750 lines
34 KiB
Plaintext
750 lines
34 KiB
Plaintext
|
||
Computer underground Digest Sat, Oct 19, 1991 Volume 3 : Issue 37
|
||
|
||
Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
|
||
|
||
**** SPECIAL ISSUE: "GERALDO AND THE MAD HACKERS'S KEY PARTY" ****
|
||
|
||
CONTENTS, #3.37 ( October 19, 1991)
|
||
File 1: Summary of Geraldo's _Now it can be Told_
|
||
File 2: Excerpts from "Mad Hacker's Key Party"
|
||
File 3: Review_of_Now_It_Can_Be_Told_
|
||
File 4: Geraldo Rivera show on "Hacking"
|
||
File 5: The_RISKS_of_Geraldo
|
||
File 6: 2600 Magazine Exposes Security Holes (NEWSBYTE reprint)
|
||
|
||
Issues of CuD can be found in the Usenet alt.society.cu-digest news
|
||
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
|
||
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
|
||
789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.20),
|
||
chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of
|
||
Chicago email server, send mail with the subject "help" (without the
|
||
quotes) to archive-server@chsun1.spc.uchicago.edu.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source
|
||
is cited. Some authors do copyright their material, and they should
|
||
be contacted for reprint permission. It is assumed that non-personal
|
||
mail to the moderators may be reprinted unless otherwise specified.
|
||
Readers are encouraged to submit reasoned articles relating to the
|
||
Computer Underground. Articles are preferred to short responses.
|
||
Please avoid quoting previous posts unless absolutely necessary.
|
||
|
||
DISCLAIMER: The views represented herein do not necessarily represent
|
||
the views of the moderators. Digest contributors assume all
|
||
responsibility for ensuring that articles submitted do not
|
||
violate copyright protections.
|
||
|
||
----------------------------------------------------------------------
|
||
|
||
Date: 12 Oct 91 11:21:19 CDT
|
||
From: Moderators <tk0jut2@mvs.cso.niu.edu>
|
||
Subject: File 1-- Summary of Geraldo's _Now it can be Told_
|
||
|
||
On Sept 30, Geraldo Rivera's show focused on "hackers." Not
|
||
surprisingly, the commentary was closer to sensationalistic fiction
|
||
than fact. Those who saw the original airing described Rivera's
|
||
framing of the issue as reprehensible, and his comments about Craig
|
||
Neidorf were described as potentially slanderous. Even by Geraldo
|
||
standards, Craig could not have expected the grotesque insults to
|
||
which he was subjected and the bullying and inaccuracies that he
|
||
endured, according to observers, with reserved dignity.
|
||
|
||
We are indebted to an anonymous reader who provided us with excerpts
|
||
from the transcripts. They reveal a consistent pattern of
|
||
sensationalism--not surprising--but they also reflect that Rivera had
|
||
little interest in accuracy and instead resorted to fabrication
|
||
bordering on lies to depict Craig as a "Mad Hacker." His task was made
|
||
considerably easier by Alameda County (California) prosecutor Don
|
||
Ingraham, who contributed to the misconceptions of Craig and played
|
||
into the sensationalistic "mad hacker" motif that was the format of
|
||
the show.
|
||
|
||
Those who viewed the program report, and the transcripts confirm, that
|
||
the initial portion focused on the potential dangers of hacking to
|
||
national security, and skillfully juxtaposed film images of terrorism
|
||
and military violence with discussions and images of hackers.
|
||
|
||
Rivera continually referred to Craig as the "Mad Hacker," described
|
||
him as Ingraham's "arch-rival," and used the term "notorious hacker"
|
||
to remind the audience that his guest was not some run of the mill
|
||
evil-doer, but "mad," "notorious," and America's "most wanted" hacker.
|
||
Ingraham implied that Craig was responsible for breaking into and
|
||
endangering the nation's E911 system, but backed off slightly while
|
||
leaving the connection between E911 and national security intact.
|
||
Ingraham's analogy of rape and hacking was in poor taste, and he
|
||
seemed to join Rivera in competing for outlandish sound-byte of the
|
||
day.
|
||
|
||
The media has played a major role in contributing to hacker hysteria
|
||
by grossly exaggerating the exploits of suspects and defendants.
