910 lines
51 KiB
Plaintext
910 lines
51 KiB
Plaintext
|
From "Esquire," December 1990
|
|||
|
|
|||
|
"Terminal Delinquents"
|
|||
|
|
|||
|
Once, they stole hubcaps and shot out streetlights. Now they're stealing your
|
|||
|
social security number and shooting out your credit rating. A layman's guide
|
|||
|
to computer highjinks.
|
|||
|
|
|||
|
By Jack Hitt and Paul Tough
|
|||
|
|
|||
|
|
|||
|
|
|||
|
On a muggy Friday night, we putter about the entrance to the Chelsea Hotel
|
|||
|
in New York City, nervously chatting about nothing in particular, pacing,
|
|||
|
thumping a dead coffee cup, waiting. A massive sun - garishly orange,
|
|||
|
unnaturally close - tries to wash this skeezy neighborhood with its maudlin
|
|||
|
rays, but this is Manhattan, the Chelsea, where Nancy Spungen asked Sid Vicious
|
|||
|
to stab her to death; no way. It moves on, down the runway of Twenty-third
|
|||
|
Street to the Hudson River, like all the traffic on this block, unnoticed. We
|
|||
|
are here to meet Kool and Ikon (all hacker names have been changed), reputedly
|
|||
|
two of the most talented computer hackers this side of Newark. They had agreed
|
|||
|
to reveal the secrets of their craft, but only if we chose a place such as the
|
|||
|
Chelsea, where our work would be untraceable.
|
|||
|
|
|||
|
The film-noir tactics are necessary these days because hackers are on the
|
|||
|
lam. During the last few months a federal sweep of computer hackers, known as
|
|||
|
Operation Sun Devil, has targeted the country's hacker elite. Last spring,
|
|||
|
Secret Service agents raided the homes of scores of kids, seizing not only
|
|||
|
computers but every piece of electronic equipment in sight, down to answering
|
|||
|
machines, cassette recorders, even soldering irons. These searches had all the
|
|||
|
subtlety of SWAT raids: six armed agents - guns drawn - to take one teenager
|
|||
|
into custody. In one Manhattan bust, a fourteen-year-old boy stepped from the
|
|||
|
shower into the sights of an agent's shotgun. In all, the government has
|
|||
|
seized twenty-seven thousand computer disks from forty suspected hackers. Two
|
|||
|
of them are to meet us tonight.
|
|||
|
|
|||
|
HACKING, as most of us know it, means breaking into private computer
|
|||
|
systems. More broadly, hacking is about solving problems, getting around
|
|||
|
obstacles, clearing the way. It involves not only the technical methods of
|
|||
|
skirting computer security, but also convincing the people who run the
|
|||
|
machines to divulge their passwords. Here at the Chelsea, the obstacle we're
|
|||
|
circumventing is the U.S. Secret Service.
|
|||
|
|
|||
|
Until recently, hacking was done in the comfort of one's bedroom, plugged
|
|||
|
into Mom and Dad's home phone. But a government wiretap can do a lot to change
|
|||
|
old habits. Now many hackers carry mobile computer rigs that attach to any
|
|||
|
phone - whether it's a pay phone on the street or the room phone in a hotel.
|
|||
|
|
|||
|
According to the media kit issued by the Secret Service, the boys we are
|
|||
|
scheduled to meet pose a clear and present danger to the security of both the
|
|||
|
government and the American people: "The conceivable criminal violations of
|
|||
|
this operation have serious implications for the health and welfare of all
|
|||
|
individuals, corporations, and United States government agencies relying on
|
|||
|
computers and telephones to communicate." In other words, for the "health and
|
|||
|
welfare" of us all.
|
|||
|
|
|||
|
But when the boys finally arrive and the four of us stand in the lobby of
|
|||
|
the Chelsea, chatting, we find that they are courteous, even deferential. It
|
|||
|
is difficult to see them as the new Communists, the new menace, the enemy
|
|||
|
within. And if it is hard to see them as the government's clich<63>s, it is
|
|||
|
equally difficult to see them as the media's, which has chosen adjectives from
|
|||
|
a different page of the thesaurus, depicting hackers either as a group of buck-
|
|||
|
toothed dweebs or the lazy sons of the white middle class whose loathing of
|
|||
|
their parents is so intense that they wreak their Freudian revenge upon the
|
|||
|
aptly named Ma Bell.
|
|||
|
|
|||
|
The most recent poster boy for computer subversion is Robert Morris Jr., a
|
|||
|
former Cornell graduate student convicted earlier this year of releasing a
|
|||
|
virus that disabled nearly six thousand computers nationwide. Morris's father
|
|||
|
was the head of the National Computer Security Center, the government's
|
|||
|
computer-security agency, and the media delighted in painting Morris Jr. as the
|
|||
|
spoiled son of privilege ruining his father's good name. The Ivy League
|
|||
|
student stared out from a thousand newspaper photos, pale and owl-like in his
|
|||
|
glasses. No longer would the government be forced to denounce phantoms;
|
|||
|
computer hacking now had a face and a name.
|
|||
|
|
|||
|
But these boys are teenagers - nearly ten years younger than Morris -
|
|||
|
olive-skinned, descended from Mediterranean stock. Home is a working-class
|
|||
|
urban neighborhood in New Jersey. They could never consider graduate school
|
|||
|
at Cornell; they're thinking about Passaic County Community College.
|
|||
|
|
|||
|
Though handsome, they possess the awkwardness of youth - they are
|
|||
|
seventeen and eighteen years old - so with a little imagination, we could
|
|||
|
certainly write them up as geeks. Their clothes are standard issue for peer-
|
|||
|
pressured teens: baggy jeans, no belt, low-top sneaks, long-sleeved T-shirt.
|
|||
|
No pocket protector, but no hair sculpted into a Dairy Queen offering, either;
|
|||
|
just careless teenage hair. They are similar in appearance - medium height
|
|||
|
and lanky. Ikon is the shorter of the two and tends to be the more serious.
|
|||
|
His jokes are often put-downs, mocking the stupidity of those around him.
|
|||
|
Kool's humor is more playful, even lewd; he's constantly checking out the
|
|||
|
girls.
|
|||
|
|
|||
|
Their language is urban, toughened by "dems" and "dozes;" and youthful,
|
|||
|
brimming with "uhs," "likes," and "you knows." But take out that oral
|
|||
|
punctuation, and the syntax is textbook correct. Their conversations are
|
|||
|
surprisingly sophisticated in their understanding not only of the complex
|
|||
|
workings of the computer but of the caprices of the human heart as well.
|
|||
|
|
|||
|
Under false names and paying in cash, we check into our cheap room, a
|
|||
|
space just big enough for the four of us, painted white every year for half a
|
|||
|
century and furnished with flimsy items stained the color of cocoa. We
|
|||
|
quickly redecorate, hauling the desk next to the bed and pulling up the chair
|
|||
|
so that we can all sit and see. We set their portable laptop computer on the
|
|||
|
desk and string a tangle of wires among the computer, various electronic
|
|||
|
gadgets, and the hotel telephone. Ikon's fingers fly across both the phone's
|
|||
|
keypad and the computer's keyboard with blinding speed.
