[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: PWN/Part 2 ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ] [ 71 ]
Current issue : #35 | Release date : 1991-11-17 | Editor : Dispater
Introduction to Phrack 34Dispater & Crimson Death
Phrack LoopbackPhrack Staff
Phrack Profile of Chris GoggansS. Leonard Spitz
Telenet/Sprintnet's PC Pursuit Outdial DirectoryAmadeus
Sting OperationsSovereign Immunity
Social Security Numbers & PrivacyChris Hibbert
Users Guide to VAX/VMS Part 1 of 3Black Kat
A Beginners Guide to Novell Netware 386The Butler
Auto-Answer ItTwisted Pair
PWN/Part 1Dispater
PWN/Part 2Dispater
PWN/Part 3Dispater
PWN/Part 4Dispater
Title : PWN/Part 2
Author : Dispater
                                ==Phrack Inc.==

                 Volume Three, Issue Thirty-five, File 11 of 13

              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
              PWN                                             PWN
              PWN              Phrack World News              PWN
              PWN                                             PWN
              PWN            Issue XXXV / Part Two            PWN
              PWN                                             PWN
              PWN            Compiled by Dispater             PWN
              PWN                                             PWN
              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN

Justice Revs Up Battle On Computer Crime                        October 7, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Michael Alexander (ComputerWorld)(Page 4)

Washington D.C. -- The nation's top federal computer crime law enforcers
announced plans to escalate the war on computer crime.

At the federal government's 14th National Computer Security Conference held in
Washington D.C., officials at the U.S. Department of Justice said the
department is launching a computer crime unit that will be charged with
prosecuting crimes and pushing for stiffer penalties for convicted computer
outlaws.

"Computer crime is on the rise, and the Justice Department is taking this area
very seriously -- as well as the FBI, U.S. Secret Service, and the military,"
said Mary Spearing, chief of general litigation and legal advice in the
criminal division at the Justice Department.

The new crime unit will also advocate closing loopholes in the government's
computer crime statute.  The Computer Fraud & Abuse Act of 1986 "is outmoded
and outdated," said Scott Charney, a computer crime prosecutor and chief of the
new computer crime unit.

The Justice Department wants to amend the law with a provision that would make
inserting a virus or worm into a computer system a crime, Charney said.

Those convicted of computer crimes will more often be sentenced according to
federal guidelines rather than on recommendation of prosecutors, who may ask
for lighter penalties, said Mark Rasch, the government's attorney who
prosecuted Robert Morris in the infamous Internet worm case.

A new Justice Department policy now mandates that all defendants will be
treated equally, without regard for personal history or other factors that
might mitigate stiffer sentences, Rasch said.

"The penalties for computer crime will become increasingly more severe,"
predicted Kent Alexander, assistant U.S. attorney in Atlanta <prosecutor of the
Atlanta members of the Legion of Doom>.  "In five years, they are going to look
back and think a year in jail was a light sentence."

The FBI is "staffing up to address concerns about computer crimes" and
increasing its training efforts, said Mike Gibbons, FBI supervisory special
agent <who worked on both the Morris and the Clifford Stoll KGB hackers
cases>.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Supreme Court Refuses Morris Appeal                            October 14, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Michael Alexander (ComputerWorld)(Page 14)

Washington, D.C. -- The U.S. Supreme Court refused without comment to hear
Robert T. Morris' appeal last week, ending a legal journey that began nearly
three years ago when he injected a worm into the Internet network.

While the trek is over for Morris, there remain serious questions about the
Computer Fraud and Abuse Act of 1986, the statute under which he was
prosecuted.

The refusal to review the Morris case leave intact a "bone breaker" law that
could transform otherwise law-abiding computer users in felons and inhibit the
creative uses of computer technology according to Thomas Viles, an attorney at
the Silverglate & Good law firm in Boston.  Viles authored a friend of the
court brief in the Morris appeal on behalf of the Electronic Frontier
Foundation.

Some legal experts worry that computer users who enter a computer system
without authorization, either unwittingly or with the intention of merely
looking around, could be given penalties that are overly severe.

"A single computer entry is of an entirely different order than the destruction
of data or the intentional alteration of data, just as simple trespass is
pretty minor stuff compared to vandalism or burglary," Viles said.  "Now if
people whose livelihoods depend on computers get into somebody else's computer
without authorization, they could be in Leavenworth for five years."

The Morris appeal boiled down to the critical question of whether he intended
to cause the harm that ensued after he set loose his ill-conceived computer
program on November 2, 1988.