|
||
Rivera has taken hyperbole to a new level by imputing dangers where
|
||
none exist, by fabricating facts, and by leaving the audience with the
|
||
impression that--in this case--Craig had actually broken into the E911
|
||
system. In a time which Constitutionally protected liberties are
|
||
threatened, when demogogues enact anti-crime legislation that expands
|
||
definitions of punishable behavior and increases penalties for
|
||
offenses, and when the public--still largely technophobic--does not
|
||
understand hacking, Geraldo's portrayal is recklessly dangerous and
|
||
unconscionably irresponsible. It is one thing to engage in
|
||
self-serving sleaze for ratings. It is quite another to distort truth
|
||
in ways that create false impressions and tarnish reputations by
|
||
name-calling. We suggest that Geraldo Rivera has far more in common,
|
||
both in his actions and in his consequences, with terrorists than do
|
||
hackers. Rivera, like terrorists, seems to have no hesitation in doing
|
||
violence if it serves his own narrow interests. On balance, society
|
||
can survive a "hacker menace" far more easily than it can survive
|
||
callous disregard of truth.
|
||
|
||
------------------------------
|
||
|
||
Date: Thu, 17 Oct 91 7:41:43 CDT
|
||
From: anonymous@viewer
|
||
Subject: File 2-- Excerpts from "Mad Hacker's Key Party"
|
||
|
||
Excerpts from: _Now_It_Can_Be_Told_: "Mad Hackers' Key Party"
|
||
Hosted by Geraldo Rivera (Sept. 30, 1991)
|
||
|
||
Geraldo: I'm Geraldo rivera. And now, It can be told.
|
||
|
||
<First part of the program includes comments and interviews with
|
||
Emmanuel Goldstein, Krista Bradford, Cliff Stoll, Phiber Optik, Winn
|
||
Schwartau, and other bit players. Focus of discussion is on hacking as
|
||
"terrorism" and generous film and news clips of terrorism and war
|
||
scenes interwoven amongst discussion of dangers of hackers to national
|
||
security. We pick up the dialogue when Don Ingraham (Alameda County
|
||
(Calif.) prosecutor and Craig Neidorf (former editor of PHRACK) join in>
|
||
|
||
Geraldo: Joining us now via satellite from Oakland, CA is the
|
||
Assistant District Attorney Don Ingraham ... for Alameda County and he
|
||
has been prosecuting computer hackers for years.
|
||
|
||
<Don is in the TV box, between Geraldo and Craig [KL]>
|
||
|
||
Geraldo: Don, how do you respond to the feeling common among so many
|
||
hackers that what they're doing is a public service; they're exposing
|
||
the flaws in our security systems?
|
||
|
||
Don: Right, and just like the people who rape a coed on campus are
|
||
exposing the flaws in our nation's higher education security. It's
|
||
absolute nonsense. They are doing nothing more than showing off to
|
||
each other, and satisfying their own appetite to know something that
|
||
is not theirs to know.
|
||
|
||
Geraldo: Don, you stand by, Craig as well. And when we come back
|
||
we'll hear more from prosecutor Ingraham and from, I guess his
|
||
archrival here, the Mad Hacker Craig Neidorf.
|
||
|
||
<Commercial>
|
||
|
||
Geraldo: We're back with Craig Neidorf, a former University of
|
||
Missouri student who ran a widely distributed electronic newsletter
|
||
for computer hackers. He is so proud of being America's
|
||
Most Wanted computer hacker that he has put together this very
|
||
impressive scrapbook.
|
||
|
||
<Geraldo holds up a colorful scrapbook..On the left page shows a
|
||
lightning bolt hitting what looks to be a crown [Knight Lightning]
|
||
...And on the right it looks like a graphic saying "Knight Lightning"
|
||
and below that is a black circle with a white lightning bolt, and
|
||
next to that is a triangle that looks very similar to the triangle
|
||
with an eye that appeared on the cover of _GURPS_Cyberpunk_ [which
|
||
said in it, the book that was seized by the Secret Service! see page
|
||
4...- but the one on KL is illegible]>
|
||
|
||
Geraldo: Knight Lightning I guess that was your code?
|
||
|
||
KL: It was my editor handle.
|
||
|
||
Geraldo: That's your handle. OK. And from Oakland, CA we are
|
||
talking with the Assistant District Attorney Don Ingraham, who is hard
|
||
driven, you might say, to put people like Craig behind bars. Don, do
|
||
you think Craig's lucky that he's not behind bars right now?
|
||
|
||
Don: Yes, I think he's extraordinarily lucky. He was part of a
|
||
conspiracy, in my opinion, to take property that wasn't his and share
|
||
it with others. They charged him with interstate transport of stolen
|
||
property - couldn't make the threshold -and it came out that it had
|
||
been compromised by, unfortunately, released by another Bellcore
|
||
subsidiary. But was certainly not through any doing of HIS that he is
|
||
a free man.
|
||
|
||
Geraldo: So you think that his activities stink, then.
