282 lines
16 KiB
Plaintext
282 lines
16 KiB
Plaintext
|
|
|||
|
*****************************************************************
|
|||
|
The FBI fights computer crime with weapons that are at least ten years old,
|
|||
|
according to one insider with contacts deep inside the "hacker" community.
|
|||
|
|
|||
|
Hampered by the lack of a single federal law that specifically prohibits
|
|||
|
computer crime, and hamstrung by the fact that probably three quarters of the
|
|||
|
computer mischief is done by juveniles who can't be prosecuted to the full
|
|||
|
extent of the law, the famous federal police force nevertheless leads the fight
|
|||
|
against computer crime in the U.S.
|
|||
|
|
|||
|
The agency's chief weapon is training, according to John Lewis, the
|
|||
|
supervisory special agent who teaches a special three week course,
|
|||
|
"Investigative Techniques of Computer-Related Crime" at the ca-p|s-like FBI
|
|||
|
Academy Quantico, Virginia. Lewis and his fellow instructors train FBI agents,
|
|||
|
local police and foreign agencies like Scotland Yard and the Royal Canadian
|
|||
|
Mounted Police on the basics of computers and how to investigate computer
|
|||
|
crimes. Most of the students go in knowing nothing about computers and come out
|
|||
|
"computer literate" three weeks later, according to Lewis.
|
|||
|
|
|||
|
The FBI course is aimed at giving agents a general knowledge of computers and
|
|||
|
how they operate, with a focus on how to find evidence of a crime. An old IBM
|
|||
|
System 3, using transaction records supplied by a friendly bank, simulates real
|
|||
|
banking records. Instructors build frauds into the simulated transactions and
|
|||
|
challenge students to go in and detect the frauds. Students then build a
|
|||
|
criminal case based on the evidence they uncover. Telecommunications, bulletin
|
|||
|
boards and "phone phreak" tricks used to defraud the telephone system are
|
|||
|
touched on only very briefly or not at all.
|
|||
|
|
|||
|
Bureaucracy appears to be one of the main obstacles to bringing agents up to
|
|||
|
date on computer technology. Like many federal agencies, the FBI suffers from
|
|||
|
budgetary and organizational inertia that keeps it behind private industry. For
|
|||
|
instance, Anthony Adamski, chief of the financial-crimes unit, still relies on a
|
|||
|
secretary to pound out his correspondence on a typewriter- no computer terminals
|
|||
|
or word processors are evident in his big, new office in Washington D.C. A bulk
|
|||
|
buy of some 6,000 Burroughs microcomputers mean that desktop computers will be
|
|||
|
showing up on the agents' desks soon, however.
|
|||
|
|
|||
|
Adamski says the FBI has only recently begun to keep statistics on computer
|
|||
|
crime. Therefore, no one can say officially whether computer-related crime is
|
|||
|
going up or down or staying the same. Yet the gut feeling of Adamski and
|
|||
|
training specialists at Quantico is that there has been no big increase of
|
|||
|
computer crime in recent years. The movie War Games and the arrests last July
|
|||
|
of Neal Patrick and the "414s" fueled interest by the media in computer
|
|||
|
break-ins but has produced no substantial increase in the crimes, they say.
|
|||
|
|
|||
|
To some, even the limited amount of computer-crime training the bureau does
|
|||
|
appears wasteful. Donn Parker, a senior management-systems consultant with SRI
|
|||
|
in Menlo Park, California, explains why: "The problem is that the FBI gets a
|
|||
|
whole class of people, gets them all keyed up, and teaches them how to [detect
|
|||
|
computer crime]. Then the agents get home and they look around and can't find
|
|||
|
any use for all that training."
|
|||
|
|
|||
|
There's not enough work to warrant training a number of prosecutors in every
|
|||
|
jurisdiction to handle these cases, says Parker, an internationally recognized
|
|||
|
expert whose latest book is called Fighting Computer Crime (Scribners).
|
|||
|
|
|||
|
"There's only enough [cases] for one or two people in a given area to
|
|||
|
specialize in handling computer offenses.
|
|||
|
|
|||
|
"On the other hand, the FBI has indicated that it is handling a large number
|
|||
|
of these high-tech crimes all across the country. Of course, a high number
|
|||
|
might be a very small number relative to the number of FBI agents," he says.
|
|||
|
|
|||
|
But training alone does not account for the bureau's successes in tracking
|
|||
|
down hackers, as in the headline-grabbing arrests last July of the "414" group
|
|||
|
of teenage computer hackers who broke into computers at Security Pacific Bank,
|
|||
|
the Memorial Sloan-Kettering Cancer Center and the Los Alamos National
|
|||
|
Laboratory. For penetration into the hacker networks, the FBI relies on a far
|
|||
|
older crime-fighting technique: the informer.
