textfiles/news/hunt

94 lines
5.7 KiB
Plaintext

HOUNDING TEENAGE HACKERS
DON'T PLUG THOSE
LEAKY COMPUTERS
12/10/84
THE PETULANT BOYS AND GIRLS WHO PLAY IN THE SANDBOX CALLED
THE U.S. SENATE GOT INTO ONE OF THEIR TYPICAL TEMPER TANTRUMS
IN THE LAST HOURS OF THE 98TH CONGRESS THIS FALL. THEY WERE
SO BUSY SHOUTING AND CALLING EACH OTHER NAMES THAT NOBODY
SEEMED INTERESTED IN PASSING ANY LEGISLATION.
IN DESPERATION, THE SENATE LEADERSHIP DECIDED THAT THE
ONLY WAY TO MAKE THESE MATURE, RESPONSIBLE PUBLIC SERVANTS DO
THEIR WORK WAS TO HOLD AN ALL-NIGHT SESSION. A LONG LINE OF
COTS WAS SET UP IN THE CAPITOL CORRIDORS. BETWEEN CATNAPS,
OUR ELECTED LEADERS VOTED ON BILLS AND AMENDMENTS. IN THESE
ABSURD CIRCUMSTANCES THE CONGRESS PASSED AN ABSURD PIECE OF
COMPUTER LEGISLATION.
THE NEW CRIMINAL STATUTE EMPOWERS THE TRW, WHICH
PRESUMABLY HAS NOTHING BETTER TO DO, TO SNOOP AROUND
THOUSANDS OF COMPUTER "BULLETIN BOARD" SYSTEMS TO PROSECUTE
COMPUTER "HACKERS" WHO ARE ALLEGEDLY ABUSING CORPORATE AND
GOVERNMENTAL COMPUTER SYSTEMS FROM COAST TO COAST.
THE PROBLEM, TO THE EXTENT IT IS A PROBLEM, IS THIS:
THOUSANDS OF COMPANIES, SCHOOLS, AND GOVERNMENT AGENCIES HAVE
TELEPHONE HOOKUPS THROUGH WHICH THEIR CUSTOMERS AND EMPLOYES
CAN CALL A CENTRAL COMPUTER TO GET INFORMATION OR LEAVE
MESSAGES.
A COMMON EXAMPLE OF SUCH A SYSTEM WOULD BE A NATIONAL
RETAIL CHAIN WITH HEADQUARTERS IN NEW YORK CITY. THE CHAIN'S
DUBUQUE STORE CAN CALL THE COMPUTER IN NEW YORK TO PLACE AN
ORDER, CHECK ADVERTISING COPY, OR WHAT HAVE YOU.
EACH SYSTEM HAS SOME SECURITY ARRANGEMENTS TO FEND OFF
UNWANTED CALLERS. TO GET INTO THE WASHINGTON POST'S NEWSROOM
COMPUTER, FOR EXAMPLE, YOU NEED TO KNOW THE PHONE NUMBER, AND
THEN TYPE IN TWO SEPARATE PASSWORDS -- KNOWN ONLY TO THE USER
-- BEFORE YOU CAN BE CONNECTED.
THERE HAS BEEN A PROBLEM OF COMPUTER HACKERS AROUND THE
COUNTRY TRYING TO PENETRATE SOME OF THESE CENTRAL SYSTEMS.
SOME HACKERS EVIDENTLY DISCOVERED A NUMBER AND A PASSWORD TO
GET INTO THE TACO BELL COMPUTER, PRESUMABLY ENABLING THE
INTRUDER TO ORDER 5,000 CASES OF HOT SAUCE OR SOME SUCH.
THE MOST INFAMOUS INSTANCE TO DATE CAME EARLIER THIS YEAR
WHEN SOME HACKERS OBTAINED A NUMBER AND PASSWORD ENABLING
THEM TO RUMMAGE AROUND IN THE ELECTRONIC RECORDS MAINTAINED
BY TRW INFORMATION SERVICES, A BIG CREDIT AGENCY THAT HAD
NAMES AND CREDIT NUMBERS OF SOME 90 MILLION PEOPLE.