|
||
|
||
Don: Absolutely. No Question about it.
|
||
|
||
Geraldo: Craig, you wanna respond? Are you doing something for the
|
||
greater good of society?
|
||
|
||
KL: Well I was merely publishing a newsletter. I didn't go out and
|
||
find this document. Rather it was sent to me. In many ways it could
|
||
be compared to Daniel Ellsberg sending the Pentagon Papers to the New
|
||
York Times.
|
||
|
||
Geraldo: Do you figure it that way Don? Is he like Daniel Ellsberg?
|
||
|
||
Don: No, Ellsberg went to court to deal with it. Daniel Ellsberg's
|
||
release of the Pentagon Papers is the subject of a published court
|
||
decision to point out it was a matter of national security and
|
||
national interest. The E911 codes, which is the citizen's link to the
|
||
police department are not a matter of national security. They're a
|
||
matter of the central service to the community.......
|
||
|
||
Geraldo: You broke into the 911 system? He broke into the 911
|
||
system!
|
||
|
||
KL: No, that's not correct. I never entered any 911 telephone
|
||
system.
|
||
|
||
Don: I didn't say he entered into it. What I said was that he and
|
||
Riggs conspired together to take a code that they knew was necessary
|
||
to 911 and to take it apart to see how it worked. They never had the
|
||
owner's permission, they never asked for it.
|
||
|
||
Geraldo: Alright, lemme ask you this....
|
||
|
||
KL: The court found that there was no conspiracy here.
|
||
|
||
Geraldo: You were acquitted. You were vindicated at least from
|
||
criminal responsibility. Lemme just quickly ask you this: hackers
|
||
have been inside the White House computer.
|
||
|
||
KL: Yes they have.
|
||
|
||
Geraldo: And they've been inside the Pentagon computer.
|
||
|
||
KL: Yes.
|
||
|
||
Geraldo: And if Saddam Hussein hired some hackers whether they're
|
||
from Holland or any other place, he could've gotten into these
|
||
computers, presumably.
|
||
|
||
KL: Presumably, he could've.
|
||
|
||
Geraldo: And gotten some valuable information.
|
||
|
||
KL: It's definitely possible.
|
||
|
||
Geraldo: And you still think hackers are performing a public service?
|
||
|
||
KL: That's not what I said. I think that those kind of activities
|
||
are wrong. But by the same token, the teenagers, or some of the
|
||
people here that are not performing malicious acts, while they should
|
||
be punished should not be published as extreme as the law currently
|
||
provides.
|
||
|
||
Geraldo: You're response to that Don?
|
||
|
||
Don: I don't think they're being punished very much at all. We're
|
||
having trouble even taking away their gear. I don't know one of them
|
||
has done hard time in a prison. The book, Hafner's book on
|
||
_Cyberpunk_, points out that even Mitnick who is a real electronic
|
||
Hannibal Lecter ... did not get near any of the punishment that what
|
||
he was doing entitled him to.
|
||
|
||
Geraldo: <laughing> An electronic Hannibal Lecter. OK, stand by,
|
||
we'll be back with more of this debate in a moment...
|
||
|
||
<commercials>
|
||
|
||
Geraldo: Back with Craig Neidorf and prosecutor Don Ingraham. Craig,
|
||
do you think hackers are voyeurs or are they potentially terrorists?
|
||
|
||
KL: I think they resemble voyeurs more than terrorists. They are
|
||
often times looking at places where they don't belong, but most
|
||
hackers do not intend to cause any damage.
|
||
|
||
Geraldo: Do you buy that Don?
|
||
|
||
Don: If they stopped at voyeurism they would be basically
|
||
sociopathic, but not doing near the harm they do now. But they don't
|
||
stop at looking, that's the point. They take things out and share
|
||
them with others, and they are not being accountable and being
|
||
responsible as to whom they are sharing this information. That is the
|
||
risk.
|
||
|
||
Geraldo: Can they find out my credit rating? I know that's not a
|
||
national security issue, but I'm concerned about it.
|
||
|
||
Don: Piece of cake.
|
||
|
||
Geraldo: No problem.
|
||
|
||
Don: Assuming....
|
||
|
||
Geraldo: Go ahead. Assuming I have a credit rating...hahahah....
|
||
|
||
Don: Assume that the credit is not carried by someone who is using
|
||
adequate security.
|
||
|
||
Geraldo: But you think Craig it's not problem.
|
||
|
||
KL: I think it's no problem.
|
||
|
||
Geraldo: Give me quickly the worst case scenario. Say Abu Nidal had
|
||
you working for him.
|
||
|
||
KL: I'm sorry?