|
|||
|
|
|||
|
Eeeep. We have connected. We are here to learn how to do this, but for
|
|||
|
now we just stare into the shimmering green screen. In a matter of minutes we
|
|||
|
are deep in the heart of the telephone company's computers. It appears that
|
|||
|
Ma Bell has been expecting us; the screen suddenly displays a boxed note,
|
|||
|
unambiguous in its meaning:
|
|||
|
|
|||
|
W A R N I N G
|
|||
|
Access to this computer and to the computer data and computer
|
|||
|
materials accessible by use of this computer is restricted to those
|
|||
|
whose access has been authorized by NYNEX or its subsidiary companies.
|
|||
|
Use by unauthorized individuals or use for unauthorized purposes is a
|
|||
|
violation of Federal and/or State Laws.
|
|||
|
|
|||
|
Kool asks Jack for his home telephone number. More light-speed hand movements.
|
|||
|
The room is still with concentration, interrupted occasionally by an
|
|||
|
incomprehensible chatter of acronyms and a strange, bureaucratic-sounding
|
|||
|
shorthand. Suddenly, a series of numeric patterns blooms on the screen. It
|
|||
|
looks like this:
|
|||
|
|
|||
|
M 00 TR01 555 0000
|
|||
|
0 0 0 0
|
|||
|
LEN 10 121 306
|
|||
|
001 000 000 000 000 000 4
|
|||
|
000 000 000 000 000 000 000 000
|
|||
|
0 0 0 0
|
|||
|
0 0 0 0
|
|||
|
|
|||
|
"Doesn't mean much to you, does it Jack?" asks Ikon. "This is what a phone
|
|||
|
number really looks like. The LEN is your line-equipment number. It's the
|
|||
|
actual hardware, the only thing that matters. Your phone number is just
|
|||
|
scratch-pad nonsense. I could change it right now, if I wanted to. It could
|
|||
|
be anything at all."
|
|||
|
|
|||
|
More clacking on the keyboard, and a new image appears:
|
|||
|
|
|||
|
M 01 TR75 1 ID 555 0000 00000002
|
|||
|
PIC 222 TTC
|
|||
|
|
|||
|
Ikon makes a few changes, and the configuration looks like this:
|
|||
|
|
|||
|
M 12 TR75 1 DN 555 0000 00000003
|
|||
|
PIC 288 TWC TTC
|
|||
|
|
|||
|
Jack has just been granted three-way calling (TWC) and has switched his long-
|
|||
|
distance carrier from MCI (222) to AT&T (288). At such profound digital
|
|||
|
levels, these changes will escape the NYNEX business office. Consequently,
|
|||
|
Jack will never be billed.
|
|||
|
|
|||
|
This deep into the system, many other things are possible - from the
|
|||
|
simple, such as finding an unlisted phone number with an address or a name, to
|
|||
|
the sinister, such as monitoring the conversation of anyone we choose by
|
|||
|
quietly dropping in on the phone line like an operator, undetected. All of it
|
|||
|
is rather simple, they insist, once you understand the structure of the
|
|||
|
system. If you're not STUPID (the ultimate hacker put-down), if you apply
|
|||
|
common sense to the system, hacking is a piece of cake.
|
|||
|
The image of the powerful and reckless hacker, capable of rooting around
|
|||
|
in our most-secret computer systems, unleashing crippling computer viruses,
|
|||
|
disrupting phone service, crashing hospital computers, and changing school
|
|||
|
records, is the one most affirmed by law-enforcement officials and the daily
|
|||
|
media. This is not so only because it easily suits the respective purposes of
|
|||
|
these institutions - whip up public loathing so the sons of bitches can be
|
|||
|
arrested; sell newspapers - but also because it is largely true. This
|
|||
|
representation fails, however, because it doesn't answer the most obvious
|
|||
|
question: If hackers really have the knowledge to do such things, why haven't
|
|||
|
they used it? Why aren't we living in a constant nightmare of paralyzed phone
|
|||
|
systems and crashing computer banks? To answer this question, we have spent
|
|||
|
the last year getting to know more than a dozen of the best hackers in America.
|
|||
|
Over time, we won their trust and were admitted into their ranks. We
|
|||
|
apprenticed ourselves to them so that we could learn what damage they really
|
|||
|
CAN do and why they don't do it.
|
|||
|
|
|||
|
|
|||
|
Hacking, at its most mechanical, requires that you arrange an electronic
|
|||
|
conversation between your humble laptop (Radio Shack, $800) and a huge
|
|||
|
computer - brimming with information - inside some corporate headquarters,
|
|||
|
government agency, or university. The conversation takes place in a very
|
|||
|
human way - using a telephone. The laptop uses a modem (Radio Shack, $150) to
|
|||
|
translate the digital pulses of a computer into the hisses and beeps that
|
|||
|
travel over regular phone lines.
|
|||
|
|
|||
|
In the comfort of your home, a modem can be plugged directly into the
|
|||
|
back of the telephone. When you're using plugless phones, like hotel phones
|
|||
|
and pay phones, one more step is required. An acoustic coupler (Laptop Shop,
|
|||
|
$150), tightly strapped to the phone receiver, allows the computer to fire
|
|||
|
audio tones directly through the handset, the way we do when we speak.
|
|||
|
|
|||
|
Just like people, computers have phone numbers, known as "dialups." When
|
|||
|
you call a computer, its own modem hears the tones coming through the phone
|
|||
|
line and translates your hisses and beeps back into the electronic pulses the
|
|||
|
computer can understand. You're connected. The hacking can begin.
|
|||
|
|
|||
|
There are thousands of systems to hack, and dozens of hackers for each
|
|||
|
one. For Kool and Ikon, though, there's only one game in town - the phone
|
|||
|
company.
|
|||
|
|
|||
|
Hacking Ma Bell dates back to the late Sixties, when phone hackers, then
|
|||
|
dubbed "phone phreaks," discovered that the entire AT&T phone system could be
|
|||
|
controlled by whistling tones at various frequencies directly into a phone.
|
|||
|
One notorious hacking pioneer, John Draper, made the farcical discovery that
|
|||
|
the toy whistle in a box of Cap'n Crunch perfectly mimicked the 2,600-hertz
|
|||
|
tone that engaged a long-distance line, enabling him to make free calls
|
|||
|
anywhere in the world. Draper assumed the cereal's name as his "nom de haque,"
|
|||
|
and he and his generation spent years deciphering the meanings of different
|
|||
|
tones. The perfection of the "blue box" - a portable device that duplicated
|
|||
|
the tones needed to master the phone system - became the ultimate mission.
|
|||
|
|
|||
|
With the advent of long-distance calling cards, which are easily
|
|||
|
filchable, hackers today take free long-distance calls for granted. What
|
|||
|
interests Captain Crunch's descendants are the computers that control and link
|
|||
|
our phones. Soon after the Captain Crunch era, AT&T was broken up into a
|
|||
|
network of "baby Bells" (regional phone systems). These are now the main
|
|||
|
event. Kool and Ikon hack NYNEX, which handles phone service for all of New
|
|||
|
York and New England.
|
|||
|
|
|||
|
The first stop for your phone line, after it snakes out of your house, is
|
|||
|
a local switching center. The "switch" directly controls all the phones in
|
|||
|
your neighborhood. A switch performs the same service as Lily Tomlin's cranky
|
|||
|
operator, Ernestine, who would plug your phone jack into the line that you
|
|||
|
were calling. Today, your switch makes that connection electronically, and
|
|||
|
does it for as many as 150,000 phones.
