Computer underground Digest Sun May 17, 1992 Volume 4 : Issue 22 Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Associate Editor: Etaion Shrdlu, Jr. Arcmeisters: Brendan Kehoe and Bob Kusumoto CONTENTS, #4.22 (May 17, 1992) File 1--Some Corrections to '90 Bust Story in CuD 4.21 File 2--The Defense of Entrapment (Reprint) File 3--COCOTS and the Salvation Army (Follow-up) File 4--Chaos Computer Club France's hackers bibliography Issues of CuD can be found in the Usenet alt.society.cu-digest news group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL0 and DL12 of TELECOM, on Genie in the PF*NPC RT libraries, on the PC-EXEC BBS at (414) 789-4210, and by anonymous ftp from ftp.eff.org (192.88.144.4), chsun1.spc.uchicago.edu, and ftp.ee.mu.oz.au. To use the U. of Chicago email server, send mail with the subject "help" (without the quotes) to archive-server@chsun1.spc.uchicago.edu. European distributor: ComNet in Luxembourg BBS (++352) 466893. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. Some authors do copyright their material, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Tue, 12 May 92 01:14:12 CST From: anonymous@anon.edu Subject: File 1--Some Corrections to '90 Bust Story in CuD 4.21 The following clarifications should be noted in reference to the article in Cu Digest, #4.21, in the Steve Jackson Games section: >In July of 1989, Secret Service agents were examining electronic >mail records of a privately-owned computer system in Illinois >owned by Rich Andrews. Those records, which contained the >computer equivalent of a list of all mail sent through a >particular post office, showed that a copy of a newsletter called >"Phrack" had been sent to Loyd Blankenship, the managing editor >at Steve Jackson Games, Loyd Blankenship, in late February of >1989. Actually, the records showed that Loyd Blankenship *sent* a copy of Phrack 24 to someone on Jolnet. He received his own copy directly from Craig. The source was not Jolnet. >1/90: Bell Communications Research security manager Henry M. >Kluepfel dials into Loyd Blankenship's home BBS, the Phoenix >Project, under his real name. Mr. Kluepfel was never on Phoenix Project under his real name, according to userlogs from the day the system was taken down. He certainly would have been *welcome* on -- The Phoenix Project had several phone security officers and law enforcement agents already. CuD moderators reportedly possess userlogs from TPP during its history and can verify that there is no "Kluepfel" among the users on any of those logs. >2/90: Search warrants are given for the residences of Bob Izenberg >(2/20), Loyd Blankenship (2/28) and Chris Goggans (2/28), and at >the office of Steve Jackson Games (2/28). The SJG warrant is >unsigned; the other warrants are signed by U.S. Magistrate >Stephen H. Capelle on the day that they're served. Bob Izenberg was raided in 2/90. Goggans, Loyd Blankenship and SJG were raided in 3/90. The warrant for Loyd was also unsigned, as was (if previous reports are correct) the warrant for Chris. >Three hours after the raid at another, Secret Service agents have >called Austin computer store owner Rick Wallingford at home, to >verify that he sold a pinball machine to one of the warrant >subjects. It was a PacMan machine. >CHRIS GOGGANS: Former employee of Steve Jackson Games. >Unavailable for comment. Chris Goggans was never an employee of Steve Jackson Games. These may seem trivial corrections, but because of the rumors and inaccurate information about the case and its particulars, we should assure that even minor details are correct. ------------------------------ Date: 10 May 92 20:48:10 EDT From: Gordon Meyer <72307.1502@COMPUSERVE.COM> Subject: File 2--The Defense of Entrapment (Reprint) The Defense of Entrapment As it Applies to Bulletin Board System Operators By Randy B. Singer, Esq. For now, it is unclear how the law applies to protect speech communicated through electronic bulletin boards. There are hundreds, maybe thousands, of enthusiast-run bulletin boards across the country provided for the free use of the public to exchange ideas and publicly distributable software. The system operators of these bulletin boards are providing a wonderful public service, out of the goodness of their hearts, usually for no monetary gain (in fact, often at a considerable loss). These sysops cannot afford to fall into a gray area of the law and find themselves having to defend an expensive criminal suit or having to do without their computer equipment because it has been confiscated by the police as evidence. Running a public bulletin board can expose a system operator (sysop) to all sorts of legal problems that have yet to be adequately defined. For instance: What happens if one user posts slanderous/libelous information about another user? Is the sysop liable? Is a bulletin board more like a newspaper in this regard or is it more like a meeting hall? What happens if a user uploads something clearly illegal, like child pornography, which other users download before the sysop has a chance to review the material? Is the sysop liable? What is the liability of the sysop if he runs a bulletin board in his/her back room and he/she almost never monitors the activity on it? Is the sysop required to constantly monitor the goings-on on their board to prevent illegal activity? It is therefore understandable that sysops have tried to protect themselves legally the best that they have known how. Unfortunately, there has been a lot of misinformation spread about what the law is and how it pertains to the community of bulletin board users and operators. Hopefully this text file will clear up one of the most common legal misconceptions that is going around. I have often seen posts that evidence a complete misunderstanding