Tuesday, September 30, 2008

Michał Zalewski

prominent security researcher Michał Zalewski is a Hacker white hat Polish born the January 19th 1981. As of half of the Years 1990, it takes an active part in Bugtraq, and it writes programs for Unix (fenris, p0f). It was also one of the authors of the Argante system. Its research on the protocol TCP/IP aroused a great interest, just as its analyzes of the safety of the navigators Web. At the time of its stay to the the United States, he worked as a researcher within BindView Corporation, a specialized company in the computer security. After its return in Poland, it published a book, Silence one the Wire . One of its centers of interest is the Artificial intelligence. On Internet, it uses the pseudonym lcamtuf . He has been a frequent Bugtraq poster since mid-1990s and has authored a number of programs for Unix-like operating systems. During his years in the United States, he's been a researcher with BindView Corporation (a computer security firm). Zalewski authored a book, Silence on the Wire. Besides computer security, Michał's interests include artificial intelligence, applied mathematics, robotics, physics, chemistry, electronics, and photography. In October 2004, he won the Daniel Horn Obfuscated Challenge (Obfuscated Voting Contest).

Labels:

Johan Helsingius

Johan "Julf" Helsingius, born in 1961 in Helsinki, Finland, started and ran the Anon.penet.fi internet remailer. Anon.penet.fi was one of the most popular Internet remailers, handling 10,000 messages a day. The server was the first of its kind to use a password-protected PO box system for sending and receiving e-mails. In the eighties he was the system administrator for the central Finnish news node as well as one of the founding members of the Finnish UNIX User Group. In February 1995, the Church of Scientology called in Interpol and Finnish prosecutors in order to find out user an144108's real identity, an online critic of Scientology. Pressured by possible police measures which would have meant disclosing not one but all of the registered names in the database, Julf revealed the identity of the person Scientology was looking for. One year later, on August 30, 1996, he announced his remailer would shut down. The American Electronic Frontier Foundation (EFF), an Internet civil rights initiative, reported continuously on the incidents concerning anon.penet.fi. The EFF collected donations to cover legal costs should Helsingius be involved in a court case to settle whether Finnish law could force him to reveal the identity of anon.penet.fi users. The closing down of anon.penet.fi led to an outbreak of outrage and solidarity with Helsingius throughout the Internet in order to protect freedom on the Internet. Helsingius went on to help found EUnet in Finland and was part of the team of people that established the first Internet link to a Soviet country. Later, when EUnet was acquired by Qwest Communications and soon after moved into KPNQwest, Qwest's joint venture with KPN International, Julf became Chief Technology Officer (CTO) for KPNQwest. He is now an Internet entrepreneur and is serving on the board of various companies (e.g. BaseN, which is based in Finland). Helsingius lives in Amsterdam, the Netherlands. Helsingius has studied music and traveled widely. His interests include active sports, like mountain climbing, and aviation.

Labels:

Eric Corley

Eric Corley also known as Emmanuel Goldstein is the long standing publisher of 2600, The Hacker Quarterly and founder of the H.O.P.E. conferences. He has been part of the hacker community since the late '70s. Eric Corley, Born 1959, also frequently referred to by his pen name of Emmanuel Goldstein, is a figure in the hacker community. He and his non-profit organization 2600 Enterprises, Inc., together publish a magazine called 2600: The Hacker Quarterly, which Corley founded in 1984. Corley's pseudonym, Emmanuel Goldstein, is taken from the George Orwell book Nineteen Eighty-Four. In the book, Emmanuel Goldstein is the mysterious, and questionably existent leader of the opposition to Big Brother and the totalitarian state. In 1999, Corley was named as a defendant in Universal v. Reimerdes, the movie industry's attempt to squelch DeCSS. DeCSS is a computer program capable of decrypting content on a DVD video disc encrypted using the Content-Scrambling System (CSS). 2600.com had provided links to websites which contained the DeCSS code. Corley was the only defendant who chose to fight the industry in court. United States District Judge Lewis A. Kaplan ruled against Corley. In 2001, Mr. Corley released the full length documentary Freedom Downtime (which he wrote, directed and produced), which was about convicted hacker Kevin Mitnick and the Free Kevin movement, among other things. Furthermore, he was creative advisor to the movie Hackers. He was arrested on August 31, 2004 in New York City, while trying to videotape a demonstration against the Republican National Convention, in which Corley asserts he was not a participant. After being detained for more than 30 hours, he was charged with disorderly conduct. At a hearing on November 29, 2004, the city dropped all charges against Corley. Corley hosts a radio show Off The Hook on WBAI, and is concerned with legal matters related to social engineering and other issues affecting the hacker world. Corley also hosts a show on WUSB 90.1 FM called Off the Wall, a semi call-in show that discusses current world topics, and usually whatever is on his mind. He has done other radio shows there, including The Voice of Long Island, News Of The World and Brain Damage. Corley is an alumnus of Ward Melville High School and the State University of New York at Stony Brook, which is host to WUSB. He attended from 1977 to 1982, graduating with a degree in English. No stranger to the film world, Corley was featured as "The Outside Man" in the film Urchin,[2] completed August 2006. Corley has also testified[3] before the United States Congress. Mr. Corley recently wrote a book titled The Best of 2600: A Hacker Odyssey which was released July, 2008. The book consists of articles from the magazine 2600 set in chronological order to show the evolution of the internet and technology. one of corley mistaken such as: Judges Seek Answers on Computer Code as Free Speech In what may signal a heightened significance for a case testing the constitutionality of a 1998 digital copyright law, a panel of appeals court judges has asked both sides of a case to answer a list of 11 questions on whether computer code can qualify as free speech.The case pits the major Hollywood studios against Eric Corley, the publisher of an online magazine, 2600. A federal judge has prohibited Mr. Corley from distributing a computer program that can break the security lock on a digital videodisc. Once the lock is broken, an individual could copy the movie from the DVD to a computer hard drive or send it over the Internet.Lawyers for Mr. Corley have appealed, asserting that the judge's injunction violates his First Amendment right to free speech. The judge, Lewis Kaplan of Federal District Court in Manhattan, also prohibited Mr. Corley from placing a link on his World Wide Web site, www.2600.com, to other sites distributing the program.At the end of oral arguments earlier this month, the three-judge panel at the United States Court of Appeals for the Second Circuit told both sides to submit their final briefs on May 10. But in what appears to be an unusual move, this week the panel instead invited responses to 11 questions that seek to determine how to apply the First Amendment to computer code.The judges also asked for arguments on the validity of Judge Kaplan's test for determining whether banning an online publication from linking to other sites infringed on the right to free speech.''I've never seen this happen before,'' said one of Mr. Corley's lawyers, Martin Garbus of the law firm of Frankfurt Garbus Kurnit Klein & Selz. ''What's clear is that neither Judge Kaplan's decision nor the briefs nor the oral arguments have given them the answer to the questions they think are the most important.''Mr. Garbus said the detailed questions indicated that the three judges -- Jon O. Newman, Jose A. Cabrenes and Alvin W. Thompson -- were preparing to write a definitive opinion on the case, rather than limiting themselves to ruling on Judge Kaplan's decision. The questions also suggested that the judges were thinking beyond Mr. Corley's specific circumstances to how the ruling might apply more generally.The statute Mr. Corley is challenging, the Digital Millennium Copyright Act of 1998, criminalizes the distribution of any device that can be used to break a security code intended to protect digital movies, music and books from being copied. The computer program Mr. Corley distributed, known as DeCSS, is such a device.One question raised in the case is whether a computer program is more like a list of instructions -- traditionally protected by the First Amendment -- or a machine that simply happens to be built with speech, which would not fall under the scope of the First Amendment. Even if the judges decide that a computer program has elements of speech, they could rule that the government's interest in preventing the illegal copying of digital works is great enough to restrict it in certain instances. But Mr. Garbus said the more the panel sees the case in terms of the First Amendment, the better it will be for Mr. Corley. Charles Sims, a lawyer for the Motion Picture Association of America, the film industry trade group that sued Mr. Corley, said the questions were unremarkable. ''Any one law clerk can persuade any one judge to propound questions like these,'' said Mr. Sims, of the law firm of Proskauer Rose. ''I think it would be a mistake to read anything into them.'' the others corley mistake:
Web Site for Hackers Will Not Appeal
2 Copyright Cases Decided in Favor of Entertainment Industry
Judges Weigh Copyright Suit On Unlocking DVD Shield
Judge Halts Program to Crack DVD Film Codes
Free Speech Rights For Computer Code; Suit Tests Power of Media Concerns To Control Access to Digital Content
DVD SOFTWARE TRIAL ENDS
SOFTWARE; DVD PROGRAMMER SPEAKS
SOFTWARE; REMOVAL OF JUDGE SOUGHT
Movie Studios Seek to Stop DVD Copies
Trial Involving DVD Software And Copyrights Set to Begin