In 1990, a federal judge in Syracuse, New York ruled that it was not necessary
for the government to prove that Morris intended to cause harm, only that
Morris intended to access computers with authorization or to exceed
authorization that he may have had.  Earlier this year a federal appeals court
upheld Morris' May 1990 conviction under which he received three years
probation, a $10,000 fine, and 400 hours of community service.

That affirmation goes against the widely accepted tenet that an injury can
amount to a crime only when deliberately intended, Viles said.  "The law
distinguishes, say, between murder and manslaughter.  You can't be guilty of
murder if the killing was utterly accidental and unintended."

A General Accounting Office (GAO) report released in 1989 noted other flaws in
the federal computer statute.  While the law makes it a felony to access a
computer without authorization, the law does not define what is meant by
"access" or "authorization," the GAO reported.

UPDATING THE LAW

U.S. Department of Justice Officials recently acknowledged that the Computer
Fraud and Abuse Act is outdated and noted that it should be refined <see
Justice Revs Up Battle On Computer Crime (the previous article)>.  Scott
Charney, chief of the Justice Department's newly created computer crime unit,
said the department will lobby to fortify the law with provisions that would
outlaw releasing viruses and worms and make it a felony to access a computer
without authorization and cause damage through reckless behavior.

Trespassing into a computer is more serious than it may appear at first
glance, Charney said.  "It is not easy to determine what happened, whether
there was damage, how safe the system now is or what the intruder's motives
were."

Some legal experts said they believe the law is already overly broad and do not
advocate expanding it with new provisions.  "It is a far-reaching law, whose
boundaries are still not known," said Marc Rotenberg, an attorney and director
of the Washington, D.C. office of Computer Professionals for Social
Responsibility.  "The way I read the law is, the Justice Department has
everything it needs and more," he said.  "After the Morris decisions, if you
sneeze, you could be indicted."

The Morris case pointed out deficiencies in the law that have resulted from
technology's rapid advance, said Thomas Guidoboni, the Washington, D.C.-based
attorney who defended Morris.

Neither Guidoboni nor Morris were surprised by the Supreme Court's refusal to
hear his appeal, according to Guidoboni.  "Robert's case had a particular
problem in that it was the first one involving the 1986 act.  They like to take
cases after the circuit courts had had some chance to play with them and see if
there is a disagreement."

Morris is working as a computer programmer in Cambridge, Massachusetts for a
company that "knows who he is and what he's done," Guidoboni said.  He declined
to identify the company.

<Editor's Note: Morris was actually the SECOND person to be tried under the
 1986 Computer Fraud and Abuse Act.  The first person was Herbert Zinn, Jr.
 a/k/a Shadow Hawk of Chicago, Illinois, who was convicted in 1989 in a
 prosecution led by William Cook, a now former assistant U.S. attorney whose
 name most of you should recognize from the Craig Neidorf (Knight Lightning)
 and Lynn Doucette (Kyrie) cases.

 Zinn was tried as a minor and therefore in a bench trial before a sole judge.
 Morris is the first person to be tried under the Act in front of a jury.
 Zinn's conviction earned him 10 months in a juveniles prison facility in South
 Dakota, a fine of $10,000, and an additional 2 1/2 years of probation that
 began after his prison term ended.

 For additional information about the Shadow Hawk case, please read "Shadow
 Hawk Gets Prison Term," which appeared in Phrack World News, Issue 24,
 Part 2.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Justice Unit Spurred On By Cross-Border Hackers                October 21, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Michael Alexander (ComputerWorld)(Page 6)

Washington D.C. -- The U.S. Department of Justice's formal launch of a computer
crime unit was prompted largely by an alarming rise in computer invasions that
traverse geographic and jurisdictional boundaries, according to a top Justice
Department official.

Robert Mueller III, assistant U.S. attorney general, said the Justice
Department needs to be better prepared to prosecute computer criminals.  he is
one of the architects of a five-person unit recently established by the justice
department expressly to combat computer crime.

"One of the principal functions of the unit is to anticipate areas where
federal, state, and local law enforcement will have to expend resources in the
future," Mueller said.  "One that comes immediately to our attention is crime
related to computers used as a target as in The Cuckoo's Egg."  He was
referring to author Clifford Stoll's account of how he tracked West German
hackers who penetrated U.S. computers for the KGB in exchange for cash and
cocaine.

Increasingly, computer crimes cut across state and international boundaries,
making them difficult to investigate because of jurisdictional limits and
differing laws, Mueller said.  The computer crime unit will be charged with
coordinating the efforts of U.S. attorneys general nationwide during
investigations of crimes that may have been committed by individuals in several
states.

