235 lines
12 KiB
Plaintext
235 lines
12 KiB
Plaintext
|
_______________________________________
|
|||
|
[ ]
|
|||
|
[THE SHADOWY WORLD OF COMPUTER HACKERS]
|
|||
|
[ An Article on us 'Naughty Boys' ]
|
|||
|
[ Typed by: Shadow's Pawn ]
|
|||
|
[ Original article in U.S. News and ]
|
|||
|
[ World Report June 3, 1985 ]
|
|||
|
[ ]
|
|||
|
[ Converted to 80 Columns by ]
|
|||
|
[ The Slipped Disk ]
|
|||
|
[ ]
|
|||
|
[ The Fifth Precinct ]
|
|||
|
[ [502] 245-8270 ]
|
|||
|
[_____________________________________]
|
|||
|
|
|||
|
|
|||
|
Flash!: The FBI and private firms are cracking down on teenagers who use
|
|||
|
terminals to swap tips on how to break the law.
|
|||
|
|
|||
|
The following article recently published in U.S. News and World Report (June
|
|||
|
3, 1985) reveals the shocking truth about the underworld of the Computer Hacker,
|
|||
|
or does it? This is basically educating thier reader on the crimes that are
|
|||
|
committed each and every day on bulletin board system around the United States.
|
|||
|
|
|||
|
Read and enjoy...
|
|||
|
|
|||
|
Shadow's Pawn/Control
|
|||
|
|
|||
|
-----------------------------------------------------------------------------
|
|||
|
|
|||
|
Want to learn the intricacies of picking locks? The recipe for nitro-
|
|||
|
glycerin? Or methods of making free long-distance phone calls? How about
|
|||
|
someone else's credit-card number for a shopping spree? Curious how to kill
|
|||
|
with your bare hands?
|
|||
|
|
|||
|
Until a few weeks ago, all this was available to users of COSMOS, a comput-
|
|||
|
erized "bulletin board" run by a 16-year-old high-school student known as Time
|
|||
|
Lord to his fellow 'hackers,' or computer tinkerers. His board collapsed in
|
|||
|
late April after police and agents of the Federal Bureau of Investigation and
|
|||
|
the Secret Service came to his West Bloomfield, Mich., home. Dad took away the
|
|||
|
computer.
|
|||
|
|
|||
|
Time Lord escaped arrest, but six high-school students in Waukesha, Wis.,
|
|||
|
weren't so lucky. On April 25, they were arrested in a seperate case for
|
|||
|
allegedly using stolen credit-card numbers to obtain thousands of dollars'
|
|||
|
worth of computer equipment. The numbers, said the Milwaukee Journal, were
|
|||
|
disseminated over a computer bulletin board called the World of Cryton.
|
|||
|
|
|||
|
These incidents shed light on a shadowy subculture in which hackers- nearly
|
|||
|
all teenage boys- swap information and joust over who knows the most, and whose
|
|||
|
exploits are the most daring. To read their exchanges on computer monitors is
|
|||
|
to enter a world of bright young zealots whose talents at manipulating complex
|
|||
|
computers are often accompanied by a blithe disregard for authority. Some are
|
|||
|
barely in their teens and already are lawbreakers. Almost all come from
|
|||
|
affluent famlies.
|
|||
|
|
|||
|
Messages that cross back and forth bring to mind a fraternity food fight, a
|
|||
|
detailed phone-system manual, a sex novel and a bomb factory rolled into one.
|
|||
|
many seem sophmoric --strewn with profanities questioning the masculinity of
|
|||
|
other system users.
|
|||
|
|
|||
|
"The bulletin boards,"says FBI agent John Anthony in Detroit,"give this aura
|
|||
|
of Robin Hood, and young kids-particularly bright young kids- get involved in
|
|||
|
this as a challenge to the Establishment."
|
|||
|
|
|||
|
MOST LEGITAMITE. Bulletin boards are do-it-yourself electronic-message
|
|||
|
systems. Anyone with a personal computer and a modem-a device that lets
|
|||
|
computers communicate over phone lines- can participate. Special software is
|
|||
|
needed to operate a board.
|
|||
|
|
|||
|
More than 1,000 (GET REAL!) such bulletin boards exist now. The great bulk of
|
|||
|
them are totally legitimate. They offer to people with common in- terests an
|
|||
|
electronic meeting place to exchange messages about using their computers and
|
|||
|
software. Some boards are dedicated to a special interest, such as humor, law,
|
|||
|
education or health. Others allow users to order goods and are, in effect,
|
|||
|
electronic shopping services.
|
|||
|
|
|||
|
"The subject matter ranges from software swapping to games to information
|
|||
|
about specific programs to finding the woman of your life," says James Cambron
|
|||
|
of Kansas City, who runs a bulletin board that distributes facts about other
|
|||
|
boards.