Labels:

John William Draper

The Phone Hacker
John William Draper John Draper was one of the first well known phone hackers, and the first famous "phone phreak". He was honorably discharged from the US Air Force in 1968 after a posting in Vietnam, and then became an engineer at the electronics company National Semiconductor. One day he noticed that some blind kids, named Dennie and Jimmie, were using the whistle from a "Cap'n Crunch" box to make free long distance telephone calls. They glued one of the holes shut in the whistle, and then blew it into the telephone. The modified whistle produced a pure 2600 Hz tone, which was the standard used by telephone electronics to signal that a call was over. When the telephone system heard the whistle it stopped all long distance charges, even though the call continued until one of the parties hung up. John popularized the use of this whistle, and became known by the hacker handle "Cap'n Crunch". John became infamous, and was arrested in May, 1972 for illegal use of the telephone company's system. He received probation, and then was arrested again in 1976, convicted on wire fraud charges, and spent four months in Lompoc Federal Prison in California. Since then, he has held a variety of positions and given interviews on his experiences during the earliest days of long distance hacking. was born May 5, 1811 in St. Helens, Merseyside, England to John Christopher Draper, a Wesleyan clergyman and Sarah (Ripley) Draper. He also had three sisters, Dorothy Catherine, Elizabeth Johnson, and Sarah Ripley. On June 23, he was baptized by the Wesleyan minister Jabez Bunting. His father often needed to move the family due to serving various congregations throughout England. John William was home tutored until 1822, when he entered Woodhouse Grove School. He returned to home instruction (1826) prior to entering University College London in 1829 On September 13, 1831, John William married Antonia Coetana de Paiva Pereira Gardner (c.1814-1870), the daughter of Daniel Gardner, a court physician to John VI of Portugal and Charlotte of Spain. Antonia was born in Brazil after the royal family fled Portugal with Napoleon's invasion. There is dispute as to the identity of Antonia's mother. Around 1830, she was sent with her brother Daniel to live with their aunt in London. Following his father's death in July, 1831, John William's mother was urged to move with her children to Virginia. John William hoped to acquire a teaching position at a local Methodist college. In 1832, the family settled in Mecklenburg County, Virginia 7 1/2 miles (12 km) east (on Virginia State Route 47) from Christiansville (now Chase City). Although he arrived too late to obtain the prospective teaching position, John William established a laboratory in Christiansville. Here he conducted experiments and published eight papers before entering medical school. His sister, Dorothy Catherine Draper provided finances through teaching drawing and painting for his medical education. In March 1836, he graduated from the University of Pennsylvania School of Medicine. That same year, he began teaching at Hampden-Sydney College in Virginia. He did important research in photochemistry, made portrait photography possible by his improvements (1839) on Louis Daguerre's process, and published a textbook on Chemistry (1846), textbook on Natural Philosophy (1847), textbook on Physiology (1866), and Scientific Memoirs (1878) on radiant energy. He was also the first person to take an astrophotograph; he took the first photo of the Moon which showed any lunar features in 1840. Then in 1843 he made daguerreotypes which showed new features on the moon in the visible spectrum. In 1850 he was making photo-micrographs and engaged his then teenage son, Henry, into their production. He developed the proposition in 1842 that only light rays that are absorbed can produce chemical change. It came to be known as the Grotthuss-Draper law when his name was teamed with a prior but apparently unknown promulgator Theodor Grotthuss of the same idea in 1817. Contributions to the discipline of history: He is well known also as the author of The History of the Intellectual Development of Europe (1862), applying the methods of physical science to history, a History of the American Civil War (3 vols., 1867-1870), and a History of the Conflict between Religion and Science (1874). The last book listed is among the most influential works on the conflict thesis, which takes its name from Draper's title. He served as the first president of the American Chemical Society between 1876 and 1877. in 1976, New York University founded the John W. Draper Interdisciplinary Master's Program in Humanities and Social Thought (Draper Program)in honour of his life-long commitment to interdisciplinary study. In 2001, Draper was designated an ACS National Historical Chemical Landmark in recognition of his role as the first president of American Chemical Society.

John "Captain Crunch" Draper

Formerly a Phone Phreak, now a dentally-challenged and odorous wreck, John Draper once gained fame (and prison sentences) from his skills in manipulating the telephone system. His "handle" came from the inclusion of a plastic whistle in Captain Crunch cereal in the 1960's which could, with proper manipulation, send out a control tone that would affect telephone systems of the time. Of course, Draper didn't actually discover that fact (the honor goes to a blind phone phreak named Joe Engressia) but he was quite happy to not go out of his way to correct people when they claimed he had.This propensity to snag the spotlight got John the first of several prison sentences because of the publication of an article called "Secrets of the Little Blue Box", which was about a telephone device favored by Draper and others to fuck majorly with Ma Bell. Ultimately, Draper went to federal prison three times related to phone fraud and other such charges. The years were not kind for Mr. Draper, as he now resembles how Jim Henson would have looked if he'd lived a little longer and ceased taking any care of himself.For reasons that entirely escape logic, Steve Wozniak (co-founder of Apple Computer) has always held a great amount of respect and honor for Draper, and first sought him out as a student in Berkeley in the 1970's. Given the plans to the Blue Box, Wozniak improved them greatly and started selling them around campus, using a portion of the earned money to fund work that became Apple Computer.Life didn't go as well for Draper; 1980 happened and he ceased doing anything interesting. In this new millenium, he has transformed himself into "Johnny D", creepy old guy that you see at raves in California. He's huge on hugs and if you're a cute enough boy, you might even get one of his special "energy transfer" massages! Turn-offs include cigarette smoke and food that requires chewing.

