.oO Phrack 49 Oo.

                          Volume Seven, Issue Forty-Nine

                                    16 of 16


              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
              PWN                                             PWN
              PWN              Phrack World News              PWN
              PWN                                             PWN
              PWN                  Issue 49                   PWN
              PWN                                             PWN
              PWN             Compiled by DisordeR            PWN
              PWN                                             PWN
              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


Phrack World News #49 -- Index

01. CIA attacked, pulls plug on Internet site
02. Letter From Senator Patrick Leahy (D-VT) on Encryption
03. Java Black Widows - Sun Declares War
04. Jacking in from the "Smoked Filled Room" Port
05. Panix Attack
06. Massive Usenet Cancels
07. Mitnick Faces 25 More Federal Counts of Computer Hacking
08. Hacker is freed but he's banned from computers
09. Computer Hacker Severely Beaten after Criticizing Prison Conditions
    Target of Campaign by U.S. Secret Service
10. Bernie S. Released!
11. 
12. School Hires Student to Hack Into Computers
13. Paranoia and Brit Hackers Fuel Infowar Craze in Spy Agencies
14. Hackers Find Cheap Scotland Yard Phone Connection
15. U.S. Official Warns OF "Electronic Pearl Harbor"
16. Suit Challenges State's Restraint of the Internet Via AP
17. U.S. Government Plans Computer Emergency Response Team
18. Hackers $50K challenge to break Net security system
19. Criminal cult begins PGP crack attempt
20. Hackers Bombard Internet
21. Crypto Mission Creep
22. Hacker posts nudes on court's Web pages
23. Hacking Into Piracy
24. Revealing Intel's Secrets
25. Internet Boom Puts Home PCs At Risk Of Hackers
26. Computer hacker Mitnick pleads innocent
27. Hackers Destroy Evidence of Gulf War Chemical/Biological Weapons
28. Criminals Slip Through The Net


[=-------------------------------------------------------------------------=]

title: CIA attacked, pulls plug on Internet site
author: unknown
source: Reuter

WASHINGTON (Reuter) - The Central Intelligence Agency, that bastion of
spy technology and computer wizardry, pulled the plug on its World
Wide Web site on the Internet Thursday after a hacker broke in and
replaced it with a crude parody.

CIA officials said their vandalized homepage -- altered to read
"Welcome to the Central Stupidity Agency" -- was in no way linked to
any mainframe computers containing classified national security
information.

[* Excuse me for a minute while my erection goes down. *]

The site was tampered with Wednesday evening and the CIA closed it
Thursday morning while a task force looked into the security breach,
CIA spokeswoman Jane Heishman said. Part of the hacker's text read
"Stop Lying."

"It's definitely a hacker" who pierced the system's security, she
said. "The agency has formed a task force to look into what happend
and how to prevent it."

[* No shit?! It was a hacker that did that? *]

The CIA web site (http://www.odci.gov/cia) showcases unclassified
information including spy agency press releases, officials' speeches,
historical rundowns and the CIA's World Fact Book, a standard
reference work.

The cyber-attack matched one that forced the Justice Department to
close its Web site last month after hackers inserted a swastika and
picture of Adolph Hitler.  The penetration of the CIA homepage
highlighted the vulnerability of Internet sites designed to attract
the public and drove home the need for multiple layers of security.

"You want people to visit, you want them to interact, but you don't
want them to leave anything behind," said Jon Englund of the
Information Technology Association of America, a trade group of
leading software and telecommunications firms.

[=-------------------------------------------------------------------------=]

From: Senator_Leahy@LEAHY.SENATE.GOV
Date: Thu, 02 May 96 12:04:07 EST

-----BEGIN PGP SIGNED MESSAGE-----

     LETTER FROM SENATOR PATRICK LEAHY (D-VT) ON ENCRYPTION

May 2, 1996

Dear Friends:

Today, a bipartisan group of Senators has joined me in supporting
legislation to encourage the development and use of strong,
privacy-enhancing technologies for the Internet by rolling back
the out-dated restrictions on the export of strong cryptography.

In an effort to demonstrate one of the more practical uses of
encryption technology (and so that you all know this message
actually came from me), I have signed this message using a
digital signature generated by the popular encryption program
PGP.  I am proud to be the first member of Congress to utilize
encryption and digital signatures to post a message to the
Internet.

[* The first?! We're doomed!! *]

As a fellow Internet user, I care deeply about protecting
individual privacy and encouraging the development of the Net as
a secure and trusted communications medium.  I do not need to
tell you that current export restrictions only allow American
companies to export primarily weak encryption technology.  The
current strength of encryption the U.S. government will allow out
of the country is so weak that, according to a January 1996 study
conducted by world-renowned cryptographers, a pedestrian hacker
can crack the codes in a matter of hours!  A foreign intelligence
agency can crack the current 40-bit codes in seconds.

[* That should read "As a fellow Internet user ..who doesn't read
   his own mail... *]

Perhaps more importantly, the increasing use of the Internet and
similar interactive communications technologies by Americans to
obtain critical medical services, to conduct business, to be
entertained and communicate with their friends, raises special
concerns about the privacy and confidentiality of those
communications.  I have long been concerned about these issues,
and have worked over the past decade to protect privacy and
security for our wire and electronic communications.  Encryption
technology provides an effective way to ensure that only the
people we choose can read our communications.

I have read horror stories sent to me over the Internet about how
human rights groups in the Balkans have had their computers
confiscated during raids by security police seeking to find out
the identities of people who have complained about abuses.
Thanks to PGP, the encrypted files were undecipherable by the
police and the names of the people who entrusted their lives to
the human rights groups were safe.

The new bill, called the "Promotion of Commerce On-Line in the
Digital Era (PRO-CODE) Act of 1996," would:

     o    bar any government-mandated use of any particular
     encryption system, including key escrow systems and affirm
     the right of American citizens to use whatever form of
     encryption they choose domestically;

[* Thank you for permission to do that.. even though it is legal already *]

     o    loosen export restrictions on encryption products so
     that American companies are able to export any generally
     available or mass market encryption products without
     obtaining government approval; and

[* Loosen? Why not abolish? *]

     o    limit the authority of the federal government to set
     standards for encryption products used by businesses and
     individuals, particularly standards which result in products
     with limited key lengths and key escrow.

