked me which friend, and I said "The Gatsby."  He then
started asking me a bunch of questions about Gatsby such as, "What is his real
name?"  And, at first I said that I didn't want to tell him, and then he said
that I was withholding evidence and he could bust me on that alone.  So I told
him his name and that he lived in XXXXX (a suburb of San Diego).  They already
had him and Kludge in phone conversations over Kludge's line since it was taped
for a while so they knew who he was in the first place.

If Sadler didn't have anything hanging over my head, such as interfering with
an investigation, and/or withholding evidence, then I would not have said jack,
more than likely.  My first contact with him was on suggestion of my boss, who
is a good friend of his, and he might have told my boss something which made
him worry and think that I would be arrested for something, I do not know.

Now, if I was a nark, then I can assure you that a LOT more people would have
gone down.  I have a plethora of information on who is who, who is where, who
does what, etc. and, even though it's old, I bet a lot of it is true.  If I
wanted there to be another Operation Sun-Devil, then I would have given all of
that information to him.  But I didn't, because that is not at all what I had
wanted.  I didn't want anyone to get busted (including myself) for anything.

If I were a nark, then I would probably have given him a lot more information,
wouldn't you think?

I sure do.

I am not asking anyone to forget about it.  I know that I screwed up, but there
is not a whole bunch about it that I can do right now.

When Sadler was here asking me questions, it didn't pop into my mind that I
should tell him to wait and then go and call my attorney, and then a few
minutes later come back and tell him whatever my lawyer said.  I was scared.
_______________________________________________________________________________

 Hackers Aren't The Real Enemy                                     June 8, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 By Chris Goggans (ComputerWorld)(Page 37)

(Goggans is a 23-year old hacker who is currently seeking employment with
anyone who won't make him cut his hair.)

For years articles have been published about people who call themselves
"hackers."  These have been written by people who have investigated hackers,
who have been the targets of hackers, who secure systems against hackers and
who claim to know hackers.  As a member of the so-called "computer
underground," I would like to present the hacker's point of view.

I hope you will put aside any personal bias you may have toward people who call
themselves  hackers  because it is probably based on media reports rather than
real contact.

I also hope you won't refuse to read this because you have a problem with my
ethics.  Over the past 11 years, operating under the pseudonym Erik Bloodaxe, I
had opportunities to become rich beyond the dreams of avarice and wreak great
havoc on the world's computer networks.  Yet I have done neither.  I have
looked behind doors that were marked "employees only" but have never disrupted
the operation of business.  Voyeurism is a far cry from rape.

Illegal, but not criminal

Undeniably, the actions of some hackers are illegal, but they are still hardly
criminal in nature.  The intention of most of these individuals is not to
destroy or exploit systems but merely to learn in minute detail how they are
used and what they are used for.  The quest is purely intellectual, but the
drive to learn is so overwhelming that any obstacle blocking its course will be
circumvented.  Unfortunately, the obstacles are usually state and federal laws
on unauthorized computer access.

The overwhelming difference between today's hackers and their 1960s MIT
namesakes is that many of my contemporaries began their endeavors too young to
have ready access to computer systems.  Few 13-year-olds find themselves with
system privileges on a VAX through normal channels.

My own first system was an Atari 8-bit computer with 16K of memory.  I soon
realized that the potential of such a machine was extremely limited. With the
purchase of a modem, however, I was able to branch out and suddenly found
myself backed by state-of-the-art computing power at remote sites across the
globe.  Often, I was given access by merely talking to administrators about the
weak points in their systems, but most often my only access was whatever
account I may have stumbled across.

Many people find it hard to understand why anyone would risk prosecution just
to explore a computer system.  I have asked myself that same question many
times and cannot come up with a definitive answer.  I do know that it is an
addiction so strong that it can, if not balanced with other activities, lead to
total obsession.  Every hacker I know has spent days without sleep combing the
recesses of a computer network, testing utilities and reading files.  Many
times I have become so involved in a project that I have forgotten to eat.

Hackers share almost no demographic similarities:  They are of all income
levels, races, colors and religions and come from almost every country.  There
are some shared characteristics, however.  Obsessive-compulsive behavior (drug
or alcohol abuse, gambling, shoplifting) is one.  Others have a history of
divorce in their families, intelligence scores in the gifted to genius level,
poor study habits and a distrust of any authority figure.  Most hackers also
combine inherent paranoia and a flair for the romantic -- which is apparent in
the colorful pseudonyms in use throughout the hacker community.

In most cases, however, once hackers reach college age -- or, at minimum, the
age of legal employment -- access to the systems they desire is more readily
available through traditional means, and the need to break a law to learn is
curtailed.

Popular media has contributed greatly to the negative use of the word "hacker."
Any person found abusing a long-distance calling card or other credit card is
referred to as a hacker.  Anyone found to have breached computer security on a
system is likewise referred to as a hacker and heralded as a computer whiz,
despite the fact that even those with the most basic computer literacy can
breach computer security if they put their minds to it.

Although the media would have you believe otherwise, all statistics show that
hackers have never been more than a drop in the bucket when it comes to serious
computer crime.  In fact, hackers are rarely more than a temporary nuisance, if
they are discovered at all.  The real danger lies in the fact that their
methods are easily duplicated by people whose motives are far more sinister.
Text files and other information that hackers write on computer systems can be
used by any would-be corporate spy to help form his plan of attack on a
company.

Given that almost everyone is aware of the existence and capabilities of
hackers -- and aware of how others can go through the doors hackers open -- the
total lack of security in the world's computers is shocking.

Points of entry

The primary problem is poor systems administration.  Users are allowed to
select easily guessed passwords.  Directory permissions are poorly set.  Proper
process accounting is neglected.  Utilities to counter these problems exist for
every operating system, yet they are not widely used.

Many systems administrators are not provided with current information to help
them secure their systems.  There is a terrible lack of communication between
vendors and customers and inside the corporate community as a whole.

Rather than inform everyone of problems when they are discovered, vendors keep
information in secret security databases or channel it to a select few through
electronic-mail lists.  This does little to help the situation, and, in fact,
it only makes matters worse because many hackers have access to these databases
and to archives of the information sent in these mailing lists.

Another major problem in system security comes from telecommunications
equipment.  The various Bell operating companies have long been the targets of
hackers, and many hackers know how to operate both corporate and central office
systems better than the technicians who do so for a living.

Increased use of computer networks has added a whole new dimension of
insecurity.  If a computer is allowed to communicate with another on the same
network, every computer in the link must be impenetrable or the security of all
sites is in jeopardy.  The most stunning examples of this occur on the
Internet.  With such a wide variety of problems and so little information
available to remedy them, the field of computer security consulting is growing
rapidly.  Unfortunately, what companies are buying is a false sense of
security.  The main players seem to be the national accounting firms.  Their
high-cost audits are most often procedural in nature, however, and are rarely
conducted by individuals with enough technical expertise to make
recommendations that will have a real and lasting effect.

Ultimately, it is the responsibility of the systems administrators to ensure
that they have the proper tools to secure their sites against intrusion.
Acquiring the necessary information can be difficult, but if outsiders can get
their hands on this information, so can the people who are paid to do the job.
_______________________________________________________________________________

                               THE GREAT DEBATE

                          Phiber Optik v. Donn Parker

 Cyberpunk Meets Mr. Security                                         June 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 By Jonathan Littman (PC Computing Magazine)(Page 288)

The boy cautiously approached the table and asked the tall, distinguished bald
gentleman in the gray suit if he could join him.  The boy's conference name tag
read Phiber Optik; the gentleman's read Donn Parker.  One was a member of the
Legion of Doom, the infamous sect of teenage hackers charged with fraud,
conspiracy, and illegal computer access in 1990; the other was a legendary
security expert.

The unlikely pair had been brought together by an unusual gathering, the
nation's first Computers, Freedom, and Privacy conference, held in the San
Francisco Bay Area on the last weekend of March 1991.  They were part of an
eclectic mix of G-men, Secret Service agents, prosecutors, privacy advocates,
and hackers who had come to see the other side up close.

Only weeks before, Optik's laptop computer had been seized by state police in
an investigation begun by the Secret Service.  Optik and fellow hackers Acid
Phreak and Scorpion were among the first to come under the scrutiny of the
Secret Service in the days of Operation Sun Devil, a 14-city sweep in the
spring of 1990 that resulted in 42 seized computers, 23,000 confiscated disks,
and four arrests.

The criminal charges brought against Optik and his cohort included illegal
computer access and trading in stolen access codes.  Optik, a juvenile at the
time of his initial questioning, spent a day in jail and was later convicted of
a misdemeanor for theft of services.

Parker knew the story well.  Over the last two decades, the former Lutheran
Sunday school teacher has interviewed dozens of criminals to whom computers
were simply the tools of the trade.  Along the way, he earned a worldwide
reputation as the bald eagle of computer crime.  Parker speaks frequently to
law-enforcement agencies and corporations as a consultant to SRI International,
a leading research and management firm based in Menlo Park, California.  His
books Fighting Computer Crime and Crime by Computer, countless articles, and a
large Justice Department study on computer ethics have established him as the
foremost authority on the hacker psyche.

PARKER: How do you view the ethics of getting into someone's computer system?

OPTIK:  I know what your point of view is because I've read your papers and
        I've listened to you talk.  I know that you think any entry, you know,
        any unauthorized entry, is criminal.

        I can't say I agree with that.  I do agree that anyone who's an
        impressionable teenager, who's on the scene and wants to break into as
        many computers as is humanly possible to prove a point, has the
        potential to do damage, because they're juveniles and have no idea what
        they're doing, and they're messing around in places that they have no
        business being.

        At the time, I was 17 years old and still a minor.  There was no way I
        was going to be able to buy a Unix, a VAX, my own switching system.
        These are the things I'm interested in learning how to program.  It
        would not have been possible to access this type of computer
        development environment had I not learned how to break into systems.
        That's the way I see it.

PARKER: What are you doing at this conference?  What's your purpose?

OPTIK:  Basically I want to be exposed to as many people as possible and hear
        as many people's views as I can.

PARKER: What's your ultimate purpose then-what would you like to do as far as
        a career?  Do you think this is a way for you to get into a career?

OPTIK:  Well, of course, I hope to enter the computer industry.  Just by being
        here, I hope to talk to people like you, the many people who are
        professionals in the field, hear their views, have them hear my views.

        See, the thing I regret the most is that there is this communication
        gap, a lack of dialogue between people who proclaim themselves to be
        hackers and people who are computer professionals.  I think if there
        were a better dialogue among the more respectable type of hackers and
        the computer professionals, then it would be a lot more productive.

PARKER: How do you tell the difference between a more responsible type of
        hacker? 

OPTIK:  I realize that its a very big problem.  I can see that it's pretty
        impossible to tell, and I can clearly understand how you come to the
        conclusions that you initially state in your paper about how hackers
        have been known to cheat, lie, and exaggerate.  I experienced that
        firsthand all the time.  I mean, these people are generally like that.
        Just keep in mind that a large number of them aren't really hardcore
        hackers -- they're impressionable teenagers hanging out.  Its just that
        the medium they're using to hang out is computers.

        I don't consider myself part of that crowd at all.  I got into
        computers early on. Like when I was entering junior high school.  I was
        really young, it must have been preteen years.  I'm talking about 12 or
        13 years old when I got a computer for Christmas.

        I didn't immediately go online.  I'm not one of these kids today that
        get a Commodore 64 with a modem for Christmas because they got good
        grades on their report card.  The reason I would have called myself a
        hacker is, I was hacking in the sense of exploring the world inside my
        computer, as far as assembly language, machine language, electronics
        tinkering, and things of that nature.  That truly interested me.

        The whole social online thing I could really do without because that's
        where these ideas come from.  You know, this whole negative, this bad
        aftertaste I get in my mouth when I hear people put down the whole
        hacking scene.  Its because of what they're hearing, and the reason
        they're hearing this is because of the more outspoken people in this
        "computer underground" and the twisted coverage in the media, which is
        using this whole big hype to sell papers.

