502 lines
28 KiB
Plaintext
502 lines
28 KiB
Plaintext
|
|
|||
|
CGA SOFTWARE PRODUCTS GROUP ON COMPUTER CRIME
|
|||
|
|
|||
|
INTERNAL COMPUTER CRIME PROVES GREATER THREAT THAN 'HACKERS'
|
|||
|
NEW YORK, July 17 /PRNewswire/ -- For every outsider who accesses
|
|||
|
Pentagon telephone numbers or makes fraudulent credit card purchases,
|
|||
|
like the seven New Jersey teenagers arrested recently, it is
|
|||
|
estimated that far greater numbers of disgruntled or dishonest
|
|||
|
employees damage their employers' computer systems internally every
|
|||
|
day.
|
|||
|
"Teenage 'hackers' are just the tip of the computer crime
|
|||
|
iceberg," says Carol Molloy, a computer security specialist with CGA
|
|||
|
Software Products Group, Holmdel, N.J. "These computer crimes get
|
|||
|
the spotlight because the perpetrators get caught and the victims are
|
|||
|
willing to prosecute."
|
|||
|
More insidious data fraud and malicious damage occurs inside
|
|||
|
corporations than any hacker ever committed, Molloy continues.
|
|||
|
"Employees have far greater access to sensitive information, and many
|
|||
|
times are so well acquainted with procedures and security features
|
|||
|
that they leave no trail at all," she adds. "Unhappy employees can
|
|||
|
leave a programming 'time bomb' in a computer that causes trouble
|
|||
|
long after they are fired or leave for another job."
|
|||
|
Carelessness, rather than malice, often causes even more
|
|||
|
problems, according to Molloy. "Many computer security systems are
|
|||
|
based on passwords, and people can be very lax about protecting
|
|||
|
them."
|
|||
|
Employee computer crimes, however, receive far less attention
|
|||
|
than outside break-ins, Molloy says, because victimized organizations
|
|||
|
are unwilling to publicize the matter through arrest and prosecution.
|
|||
|
"Revealing damage from internal sources doesn't do much for a
|
|||
|
company's image," she says.
|
|||
|
"Customers, corporations feel, will start to wonder about just
|
|||
|
how secure relevant information may be and may decide to go
|
|||
|
elsewhere. Also, insurance premiums often go up afte2 a theft is
|
|||
|
revealed."
|
|||
|
The question facing data processing and information managers is
|
|||
|
not whether a security system should be installed, but how to go
|
|||
|
about it, says Molloy. "Many organizations believe that security is
|
|||
|
solely the concern of the managers," she says. "They don't realize
|
|||
|
that implementing security requires extensive internal support."
|
|||
|
Security systems also demand ongoing maintenance, she says.
|
|||
|
"Just installing the system doesn't mean data is secure from then
|
|||
|
on," she points out.
|
|||
|
|
|||
|
UPI Dmestic News Wire
|
|||
|
Wednesday July 17, 1985
|
|||
|
|
|||
|
More may be charged in ``hacker'' ring, prosecutor says
|
|||
|
NEW BRUNSWICK, N.J. (UPI) _ More people may be charged with using
|
|||
|
home computers to make free long-distance calls and reportedly try to
|
|||
|
break into Pentagon computers, a prosecutor said Wednesday.
|
|||
|
Meanwhile, the executive director of the state chapter of the
|
|||
|
American Civil Liberties Union charged the Middlesex County Prosecutor's
|
|||
|
Office with ``trampling'' on the rights of one of the seven youths
|
|||
|
charged in the scheme Tuesday.
|
|||
|
The youths used their computers and electronic ``bulletin boards''
|
|||
|
to exchange information on computer codes, including some that would
|
|||
|
cause communications satellites to ``change position'' and possibly
|
|||
|
interrupt intercontinental communications, Middlesex County Prosecutor
|
|||
|
Alan Rockoff said.
|
|||
|
``Though it may sound like a copycat of (the movie) `WarGames,'
|
|||
|
things like this are happening in our society,'' Rockoff said, accusing
|
|||
|
the youths of obtaining thousands and ``possibly millions'' of dollars
|
|||
|
in telephone and informational services.