This is the second encryption bill I have introduced with Senator
Burns and other congressional colleagues this year. Both bills
call for an overhaul of this country's export restrictions on
encryption, and, if enacted, would quickly result in the
widespread availability of strong, privacy protecting
technologies. Both bills also prohibit a government-mandated key
escrow encryption system.  While PRO-CODE would limit the
authority of the Commerce Department to set encryption standards
for use by private individuals and businesses, the first bill we
introduced, called the "Encrypted Communications Privacy Act",
S.1587, would set up stringent procedures for law enforcement to
follow to obtain decoding keys or decryption assistance to read
the plaintext of encrypted communications obtained under court
order or other lawful process.

It is clear that the current policy towards encryption exports is
hopelessly outdated, and fails to account for the real needs of
individuals and businesses in the global marketplace.  Encryption
expert Matt Blaze, in a recent letter to me, noted that current
U.S. regulations governing the use and export of encryption are
having a "deleterious effect ... on our country's ability to
develop a reliable and trustworthy information infrastructure."
The time is right for Congress to take steps to put our national
encryption policy on the right course.

I am looking forward to hearing from you on this important issue.
Throughout the course of the recent debate on the Communications
Decency Act, the input from Internet users was very valuable to
me and some of my Senate colleagues.

You can find out more about the issue at my World Wide Web home
page (http://www.leahy.senate.gov/) and at the Encryption Policy
Resource Page (http://www.crypto.com/). Over the coming months, I
look forward to the help of the Net community in convincing other
Members of Congress and the Administration of the need to reform
our nation's cryptography policy.

Sincerely,

Patrick Leahy
United States Senator

[=-------------------------------------------------------------------------=]

title: JAVA BLACK WIDOWS - SUN DECLARES WAR
author: unknown
from: staff@hpp.com


Sun Microsystems' has declared war on Black Widow Java
applets on the Web. This is the message from Sun in response
to an extensive Online Business Consultant (OBC/May 96)
investigation into Java security.

OBC's investigation and report was prompted after renowned
academics, scientists and hackers announced Java applets
downloaded from the WWW presented grave security risks for
users. Java Black Widow applets are hostile, malicious traps set
by cyberthugs out to snare surfing prey, using Java as their technology.
OBC received a deluge of letters asking for facts after OBC
announced a group of scientists from Princeton University, Drew
Dean, Edward Felten and Dan Wallach, published a paper declaring
"The Java system in its current form cannot easily be made secure."
The paper can be retrieved at
http://www.cs.princeton.edu/sip/pub/secure96.html.

Further probing by OBC found that innocent surfers on the Web who
download Java applets into Netscape's Navigator and Sun's
HotJava browser, risk having "hostile" applets interfere with their
computers (consuming RAM and CPU cycles). It was also discovered
applets could connect to a third party on the Internet and, without the
PC owner's knowledge, upload sensitive information from the user's
computer. Even the most sophisticated firewalls can be penetrated . . .
"because the attack is launched from behind the firewall," said the
Princeton scientists.

One reader said, "I had no idea that it was possible to stumble on
Web sites that could launch an attack on a browser."  Another said,
"If this is allowed to get out of hand it will drive people away from the
Web. Sun must allay fears."

[* Faster connections if people are driven from the web.. hmm... :) *]

The response to the Home Page Press hostile applet survey led to the
analogy of Black Widow; that the Web was a dangerous place where
"black widows" lurked to snare innocent surfers. As a result the
Princeton group and OBC recommended users should "switch off"
Java support in their Netscape Navigator browsers. OBC felt that Sun
and Netscape had still to come clean on the security issues. But
according to Netscape's Product Manager, Platform, Steve Thomas,
"Netscape wishes to make it clear that all known security problems with
the Navigator Java and JavaScript environment are fixed in Navigator
version 2.02."

However, to date, Netscape has not answered OBC's direct questions
regarding a patch for its earlier versions of Navigator that supported
Java . . . the equivalent of a product recall in the 3D world. Netscape
admits that flaws in its browsers from version 2.00 upwards were
related to the Java security problems, but these browsers are still in use
and can be bought from stores such as CompUSA and Cosco. A floor
manager at CompUSA, who asked not to be named, said "its news to
him that we are selling defective software. The Navigator walks off our
floor at $34 a pop."

OBC advised Netscape the defective software was still selling at
software outlets around the world and asked Netscape what action was
going to be taken in this regard. Netscape has come under fire recently
for its policy of not releasing patches to software defects; but rather
forcing users to download new versions. Users report this task to be a
huge waste of time and resources because each download consists of
several Mbytes. As such defective Navigators don't get patched.

OBC also interviewed Sun's JavaSoft security guru, Ms. Marianne Mueller,
who said "we are taking security very seriously and working on it very
hard." Mueller said the tenet that Java had to be re-written from scratch or
scrapped "is an oversimplification of the challenge of running executable
content safely on the web. Security is hard and subtle, and trying to build
a secure "sandbox" [paradigm] for running untrusted downloaded applets
on the web is hard."

Ms. Mueller says Sun, together with their JavaSoft (Sun's Java division)
partners, have proposed a "sandbox model" for security in which "we
define a set of policies that restrict what applets can and cannot do---these
are the boundaries of the sandbox. We implement boundary checks---when
an applet tries to cross the boundary, we check whether or not it's allowed
to. If it's allowed to, then the applet is allowed on its way. If not, the
system throws a security exception.

"The 'deciding whether or not to allow the boundary to be crossed' is the
research area that I believe the Princeton people are working on," said
Mueller. "One way to allow applets additional flexibility is if the applet
is signed (for example, has a digital signature so that the identity of the
applet's distributor can be verified via a Certificate Authority) then allow
the applet more flexibility.

 "There are two approaches: One approach is to let the signed applet
do anything. A second approach is to do something more complex and
more subtle, and only allow the applet particular specified capabilities.
Expressing and granting capabilities can be done in a variety of ways.

"Denial of service is traditionally considered one of the hardest security
problems, from a practical point of view. As [Java's creator] James
Gosling says, it's hard to tell the difference between an MPEG
decompressor and a hostile applet that consumes too many resources!
But recognizing the difficulty of the problem is not the same as 'passing
the buck.' We are working on ways to better monitor and control the
use (or abuse) of resources by Java classes. We could try to enforce
some resource limits, for example. These are things we are investigating.