One of the unit's first assignments will be to take a pivotal role in OPERATION
SUN-DEVIL, last year's much-publicized roundup of computer hackers in several
states.  That investigation is still under way, although no arrests have
resulted, Justice Department officials said.

The unit will coordinate efforts with foreign law enforcers to prosecute
hackers who enter U.S. computer systems from abroad while also working to
promote greater cooperation in prosecuting computer criminals according to
Mueller.

The unit will also assist in investigations when computers are used as a tool
of a crime -- for example, when a computer is used to divert electronically
transferred funds -- and when computers are incidental to a crime, such as when
a money launderer uses a computer to store records of illegal activities,
Mueller said.

"There have been many publicized cases involving people illegally accessing
computers, from phone phreaks to hackers trying to take military information,"
said Scott Charney, chief of the new computer unit.  "Those cases have high
importance to us because any time that computers are the target of an offense,
the social cost is very high.  If you bring down the Internet and cripple 6,000
machines and inconvenience thousands of users, there is a high social cost to
that type of activity."

The computer crime unit will also work to promote closer cooperation between
the Justice Department and businesses that have been the victims of computer
crime, Charney said.

Law enforcers are better trained and more knowledgeable in investigating and
prosecuting computer crimes, Charney said.  "Businesses need not be concerned
that we are going to come in, remove all of their computers, and shut their
businesses down.  FBI and Secret Service agents can go in and talk to the
victim in a language they understand and get the information they need with a
minimum amount of intrusion."

<Editor's Note:  "Businesses need not be concerned that we are going to come
 in, remove all of their computers, and shut their businesses down."  Excuse
 me, but I think STEVE JACKSON GAMES in Austin, Texas might disagree with that
 statement.  Mr. Charney -- Perhaps you should issue an apology!>

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                           V  I  E  W  P  O  I  N  T

Let's Look Before We Legislate                                 October 21, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Marc Rotenberg (ComputerWorld)(Page 25)

    "Laws Are Adequate To Handle Computer Crime -- 'Net Police' Not Needed"

The U.S. Department of Justice is now circulating a proposal to expand the
reach of federal computer crime law.  On first pass, this might seem a sensible
response to concerns about computer crime.  The reality, however, it that the
current federal law is more than adequate and the Justice Department proposal
is poorly conceived.

The Justice Department proposal will give federal agencies broad authority to
investigate computer crime, allowing them to intercede in any situations
involving a computer hooked to a network.

Creating a worm or virus could become a felony act, no questions asked.
Espionage laws would be broadened and intent requirements would be lowered.
Certain procedural safeguards would be removed from existing law.

CURRENT LAW ADEQUATE

Taken as a whole, the proposal will make it possible for the federal government
to prosecute many more computer crimes, but the question is whether this
additional authority will improve computer security.  Between the current
federal statute, the Morris decision, and the sentencing guidelines, federal
prosecutors already have more than enough tools to prosecute computer crime.

Under the Computer Fraud & Abuse Act, passed in 1984 and amended in 1986, the
unauthorized use of a computer system is a felony.  Though the act does not
define what "authorization" is or how it is obtained, a person found guilty
faces up to five years in jail and fines of $250,000.  It is a far-reaching law
whose boundaries are still not known.

THE MORRIS FACTOR

The Morris case strengthened the hand of federal prosecutors still further.
The judge ruled that it was not necessary for the government to prove that
Morris intended the harm that resulted when the worm was released, only that he
intended unauthorized use when he did what he did.

>From a common law viewpoint, that's a surprising result.  Traditional criminal
law distinguishes between trespass, burglary, and arson.  In trespass, which is
a misdemeanor, the offense is entering onto someone else's property.  Burglary
is simple theft and arson is destruction.  To punish a trespasser as an
arsonist is to presume an intent that may not exist.

A federal appeals court affirmed the Morris decision, and the Supreme Court has
refused to hear his appeal, so now the computer crime statute is essentially a
trip-wire law.  The government only has to show that the entry was unauthorized
-- not that any resulting harm was intentional.

There is another aspect of the Morris case that should be clearly understood.
Some people were surprised that Morris served no time and jumped to the
conclusion that sentencing provisions for this type of offense were
insufficient.  In fact, under the existing federal sentencing guidelines,
Morris could easily have received two years in jail.  The judge in Syracuse,
New York, considered that Morris was a first-time offender, had no criminal
record, was unlikely to commit a crime in the future, and, not unreasonably,
decided that community service and a stiff fine were appropriate.

To "depart" as the judge did from the recommended sentence was unusual.  Most
judges follow the guidelines and many depart upwards.

That said, if the Department of Justice persists in its efforts, there are at
least three other issues that should be explored.