Labels:

The Hacker's Manifesto

The Conscience of a Hacker By The Mentor, 1986

Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They're all alike. but did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him?
I am a hacker, enter my world...
Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me... Damn underachiever. They're all alike. I'm in junior high or high school. I've listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I did it in my head..." Damn kid. Probably copied it. They're all alike. I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it's because I screwed it up. Not because it doesn't like me... Or feels threatened by me... Or thinks I'm a smart ass... Or doesn't like teaching and shouldn't be here... Damn kid. All he does is play games. They're all alike. And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. "This is it... this is where I belong..." I know everyone here... even if I've never met them, never talked to them, may never hear from them again... I know you all... Damn kid. Tying up the phone line again. They're all alike... You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert. This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals. Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike.

The Mentor

I also found this on the subject:

------------------------------- | The Ethics of Hacking | ------------------------------- written by Dissident

I went up to a college this summer to look around, see if it was where I wanted to go and whatnot. The guide asked me about my interests, and when I said computers, he started asking me about what systems I had, etc. And when all that was done, the first thing he asked me was "Are you a hacker?"

Well, that question has been bugging me ever since. Just what exactly is a hacker? A REAL hacker? For those who don't know better, the news media (and even comic strips) have blown it way out of proportion... A hacker, by wrong-definition, can be anything from a computer-user to someone who destroys everything they can get their evil terminals into. And the idiotic schmucks of the world who get a Commodore Vic-20 and a 300 baud modem (heh, and a tape drive!) for Christmas haven't helped hackers' reputations a damn bit. They somehow get access to a really cool system and find some files on hacking... Or maybe a friendly but not-too-cautious hacker helps the loser out, gives him a few numbers, etc. The schmuck gets onto a system somewhere, lucks up and gets in to some really cool information or programs, and deletes them. Or some of the more greedy ones capture it, delete it, and try to sell it to Libya or something. Who gets the blame?

The true hackers...that's who. So what is a true hacker? Firstly, some people may not think I am entirely qualified to say, mainly because I don't consider myself a hacker yet. I'm still learning the ropes about it, but I think I have a pretty damn good idea of what a true hacker is. If I'm wrong, let one correct me...

True hackers are intelligent, they have to be. Either they do really great in school because they have nothing better to do, or they don't do so good because school is terribly boring. And the ones who are bored aren't that way because they don't give a shit about learning anything. A true hacker wants to know everything. They're bored because schools teach the same dull things over and over and over, nothing new, nothing challenging. True hackers are curious and patient. If you aren't, how can you work so very hard hacking away at a single system for even one small PEEK at what may be on it? A true hacker DOESN'T get into the system to kill everything or to sell what he gets to someone else. True hackers want to learn, or want to satisfy their curiosity, that's why they get into the system. To search around inside of a place they've never been, to explore all the little nooks and crannies of a world so unlike the boring cess-pool we live in. Why destroy something and take away the pleasure you had from someone else? Why bring down the whole world on the few true hackers who aren't cruising the phone lines with malicious intent? True hackers are disgusted at the way things are in this world. All the wonderful technology of the world costs three arms and four legs to get these days. It costs a fortune to call up a board in an adjoining state! So why pay for it? To borrow something from a file I will name later, why pay for what could be "dirt cheap if it wasn't run by profiteering gluttons"? Why be forced, due to lack of the hellacious cash flow it would require to call all the great places, to stay around a bunch of schmuck losers in your home town? Calling out and entering a system you've never seen before are two of the most exhilarating experiences known to man, but it is a pleasure that could not be enjoyed were it not for the ability to phreak...

True hackers are quiet. I don't mean they talk at about .5 dB, I mean they keep their mouths shut and don't brag. The number one killer of those the media would have us call hackers is bragging. You tell a friend, or you run your mouth on a board, and sooner or later people in power will find out what you did, who you are, and you're gone...I honestly don't know what purpose this file will serve, maybe someone somewhere will read it, and know the truth about hackers. Not the lies that the ignorant spread. To the true hackers out there, I hope I am portraying what you are in this file... If I am not, then I at least am saying what I think a true hacker should be. And to those wanna-be's out there who like the label of "HACKER" being tacked onto them, grow up, would ya?

Oh yeah, the file I quoted from... It has been done (at least) two times. "The Hacker's Manifesto" or "Conscience of a Hacker" are the two names I've seen it given. (A file by itself, and part of an issue of Phrack) Either way, it was written by The Mentor, and it is absolutely the best thing ever written on the subject of hackers. Read it, it could change your life. Spread it around, but don't change anything please. . .

Friday, September 26, 2008

Vladimir Levin

The commonly known story

Vladimir Levin, a biochemistry graduate of St. Petersburg's Tekhnologichesky University in mathematics, led a Russian hacker group in the first publicly revealed international bank robbery over a network. Levin used a laptop computer in London, England, to access the Citibank network, and then obtained a list of customer codes and passwords. Then he logged on 18 times over a period of weeks and transferred $3.7 million through wire transfers to accounts his group controlled in the United States, Finland,the Netherlands, Germany, and Israel. Citibank later retrieved all but about $400,000. When Citibank noticed the transfers, they contacted the authorities, who tracked Levin down and arrested him at a London airport in March, 1995. He fought extradition for 30 months, but lost, and was transferred to the US for trial. He was convicted and sentenced to three years in jail, and ordered to pay Citibank $240,015. Four members of Levin's group pleaded guilty to conspiracy to commit bank fraud, and served various sentences. According to the coverage, in 1994 Levin accessed the accounts of several large corporate customers of Citibank via their dial-up wire transfer service (Financial Institutions Citibank Cash Manager) and transferred funds to accounts set up by accomplices in finland, the United states, the netherlands, germany and israel. Three of his accomplices were arrested attempting to withdraw funds in Tel Aviv, Rotterdam Interrogation of his accomplices directed investigations to Levin, then working as a computer programmer for St.Petersburg based computer company AO Saturn. However, at the time, there were no extradition treaties between the US and Russia covering these crimes. In March 1995 Levin was apprehended at London's stansted airport by scotland yard officers when making an interconnecting flight from moscow. Levin's lawyers fought against extradition to the US, but their appeal was rejected by the house of Lords in June 1997. Levin was delivered into U.S. custody in September 1997, and tried in the United States District Court for the Southern District of New York. In his plea agreement he admitted to only one count of conspiracy to and San francisco.defraud and to stealing US$3.7 million. In February 1998 he was convicted and sentenced to three years in jail, and ordered to make restitution of US$240,015. Citibank claimed that all but US$400,000 of the stolen US$10.7 million had been recovered. After the compromise of their system, Citibank updated their systems to use Dynamic Encryption Card, a physical authentication token. However, it was not revealed how Levin had gained access to the relevant account access details. Following his arrest in 1995, anonymous members of hacking groups based in St. Petersburg claimed that Levin did not have the technical abilities to break into Citibank's systems, that they had cultivated access to systems deep within the bank's network, and that these access details had been sold to Levin for $100.

The revelation a decade later

In 2005 an alleged member of the former St. Petersburg hacker group, claiming to be one of the original Citibank penetrators, published under the name ArkanoiD a memorandum on popular Provider.net.ru website dedicated to telecom market. According to him, Levin was not actually a scientist (mathematician, biologist or the like) but a kind of ordinary system administrator who managed to get hands on the ready data about how to penetrate in Citibank machines and then exploit them. ArkanoiD emphasized all the communications were carried over network and the internet was not involved. ArkanoiD's group in 1994 found out Citibank systems were unprotected and it spent several weeks examining the structure of the bank's USA-based networks remotely. Members of the group played around with systems' tools (e.g. were installing and running games) and were unnoticed by the bank's staff. Penetrators did not plan to conduct a robbery for their personal safety and stopped their activities at some time. One of them later handed over the crucial access data to Levin (reportedly for the stated $100).