"In addition, we could put mechanisms in place so that user interface
people (like people who do Web browsers) could add 'applet monitors'
so that browser users could at least see what is running in their browser,
and kill off stray applets. This kind of user interface friendliness (letting
a user kill of an applet) is only useful if the applet hasn't already grabbed
all the resources, of course."

The experts don't believe that the problem of black widows and hostile
applets is going to go away in a hurry. In fact it may get worse. The
hackers believe that when Microsoft releases Internet Explorer 3.00 with
support for Java, Visual Basic scripting and the added power of its
ActiveX technology, the security problem will become worse.

"There is opportunity for abuse, and it will become an enormous
problem," said Stephen Cobb, Director of Special Projects for the
National Computer Security Association (NCSA). "For example, OLE
technology from Microsoft [ActiveX] has even deeper access to a
computer than Java does."

JavaSoft's security guru Mueller agreed on the abuse issue: "It's going
to be a process of education for people to understand the difference
between a rude applet, and a serious security bug, and a theoretical
security bug, and an inconsequential security-related bug. In the case of
hostile applets, people will learn about nasty/rude applet pages, and
those pages won't be visited. I understand that new users of the Web
often feel they don't know where they're going when they point and click,
but people do get a good feel for how it works, pretty quickly, and I
actually think most users of the Web can deal with the knowledge that
not every page on the web is necessarily one they'd want to visit.
Security on the web in some sense isn't all that different from security
in ordinary life. At some level, common sense does come into play.

"Many people feel that Java is a good tool for building more secure
applications. I like to say that Java raises the bar for security on the
Internet. We're trying to do something that is not necessarily easy, but
that doesn't mean it isn't worth trying to do. In fact it may be worth
trying to do because it isn't easy.  People are interested in seeing the
software industry evolve towards more robust software---that's the
feedback I get from folks on the Net."

# # #

The report above may be reprinted with credit provided as follows:

Home Page Press, Inc.,  http://www.hpp.com  and Online Business ConsultantOE
Please refer to the HPP Web site for additional information about Java and
OBC.

[=-------------------------------------------------------------------------=]

title: Jacking in from the "Smoked Filled Room" Port
author: "Brock N. Meeks" 
source: CyberWire Dispatch // September // Copyright (c) 1996 //

Washington, DC -- Federal provisions funding the digital telephony bill
and roving wiretaps, surgically removed earlier this year from an
anti-terrorism bill, have quietly been wedged into a $600 billion
omnibus spending bill.

The bill creates a Justice Department "telecommunications carrier
compliance fund" to pay for the provisions called for in the digital
telephony bill, formally known as the Communications Assistance in Law
Enforcement Act (CALEA).  In reality, this is a slush fund.

Congress originally budgeted $500 million for CALEA, far short of the
billions actually needed to build in instant wiretap capabilities into
America's telephone, cable, cellular and PCS networks.  This bill now
approves a slush fund of pooled dollars from the budgets of "any agency"
with "law enforcement, national security or intelligence
responsibilities."  That means the FBI, CIA, NSA and DEA, among others,
will now have a vested interest in how the majority of your
communications are tapped.

The spending bill also provides for "multipoint wiretaps."  This is the
tricked up code phase for what amounts to roving wiretaps.  Where the
FBI can only tap one phone at a time in conjunction with an
investigation, it now wants the ability to "follow" a conversation from
phone to phone; meaning that if your neighbor is under investigation and
happens to use your phone for some reason, your phone gets tapped.    It
also means that the FBI can tap public pay phones... think about that
next time you call 1-800-COLLECT.

In addition, all the public and congressional accountability provisions
for how CALEA money was spent, which were in the original House version
(H.R. 3814), got torpedoed in the Senate Appropriations Committee.

Provisions stripped out by the Senate:

-- GONE: Money isn't to be spent unless an implementation plan is sent
to each member of the Judiciary Committee and Appropriations committees.

-- GONE:  Requirement that the FBI provide public details of how its new
wiretap plan exceeds or differs from current capabilities.

-- GONE:  Report on the "actual and maximum number of simultaneous
surveillance/intercepts" the FBI expects.   The FBI ran into a fire storm
earlier this year when it botched its long overdue report that said it
wanted the capability to tap one out of every 100 phones
*simultaneously*.   Now, thanks to this funding bill, rather than having
to defend that request, it doesn't have to say shit.

-- GONE:  Complete estimate of the full costs of deploying and
developing the digital wiretapping plan.

-- GONE:  An annual report to Congress "specifically detailing" how all
taxpayer money -- YOUR money -- is spent to carry out these new wiretap
provisions.

"No matter what side you come down on this (digital wiretapping) issue,
the stakes for democracy are that we need to have public accountability,"
said Jerry Berman, executive director of the Center for Democracy and
Technology.

Although it appeared that no one in congress had the balls to take on
the issue, one stalwart has stepped forward, Rep. Bob Barr (R-Ga.).  He
has succeeded in getting some of the accountability provisions back into
the bill, according to a Barr staffer.  But the fight couldn't have been
an easy one.   The FBI has worked congress relentlessly in an effort to
skirt the original reporting and implementation requirements as outlined
in CALEA.  Further, Barr isn't exactly on the FBI's Christmas card list.
Last year it was primarily Barr who scotched the funding for CALEA
during the 104th Congress' first session.

But Barr has won again.  He has, with backing from the Senate, succeeded
in *putting back* the requirement that the FBI must justify all CALEA
expenditures to the Judiciary Committee.   Further, the implementation
plan, "though somewhat modified" will "still have some punch," Barr's
staffer assured me.  That includes making the FBI report on its
expected capacities and capabilities for digital wiretapping. In other
words, the FBI won't be able to "cook the books" on the wiretap figures
in secret.  Barr also was successful in making the Justice Department
submit an annual report detailing its CALEA spending to Congress.