of what constitutes the defense of entrapment. As an attorney I would like to explain this law and its application, especially as it pertains to electronic bulletin board operators. Entrapment is a complete defense to a crime that a person has been charged with. It varies in how it is interpreted in each state, and on the federal level, but generally it is as I have defined it here. Entrapment only exists when the crime involved is the creative product of the police. (That is, the idea to commit this crime came from a police officer, or an agent of the police. The alleged criminal never would have thought of committing this crime if it hadn't been suggested to him by the police, or if the means to commit the crime had not been offered to the alleged criminal by the police.) AND the accused was not otherwise predisposed to commit the crime involved. (That is, the accused probably wouldn't have committed this or any other similar crime if the police had never been involved.) BOTH elements must exist for the defense of entrapment to apply. For instance: When John DeLorean, owner of the (then about to fail) DeLorean Motor Company, was arrested and tried for selling cocaine, he was found not guilty by reason of the defense of entrapment because, the jury determined, the police took advantage of the fact that his failing company made him a desperate individual. The police sent in an undercover officer to offer him a bag of cocaine to sell to raise money to save his company. The entire idea for the crime came from the police; they provided the instrumentality (the coke); and John DeLorean probably would never in his life have sold drugs to anybody if the police hadn't shown up to offer him the drugs to sell at the exact right time. The reason for the law is obvious: we don't want the police setting up desperate people to get busted just because those people are unfortunate enough to find themselves in desperate situations. In fact, we don't want the cops to set up any law abiding citizens, even if they are not desperate. Tempting people who would not ordinarily commit a crime is not what we want police officers to do. Now that you have the definition of entrapment, let's talk about what entrapment is NOT. I've read a lot of posts from people on boards who think that entrapment exists when a police officer goes undercover and does not reveal his true identity when asked. This is NOT covered by the defense of entrapment per se. The defense of entrapment does NOT require a police officer to reveal himself when asked. Going undercover is something that the police do all the time, and there is nothing that prohibits them from doing so. If you are predisposed to commit a crime (e.g., you are already engaged in illegal activity before an undercover police officer comes on the scene), and an undercover police officer simply gathers evidence to convict you, the defense of entrapment does not apply. So, for instance, if an undercover police officer logs onto a bulletin board and lies and says that he/she is not a police officer when asked, and he/she finds illegal material or goings-on on this bulletin board, then whatever he/she collects and produces against the system operator as evidence towards a criminal conviction is not precluded from being used against the sysop in court. At least it is not excluded by the defense of entrapment, because in this instance the defense of entrapment does not apply. The police officer is allowed to act undercover, and the illegal acts were not the creative product of the police. Also remember that the defense of entrapment is a COMPLETE defense. So it does not act to exclude evidence, but rather it acts towards one of three things: having a grand jury find that there is not sufficient evidence that a conviction could be obtained to proceed to a criminal trial against the sysop; having the case dismissed before trial; or a finding of 'not guilty' after a criminal trial. The defense of entrapment also doesn't necessarily apply if the police officer simply asks the system operator to do something illegal and he does it. In this case the district attorney would argue that the sysop was predisposed to commit the illegal act, especially if the illegal act was already going on in one form or another on the board. For instance, if the police officer asks the sysop to download to him some commercial software, the defense of entrapment will not apply if there is already commercial software available in the files section of the bulletin board. What would probably be required for the defense of entrapment to apply would be for the police officer to have enticed or misled the system operator into doing the illegal act, and it would have had to have been an illegal act that wasn't already going on on this bulletin board. This MAY allow the use of the defense of entrapment. I say "may" because it depends on the facts in each individual situation to see how closely they meet the requirements for the defense of entrapment to apply. You may surmise from my reticence to commit to saying that the defense of entrapment definitely WOULD apply that the defense of entrapment is not a defense that I recommend that you rely on. I've seen some bulletin boards say something to this effect in their logon screen: "Access restricted. Police officers must identify themselves, and are forbidden from gaining entry to this bulletin board." This type of message not only does not protect a bulletin board from the police (assuming that there is something that might be interpreted as illegal going on on this board), but it actually alerts any police officer who may casually log on to this board to immediately suspect the worst about this board and its system operator. There is nothing that I know of that would keep