575 lines
28 KiB
Plaintext
575 lines
28 KiB
Plaintext
MONEY INC DIGEST # 31 02/17/95
|
|
|
|
|
|
|
|
***>$ MONEY INC $<***
|
|
|
|
presents:
|
|
|
|
" The Flight And Fall Of Condor"
|
|
|
|
Ok, here's a bunch of posts and clippings regarding the arrest of
|
|
Kevin Mitnick. It is by no means a diffinitive guide. It is mearly a
|
|
compilation of mail sent to me over the past few days to inform others
|
|
of and to clear up various rumors regarding the arrest of Condor.
|
|
|
|
-Sonic Fury
|
|
***>$ Money Inc $<***
|
|
|
|
$$$$$$$$$< SNIP >$$$$$$$$$$$$$$$$$< SNIP >$$$$$$$$$$$$$$$$$< SNIP >$$$$$$$$$$$
|
|
|
|
-----------------------------------------------------
|
|
Slippery cybervandal caught in his own electronic web
|
|
-----------------------------------------------------
|
|
|
|
New York Times
|
|
|
|
RALEIGH, N.C. (9:05 p.m.) -- After a search of more than two years, a team
|
|
of FBI agents early Wednesday morning captured a 31-year-old computer
|
|
expert accused of a long crime spree that includes the theft of thousands
|
|
of data files and at least 20,000 credit card numbers from computer systems
|
|
around the nation.
|
|
|
|
The arrest of Kevin D. Mitnick, one of the most wanted computer criminals,
|
|
followed a 24-hour stakeout of a Raleigh apartment building here.
|
|
|
|
A convicted computer felon on the run from federal law enforcement
|
|
officials since November 1992, Mitnick has used his sophisticated skills
|
|
over the years to worm his way into many of the nation's telephone and
|
|
cellular telephone networks and vandalize government, corporate and
|
|
university computer systems. Most recently, he had become a suspect in a
|
|
rash of break-ins on the global Internet computer network.
|
|
|
|
"He was clearly the most wanted computer hacker in the world," said Kent
|
|
Walker, an assistant U.S. attorney in San Francisco who helped coordinate
|
|
the investigation. "He allegedly had access to corporate trade secrets
|
|
worth billions of dollars. He was a very big threat."
|
|
|
|
But federal officials say Mitnick's confidence in his hacking skills may
|
|
hppave been his undoing. On Christmas Day, he broke into the home computer of
|
|
a computer security expert, Tsutomu Shimomura, a researcher at the
|
|
federally financed San Diego Supercomputer Center.
|
|
|
|
Shimomura then made a crusade of tracking down the intruder, an obsession
|
|
that led to Wednesday's arrest.
|
|
|
|
It was Shimomura, working from a monitoring post in San Jose, Calif., who
|
|
determined last Saturday that Mitnick was operating through a computer
|
|
modem connected to a cellular telephone somewhere near Raleigh, N.C.
|
|
|
|
Sunday morning, Shimomura flew to Raleigh, where he helped telephone
|
|
company technicians and federal investigators use cellular-frequency
|
|
scanners to home in on Mitnick.
|
|
|
|
Mitnick was arrested at 2 o'clock Wednesday morning in his apartment in the
|
|
Duraleigh Hills neighborhood of northwest Raleigh, after FBI agents used
|
|
their scanners to determine that Mitnick, in keeping with his nocturnal
|
|
habits, had connected once again to the Internet.
|
|
|
|
Shimomura was present Wednesday at Mitnick's pre-arraignment hearing at the
|
|
federal courthouse in Raleigh. At the end of the hearing, Mitnick, who now
|
|
has shoulder-length brown hair and was wearing a black sweat suit and
|
|
handcuffs, turned to Shimomura, whom he had never met face to face.
|
|
|
|
"Hello, Tsutomu," Mitnick said. "I respect your skills."
|
|
|
|
Shimomura, who is 30 and also has shoulder-length hair, nodded solemnly.
|
|
|
|
Mitnick, already wanted in California for a federal parole violation, was
|
|
charged Wednesday with two federal crimes. The first, illegal use of a
|
|
telephone access device, is punishable by up to 15 years in prison and a
|
|
$250,000 fine.
|
|
|
|
The second charge, computer fraud, carries potential penalties of 20 years
|
|
in prison and a $250,000 fine. Federal prosecutors said they were
|
|
considering additional charges related to Mitnick's reported Internet
|
|
spree.