|
|||
|
|
|||
|
But a minority of boards cater to interests distinctly outside the main-
|
|||
|
stream. On the political left, a Long Island board, called the Revolution,
|
|||
|
carries messages assailing President Reagan's Central America policy and calling
|
|||
|
for a campaign against the opening of a nearby nuclear power plant. When the
|
|||
|
user signs off, the system says, "Dosvedonia comrade"-an approximation of
|
|||
|
'goodbye' in Russian.
|
|||
|
|
|||
|
On the right is a network of boards that attack blacks and Communists.Elec-
|
|||
|
tronic files called "Know Your Enemies" claim to provide details about Jewish
|
|||
|
organizations and 'race traitors". Their operators, according to the Anti-
|
|||
|
defamation League of N'nai B'rith, are right wing extremists who "seek to spr-
|
|||
|
ead their hate propaganda among young people, surely the most vulnerable to its
|
|||
|
influence."
|
|||
|
|
|||
|
The segment run and used by young hackers, however, attracts the most at-
|
|||
|
tention from law-enforcement agencies and companies whose computers store vast
|
|||
|
amounts of information. John Maxfield, a Detroit consultant who monitors such
|
|||
|
boards for business clients, says they are strewn with material that is "either
|
|||
|
borderline illegal or outright illegal or encourages illegal activities."
|
|||
|
|
|||
|
|
|||
|
"PHREAKING." Telephone companies are especially upset about bulletin boards
|
|||
|
that contain sections devoted to "phreaking" - making toll calls free of charge.
|
|||
|
Phreaking includes such techniques as breaking into corporate switchboards
|
|||
|
through phone lines to make conference calls and using ill-gotten identifacation
|
|||
|
numbers for Sprint, MCI and other toll services.
|
|||
|
|
|||
|
Explains maxfield: "If you're into calling bulletin boards, a big problem is
|
|||
|
phone-bill shock at the end of the month. So a lot of boards, while not
|
|||
|
catering necessarily to illegal activities, generate a lot of fraudulent calls."
|
|||
|
|
|||
|
Many hacker-phreakers see nothing wrong with phone scams. " I only abuse
|
|||
|
people who charge too much for thier long-distance calls," says one called the
|
|||
|
Comedian, a 17-year-old from Bethesda, Md "I've heard some pretty bad things
|
|||
|
about the phone company."
|
|||
|
|
|||
|
Reflecting the youth of most users, a hacker known as Access Finder recently
|
|||
|
said on a board in Colorado called the Operating Room that he had been inactive
|
|||
|
for a while because "my computer had a major [expletive] when my mother spilled
|
|||
|
water from the plants all over it." He then asked other users to supply him with
|
|||
|
"codes for anything, " including businesses,government agencies, phone firms and
|
|||
|
banks.
|
|||
|
|
|||
|
Typical of the subterranean boards is one in Boulder, Colo., called Off The
|
|||
|
Wall. Operated by Psycho, the board requires the last four digits of a users
|
|||
|
phone number and a seven character password for access. To make certain that
|
|||
|
they are not infiltrated by police or security agents, most system operators
|
|||
|
subject new users to "character checks" before granting passwords or access to
|
|||
|
some of the systems' more dubious sections. Some operators demand references
|
|||
|
from other hackers and automatically look askance at anyone older then 20.
|
|||
|
|
|||
|
"The bulletin boards out there have far better security than most corporate
|
|||
|
mainframes. and that's pretty frightening and astounding,"says former hacker
|
|||
|
Ian Murphy, now a security consultant.
|
|||
|
|
|||
|
|
|||
|
LAYERS OF ACCESS. Users with "Level I" security clearence on Off The Wall can
|
|||
|
read and leave messages on subboards dedicated to specific computer brands,
|
|||
|
product reviews and general announcements. The next level permits access to
|
|||
|
messages dealing with such topics as software trading and X-rated and
|
|||
|
destructive materials. The highest level brings one to messages providing
|
|||
|
passwords and access codes for commercial computers and details on ways to make
|
|||
|
illegal long-distance phone calls.
|
|||
|
|
|||
|
Among some tidbits found recently on Off The Wall--
|
|||
|
|
|||
|
|
|||
|
o Excerpts from sexually explicit material published in Penthouse magazine.
|
|||
|
|
|||
|
o Account numbers and passwords of Dow Jones News/Retrieval and CompuServe
|
|||
|
commercial data bases.
|
|||
|
|
|||
|
o Personal identifacation numbers for various Sprint and MCI long-distance
|
|||
|
accounts.
|
|||
|
|
|||
|
o Purported recipies for a biotoxin of wheat, a "cheap,very explosive,water-
|
|||
|
sensitive device" made with potassium and emptied cold capsules.