|
|||
|
A spokesman for American Telephone & Telegraph Co. said there was
|
|||
|
no indication that any of its satellites had been moved, or that even an
|
|||
|
attempt to move them was made.
|
|||
|
Assistant Prosecutor Frank Graves said investigators still had
|
|||
|
``six more computers and 9 million floppy discs'' to look through.
|
|||
|
``We had 300 names in one computer and we charged seven,'' Graves
|
|||
|
said. ``We have no idea what's in the other computers and won't know for
|
|||
|
a while.''
|
|||
|
The youths, whose names were withheld because of their ages, are
|
|||
|
charged with juvenile delinquency by reason of conspiracy to commit
|
|||
|
theft.
|
|||
|
South Plainfield police detective George Green said four of the
|
|||
|
defendants operated electronic bulletin boards, which are used for the
|
|||
|
exchange of legitimate information by hundreds of people.
|
|||
|
The youths also had a special code that provided illegal access to
|
|||
|
restricted information, Green said, and only those who used these parts
|
|||
|
of the bulletin boards were arrested.
|
|||
|
Rockoff said the investigation began in April when postal officials
|
|||
|
informed the South Plainfield police that someone using a post office
|
|||
|
box under a fictitious name apparently had been using a computer to gain
|
|||
|
illegal access to the computer of a Connecticut credit company.
|
|||
|
Rockoff turned over the results of the investigation to the Secret
|
|||
|
Service since the bulletin boards contained telephone numbers in a
|
|||
|
military defense communications system in the Defense Department, The
|
|||
|
New York Times reported Wednedsay.
|
|||
|
Plainfield patrolman Michael Grennier, a computer expert, said the
|
|||
|
youths also were able to break into an American Telephone & Telegraph
|
|||
|
computer after obtaining a manual from a AT&T trash bin.
|
|||
|
The investigation led to a South Plainfield youth, whose computer
|
|||
|
was seized in June. After Grennier and Green spent about 100 hours
|
|||
|
looking through his computer, the other six were arrested Friday _ in
|
|||
|
Hillsdale, Westwood, Warren Township, Martinsville, Dover and Edison.
|
|||
|
But Jeffrey Fogel of the ACLU office in Newark said the Dover
|
|||
|
youth, whom he declined to identify, was unfairly singled out.
|
|||
|
``He has an electronic bulletin board and arresting him and seizing
|
|||
|
his computer amounts to seizing a printing press,'' Fogel said. ``It
|
|||
|
would be like if someone put a stolen credit card number in a newspaper
|
|||
|
classified. Would you close down the newspaper?''
|
|||
|
|
|||
|
NEW HACKER CASE RAISES FEARS:
|
|||
|
Computer hackers "have the capability of doing a great deal of
|
|||
|
damage," says Rep. William J. Hughes, D-N.J., commenting on the
|
|||
|
case of 7 N.J. youths charged with breaking into Pentagon computers
|
|||
|
and stealing satellite codes. Hughes is sponsoring federal computer
|
|||
|
crime bills to help fight the problem. (USA TODAY, July 18, P.1A)
|
|||
|
|
|||
|
KAYPRO WINS PC COMPARISON:
|
|||
|
The Kaypro IIx personal computer is the best machine for home use
|
|||
|
costing less than $1,500, says Consumer Reports. It beat the Apple
|
|||
|
IIe Professional and the discontinued TRS-80 Model 4P. Kaypro was
|
|||
|
picked for its disk capacity (800 kilobytes) and the large amount
|
|||
|
of software that comes with it. (Consumer Reports, August, P.467)
|
|||
|
|
|||
|
COMPUTER CALLS ABSENT STUDENTS:
|
|||
|
Kettering, Ohio, school officials are using a Texas Instruments
|
|||
|
computer to call the homes of absent students as part of the
|
|||
|
state's Missing Children Act. System makes 75 calls an hour.