|
|
|
|
Federal officials say Mitnick's motives have always been murky. He was
|
|
recently found to have stashed thousands of credit card numbers on
|
|
computers in the San Francisco Bay area -- including the card numbers of
|
|
some of the best-known millionaires in Silicon Valley. But there is no
|
|
evidence yet that Mitnick had attempted to use those credit card accounts.
|
|
|
|
Indeed, frequently ignoring the possibility of straightforward financial
|
|
gain from the information he has stolen, Mitnick has often seemed more
|
|
concerned with proving that his technical skills are better than those
|
|
whose job it is to protect the computer networks he has attacked.
|
|
|
|
Federal officials say the arrest of Mitnick does not necessarily solve all
|
|
the recent Internet crimes, because his trail of electronic mail has
|
|
indicated that he may have accomplices. One of them is an unknown computer
|
|
operator, thought to be in Israel, with whom Mitnick has corresponded
|
|
electronically and boasted of his Internet exploits, investigators said.
|
|
|
|
Still, the capture of Mitnick gives the FBI custody of a notoriously
|
|
persistent and elusive computer break-in expert. Raised in the San Fernando
|
|
Valley near Los Angeles by his mother, Mitnick has been in and out of
|
|
trouble with the law since 1981.
|
|
|
|
It was then, as a 17-year-old, that he was placed on probation for stealing
|
|
computer manuals from a Pacific Bell telephone switching center in Los
|
|
Angeles.
|
|
|
|
Those who know Mitnick paint a picture of a man obsessed with the power
|
|
inherent in controlling the nation's computer and telephone networks.
|
|
|
|
The recent break-ins he is accused of conducting include forays into
|
|
computer systems at Apple Computer Inc. and Motorola Inc. and attacks on
|
|
commercial services that provide computer users with access to the
|
|
Internet, including the Well in Sausalito, Calif., Netcom in San Jose,
|
|
Calif., and the Colorado Supernet, in Boulder, Colo.
|
|
|
|
To make it difficult for investigators to determine where the attacks were
|
|
coming from, Mitnick is said to have used his computer and modem to
|
|
manipulate a local telephone company switch in Raleigh to disguise his
|
|
whereabouts.
|
|
|
|
In recent weeks, as an elite team of computer security experts tightened an
|
|
invisible electronic net around the fugitive, Mitnick continued to taunt
|
|
his pursuers, apparently unaware of how close they were to capturing him.
|
|
|
|
About 10 days ago, for example, someone whom investigators believe to have
|
|
been Mitnick left a voice-mail message for Shimomura, a Japanese citizen.
|
|
The message reprimanded Shimomura for converting the intruder's earlier
|
|
voice-mail messages into computer audio files and making them available on
|
|
the Internet.
|
|
|
|
"Ah Tsutomu, my learned disciple," the taunting voice said. "I see that you
|
|
put my voice on the Net. I'm very disappointed, my son."
|
|
|
|
But the continued attempts at one-upmanship simply gave the pursuers more
|
|
electronic evidence.
|
|
|
|
"He was a challenge for law enforcement, but in the end he was caught by
|
|
his own obsession," said Kathleen Cunningham, a deputy marshal for the U.S.
|
|
Marshals Service who has pursued Mitnick for several years.
|
|
|
|
Mitnick first came to national attention in 1982 when, as a teen-age prank,
|
|
he used a computer and a modem to break into a North American Air Defense
|
|
Command computer.
|
|
|
|
He subsequently gained temporary control of three central offices of
|
|
telephone companies in New York City and all the phone switching centers in
|
|
California.
|
|
|
|
This gave him the ability to listen in on calls and pull pranks like
|
|
reprogramming the home phone of someone he did not like so that each time
|
|
the phone was picked up, a recording asked for a deposit of a coin.
|
|
|
|
But the break-ins escalated beyond sophomoric pranks. For months in 1988,
|
|
Mitnick secretly read the electronic mail of computer security officials at
|
|
MCI Communications and Digital Equipment Corp., learning how their
|
|
computers and phone equipment were protected.
|
|
|
|
Officials at Digital later accused him of causing $4 million in damage to
|
|
computer operations at the company and stealing $1 million of software. He
|
|
was convicted in July 1989 and sentenced to a year in a low-security
|
|
federal prison in Lompoc, Calif.