However, the funding for digital wiretaps remains.  Stuffing the funding
measures into a huge omnibus spending bill almost certainly assures its
passage. Congress is twitchy now, anxious to leave.  They are chomping
at the bit, sensing the end of the 104th Congress' tortured run as the
legislative calender is due to run out sometime early next week.  Then
they will all literally race from Capitol Hill at the final gavel,
heading for the parking lot, jumping in their cars like stock car
drivers as they make a made dash for National Airport to return to their
home districts in an effort to campaign for another term in the loopy
world of national politics.

Congress is "going to try to sneak this (spending bill) through the back
door in the middle of the night," says Leslie Hagan, legislative
director for the National Association of Criminal Defense Lawyers.  She
calls this a "worst case scenario" that is "particularly dangerous"
because the "deliberative legislative process is short-ciricutied."

Such matters as wiretapping deserve to be aired in the full sunlight of
congressional hearings, not stuffed into an 11th hour spending bill.
This is legislative cowardice.  Sadly, it will most likely succeed.

And through this all, the Net sits mute.

Unlike a few months ago, on the shameful day the Net cried "wolf" over
these same provisions, mindlessly flooding congressional switchboards
and any Email box within keyboard reach, despite the fact that the
funding provisions had been already been stripped from the
anti-terrorism bill, there has been no hue-and-cry about these most
recent moves.

Yes, some groups, such as the ACLU, EPIC and the Center for Democracy
and Technology have been working the congressional back channels,
buzzing around the frenzied legislators like crazed gnats.

But why haven't we heard about all this before now?  Why has  this bill
come down to the wire without the now expected flurry of "alerts"
"bulletins" and other assorted red-flag waving by our esteemed Net
guardians?  Barr's had his ass hanging in the wind, fighting FBI
Director Louis "Teflon" Freeh;  he could have used some political cover
from the cyberspace community.  Yet, if he'd gone to that digital well,
he'd have found only the echo of his own voice.

And while the efforts of Rep. Barr are encouraging, it's anything from a
done deal.  "As long as the door is cracked... there is room for
mischief," said Barr's staffer.   Meaning, until the bill is reported
and voted on, some snapperhead congressman could fuck up the process yet
again.

We all caught a bit of a reprieve here, but I wouldn't sleep well.  This
community still has a lot to learn about the Washington boneyard.
Personally, I'm a little tired of getting beat up at every turn.  Muscle
up, folks, the fight doesn't get any easier.

Meeks out...

Declan McCullagh  contributed to this report.

[=-------------------------------------------------------------------------=]

title: Panix Attack
author: Joshua Quittner
source: Time Magazine - September 30, 1996 Volume 148, No. 16
   
It was Friday night, and Alexis Rosen was about to leave work when one
of his computers sent him a piece of E-mail. If this had been the
movies, the message would have been presaged by something
dramatic--the woo-ga sound of a submarine diving into combat, say. But
of course it wasn't. This was a line of dry text automatically
generated by one of the machines that guard his network. It said
simply, "The mail servers are down." The alert told Rosen that his
6,000 clients were now unable to receive E-mail.

Rosen, 30, is a cool customer, not the type to go into cardiac arrest
when his mail server crashes. He is the co-founder of Panix, the
oldest and best-known Internet service provider in Manhattan. Years
before the Net became a cereal-box buzz word, Rosen would let people
connect to Panix free, or for only a few dollars a month, just
because--well, because that was the culture of the time. Rosen has
handled plenty of mail outages, so on this occasion he simply rolled
up his sleeves and set to work, fingers clacking out a flamenco on the
keyboard, looking for the cause of the glitch. What he uncovered sent
a chill down his spine--and has rippled across the Net ever since,
like a rumor of doom. Someone, or something, was sending at the rate
of 210 a second the one kind of message his computer was obliged to
answer. As long as the siege continued--and it went on for
weeks--Rosen had to work day and night to keep from being overwhelmed
by a cascade of incoming garbage.

It was the dread "syn flood," a relatively simple but utterly
effective means for shutting down an Internet service provider--or,
for that matter, anyone else on the Net. After Panix went public with
its story two weeks ago, dozens of online services and companies
acknowledged being hit by similar "denial of service" attacks. As of
late last week, seven companies were still under furious assault.

None of the victims have anything in common, leading investigators to
suspect that the attacks may stem from the same source: a pair of
how-to articles that appeared two months ago in 2600 and Phrack, two
journals that cater to neophyte hackers. Phrack's article was written
by a 23-year-old editor known as daemon9. He also crafted the code for
an easy-to-run, menu-driven, syn-flood program, suitable for use by
any "kewl dewd" with access to the Internet. "Someone had to do it,"
wrote daemon9.

[* WooWoo! Go Route! *]

That gets to the core of what may be the Net's biggest problem these
days: too many powerful software tools in the hands of people who
aren't smart enough to build their own--or to use them wisely. Real
hackers may be clever and prankish, but their first rule is to do no
serious harm. Whoever is clobbering independent operators like Panix
has as much to do with hacking as celebrity stalkers have to do with
cinematography. Another of the victims was the Voters
Telecommunications Watch, a nonprofit group that promotes free speech
online. "Going after them was like going after the little old lady who
helps people in the neighborhood and bashing her with a lead pipe,"
says Rosen.

[* Gee. Is that to say that if you can't write your own operating system
   that you shouldn't have it or that it is a big problem? If so, poor
   Microsoft... *]

Rosen was eventually able to repulse the attack; now he'd like to
confront his attacker. Since some of these Netwits don't seem to know
enough to wipe off their digital fingerprints, he may get his wish.

[* Wow, they did it for two weeks without getting caught. Two weeks of
   24/7 abuse toward this ISP, and now he thinks he can track them down? *]

[=-------------------------------------------------------------------------=]

title: none
author: Rory J. O'Connor
source: Knight-Ridder Newspapers

WASHINGTON -- Vandals swept through the Internet last weekend, wiping
clean dozens of public bulletin boards used by groups of Jews, Muslims,
feminists and homosexuals, among others.

In one of the most widespread attacks on the international computer
network, the programs automatically erased copies of more than 27,000
messages from thousands of servers, before operators stopped the
damage.

The identity of those responsible for launching the apparent hate
attacks -- some of the programs were titled "fagcancel" and "kikecancel" 
-- is unknown.

The incident further illustrates the shaky security foundation of the
Internet, which has mushroomed from academic research tool to
international communications medium in just three years.