|
||
|
||
Geraldo: Abu Nidal, notorious .....
|
||
|
||
KL: As far as your credit rating?
|
||
|
||
Geraldo: No, not as far as my credit rating.. The world, national
|
||
security.
|
||
|
||
KL: Well, hackers have gotten into computer systems owned by the
|
||
government before. At this point they've never acknowledged that it
|
||
was anything that was ever classified. But even some unclassified
|
||
information could be used to the detriment of our country.
|
||
|
||
Geraldo: Like the counter-terrorist strategy on January 15th, the day
|
||
of the deadline expired in the Persian Gulf.
|
||
|
||
KL: Perhaps if Saddam Hussein had somehow known for sure that we were
|
||
going to launch an attack, it might have benefited him in some way,
|
||
but I'm really not sure.
|
||
|
||
Geraldo: Don, worst case scenario, 30 seconds?
|
||
|
||
Don: They wipe out our communications system. Rather easily done.
|
||
Nobody talks to anyone else, nothing moves, patients don't get their
|
||
medicine. We're on our knees.
|
||
|
||
Geraldo: What do you think of Craig, quickly, and people like him?
|
||
|
||
Don: What do I think of Craig? I have a lot of respect for Craig, I
|
||
think he's probably going to be an outstanding lawyer someday. But he
|
||
is contributing to a disease, and a lack of understanding ethically,
|
||
that is causing a lot of trouble.
|
||
|
||
Geraldo: One word answer. As the computer proliferate won't hackers
|
||
also proliferate? Won't there be more and more people like you to
|
||
deal with?
|
||
|
||
Knight Lightning: I think we're seeing a new breed of hacker. And
|
||
some of them will be malicious.
|
||
|
||
Geraldo: Some of them will be malicious. Yes, well, that's it...for
|
||
now. I'm Geraldo Rivera.
|
||
|
||
[End of Program]
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 16 Oct 91 18:42:51 MDT
|
||
From: ahawks@ISIS.CS.DU.EDU.CS.DU.EDU(Andy Hawks)
|
||
Subject: File 3-- Review_of_Now_It_Can_Be_Told_
|
||
|
||
If you look past the obvious sensationalism (hey, what do you expect
|
||
from Geraldo?) the ''Now It can Be Told'' program on hackers was
|
||
actually quite good, and quite informative.
|
||
|
||
However, as expected, the program served to enhance the stereotypes
|
||
that hackers are always destroyers of information. Words such as
|
||
terrorist, thief, mad hacker, notorious, sociopath, et al were often
|
||
substituted for ''hacker''.
|
||
|
||
From a hacker's point of view, the show was great. First we see
|
||
''home video'' of Dutch hackers hacking into US Department of Defense
|
||
(military) computers. Emmanuel Goldstein (editor of 2600) is present
|
||
among them, and describes in-depth what they are doing, and how they
|
||
are getting into these computers.
|
||
|
||
The Dutch hackers success rate was astounding! Goldstein says that
|
||
they "literally picked a computer at random among a list and used
|
||
various means to get in". First, they fail with a login of guest.
|
||
Then, they succeeded in gaining superuser privileges with the sync
|
||
login and proceeded to create a new account under the name Dan Quayle,
|
||
and gave him superuser privileges.
|
||
|
||
I thought Emmanuel Goldstein was an excellent defender of the hacker's
|
||
position, successfully refuting Cliff Stoll's comment that compared
|
||
hackers to thieves breaking into someone's house
|
||
(yaaaaaawwwwwwwnnnnnnnnn.......) by stating hackers are not interested
|
||
in personnel files - they're interested in huge databases and computer
|
||
systems. Hopefully, (however doubtful) Emmanuel Goldstein has forever
|
||
put the "breaking into a house" argument to rest.
|
||
|
||
Next we see a scene that is truly cyberpunk: Japanese Kanji
|
||
characters in neon colors spread over the screen as we hear a voice
|
||
say "My handle is Phiber Optik. I'm a computer hacker from the East
|
||
Coast.", standing on a dimly lit street in the middle of the night.
|
||
The Phiber Optik portion of the program is interesting, and shows (for
|
||
the first time?) hacking from a pay-phone with a laptop. (Note: if
|
||
you freeze-frame at the right moment, you can see Emmanuel Goldstein
|
||
and a g-man type in sunglasses [??] during this segment.)
|
||
|
||
Phiber Optik: "The Hacker's goal is to become one with the machine"
|
||
|
||
The next segment features an anonymous hacker (most likely Phiber) who
|
||
says "we'd just be coexisting with the other users of the machine" and
|
||
states once again that hackers are not interested in personal files.