|
|
|
|
One of his lawyers convinced the court that Mitnick had an addiction to
|
|
computers. In July 1989, after his release from prison, he was placed in a
|
|
treatment program for compulsive disorders, the Beit T'Shuvah center in Los
|
|
Angeles. During his six months there, he was prohibited from touching a
|
|
computer or modem.
|
|
|
|
That restriction was a condition of his probation when he was released in
|
|
mid-1990, and it was for reportedly violating this condition that federal
|
|
officials were pursuing him when he dropped out of sight in November 1992.
|
|
|
|
In September 1993, the California Department of Motor Vehicles also issued
|
|
a warrant for his arrest. The warrant stated that Mitnick had wiretapped
|
|
calls from FBI agents. He then used law-enforcement access codes obtained
|
|
by eavesdropping on the agents to illegally gain access the drivers'
|
|
license data base in California.
|
|
|
|
Federal law enforcement officials believe that Mitnick has conducted a long
|
|
string of computer and phone telephone network break-ins during more than
|
|
two years on the run.
|
|
|
|
And they say his ability to remain at large until now illustrates the new
|
|
challenges that law enforcement officials face in apprehending criminals
|
|
who can cloak themselves behind a curtain of forged electronic data.
|
|
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
HOW A COMPUTER SLEUTH TRACED A DIGITAL TRAIL
|
|
|
|
By John Markoff
|
|
Special to The New York Times
|
|
|
|
RALEIGH, N.C., Feb. 15 -- It takes a computer hacker to catch one.
|
|
|
|
Ad if, as Federal authorities contend, the 31-year-old computer outlaw
|
|
Kevin D. Mitnick is the person behind a recent spree of break-ins
|
|
to hundreds of corporate, university and personal computers on the
|
|
global Internet, his biggest mistake was raising the interest and ire
|
|
of Tsutomu Shimomura.
|
|
|
|
Mr. Shimomura, who is 30, is a computational physicist with a reputation
|
|
as a brilliant cybersleuth in the tightly knit community of programmers
|
|
and engineers who defend the country's computer networks. And it was
|
|
Mr. Shimomura who raised the alarm in the Internet world after someone using
|
|
sophisticated hacking techniques on Christmas Day to remotely break into
|
|
the computers he keeps in his beach cottage near San Diego and steal
|
|
thousands of his data files.
|
|
|
|
Almost from the moment Mr. Shimomura discovered the intrusion, he made it
|
|
his business to use his own considerable hacking skills to aid the
|
|
Federal Bureau of Investigation's inquiry into the crime spree. He set up
|
|
stealth monitoring posts, and each night over the last few weeks, used
|
|
software of his own devising to track the intruder, who was prowling
|
|
the Internet. The activity usually began around midafternoon, Eastern
|
|
time, and broke off in the early evening, then resumed shortly after
|
|
midnight and continued through dawn.
|
|
|
|
The monitoring by Mr. Shimomura enable investigators to watch as the
|
|
intruder comandeered telephone company switching centers, stole computer
|
|
files from Motorola, Apple Computer and other companies, and copied 20,000
|
|
credit card account numbers from a commercial computer network used
|
|
by some of the world's wealthiest and savviest people.
|
|
|
|
And it was Mr. Shimomura who concluded last Saturday that the intruder
|
|
was probably Kevin Mitnick, whose whereabouts had been unknown since
|
|
November 1992, and that he was operating from a cellular phone network in
|
|
Raleigh, N.C.
|
|
|
|
On Sunday morning, Mr. Shimomura took a flight from San Jose, Calif., to
|
|
Raleigh-Durham International Airport. By 3 A.M. Monday, he had helped
|
|
local telephone company investigators use cellular-frequency scanners
|
|
to pinpoint Mr. Mitnick's location: a 12-unit apartment building in
|
|
the northwest Raleigh suburb of Duraleigh Hills.
|
|
|
|
Over the next 48 hours, as the F.B.I. sent in a surveillance team,
|
|
obtained warrants and prepared for an arrest, cellular telephone
|
|
technicians from Sprint Cellular monitored the electronic activities of
|
|
the person they believed to be Mr. Mitnick.
|
|
|
|
The story of the investigation, particularly Mr. Shimomura's role, is a
|
|
tale of digital detective work in the ethereal world known as cyberspace.