|
|||
|
|
|||
|
Each neighborhood switch is controlled by its own huge computer; these
|
|||
|
computers are the essential targets of the phone-company hacker. If you can
|
|||
|
access the computer for a switch, you can control every phone it does. You
|
|||
|
can turn those phones on and off, reroute calls, and change numbers.
|
|||
|
|
|||
|
When this knowledge grows boring, the explorer can investigate the dozens
|
|||
|
of NYNEX's more complicated computer systems, each containing hundreds of new
|
|||
|
passageways and strange domains. For the advanced hacker, one of the more
|
|||
|
attractive is the infelicitously named NYNEX Packet Switched Network, or NPSN.
|
|||
|
Its beauty is its strength: The system allows you to enter each of the more
|
|||
|
than one thousand switches in New York and New England. Even more appealing,
|
|||
|
it allows you to ricochet off onto regional maintenance systems such as COSMOS
|
|||
|
and MIZAR. Among its many talents, COSMOS sends out instructions to create
|
|||
|
and kill phone numbers. The local MIZAR actually does the work. Since COSMOS
|
|||
|
keeps the records and MIZAR doesn't, most hacking done on a MIZAR is
|
|||
|
undetectable. MIZARs are a hacker-favorite.
|
|||
|
|
|||
|
In order to get into any computer, you need a dialup number, an account
|
|||
|
name (or "login"), and a password. Most people encounter the basics of this
|
|||
|
process every time they approach an automatic-teller machine. Knowing where
|
|||
|
to find an ATM is your dialup; placing your card with its black magnetic strip
|
|||
|
in the slot is like entering your account; punching in your personal
|
|||
|
identification number is like typing your password. The secret of obtaining
|
|||
|
these three keys for breaking into a phone-company computer - or any computer -
|
|||
|
is simple, our tutor explain, and can be learned as easily over a banana split
|
|||
|
in an air-conditioned diner as over a computer screen. We abandon our
|
|||
|
sweltering room at the Chelsea and head to the local joint. On the plate-glass
|
|||
|
window of the restaurant we notice a decal that boasts, INSIDE: A PUBLIC PHONE
|
|||
|
YOU CAN DEPEND ON.
|
|||
|
|
|||
|
Over burgers and ice cream, we learn that there are several mechanical
|
|||
|
ways of learning accounts and passwords, but that there's an easier way, known
|
|||
|
as social engineering. Basically, social engineering is bullshitting -
|
|||
|
calling someone who has access to a system and convincing them that you are a
|
|||
|
legitimate user who needs a dialup number, an account, and a password.
|
|||
|
|
|||
|
For the adventurer, social engineering may seem like cheating. Getting a
|
|||
|
password can be done by purely technical hacking means: programming a computer
|
|||
|
to try thousands of passwords. But to these guys (and even to their
|
|||
|
apprentices after a few weeks), this method is as irritating as playing the
|
|||
|
first levels of a video game after you've mastered them. You want to whiz
|
|||
|
right past such tedium to the more interesting levels. Getting a password is
|
|||
|
not hacking. It is a pain in the ass.
|
|||
|
|
|||
|
Social-engineering a used-car dealer is easy, even if you don't know what
|
|||
|
you're doing (because he doesn't either - although his natural suspicion as a
|
|||
|
civilian often means you don't get past the hellos). Social-engineering a
|
|||
|
computer specialist with high-level access is easy only if you do know what
|
|||
|
you're doing. The professional needs to hear a few bits of jargon, just enough
|
|||
|
artfully expressed codes to make him feel that he is talking to a member of the
|
|||
|
guild. Both forms are surprisingly successful.
|
|||
|
|
|||
|
"Sometimes," says Kool, "it's so simple. I used to have contests with my
|
|||
|
friends to see how few words we could use to get a password. Once I called up
|
|||
|
and said, `Hi, I'm from the social-engineering center and I need your
|
|||
|
password,' and they gave it to me! I swear, sometimes I think I could call up
|
|||
|
and say, `Hi, I'm eating a banana split. Give me your password.'"
|
|||
|
|
|||
|
Like its mechanical counterpart, social engineering is half business and half
|
|||
|
pleasure. It is a social game that allows the accomplished hacker to show off
|
|||
|
his knowledge of systems, his mastery of jargon, and especially his ability to
|
|||
|
manipulate people. It not only allows the hacker to get information; it also
|
|||
|
has the comic attractions of the old-fashioned prank call - fooling an adult,
|
|||
|
improvisation, cruelty.
|
|||
|
|
|||
|
In the months we spent with the hackers, the best performance in a social-
|
|||
|
engineering role was by a hacker named Oddjob. With him and three other guys
|
|||
|
we pulled a hacking all-nighter in the financial district, visiting pay phones
|
|||
|
in the hallway of the World Trade Center, outside the bathrooms of the Vista
|
|||
|
Hotel, and in the lobby of the international headquarters of American Express.
|
|||
|
|
|||
|
Oddjob's magnum opus takes place along the south wall of the phone bank
|
|||
|
leading to the Vista's bathrooms. We bolshevize six chairs from the women's
|
|||
|
powder room and attach our computer to a pay phone. Throughout the night, the
|
|||
|
hackers compliment one another on the sheer genius of the place: chairs, a
|
|||
|
snack bar down the hall, and - on a nasty, humid city night - air conditioning.
|
|||
|
|
|||
|
At the rarefied level these four have reached, an evening's work often
|
|||
|
revolves around the links between networks in the NYNEX system. On this night,
|
|||
|
one of our links is down; a password has been changed. Oddjob begs for a
|
|||
|
chance to social engineer something, anything. His method, he explains, is to
|
|||
|
sound like a regular person, to assume the accents of those who do the day-to-
|
|||
|
day keypunching and processing - the heavy lifting of the information age. He
|
|||
|
has a considerable repertoire - Brooklyn guy, polite blue-collar type, southern
|
|||
|
redneck. "You should hear my black woman," he boasts. Tonight's composition
|
|||
|
will be performed in the key of Flatbush.
|
|||
|
|
|||
|
Oddjob paces furiously on his lilliputian stage, tethered to the pay phone
|
|||
|
by the irritatingly short steel line, firing suggestions to the crowd on whom
|
|||
|
to call, taking in ideas. Part of the thrill of social engineering is clearly
|
|||
|
the improvisation of it all. But it's improvisation with a competitive edge.
|
|||
|
You show your machismo by waiting until the last possible second to prepare
|
|||
|
yourself. The moment after dialing, before the phone is answered, a true
|
|||
|
hacker will suddenly request vital information. "Where should I say I'm
|
|||
|
calling from?" "Who do I ask for?" or even "Where am I calling?" Oddjob is
|
|||
|
feigning such recklessness when the phone is answered. He opens by
|
|||
|
establishing his credentials in thick Brooklynese:
|
|||
|
|
|||
|
"Yeah, hoi deh. Dis is Tucker calling from Pearl Street operations.
|
|||
|
Yeah, hi. You guys havin' trouble gettin' into the NPSN deh? You guys are
|
|||
|
goin' through a packet switch, right? Yeah, when you go into COSMOS. Okay,
|
|||
|
'cause dat's where the problems are - ya da guy reported it. Okay, what do you
|
|||
|
use for the packet switch when you first connect - do you have your own code?"