Labels:

Loyd Blankenship - The Mentor

born 1965, The Hacker's Manifesto was written by The Mentor. I found it early in high school. I haven't found a document before or since that I feel describes me better. It is presented below. The Mentor wrote it shortly after his arrest. The Hacker's Manifesto by: The Mentor aka Loyd Blankenship Copyright (C) 1986
Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering." "Damn kids. They're all alike." But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a hacker, enter my world. Mine is a world that begins with school. I'm smarter than most of the other kids, this crap they teach us bores me. "Damn underachiever. They're all alike." I'm in junior high or high school. I've listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I did it in my head." "Damn kid. Probably copied it. They're all alike." I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it's because I screwed it up. Not because it doesn't like me, or feels threatened by me, or thinks I'm a smart ass, or doesn't like teaching and shouldn't be here. Damn kid. All he does is play games. They're all alike. And then it happened... a door opened to a world... rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. "This is it... this is where I belong..." I know everyone here... even if I've never met them, never talked to them, may never hear from them again... I know you all... Damn kid. Tying up the phone line again. They're all alike... You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert. This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals. Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike.

Labels:

Tsutomu Shimomura

To make a long story short, Shimomura outhacked and outsmarted Kevin Mitnick, possibly the nation's most infamous cracker/phreaker, in early 1994. This was a feat even the entire FBI had been unable to accomplish. Born in Japan, Shimomura grew up in Princeton, New Jersey. Currently he is a senior fellow at the San Diego Supercomputer Center and he grapples with problems in scientific fields as diverse as computational security and computer physics. He went to the University of California at San Diego to become part of the physics department as a full-time research scientist in 1989. He has actually studied physics with well-known Nobel Laureate Richard Feynman at the California Institute of Technology (CALTECH). Mitnick made a big mistake by messing with Tsutomu. The whole objective of hacking into his computer was to get some rare files, codes and software with which to hack into cellphones. If he had succeeded, he would be able to gain access to any computer in the world and be fully untraceable. Mitnick eventually decided that the respected security expert Tsutomu Shimomura was the guy with the tools. This particularly foolish venture shows that he was all too confident about his abilities. Apart from being a professional hacker who was just as – if not more – talented than Mitnick, Tsutomu was a pure “white hat” with a lot of professional pride. He also had the full support of the law. In December 1994, the die was cast and Tsutomu Shimomura's elaborate computer system was broken into. Colleagues informed him that someone had stolen hundreds of software programs and files from his workstation. Even before having any idea who did it, Shimomura took it as a personal challenge to bring down the perpetrator. The computer security expert worked on a tip to track the thief through the WELL. A labyrinthine trail and a fast-paced and hi-tech struggle worthy of being written in a book eventually led to an apartment complex in Raleigh, N.C., where FBI agents apprehended Mitnick. Indeed, in subsequent years, a book was written regarding this incident. Takedown: The Pursuit and Capture of America's Most Wanted Computer Outlaw - By the Man Who Did It (Hyperion, January 1996) is Shimomura's first-person account of the search, written with the help of New York Times reporter John Markoff. Markoff has also aided in Mitnick’s capture. currently, Shimomura works in the area of computer security research. He has consulted with a number of government agencies regarding a variety of issues related to security and computer crime. In 1992 he testified before a Congressional Committee chaired by Representative Edward Markey on issues regarding the lack of privacy and security in cellular telephones, possibly an afterthought following Mitnick’s arrest. He is currently an active inline skater residing in San Diego. He is also an avid fan of cross-country skiing.

kevin poulsen

The Most Idolized Hacker

One of the most feared yet idolized hackers of all time, Kevin Poulsen is considered by many to be a hacking prodigy. His youth was spent using his talents strictly for juvenile fun and the pursuit of knowledge. But the deeper he delved into hacking, the further he went to the dark side. Eventually, his criminal exploits led to the first ever espionage case leveled against a hacker. Poulsen, who likes to call himself the “Dark Dante,” was born in 1975 in Pasadena, California. He had been a brilliant teenage hacker and the focuses of his life were his computer talents. He was extremely well known in the hacker society as one whose actions were reminiscent of hi-tech movies like “War Games.” This was a 1983 movie which highly glorified the prowess of the typical hacker. However, Kevin was able to prove himself capable of matching even the standards of the fictional villains in the movie. Fellow hackers were spellbound. “Kevin is extremely good at software and brave at taking chances,” said one former colleague. “Kevin was a 24-hour-a-day hacker.” Poulsen’s forte was cracking otherwise impregnable government and military systems. He specialized at this to such an extent that the defense industry even offered him a dream job as a security-cleared consultant. His job was testing the integrity of Pentagon security systems. From that point on he led two separate lives; at day, he was a “white hat” who hacked to improve government secret protection systems, by night, he was a “black hat”, hacking for personal gain and his intrusions gradually became increasingly criminal. He was wrong, however, to think that he was completely beyond the arm of the law. Things moved quickly once Poulsen’s other life was discovered. In November 1989, he was charged on as many as 19 counts of fraud, conspiracy, money laundering and wiretapping. All this in total could have given him a whopping 37 years in jail. But he had other plans. He took off and was beyond the long arm of the law for as long as 17 months. While on the run, Poulsen dug deep into Pacific Bell’s giant switching networks so as to explore and exploit nearly every element of its computers. His adventures led to a well-known incident with KIIS-FM, a radio station, in Los Angeles. As a result of this incident, he became even more popular within the hacker cult. Each week, the station ran the “Win a Porsche by Friday” contest. In this contest, a $50,000 Porsche is awarded to the 102nd caller who calls after a particular sequence of songs announced earlier in the day is played. On the morning of June 1, 1990, businessmen, students, housewives, desperados, mere contest fanatics etc. jammed all the telephone lines with their auto-dialers and car phones. But Poulsen played the game differently. With the help of his almost equally talented accomplices stationed at their own computers, he seized full control of the station’s 25 telephone lines, effectively blocking out all calls excluding their own. With careless ease, he made the 102nd call and collected his Porsche. His exploits did not end there. It is known that he wiretapped a number of intimate phone calls of a Hollywood actress, possibly with the intention of blackmailing her. He even conspired to steal classified military orders, and went so far as to crack an Army computer and snoop into an FBI investigation of former Philippine president Ferdinand Marcos. Eventually the authorities caught up with Poulsen. While raiding his house and car, the FBI found a treasure trove of electronic devices. According to an agent, these would have “put James Bond to shame.” Even while in custody, he made several attempts to hack into and sabotage the FBI investigation so as to destroy all the evidence gathered against him. he court later amended Poulsen’s original 19 counts of computer crimes to include charges of espionage and possession of classified documents. This was after evidence of stolen classified material was found in a locker Poulsen had used but had not paid rent for. He pleaded guilty in July 1994 in the U.S. District Court at Los Angeles to seven counts of mail, wire and computer fraud, money laundering and obstruction of justice. This was in connection with the KIIS-FM Radio Station incident and others. Eventually, he was sentenced on April 10, 1995 to 51 months (more than 4 years) in prison and over $56,000 in restitution to all the radio stations he scammed. It was the longest and most severe sentence ever handed down for a cybercriminal. Interestingly, he was also punished for an additional 3 years by being forbidden from touching a computer. All this was punishment enough according to him as he is now a fully reformed and “penitent" journalist, according to him, and he now serves as editorial director for Security Focus.