|
|
|
|
[Another note from Bill: Go ahead and retch now. Go on. Get it out
|
|
of your system. There. Feel better? Okay, let's move on. :) ]
|
|
|
|
When a Detective Becomes a Victim
|
|
|
|
On Christman Day, Tsutomu Shimomura was in San Fransisco, preparing
|
|
to make the four-hour drive to the Sierra Nevada, where he spends most
|
|
of each winter as a volunteer on the cross-country ski patrol near
|
|
Lake Tahoe.
|
|
|
|
But the next day, before he could leave for the mountains, he received an
|
|
alarming call from his colleagues at the San Diego Supercomputer Center,
|
|
the federally financed research center that employs him. Someone had
|
|
broken into his home computer, which was connected to the center's
|
|
compiter network.
|
|
|
|
Mr. Shimomura returned to his beach cottage near San Diego, in Del Mar,
|
|
Calif., where he found that hundreds of software programs and files had
|
|
been taken eletronically from his work station. This was no random
|
|
ransacking; the information would be useful to anyone interested in
|
|
breaching the security of computer networks or cellular phone systems.
|
|
|
|
Taunting messages for Mr. Shimomura were also left in a computer-
|
|
altered voice on the Supercomputer Center's voice-mail system.
|
|
|
|
almost immediately, Mr. shimomura made to decisions. He was going to track
|
|
down the intruders. And Lack Tahoe would have to wait a while this year.
|
|
|
|
The Christmas attack exploited a flaw in the Internet's design by fooling
|
|
a target computer into believing that a message was coming from a
|
|
trusted source. By masquerading as a familiar computer, an attacker can
|
|
gain access to protected com[uter resources and seize control of an
|
|
otherwise well-defended computer system. In this case, the attack had been
|
|
started from a commandeered computer at Loyola University of Chicago.
|
|
|
|
Though the vandal was deft enough to gain control of Mr. Shimomura's
|
|
computers, he, she or they had made a clumsy error. One of Mr. Shimomura's
|
|
machines routinely mailed a copy of several record keeping files to a
|
|
safe computer elsewhere on the network -- a fact that the intruder did
|
|
not notice.
|
|
|
|
That led to an automatic warning to employees of the Supercomputer Center
|
|
that an attack was under way. This allowed the center's staff to throw the
|
|
burglar off the system, and it later allowed Mr. Shimomura to reconstruct
|
|
the attack.
|
|
|
|
In computer-security circles, Mr. Shimomura is a respected voice. Over
|
|
the years, software security tools that he has designed have made him a
|
|
valuable consultant not only to corporations, but also to the F.B.I.,
|
|
the Air Force and the National Security Agency.
|
|
|
|
Watching An Attack From a Back Room
|
|
|
|
The First significant break in the case came on Jan. 28, after Bruce
|
|
Koball, a computer programmer in Berkeley, Calif., read a newspaper
|
|
account detailing the attack on Mr. Shimomura's computer.
|
|
|
|
The Day before, Mr. Koball had received a puzzling message from the
|
|
managers of a commercial online service called the Well, in Sausalito,
|
|
Calif. Mr. Koball is an organizer for a public-policy group called
|
|
Computers, Freedom and Privacy, and Well officials told him that
|
|
the group's directory of network files was taking up millions of
|
|
bytes of storage space, far more than the group was authorized to use.
|
|
That struck him as odd, because the group had made only mimimal use
|
|
of the Well. But as he checked thr group's directory on the Well, he
|
|
quickly realized that someone had broken in and filled it with
|
|
Mr. Shimomura's stolen files.
|
|
|
|
Well officials eventually called in Mr. Shimomura, who recruited a
|
|
colleague from the Supercomputer Center, Andrew Gross, and an independent
|
|
computer consultant, Julia Menapace. Hidden in a back room at the
|
|
Well's headquarters in an office building near Sausalito, the three
|
|
experts set up a temporary headquarters, attaching three laptop computers
|
|
to the Well's internal computer network.
|
|
|
|
Once Mr. Shimomura had established his monitoring system, the team had
|
|
an advantage: it could watch the intruder unnoticed.
|
|
|
|
Though the identity of the accacker or attackers was unknown, within days
|
|
a profile emerged that seemed increasinly to fit a well-known computer
|
|
outlaw: Kevin Mitnick, who had been convicted in 1989 of stealing
|
|
software from Digital Equipment Corporation.