an agent of the police from lying about his/her status and logging on as a new user and gathering evidence to use against the sysop. In fact, I'm not sure, but I would not be surprised to find in the current legal climate that such a logon message is enough evidence to get a search warrant to seize the computer equipment of the system operator of this bulletin board to search for evidence of illegal activity! At some future date I hope to write a file that will detail how sysops can protect themselves from legal liability. (That is, by avoiding participating in arguably illegal activity, and by avoiding liability for the uncontrollable illegal acts of others. I have no interest in telling sysops how to engage in illegal acts and not get caught.) But for now, I hope that this file will give sysops a better understanding of the law and how one aspect of it applies to them. Disclaimer: The information provided in this document is not to be considered legal advice that you can rely upon. This information is provided solely for the purpose of making you aware of the issues and should be utilized solely as a starting point to decide which issues you must research to determine your particular legal status, exposure, and requirements, and to help you to intelligently consult with an attorney. No warrantees, express or implied, are provided in connection with the information provided in this document. This document is provided as is, and the reader uses the information provided here at their own risk. (Sorry for the necessity of covering my behind! Just remember, you get what you pay for, so I cannot guarantee anything I have written here. If you want legal advice that you can take to the bank, you should hire an attorney. Besides, just like everyone these days, we need the work!) About the Author: Randy B. Singer is an attorney in the San Francisco bay area. He does business law, personal injury, computer law, and Macintosh consulting. He also gives seminars at the Apple offices in downtown San Francisco for attorneys and others who are interested in learning about the Macintosh computer. He can be reached at 788-21st Avenue, San Francisco, CA 94121; (415) 668-5445. Copyright (C) 1992 Randy B. Singer. All rights reserved. This document may be freely distributed as long as it is not for monetary gain or as part of any package for sale. This work may not be modified in any way, condensed, quoted, abstracted or incorporated into any other work, without the author's express written permission. This reprint taken from ST Report #8.19, used with permission ------------------------------ Date: Fri, 15 May 92 16:41:38 CST From: moderators <tk0jut2@mvs.cso.niu.edu> Subject: File 3--COCOTS and the Salvation Army (Follow-up) In Cu Digest 4.20, we related the problems of a COCOT (Coin-operated, Customer-owned Telephone) installed at the Salvation Army Freedom Center in Chicago. In brief, The SAFC, a community release center for recently-released state and federal prisoners, had installed COCOTS that were charging prisoners, who generally come from low-income populations, significantly higher rates than conventional carriers. The COCOTS utilize long distance carriers that are demonstrably not in compliance with federal law (PL 101-435). In the next issue, we will provide a follow-up to the lack of responsiveness of the carriers (U.S. Long Distance) and the billing agents (Zeroplus Dialing and GTE). This note summarizes the response of the Salvation Army, which was the only organization that took the problem seriously and acted upon it. When we summarized events in 4.20, we had been unable to obtain consistent information from the telecos because of multiple layers of billing accountability and significant contradictions in information that we were given. We were also, at that time, unable to reach anybody at the SAFC who could provide us with information. So, we expressed our frustration by raising questions that we would have asked SAFC officials. Since then, we have talked with several SAFC personnel, and without exception they were deeply concerned about the problem. They had received numerous complaints from ex-offender customers about the technical service of the COCOTS, but they were not aware of the long distance tolls until we brought it to their attention. They emphasized that it was neither their intent nor their practice to profit from telephone services. The information they provided supports their community reputation as a viable and dedicated organization committed to helping ex-offenders return to the community. In response to our questions, we were told the following: The SAFC *does not* itself own the COCOTS, and the COCOTS there are fairly new. The Salvation Army recently signed a contract with a company that promised to deliver services identical to the previous system, Illinois Bell, at no extra cost to the users. The SAFC signed a contract when told they would receive a better commission with equal service and no increased rates. Some sources indicated that the COCOT phones did not, in fact, provide better service, and there was some concern expressed by ex-offenders and others that the COCOT was, in fact, *more expensive* for users than the previous carrier. Our own experience suggested that, for long distance rates at least, this complaint has substance. The SAFC center does receive a monetary return from COCOT use. The return is accumulated for the residents' benefit fund. This fund is used to replace equipment, provide amenities (such as tv sets), defray costs for special events such as the annual Christas part, and provide modest resources for indigent prisoners in emergencies. The profits from the COCOT are ultimately returned directly to the prisoners, and the SAFC itself does not profit. SAFC