And it raised the ire of many Internet users furious at the ease with
which a user can erase someone else's words from worldwide discussion
groups, known as Usenet newsgroups, in a matter of hours.

"There's nothing you can do as an individual user to prevent someone
from canceling your message," said John Gilmore, a computer security
expert in San Francisco. "We need something added to Usenet's software
that would only allow a cancellation from the originator."

[* Which can then be forged just like fakemail... *]

The incident follows closely three other well-publicized Internet
attacks.

In two cases, hackers altered the World Wide Web home pages of the
Justice Department and the CIA, apparently as political protests. In
the third, a hacker overloaded the computers of an Internet service
provider called Panix with hordes of phony requests for a connection,
thus denying use of the service to legitimate users.

The latest attacks -- called cancelbots -- were launched sometime over
the weekend from a variety of Internet service providers, including
UUNet Technologies in Fairfax, Va., and Netcom Inc. in San Jose,
Calif. One attack was launched from a tiny provider in Tulsa, Okla.,
called Cottage Software, according to its owner, William Brunton.

"The offending user has been terminated and the information has been
turned over to the proper (federal) authorities," Brunton said in a
telephone interview Wednesday. "It's now in their hands."

Legal experts said it's unclear if the attacks constitute a crime
under federal laws such as the Computer Fraud and Abuse Act.

"It's really a difficult issue," said David Sobel, legal counsel of
the Electronic Privacy Information Center in Washington. "Can you
assign value to a newsgroup posting? Because most of the computer
crime statutes assume you're ripping off something of value."

[* Hello? Several statutes don't assume that at all. You can be
   charged with HAVING information and not using it. *]

A spokesman for the FBI in Washington said he was unaware of any
federal investigation of the incident, although it is the agency's
policy not to comment on investigations.

While some of the deleted messages have been restored on certain
servers, where operators have retrieved them from backup copies of
their disks, users of other servers where the messages haven't been
restored will never be able to read them.

The fact that a user can stamp out the words of someone else is an
artifact of the original design of the Internet, begun as a Department
of Defense project in 1969.

The Internet consists of tens of thousands of computers, called
servers, that act as repositories for public messages, private
electronic mail and World Wide Web home pages. Servers throughout the
world are interconnected through telephone lines so they can exchange
information and route messages to the individual users, or clients, of
a given server.

Each server stores a copy of the constantly changing contents of
newsgroups, which function as giant electronic bulletin boards
dedicated to particular subjects. There are thousands of them,
covering everything from particle physics to soap operas.

Any Internet user is free to post a contribution to nearly any
newsgroup, and the posting is rapidly copied from one server to
another, so the contents of a newsgroup are identical on every server.

Almost the only form of control over postings, including their
content, is voluntary adherence to informal behavior rules known as
"netiquette."

The idea of cancelbots originated when the Internet and its newsgroups
were almost exclusively the domain of university and government
scientists and researchers. Their purpose was to allow individuals to
rescind messages they later discovered to contain an error. The action
took the form of an automatic program, itself in the form of a
message, because it would be impossible for an individual to find and
delete every copy of the posting on every Internet server.

But the Usenet software running on servers doesn't verify that the
cancel message actually comes from the person who created the original
posting. All a malicious user need do is replace their actual e-mail
address with that of someone else to fool Usenet into deleting a
message. That counterfeiting is as simple as changing an option in the
browser software most people use to connect to the Internet.

"It's pretty easy. There's no authentication in the Usenet. So anybody
can pretend to be anybody else," Gilmore said.

It takes only slightly more sophistication to create a program that
searches newsgroups for certain keywords, and then issues a cancelbot
for any message that contains them. That is how the weekend attack
took place.

The use of counterfeit cancelbots is not new. The Church of
Scientology, embroiled in a legal dispute with former members, last
year launched cancelbots against the newsgroup postings of the
members. Attorneys for the church claimed the postings violated
copyright laws, because they contained the text of Scientology
teachings normally available only to longtime members who have paid
thousands of dollars.

Net users have also turned false cancelbots against those who violate
a basic rule of netiquette by "spamming" newsgroups -- that is,
posting a message to hundreds or even thousands of newsgroups, usually
commercial in nature and unrelated to the newsgroup topic.

"This technology has been used for both good and evil," Gilmore said.

But an individual launching a wholesale cancelbot attack on postings
because of content is considered a serious violation of netiquette --
although one about which there is little recourse at the moment.

"For everybody who takes the trouble and time to participate on the
Internet in some way, I think it is not acceptable for somebody else
to undo those efforts," Sobel said. "But what are the alternatives?
Not to pursue this means of communications? Unintended uses and
malicious uses seem to be inevitable."

What's needed, some say, is a fundamental change in the Internet that
forces individual users to "sign" their postings in such a way that
everyone has a unique identity that can't be forged.

[* And how about for the technically challenged who can't figure
   out the point-and-drool America Online software? *]

"The fatal flaw is that newsgroups were set up at a time when
everybody knew everybody using the system, and you could weed out
anybody who did this," Brunton said. "This points out that flaw in the
system, and that there are unreasonable people out there who will
exploit it."

[=-------------------------------------------------------------------------=]

title: Mitnick Faces 25 More Federal Counts of Computer Hacking
source: nando.net - Los Angeles Daily News
   
   LOS ANGELES (Sep 27, 1996 02:06 a.m. EDT) -- A computer hacker who
   used his digital prowess to outrun FBI agents for three years has been
   indicted on charges that he stole millions of dollars in software
   through the Internet.
   
   The 25-count federal indictment against Kevin Mitnick is the biggest
   development in the sensational case since the self-taught computer
   whiz was arrested in February 1995 in North Carolina.
   
   The 33-year-old son of a waitress from suburban Los Angeles has been
   held in custody in Los Angeles ever since.
   
   With Thursday's indictment, federal prosecutors made good on their vow
   to hold Mitnick accountable for what they say was a string of hacking
   crimes that pushed him to the top of the FBI's most-wanted list.
   
   "These are incredibly substantial charges. They involve conducts
   spanning two and a half years. They involve a systematic scheme to
   steal proprietary software from a range of victims," Assistant U.S.
   Attorney David Schindler said in an interview.
   