|
|||
|
Computer voice tells parents their child is absent and asks for a
|
|||
|
response, which is recorded like an answering machine. (USA TODAY,
|
|||
|
P.5B)
|
|||
|
|
|||
|
From
|
|||
|
PR NEWSWIRE
|
|||
|
Thursday July 18, 1985
|
|||
|
|
|||
|
DOWTY ELECTRONICS SAFEGUARDS U.K. DEFENSE SECRETS
|
|||
|
|
|||
|
UK "SHOULD BE SAFE" FROM DATABASE BURGLARS
|
|||
|
NEWBURY, England, July 18 /PRNewswire/ -- British Ministry of
|
|||
|
Defence secrets need never be at risk from home computer "hackers" --
|
|||
|
microchip technology's equivalent of cat burglars -- an electronics
|
|||
|
expert claimed today.
|
|||
|
Following disclosures of teenage hackers breaking into military
|
|||
|
information banks at the Pentagon -- the U.S Defense Department
|
|||
|
headquarters -- Bruce Brain, general manager and director of Dowty
|
|||
|
Electronics' Information Technology Division, said: "It need never
|
|||
|
happen here."
|
|||
|
The U.K. faced similar problems to America, said Brain. "But the
|
|||
|
introduction of Dowty's 'Horatius' dialback data security system --
|
|||
|
an anti-hacker box -- means that no-one would be able to break into
|
|||
|
sensitive or confidential databases, even with the knowledge of
|
|||
|
ex-directory phone numbers.
|
|||
|
"Horatius allows only authorized users to access a computer
|
|||
|
system, and they must also call from a pre-cleared phone number
|
|||
|
within an agreed time-frame," he explained.
|
|||
|
Horatius -- designed and manufactured in the U.K. -- is selling
|
|||
|
well, says Dowty, which is currently negotiating to introduce the
|
|||
|
system to the U.S.A through its New Jersey-based subsidiary, Dowty
|
|||
|
RFL Inc.
|
|||
|
PAPER FINDS 2 HACKER BOARDS:
|
|||
|
2 electronic bulletin boards have been found to contain access
|
|||
|
codes for computers at military, research facilities. The boards,
|
|||
|
"Fatland" and "Dark Side of the Moon," - both based in Virginia
|
|||
|
-held access numbers for the Naval Ship R&D Center, NASA's Ames
|
|||
|
Research Center. No arrests reported. (Online Today)
|
|||
|
|
|||
|
NEW JERSEY HACKER CASE MAY BE A TEST
|
|||
|
OF SYSOPS' FREE SPEECH PROTECTION
|
|||
|
|
|||
|
The attorney for one of seven New Jersey teenagers charged
|
|||
|
with conspiring to use their computers to exchange stolen credit card numbers
|
|||
|
and make free long-distance calls says he will argue that his client is
|
|||
|
protected by the constitutional guarantee of free speech.
|
|||
|
Jeffrey E. Fogel, executive director of the New Jersey chapter of
|
|||
|
the American Civil Liberties Union, told BULLETIN BOARD SYSTEMS that he an
|
|||
|
associate will defend a teenager who operated the Private Sector BBS.
|
|||
|
"We are relying on his representation that all he did was run
|
|||
|
a bulletin board, that he didn't make a calls or use stolen credit card
|
|||
|
numbers," Fogel said. If that is true, he added, "I don't think there is
|
|||
|
any liability."
|
|||
|
The defendants, all under 18, were charged July 16 with juvenile
|
|||
|
delinquency based on an underlying charge of conspiracy to commit theft.
|
|||
|
Police confiscated the computers and software of some of the defendants.
|
|||
|
Middlesex County Prosecutor Alan A. Rockoff told reporters
|
|||
|
that the individuals exchanged information that would allow them to access
|
|||
|
commercial computers without authorization and that some of them had codes that
|
|||
|
could cause communications satellites to ''change position.''
|
|||
|
However, spokesmen for AT&T and other carriers said their
|
|||
|
systems are secure and denied that any satellites had been moved.