Most AOL Instant Messenger accounts are up for grabs in hacker gold rush
Hackers exploiting a loophole in America Online's signup process have begun taking their pick of AOL Instant Messenger (AIM) accounts, hijacking them virtually at will. The technique emerged early this month on AOL-Files, a meeting place for AOL hackers, where it was born as a harmless hack that allows users to establish AOL accounts with screen names that are -- unconventionally -- indented. The more sinister applications of the bug became clear later. "It wasn't until recently that anyone noticed that it could be used to hijack Instant Messenger accounts," says Adrian Lamo, founder of Inside-AOL and a longtime chronicler of AOL's foibles. "And it only became a significant problem in the past week." America Online uses the same screen names across its subscription service and its instant messaging system. The bug is in the way the system checks that a new AOL subscriber's chosen screen name doesn't conflict with existing AIM accounts. By manipulating the nuts and bolts of AOL's signup form with tools long available on the net, hackers can set the value of a two-character variable that's sent immediately before the new screen name in the signup process. The signup process ignores that variable, called uni_next_atom_typed, while checking the screen name for a conflict. But the process later prepends the variable to the screen name when actually creating the account. A hacker exploits this, for example, by setting uni_next_atom_typed to "Jo" when establishing an account with the screen name "hn Doe." If "hn Doe" is available on both AOL and AIM, than the system will set up the account for "John Doe" -- even if "John Doe" is already in use. The hacker can use the new AOL account to access John Doe's personal "buddy list," or to change John Doe's password and take over the AIM account, masquerading as the former owner. Credit Cards Abused Hackers initially discovered that they could set uni_next_atom_typed to two blank spaces and create indented screen names on new AOL accounts. When it developed that the same technique could be used to take over AIM accounts, something of a screen name gold rush ensued among a mostly juvenile group of hackers eagerly snatching up the most attractive names, according to Lamo. Because AOL's sign-up process requires a valid credit card number, many of these hackers have taken up credit card fraud to feed their screen name habit. "People trade desirable screen names for [stolen] credit card numbers, which are then used to make more desirable screen names," Lamo says. "It's a vicious cycle." Once an AOL account exists under an AIM screen name it cannot be hijacked again--although a separate loophole allows hackers to create AOL accounts that automatically disappear from the system shortly after creation. Users of AOL's subscription service are not vulnerable. Because of the nature of the bug, AIM users with screen names that, minus the first two letters, are already taken are also immune: i.e., if Hn Doe has an AIM account, then John Doe's is safe. AIM is the most popular of the Internet instant messaging services, with 21.5 million users in the U.S. alone, according to Internet traffic measuring company Media Metrix. In July, AOL reported that AIM had surpassed 61 million registered users worldwide, 20 million of whom were active. AOL did not return repeated phone calls on the subject. Tracking the blackout bug A number of factors and failings came together to make the August 14th northeastern blackout the worst outage in North American history. One of them was buried in a massive piece of software compiled from four million lines of C code and running on an energy management computer in Ohio. To nobody's surprise, the final report on the blackout released by a U.S.-Canadian task force Monday puts most of blame for the outage on Ohio-based FirstEnergy Corp., faulting poor communications, inadequate training, and the company's failure to trim back trees encroaching on high-voltage power lines. But over a dozen of task force's 46 recommendations for preventing future outages across North America are focused squarely on cyberspace. That may have something to do with the timing of the blackout, which came three days after the relentless Blaster worm began wreaking havoc around the Internet -- a coincidence that prompted speculation at the time that the worm, or the traffic it was generating in its efforts to spread, might have triggered or exacerbated the event. When U.S. and Canadian authorities assembled their investigative teams, they included a computer security contingent tasked with looking specifically at any cybersecurity angle on the outage. In the end, it turned out that a computer snafu actually played a significant role in the cascading blackout -- though it had nothing to do with viruses or cyber terrorists. A silent failure of the alarm function in FirstEnergy's computerized Energy Management System (EMS) is listed in the final report as one of the direct causes of a blackout that eventually cut off electricity to 50 million people in eight states and Canada. The alarm system failed at the worst possible time: in the early afternoon of August 14th, at the critical moment of the blackout's earliest events. The glitch kept FirstEnergy's control room operators in the dark while three of the company's high voltage lines sagged into unkempt trees and "tripped" off. Because the computerized alarm failed silently, control room operators didn't know they were relying on outdated information; trusting their systems, they even discounted phone calls warning them about worsening conditions on their grid, according to the blackout report. "Without a functioning alarm system, the [FirstEnergy] control area operators failed to detect the tripping of electrical facilities essential to maintain the security of their control area," reads the report. "Unaware of the loss of alarms and a limited EMS, they made no alternate arrangements to monitor the system." With the FirstEnergy control room blind to events, operators failed to take actions that could have prevented the blackout from cascading out of control. In the aftermath, investigators quickly zeroed in on the Ohio line-tripping as a root cause. But the reason for the alarm failure remained a mystery. Solving that mystery fell squarely on the corporate shoulders of GE Energy, makers of the XA/21 EMS in use at FirstEnergy's control center. According to interviews, a half-a-dozen workers at GE Energy began working feverishly with the utility and with energy consultants from KEMA Inc. to figure out what went wrong. The XA/21 isn't based on Windows, so it couldn't have been infected by Blaster, but the company didn't immediately rule out the possibility that the worm somehow played a role in the alarm failure. "In the initial stages, nobody really knew what the root cause was," says Mike Unum, manager of commercial solutions at GE Energy. "We spent a considerable amount of time analyzing that, trying to understand if it was a software problem, or if -- like some had speculated -- something different had happened." Sometimes working late into the night and the early hours of the morning, the team pored over the approximately one-million lines of code that comprise the XA/21's Alarm and Event Processing Routine, written in the C and C++ programming languages. Eventually they were able to reproduce the Ohio alarm crash in GE Energy's Florida laboratory, says Unum. "It took us a considerable amount of time to go in and reconstruct the events." In the end, they had to slow down the system, injecting deliberate delays in the code while feeding alarm inputs to the program. About eight weeks after the blackout, the bug was unmasked as a particularly subtle incarnation of a common programming error called a "race condition," triggered on August 14th by a perfect storm of events and alarm conditions on the equipment being monitored. The bug had a window of opportunity measured in milliseconds. "There was a couple of processes that were in contention for a common data structure, and through a software coding error in one of the application processes, they were both able to get write access to a data structure at the same time," says Unum. "And that corruption led to the alarm event application getting into an infinite loop and spinning." Testing for Flaws"This fault was so deeply embedded, it took them weeks of poring through millions of lines of code and data to find it," FirstEnergy spokesman Ralph DiNicola said in February. After the alarm function crashed in FirstEnergy's controls center, unprocessed events began to cue up, and within half-an-hour the EMS server hosting the alarm process folded under the burden, according to the blackout report. A backup server kicked-in, but it also failed. By the time FirstEnergy operators figured out what was going on and restarted the necessary systems, hours had passed, and it was too late. This week's blackout report recommends that the U.S. and Canadian governments require all utilities using the XA/21 to check in with GE Energy to ensure "that appropriate actions have been taken to avert any recurrence of the malfunction." GE Energy says that's a moot point: though the flaw has not manifested itself elsewhere, last fall the company gave its customers a patch against the bug, along with installation instructions and a utility to repair any alarm log data corrupted by the glitch. According to Unum, the company sent the package to every XA/21 customer -- more than 100 utilities around the world -- and offered to help install it, "irrespective of their current support status," he says. The company did everything it could, says Unum. "We text exhaustively, we test with third parties, and we had in excess of three million online operational hours in which nothing had ever exercised that bug," says Unum. "I'm not sure that more testing would have revealed that. Unfortunately, that's kind of the nature of software... you may never find the problem. I don't think that's unique to control systems or any particular vendor software." Tom Kropp, manager of the enterprise information security program at the Electric Power Research Institute, an industry think tank, agrees. He says faulty software may always be a part of the electric grid's DNA. "Code is so complex, that there are always going to be some things that, no matter how hard you test, you're not going to catch," he says. "If we see a system that's behaving abnormally well, we should probably be suspicious, rather than assuming that it's behaving abnormally well." But Peter Neumann, principal scientist at SRI International and moderator of the Risks Digest, says that the root problem is that makers of critical systems aren't availing themselves of a large body of academic research into how to make software bulletproof. "We keep having these things happen again and again, and we're not learning from our mistakes," says Neumann. "There are many possible problems that can cause massive failures, but they require a certain discipline in the development of software, and in its operation and administration, that we don't seem to find. ... If you go way back to the AT&T collapse of 1990, that was a little software flaw that propagated across the AT&T network. If you go ten years before that you have the ARPAnet collapse. "Whether it's a race condition, or a bug in a recovery process as in the AT&T case, there's this idea that you can build things that need to be totally robust without really thinking through the design and implementation and all of the things that might go wrong," Neumann says. Despite the absence of cyber terrorism in the blackout's genesis, the final report includes 13 recommendations focused squarely on protecting critical power-grid systems from intruders. The computer security prescriptions came after task force investigators discovered that the practices of some of the utility companies involved in the blackout created "potential opportunities for cyber system compromise" of EMS computers. "Indications of procedural and technical IT management vulnerabilities were observed in some facilities, such as unnecessary software services not denied by default, loosely controlled system access and perimeter control, poor patch and configuration management, and poor system security documentation," reads the report. Among the recommendations, the task force says cyber security standards established by the North America Electric Reliability Council, the industry group responsible for keeping electricity flowing, should be vigorously enforced. Joe Weiss, a control system cyber security consultant at KEMA, and one of the authors of the NERC standards, says that's a good start. ""The NERC cyber security standards are very basic standards," says Weiss. "They provide a minimum basis for due diligence." But so far, it seems software failure has had more of an effect on the power grid than computer intrusion. Nevertheless, both Weiss and EPRI's Kropp believe that the final report is right to place more emphasis on cybersecurity than software reliability. "You don't try to look for something that's going to occur very, very, very infrequently," says Weiss. "Essentially, a blackout like this was something like that. There are other issues that are higher probability that need to be addressed."