|
|||
|
|
|||
|
She does have her own code; unfortunately, she is not about to give it to
|
|||
|
him. She tells him to solve his problem by checking the manual. So Oddjob
|
|||
|
loudly flips through the pages of a nearby phone book, pretending to read from
|
|||
|
its pages, and finally, frustrated, heaves the phone book toward the wall,
|
|||
|
with a crash. But it's done in a way that says: "Geez, aren't these manuals
|
|||
|
frustrating? We, the folks who do all the work, are supposed to make sense of
|
|||
|
these?" She's beginning to cotton to him and reveals that the first part of
|
|||
|
the code is the user's initials. Oddjob cranks up the charm and moves in for
|
|||
|
the kill.
|
|||
|
|
|||
|
"Okay, so what do you put in? GWT? Are those your initials? What's your
|
|||
|
name? Gail? That's a nice name. Mine? Tucker. Yeah, that's my last name.
|
|||
|
I don't like my first name because it sounds really dumb. No, I'm not telling.
|
|||
|
Noooooooo. I'm not gonna tell you. Ooooooh. You really want to know? Okay,
|
|||
|
it's...Edmonton. Oh, come on, Edmonton is NOT distinguished, it's silly. They
|
|||
|
used to kid me in school. Yeah. Heh, heh. Anyway, just so I can get to the
|
|||
|
right system, would you walk me through it?" She does, and he gets most of the
|
|||
|
information he wants.
|
|||
|
|
|||
|
|
|||
|
By 4:00 A.M. we had been thrown out of the Vista and were spread out across the
|
|||
|
waxy, marble lobby of American Express headquarters, listening to Oddjob con
|
|||
|
another sucker on the phone. Kool was trying a few breakdancing moves. The
|
|||
|
evening had been devoted almost exclusively to social engineering; we hardly
|
|||
|
used the laptop at all.
|
|||
|
|
|||
|
As the edge of the horizon began to lighten and the two of us had said
|
|||
|
goodnight to the hackers and were walking home, we realized that the entire
|
|||
|
evening had provoked an eerie d<>j<EFBFBD> vu. As teenagers, we had both survived many
|
|||
|
of these Friday nights; trying halfheartedly to get into trouble, sitting
|
|||
|
around with the guys, waiting for something to happen. It's no accident that
|
|||
|
there are no hackers older than about twenty-one; serious hacking requires the
|
|||
|
kind of tireless devotion that only teenagers possess.
|
|||
|
|
|||
|
As with all teenage pursuits, hacking doesn't last forever. For most
|
|||
|
hackers, manipulating technology in imaginative ways is nothing more than
|
|||
|
rebellion. They learn high-tech pranks, such as changing the outgoing message
|
|||
|
on their algebra teacher's home answering machine, or they figure out how to
|
|||
|
chat with other hackers around the country for free. But these amateurs lack
|
|||
|
the patience and resolve to ascend to the levels our companions have attained.
|
|||
|
They fool around for six months or a year, get bored, and quit.
|
|||
|
|
|||
|
Like any group of teenagers with a common pursuit, serious hackers have
|
|||
|
nothing but contempt for amateurs. And when a fellow pro moves on, they treat
|
|||
|
it almost as betrayal, scorning the traitor as having "faded away into
|
|||
|
society." They can't imagine it happening to them.
|
|||
|
Hackers are a group that has always existed in teenage society. They are
|
|||
|
not the genius nerds seen on T.V. Nerds, by definition, are prosaic. They
|
|||
|
lack the creativity, the badass guts needed to hack. Nerds, in fact, are the
|
|||
|
ones who grow up and GET hacked. Real hackers are the rebellious brains: the
|
|||
|
video-game addicts, the crystal-radio connoisseurs, the Dungeons & Dragons
|
|||
|
freaks. They are the guys who understand, even love, the way systems work:
|
|||
|
They don't just take things apart and put them back together - they make them
|
|||
|
do something else, something BETTER.
|
|||
|
|
|||
|
Where we see only a machine's function, they see its potential. This is,
|
|||
|
of course, the noble and essential trait of the inventor. But hackers warp it
|
|||
|
with teenage anarchic creativity: Edison with attitude.
|
|||
|
|
|||
|
Consider the fax machine. We look at it; we see a document-delivery
|
|||
|
device. One hacker we met, Kaos, looked at the same machine and immediately
|
|||
|
saw the Black Loop of Death. Here's how it works: Photocopy your middle finger
|
|||
|
displaying the international sign of obscene derision. Make two more copies.
|
|||
|
Tape these three pages together. Choose a target fax machine. Wait until
|
|||
|
nighttime, when you know it will be unattended, and dial it up. Begin to feed
|
|||
|
your long document into your fax machine. When the first page begins to emerge
|
|||
|
below, tape it to the end of the last page. Ecce. This three-page loop will
|
|||
|
continuously feed your image all night long. In the morning, your victim will
|
|||
|
find an empty fax machine, surrounded by two thousand copies of your finger,
|
|||
|
flipping the bird.
|
|||
|
|
|||
|
Ikon and Kool have been hacking the NYNEX phone system for about six
|
|||
|
years. Although much of their work has been done alone, they have each been in
|
|||
|
dozens of informal partnerships and groups, which tend to form quickly and
|
|||
|
dissolve just as fast. In the early Eighties, some of the best hackers in the
|
|||
|
country formed the Legion of Doom, which, despite its wicked name, basically
|
|||
|
served as a conduit for information. The quest to understand NYNEX is a far-
|
|||
|
flung, collective enterprise, like the space program, only run by teenagers -
|
|||
|
experiments aren't done in scrubbed laboratories but in hotel lobbies;
|
|||
|
information isn't exchanged at symposia in Geneva but at hastily called
|
|||
|
meetings in peculiar locations. One such meeting has been institutionalized:
|
|||
|
first Friday of every month, Manhattan Citicorp building at Fifty-third and
|
|||
|
Lexington at - where else? - the pay phones.
|
|||
|
|
|||
|
Although the channels hackers use to communicate are highly sophisticated,
|
|||
|
the way information travels is similar to the way knowledge is passed on in an
|
|||
|
oral tradition. Teleconferences are held on "bridges" - illicit phone links;
|
|||
|
technical information is exchanged on private computer bulletin-board systems
|
|||
|
run out of hackers' bedrooms; samizdat magazines are distributed with names
|
|||
|
like "Phrack" and "2600." The latter name is an homage to Captain Crunch's
|
|||
|
2,600-hertz tone, a tacit recognition that this oral tradition stretches back
|
|||
|
decades.
|
|||
|
|
|||
|
"Even though hippies were blue-boxing for all it was worth in the
|
|||
|
Sixties," explains Ikon, born the year Captain Crunch went to jail, "they
|
|||
|
didn't really understand what they were doing. In the Nineties, we're on a
|
|||
|
search for technical knowledge; what WE'RE doing is figuring out how the phone
|
|||
|
system really WORKS."