   Mitnick's longtime friend, Lewis De Payne, 36, also was indicted
   Thursday on charges that he helped steal the software between June
   1992 and February 1995 -- while Mitnick was on the run from the FBI.
   
   "I would say it is an absurd fiction," said De Payne's attorney,
   Richard Sherman. "I don't think the government is going to be able to
   prove its case."
   
   De Payne will surrender today to authorities in Los Angeles, Sherman
   said.
   
   Friends and relatives of Mitnick have defended his hacking, saying he
   did it for the intellectual challenge and to pull pranks -- but never
   for profit.
   
   Los Angeles' top federal prosecutor sees it differently.
   
   "Computer and Internet crime represents a major threat, with
   sophisticated criminals able to wreak havoc around the world," U.S.
   Attorney Nora M. Manella said in a written statement.
   
   The indictment charges Mitnick and De Payne with having impersonated
   officials from companies and using "hacking" programs to enter company
   computers. Schindler said the software involved the operation of
   cellular telephones and computer operating systems.
   
   Their alleged victims include the University of Southern California,
   Novell, Sun Microsystems and Motorola, Schindler said.

[=-------------------------------------------------------------------------=]

title: Hacker is freed but he's banned from computers
author: Brandon Bailey (Mercury News Staff Writer)

Convicted hacker Kevin Poulsen is out of prison after five years, but
he still can't touch a computer.

Facing a court order to pay more than $57,000 in restitution for
rigging a series of radio station call-in contests, Poulsen has
complained that authorities won't let him use his only marketable
skill -- programming.

Instead, Poulsen said, he's doomed to work for minimum wage at a
low-tech job for the next three years. Since his June release from
prison -- after serving more time behind bars than any other
U.S. hacker -- the only work he's found is canvassing door to door for
a liberal political action group.

It's a big change for the 30-year-old Poulsen, once among the most
notorious hackers on the West Coast. A former employee at SRI
International in Menlo Park, he was featured on television's
"America's Most Wanted" while living underground in Los Angeles as a
federal fugitive from 1989 to 1991.

Before authorities caught him, Poulsen burglarized telephone company
offices, electronically snooped through records of law enforcement
wiretaps and jammed radio station phone lines in a scheme to win cash,
sports cars and a trip to Hawaii.

Poulsen now lives with his sister in the Los Angeles area, where he
grew up in the 1970s and '80s. But he must remain under official
supervision for three more years. And it galls him that authorities
won't trust him with a keyboard or a mouse.

U.S. District Judge Manuel Real has forbidden Poulsen to have any
access to a computer without his probation officer's approval.

That's a crippling restriction in a society so reliant on computer
technology, Poulsen complained in a telephone interview after a
hearing last week in which the judge denied Poulsen's request to
modify his terms of probation.

To comply with those rules, Poulsen said, his parents had to put their
home computer in storage when he stayed with them. He can't use an
electronic card catalog at the public library. And he relies on
friends to maintain his World Wide Web site. He even asked his
probation officer whether it was OK to drive because most cars contain
microchips.

Living under government supervision apparently hasn't dampened the
acerbic wit Poulsen displayed over the years.

Prankster humor

When authorities were tracking him, they found he'd kept photographs
of himself, taken while burglarizing phone company offices, and that
he'd created bogus identities in the names of favorite comic book
characters.

Today, you can click on Poulsen's web page (http://www.catalog.com/kevin) 
and read his account of his troubles with the law. Until it was
revised Friday, you could click on the highlighted words "my probation
officer" -- and see the scary red face of Satan.

But though he's still chafing at authority, Poulsen insists he's ready
to be a law-abiding citizen.

"The important thing to me," he said, "is just not wasting the next
three years of my life." He said he's submitted nearly 70 job
applications but has found work only with the political group, which
he declined to identify.

Poulsen, who earned his high school diploma behind bars, said he wants
to get a college degree. But authorities vetoed his plans to study
computer science while working part-time because they want him to put
first priority on earning money for restitution.

Poulsen's federal probation officer, Marc Stein, said office policy
prevents him from commenting on the case. Poulsen's court-appointed
attorney, Michael Brennan, also declined comment.

Differing view

But Assistant U.S. Attorney David Schindler partly disputed Poulsen's
account.

"Nobody wants to see Mr. Poulsen fail," said Schindler, who has
prosecuted both Poulsen and Kevin Mitnick, another young man from the
San Fernando Valley whose interest in computers and telephones became
a passion that led to federal charges.

Schindler said Stein is simply being prudent: "It would be irresponsible 
for the probation office to permit him to have unfettered access to
computers."

Legal experts say there's precedent for restricting a hacker's access
to computers, just as paroled felons may be ordered not to possess
burglary tools or firearms. Still, some say it's going too far.

"There are so many benign things one can do with a computer," said
Charles Marson, a former attorney for the American Civil Liberties
Union who handles high-tech cases in private practice. "If it were a
typewriter and he pulled some scam with it or wrote a threatening
note, would you condition his probation on not using a typewriter?"

But Carey Heckman, co-director of the Law and Technology Policy Center
at Stanford University, suggested another analogy: "Would you want to
put an arsonist to work in a match factory?"

Friends defend Poulsen.

Over the years, Poulsen's friends and defense lawyers have argued that
prosecutors exaggerated the threat he posed, either because law
officers didn't understand the technology he was using or because his
actions seemed to flaunt authority.

Hacking is "sort of a youthful rebellion thing," Poulsen says
now. "I'm far too old to get back into that stuff."

But others who've followed Poulsen's career note that he had earlier
chances to reform.

He was first busted for hacking into university and government
computers as a teen-ager. While an older accomplice went to jail,
Poulsen was offered a job working with computers at SRI, the private
think tank that does consulting for the Defense Department and other
clients.

There, Poulsen embarked on a double life: A legitimate programmer by
day, he began breaking into Pacific Bell offices and hacking into
phone company computers at night.

When he learned FBI agents were on his trail, he used his skills to
track their moves.

Before going underground in 1989, he also obtained records of secret
wiretaps from unrelated investigations. Though Poulsen said he never
tipped off the targets, authorities said they had to take steps to
ensure those cases weren't compromised.

According to Schindler, the probation office will consider Poulsen's
requests to use computers "on a case-by-case basis."