Labels:

Adrian Lamo; Hacks by Day Squats by Night

“ I have always said that actions have consequences, and this is something that I was always aware might happen. ” Lamo has been charged in New York under Title 18 U.S.C. 1030 and 1029, according to deputy federal public defender Mary French, who says she's spoken with one of the FBI agents that were searching for Lamo. The federal laws prohibit unauthorized access to a protected computer, and illegal possession of stolen "access devices" -- a term that encompasses passwords, credit card numbers, and the like. French did not know what the specific allegations were, because the charging document is sealed. Two agents visited the home of Lamo's parents, Mario and Mary Lamo, near Sacramento, California, Thursday afternoon, Mary Lamo said Thursday. "They wouldn't tell us anything but that they had an arrest warrant and they wanted to come in," she adds. When she demurred, the agents vowed to return with a search warrant, then began overtly watching the house from parked cars, she said. "They followed me when I went out, so they're not hiding it." Friday morning, a spokesperson for the U.S. Attorney's office in New York confirmed that the office had an open case file on Lamo, but otherwise declined to comment. Lamo frequently stays at his parents' home, but he was not there at the time of the FBI's visit, and has not returned since. His mother contacted the Federal Public Defender's office in Sacramento, which has agreed to handle his surrender. "If he's arrested or turns himself in in this district, we will represent him for the initial proceedings," French said Friday morning. "I haven't had any direct contact with him yet." In a telephone interview Thursday, Lamo said he was in California, but did not plan to turn himself in until after conferring with the attorney. The hacker was quick-witted and seemingly in good humor, with only a trace of nervousness in his voice. He quipped about the proper etiquette of being arrested by the FBI, and suggested jokingly that SecurityFocus should purchase the publication rights to a favorite photo. He said he was in the company of a camera crew producing a television documentary on hackers. "I have always said that actions have consequences, and this is something that I was always aware might happen," said Lamo. "I don't intend to deny anything that I have done, but I do intend to defend myself vigorously." The 22-year-old Lamo has become famous for publicly exposing gaping security holes at large corporations, then voluntarily helping the companies fix the vulnerabilities he exploited -- sometimes visiting their offices or signing non-disclosure agreements in the process. Until now, his cooperation and transparency have kept him from being prosecuted. Lamo's hacked Excite@Home, Yahoo, Blogger, and other companies, usually using nothing more than an ordinary Web browser. Some companies have even professed gratitude for his efforts: In December, 2001, Lamo was praised by communications giant WorldCom after he discovered, then helped close, security holes in their intranet that threatened to expose the private networks of Bank of America, CitiCorp, JP Morgan, and others. Lamo believes the arrest warrant is for his most high-profile hack. Early last year he penetrated the New York Times, after a two-minute scan turned up seven misconfigured proxy servers acting as doorways between the public Internet and the Times private intranet, making the latter accessible to anyone capable of properly configuring their Web browser. Once inside, Lamo exploited weaknesses in the Times password policies to broaden his access, eventually browsing such disparate information as the names and Social Security numbers of the paper's employees, logs of home delivery customers' stop and start orders, instructions and computer dial-ups for stringers to file stories, lists of contacts used by the Metro and Business desks, and the "WireWatch" keywords particular reporters had selected for monitoring wire services. He also accessed a database of 3,000 contributors to the Times op-ed page, containing such information as the social security numbers for former U.N. weapons inspector Richard Butler, Democratic operative James Carville, ex-NSA chief Bobby Inman, Nannygate veteran Zoe Baird, former secretary of state James Baker, Internet policy thinker Larry Lessig, and thespian activist Robert Redford. Entries with home telephone numbers include Lawrence Walsh, William F. Buckley Jr., Jeanne Kirkpatrick, Rush Limbaugh, Vint Cerf, Warren Beatty and former president Jimmy Carter. In February, 2002, Lamo told the Times of their vulnerability through a SecurityFocus reporter. But this time, no one was grateful, and by May federal prosecutors in New York had begun an investigation. "I think this is unsporting of the New York Times," Lamo said Thursday. Lamo's mother said she has no opinion on her son's exploits. She's just worried about him. "I don't really know much of anything about computers," says Mary Lamo. "He's my son. Right now, all I can worry about is how I can help him." "I hope there will be a time when Adrian can do positive things that everyone agrees are positive," she adds.