|
|||
|
|
|||
|
Once you understand the architecture of the system, all sorts of
|
|||
|
opportunities present themselves. Consider those telephone hybrids found
|
|||
|
beside most automatic-teller machines - the ones that connect you immediately
|
|||
|
with a bank employee. We see a way of getting help; a hacker sees unlimited
|
|||
|
free long-distance phone calls. Here's how:
|
|||
|
|
|||
|
When you pick up that phone, you hear a moment of silence before the
|
|||
|
automatic dialer beeps out the seven tones that call the bank's service center.
|
|||
|
That silence represents an open phone line, waiting to be told what to do.
|
|||
|
So instead of waiting for the automatic dialer, click the phone's hook ten
|
|||
|
times in rapid succession. This action perfectly imitates the ten spluttering
|
|||
|
pulses of the last hole on the rotary dial - the operator. When the seven
|
|||
|
tones sound, they are ignored; you've already seized control of the phone line.
|
|||
|
Wait a moment and the operator will answer. Explain that you're having trouble
|
|||
|
reaching a certain number in the Gobi Desert; could she dial it for you? Piece
|
|||
|
of cake.
|
|||
|
|
|||
|
|
|||
|
Yet if technology giveth, it also taketh away. One hot Friday night in July,
|
|||
|
we get the call to pick up the boys at Penn Station. They are bringing along
|
|||
|
some friends and a full agenda. Tonight, we're informed, will hold many
|
|||
|
lessons for us. When we meet, Ikon gravely explains the situation: "We seem to
|
|||
|
have lost our resources." It appears that NYNEX is starting to change
|
|||
|
passwords on them, and the one dialup into NPSN that was still working is now
|
|||
|
disabled. It just rings and rings. We will now be starting practically from
|
|||
|
scratch.
|
|||
|
|
|||
|
We walk east on Thirty-fourth Street toward the Empire State Building.
|
|||
|
We've already hacked from two New York landmarks; why not a third? At 7:00,
|
|||
|
the building is pretty empty. Tourists are either taking the escalator down to
|
|||
|
to Guinness World of Records Exhibition or the elevator up to the Observation
|
|||
|
Deck. We're roaming the halls, scoping out pay-phone banks, and feeling rather
|
|||
|
conspicuous - six young men with a big black suitcase. A security guard,
|
|||
|
trying to be helpful, spooks us, and all six of us bolt simultaneously for six
|
|||
|
pay phones, pretending to be in midconversation. A ludicrous paranoia is
|
|||
|
setting in.
|
|||
|
|
|||
|
Eventually we find a velvet rope draped across a corridor, guarded only by
|
|||
|
a man polishing the floor. A few furtive glances down the hall, and we're over
|
|||
|
and in, ensconced in a secluded phone bank. We unpack our laptop, our modem,
|
|||
|
and our acoustic coupler; happily, the entire contraption fits on the phone's
|
|||
|
shelf.
|
|||
|
|
|||
|
Ikon starts pounding digits on the pay phone, trying to get that one
|
|||
|
dialup to work. But there is only continuous ringing. Suddenly he gets an
|
|||
|
idea. It's a long shot - a solution hopelessly simple. He calls the actual
|
|||
|
office whose computer he's trying to break into and politely asks the woman to
|
|||
|
(please) turn on the computer's modem.
|
|||
|
|
|||
|
Ecstasy.
|
|||
|
|
|||
|
"We're back on!"
|
|||
|
|
|||
|
"Yo! We're worth something!"
|
|||
|
|
|||
|
"It's MIZAR! It's everything!"
|
|||
|
|
|||
|
"We have a reason to live!"
|
|||
|
|
|||
|
With access to NPSN, we now set out to "liberate" one of these pay phones,
|
|||
|
that is, to free it from its addiction to quarters. We get into the switching
|
|||
|
computer for this neighborhood and disconnect the pay phone. "The beast," Ikon
|
|||
|
declares, "is dead. We have killed it." Picking up the beast's receiver
|
|||
|
proves that he's right; no dial tone. "Now we bring the beast back to life,"
|
|||
|
Ikon announces, and resurrects it as a regular phone, able to make local and
|
|||
|
long-distance calls for free.
|
|||
|
|
|||
|
Kool takes out his black marker and writes on the pay phone in the wild
|
|||
|
style of graffiti artists: "The PLO Lives," and then adds, "Payphone Liberation
|
|||
|
Organization." We reconnect the computer to the liberated phone.
|
|||
|
|
|||
|
A second security guard happens along. He has a distinct interest in
|
|||
|
being told just what the - just what in HELL is going on around here, anyway?
|
|||
|
Kool takes him aside for a bit of impromptu social engineering. "We're, uh,
|
|||
|
sending a story over the phones. We're with NBC." The guard notices the
|
|||
|
peacock logo on Ikon's white NBC baseball cap (NBC Studios gift shop, $10) and
|
|||
|
somehow makes sense of this - a bunch of teenagers, the middle of the night,
|
|||
|
Cheez Doodles, Jolt Cola; of COURSE they're TV reporters. Now he wants to chat
|
|||
|
US up.
|
|||
|
|
|||
|
"What's the story on?" he asks eagerly.
|
|||
|
|
|||
|
"It's on the pay phones at the Empire State Building," replies Kool. "You
|
|||
|
know, uh, what kind of problems they have..." Kools improvisation is getting
|
|||
|
almost comically desperate, but the guard still buys it. After a moment, he
|
|||
|
moves on to complete his rounds.
|
|||
|
|
|||
|
From our current perch in NPSN, we want to hop onto the Brooklyn COSMOS
|
|||
|
maintenance system. The password we've using no longer works; they've changed
|
|||
|
the locks. This is a serious problem. Social engineering at this level is
|
|||
|
extremely difficult, because the operators have been burned too many times to
|
|||
|
just hand over a password. What's more, there is no direct phone number to
|
|||
|
COSMOS, dialup; COSMOS can only be reached from NPSN. But there is, as always,
|
|||
|
another way. This time it's called "pad-to-pad," probably the most advanced
|
|||
|
hacking procedure, because it calls for an artful use of both mechanical and
|
|||
|
social-engineering talents. Here's how it works:
|
|||
|
|
|||
|
Call an office in Brooklyn where you know they use COSMOS. Tell the
|
|||
|
person who answers that you're troubleshooting her COSMOS account, and you need
|
|||
|
her help. Ask her to type STAT on her keyboard and read off the number that
|
|||
|
appears. With it, you can connect directly to her computer terminal; now YOUR
|
|||
|
screen is HER screen. Everything she types you can read, and vice versa.
|
|||
|
Begin the social engineering: Ask her to sign on to COSMOS and enter her
|
|||
|
password. She thinks everything is fine because she isn't telling you anything
|
|||
|
over the telephone, and she isn't, exactly; she's just typing on her terminal.
|
|||
|
And you type on yours, faking the computer's commands. When she types in her
|
|||
|
account number, you respond - as the computer would - by typing "Password?" Of
|
|||
|
course, her password won't get her onto COSMOS, since she's connected only to
|
|||
|
your computer; instead, it appears in glowing letters on your screen. You type
|
|||
|
"login incorrect." Before she tries again, detach your terminal from hers and
|
|||
|
keep talking, offering friendly advice.