|
|||
|
|
|||
|
According to one of its own informants, the FBI was embarrassingly slow to
|
|||
|
catch on to the hackers. Gerald Schmidt (not his real name), one of a loose
|
|||
|
network of hackers who help the government keep tabs on the hacker underground,
|
|||
|
tells how he first contacted the bureau: "A few years ago the first pirate
|
|||
|
bulletin boards appeared. A pirate board is one that exists solely for the
|
|||
|
theft of copyrighted software and phone-phreaking information. [Phone phreaking
|
|||
|
information includes long-distance dialing codes, passwords that let you on
|
|||
|
telephone company computers and the like.] I took a look at a couple of these
|
|||
|
bulletin boards and said "Holy cow, we've got a problem!"
|
|||
|
|
|||
|
"I had to make a delivery right near a local FBI office," Schmidt says. "And
|
|||
|
so I walked into the FBI and said, 'I've got information on software piracy.'
|
|||
|
The FBI had to have something where someone stole money. I said, 'They're not
|
|||
|
selling the software, they're just putting it on bulletin board systems.'
|
|||
|
|
|||
|
"'What's a bulletin board?' They asked. I said, 'A home computer connected to
|
|||
|
a modem.' They said, 'What's a modem?" Then Schmidt showed the agent some
|
|||
|
printouts from the pirates' bulletin boards. They were interested but had no
|
|||
|
computer-crime trained agents in their office. The agents asked Schmidt to
|
|||
|
monitor the pirate boards for them, offering to pay his phone bill and to cover
|
|||
|
his expenses for printer paper and ribbons. He began supplying the agents with
|
|||
|
reams of printouts.
|
|||
|
|
|||
|
The recent, well publicized crackdown on hackers, made possible in part by FBI
|
|||
|
informants, has driven much of this activity underground, and made the hackers
|
|||
|
very abqutious. In retaliation, some of Schmidt's fellow informants have had
|
|||
|
their covers blown in hacker newsletters like Tap and 2600, but others remain in
|
|||
|
place.
|
|||
|
|
|||
|
Some are said to occupy high positions in the strange pecking order that gives
|
|||
|
respect and admiration to the person who can ferret out and share with his
|
|||
|
fellows the most secret and detailed computer passwords and details.
|
|||
|
|
|||
|
(2600 Hertz is one of the frequencies used in so-called blue boxes [or an
|
|||
|
ordinary personal computer if you know how to do it]- illegal hardware devices
|
|||
|
that enable users to make long- distance calls anywhere without charge and
|
|||
|
without detection. The companion hacker device- the black box- lets anyone call
|
|||
|
you long distance without charge.)
|
|||
|
|
|||
|
Why do Schmidt and other hacker-informants turn in their friends?
|
|||
|
|
|||
|
For Schmidt the answer is two-fold: First, he believes that the malicious
|
|||
|
hackers who delete files and scramble computer records in sensitive government
|
|||
|
and medical computer systems have gone too far and should be stopped. Trashing
|
|||
|
nonclassified medical records at the Sloan-Kettering center, for instance, is
|
|||
|
easy to do. The computer has easy access for doctors and researchers and
|
|||
|
contains no classified material. Yet a doctor could kill a patient by
|
|||
|
prescribing a medicine or surgery based on incorrect records- computer records
|
|||
|
that have been tampered with.
|
|||
|
|
|||
|
The second reason is the same one that got Schmidt interested in hacking in
|
|||
|
the first place: the intellectual challenge. "It's the ultimate hack," he
|
|||
|
says. "Hacking the hackers."
|
|||
|
|
|||
|
The information Schmidt began supplying to the FBI was a sample of computer
|
|||
|
hacking that is still going on: a variety of antisocial behavior ranging from
|
|||
|
silly pranks and braggadocio to malicious mischief to dangerous criminal
|
|||
|
behavior. Schmidt divides the illegal hacking into three categories: software
|
|||
|
piracy, free long-distance-calling services and breaking into mainframe
|
|||
|
computers, which he considers the most serious of the three.
|
|||
|
|
|||
|
Schmidt estimates the damages of these kinds of hacking in ballpark figures:
|
|||
|
"The theft of long-distance services is about $100 million a year nationwide,"
|
|||
|
he says. "Piracy of software is easily that much. Credit-card fraud is about
|
|||
|
$200 million." To demonstrate the potential for fraud, Schmidt provided
|
|||
|
Infoworld with the Visa and MasterCard numbers, names and expiration dates for
|
|||
|
half a dozen credit cards. He obtained the information from pirate bulletin
|
|||
|
boards.