UNANSWERED QUESTIONS

First there is the question of whether it is sensible to expand the authority
of federal agents at the expense of local police and state government.  If
theft from a cash register is routinely prosecuted by local police, why should
the FBI be called in if the cash register is a computer?

What will happen to the ability of state government to tailor their laws to
their particular needs?  Do we really want "Net Police"?

There is also the need to explore the government's performance in recent
computer crime investigations before granting new powers.  For example, the
botch Operation Sun-Devil raid, which involved almost one quarter of all Secret
Service agents, resulted in hardly a conviction.  (A good cop could have done
better in a night's work.)

In a related investigation, Steve Jackson, the operator of a game business in
Texas was nearly forced out of business by a poorly conceived raid.

In fact, documents just released to Computer Professionals for Social
Responsibility by the Secret Service under the Freedom of Information Act raise
substantial questions about the conduct, scope, and purpose of Operation
Sun-Devil investigations.  They reveal, for example, that the Secret Service
monitored and downloaded information from a variety of on-line newsletters and
conferences.

A congressional hearing to assess Operation Sun-Devil would certainly be in
order before granting federal officials new powers.

PROTECTION OF RIGHTS

Finally we should not rush to create new criminal sanctions without fully
recognizing the important civil liberties interests in information
technologies, such as the rights of privacy and free expression.  There are,
for example, laws that recognize a special First Amendment interest in newsroom
searches.

But no case has yet made clear the important principle that similar protections
should be extended to computer bulletin boards.  New criminal sanctions without
necessary procedural safeguards throws off an important balance in the criminal
justice system.

Expanding the reach of federal law might sound good to many people who are
concerned about computer crime, but broadening criminal law is always
double-edged.  Could you prove to a court that you have never used a computer
in an "unauthorized" manner?

<Editor's Note:  Marc Rotenberg is the Director of the Washington office of
 Computer Professionals for Social Responsibility and he has testified in both
 the House of Representatives and the Senate on computer crime legislation.>
_______________________________________________________________________________