|
|||
|
|
|||
|
At the Empire State Building, standing at a pay phone, our first shot at
|
|||
|
pad-to-pad works perfectly. Our victim puzzles over why the system won't grant
|
|||
|
her access and tries again. In a flash she hears the familiar clicks and
|
|||
|
squeaks that assure her she is safely on, and she and Ikon exchange cheerful
|
|||
|
banter as the COSMOS warning flashes on her screen:
|
|||
|
|
|||
|
|
|||
|
ATTENTION ALL USERS
|
|||
|
Under no circumstances should you disclose your logon password to anyone
|
|||
|
on the phone or in person.
|
|||
|
|
|||
|
|
|||
|
Ikon strings her along for another few minutes, listening to her complaints,
|
|||
|
completing the lie: "Well, it seemed to be okay from this end. The first time
|
|||
|
it said `login incorrect,' huh? You think you might have typed it in wrong?
|
|||
|
|
|||
|
But he's barely listening now, performing the coda by rote, because he's
|
|||
|
already connected to the Brooklyn COSMOS with her account, and he's exploring,
|
|||
|
looking for a backdoor program he installed here the last time he was on,
|
|||
|
before they moved the mainframe from Brooklyn to Massachusetts.
|
|||
|
|
|||
|
"It's here!" Ikon shouts.
|
|||
|
|
|||
|
"They're so stupid, man," says Kool.
|
|||
|
|
|||
|
"When they copied all the commands they copied our backdoor command over
|
|||
|
too," Ikon explains.
|
|||
|
|
|||
|
We execute this old command, disappear through the "back door," and
|
|||
|
surface on a higher, more powerful level of the machine. For the next few
|
|||
|
hours, we explore this strange new land, trying to figure out the look of the
|
|||
|
place. We are a dozen hands groping in the darkness, feeling our way along the
|
|||
|
wall of a system somewhere in Massachusetts. While one hacker works the
|
|||
|
keyboard, the others throw out suggestions. Over time, ideas are winnowed,
|
|||
|
attempts are assayed. Failures are common, but they are relieved by moments of
|
|||
|
hope. A small obstacle is surmounted or a new passageway is discovered. The
|
|||
|
fun of gaining entry is over; now most of the hacking is trial and error,
|
|||
|
banging away at an obstacle until a path over, around, or through is revealed.
|
|||
|
At this remove - we are relayed off three computers and extended across four
|
|||
|
states - even the easiest of hacking problems can suddenly become complex
|
|||
|
again.
|
|||
|
|
|||
|
We, the reporters, try to buoy our own interest by peppering the hackers
|
|||
|
with questions. But after a while, the answers are numbingly similar: "We're
|
|||
|
trying to get in." "We're just looking around." "We're trying to figure out
|
|||
|
what this does." After three hours, we are slumped against a wall,
|
|||
|
contemplating the significance of our boredom. At times, accompanying hackers
|
|||
|
is about as exciting as watching a graduate student flip through a card
|
|||
|
catalogue. During the fourth hour, several of the hackers grow restless. One
|
|||
|
leaves, another calls some friends. Kool slides down the wall to join us, and
|
|||
|
wistfully recalls the old days, when he could hack for twelve hours without a
|
|||
|
break.
|
|||
|
|
|||
|
Ikon outlasts everyone, which is not unusual. He's deep within the
|
|||
|
machine now, wired, intense, alert. He waves off the occasional call for food,
|
|||
|
ignoring his own hunger and fatigue. He's been standing before this unit for
|
|||
|
five hours without rest; he barely bothers to shift his weight from one leg to
|
|||
|
another. All we hear are the occasional staccato clicks as he attempts yet
|
|||
|
another entry. From time to time a security guard approaches and peers in.
|
|||
|
Our paranoia has yielded to exhaustion. We wave.
|
|||
|
|
|||
|
|
|||
|
Ikon's reverie doesn't end until the battery pack on the laptop dies. Everyone
|
|||
|
else is relieved; we've been ready to go for hours.
|
|||
|
|
|||
|
As we pack up our equipment and head out into the night, Kool's attention
|
|||
|
is suddenly distracted by a low-slung, high-tech car. "Yo, check out that
|
|||
|
Porsche with the cellular phone. I'd give up hacking for that car."
|
|||
|
|
|||
|
"Who needs a Porsche?" asks Ikon. "We have MIZAR."
|
|||
|
|
|||
|
Kool looks at him with amazement, but Ikon goes on. "I'd rather have all
|
|||
|
of NYNEX than a Porsche. I mean, can you get passwords with a Porsche?"
|
|||
|
|
|||
|
Kool, still dumbfounded, states the obvious: "You can get GIRLS with a
|
|||
|
Porsche! Can you get girls with a password?"
|
|||
|
|
|||
|
They're laughing, but we all know it's true: For Ikon, there is no higher
|
|||
|
purpose than hacking NYNEX. Kool, on the other hand, is willing to make a few
|
|||
|
exceptions.
|
|||
|
|
|||
|
As they discuss the next day's hacking agenda, Kool admits that he's
|
|||
|
getting a little bored with the endless exploration, and suggests that they try
|
|||
|
some COOL stuff. "Maybe we could forward calls to a radio station and be the
|
|||
|
only ones who can get through," he suggests. "We could win tickets to, like, a
|
|||
|
Depeche Mode concert."
|
|||
|
|
|||
|
Ikon is dismissive. "No. The Project."
|
|||
|
|
|||
|
"C'mon, let's think of something to DO."
|
|||
|
|
|||
|
"No, wait. The Project, the Project." He is insistent: We will continue
|
|||
|
to chart the landscape of the telephone company. Nothing else matters.
|
|||
|
|
|||
|
We're with Kool, frankly: When do we get to start changing the orbit of
|
|||
|
satellites and listening in on Madonna's phone calls? For that matter, when do
|
|||
|
we conquer the entire NYNEX system? When does it end?
|
|||
|
|
|||
|
"The thing that keeps us so interested," Ikon tells us later, "is that
|
|||
|
with NYNEX, or any other system with good security, we'll NEVER have permanent
|
|||
|
access. We'll always lose what we need, and we'll be forced to find another
|
|||
|
way to get back into it. It's almost like a game. It's like a never-ending
|
|||
|
role-playing adventure game, but it's real. The thing that makes it interesting
|
|||
|
is that you can never win."
|
|||
|
|
|||
|
"So why play?" we ask. "Why spend years at a keyboard, risking jail, to
|
|||
|
play a game you'll never win?"
|
|||
|
|
|||
|
"It's like having the edge. That's the whole thing," says Ikon. "The
|
|||
|
name of the game is having the edge."
|
|||
|
|
|||
|
"Over whom?" we ask.
|
|||
|
|
|||
|
"Over anyone else," he replies. "Some people spend their whole lifetime
|
|||
|
trying to find the one thing that they're really good at. We've found it
|
|||
|
already. We're hackers. You know, there are always these computer
|
|||
|
know-it-alls who say, `Oh yeah, I used to be a hacker.' That's crap. If
|
|||
|
you're an ex-hacker, you were never a hacker to begin with. It's not something
|
|||
|
that dies. It's a way of life. It's a way of thinking."