|
|||
|
|
|||
|
|
|||
|
Before its abrupt end, COSMOS, in addition to its message boards, carried long
|
|||
|
atricles on such subjects as making drugs, the basics of hand-to-hand combat,
|
|||
|
the ins and outs of the big TRW computers that house credit data on 120 million
|
|||
|
Americans, how to build devices for making toll free calls and ways to convince
|
|||
|
an operator that you work for the phone company. "It's amazing how many people
|
|||
|
know so much about our operators and how to use our system,"says Neal Norman, a
|
|||
|
district manager of corporate security for American Tele- phone & Telegraph.
|
|||
|
|
|||
|
COSMOS also contained a subsection for "trashing"--searching a company's
|
|||
|
garbage for discarded credit-card carbons or computer printouts carrying
|
|||
|
valuable access codes. One trasher's advice: "Look everywhere and anywhere.
|
|||
|
People are dumb these days you can get good trash anywhere."
|
|||
|
|
|||
|
|
|||
|
PIRATES ONLY. Boards like POBBS-- Pirates Only Bulletin Board System-- in
|
|||
|
suburban New York are drawing notice from software firms trying to stamp out
|
|||
|
piracy of thier copyrighted products. Operated by Exorcist, a 19 year-old
|
|||
|
college student, POBBS exists mainly to allow users of International Business
|
|||
|
Machines personal computers to swap commercial software over the phonelines .
|
|||
|
Dozens of copyrighted programs,including Lotus 1-2-3 and Wordstar, are ava-
|
|||
|
ilable free through POBBS.
|
|||
|
|
|||
|
Fun and games for curious teenagers? That's the attitude they often convey .
|
|||
|
"It's enjoyable taking risks,and it gives you a feeling of power because it puts
|
|||
|
you above most of the population," explains Demon of the Boston area.
|
|||
|
|
|||
|
Victims of these teenagers are not amused. So seriously do long-distance
|
|||
|
companies view the problem that they formed the Communications Fraud Control
|
|||
|
Association to exchange information about illegal bulletin boards and lobby for
|
|||
|
stronger legislation. "One person with one code is not enough to give us much
|
|||
|
of a problem," says Van Willson, a security official for GTE Sprint. "The
|
|||
|
problem is that the little fellows start posting them on the boards."
|
|||
|
|
|||
|
|
|||
|
PRECAUTIONS. All of the major toll carriers, as well as TRW claim to moni-
|
|||
|
tor the boards closely. AT&T regularly briefs operators about fraud scams. TRW
|
|||
|
offers seminars on security for clients , who use it's service to check thier
|
|||
|
customers credit ratings. A key point: TRW people never call clients asking
|
|||
|
them to "confirm" thier subscriber numbers.
|
|||
|
|
|||
|
Police also are looking at bulletin boards more carefully. But prosecution is
|
|||
|
sometimes difficult.Thomas Tcimpidis , a 34-year-old TV engineer in Calif-
|
|||
|
ornia, was arrested on state charges after someone posted a telephone credit
|
|||
|
-card number on his board. Tcimpidis argued that he was unaware that the stolen
|
|||
|
number was there. Charges against him were dropped last February. California's
|
|||
|
Legislature is being asked to outlaw the unauthorized placement of personal
|
|||
|
information on bulletin boards. State Senator John Doolittle intro- duced this
|
|||
|
proposal not long after New- sweek reporter Richard Sandza told of harassment by
|
|||
|
vengeful hackers angry about the article he had written on underground boards.
|
|||
|
One of them broke into a TRW computer, obtained Sandza's credit-card and Social
|
|||
|
Security numbers and published them on bulletin boards around the country.
|
|||
|
|
|||
|
|
|||
|
A RIGHT? Many law enforcers feel powerless against the boards. Using stolen
|
|||
|
code or card numbers is clearly illegal. Is posting those numbers on a computer
|
|||
|
bulletin board a crime as well ? Answers are murky. Some lawyers argue that
|
|||
|
this activity is a First Amendment right,no matter how unsavory.
|
|||
|
|
|||
|
County officials in Phoenix interpret Arizona's computer-crime aw broad- ly.
|
|||
|
Reasoning that illegal toll calls are routed through a phone company's
|
|||
|
computerized switchboard, authorities recently arrested two system operators
|
|||
|
whose boards listed long-distance access codes belonging to others and char- ged
|
|||
|
them with facilitating computer fraud.
|
|||
|
|
|||
|
So hackers are starting to feel the heat. Some say they are cutting back on
|
|||
|
thier activities. "A lot of people are very paranoid," says Shadow, an 18-year
|
|||
|
-old in New Jersey.
|
|||
|
|
|||
|
Like Shadow, other young computer wizards now must weigh the thrills of using
|
|||
|
high-tech skills to challenge "the system" against the possibility of a criminal
|
|||
|
record.
|
|||
|
|
|||
|
--------------------------------------------------------------------------------
|
|||
|
|