personell emphasized that there are still alternative (RBOC) telephones available, and at least one telephone is available at no charge for important calls such as obtaining job interviews. Because the SAFC is bound by contract to their current COCOT owner, they are not sure of their options for the long run. Over the short run, however, they indicated that they will address the problem in two ways. First, they will discuss the problems with the owner and attempt to assure that the terms of the contract--equal service at no higher costs--are met. Second, they will emphasize "consumer literacy" and assure that their clients are aware of the differences in especially long distance rates between the various long distance service providers and explain that users are legally entitled to place calls to alternative carriers if the one to which they initially connect is not to their liking. We have sent them a copy of PL 101-435 to assist them in their discussions with the COCOT owner and to provide their consumers with adequate information. We commend the SAFC for its handling of the situation. Salvation Army officials were concerned that our previous post would communicate erroneous information about the nature of the SAFC and its operation. Both they, and others, affirmed that the SAFC is a successful, exceptionally beneficial, and highly reputable program with only one end in mind: To help ex-offenders. If our previous remarks were excessively strident, we apologize. They have displayed both honor and initiative in protecting prisoners from exploitation, and we thank them for their concern. It is unfortunate that GTE, USLD, and Zeroplus cannot follow their example. ------------------------------ Date: Wed, 6 May 92 07:27 GMT From: Jean-Bernard Condat <0005013469@MCIMAIL.COM> Subject: File 4--Chaos Computer Club France's hackers bibliography Enclosed one bibliography that all the CCCF's members read all the time in France... Sincerely yours, Jean-Bernard Condat Chaos Computer Club France [CCCF] B.P. 8005 69351 Lyon Cedex 08, France Phone: +33 1 47 87 40 83, Fax.: +33 1 47 87 70 70. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ File x: Chaos Computer Club France's hackers bibliography Nelson, B. [Univ. of Southern California, Los Angeles, CA, USA]: "Straining the capacity of the law: the idea of computer crime in the age of the computer worm In: Computer/Law Journal (April 1991) vol.11, no.2, pp.299-321 Considers whether traditional justifications for the criminalization of conduct are adequate to encompass new forms of 'criminal' behavior arising out of advanced computer technology. Describes the reactions of legislator, computer designers and users, and members of the general public who have opposed Robert Tappan Morris's trial a nd conviction. Two prominent and competing theories, retribution and utilitarianism,are useful in helping understand the conflict between two sets of social values: those we seek to protect by means of a criminal justice system and those associated with the basic principles of freedom. Nonetheless, neither traditional retributive nor utilitarian theory provides a clear justification for the imposition of criminal punishment in the case of the 'crime' that Morris committed when he introduced the Internet worm. (61 Refs) Spafford, E.H.[Dept. of Comput. Sci., Purdue Univ., West Lafayette, IN, USA]: "Are computer hacker break-ins ethical?" In: Journal of Systems and Software (Jan. 1992) vol.17, no.1; pp.41-7 Recent incidents of unauthorized computer intrusion have brought about discussion of the ethics of breaking into computers. Some individuals have argued that as long as no significant damage results, break-ins may serve a useful purpose. Others counter that the break-ins are almost always harmful and wrong. This article lists and refutes many of the reasons given to justify computer intrusions. It is the author's contention that break-ins are ethical only in extreme situations, such as a life-critical emergency. The article also discusses why no break-in is 'harmless'. (17 Refs) Kluepfel, H.M.: "In search of the cuckoo's nest-an auditing framework for evaluating the security of open networks" In: EDP Auditor Journal (1991) vol.3; pp.36-48 In Clifford Stoll's best-selling book "The Cuckoo's Egg" he describes the pursuit of a computer hacker who, like the cuckoo, left something in the computing nests of other users. The paper provides a perspective on auditing networked systems to find the nest which may have an extra 'egg' in it or is inviting one because of a breakdown in security design or practice. It focuses on: the security implications for an increasingly open network architecture; the lessons learned from performing intrusion post-mortems; the need for architecture plans and systems engineering for security; an audit framework for evaluating security. (26 Refs) Raymond, E.S.: "New Hacker's dictionary" Publisher: MIT Press, London, UK (1991); xx+433 pp. From ack to zorch (and with hundreds of other entries in between) The New acker's Dictionary is a compendium of the remarkable slang used by today's computer hackers. Although it is organized in reference form, it is not a mere technical dictionary or a dry handbook of terms; rather, it offers the reader a tour of hackerdom's myths, heroes, folk epics, in-jokes taboos, and dreams-an unveiling of the continent-spanning electronic communities that knit hackers together.Appendixes include a selection of classic items of hacker folklore and humor, a composite portrait of 'J. Random Hacker' assembled from the comments of over one hundred respondents, and a bibliography of nontechnical works that have either influenced or described the hacker culture. (12 Refs) Arnold, A.G.; Roe, R.A.