        And the people who are paying the price for it are people like me; and
        the people who are getting a twisted view of things are the
        professionals, because they're only hearing the most vocal people.
        It's another reason why I'm here, to represent people like myself, who
        want other people to know there are such things as respectable hackers.
        You know hacking goes beyond impressionable young teenage delinquents.

PARKER: How would you define hacking?

OPTIK:  It's this overall wanting to understand technology, to be able to
        communicate with a machine on a very low level, to be able to program
        it.  Like when I come upon a computer, it's like my brain wants to talk
        to its microprocessor.  That's basically my philosophy.

PARKER. And does it matter to you who actually owns the computer?

OPTIK:  Usually it does.  Oh, at first it didn't matter.  The mere fact of
        getting into Unix, and learning Unix, was important enough to warrant
        me wanting to be on the system.  Not because of information that was in
        there. I really don't care what the information is.

        You know there's that whole Cyberpunk genre that believes information
        should be free.  I believe in computer privacy wholly.  I mean if
        someone wants something to be private, by all means let it be private.
        I mean, information is not meant for everyone to see if you design it
        as being private.  That's why there is such a thing as security.

        If someone wants to keep something private, I'm not going to try to
        read it.  It doesn't interest me. I couldn't care less what people are
        saying to each other on electronic mail.  I'm there because I'm
        interested in the hardware.

PARKER: How is anyone else going to know that you're not interested in reading
        their private mail?

OPTIK:  That's a problem I have to deal with.  There's not a real solution in
        the same way that there's no way that you're really going to be able
        to tell whether someone's malicious or not.  Hackers do brag, cheat,
        and exaggerate.  They might tell you one thing and then stab you in the
        back and say something else.

PARKER: I've interviewed over 120 so-called computer criminals.

OPTIK:  Right.

PARKER: I've interviewed a lot of hackers, and I've also interviewed a lot of
        people engaged in all kinds of white-collar crime.

OPTIK:  Yeah.

PARKER: And it seems to me that the people I have talked with that have been
        convicted of malicious hacking and have overcome and outgrown that
        whole thing have gone into legitimate systems programming jobs where
        there is great challenge, and they're very successful.  They are not
        engaged in malicious hacking or criminal activity, and they're making a
        career for themselves in technology that they love.

OPTIK:  Right.

PARKER: Why couldn't you go that route?  Why couldn't you get your credentials
        by going to school like I did and like everybody else did who functions
        as a professional in the computer field, and get a challenging job in
        computer technology?

OPTIK:  I certainly hope to get a challenging job in computer technology.  But
        I just feel that where I live, and the way the school system is where I
        am, it doesn't cater to my needs of wanting to learn as much about
        technology as fast as I want to learn.

PARKER: Yeah, but one of the things you have to learn, I guess, is patience,
        and you have to be willing to work hard and learn the technology as
        it's presented.

OPTIK:  You know, you just have to remember that by being able to go places
        that people shouldn't, I'm able to learn things about technology that
        schools don't teach.  It's just that programs in local colleges where I
        am, they couldn't even begin to grasp things that I've experienced.

PARKER: OK, so you want instant gratification then.

OPTIK:  It's not so much gratification . . .

PARKER: You're not willing to spend four years in a--

OPTIK:  I certainly am willing to go to college.

PARKER: Uh huh.

OPTIK:  I definitely intend to go to college; I just don't expect to learn very
        much concerning technology. I do expect to learn some things about
        technology I probably didn't know, but I don't expect to be exposed to
        such a diverse amount of technology as in my teenage years.

PARKER: OK, well, I can see impatience and a lack of opportunity to do all
        that stuff very quickly, but--

OPTIK:  I wouldn't go so far as to call it impatience.  I'd call it an
        eagerness to learn.

PARKER: Eagerness to learn can be applied in the establishment process of
        education in all kinds of ways.  You can excel in school.

OPTIK:  I was never Mr. Academia, I can tell you that right off the bat.  I
        don't find much of interest in school.  Usually I make up for it by
        reading technology manuals instead.

PARKER: How are you going to spend four years in school if you've already
        decided you're really not suited to be in school?