|
||
We also learn that this hackers has most likely entered the White
|
||
House systems.
|
||
|
||
What follows the hacker profiles is a segment on computer-terrorism,
|
||
which focuses on viruses, interception, ''computer guns'', and
|
||
eavesdropping.
|
||
|
||
Emmanuel Goldstein: "The computer is a tool. And any tool can be
|
||
used as a weapon."
|
||
|
||
A. Hacker: "I wouldn't so much call it a weapon as an extension of
|
||
one's own mind;"
|
||
|
||
This segment somewhat vaguely attempts to separate hackers from
|
||
terrorists, but since the distinction is not made clear, it is obvious
|
||
that the makers of the show think that some hackers would qualify
|
||
under this category. Krista Bradford hints that these activities are
|
||
done by our own government, as well.
|
||
|
||
A neat demonstration is given by Winn Schwartau, an information
|
||
security expert, who demonstrates TEMPEST technology (picking up the
|
||
radio waves from a monitor, and being able to display what's being
|
||
typed up to 1.5 miles away). In this fake scenario, credit
|
||
information is being intercepted. It is most unlikely that hackers
|
||
would use this type of interception, since it requires a lot of
|
||
expensive equipment. (In case your interested, the frequency the
|
||
signal was picked up on is 19.9217)
|
||
|
||
Intermixed in this segment are clips from Die Hard II (remember, the
|
||
terrorists take over the airport computers).
|
||
|
||
The third segment involves a 'debate' between Craig Neidorf (Knight
|
||
Lightning of Phrack fame) and Don Ingraham, an assistant District
|
||
Attorney in California. Geraldo informs us that Craig Neidorf is a
|
||
''mad hacker'' who is proud of his hacking achievements.
|
||
|
||
Geraldo holds up an interesting portfolio that CRaig Neidorf has
|
||
created, which hackers might find interesting, if you can get your
|
||
hands on it.
|
||
|
||
Geraldo engages in his usual sensationalism. He wrongly assumes that
|
||
Craig Neidorf 'broke into' the 911 system. He wants to confirm that
|
||
hackers have broken into the White House and Pentagon, and tries to
|
||
put terror into the hearts of the masses. One of the great shames of
|
||
this program is that the host is nothing more than a sensationalist
|
||
seeking to get ratings, and doesn't care one bit about the truth,
|
||
which only serves to further the stereotypes all hackers have been
|
||
stuck with.
|
||
|
||
Don Ingraham is there, basically representing the Operation Sundevil
|
||
opinion. He thinks that hackers have not been punished enough, and
|
||
that their crimes are very serious. It is obvious that Mr. Ingraham
|
||
has never even considered for a moment the idea that hackers are only
|
||
interested in knowledge and most of them would not knowingly harm
|
||
systems or files. He ought to take a look at the other side before
|
||
forming his ignorant opinions.
|
||
|
||
In my opinion, Craig Neidorf does not represent the common hacker as
|
||
well as he is capable of in this program. But, obviously he was
|
||
constrained by the format of the show and the ignorance he was forced
|
||
to deal with on behalf of the host and Mr. Ingraham. He is not given
|
||
opportunity to explain that not all hackers are malicious, and the
|
||
subject of hackers informing system administrators of security flaws
|
||
in their systems is not even brought up.
|
||
|
||
In summary, the Now It Can Be Told program contained sensationalist
|
||
aspects that was to be expected. However, from a hacker's point of
|
||
view it was interesting to see the exploits of other hackers. Most
|
||
interesting was the cyberpunk atmosphere of Phiber Optik hacking, as
|
||
well as the home video of the Dutch hackers and their exploits. It
|
||
was encouraging to hear Emmanuel Goldstein's opinions on hackers and
|
||
he did well to represent them; he did not make them out to be saints,
|
||
yet he defended them from the stereotype of being destructive. Cliff
|
||
Stoll got one or two sentences in, which is all he deserved, IMHO. He
|
||
only spews out the rhetoric we've all heard time and time again. The
|
||
segment on computer terrorism was interesting, but not of much use to
|
||
hackers; the demonstration on eavesdroppping was especially worth
|
||
watching. The final segment, the 'debate' between Craig Neidorf and
|
||
Don Ingraham was not as interesting as it could've (SHOULD'VE) been.
|
||
Geraldo succeeded in disallowing Craig Neidorf to make the points it
|
||
appeared he wished to make, and Mr. Ingraham succeeded in perpetuating
|
||
stereotypes of hackers.
|
||
|
||
Craig Neidorf ended the show by saying "We're seeing a new breed of
|
||
hacker." And if you look past the obvious sensationalism of Now It Can
|
||
Be Told, that new breed of hacker was well profiled.