|
|||
|
|
|||
|
What's the purpose of all this exploration? After a dozen nights, it hits
|
|||
|
us: Hacking HAS no practical purpose. Every hacker starts as a utilitarian,
|
|||
|
viewing the phone systems as a means to an end, such as free calls or high-tech
|
|||
|
pranking. But over time the means BECOME the end. Advanced hackers are
|
|||
|
nothing more than aestheticians; they marvel not at the system's use but at the
|
|||
|
system itself. Suddenly a nagging contradiction makes sense. Throughout our
|
|||
|
apprenticeship, the hackers consistently scorned our "juvenile" requests to
|
|||
|
hack into TRW. Now we understand why. The best hackers are BORED by TRW (and
|
|||
|
other record-keeping systems, like those at hospitals and schools) despite the
|
|||
|
juicy information they contain. These computers are simple data-retrieval
|
|||
|
units, not much more complicated than the word processor used to write this
|
|||
|
article. The TRW computer isn't worth hacking, because, as Kool so sweetly
|
|||
|
puts it, "it's a piece of shit." The phone networks ARE worth hacking, not
|
|||
|
because of what a hacker can use them for, but because of their vast size. "It
|
|||
|
goes back to what Crunch said," Ikon explains. "The phone system is the
|
|||
|
largest network in the entire world." It's the hardest thing to hack, and
|
|||
|
therefore, it's the only thing WORTH hacking. It is from these hackers that
|
|||
|
the law and the corporations have the least to fear. Ironically, these are the
|
|||
|
ones getting busted.
|
|||
|
|
|||
|
It is true that everything Kool and Ikon do when hacking is illegal. All
|
|||
|
their calls are paid for fraudulently; all the systems they enter are
|
|||
|
proprietary. This fact occasionally provides a frisson of excitement (probably
|
|||
|
more so for us, the amateurs, than for serious hackers); more frequently, it is
|
|||
|
just ignored. What these hackers are doing makes absolute sense to them: They
|
|||
|
are gaining knowledge. If there are laws against that, they reason, they're
|
|||
|
not worth taking seriously. They've probably never heard Bob Dylan's code for
|
|||
|
the outlaw - "to live outside the law, you must be honest" - but they
|
|||
|
instinctively follow it.
|
|||
|
|
|||
|
If pressed, they will describe the havoc they could unleash on the phone
|
|||
|
system; they could easily write a simple virus that would disable switch after
|
|||
|
switch, shutting down phone service for all of New York and New England in a
|
|||
|
few hours. The damage, they estimate, could take NYNEX engineers months to
|
|||
|
repair. "We could handle it," says Ikon flatly. But asking them what sort of
|
|||
|
harm they could do to the phone system is like asking a surgeon what sort of
|
|||
|
harm he could do to a patient he's operating on. They could destroy it...but
|
|||
|
what kind of question is that?
|
|||
|
|
|||
|
A couple of weeks after the night at the Empire State Building, we're sitting
|
|||
|
with four hackers in the appropriately named Cosmos Diner, watching four rail-
|
|||
|
thin adolescents attack four huge plates of meat. We ask them what had become
|
|||
|
an obvious question: What if the phone company actually offered them jobs?
|
|||
|
|
|||
|
"If NYNEX offered me a good job in an intelligent position, I'd take it in
|
|||
|
a second. I wouldn't even think about it," replies Ikon.
|
|||
|
|
|||
|
"I called," Kool says. "They said all they had was repair, installation,
|
|||
|
and outside plant."
|
|||
|
|
|||
|
"Doofus stuff," explains Ikon. "All they have is dickhead jobs."
|
|||
|
|
|||
|
We ask how many people in the phone company know as much about the systems
|
|||
|
as they do.
|
|||
|
|
|||
|
"To tell you the truth," says Ikon, "I don't think there are ANY. I'll
|
|||
|
tell you why. Each person in NYNEX specializes in a single network, or just
|
|||
|
part of a network. We, on the other hand, could easily assume the position of
|
|||
|
any person in any department for any reason."
|
|||
|
|
|||
|
"What would happen if they did hire you, and they said, `Okay, you're in
|
|||
|
charge of stopping Hackers'?"
|
|||
|
|
|||
|
"There's a problem with that," Ikon explains. "There was this Legion of
|
|||
|
Doom member from Michigan who was busted last year for something minor. They
|
|||
|
gave him a job in some bogus department within Michigan Bell security. They'd
|
|||
|
get him to try to engineer departments, or try to guess passwords and get into
|
|||
|
systems. And then they canceled the project."
|
|||
|
|
|||
|
"Would you do a project like that if they asked you?"
|
|||
|
|
|||
|
"Yeah!" replies Kool. "That would be my perfect position."
|
|||
|
|
|||
|
"And you could make NYNEX secure?"
|
|||
|
|
|||
|
"Sure," says Ikon. "I could do it in a minute. We know every single
|
|||
|
aspect of how to get into these systems. I could tell them in a minute how
|
|||
|
to -" He stops himself. "But the thing is, it wouldn't be worth it. They
|
|||
|
would hire us, they'd get a few secrets and tips from us, and then they'd fire
|
|||
|
us. That's what they did to the guy in Michigan. They found out exactly what
|
|||
|
he could do, and then they fired him."
|
|||
|
|
|||
|
"If we were offered a real opportunity to help," Ikon continues, "then we
|
|||
|
would help. But they'll never do that. They would never admit that they could
|
|||
|
be helped by people half their age. They just have too much pride."
|
|||
|
|
|||
|
"When I called up NYNEX to ask for a job," says Kool, "I talked to this
|
|||
|
guy in Corporate Security. This guy didn't know shit about his network. I
|
|||
|
told him all these secrets, ways to break in; all they did was block all those
|
|||
|
entry points. I have yet to hear from anybody offering me a job."
|
|||
|
|
|||
|
"And later the same day, at home, we got back into the network through
|
|||
|
another entrance," says Ikon. "There's always another way."
|
|||
|
"So fuck them," concludes Kool.
|
|||
|
|
|||
|
|
|||
|
Over the last ten years, this country's relationship with technology has
|
|||
|
changed profoundly, in ways that we are only beginning to understand. Ten
|
|||
|
years ago, when we wanted to send a letter across town, we'd need a stamp and
|
|||
|
a few days to spare. Now we fax it in seconds. When we wanted money, we'd
|
|||
|
have to go cash a check with a real live bank teller. Now we don't even know
|
|||
|
when our banks are open. Personal computers, long-distance calling cards - we
|
|||
|
who have them can't imagine life without them.
|
|||
|
|
|||
|
During the same period, the many systems that we depend on - phone
|
|||
|
networks, banking transfers, even our national-security apparatus - have become
|
|||
|
increasingly dependent on computers. We trust these machines, sometimes
|
|||
|
unwittingly, with enormous amounts of personal information. This rarely
|
|||
|
concerns us; we have developed an almost religious faith in computers and in
|
|||
|
the people who run them. When we think of these systems at all, we trust that
|
|||
|
they are safe.
|
|||
|
|
|||
|
We are wrong.
|
|||
|
|
|||
|
Every one of these technological advances has made us less secure. Now
|
|||
|
our phones can be disabled; our credit histories can be changed; our medical
|
|||
|
profiles can be stolen; our social security information can be accessed. And
|
|||
|
it can all be done by an untraceable teenager at a pay phone, thousands of
|
|||
|
miles away.
|
|||
|
|
|||
|
There are no alarms being sounded by the people who run these systems.