|
|||
|
Rockoff said the investigation began in April when postal
|
|||
|
officials informed police that someone using a post office box
|
|||
|
under a fictitious name apparently had been using a computer
|
|||
|
to gain illegal access to the computer of a Connecticut credit
|
|||
|
company.
|
|||
|
Fogel said he believes that the prosecution will have to show that
|
|||
|
his client actually used the credit card numbers or telephone access codes
|
|||
|
to prove his case. Allowing the information to be posted on his client's
|
|||
|
bulletin board, he said, is not a criminal act.
|
|||
|
"There's nothing illegal about those messages being there," he said.
|
|||
|
"Let's say you find an AT&T calling card on the street and you put an
|
|||
|
ad (listing the number) in the New York Times. I'm confident that the
|
|||
|
New York Times is not liable.
|
|||
|
"Bulletin boards are the same as a free press," Fogel said. "They are
|
|||
|
like electronic magazines in which the users can publish what they choose."
|
|||
|
Fogel drew an analogy to two well-known free press cases: the
|
|||
|
publication of plans for a hydrogen bomb in Progressive magazine and
|
|||
|
publication of the Pentagon Papers by the Times.
|
|||
|
"What really gets me upset in this case is they seized the
|
|||
|
'printing press.' I don't think they had the right to seize his
|
|||
|
computer, Fogel said.
|
|||
|
The concept of First Amendment protection for bulletin board
|
|||
|
operators has yet to be tested in court. Last year Los Angeles
|
|||
|
sysop Tom Tcimpidis was charged with telephone fraud when Pacific Bell
|
|||
|
investigators found a calling card number posted on his BBS. But the charges
|
|||
|
were dropped in February before the case came to trial.
|
|||
|
Rockoff said his case is the first major prosecution under
|
|||
|
recent New Jersey law that makes it a crime to obtain data
|
|||
|
from a computer without authorization.
|
|||
|
|
|||
|
|
|||
|
COMPUTER LAWS VARY FOR STATES:
|
|||
|
Computer break-ins catches states with varying laws. Example:
|
|||
|
Tapping into computer is felony in California, but no N.Y. law
|
|||
|
rules "hacker" abuse, except federal statutes on interstate
|
|||
|
information theft. UCLA student who tapped N.Y. college system
|
|||
|
faces prison for "malicious computer entry" under Calif. law.
|
|||
|
(Gannett News Service)
|
|||
|
|
|||
|
L.A. Times, Tuesday, September 3, 1985 San Diego Section (Editorials)
|
|||
|
----------------------------------------------------------------------
|
|||
|
``Garbage In, Garbage Out''
|
|||
|
|
|||
|
Many people have worried for years about what will happen when government
|
|||
|
finds a big computer that can catalogue everything about everybody, every scrap
|
|||
|
of information - true or false - would then be available at a push of a button.
|
|||
|
That day is not here yet, but experience with the FBI's National Crime Inform-
|
|||
|
ation Center, the nation's centralized computer data-base, indicates that such
|
|||
|
fears for the future are not groundless.
|
|||
|
A continuing series of FBI audits of the data base has found that it sends
|
|||
|
12,000 false or inaccurate reports on individual suspects every day to law-
|
|||
|
enforcement agencies around the country. It's not really the FBI's fault. The
|
|||
|
erroneous information that the computer spews out was put in by state and local
|
|||
|
law enforcers in the first place. There appears to be not much quality control
|
|||
|
in crime information, and, as one of the oldest lines in computerdom assers,
|
|||
|
``Garbage in, garbage out.''
|
|||
|
But the information in that computer is more than accounting data or the
|
|||
|
marketing forecasts of strategic planners. This is vital personal information
|
|||
|
that affects people's lives. There have been cases, and not just a few of them
|
|||
|
in which the wrong person has been arrested and jailed because of bad informa-
|
|||
|
tion from a computer. Police officers are more likely to take the word of the
|
|||
|
FBI's computer than of a person who claims it's all a mistake.
