222 lines
7.7 KiB
Plaintext
222 lines
7.7 KiB
Plaintext
|
|
|||
|
[%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%]
|
|||
|
[ ]
|
|||
|
[ The Great Satellite Caper ]
|
|||
|
[ ]
|
|||
|
[ Typed by: ]
|
|||
|
[ Silent Rebel ]
|
|||
|
[ * ]
|
|||
|
[ ( 40 columns ) ]
|
|||
|
[ ]
|
|||
|
[ Uploaded by Elric of Imrryr ]
|
|||
|
[ Lunatic Labs News Dept ]
|
|||
|
[ ]
|
|||
|
[%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%]
|
|||
|
|
|||
|
Taken from: Time magazine
|
|||
|
July 29, 1985
|
|||
|
|
|||
|
The Great Satellite Caper
|
|||
|
Hackers' arrests point up the growing
|
|||
|
problem of system security
|
|||
|
----
|
|||
|
It started innocuously enough: a
|
|||
|
credit card customer in Connecticut
|
|||
|
opened his monthly statement and
|
|||
|
noticed a charge for a piece of
|
|||
|
electronic equipment that he had never
|
|||
|
purchased. By last week that apparent
|
|||
|
billing error had blossomed into a
|
|||
|
full-fledged hacker scandal and led to
|
|||
|
the arrest of seven New Jersey
|
|||
|
teenagers who were charged with
|
|||
|
conspiracy and using their home
|
|||
|
computers and telephone hookups to
|
|||
|
commit computer theft.
|
|||
|
According to police, who confiscated
|
|||
|
$30,000 worth of computer equipment
|
|||
|
and hundreds of floppy disks, the
|
|||
|
youths had exchanged stolen credit card
|
|||
|
numbers, bypassed long-distance
|
|||
|
telephone fees, traded supposedly
|
|||
|
secret phone numbers (including those
|
|||
|
of top Pentagon officials) and
|
|||
|
published instructions on how to
|
|||
|
construct a letter bomb. But most
|
|||
|
remarkable of all, the first reports
|
|||
|
said, the youngsters had even managed
|
|||
|
to shift the orbit of one or more
|
|||
|
communication satellites. That feat,
|
|||
|
the New York Post decided, was worth
|
|||
|
a front-page headline: WHIZ KIDS ZAP
|
|||
|
U.S. SATELLITES.
|
|||
|
It was the latest version of the hit
|
|||
|
movie WarGames, in which an ingenious
|
|||
|
teenager penetrates a sensitive
|
|||
|
military computer system and nearly
|
|||
|
sets of World War III. Two years ago,
|
|||
|
for instance, the story was re-enacted
|
|||
|
by the so-called 414 Gang, a group
|
|||
|
of Milwaukee-area youths who used
|
|||
|
their machines to break into dozens
|
|||
|
of computers across the U.S.
|
|||
|
The New Jersey episode assumed heroic
|
|||
|
proportions when Middlesex County
|
|||
|
Prosecutor Alan Rockoff reported that
|
|||
|
the youths, in addition to carrying
|
|||
|
on other mischief, had been "changing
|
|||
|
the position of satellites up in the
|
|||
|
blue heavens." That achievement, if
|
|||
|
true, could have disrupted telephone
|
|||
|
and telex communications on two
|
|||
|
continents. Officials from AT&T and
|
|||
|
Comsat hastily denied that anything of
|
|||
|
the sort had taken place. In fact, the
|
|||
|
computers that control the movement
|
|||
|
of their satellites cannot be reached
|
|||
|
by public telephone lines. By weeks
|
|||
|
end the prosecutor's office was quietly
|
|||
|
backing away from its most startling
|
|||
|
assertion, but to most Americans, the
|
|||
|
satellite caper remained real, a
|
|||
|
dramatic reminder that for a bright
|
|||
|
youngster steeped in the secret arts
|
|||
|
of the computer age, anything is
|
|||
|
possible. Says Steven Levy, author
|
|||
|
of Hackers: "It's an immensely
|
|||
|
seductive myth, that a kid with a
|
|||
|
little computer can bring a powerful
|
|||
|
institution to its knees."
|
|||
|
Last spring postal authorities traced
|
|||
|
the Connecticut credit card purchase
|
|||
|
and a string of other fraudulent
|
|||
|
transactions to a post-office box in
|
|||
|
South Plainfield, N.J. Someone was
|
|||
|
using the box to take delivery of
|
|||
|
stereo and radar-detection
|
|||
|
equipment ordered through a
|
|||
|
computerized mail-order catalog. The
|
|||
|
trail led to a young New Jersey
|
|||
|
enthusiast who used the alias "New
|
|||
|
Jersey Hack Sack" and communicated
|
|||
|
regularly with other computer owners
|
|||
|
over a loosely organized network of
|
|||
|
electronic bulletin boards. A computer
|
|||
|
search of the contents of those boards
|
|||
|
by Detective George Green and Patroman
|
|||
|
Michael Grennier, who is something of
|
|||
|
a hacker himself, yielded a flood of
|
|||
|
gossip,advice,tall tales, and hard
|
|||
|
information including excerpts from an
|
|||
|
AT&T satellite manual, dozens of secret
|
|||
|
telephone numbers and lists of stolen
|
|||
|
credit card numbers.
|
|||
|
The odd mix was not unique to the
|
|||
|
suspect bulletin boards. Explains Donn
|
|||
|
Parker, a computer crime expert at
|
|||
|
SRI International in Menlo Park,Calif.:
|
|||
|
"Hacking is a meritocracy. You rise in
|
|||
|
the culture depending on the
|
|||
|
information you can supply to other
|
|||
|
hackers. It's like trading bubble gum
|
|||
|
cards."
|
|||
|
Some of the information posted
|
|||
|
by the New Jersey hackers may have been
|
|||
|
gleaned by cracking supposedly secure
|
|||
|
systems. Other data, like the access
|
|||
|
numbers of remote computers, were
|
|||
|
probably gathered automatically by
|
|||
|
so-called demon dialers, programs that
|
|||
|
search the phone system for on-line
|
|||
|
computers by dialing, in sequence,
|
|||
|
every phone number within an area code.
|
|||
|
"In some cases it takes a great deal
|
|||
|
of skill and knowledge," says Parker.
|
|||
|
"In others it's as simple as dialing
|
|||
|
into a bulletin board and finding the
|
|||
|
passwords that other kids have left."
|
|||
|
And sometimes it is even simpler than
|
|||
|
that. Two of the New Jersey youths
|
|||
|
admitted that at least one of the
|
|||
|
credit card numbers they used had come
|
|||
|
not from a computer but from a slip
|
|||
|
of carbon paper retrieved from a trash
|
|||
|
can.
|
|||
|
No matter how mudane, the actions of
|
|||
|
the New Jersey hackers have again
|
|||
|
focused national attention on a real
|
|||
|
and growing problem: how to safeguard
|
|||
|
the information that is stored inside
|
|||
|
computers. Americans now carry more
|
|||
|
more than 600 million credit cards,
|
|||
|
many of them allowing at least partial
|
|||
|
access to a computerized banking system
|
|||
|
that moves more than $400 billion every
|
|||
|
day. Corporate data banks hold consumer
|
|||
|
records and business plans worth untold
|
|||
|
billions more.
|
|||
|
Alerted to the threat by earlier
|
|||
|
break-ins, corporations and government
|
|||
|
agencies have been moving to shore up
|
|||
|
their systems. Many have issued
|
|||
|
multiple layers of password protection,
|
|||
|
imposing strict discipline on the
|
|||
|
secrecy of passwords and requiring
|
|||
|
users to change theirs frequently.
|
|||
|
Others have installed scrambling
|
|||
|
devices that encode sensitive data
|
|||
|
before they are sent,over the wires.
|
|||
|
Audit trails make crime detection
|
|||
|
easier by keeping a permanent record of
|
|||
|
who did what within a system. Dial-back
|
|||
|
services help keep out unauthorized
|
|||
|
users by recording each caller's ID
|
|||
|
number, disconnecting the call and then
|
|||
|
redialing only that telephone number
|
|||
|
authorized by the holder of the ID.
|
|||
|
All told, U.S. business spent
|
|||
|
$600 million last year on security
|
|||
|
equipment and software. By 1993,
|
|||
|
according to Datapro Research, security
|
|||
|
expenditures could exceed $2 billion
|
|||
|
annually. In addition to the cost,these
|
|||
|
measures tend to make the systems
|
|||
|
harder to use, or less "friendly," in
|
|||
|
the jargon of the trade. But computer
|
|||
|
operators who like to keep their
|
|||
|
systems casual may be courting trouble.
|
|||
|
Says SRI's Parker: "These are
|
|||
|
reasonable, cost-effective steps that
|
|||
|
managers who don't use them pretty much
|
|||
|
deserve what they get."
|
|||
|
|
|||
|
-By Phillip Elmer-DeWitt
|
|||
|
Reported by Marcia GaugerNNew York and
|
|||
|
Stephen KoeppLLos Angeles
|
|||
|
|
|||
|
|