[=-------------------------------------------------------------------------=]

[* Blurb on Bernie's release follows this article. *]

title: Computer Hacker Severely Beaten after Criticizing Prison Conditions
       Target of Campaign by U.S. Secret Service

A convicted hacker, in prison for nothing more than possession of
electronic parts easily obtainable at any Radio Shack, has been
savagely beaten after being transferred to a maximum security prison
as punishment for speaking out publicly about prison conditions.
Ed Cummings, recently published in Wired and Internet Underground, as
well as a correspondent for WBAI-FM in New York and 2600 Magazine,
has been the focus of an increasingly ugly campaign of harrassment
and terror from the authorities. At the time of this writing, Cummings
is locked in the infectious diseases ward at Lehigh County prison in
Allentown, Pennsylvania, unable to obtain the proper medical treatment
for the severe injuries he has suffered.

The Ed Cummings case has been widely publicized in the computer hacker
community over the past 18 months. In March of 1995, in what can only
be described as a bizarre application of justice, Cummings (whose pen
name is "Bernie S.") was targetted and imprisoned by the United States
Secret Service for mere possession of technology that could be used to
make free phone calls. Although the prosecution agreed there was no
unauthorized access, no victims, no fraud, and no costs associated with
the case, Cummings was imprisoned under a little known attachment to the
Digital Telephony bill allowing individuals to be charged in this fashion.
Cummings was portrayed by the Secret Service as a potential terrorist
because of some of the books found in his library.

A year and a half later, Cummings is still in prison, despite the
fact that he became eligible for parole three months ago. But things have
now taken a sudden violent turn for the worse. As apparent retribution for
Cummings' continued outspokenness against the daily harrassment and
numerous injustices that he has faced, he was transferred on Friday
to Lehigh County Prison, a dangerous maximum security facility. Being
placed in this facility was in direct opposition to his sentencing
order. The reason given by the prison: "protective custody".

A day later, Cummings was nearly killed by a dangerous inmate for not
getting off the phone fast enough. By the time the prison guards stopped
the attack, Cummings had been kicked in the face so many times that he
lost his front teeth and had his jaw shattered. His arm, which he tried
to use to shield his face, was also severely injured. It is expected that
his mouth will be wired shut for up to three months. Effectively,
Cummings has now been silenced at last.

>From the start of this ordeal, Cummings has always maintained his
composure and confidence that one day the injustice of his
imprisonment will be realized. He was a weekly contributor to a
radio talk show in New York where he not only updated listeners on
his experiences, but answered their questions about technology.
People from as far away as Bosnia and China wrote to him, having
heard about his story over the Internet.

Now we are left to piece these events together and to find those
responsible for what are now criminal actions against him. We are
demanding answers to these questions: Why was Cummings transferred
for no apparent reason from a minimum security facility to a very
dangerous prison? Why has he been removed from the hospital immediately
after surgery and placed in the infectious diseases ward of the very
same prison, receiving barely any desperately needed medical
attention? Why was virtually every moment of Cummings' prison stay a
continuous episode of harrassment, where he was severely punished for
such crimes as receiving a fax (without his knowledge) or having too
much reading material? Why did the Secret Service do everything in
their power to ruin Ed Cummings' life?

Had these events occurred elsewhere in the world, we would be quick
to condemn them as barbaric and obscene. The fact that such things are
taking place in our own back yards should not blind us to the fact that
they are just as unacceptable.

Lehigh County Prison will be the site of several protest actions as will
the Philadelphia office of the United States Secret Service. For more
information on this, email protest@2600.com or call our office at
(516) 751-2600.

9/4/96

[=-------------------------------------------------------------------------=]

title: Bernie S. Released!

As of Friday, September 13th, Bernie S. was released from prison on
an unprecedented furlough. He will have to report to probation and
he still has major medical problems as a result of his extended tour
of the Pennsylvania prison system. But the important thing is that
he is out and that this horrible ordeal has finally begun to end.

We thank all of you who took an interest in this case. We believe
it was your support and the pressure you put on the authorities that
finally made things change. Thanks again and never forget the power
you have.

emmanuel@2600.com
www.2600.com

[=-------------------------------------------------------------------------=]

title: 

ENGLAND:

The Squidge was arrested at his home yesterday under the Computer Misuse
Act. A long standing member of the US group the *Guild, Squidge was silent
today after being released but it appears no formal charges will be made
until further interviews have taken place.

Included in the arrest were the confiscation of his computer equipment
including two Linux boxes and a Sun Sparc. A number of items described as
'telecommunications devices' were also seized as evidence.

Following the rumours of ColdFire's recent re-arrest for cellular fraud
this could mean a new crackdown on hacking and phreaking by the UK
authorities. If this is true, it could spell the end for a particularly
open period in h/p history when notable figures have been willing to
appear more in public.

We will attempt to release more information as it becomes available.

(not posted by Squidge)

--
    Brought to you by The NeXus.....

[* Good luck goes out to Squidge.. we are hoping for the best. *]

[=-------------------------------------------------------------------------=]

title: School Hires Student to Hack Into Computers
source: The Sun Herald - 22 August 1996

     Palisades Park, NJ - When in trouble, call an expert.

     Students at Palisades Park's high school needed their
transcripts to send off to colleges.  But they were in the computer
and no one who knew the password could be reached.  So the school
hired a 16-year-old hacker to break in.

     "They found this student who apparently was a whiz, and,
apparently, was able to go in and unlock the password," School Board
attorney Joseph R. Mariniello said.

     Superintendent George Fasciano was forced to explain to the
School Board on Monday the $875 bill for the services of Matthew
Fielder.

[* He should have charged more :) *]

[=-------------------------------------------------------------------------=]

title: Paranoia and Brit Hackers Fuel Infowar Craze in Spy Agencies
author: unknown
source: Crypt Newsletter 38 

Electronic doom will soon be visited on U.S. computer networks by
information warriors, hackers, pannational groups of computer-wielding
religious extremists, possible agents of Libya and Iran, international
thugs and money-mad Internet savvy thieves.