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 18 Oct 91 2:33:25 CDT
|
||
From: bei@DOGFACE.AUSTIN.TX.US(Bob Izenberg)
|
||
Subject: File 4-- Geraldo Rivera show on "Hacking"
|
||
|
||
<The Geraldo show on hacking was> a piece of tripe! Sorry, this just
|
||
isn't journalism. It's barely in the back-fence gossip class. Here's
|
||
my favorite part:
|
||
|
||
> KL: Well I was merely publishing a newsletter. I didn't go out and
|
||
> find this document. Rather it was sent to me. In many ways it could
|
||
> be compared to Daniel Ellsberg sending the Pentagon Papers to the New
|
||
> York Times.
|
||
>
|
||
> Geraldo: Do you figure it that way Don? Is he like Daniel Ellsberg?
|
||
>
|
||
> Don: No, Ellsberg went to court to deal with it. Daniel Ellsberg's
|
||
> release of the Pentagon Papers is the subject of a published court
|
||
> decision to point out it was a matter of national security and
|
||
> national interest. The E911 codes, which is the citizen's link to the
|
||
> police department are not a matter of national security. They're a
|
||
> matter of the central service to the community.......
|
||
|
||
Right, not a matter of national security. It's not the size of the
|
||
sacred cow that you gore, it's how loud it bellows that gets
|
||
attention.
|
||
|
||
> Don: I don't think they're being punished very much at all. We're
|
||
> having trouble even taking away their gear.
|
||
|
||
Yeah, that due process sure gets in the way.
|
||
|
||
> I don't know one of them
|
||
> has done hard time in a prison.
|
||
|
||
Maybe he doesn't know John Draper, who in addition to his tone stuff
|
||
played with Apple ][s quite a bit... He and others did some very
|
||
interesting things with the DTMF capabilities of the early MicroModem
|
||
][s...
|
||
|
||
> The book, Hafner's book on
|
||
> _Cyberpunk_, points out that even Mitnick who is a real electronic
|
||
> Hannibal Lecter ... did not get near any of the punishment that what
|
||
> he was doing entitled him to.
|
||
|
||
Judge, jury and executioner... Somebody might want to tell this
|
||
gentleman that he's in the 20th century, and is not a judge.
|
||
|
||
> Don: If they stopped at voyeurism they would be basically
|
||
> sociopathic, but not doing near the harm they do now. But they don't
|
||
> stop at looking, that's the point. They take things out and share
|
||
> them with others, and they are not being accountable and being
|
||
> responsible as to whom they are sharing this information. That is the
|
||
> risk.
|
||
|
||
If, if, if. It's the potential crime that he's interested in. Off
|
||
with their heads! Sentence first, trial later, and the crime done
|
||
last if done at all.
|
||
|
||
> Geraldo: Can they find out my credit rating? I know that's not a
|
||
> national security issue, but I'm concerned about it.
|
||
|
||
> Don: They wipe out our communications system. Rather easily done.
|
||
> Nobody talks to anyone else, nothing moves, patients don't get their
|
||
> medicine. We're on our knees.
|
||
|
||
Worst case scenario: They disable all billing mechanisms, letting
|
||
everyone make free calls (if only for a day) and the phone company
|
||
forgets all about being a public utility, closes its doors and gets
|
||
nationalized ten minutes later. Bob Allen goes up the river, along
|
||
with his MCI and Sprint counterparts, or moves on to a real job
|
||
destroying the environment for Union Carbide or somebody... PUCs all
|
||
over the country have 75% work force cuts, with their biggest
|
||
time-waster (and source of perqs) gone. But, worst case for whom?
|
||
|
||
Cheech and Chong had this boy pegged. What a job they could do on
|
||
"Gerondo Revolver" now... ;-)
|
||
|
||
------------------------------
|
||
|
||
Date: Wed, 16 Oct 91 18:41:23 MDT
|
||
From: ahawks@ISIS.CS.DU.EDU.CS.DU.EDU(Andy Hawks)
|
||
Subject: File 5-- The_RISKS_of_Geraldo
|
||
|
||
I'm sure many of you saw or have heard/read about Geraldo Rivera's Now
|
||
It Can Be Told Program which featured a show on hackers a couple of
|
||
weeks or so ago.
|
||
|
||
Well, by airing this program, it appears that Geraldo (or actually the
|
||
producers/editors of the show) have put at least one military computer
|
||
at risk.