[Dept. of Philosophy & Tech. Social Sci., Delft Univ of Technol., Netherlands]: "Action facilitation; a theoretical concept and its use in user interface design" In: Work With Computers: Organizational, Management, Stress and Health Aspects. Proceedings of the Third Conference on Human-Computer Interaction. Vol.1, pp.191-9 Editor(s): Smith, M.J.; Salvendy, G.; Elsevier, Amsterdam; xii+698 pp. The concept of action facilitation, derived from Hacker's theory of goal-directed action, can be defined as an improvement or maintenance of performance under conditions of decreasing mental and/or physical effort. This concept applies to any kind of work, including work with computers. A method for operationalizing this concept in the context of human-computer interaction is discussed, and it is shown how this method can be applied to the evaluation and design of user interfaces for office systems. (20 Refs) Menkus, B.: "'Hackers': know the adversary" In: Computers & Security (Aug. 1991) vol.10, no.5; pp.405-9 Abstract: Confusion appears to continue among many of those concerned about computer security about who hackers are, what they do and why they are doing it. The author clarifies some of the terms, concepts, and motives involved in the hacker phenomenon. The author discusses the hackers' objectives and their methods. He discusses some of the problems that need to be resolved to in order to tackle hackers' activities. Implementing an effective counter hacker strategy rests on the recognition that access to information is only granted to aid in tasks of value to the organizatio and that an organizatio does have the right to own and use legitimate information. He concludes that three tactics should be employed: initiation of active lobbying by the targets of hacker activity; improved personnel attribute verification on access; and tracing system use activity on a real-time basis. (3 Refs) Cook, W.J.: "Costly callers: prosecuting voice mail fraud" In: Security Management (July 1991) vol.35, no.7; pp.40-5 Abstract: On August 17, 1990, Leslie Lynne Doucette was sentenced to 27 months in prison. Her sentence, one of the most severe ever given to a computer hacker in the United States, was based on her role as the head of a nationwide voice mail computer fraud scheme and her unauthorized possession of 481 access codes as part of that scheme. Evidence developed during the investigation and disclosed in pretrial proceedings, revealed that the case was part of a broader trend toward voice mail computer abuse by hackers. This article examines the telecommunication technology involved and the ways computer hackers use and abuse that technology, and it summarizes the investigation that led to Doucette's conviction and the convictions of other hackers in her group. Myong, A.M.; Forcht, K.A.[James Madison Univ., Harrisonburg, VA, USA]: "The computer hacker: friend or foe?" In: Journal of Computer Information Systems (Winter 1990-1991) vol.31, no.2; pp.47-9 Abstract: To most people, the hacker seems somewhat harmless but the reality is quite the contrary. Quite often, extremely sensitive data is accessed by hackers and tampering of any kind can cause irreversible damage. Although this situation is causing great concern, the hacker is not seen as the hardened criminal, and laws dealing with this kind of 'technological trespass' poses the question: 'is the hacker a friend or foe?' Obviously, these hackers violate the security and privacy of many individuals, but by doing so, vulnerabilities in the systems are showcased, alerting the need for increased security. Paradoxically, by committing computer crimes, these 'hackers' could be doing society an indirect favor. The authors give a profile of a hacker and explain how some users and systems make it easy for one to break into their system. Various actual hacks are also presented. (13 Refs) Koseki, J.: "Security measures for information and communication networks" In: Data Communication and Processing, (1991) vol.22, no.4; pp.38-46 Abstract: The causes of interruptions of the information/communication system can be classified roughly into accidents and crime. The factors of disturbing system operations include reduction of system functions due to traffic congestion. While accidents occur due to unexpected natural phenomena or human errors, crimes are failures based on intentional human behavior, unjust utilization and destruction of the system involving the hacker and computer virus. In order to complete the security for information and communication networks and eliminate the risk of accidents and crime, it is necessary to improve system functions and take harmonious measures viewed from human and legal factors as well as a technological standpoint. Zajac, B.P., Jr.[ABC Rail Corp. Chicago, IL, USA]: "Interview with Clifford Stoll (computer crime)" In: Computers & Security (Nov. 1990) vol.9, no.7; pp.601-3 Abstract: Concerns the trials of Clifford Stoll, tracking a hacker that was looking for US military information and then trying to convince the Federal Bureau of Investigation that he had an international computer spy on his hands. As the system manager, he was to track down a $0.75 discrepancy in one of the accounting systems. In his quest Stoll discovered that this was not the simple theft of some computer time but was something far greater-international computer espionage aimed at US military computers. "IT security" In: Wharton Report (Aug. 1990) no.144; pp.1-8 Abstract: As our reliance on computer systems increases so too does the risk of data loss. A computer can be insecure in many ways: a clever hacker, a virus, a careless employee or a vandal can steal, destroy, alter or read data with relative ease. In addition to this, the proliferation of networks and the increasing number of tasks given over to a company's central computer have, while helping us achieve higher degrees of output, made our data even more insecure. The trend towards open systems will also bring us security problems. Schneider, E.W.