|
|||
|
NYNEX, in fact, refused to allow any of its security personnel to be
|
|||
|
interviewed for this article. If computer-security professionals were to admit
|
|||
|
that the systems they manage are vulnerable, they would be asked how they could
|
|||
|
be made invulnerable. And at that point, they would have to admit that the
|
|||
|
systems cannot be, can never be.
|
|||
|
|
|||
|
Much of the public debate over computer hackers involves a search for the
|
|||
|
right metaphor. Are hackers simple trespassers, gliding through our houses
|
|||
|
without harming the contents? Are they armed robbers, breaking and entering?
|
|||
|
Are our computer systems like our homes, locked and protected? Or are they
|
|||
|
just a huge open field with a tiny sign saying KEEP OFF THE GRASS?
|
|||
|
|
|||
|
From a distance, a computer network looks like a fortress - impregnable,
|
|||
|
heavily guarded. As you get closer, though, the walls of the fortress look a
|
|||
|
little flimsy. You notice that the fortress has a thousand doors; that some
|
|||
|
are unguarded, the rest watched by unwary civilians.
|
|||
|
|
|||
|
All the hacker has to do to get in is find an unguarded door, or borrow a
|
|||
|
key, or punch a hole in the wall. The question of whether he's allowed is made
|
|||
|
moot by the fact that it's unbelievable simple to enter.
|
|||
|
|
|||
|
Breaking into computer systems will always remain easy because the systems
|
|||
|
have to accommodate dolts like you and me. If computers were used only by
|
|||
|
brilliant programmers, no doubt they could maintain a nearly impenetrable
|
|||
|
security system. But computers aren't built that way; they are "dumbed down"
|
|||
|
to allow those who must use them to do their jobs. So hackers will always be
|
|||
|
able to find a trusting soul to reveal a dialup, an account, and a password.
|
|||
|
And they will always get in.
|
|||
|
|
|||
|
It is gradually dawning on us, thanks mostly to the exploits of hackers,
|
|||
|
that we have much less control over the computers that run our information
|
|||
|
society than we did over, say, file cabinets. Our general reaction has been to
|
|||
|
blame the messengers. In fact, to try to imprison them. Although they have
|
|||
|
never harmed the systems they hack. Kool and Ikon will probably be indicted
|
|||
|
early next year for a variety of acts made illegal by the Computer Fraud and
|
|||
|
Abuse Act of 1986; the charges they face carry maximum sentences of many
|
|||
|
decades in prison. But even if hackers are jailed, hacking won't be
|
|||
|
eliminated; it's just too human an instinct, and just too easy a practice.
|
|||
|
|
|||
|
|
|||
|
Toward the end of the summer, we decide to attempt the kind of hack the
|
|||
|
government says is the main threat: We will try to hack the White House -
|
|||
|
specifically, the PROF system installed in 1982 by Admiral John Poindexter,
|
|||
|
then President Reagan's national security adviser. Poindexter chose PROF in an
|
|||
|
attempt to ELIMINATE security breaches. If any system is unhackable, we
|
|||
|
reason, this is the one.
|
|||
|
|
|||
|
By the time we finally get together, however, a week after we first
|
|||
|
discuss PROF with the hackers, we learn that one of them has already called the
|
|||
|
White House computer center. He laid on the usual line about doing work on the
|
|||
|
system, and he got a dialup. The more difficult task, still ahead, is
|
|||
|
obtaining an account and a password.
|
|||
|
|
|||
|
We are sitting, as always, around a phone, safe in what one hacker
|
|||
|
describes as "a covert, undisclosed location somewhere in the tri-state area."
|
|||
|
He thumbs through a Federal Yellow Book, the publicly available directory for
|
|||
|
the executive branch of the U.S. government. "Why don't I call one of these
|
|||
|
people?" he suggests, pointing to the page headed, EXECUTIVE OFFICE OF THE
|
|||
|
PRESIDENT. He scans down the page - the staffs of Fitzwater, Sununu,
|
|||
|
Scowcroft - and decides randomly on a target a few doors down from the
|
|||
|
President.
|
|||
|
|
|||
|
"I'll just talk to him really basic," he explains, dialing the target's
|
|||
|
direct number. "I need a name to use." As the phone rings in the White House,
|
|||
|
he glances around the room and his eyes settle on a T-shirt, signed just above
|
|||
|
the pocket by the French designer Fran<61>ois Girbaud.
|
|||
|
|
|||
|
The White House answers. The hacker's voice drops an octave.
|
|||
|
|
|||
|
Hacker: Yeah, how're you doin'? This is Fran<61>ois Girbaud with the
|
|||
|
computer operations division.
|
|||
|
|
|||
|
White House: Mmm-hmm.
|
|||
|
|
|||
|
H: Yeah, I was just wondering if you had any access to the PROF system.
|
|||
|
|
|||
|
WH: Yeah, I do. I don't use it very often, though.
|
|||
|
|
|||
|
H: Yeah, I know. Cause we're, like, troubleshooting your account.
|
|||
|
|
|||
|
WH: Oh.
|
|||
|
|
|||
|
H: It seems that something's wrong with it. And, you know, we're
|
|||
|
wondering if maybe it's, like, one of the dialups that you're using to get
|
|||
|
in or something.
|
|||
|
|
|||
|
WH: Well, let me see. Hold on, I'm just getting out of what I was doing.
|
|||
|
|
|||
|
H: You know, if you're too busy I could call back later.
|
|||
|
|
|||
|
WH: No, that's okay, this is fine. Hold on one minute, I'm just saving
|
|||
|
what I was working on. Okay. [He logs into PROF too fast for the hacker
|
|||
|
to get his account.]
|
|||
|
|
|||
|
H: Wait, wait. Why don't you go back a little? We have to verify the
|
|||
|
account as you're typing it in.
|
|||
|
|
|||
|
WH: Oh, I'm sorry.
|
|||
|
|
|||
|
H: Yeah, we want to make sure that it's your account and not somebody
|
|||
|
else's.
|
|||
|
|
|||
|
WH: How do I get out of this?
|
|||
|
|
|||
|
H: Ah, don't worry about it. Just repeat your account. Just tell me the
|
|||
|
account you're using currently.
|
|||
|
|
|||
|
WH: Oh, I'm sorry. [And he reads off seven characters.]
|
|||
|
|
|||
|
H: [trying to decide his next move] Umm, okay...[but his next move is
|
|||
|
made for him]
|
|||
|
|
|||
|
WH: And do you need my password too?
|
|||
|
|
|||
|
H: Um, yeah, sure. That would be good.
|
|||
|
|
|||
|
|
|||
|
With an account and a password secured, the hacker politely concludes the
|
|||
|
conversation, hangs up the telephone, and bursts into laughter: "Yo, man,
|
|||
|
FRANCOIS GIRBAUD! I just read the name off his shirt! It's like saying
|
|||
|
`Levi's!' I shoulda said `Calvin Klein.'" Another hacker joins in: "Or Dick
|
|||
|
Hertz!" And another: "Or Mike Hunt!" For the rest of the evening, Fran<61>ois
|
|||
|
Girbaud is the punch line to every joke. No other hack could top this one, so
|
|||
|
we head out to McDonald's for burgers and Cokes - just a bunch of teenagers,
|
|||
|
hanging on a Friday night. Maybe tomorrow we will read George Bush's mail.
|
|||
|
|