|
||
|
||
One segment of the program featured a "home video" of Dutch teenagers
|
||
hacking. This home video would occasionally focus in on the computer
|
||
screen as the hackers hacked. As reporter Krista Bradford describes
|
||
what is going on, the screen shows:
|
||
|
||
>
|
||
| quit
|
||
| 221 Goodbye.
|
||
| rugrcx>
|
||
| telnet tracer.army.mil
|
||
| Trying 192.33.5.135....
|
||
| Connected to tracer.army.mil
|
||
| Escape character is '^]'.
|
||
|
|
||
|
|
||
|
|
||
| Xenix K3-4 (tracer.army.mil)
|
||
|
|
||
|
|
||
|
|
||
| login:
|
||
| dquayle
|
||
| Password:_
|
||
>
|
||
|
||
Then we learn that previously, the hackers have gained superuser
|
||
privileges to the system. As Krista Bradford is describing the
|
||
superuser access, we see the computer screen again and the hackers are
|
||
attempting to login to the same site with the 'sync' login (so, this
|
||
is apparently how they gained superuser access).
|
||
|
||
Later in the show (about 1 minute or so after the hackers have gained
|
||
superuser privileges) Emmanuel Goldstein (2600) states that the
|
||
hackers proceeded to create a new account. The account they create is
|
||
'dquayle' (Dan Quayle) and has superuser privileges. Then, the
|
||
screen focuses in on the new record in /etc/passwd for 'dquayle', and
|
||
Mr. Goldstein tells us that the new account has no password (the
|
||
screen focuses in on: "dquayle::")
|
||
|
||
Thus, anyone who has telnet access could've repeated this same
|
||
process, logging in to this tracer.army.mil site with the username
|
||
'dquayle' (and no password) and would have gained superuser access.
|
||
|
||
It is obvious that in this situation, whoever allowed the show to be
|
||
aired in its final form had no knowledge of the Internet, otherwise
|
||
this definite "how to hack" security breach would have been omitted.
|
||
|
||
Thanks Geraldo, for showing all of us how to hack into military
|
||
computers.
|
||
|
||
(Note: I avoided sending this in for submission earlier to prevent
|
||
any other hackers from repeating the same experiment. Hopefully,
|
||
tracer.army.mil has now had enough time to plug up the obvious hole.)
|
||
|
||
------------------------------
|
||
|
||
Date: Sat, 19 Oct 91 11:12:11 CDT
|
||
From: jmcmullen@well.sf.ca.us(John McMullen)
|
||
Subject: File 6-- 2600 Magazine Exposes Security Holes (NEWSBYTE reprint)
|
||
|
||
2600 Magazine Exposes Security Holes 10/18/91
|
||
ARMONK, NEW YORK, U.S.A., 1991 OCT 18 (NB) -- Supported by videotape
|
||
examples, Emmanuel Goldstein, editor and publisher of 2600 Magazine:
|
||
The Hacker Quarterly, told those in attendance at an October 17th New
|
||
York City press conference that "the American public is often lulled
|
||
into a false sense of security; a security that is often not supported
|
||
by the facts of specific cases."
|
||
|
||
The videotapes, produced by 2600 and provided to the press show both
|
||
the intrusion of a Dutch "hacker" in to United States Military
|
||
computers and what Goldstein alleges is the fallability of a brand of
|
||
mechanical, pushbutton locks used by, among others, New York State
|
||
University sites, Federal Express, United Parcel Service, JFK
|
||
International Airport, IBM and NASA.
|
||
|
||
Goldstein told Newsbytes "We invested considerable time and money to
|
||
wake people up to the fact that we have a false sense of security when
|
||
it comes not only to computer networks but to physical safety as
|
||
well."
|
||
|
||
The tape of the Dutch "hacker" was made by Goldstein while in Europe.
|
||
and shows the intrusion into a Unites States Army computer system. The
|
||
intruder was able to set up a fictitious account called "danquayle"
|
||
and, once into the system, was able to obtain "root" privileges thus
|
||
giving him total control of the workings of the system.
|
||
|
||
A portion of this tape had previously been shown with Goldstein's
|
||
approval on an episode of the Gerald Rivera television show "Now It
|
||
Can Be Told". Goldstein told Newsbytes that one reason for his release
|
||
of the entire tape to the press was his feeling that the Rivera
|
||
episode entitled "The Mad Hacker's Key Party" had distorted the
|
||
message of the tape - "This was not a case of a terrorist break-in but
|
||
was rather simply a demonstration of the lack of security of our
|
||
systems. To find root accounts with password like "Kuwait" and lack of
|
||
sophisticated security in our military computers should be of real
|
||
concern and should not be lost in an explotation of the 'hacker'
|
||
issue."