|
|||
|
About 62,000 criminal-justice agencies throughout the country seek infor-
|
|||
|
mation from the FBI's crime computer nearly 500,000 times a day. The FBI says
|
|||
|
that a 2.4% error ratio isn't so bad when you consider that the system results
|
|||
|
in the apprehension of more than 70,000 wanted felons a year. Tell that to
|
|||
|
people that have erroneous information about them sent to the local cops.
|
|||
|
And the police are not the only ones who get this information. A growing
|
|||
|
number of employers, such as day-care centers and schools, also use the FBI
|
|||
|
crime computer to run background checks on prospective employees. There is a
|
|||
|
legitimate social need to do that, but, if the information is wrong, a person's
|
|||
|
livelihood, carreer, and reputation may be irrepairably damaged.
|
|||
|
As with many ills, it is easier to describe the problem than to fix it.
|
|||
|
But it's clear that the accuracy of the information maintained by the FBI needs
|
|||
|
more scrutiny.
|
|||
|
Rep.Charles E. Schumer (D-N.Y.) has proposed giving the states more money
|
|||
|
to beef up their record-keeping. That would help. But no ammount of
|
|||
|
effort and attention can ever eliminate all errors from a human system. People
|
|||
|
have always made mistakes, and always will make mistakes. The trouble is that
|
|||
|
the computer makes it possible to give those mistakes nationwide distribution.
|
|||
|
Still, things can be improved, and it is vital to the FBI and to all law
|
|||
|
enforcement that they be improved. The future of the National Information
|
|||
|
Center depends on reducing the error rate so that both the police and the
|
|||
|
public are confident that information obtained from the computer is correct.
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
Dutifully typed by Henry Spire, C.I.A.
|
|||
|
-------------------------------------------------------------------------------
|
|||
|
|
|||
|
LAWYERS' MICRO USERS GROUP NEWSLETTER
|
|||
|
September, 1985
|
|||
|
|
|||
|
COMPUTER SECURITY -- DIGITAL PATHWAY'S SECURENET FAMILY OF PRODUCTS
|
|||
|
|
|||
|
Computer security is on everyone's mind these days. Recently, hackers had
|
|||
|
at it on several BBS's in the Chicago area. And we read almost daily about
|
|||
|
Hacker attacks on governmental and or financial institution computers.
|
|||
|
Digital Pathways Inc. at 1060 East Meadow Circle, Palo Alto, California
|
|||
|
94303 (415) 493-5544, through it's Defender II family of products provides a
|
|||
|
unified approach to preventing unauthorized dial-in access to computers. One
|
|||
|
of these units is installed between your computer and the telephone line.
|
|||
|
There is a dial-in/call back feature, so when someone dials up your
|
|||
|
computer, this device calls the proper telephone number of the caller back.
|
|||
|
A synthesized voice answers each call-in and requests the caller's ID. The
|
|||
|
ID is entered via Touch Tone. If the ID is valid, the system looks up the
|
|||
|
parameters of the user and arranges for a call-back. Prices start at $3,600
|
|||
|
at quantity one. Although not inexpensive for a small BBS operation,
|
|||
|
obviously a law firm using a computer for client contact and/or for lawyers
|
|||
|
to call in from remote locations should seriously consider this kind of
|
|||
|
investment.
|
|||
|
|
|||
|
THE HACKERS - FROM CURIOUS TO CRIMINAL
|
|||
|
|
|||
|
The original computer hackers who broke into databases and networks were
|
|||
|
careful to leave no traces of their entry and not to disturb the data. This
|
|||
|
soon changed as less sophisticated and more malicious computer hackers came
|
|||
|
on the scene.
|
|||
|
|
|||
|
The malicious Hacker horror stories have filled newspapers and magazines for
|
|||
|
over a year. Often the less responsible computer "Hackers" prowl the
|
|||
|
electronic alleyways at night, when many firms leave their computer systems
|
|||
|
on and attached to phone lines to transmit large blocks of data when the
|
|||
|
phone rates are cheaper. With nobody in the office, penetration of data
|
|||
|
bases which lack proper security is often only a matter of time and
|
|||
|
patience.