[Peacham Pedagogics, Madison, NJ, USA]: "Progress and the hacker ethic (in educational computing)" In: Educational Technology (Aug. 1990) vol.30, no.8; pp.52-6 Abstract: A hacker is someone who writes clever code on a small machine in something very close to machine language so that the small machine does things that would be impressive on a big time-sharing machine. Microcomputers were introduced into schools by teachers who were also electronic hobbyists. Some of these teachers went on to learn programming, becoming true hackers. Due to unprecedented demand from industry, true hackers in education are an extinct species. Other teachers developed skills in keeping the machine running, and ordering the latest and greatest; they form a group that is peculiar to education: the pseudo-hackers. Most computer applications in higher education have adopted a hacker ethic. They act as if educational research and medical research used the same way of determining needs, funding, and performing research, and disseminating the results. They expect teachers to be as motivated as doctors, learning about the latest techniques and adopting them as quickly as possible. That may well be the way it ought to be, but that certainly isn't the way that it is. Cook, W.J.: Uncovering the mystery of Shadowhawk In: Security Management (May 1990) vol.34, no.5; pp.26-32 Abstract: How can a juvenile infiltrate some of the country's most classified and secured datafiles? Easy-with his home PC. On February 14, 1989, a hacker was sentenced to nine months in prison, to be followed by two and a half years' probation, and was ordered to pay restitution totaling $10000. On February 28, 1989, he started serving his prison term in a prison in South Dakota. If the hacker had been 18 when he committed these crimes, he would have faced a possible 13-year prison sentence and fines totaling $800000. Facts developed during a one-week trial established that between July and September 1987, the hacker, under the code name Shadowhawk, used a modem on his home computer to gain unauthorized remote access to AT&T computers in Illinois, New Jersey, North Carolina, and Georgia and stole copies of copyrighted AT&T source code worth over $1,120,000. (7 Refs) Greenleaf, G.: "Computers and crime-the hacker's new rules" In: Computer Law and Security Report (July-Aug. 1990) vol.6, no.2; p.21-2 Abstract: The author reflects on the international response to the case of Robert Morris, a US hacker. He looks at recent Australian legislation on computer crime and some legal definitions from England. Kluepfel, H.M. [Bellcore, Morristown, NJ, USA]: Foiling the wily hacker: more than analysis and containment Conference Title: Proceedings. 3-5 Oct. 1989 International Carnahan Conf. Security Technology; pp.15-21 Publisher: ETH Zentrum-KT, Zurich, Switzerland; 1989; 316 pp. Abstract: The author looks at the methods and tools used by system intruders. He analyzes the development of the hacker, his motivation, his environment, and the tools used for system intrusion. He probes the nature of the vulnerable networking environments that are the target of intrusions. The author addresses how to turn the tables on these intruders with their own tools and techniques. He points out that there are many opportunities to learn from the intruders and design that knowledge into defensive solutions for securing computer-based systems. The author then presents a strategy to defend and thwart such intrusions. (16 Refs) Dehnad, K. [Columbia Univ., New York, NY, USA] : "A simple way of improving the login security" In: Computers & Security (Nov. 1989) vol.8, no.7; pp.607-11 Abstract: The login procedure is formulated as a test of hypothesis. The formulation is used to show that the commonly used procedure provides valuable information to a hacker which enables him to use trial and error to gain access to a computer system. A general method for reducing this information is described and its properties studied. The method introduces randomness into the procedure, thus denying a hacker the luxury of trial and error. (6 Refs) Earley, J.: "Supplier's view-considering dial-up (hacker prevention)" In: Computer Fraud & Security Bull. (Oct. 1989) vol.11, no.12; pp.15-18 Abstract: Discusses the practicalities of hacker prevention. Password protection, data encryption algorithms and the combination of data encryption and access control are briefly considered. The Horatius access control system and Challenge Personal Authenticator are discussed. Lubich, H.P.: "Computer viruses, worms, and other animals: truth & fiction" In: Output (5 April 1989) vol.18, no.4; pp.31-4 Abstract: Computer viruses can be classified according to characteristics, especially their effects and their propagation mechanisms. Harmless and destructive viruses and their propagation in computer systems are discussed. Related definitions of virus, worm, mole, Trojan horse, trapdoor, logic bomb, time bomb, sleeper, hole, security gap, leak, hacker, and cracker are explained. System penetration by hackers or viruses has been aided by lack of system security consciousness, and by security deficiencies in hardware and software supplied by manufacturers. Countermeasures discussed include care in software purchase, use of test programs, use of special security measures, and recourse to legislation. Brunnstein, K.: "Hackers in the shadow of the KGB" In: Chip (May 1989) no.5; pp.14-19 Abstract: The author examines the question of whether hackers are criminals or idealists. He sketches a profile of a typical hacker (which turns out