PWN Quicknotes
~~~~~~~~~~~~~

1.  Operation Sun-Devil Scope Emerges (ComputerWorld, 10/14/91, page 119)
--
    The Computer Professionals for Social Responsibility (CPSR), an advocacy
    group, received more than 2,400 documents from the U.S. Secret Service
    under the Freedom of Information Act.  The documents relate to Operation
    Sun-Devil, last year's nationwide dragnet through the hacker underground.
    An early look at the documents reveals that the scope of the operation was
    considerably broader than the U.S. Secret Service has admitted, said Marc
    Rotenberg, director of CPSR's Washington, D.C. office.  CPSR will soon hold
    a press conference to discuss the findings, he added.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

2.  6 Police Employees Probed for Wiretaps (Washington Post/AP, 10/24/91, page
    A4) -- Jefferson City, Missouri -- Missouri's Highway Patrol is
    investigating six employees implicated in three illegal wiretaps, officials
    said.

    The wiretaps were "stupid" and were intended to "gain personal information
    in an effort to supervise subordinates," said Colonel C.E. 'Mel' Fisher,
    the patrol's chief.

    Fisher said that six employees are on administrative leave without pay
    after a two-month internal investigation confirmed conversations were
    recorded at patrol headquarters and at a troop office in Kirkwood,
    Missouri.

    Fisher did not identify the employees, who face hearings that could lead
    to possible penalties ranging from a written reprimand to dismissal.  It is
    a federal felony to conduct an illegal wiretap.  He said the FBI
    investigated the wiretaps.

    Major Bobby G. Gibson, chief of the patrol's Criminal Investigation Bureau,
    in which two of the wiretaps occurred, committed suicide on October 9,
    1991.  He was among five defendants in a $7 million federal lawsuit filed
    recently by a black patrolman, Corporal Oliver Dixon, who alleged he had
    been wiretapped and denied promotions because of his race.  All of the
    defendants, including Fisher, are white.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
3.  Patrick Townson, the moderator of the Internet's Telecom Digest
    (comp.dcom.telecom) was less than pleased when an unknown person placed
    Phrack 34 into alt.dcom.telecom.  Townson consistently preaches about the
    evils of hacking, but we know that he did not learn everything he knows
    about telecommunications in the classroom.  See you after World War Three
    Pat!  We know who you are, we know who you WERE and we know what crimes
    you have committed in the realm of telecommunications.  We're anxious to
    talk some more with you about this in the near future.

    See below:

    "I assume you saw the stuff which was left in alt.dcom.telecom today:
    A whole series of messages telling how to break into several voicemail
    systems; how to break into the MILNET; a program designed to discover
    passwords; and other obnoxious files.  All of them were left by the same
    anonymous user at the same non-existent site.  Siemens Medical Systems
    (one of the victims in the theft-of-voicemail-services tutorial in
    alt.dcom.telecom today) has been notified that their 800 number link to
    voicemail is now under attack, and given the box number involved.  Like
    cockroaches, you can stomp on those people all you like; they seem to
    survive.  One person has said in the event of WW-3, the only species to
    survive will be the cockroaches and the hackerphreaks.  Good socially
    responsible computing, that's what it is!   PAT"
_______________________________________________________________________________

4.  The existence of back issues of Phrack Inc. found in a user's home
    directory was enough for a system administrator at Tufts University in
    Massachusetts to revoke a users account.  Michael Godwin, an attorney for
    the Electronic Frontier Foundation went to bat for this individual and
    succeeded in restoring the user's account.  The incident prompted the
    following response by a reader of Telecom Digest (comp.dcom.telecom):

     On Oct 19 at 11:51, TELECOM Moderator writes:

     > Is it easier and more pragmatic for a
     > system administrator to answer to his/her superiors regarding files at
     > the site which harassed or defrauded some third party (ie. telco) or
     > to simply remove the files and/or discontinue the feed"   PAT]

     But this requires a judgment call on the part of the system
     administrator, does it not?  Most of the system administrators that I
     know are too busy administering the system to worry about this file or
     that feed, except perhaps as it relates to traffic volume or disk space
     consumed.

     Will we ever get to the point where those in charge will stop dreaming of
     practicing mind control?  I am so sick of those who are paranoid that
     someone somewhere may actually express an uncontrolled thought or idea to
     someone else.

     Ah, the advantages of owning one's own UUCP site ...
_______________________________________________________________________________

5.   The National Public Network Begins Now.  You Can Help Build it.

     Telecommunications in the United States is at a crossroads.  With the
     Regional Bell Operating Companies now free to provide content, the shape
     of the information networking is about to be irrevocably altered.  But
     will that network be the open, accessible, affordable network that the
     American public needs?  You can help decide this question.

     The Electronic Frontier Foundation recently presented a plan to Congress
     calling for the immediate deployment of a national network based on
     existing ISDN technology, accessible to anyone with a telephone
     connection, and priced like local voice service.  We believe deployment of
     such a platform will spur the development of innovative new information
     services, and maximize freedom, competitiveness, and civil liberties
     throughout the nation.

     The EFF is testifying before Congress and the FCC; making presentations to
     public utility commissions from Massachusetts to California; and meeting
     with representatives from telephone companies, publishers, consumer
     advocates, and other stakeholders in the telecommunications policy debate.

     The EFF believes that participants on the Internet, as pioneers on the
     electronic frontier, need to have their voices heard at this critical
     moment.

     To automatically receive a description of the platform and details, send
     mail to [email protected], with the following line:

     send documents open-platform-overview

     or send mail to [email protected].
_______________________________________________________________________________

6.  The September/October 1991 issue of The Humanist has a cover story
    regarding Cyberspace, rights and freedoms on nets such as Usenet, and makes
    reference to Craig Neidorf, Jolnet, Prodigy and other matters.
_______________________________________________________________________________

7.  A Virginia Beach restaurateur plead guilty to illegally taping a telephone
    call by Governor L. Douglas Wilder and said he arranged for the tape to be
    delivered to the staff of Senator Charles Robb, D-Va., hoping it would be
    damaging to Wilder and politically helpful to Robb.

    Robert Dunnington, a onetime social companion of Robb's, admitted in
    federal court that he intercepted a 1988 car phone call by then-Lt.
    Governor Wilder as part of his hobby of monitoring and recording cellular
    calls.

    From February 1988 to October 1990, Dunnington overheard and taped hundreds
    of calls and, his attorney said, it was "just happenstance" that Wilder's
    call was picked up.  (Washington Post)
_______________________________________________________________________________

8.  A Federal District Judge in New York ruled that a computer-network company
    is not legally liable for the contents of information it disseminates.
    While the decision could be influential because it tackles free speech on
    an electronic network, it is not clear how the ruling would affect bulletin
    boards ^S^Qon which users add comments.  The decision concerned an electronic
    gossip column carried by CompuServe.  In the decision, the judge stated
    "CompuServe has no more editorial control over such a publication than
    does a public library, bookstore or newsstand, and it would be no more
    feasible for CompuServe to examine every publication it carries for
    potentially defamatory statements than it would be for any other
    distributor to do so."  (Wall Street Journal, October 31, 1991)
_______________________________________________________________________________
[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2024, Phrack Magazine.