NEW YORK -- Last January, Adrian Lamo awoke in the abandoned building near Philadelphia's Ben Franklin Bridge where he'd been squatting, went to a public computer with an Internet connection, and found a leak in the Excite@Home's supposedly airtight company network. Just another day in the life of a young man who may be the world's most famous homeless hacker. More than a year later, Lamo is becoming widely known in hacker circles for tiptoeing into the networks of companies like Yahoo and WorldCom -- and then telling the corporate guys how he got there. Administrators at several of the companies he's hacked have called Lamo brilliant and "helpful" for helping fix these gaps in network defenses.

Critics blast Lamo as a charlatan who preens for the spotlight.

"(Is) anyone impressed with Lamo's skills(?) He is not doing anything particularly amazing. He has not found some new security concept. He is just looking for basic holes,"

wrote one poster to the SecurityFocus website. To such barbs, Oxblood Ruffian, a veteran of the hacker group Cult of the Dead Cow, replied, "It's like dancing. Anyone can dance. But not many people can dance like Michael Jackson." Lamo's latest move: using a back door in The New York Times' intranet to snag the home phone numbers of over 3,000 Op-Ed contributors, including Vint Cerf, Warren Beatty and Rush Limbaugh. Although Lamo (pronounced LAHM-oh) did nothing more mischievous with the information than include himself in its roster of experts, the Times is considering pressing charges, according to spokeswoman Christine Mohan. Hacking is a federal crime, currently punishable by five years in jail. Prison would be an ironic twist for Lamo -- it'd be the first time in years he would have a steady place to stay. Living out of a backpack, getting online from university libraries and Kinko's laptop stations, the slightly built, boyish Lamo wanders the country's coasts by Amtrak and Greyhound bus.

"I have a laptop in Pittsburgh, a change of clothes in D.C. It kind of redefines the term multi-jurisdictional," Lamo said with a mild stutter. "It'll be hard to get warrants for it all."

He spends most of his nights on friends' couches. But when hospitality wears thin, he takes shelter in city skeletons -- like the crumbling Philadelphia restaurant supply shop, or the old officers' quarters at the Presidio in San Francisco. Lamo said he found his way into the colonial-era military complex by randomly trying doorknobs until he found one that rattled. It's a pretty good metaphor, he adds, for how he hacks. Company networks use proxy software to let internal employees out to the public Internet. It's a one-way door, essentially. But if proxy servers aren't configured correctly, these doors can swing both ways, allowing outsiders in through the corporate firewall, said Chris Wyspoal, an executive with security firm @Stake. Lamo peeks around for these swinging doors and lets himself in with widely used hacker tools. It's not technically complex at all. Lamo found an open proxy on The New York Times' network in less than two minutes. So it's understandable that many who consider themselves black belts in the computer arts regard Lamo's notoriety with more than a bit of skepticism. A poster to SecurityFocus' site complains, "The only thing 'hacked' here is the media." "The only way to get a publicly traded company to recognize that they're acting retarded is to kick 'em in the nuts. And you do that through the media," wrote Ira Wing, 29, who's been one of Lamo's closest confidants since the mid-1990s when the two met at PlanetOut, the gay and lesbian media firm where Wing worked and Lamo volunteered. Lamo had long tried to point out security flaws to corporate network administrators, Wing said. But even after his first well-publicized intrusion -- a late-2000 pilfering of AOL instant messenger accounts -- the suits weren't about to pay attention to some hacker kid who didn't even have a high school diploma. Despite his good intentions, Lamo may still go to jail for what he's doing.

Labels:

Thursday, September 25, 2008

Kevin Mitnick - The Most Wanted Hacker

Kevin Mitnick

An excerpt from Takedown.