to be similar to that of a professional programmer) and looks at hackers' work methods, clubs and motives. He outlines some of their more wellknown cases (e.g. the Chaos club, the Hannover hacker, the involvement of Russia in buying stolen technical secrets) and comments on the measures being taken to prevent hackers getting in and to make computer systems 'secure'. Campbell, D.E. [PSI Int., Fairfax, VA, USA]: "The intelligent threat (computer security)" In: Security Management (Feb. 1989) vol.33, no.2; pp.19A-22 Abstract: This article is about the hacker as an external threat, a terrorist, a person who destroys information for spite, revenge, some get-rich-quick scheme, or some ideological reason-but always with physical or electronic destruction or modification of data as a possible end result. The hacker as a destructive force is the external threat all information systems are faced with, and as a manager of these systems, your job may depend on how well you defend your data against such a force. Samid, G.: "Taking uncommon-but effective-steps for computer security" In: Computers in Banking (March 1989) vol.6, no.3; pp.22, 61-2 Abstract: System managers and security officials should take the time to familiarize themselves with the hackers job. Only then will they develop a sense of their system's vulnerability. Such awareness is a prerequisite for installation of a heavy-duty defense. No computer system is break-safe. Therefore computer security starts with identifying who will benefit the most from breaking in. Then the analysis should assess the value of breaking in for the intruder. That value should be less than the effort or cost of accomplishing the intrusion. As long as the balance cost/benefit is kept unfavorable to the would-be intruder, the system is virtually break-safe. Wilding, E.: "Security services shaken by UK hacker's claims" In: Computer Fraud & Security Bulletin; (Jan. 1989) vol.11, no.3; pp.1-5 Abstract: Discusses the case of Edward Austin Singh, the UK hacker reported in October to have accessed some 250 academic, commercial, government and military networks worldwide. This case serves as a useful framework for discussing legal issues related to computer hacking in the UK. Gliss, H.: "US research systems attacked by German student" In: Computer Fraud & Security Bulletin (July 1988) vol.10, no.9; pp.1-3 Abstract: A researcher with 'a hacker's mentality' caught a German computer science student from Hanover. The researcher, Clifford Stoll from Lawrence Berkeley Laboratory (LBL), trapped the student by a trace connection over the US data networks into Bremen University (West Germany) and from there through DATEX-P to the individual telephone from which the hacker did his job. The author gives a comprehensive overview about Stoll's successful approach, and the lessons which LBL management drew from the case. Beale, I.: Computer eavesdropping-fact or fantasy In: EDP Auditor Journal (1988) vol.3; pp.39-42 Abstract: Equipped with a black and white television set, an antenna and a small amount of electronics equipment it is possible to display the information from the screen of a terminal located in a building over 300 metres away. This shows how easy eavesdropping can be, how inexpensive the necessary equipment is and how readable the data received is. Clearly then, senior management within many companies should be concerned about the vulnerability of their systems and the information contained within them. A broad range of information currently processed on computer systems is of a confidential nature and needs to be stored and processed within a secure environment. This type of information includes financial data, financial projections, design data for new products, personnel records, bank accounts, sensitive correspondence and competitive contract bids. Any of this information may be valuable to eavesdroppers either for their own use, or so that they can sell it to a third party. Another interested party in this technology is the would-be hacker. By using eavesdropping techniques, the hacker will be able to readily identify user ids and passwords which are valid on client computer systems. This will be much more efficient than the techniques currently used by hackers to identify valid user id and password combinations. Stoll, C.: "Stalking the wily hacker" In: Communications of the ACM (May 1988) vol.31, no.5; pp.484-97 Abstract: In August 1986 a persistent computer intruder attacked the Lawrence Berkeley Laboratory (LBL). Instead of trying to keep the intruder out, LBL took the novel approach of allowing him access while they printed out his activities and traced him to his source. This trace back was harder than expected, requiring nearly a year of work and the cooperation of many organizations. This article tells the story of the break-ins and the trace, and sums up what was learned. (49 Refs) Schechter, H.: "Dial-up network management-more than just security!" Conference Title: SECURICOM 86. 