|
|
|
|
Among the programs found at the Well and at stashes elsewhere on the
|
|
Internet was the software that controls the operations of cellular
|
|
telephones made by Mototola, NEC, Novkia, Novatel, Oki, Qualcomm and
|
|
other manufacturers. That would be consistent with the kind of information
|
|
of interest to Mr. Mitnick, who had first made his reputation by
|
|
hacking into telephone networks.
|
|
|
|
And the burglar operated with Mr. Mitnick's trademark derring-do. One
|
|
night, as the investigators watched electronically, the intruder broke
|
|
into the computer designed to protect Motorola Inc's internal network
|
|
from outside attack, stealing the protective software itself.
|
|
|
|
Mr. Shimomura's team, aided by Mark Seiden, an expert in computer
|
|
security, soon discovered that someone had obtained a copy of the credit
|
|
card numbers for 20,000 members of Netcom Commuinications Inc., a
|
|
service based in San Jose that provides Internet access.
|
|
|
|
To more easily monitor the invaders, the team moved its operation last
|
|
Thursday to Netcom's network operation center in San Jose.
|
|
|
|
High-Tech Tools Force an Endgame
|
|
|
|
Netcom's center proved to be a much better vantage point. To let its
|
|
customers connect their computer modems to its network with only a local
|
|
telephone call, Netcom provides thousands of computer dial-in lines
|
|
in cities across the country. Hacking into the network, the intruder
|
|
was connecting a computer to various dial-in sites to elude detection.
|
|
Still, every time the intruder would connect to the Netcom network,
|
|
Mr. Shimomura was able to capture the computer keystrokes.
|
|
|
|
Late last week, F.B.I. surveillance agents in Los Angeles were almost
|
|
certain that the intruder was operating somewhere in Colorado. Yet
|
|
calls were also coming in from Minneapolis and Raleigh.
|
|
|
|
The big break came last Saturday in San Jose, as Mr. Shimomura and
|
|
Mr. Gross, red-eued from a 36-hour monitoring session, were eating pizza.
|
|
Subpoenas issued by Kent Walker, an assistant United States attorney in
|
|
San Fransisco, had begin to yield results from telephone company calling
|
|
records. And now came data from Mr. Walker that suggested to Mr. Shimomura
|
|
that calls had been placed to Netcom's dial-in site in Raleigh through
|
|
a cellular telephone modem.
|
|
|
|
The calls were moving through a local switching office operated by
|
|
the GTE Corpotation. But GTE's records showed that the calls had looped
|
|
through a nearby cellular telephone switch operated by Sprint. Because
|
|
of someone's clever manipulation of the network software, the GTE switch
|
|
thought that the call came from the Sprint switch, and the Sprint switch
|
|
[thought] it was from GTE. Neither company had a record identifying
|
|
the cellular phone.
|
|
|
|
When Mr. Shimomura called the number in Raleigh, he could hear it
|
|
looping around endlessly with a "clunk, clunk" sound. He called a
|
|
Sprint technician in Raleigh and spent five hours comparing Sprint's
|
|
records with the Netcom log-ins. It was nearly dawn when they determined
|
|
that the calls were being placed from near the Raleigh-Durham airport.
|
|
|
|
By 1 A.M. Monday, Mr. Shimomura was riding around Raleigh with a second
|
|
Sprint technician. From the passenger seat, Mr. Shimomura held a
|
|
cellular-frequency direction-finding antenna and watched a mater display
|
|
its readings on a laptop computer screen. Within 30 minutes, the two
|
|
had narrowed the site to the Players Court apartment complex in Duraleigh
|
|
Hills, three miles from the airport.
|
|
|
|
At that point, it was time for law enforcement officials to take over.
|
|
At 10 P.M. Monday, an F.B.I. surveillance team arrived.
|
|
|
|
In order to obtain a search warrant it was necessary to determine a
|
|
precise apartment address. And although Mr. Shimomura had found the
|
|
apartment complex, pinning down the apartment was difficult because
|
|
the cellular signals were creating a radio echo from an adjacent building.
|
|
The F.B.I. team set off with its own gear.
|
|
|
|
On Tuesday evening, the agents had an address -- Apartment 202 -- and
|
|
at 8:30 P.M. a Federal judge in Raleigh issued the warrant from his home.
|
|
At 2 A.M. today, F.B.I. agents knocked on the door of Apartment 202.