|
|||
|
|
|||
|
Some Hackers have been amazed to discover that firms which have installed
|
|||
|
password protection schemes to prevent unauthorized access have failed to
|
|||
|
change the original password which came with the system - "PASSWORD." What
|
|||
|
can happen if your system is easy to penetrate? While not all Hackers are
|
|||
|
data thiefs or vandals, some few malicious modem miscreants have been known
|
|||
|
to penetrate a computer system and not only steal but also scramble the
|
|||
|
data.
|
|||
|
|
|||
|
Imagine switching on your terminal one morning only to discover 300 pages
|
|||
|
of text had been transformed into a series of seemingly random numbers?
|
|||
|
|
|||
|
As is often the case, the best sense of Hacking and Hacker morality comes
|
|||
|
from the literature of that subculture itself. Here are excerpts from three
|
|||
|
articles in a recent issue (Number 91!) of the original newsletter for
|
|||
|
Hackers and "Phone Phreaks" called, appropriately "TAP: The Hobbyist's
|
|||
|
Newsletter for the Communications Revolution."
|
|||
|
|
|||
|
Dunn and Bradstreet:
|
|||
|
Do they know something that we don't
|
|||
|
|
|||
|
by BIOC Agent 003 & Tuc
|
|||
|
|
|||
|
In issue #90, we explained how to use the Dunn and Bradstreet system (which
|
|||
|
is now known as Dunsprint). A week after the issue was mailed a phellow
|
|||
|
phreak found out that a copy of the issue had fallen into the hands of our
|
|||
|
"friends" at D & B. To say the least, they weren't exactly thrilled about
|
|||
|
it. In fact, they did not even believe that they had a security problem!
|
|||
|
Well, that just goes to prove that if you are good (or they are incredibly
|
|||
|
stupid, whichever the case may be) no will know that you are there!
|
|||
|
|
|||
|
In a big effort to defeat hackers, they called in an outside service to
|
|||
|
spruce up their "security." Fortunately for us, we were able to find out
|
|||
|
about the new system! This was really not a problem,, though. First,
|
|||
|
they had the new dial-ups posted when you logged on. Secondly, they have a
|
|||
|
nice little place on Telenet! (Where we do most of our "work"--[deleted])
|
|||
|
|
|||
|
Sorry D & B ....Good news travels fast!
|
|||
|
|
|||
|
A lesson in Phreaking and Hacking Morality:
|
|||
|
by Big Brother
|
|||
|
|
|||
|
I find it truly discouraging when people, intelligent people seeking
|
|||
|
intellectual challenges, must revert to becomming common criminals. The
|
|||
|
fine arts of hacking and boxing have all but died out. Though you
|
|||
|
newcomers, you who have appeqred on the scene in the last year or two, may
|
|||
|
not realize it, we had it much better. People didn't recognize our
|
|||
|
potential for destruction and damage because we never flaunted it, nor did
|
|||
|
we exercise it.
|
|||
|
|
|||
|
For hacking, it was the intellectual challenge which drove us to do it. The
|
|||
|
thrill of bypassing breaking through someone's computer security was
|
|||
|
tremendous. It wasn't a case of getting a password from a friend, logging
|
|||
|
on, and destroying and entire database. We broke in for the challenge of
|
|||
|
getting in and snooping around WITHOUT detection. We loved the potential
|
|||
|
for destruction that we gave ourselves but never used.
|
|||
|
|
|||
|
Today, after so much publicity, the fun has turned to true criminality.
|
|||
|
Publicity we have received is abhorring. From WarGames to the headlined
|
|||
|
October Raids, to the 414's, the Inner Circle, Fargo 4A, and the recent NASA
|
|||
|
breakins--not to mention all the local incidents that never made the big
|
|||
|
newspapers, like breakins at school computers or newspaper computers. TRW
|
|||
|
credit information services claims hackers used the three stolen accounts to
|
|||
|
aid them in abusing stolen credit cards. The thrill of entering and looking
|
|||
|
around has shifted to criminal practicality--how can I make my bank account
|
|||
|
fatter--how may I use this stolen credit card to its fullest--how could I
|
|||
|
take revenge upon my enemies.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
by Cheshire Catalyst, Managing Editor
|
|||
|
|
|||
|
The corporate types should realize that if a teenaged hacker is getting into
|
|||
|
their system, an industrial spy could have logged in regularly for the past
|
|||
|
3 years. While I may not particularly care for a TRW or [Citibank] having
|
|||
|
"Confidential information" about me, I especially don't like the idea of
|
|||
|
unauthorized people spreading the data around.