|
|||
|
|
|||
|
According to Schmidt, the dollar amounts are only part of the story, GTE
|
|||
|
Telemail, an electronic mail system, was broken into by at least four gangs of
|
|||
|
hackers, he says. "They were raising hell. The system got shut down one time
|
|||
|
for a day. None of these people have been charged, nor have any of the 414s
|
|||
|
been charged yet.
|
|||
|
|
|||
|
"We have a major problem with hackers, phreaks and thieves," says Schmidt, who
|
|||
|
estimates that 75% of criminal hackers are teenagers and the other 25% are
|
|||
|
adults using teenagers to do their dirty work for them.
|
|||
|
|
|||
|
"Adults are masterminding some of this activity. There are industrial spies,
|
|||
|
people playing the stock market with the information- just about any theft or
|
|||
|
fraud you can do with a computer. There are no foreign agents or organized
|
|||
|
crime yet, but it's inevitable," he says. "I believe there are some people out
|
|||
|
there now with possible organized-crime connections.
|
|||
|
|
|||
|
"It's an epidemic. In practically every upper-middle class high school this
|
|||
|
is going on. I know of a high-school computer class in a school in the north
|
|||
|
Dallas suburbs where the kids are trying everything they can think of to get
|
|||
|
into the CIA computers."
|
|||
|
|
|||
|
"It's a strange culture," says SRI's Parker, "a rite of passage among
|
|||
|
technology-oriented youth. The inner circle of hackers say they do it primarily
|
|||
|
for educational purposes and for curiosity. They want to find out what all
|
|||
|
those computers are being used for. There's a meritocracy in the culture, each
|
|||
|
one trying to out do the other. The one who provides the most phone numbers and
|
|||
|
passwords to computer systems rises to the top of the hackers.
|
|||
|
|
|||
|
"For the most part it's malicious mischief," Parker says. "They rationalize
|
|||
|
that they're not really breaking any laws, just 'visiting' computers. But
|
|||
|
that's hard to believe when they also say they've got to do their hacking before
|
|||
|
they turn 18 so they don't come under adult jurisdiction. After 18, they have
|
|||
|
to do it vicariously through surrogates. They are some grand old men of hacking
|
|||
|
who egg on the younger ones... There have been some cases of a Fagin complex- a
|
|||
|
gang of kids led by one or more adults- in Los Angeles."
|
|||
|
|
|||
|
Who are the hackers and what secret knowledge do they have?
|
|||
|
|
|||
|
A 17-year-old youth in Beverly Hills, California, announced himself to other
|
|||
|
hackers on a bulletin board in this way: "Interests include exotic weapons,
|
|||
|
chemicals, nerve gases, proprietary information from Pacific Telephone..."
|
|||
|
|
|||
|
Prized secret knowledge includes the two area codes in North America that have
|
|||
|
not yet installed electronic switching system central-office equipment. Using
|
|||
|
this information you can call those areas and use a blue box to blow the central
|
|||
|
office equipment, and then call anywhere in the world without charge. Other
|
|||
|
secret information lets you avoid being traced when you do this.
|
|||
|
|
|||
|
A knowledge of the phone systems lets hackers share one of the technological
|
|||
|
privileges usually available only to large corporate customers: long-distance
|
|||
|
conference calls connecting up to 59 hackers. Schmidt estimates there are three
|
|||
|
or four conference calls made every night. The hackers swap more inside
|
|||
|
information during the phone calls.
|
|||
|
|
|||
|
Thanks to packet-switching networks and the fact that they don't have to pay
|
|||
|
long-distance charfus, time and distance mean B!5=MQr=Q!%9"=B
|
|||
|
-IM9"UkW-]$[Z,.kV+W..H4ook into phone lines via modems make it easy to obtain
|
|||
|
copyrighted software without human intervention.
|
|||
|
|
|||
|
"Software piracy exists only because they can do it over the phone long
|
|||
|
distance without paying for it," Schmidt says. "some stuff gets sent through
|
|||
|
the mail, but very little. There are bulletin boards that exist solely for the
|
|||
|
purpose of pirating software. A program called ASCII Express Professional (AE
|
|||
|
Pro) for the Apple was designed specifically for modem-to-modem transfers. You
|
|||
|
can make a copy of anything on that computer. It can be copyrighted stuff-
|
|||
|
WordStar, anything. There are probably about three dozen boards like that.
|
|||
|
Some boards exchange information on breaking onto mainframes.