|
||
|
||
A background paper provided at the conference by 2600 explains the
|
||
entire intrusion effort in detail and states "The purpose of this
|
||
demonstration is to show just how easy it really was. Great care was
|
||
taken to ensure that no damage or alteration of data occurred on this
|
||
particular system. No military secrets were taken and no files were
|
||
saved to a disk by the hackers. What is frightening is that nobody
|
||
knows who else has access to this information or what their
|
||
motivations might be. This is a warning that cannot be taken lightly."
|
||
|
||
The second videotape show Goldstein and other 2600 staff opening
|
||
seemingly at will locks manufactured by Simplex Security Systems. The
|
||
locks of the mechanical pushbutton combination variety were shown to
|
||
be installed at the State of New York University at Stony Brook, JFK
|
||
International Airport and on Federal Express and United Parcel pick-up
|
||
boxes throughout the New York Metropolitan area.
|
||
|
||
In the film, Goldstein is shown filling out a Federal Express envelope
|
||
for delivery to 2600 Magazine and inserting in the Fedex dropbox. He
|
||
then lifts the weather protection cover on the box's lock and keys a
|
||
combination that allows him to open the lock and remove his envelope.
|
||
Scott Skinner, a SUNY student and 2600 staff member told Newsbytes
|
||
that it had actually taken the staff 10 minutes to determine the
|
||
proper code combinations to open the lock.
|
||
|
||
Skinner explained, "While Simplex prefers people to think that there
|
||
is an endless number of permutations to the lock, there are actually
|
||
only 1,085. In most cases, even this number is greatly reduced -- if
|
||
one knows that only three buttons are being used, it reduces the
|
||
possibilities to 135. Additionally, we found that, once we had the
|
||
combination to one Federal Express dropbox, it worked in every other
|
||
one that we tried in the New York area."
|
||
|
||
Goldstein told Newsbytes "When we contacted Simplex, they first denied
|
||
that the locks were unsafe and then said that the permutations were
|
||
much greater. After some discussion, they admitted that the 1,085
|
||
figure was correct but said that it would take a person with a
|
||
complete listing of the combinations over four hours to try them all.
|
||
Our experience obviously shows that they may be opened in a much
|
||
shorter time than that."
|
||
|
||
Goldstein also pointed out that, "although a $5 Master combination
|
||
lock may be broken by a crowbar, it is a much more secure combination
|
||
device. It has 64,000 combinations compared to the 1,085 with the
|
||
Simplex."
|
||
|
||
Goldstein continued, "One of the real problems is that, should a
|
||
person have the misfortune to be robbed, entry due to a failure of the
|
||
Simplex lock gives no evidence of a forcible break-in and police and
|
||
insurance companies often put the blame on the homeowner or office
|
||
manager for 'giving away the combination.' It really can create a
|
||
problem."
|
||
|
||
Skinner told Newsbytes "I'm really concerned about this. I'm a student
|
||
at SUNY, Stony Brook and all our dormitories use these locks as the
|
||
only means of security. I've shown the problem to Scott Law who is
|
||
responsible for residence security but he has discounted the problem
|
||
and said that the locks were installed at the recommendation of the
|
||
campus locksmith. The locksmith, Garry Lenox contradicts Law and says
|
||
that he recommended against these locks years ago and said that they
|
||
were not secure for dormitory use." Skinner said that he will write an
|
||
article for the college newspaper in an attempt to raise consciousness
|
||
about this problem.
|
||
|
||
Goldstein also said that he intends to publish the list of valid
|
||
combinations in an up-coming issue of 2600 to demonstrate to the
|
||
public the problems with the lock. He further said that he will raise
|
||
the issue on his weekly radio show, "Off The Hook", heard on New
|
||
York's WBAI-FM.
|
||
|
||
In response to a Newsbytes question concerning how the 2600 staff
|
||
happened to become involved in a problem with locks, Goldstein said,
|
||
"We're hackers and when we see something with buttons on it, whether
|
||
it's a computer or not, we tend to try it. While the average person
|
||
tends to accept that things are secure just because he is told that
|
||
they are, hackers will usually try them out. It's because of this
|
||
'trying out' that we can point out the problems with both the US
|
||
military computer security and this lock -- and we feel that, in both
|
||
cases, we have performed a service. People should be aware when they
|
||
are at risk so that they may take action to correct it."
|
||
|
||
(Barbara E. McMullen & John F. McMullen/Press Contact: Emmanuel
|
||
Goldstein, 2600 Magazine., 516-751-2749/19911018)
|
||
|
||
------------------------------
|
||
|
||
End of Computer Underground Digest #3.37
|
||
************************************
|
||
|
||
|