|
|||
|
|
|||
|
There are no quick answers, because computer security is not just a matter
|
|||
|
of hardware, software, locks, and walls. Security is a people problem.
|
|||
|
When you put in locks, you watch the people you give the keys to (notice an
|
|||
|
analogy to encryption here). If these people FEEL they're being watched,
|
|||
|
they may get "disgruntled". Needless to say, a disgruntled employee is
|
|||
|
worse than almost anything else you could be combating.
|
|||
|
|
|||
|
Any of our corporate subscribers who would like to wake up their management
|
|||
|
to the vulnerabilities of computer systems should be made aware that I am
|
|||
|
available for lectures and consulting. Just drop me a line at the TAP
|
|||
|
maildrop, or via MCI Mail (username: TAP), or telex number 650-119-5732.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SUGGESTED PRACTICES TO FOLLOW FOR COMPUTER SECURITY
|
|||
|
|
|||
|
In light of the importance of a password, the following practices should be
|
|||
|
followed by every user of a multiuser computer system.
|
|||
|
|
|||
|
1. DON'T USE A LOGICAL PASSWORD THAT IS EASY TO FIGURE OUT. Someone intent
|
|||
|
on impersonating you will try the easy password guesses first. For example,
|
|||
|
I would never use a password consisting of any part of my name or a close
|
|||
|
family member's name, my address, my auto license, etc. This information is
|
|||
|
too easy to obtain and if an imposter has targeted you as his "doorway" to
|
|||
|
the system, he or she can probably get this information. Use a password that
|
|||
|
is either a combination of letters and numbers that are only meaningful to
|
|||
|
you (for example, your phone number converted to the first letter assigned
|
|||
|
to each number on the telephone. Please do not use this method now that it
|
|||
|
has been published).
|
|||
|
|
|||
|
2. CHANGE YOUR PASSWORD OFTEN. If your password remains the same for a long
|
|||
|
period of time, the odds that a persistent imposter will hit hit upon it are
|
|||
|
greatly decreased. Again, don't get lazy and change your password to one
|
|||
|
that violates the first consideration.
|
|||
|
|
|||
|
3. NEVER GIVE YOUR PASSWORD TO ANOTHER USER OR ENTER IT INTO A SYSTEM IF YOU
|
|||
|
ARE UNCERTAIN AS TO THE REASON FOR THE REQUEST. Otherwise, you may have
|
|||
|
given someone else the irrevocable authority to act on your behalf.
|
|||
|
Furthermore, because of the nature of computer systems, you cannot prove
|
|||
|
that your "agent" was not you. You are initially responsible for everything
|
|||
|
that that person does while acting as you. There are several methods used by
|
|||
|
imposters or hackers to acquire a valid user's password directly from the
|
|||
|
user. One method is to use a system's communication's mode to send a
|
|||
|
message to another user. This method causes some form of message to appear
|
|||
|
on the user's screen indicating that something technically meaningless has
|
|||
|
occurred and the user should reenter the password. The hacker then watches
|
|||
|
what the user types. Another method involves setting up a program which
|
|||
|
follows the same technique as above, but the program then stores the
|
|||
|
password in a file and the hacker will check for a password later. A
|
|||
|
recently used method is to set up a system to collect passwords. This
|
|||
|
recently happened in the Chicago area when a bulletin board was set up by
|
|||
|
hackers. It gave the appearance of legitimacy, but was later used by the
|
|||
|
hackers to access other system because their users had the same password on
|
|||
|
several systems. Which leads to the last rule of password usage.