4th Worldwide Congress on Computer and Communications Security and Protection; pp.173-8 Publisher: SEDEP, Paris, France; Date: 1986; 476 pp; Date: 4-6 March 1986 Abstract: During the last few years, worldwide data communications networks have been besieged by terrorist attacks, the personal computer hacker. As businesses have aggressively pursued the use of the PC and dial-up services, they have found that they must guard their networks and data, and at the same time manage this dial-up network like they manage leased line networks. The paper analyzes the needs and components of dial-up network management and security. Troy, E.F.: "Security for dial-up lines" Issued by: Nat. Bur. Stand., Washington, DC, USA; May 1986; vi+60 pp. Abstract: This publication describes the problem of intrusion into government and private computers via dial-up telephone lines, the so-called 'hacker problem'. There is a set of minimum protection techniques against these people and more nefarious intruders which should be used in all systems which have dial-up communications. These techniques can be provided by a computer's operating system, in the best case. If the computer does not have the capability to give adequate protection against dialup intruders, then other means should be used to shore up the system's access control security. There are a number of hardware devices which can be fitted to computers or used with their dial-up terminals and which provide additional communications protection for nonclassified computer systems. This publication organizes these devices into two primary categories and six subcategories in order to describe their characteristics and the ways in which they can be used effectively in dial-up computer communications. A set of evaluative questions and guidelines is provided for system managers to use in selecting the devices which best fit the need. A set of four tables is included which lists all known devices in the four primary categories, along with vendor contact information. No attempt is made to perform any qualitative evaluation of the devices individually. (41 Refs) Roberts, W. [Dept. of Comput. Sci., Queen Mary Coll., London, UK]: "'Re- member to lock the door': MMI and the hacker" Conference Title: System Security: Confidentiality, Integrity, Continuity. Proceedings of the International Conference; pp.107-14 Publisher: Online Publications, Pinner, UK; Date: 1986; xii+232 pp. Conference Date: Oct. 1986; London, UK Abstract: Increasing emphasis is being placed on the importance of man machine interface (MMI) issues in modern computer systems. This paper considers the ways in which common MMI features can help intruders to breach the security of a system, and suggests methods for enhancing system security and data integrity by careful MMI design, aiding both the user and the system administrator. Murphy, I. [Secure Data Syst., Philadelphia, PA, USA]: "Aspects of hacker crime: high-technology tomfoolery or theft?" In: Information Age (April 1986) vol.8, no.2; pp.69-73 Abstract: Computer crime is an increasingly common problem worldwide. Perpetrated by a growing band of people known as hackers, it is exacerbated by the ease with which hackers communicate over clandestine bulletin boards. The types of information contained in these boards is reviewed, and a parallel is drawn with the problem of telephone fraud also rampant in the USA. The author looks at the problem of unauthorized access to telephone lines and personal data. (1 Ref) Shain, M.: "Software protection-myth or reality?" Conference Title: Protecting and Licensing Software and Semiconductor Chips in Europe; 30 pp. Publisher: Eur. Study Conferences, Uppingham, Rutland, UK; 1985; 273 pp. Conference Date: 7-8 Nov. 1985; Amsterdam, Netherlands Abstract: The article reviews the motives people have for copying software and estimates the size of the revenue loss due to this. Commercial software protection schemes are reviewed and an account of microcomputer fundamentals is given for those with no prior knowledge. The techniques used by the software hacker are analyzed and a view is taken as to whether software protection is a myth or reality. Mullen, J.B.: "Online system reviews: controls and management concerns" In: Internal Auditor (Oct. 1985) vol.42, no.5; pp.77-82 Abstract: The generally accepted controls for online systems can be divided into three categories: preventive; detective; and corrective. The preventive controls include sign-on key and passwords. The periodic changing of these controls and other preventive access controls may prevent a hacker from learning the access system via observation. The detective controls include: line protocol, which defines the method of data transmission; front-end edits, routines within the online-application programs to detect errors in critical fields; and authorization files, online files containing user passwords. Corrective controls include: transaction logging; online training, security software; audit caveats; audit procedures and effectiveness. Rous, C.C. [Cerberus Comput. Security Inc., Toronto, Ont., Canada]: "What makes hackers tick? A computer owner's guide" In: CIPS Review (July-Aug. 1985) vol.9, no.4; pp.14-15 Abstract: Harmless pranksters or malicious wrongdoers? A computer security expert points out the differences and similarities-and offers preventative tips. A major concern of most data processors today is the threat of 'The Hacker'. This article attempts to de-mystify the breed by examining hacker psychology. The focus is on the distinction between frivolous and serious, or benign and malicious, hackers. While the distinction is valid, it is equally important to recognize the fundamental similarities between the two. In addition, no matter how benign the hacker who penetrates a system, if he or she has done so a more malicious one presumably could too. The author goes on to list the different types of hacker and provides a detailed analysis of each one. Finally, some lessons for owners and operators of computer systems are offered. Haight, R.C.: "My life as a hacker" Conference Title: ACC '84. Proceedings of the Australian Computer Conference; pp.205-12 Editor(s): Clarke, R. Publisher: Austr. Comput. Soc, Sydney, NSW, Australia; 1984; xx+672 pp. Conference Date: 4-9 Nov. 1984; Location: Sydney, NSW, Australia Abstract: The author has been programming and supervising programmers since 1961. His experiences and personal viewpoint are described. ------------------------------ End of Computer Underground Digest #4.22 ************************************