|
|
|
|
It took Mr. Mitnick more than five minutes to open the door. When he
|
|
did, he said he was on the phone with his lawyer. But when an agent took
|
|
the receiver, the line went dead.
|
|
|
|
|
|
------------------------------END OF SECOND ARTICLE---------------------------
|
|
From: emmanuel@well.sf.ca.us (Emmanuel Goldstein)
|
|
Subject: Mitnick Affidavit
|
|
Date: 17 Feb 1995 14:10:13 GMT
|
|
Organization: The Whole Earth 'Lectronic Link, Sausalito, CA
|
|
Lines: 48
|
|
Message-ID: <3i2ao5$o8q@nkosi.well.com>
|
|
|
|
Part Two - more of the affidavit filed 2/14
|
|
|
|
|
|
On February 2, 1995, I was advised by Gross a computer at The Well
|
|
(an internet provider), San Francisco, California, was compromised.
|
|
GROSS reported that the machine compromised at the Well was well.well.com
|
|
(aka well.sf.ca.us). The account used to gain access is called "dono."
|
|
The logged session contained many ftp transfers (ftp being a program
|
|
for moving files form [sic] one machine to another in either direction)
|
|
to the account "dono." The intruder had previously eliminated any other
|
|
traces of activity that would have similar logs.
|
|
|
|
In the home directory of the account "dono," there are several files
|
|
of an unusual nature. "Wietse" is a file of personal E-mail from
|
|
DAN FARMER to WIETSE VENEMA (two well known authorities in computer
|
|
security). The file "0108.gz" is a compressed file that contains copies
|
|
of credit card numbers from the Internet provider Netcom. The files
|
|
"newoki.tar.Z" and "okitsu.tar.Z" match files found at Loyola
|
|
University by Tom Reynolds that were confirmed to have been copied
|
|
from Tsutomu Shimomura's machine ariel.sdsc.edu. The remaining files
|
|
contain tools for breaking into computers (obtaining root access, e.g.
|
|
full access to the machine and all user data), tools for hiding the
|
|
intruder's tracks, electronic mail from several sources, and source
|
|
code which has not been identified yet.
|
|
|
|
Gross advised that the majority of activity in the "dono" account
|
|
originated from the machine teal.csn.org which belongs to the
|
|
Colorado Supernet (CSN) (an Internet provider). The session
|
|
documented on January 31, 1995, shows that the person using the
|
|
"dono" account had knowledge of the files taken from Shimomura's
|
|
machine and in one case the person in question renames one of the
|
|
files to a more memorable name.
|
|
|
|
Gross provided a copy of one full session from teal.csn.org wherein
|
|
the person logs in and uses the "newgrp" command which has been
|
|
replaced with a hacker version of newgrp that allows root access
|
|
(Superuser). The "zap2" program is then run to delete the
|
|
corresponding accounting records in the log files. The intruder
|
|
then goes to the "nascom" directory, looks at the files, renames
|
|
one of the files (indicating prior knowledge of their existence),
|
|
and then users [sic] the "last" command to make sure the accounting
|
|
log files are clean.
|
|
|
|
Gross also provided a detailed listing of the files in the nascom
|
|
directory. The files are copies of the originals taken form [sic]
|
|
Tsutomu Shimomura's machine ariel.sdsc.edu on December 25-26, 1994.
|
|
The files also match the copies found at Loyola University.
|
|
|
|
$$$6$$$6$$$6$$$MYC$$$6$$$6$$$6$$$MYC$$$6$$$6$$$6$$$MYC$$$6$$$6$$$6$$$
|
|
|
|
NETCOM HELPS PROTECT THE INTERNET
|
|
|
|
- A Letter from CEO Bob Rieger to Our Customers -
|
|
|
|
|
|
I know many of you are interested in NETCOM's involvement with the arrest
|
|
of Kevin Mitnick, and how this may impact you, if at all, as a NETCOM
|
|
subscriber. First, let me supply a chronology of events:
|
|
|
|
1. In a routine security check, NETCOM discovered a misappropriated file.
|
|
As a result, we began an investigation to trace what appeared to be a
|
|
security breach.
|
|
|
|
2. At about the same time, the WELL (a small Sausalito-based on-line
|
|
provider) was investigating an account with an unexpectedly large amount
|
|
of disk usage. In the course of this investigation, they discovered
|
|
suspicious material which included items believed illicitly obtained from
|
|
well-known network security expert Tsutomu Shimomura's computer.