|
|||
|
|
|||
|
"In 1982 the FBI really didn't know what to do with all this information,"
|
|||
|
Schmidt says. "There isn't a national computer- crime statue. And unless
|
|||
|
there's $20,000 involved, federal prosecutors won't touch it."
|
|||
|
|
|||
|
Since then, the public and federal prosecutors' interest has picked up. The
|
|||
|
film War Games and the arrest of 414 group in Milwaukee "created a lot of
|
|||
|
interest on Congress and with other people," FBI instructor Lewis says. "But,
|
|||
|
for ourselves it didn't really have any impact."
|
|||
|
|
|||
|
"We'd been providing the training already," says Jim Barko, FBI unit chief of
|
|||
|
the EFCTU (economic and financial crimes training unit). He says public
|
|||
|
interest may make it easier to fight computer crime. "There are more people
|
|||
|
interested in this particular area now as a problem. War Games identified the
|
|||
|
problem. But I think it was just circumstantial that the movie came out when it
|
|||
|
did."
|
|||
|
|
|||
|
Despite the help of knowledgeable informants like Schmidt, tracking down
|
|||
|
hackers can be frustrating business for the FBI. SRI's Parker explains some of
|
|||
|
the pitfalls of going after hackers: "Some FBI agents are very discouraged
|
|||
|
about doing something about the hacking thing. The cost of investigation
|
|||
|
relative to the seriousness of each case is just too high," he says. "Also,
|
|||
|
federal regulations from the Department of Justice make it almost impossible for
|
|||
|
the FBI to deal with a juvenile."
|
|||
|
|
|||
|
An FBI agent cannot question a juvenile without his parents or a guardian
|
|||
|
being present. The FBI approach has been mostly to support lhe local police
|
|||
|
because local police are the only ones who can deal with juveniles. Another
|
|||
|
difficulty the agency faces is the regulations about its jurisdiction.
|
|||
|
|
|||
|
"There has to be an attack on a government agency, a government contractor or
|
|||
|
a government-insured institution for the FBI to have clear-cut jurisdiction,"
|
|||
|
Parker says.
|
|||
|
|
|||
|
The FBI gets called into a case only after a crime has been detected by the
|
|||
|
complaining party. The FBI has done a generally competent job of investigating
|
|||
|
those crimes it was called in to investigate, in Parker's view. But the federal
|
|||
|
agency's job is not to help government or financial institutions attempt to
|
|||
|
prevent crimes, nor is its function to detect the crimes in the first place.
|
|||
|
|
|||
|
"We're not out detecting any type of crime," says Lewis. "We like to think we
|
|||
|
can prevent them. We can make recommendations. But do we detect bank robberies
|
|||
|
or are they reported to us? Or kidnapping- do we detect those? Or skyjacking?
|
|||
|
There must be some evidence of crime, a crime over which the FBI has
|
|||
|
jurisdiction. Then we open a case." And despite the spate of arrests and
|
|||
|
crackdowns last summer, it looks like the FBI will have its hands full in the
|
|||
|
future: The hackers have not gone away. Like mice running through the utility
|
|||
|
passages of a large office building, they create damage and inconvenience, but
|
|||
|
are tolerated as long as their nuisance remains bearable.
|
|||
|
|
|||
|
That status could change at any time, however.
|
|||
|
|
|||
|
Meanwhile, little electronic "sting" operations similar to Abscam keep the
|
|||
|
element of danger on the hacker's game. An Air Force telephone network called
|
|||
|
AUTOVON (a private telephone system connecting computers on every Air Force
|
|||
|
installation in the world), was reportedly cracked by a hacker last last year.
|
|||
|
The hacker published lists of AUTOVON dialups on a bulletin board.
|
|||
|
|
|||
|
The breach came to the attention `oo the Department of Defense on late 1983,
|
|||
|
but apparently nothing was done to stop the hackers. Then, in January, the
|
|||
|
AUTOVON number was answered in a sultry female voice. We wish to thank one and
|
|||
|
all for allowing us to make a record of all calls for the past few months. You
|
|||
|
will be hearing from us real soon. Have a happy New Year."
|
|||
|
|
|||
|
That's a New Year's message calculated to give any hacker a chill.
|
|||
|
|
|||
|
(Schmidt, of course, is an attention-grabbing jerk..)
|
|||
|
|
|||
|
Call Crystal Castle BBS - 15 SIGs - 130 Archive files, including Articles,
|
|||
|
Essays, game cheats/solves, How to.. etc.. 1200 active/open messages
|
|||
|
|
|||
|
Phone number? (408) 733-1364
|
|||
|
|
|||
|
King Rat (Robert)
|
|||
|
ssays, game cheats/solves, How to.. etc..
|