ALARMED BY SUCH HAPPENINGS, OUR BENIGHTED CONGRESSPEOPLE
ROSE FROM THEIR COTS AND PASSED A LAW MAKING IT A FEDERAL
OFFENSE -- WITH UP TO A YEAR IN JAIL FOR FIRST OFFENDERS --
TO GAIN "UNAUTHORIZED ACCESS" TO ANY PRIVATE OR GOVERNMENTAL
DATA BANK CONTAINING PERSONAL OR CORPORATE FINANCIAL RECORDS.
THIS LAW IS A CLASSIC CASE OF SHOOTING AN ICBM AT A
MOSQUITO -- AND FIRING WIDE. EVEN IF THE SITUATION WERE
SERIOUS ENOUGH TO BRING ON THE G-MEN, THE STATUTORY SOLUTION
CONGRESS HIT ON CANNOT WORK BECAUSE IT IS AIMED AT THE WRONG
PEOPLE.
GRANTED THERE ARE SOME BAD APPLES OUT THERE IN HACKERLAND.
FOR THE MOST PART, THOUGH, THE PEOPLE MAKING THIS
"UNAUTHORIZED ACCESS" ARE 15-YEAR-OLD COMPUTER "PHREAKS" WHO
ARE DOING IT SOLELY FOR THE INTELLECTUAL CHALLENGE. IT'S A
KIDS' GAME. BUT NOW CONGRESS IS DISPATCHING THE FBI TO TRACK
DOWN THESE EVIL MISCREANTS AND SHIP THEM TO LEAVENWORTH.
THE REAL PROBLEM WITH "UNAUTHORIZED ACCESS" IS NOT THIS
CORPS OF PRECOCIOUS KIDS TYPING AWAY AT THEIR COMMODORES BUT
RATHER THE CORPORATE COMPUTER TYPES WHO DESIGNED THE LEAKY
CENTRAL SYSTEMS THE HACKERS ARE INVADING.
IT IS NO GREAT TRICK TO SET UP A COMPUTER SYSTEM THAT
CAN'T BE PENETRATED. IF YOU CREATE A SERIES OF PASSWORDS,
PROTECT THEIR SECRECY, AND CHANGE THEM REGULARLY, YOU CAN
FRUSTRATE JUST ABOUT ANY UNAUTHORIZED INTRUDER.
MANY OF THE SYSTEMS OPERATING NOW, THOUGH, TREAT SECURITY
AS A JOKE. TRW, FOR EXAMPLE, SAYS ITS CREDIT RECORDS ARE
GUARDED AS CAREFULLY AS POSSIBLE. BUT INFOWORLD MAGAZINE
REPORTED THAT A "SECRET" TRW PASSWORD MAY HAVE BEEN PRINTED
ON CREDIT REPORTS ROUTINELY GIVEN TO PEOPLE APPLYING FOR A
CREDIT CARD AT SEARS, AMONG OTHER PLACES. IT SAID THE SAME
PASSWORD WAS PASSED AROUND FOR MONTHS, BUT THAT TRW DID NOT
BOTHER TO ISSUE A NEW ONE.
A GARDEN GROVE, CALIF., CONSUMER NAMED BURT MAZELOW HAS
SUED TRW FOR FAILING TO PROTECT HIS CREDIT RECORDS FROM
SNOOPERS. WITHOUT PREJUDGING THIS PARTICULAR CASE, ONE CAN
SAY THAT MAZELOW HAS FOUND A MUCH MORE INTELLIGENT APPROACH
TO THE PROBLEM THAN OUR SLEEPY SENATORS CAME UP WITH.
IF THE PROBLEM OF "UNAUTHORIZED ACCESS" IS TO BE STOPPED,
IT'S PATENTLY OBVIOUS THAT CHANGES WILL HAVE TO COME AT THE
CENTRAL-COMPUTER LEVEL. INSTEAD OF HOUNDING RAMBUNCTIOUS KIDS
GIVING THEIR COMPUTERS A WORKOUT, THE GOVERNMENT SHOULD
ATTACK THIS PROBLEM AT THE SOURCE: THE CORPORATE AND
GOVERNMENTAL BUREAUCRACIES THAT HAVE BEEN TOO DUMB OR TOO
CHEAP TO MAKE SURE THAT PRIVATE INFORMATION IS REALLY
PRIVATE.