|
|
Mr. Shimomura performed network monitoring at the WELL, and determined that
|
|
the account was being accessed from a number of sites, including NETCOM.
|
|
|
|
3. The WELL contacted NETCOM for assistance in tracking the source of the
|
|
security breach.
|
|
|
|
4. A day or two later, the FBI contacted NETCOM and requested NETCOM's
|
|
active involvement in the broadening investigation of the suspicious
|
|
activities at the WELL.
|
|
|
|
5. NETCOM caucused with representatives of the WELL, the FBI, the U.S.
|
|
Attorney's Office, Mr. Shimomura, and Julia Menapace (an independent
|
|
computer consultant and associate of Mr. Shimomura).
|
|
|
|
6. Following the conversation, it was decided that the best vantage point
|
|
for further tracking of these activities was NETCOM's Network Operations
|
|
Center.
|
|
|
|
7. NETCOM operations staff joined their efforts with Mr. Shimomura and
|
|
his associates to trace the suspect intrusions to a particular telephone
|
|
modem in NETCOM's Raleigh, N.C. site.
|
|
|
|
8. At that point, the U.S. Justice Department subpoenaed the local
|
|
telephone carrier for records of dial-ins at specific times to this
|
|
modem. It became apparent that the telephone company's switch equipment
|
|
had been compromised, so that these records could not be obtained.
|
|
However, the Justice Department found another method for making a match.
|
|
|
|
9. With this information, the Justice Department knew the approximate
|
|
location of the originating call.
|
|
|
|
10. Mr. Shimomura flew to Raleigh and used cellular tracking equipment to
|
|
locate the apartment building the calls were coming from. Eventually, the
|
|
calls were traced to an individual apartment, and Mr. Mitnick was arrested.
|
|
|
|
|
|
I hope this detailed recounting helps explain the necessity for silence
|
|
and discretion on NETCOM's part while the investigation was ongoing.
|
|
Similarly, we need to be appropriately discrete during the
|
|
continuing investigation of Mr. Mitnick's alleged illegal activities.
|
|
While respecting these legitimate restraints, we will provide
|
|
as much information as possible on a timely basis to you. (As an aside,
|
|
you may have noticed that I recently promoted Mr. Kael Loftus to the
|
|
position of Customer Liaison. Mr. Loftus has already proven very
|
|
helpful in facilitating communication between our customers and NETCOM.)
|
|
|
|
There has been some concern expressed about the security of NETCOM
|
|
customers' credit card numbers. While this incident may have involved the
|
|
duplication of some credit card numbers, this would apply only to UNIX
|
|
shell accounts. NETCOM has always made system security its top priority,
|
|
but every UNIX system has loopholes that can potentially be exploited by
|
|
an expert cracker. However, to provide additional security for our UNIX
|
|
accounts, we have further isolated these customers' billing information,
|
|
including credit card data. This is why the "ccupdate" feature for the
|
|
UNIX shell accounts has been disabled, and why the "quota" program
|
|
currently says,"Your account balance is temporarily unavailable." These
|
|
features will be reinstated when we are able to do so in a secure fashion.
|
|
|
|
As a practical matter, at this time we have absolutely no indication that
|
|
any of our UNIX shell customers' credit card numbers have been used
|
|
illicitly.
|
|
|
|
Naturally, we encourage all customers to check their credit card billing
|
|
statements carefully. If there is any hint of inappropriate billing, this
|
|
should be brought to the immediate attention of the credit card issuer
|
|
for reversal of those charges.
|
|
|
|
The incident did not involve NetCruiser accounts, which make up the vast
|
|
majority of NETCOM accounts. Fortunately, the security firewalls built-in
|
|
to NetCruiser's system architecture makes such a compromise far more
|
|
difficult.
|
|
|
|
The big story in all of this is that the Internet is maturing into an
|
|
extraordinarily efficient means of communication that millions of people
|
|
use and depend on daily. NETCOM will do everything in its power to help
|
|
assure the security of our network. We will spend the money and employ
|
|
the technology, but deterrence is our real goal.
|
|
|
|
Common thieves should know that NETCOM will be ever vigilant in seeking
|
|
their identification and prosecution.
|
|
-$$$$$$$$$$$$$$$OOOh$$$$$$$$$$$$$$$I'm$$$$$$$$$$$$$$$SCARED!!!$$$$$$$$$$$$$$$-
|
|
|
|
|