|
|||
|
|
|||
|
4. NEVER USE THE SAME PASSWORD ON DIFFERENT COMPUTERS. Using the key analogy
|
|||
|
above, if all of the locks on your personal possessions have the same key,
|
|||
|
you wouldn't entrust that key to anyone. Why use the same password on
|
|||
|
several systems? If you do, you run the risk that someone will get your
|
|||
|
password and then use that information to access all of the systems you
|
|||
|
access. You will soon be unwelcome on several systems (if not a suspect in a
|
|||
|
computer crime case).
|
|||
|
|
|||
|
VIRGINIA LAW HELPS SYSOP GET REVENGE
|
|||
|
|
|||
|
A Virginia sysop used a new state computer crime law to help prosecute
|
|||
|
a teenage hacker who invaded and vandalized his bulletin board.
|
|||
|
Allen Knapp runs Washington Networks from his home in Vienna, VA, and
|
|||
|
charges $10 for a system password. Last January, Knapp's board got a call from
|
|||
|
a 14-year-old Montgomery County, MD, youth who used the handle Phineas Phreak.
|
|||
|
According to Knapp, Phineas discovered Knapp's own password and
|
|||
|
obtained access to the system files and operating program. The caller erased
|
|||
|
part of the board's stored files and transferred others to his own computer.
|
|||
|
The youth then called Knapp's answering machine and made several demands for
|
|||
|
the return of the files.
|
|||
|
However the answering machine tape allowed the Chesapeake & Potomac
|
|||
|
Telephone Co. to trace the call.
|
|||
|
The boy was charged with a misdemeanor under a section of Vigninia's
|
|||
|
computer crime law that is designed to discourage erasing or altering computer
|
|||
|
data. He was allowed to plead "not innocent" and was sentenced last month
|
|||
|
to one year probation and ordered to pay Knapp $300 for the damages.
|
|||
|
Knapp estimated that the files the boy erased or stole represented
|
|||
|
about 180 hours of work.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
MENSA BBS SEEKS SMART CALLERS
|
|||
|
|
|||
|
Most sysops check out applicants by verifying their names and
|
|||
|
telephone numbers. But on the MENSA BBS in Palm Beach, FL, callers face a
|
|||
|
much tougher screening.
|
|||
|
All registered users must pass members of Mensa, Intertel or the
|
|||
|
Triple Nine Society to receive full system access.
|
|||
|
Mensa is an international society in which the sole requirement for
|
|||
|
membership is a score at or above the 98th percentile on any of a number of
|
|||
|
standard IQ tests. Qualification for membership may be determined by tests
|
|||
|
administered by Mensa or by submission of properly certified prior evidence
|
|||
|
to American Mensa,Ltd., 1701 West 3rd Street, Brooklyn, NY 11223.
|
|||
|
INTERTEL, Inc., PO BOX 15580, Lakewood, Co., 80215, is a similar
|
|||
|
organization that requires members to score in the 99 percentile or above on
|
|||
|
IQ tests. The Triple Nine Society, 463 Beacon St., Boston, MA, 02115, sets
|
|||
|
its standards even higher: the 99.9 percentile.
|
|||
|
"Please do not harass us if you do not qualify for access," say
|
|||
|
Molly and "Pops," the boards sysops.
|
|||
|
The system does invite amateur radio operators to also call in (use
|
|||
|
your call sign to log in) and anyone who sends $100 to Connelly Corporation,
|
|||
|
Box 1164, Palm Beach FL 33480 also can join.
|
|||
|
Members are invited to swap software and generally get to know each
|
|||
|
other through the public message section.
|
|||
|
The board also serves as a convenient advertising medium for Pops'
|
|||
|
classic cars. Among the bargains listed are a 1959 Corvette Roadster for
|
|||
|
$19,500; a 1962 Corvette Coupe, for $14,500 or a 1963 Corvette convertible.
|
|||
|
The BBS, a modified RBBS-PC, is open 24 hours at 300, 1200 or 2400
|
|||
|
baUd. The number is 305-842-1861. You also can catch Molly on The Source,
|
|||
|
ST7783.
|
|||
|
|