OPTIK:  Well, it's not so much school as it is that I feel constrained being in
        high school and having to go through junior high school and high school
        because of the way the educational program are tailored to like, you
        know --

PARKER: Well, if you hold this direction that you're going right now, you could
        very well end up as a technician repairing equipment, maintaining
        computers, and you could very well end up in a dead-end job.

        In order to break into a higher level of work, you need a ticket, you
        need a degree, you have to prove that you have been able to go to
        school and get acceptable grades.  The route that you're going doesn't
        seem to me to lead to that.

        Now there are some people who have managed to overcome that, OK --
        Geoff Goodfellow.  Steve Wozniak.  But those people are 1 out of
        100,000.  All the other 99,000-odd people are technicians.  They're
        leading reasonable lives, making a reasonable income, but they're not
        doing very big things.  They're keeping equipment running.

OPTIK:  Yeah.

PARKER: And if you have all this curiosity and all this drive and this energy
        (which is what it takes), and you go a route that gets you to a
        position where you can do real, exciting, advanced research . . .  I
        mean, I've talked to a lot of hackers.  I'm thinking of one in
        Washington, D.C., who was convicted of a computer crime.  He went back
        to school, he's got his degree, and he has a very top systems
        programming job.  He said he finally reached a point where he decided
        he had to change the way he was going about this, because the way
        things were going, the future for him was pretty bleak.

        And it seems to me, hopefully, you may come to a realization that to
        do important things, exciting things, ultimately you've got to learn
        the computer-science way of presenting operating systems, and how to
        write programs of a very large, complex nature.

        Have you ever done that, have you ever written a really big computer
        program?

OPTIK:  I've written this . . .

PARKER: There's a discipline involved that has to do with learning how to be an
        engineer.  It takes a tremendous amount of education and discipline.
        And it sounds to me like you lack the discipline.  You want instant
        gratification, you want to be an expert now.  And you end up being an
        expert all right, but in a very narrow range of technology.

        You learn the Novell LAN, you learn some other aspect, you learn about
        a telephone company's switching system.  That doesn't lead to a career
        in designing and developing systems.  That leads to a career in
        maintaining the kind of hardware that you've been hacking.

        And it seems to me you've got to go back and learn the principles.
        What are the basic principles of an operating system?  What are the
        basic principles of access control?  Until you've gone back and learned
        those basics, you're flying by the seat of your pants, and just picking
        up odds and ends of stuff that you can grab quickly.

OPTIK:  I don't see it so much as grabbing things quickly.  I've put a lot of
        time into studying very detailed things.  It's not so much popping in
        and popping out and whatever I find I'm glad I found it.  I do spend a
        lot of time studying manuals and things.

PARKER: Manuals are not going to do it.  All you do in learning a manual is
        learn the current equipment and how it works.  If you studied Donald
        Kanuth's volumes on computer science programming and computer sciences,
        you would learn the theory of computer programming, you would learn
        the operating system theory, you would learn the theory that is the
        foundation on which all of these systems are built.

OPTIK:  But that's the thing I guess I don't do. I was never much concerned
        with theory of operation.  I was always concerned with how things work,
        and how I can use them.  Like how to program.  I'll admit I was never
        much into theory.  It never interested me.  Like with what I do-theory
        really doesn't play any role at the present time.  Of course, that's
        subject to change at any time.  I'm rather young . . .

A FRIEND WHISPERED in Optik's ear that it was time to go.  Still locked in
debate, the hacker and the security man left the table and walked together
toward the escalator.  In profile, at the bottom of the moving stairs, they
were an odd couple:  Optik with his shiny, jet black hair, Parker with his
shiny dome.

Parker was speaking calmly, warning Optik that one day hacking wouldn't seem
so boundless, that one day his opportunities wouldn't seem quite so vast.
Optik fidgeted, glancing away.  Conference attendees filed up the escalator.

"I don't want to be a hacker forever," blurted Optik.

The next afternoon the bank of hotel phones was crowded with business people
and conference attendees punching in to get their messages and make their
calls.  There was Optik, wedged between the suits, acoustic coupler slipped
over the phone receiver, a laptop screen flickering before his eyes, his hands
flitting over the keys.

He was still young.
[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2024, Phrack Magazine.