Mitnick the legend Who is Kevin Mitnick? The picture that emerged after his arrest in Raleigh, N.C. last February was of a 31-year old computer programmer, who had been given a number of chances to get his life together but each time was seduced back to the dark side of the computer world. Kevin David Mitnick reached adolescence in suburban Los Angeles in the late 1970s, the same time the personal computer industry was exploding beyond its hobbyist roots. His parents were divorced, and in a lower-middle-class environment that lacked adventure and in which he was largely a loner and an underachiever, he was seduced by the power he could gain over the telephone network. The underground culture of phone phreaks had already flourished for more than a decade, but it was now in the middle of a transition from the analog to the digital world. Using a personal computer and modem it became possible to commandeer a phone company's digital central office switch by dialing in remotely, and Kevin became adept at doing so. Mastery of a local telephone company switch offered more than just free calls: It opened a window into the lives of other people to eavesdrop on the rich and powerful, or on his own enemies. Mitnick soon fell in with an informal phone phreak gang that met irregularly in a pizza parlor in Hollywood. Much of what they did fell into the category of pranks, like taking over directory assistance and answering operator calls by saying, "Yes, that number is eight-seven-five-zero and a half. Do you know how to dial the half, ma'am?" or changing the class of service on someone's home phone to payphone status, so that whenever they picked up the receiver a recorded voice asked them to deposit twenty cents. But the group seemed to have a mean streak as well. One of its members destroyed files of a San Francisco-based computer time-sharing company, a crime that went unsolved for more than a year -- until a break-in at a Los Angeles telephone company switching center led police to the gang. The case was actually solved when a jilted girlfriend of one of the gang went to the police... That break-in occurred over Memorial Day weekend in 1981, when Kevin and two friends decided to physically enter Pacific Bell's COSMOS phone center in downtown Los Angeles. COSMOS, or Computer System for Mainframe Operations, was a database used by many of the nation's phone companies for controlling the phone system's basic recordkeeping functions. The group talked their way past a security guard and ultimately found the room where the COSMOS system was located. Once inside they took lists of computer passwords, including the combinations to the door locks at nine Pacific Bell central offices and a series of operating manuals for the COSMOS system.. To facilitate later social engineering they planted their pseudonyms and phone numbers in a rolodex sitting on one of the desks in the room. With a flourish one of the fake names they used was "John Draper," who was an actual computer programmer also known as the legendary phone phreak, Captain Crunch, the phone numbers were actually misrouted numbers that would ring at a coffee shop pay phone in Van Nuys. The crime was far from perfect, however. A telephone company manager soon discovered the phony numbers and reported them to the local police, who started an investigation. The case was actually solved when a jilted girlfriend of one of the gang went to the police, and Kevin and his friends were soon arrested. The group was charged with destroying data over a computer network and with stealing operator's manuals from the telephone company. Kevin, 17 years old at the time, was relatively lucky, and was sentenced to spend only three months in the Los Angeles Juvenile Detention Center, followed by a year's probation. A run-in with the police might have persuaded most bright kids to explore the many legal ways to have computer adventures, but Mitnick appeared to be obsessed by some twisted vision. Rather than developing his computer skills in creative and productive ways, he seemed interested only in learning enough short-cuts for computer break-ins and dirty tricks to continue to play out a fantasy that led to collision after collision with the police throughout the 1980s. He obviously loved the attention and the mystique his growing notoriety was bringing. Early on, after seeing the 1975 Robert Redford movie Three Days of the Condor, he had adopted Condor as his nom de guerre. In the film Redford plays the role of a hunted CIA researcher who uses his experience as an Army signal corpsman to manipulate the phone system and avoid capture. Mitnick seemed to view himself as the same kind of daring man on the run from the law. After he was released, he obtained the license plate "X HACKER" for his Nissan... His next arrest was in 1983 by campus police at the University of Southern California, where he had gotten into minor trouble a few years earlier, when he was caught using a university computer to gain illegal access to the ARPAnet. This time he was discovered sitting at a computer in a campus terminal room, breaking into a Pentagon computer over the ARPAnet, and was sentenced to six months at the California Youth Authority's Karl Holton Training School, a juvenile prison in Stockton, California. After he was released, he obtained the license plate "X HACKER" for his Nissan, but he was still very much in the computer break-in business. Several years later he went underground for more than a year after being accused of tampering with a TRW credit reference computer; an arrest warrant was issued, but it later vanished from police records without explanation. By 1987, Mitnick seemed to be making an effort to pull his life together, and he began living with a woman who was taking a computer class with him at a local vocational school. After a while, however, his obsession drew him back, and this time his use of illegal telephone credit card numbers led police investigators to the apartment he was sharing with his girlfriend in Thousand Oaks, California. He was convicted of stealing software from the Santa Cruz Operation, a California software company, and in December 1987, he was sentenced to 36 months probation. That brush with the police, and the resultant wrist slap, seemed only increase his sense of omnipotence. In 1987 and 1988, Kevin and a friend, Lenny DiCicco, fought a pitched electronic battle against scientists at Digital Equipment's Palo Alto research laboratory. Mitnick had become obsessed with obtaining a copy of Digital's VMS minicomputer operating system, and was trying to do so by gaining entry to the company's corporate computer network, known as Easynet. The computers at Digital's Palo Alto laboratory looked easiest, so every night with remarkable persistence Mitnick and DiCicco would launch their modem attacks from a small Calabasas, California company where DiCicco had a computer support job. Although Reid discovered the attacks almost immediately, he didn't know where they were coming from, nor did the local police or FBI, because Mitnick was manipulating the telephone network's switches to disguise the source of the modem calls. ...he agreed to one year in prison and six months in a counseling program for his computer "addiction." The FBI can easily serve warrants and get trap-and-trace information from telephone companies, but few of its agents know how to interpret the data they provide. If the bad guy is actually holed up at the address that corresponds to the telephone number, they're set. But if the criminal has electronically broken into to the telephone company's local switch and scrambled the routing tables, they're clueless. Kevin had easily frustrated their best attempts at tracking him through the telephone network using wiretaps and traces. He would routinely use two computer terminals each night -- one for his forays into Digital's computers, the other as a lookout that scanned the telephone company computers to see if his trackers were getting close. At one point, a team of law enforcement and telephone security agents thought they had tracked him down, only to find that Mitnick had diverted the telephone lines so as to lead his pursuers not to his hideout in Calabasas, but to an apartment in Malibu. Mitnick, it seemed, was a tough accomplice, for even as they had been working together he had been harassing DiCicco by making fake calls to DiCicco's employer, claiming to be a Government agent and saying that DiCicco was in trouble with the Internal Revenue Service. The frustrated DiCicco confessed to his boss, who notified DEC and the FBI, and Mitnick soon wound up in federal court in Los Angeles. Although DEC claimed that he had stolen software worth several million dollars, and had cost DEC almost $200,000 in time spent trying to keep him out of their computers, Kevin pleaded guilty to one count of computer fraud and one count of possessing illegal long-distance access codes. It was the fifth time that Mitnick had been apprehended for a computer crime, and the case attracted nationwide attention because, in an unusual plea bargain, he agreed to one year in prison and six months in a counseling program for his computer "addiction." It was a strange defense tactic, but a federal judge, after initially balking, bought the idea that there was some sort of psychological parallel between the obsession Mitnick had for breaking in to computer systems and an addict's craving for drugs. After he finished his jail time and his halfway-house counseling sentence for the 1989 Digital Equipment conviction Mitnick moved to Las Vegas and took a low-level computer programming position for a mailing list company. His mother had moved there, as had a woman who called herself Susan Thunder who had been part of Mitnick's phone phreak gang in the early 1980s, and with whom he now became reacquainted. It was during this period that he tried to "social engineer" me over the phone. In early 1992 Mitnick moved back to the San Fernando Valley area after his half-brother died of an apparent heroin overdose. He briefly worked for his father in construction, but then took a job he found through a friend of his father's at the Tel Tec Detective Agency . Soon after he began, someone was discovered illegally using a commercial database system on the agency's behalf, and Kevin was once again the subject of an FBI investigation. In September the Bureau searched his apartment, as well as the home and workplace of another member of the original phone phreak gang. Two months later a federal judge issued a warrant for Mitnick's arrest for having violated the terms of his 1989 probation. There were two charges: illegally accessing a phone company computer, and associating with one of the people with whom he'd originally been arrested in 1981. His friends claimed Mitnick had been set up by the detective firm; whatever the truth, when the FBI came to arrest him, Kevin Mitnick had vanished. His escape, subsequently reported in the Southern California newspapers, made the authorities look like bumblers who were no match for a brilliant and elusive cyberthief. In late 1992 someone called the California Department of Motor Vehicles office in Sacramento, and using a valid law enforcement requester code, attempted to have driver's license photographs of a police informer faxed to a number in Studio City, near Los Angeles. Smelling fraud, D.M.V. security officers checked the number and discovered that it was assigned to a Kinko's copy shop, which they staked out before faxing the photographs. But somehow the spotters didn't see their quarry until he was going out the door of the copy shop. They started after him, but he outran them across the parking lot and disappeared around the corner, dropping the documents as he fled. The agents later determined that they were covered with Kevin Mitnick's fingerprints. His escape, subsequently reported in the Southern California newspapers, made the authorities look like bumblers who were no match for a brilliant and elusive cyberthief.

Labels:

Black Hat Hacker

Black Hat Hackers, who may also be known as Crackers, Hackers, who specialise in unathorized penetration of information systems, They may use computers to attack systems for profit, or just for fun, but such penetration often involves modification or destruction of data, and is done without authorization. They also may distribute computer viruses, Internet Worms, and deliver spam through the use of botnets. In a security context, a hacker is someone involved in computer security/insecurity, specializing in the discovery of exploits in systems (for exploitation or prevention), or in obtaining or preventing unauthorized access to systems through skills, tactics and detailed knowledge. In the most common general form of this usage, "hacker" refers to a black-hat hacker (a malicious or criminal hacker). There are also ethical hackers (more commonly referred to as white hats), and those more ethically ambiguous (grey hats). To disambiguate the term hacker, often cracker is used instead, referring either to computer security hacker culture as a whole to demarcate it from the academic hacker culture or specifically to make a distinction within the computer security context between black-hat hackers and the more ethically positive hackers (commonly known as the white-hat hackers). The context of computer security hacking forms a subculture which is often referred to as the network hacker subculture or simply the computer underground. According to its adherents, cultural values center around the idea of creative and extraordinary computer usage. Proponents claim to be motivated by artistic and political ends, but are often unconcerned about the use of criminal means to achieve them. Sometimes hackers can be dangerous. A black hat hacker is someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. This can mean taking control of a remote computer through a network, or software cracking.

Labels: