137 lines
8.3 KiB
Plaintext
137 lines
8.3 KiB
Plaintext
|
|
|
|||
|
|
|
|||
|
|
"Intense probe targets shadowy hackers group with local ties"
|
|||
|
|
-----------------------------------------------------------
|
|||
|
|
Sunday, April 15, 1990 / Austin American-Statesman
|
|||
|
|
by Kyle Pope
|
|||
|
|
|
|||
|
|
A shadowy gang of computer hackers with ties to Austin has become the
|
|||
|
|
target of a massive federal probe into the nation's high-tech underground.
|
|||
|
|
Federal and local authorities involved in the inquiry seized evidence from
|
|||
|
|
three Austin homes and a business in March. They say some action on the local
|
|||
|
|
cases, possibly including indictments or arrests, is expected in the next
|
|||
|
|
month.
|
|||
|
|
The computer crime crackdown - the largest ever launched by the U.S.
|
|||
|
|
government - has resulted in the temporary disbanding of the Legion of Doom, a
|
|||
|
|
notorious national group of young computer hobbyists with at least two Austin
|
|||
|
|
members.
|
|||
|
|
State and federal investigators say the 6-year-old group, which once
|
|||
|
|
boasted more than 150 members in nearly every U.S. state, has been connected
|
|||
|
|
to a string of computer crimes in Texas, Georgia, Arizona, Illinois,
|
|||
|
|
California and New Jersey.
|
|||
|
|
Officials say group members have electronically stolen money and long-
|
|||
|
|
distance telephone access numbers, changed credit reports, planted data-
|
|||
|
|
destroying computer viruses in government networks, attempted to tamper with
|
|||
|
|
hospital patient records, and distributed information that, if used, could
|
|||
|
|
have debilitated the nation's 911 emergency response network.
|
|||
|
|
So far, only four Legion of Doom members have been indicted for the
|
|||
|
|
crimes, and none has gone to trial.
|
|||
|
|
However, an investigation team coordinated by Assistant U.S. Attorney
|
|||
|
|
William Cook in Chicago and including the secret Service, the U.S. Department
|
|||
|
|
of Justice, the FBI and a handful of state attorney generals, has in the past
|
|||
|
|
six months raided the homes and businesses of about a dozen suspected legion
|
|||
|
|
members across the country.
|
|||
|
|
In Austin, Secret Service agents, local police and officers from the
|
|||
|
|
University of Texas Police Department seized computer equipment and documents
|
|||
|
|
from three homes as part of the probe.
|
|||
|
|
One local business, a role-playing game-publishing company called Steve
|
|||
|
|
Jackson Games, also was raided in the March crackdown, but officials say the
|
|||
|
|
firm is not a primary target of the hacker investigation. The firm is
|
|||
|
|
believed to have been raided because investigators wanted to examine equipment
|
|||
|
|
used by an employee.
|
|||
|
|
The search warrants used in the raids remain sealed from public view, and
|
|||
|
|
Secret Service and UTPD officials declined to comment on the case.
|
|||
|
|
Law enforcement sources say one of the targets of the Austin investigation
|
|||
|
|
is a juvenile who is not believed to be a member of the hacker group.
|
|||
|
|
The two other Austinites under investigation are legion members,
|
|||
|
|
authorities say, and have been linked to the 911 probe centered in Chicago.
|
|||
|
|
According to law enforcement sources, the two men helped circulate
|
|||
|
|
information about the 911 system's software through a national bulletin board
|
|||
|
|
network that hackers could call by using a telephone, a computer and a modem.
|
|||
|
|
In addition, details about ways to tamper with the emergency system were
|
|||
|
|
published in Phrack, a legion newsletter.
|
|||
|
|
While no one in Austin has been indicted or arrested, officials said they
|
|||
|
|
expect some action on the local cases in the next month.
|
|||
|
|
And state and federal authorities involved in the national investigation
|
|||
|
|
say they are preparing dozens of additional indictments aimed at the entire
|
|||
|
|
membership roster of the Legion of Doom.
|
|||
|
|
"It doesn't matter whether you commit a burglary by telephone or by
|
|||
|
|
breaking into a building," said Gail Thackeray, an assistant attorney general
|
|||
|
|
in Arizona, one of a handful of state investigators working solely on computer
|
|||
|
|
crime.
|
|||
|
|
"Did they expect that the rest of us would sit by and let every idiot kid
|
|||
|
|
in America break into our 911 system?" she said. "I do not respect the right
|
|||
|
|
of hackers to learn what they want to learn at the expense of the rest of us."
|
|||
|
|
Thackeray, who helped investigate a hacker's attempt to break into the
|
|||
|
|
computer system at the Barrow Neurological Institute in Phoenix, said the
|
|||
|
|
recent legion crackdown is a result of improved coordination among law
|
|||
|
|
enforcement agencies with jurisdiction over computer crime. In addition, she
|
|||
|
|
said, the effort has been boosted by a new breed of investigators with
|
|||
|
|
computing expertise.
|
|||
|
|
Because of the potential for widespread damage to both government and
|
|||
|
|
business computer systems, officials say the hacker probe has caught the eye
|
|||
|
|
of the Justice Department, which is pushing U.S. attorneys throughout the
|
|||
|
|
country to beef up their computer crime-fighting capacity.
|
|||
|
|
"There is a push on Capitol Hill to shore up our activity in this area,"
|
|||
|
|
said an assistant U.S. attorney who asked not to be named. "I think this is
|
|||
|
|
the beginning of a boom."
|
|||
|
|
Said Thackeray: "There's more computer crime going on out there than any
|
|||
|
|
one agency can handle. We're totally flooded."
|
|||
|
|
For members of the Legion of Doom, the unwanted law enforcement attention
|
|||
|
|
is nothing new.
|
|||
|
|
Formed in 1984 and named for a gang that took on Superman and other heroes
|
|||
|
|
in the television cartoon Superfriends, the group has survived two other waves
|
|||
|
|
of criminal investigations.
|
|||
|
|
The first, in 1985, resulted in the arrest and conviction of five of the
|
|||
|
|
legion's founders for credit card fraud and theft by wire.
|
|||
|
|
After a brief resurgence, group members again were arrested en masse in
|
|||
|
|
1987, only to revive again in 1988.
|
|||
|
|
But according to investigators familiar with the group, pressure form the
|
|||
|
|
recent legion crackdown is the most intense to date. Several of the
|
|||
|
|
investigators said the legion has shut down, at least for now.
|
|||
|
|
A history of the group written by one of its founders and obtained by the
|
|||
|
|
Austin American-Statesman seems to bear out investigators' suspicions.
|
|||
|
|
The 10-page document recounts significant developments in the group's
|
|||
|
|
history, from its founding in 1984 (an event "that would ultimately change the
|
|||
|
|
face of the computer underground forever," the brochure states), to its
|
|||
|
|
current, besieged status.
|
|||
|
|
The pamphlet acknowledges that "there is no indication that points to a
|
|||
|
|
resurgence in the future" and ends with the words "Legion of Doom (1984-
|
|||
|
|
1990)."
|
|||
|
|
The brochure also takes potshots at federal investigators and the media,
|
|||
|
|
often accused by legion members of exaggerating their crimes and
|
|||
|
|
sensationalizing the group.
|
|||
|
|
"The Legion of Doom has been called everything from 'organized crime' to a
|
|||
|
|
'communist threat to national security' to an 'international conspiracy of
|
|||
|
|
computer terrorists bent on destroying the nation's 911 service,'" the
|
|||
|
|
brochure states.
|
|||
|
|
"Nothing comes closer to the actual truth than 'bored adolescents with too
|
|||
|
|
much spare time.'"
|
|||
|
|
Finally, the legion history includes an "alumni" list that contains the
|
|||
|
|
code names of 38 current and former members.
|
|||
|
|
According to the legion's own accounting, 14 of the 38 people on the list
|
|||
|
|
have either been convicted of computer crimes or are under investigation.
|
|||
|
|
Officials familiar with the group say the legion's characterization of
|
|||
|
|
itself as a clique of bored whiz kids is inaccurate. Instead, they portray
|
|||
|
|
group members as sophisticated and organized malcontents who do not accept
|
|||
|
|
conventional concepts of respect and trust.
|
|||
|
|
"These are not just wacky kids," Thackeray said. "They have absolute
|
|||
|
|
contempt for the rest of us."
|
|||
|
|
"They are constantly in a high-level skill kind of game, part of a thrill.
|
|||
|
|
They've totally lost touch with reality."
|
|||
|
|
William Murray, a systems security fellow for the Ernst & Young accounting
|
|||
|
|
firm, said even though hackers take advantage of the tremendous power of
|
|||
|
|
personal computers, they still view their crimes as an electronic game of cat
|
|||
|
|
and mouse.
|
|||
|
|
"This whole sense of excitement and joy is not tempered," Murray said.
|
|||
|
|
"Nobody has told them that they have a responsibility for polite behavior."
|
|||
|
|
Some states, including Arizona, are developing treatment programs for
|
|||
|
|
hackers. Patterned after Alcoholics Anonymous and drug-treatment centers, the
|
|||
|
|
programs are aimed at rehabilitating hackers who have grown dependent on their
|
|||
|
|
craft.
|
|||
|
|
"It is absolutely addictive behavior," Thackeray said. "When they get
|
|||
|
|
their hands on tools as powerful as these computers, they lost all judgement."
|
|||
|
|
|
|||
|
|
|
|||
|
|
|
|||
|
|
|