John Deutch, director of Central Intelligence, testified to the
truth of the matter, so it must be graven in stone. In a long statement
composed in the august tone of the Cold Warrior, Deutch said to the
Senate Permanent Subcommittee on Investigations on June 25, "My greatest
concern is that hackers, terrorist organizations, or other nations might
use information warfare techniques" to disrupt the national
infrastructure.

"Virtually any 'bad actor' can acquire the hardware and software
needed to attack some of our critical information-based infrastructures.
Hacker tools are readily available on the Internet, and hackers
themselves are a source of expertise for any nation or foreign
terrorist organization that is interested in developing an information
warfare capability. In fact, hackers, with or without their full
knowledge, may be supplying advice and expertise to rogue states such
as Iran and Libya."

In one sentence, the head of the CIA cast hackers -- from those more
expert than Kevin Mitnick to AOLHell-wielding idiots calling an America
On-Line overseas account -- as pawns of perennial international bogeymen,
Libya and Iran.

Scrutiny of the evidence that led to this conclusion was not possible
since it was classified, according to Deutch.

" . . . we have [classified] evidence that a number of countries
around the world are developing the doctrine, strategies, and tools
to conduct information attacks," said Deutch.

Catching glimpses of shadowy enemies at every turn, Deutch
characterized them as operating from the deep cover of classified
programs in pariah states.  Truck bombs aimed at the telephone
company, electronic assaults by "paid hackers" are likely to
be part of the arsenal of anyone from the Lebanese Hezbollah
to "nameless . . . cells of international terrorists such as those
who attacked the World Trade Center."

Quite interestingly, a Minority Staff Report entitled "Security and
Cyberspace" and presented to the subcommittee around the same time as
Deutch's statement, presented a different picture.  In its attempt to
raise the alarm over hacker assaults on the U.S., it inadvertently
portrayed the intelligence community responsible for appraising the
threat as hidebound stumblebums, Cold Warriors resistant to change and
ignorant or indifferent to the technology of computer networks and their
misuse.

Written by Congressional staff investigators Dan Gelber and Jim Christy,
the report quotes an unnamed member of the intelligence  community likening
threat assessment in the area to "a toddler soccer game, where everyone
just runs around trying to kick the ball somewhere."  Further, assessment
of the threat posed by information warriors was "not presently a priority
of our nation's intelligence and enforcement communities."

The report becomes more comical with briefings from intelligence
agencies said to be claiming that the threat of hackers and information
warfare is "substantial" but completely unable to provide a concrete
assessment of the threat because few or no personnel were working on
the subject under investigation. "One agency assembled [ten] individuals
for the Staff briefing, but ultimately admitted that only one person was
actually working 'full time' on intelligence collection and threat
analysis," write Gelber and Christy.

The CIA is one example.

"Central Intelligence Agency . . . staffs an 'Information Warfare
Center'; however, at the time of [the] briefing, barely a handful
of persons were dedicated to collection and on [sic] defensive
information warfare," comment the authors.

" . . . at no time was any agency able to present a national threat
assessment of the risk posed to our information infrastructure," they
continue. Briefings on the subject, if any and at any level of
classification, "consisted of extremely limited anecdotal information."

Oh no, John, say it ain't so!

The minority report continues to paint a picture of intelligence agencies
that have glommed onto the magic words "information warfare" and
"hackers" as mystical totems, grafting the subjects onto "pre-existing"
offices or new "working groups." However, the operations are based only
on labels. "Very little prioritization" has been done, there are
few analysts working on the subjects in question.

Another "very senior intelligence officer for science and technology"
is quoted claiming "it will probably take the intelligence community
years to break the traditional paradigms, and re-focus resources"
in the area.

Restated, intelligence director Deutch pronounced in June there was
classified evidence that hackers are in league with Libya and Iran and
that countries around the world are plotting plots to attack the U.S.
through information warfare.  But the classified data is and was, at best,
anecdotal gossip -- hearsay, bullshit -- assembled by perhaps a handful of
individuals working haphazardly inside the labyrinth of the intelligence
community. There is no real threat assessment to back up the Deutch
claims.  Can anyone say _bomber gap_?

The lack of solid evidence for any of the claims made by the intelligence
community has created an unusual stage on which two British hackers,
Datastream Cowboy and Kuji, were made the dog and pony in a ridiculous
show to demonstrate the threat of information warfare to members of
Congress.  Because of a break-in at an Air Force facility in Rome, NY,
in 1994, booth hackers were made the stars of two Government Accounting
Office reports on network intrusions in the Department of Defense earlier
this year.  The comings and goings of Datastream Cowboy also constitute the
meat of Gelber and Christy's minority staff report from the Subcommittee on
Investigations.

Before delving into it in detail, it's interesting to read what a
British newspaper published about Datastream Cowboy, a sixteen year-old,
about a year before he was made the poster boy for information
warfare and international hacking conspiracies in front of Congress.

In a brief article, blessedly so in contrast to the reams of propaganda
published on the incident for Congress, the July 5 1995 edition of The
Independent wrote, "[Datastream Cowboy] appeared before Bow Street
magistrates yesterday charged with unlawfully gaining access to a series
of American defense computers. Richard Pryce, who was 16 at the time of
the alleged offences, is accused of accessing key US Air Force systems
and a network owned by Lockheed, the missile and aircraft manufacturers."

Pryce, a resident of a northwest suburb of London did not enter a plea
on any of 12 charges levied against him under the British
Computer Misuse Act.  He was arrested on May 12, 1994, by New Scotland
Yard as a result of work by the U.S. Air Force Office of Special
Investigations.  The Times of London reported when police came for
Pryce, they found him at his PC on the third floor of his family's house.
Knowing he was about to be arrested, he "curled up on the floor and cried."

In Gelber and Christy's staff report, the tracking of Pryce, and to a
lesser extent a collaborator called Kuji -- real name Mathew Bevan, is
retold as an eight page appendix entitled "The Case Study: Rome
Laboratory, Griffiss Air Force Base, NY Intrusion."

Pryce's entry into Air Force computers was noticed on March 28, 1994,
when personnel discovered a sniffer program he had installed on one
of the Air Force systems in Rome.  The Defense Information System
Agency (DISA) was notified.  DISA subsequently called the Air
Force Office of Special Investigations (AFOSI) at the Air Force
Information Warfare Center in San Antonio, Texas. AFOSI then
sent a team to Rome to appraise the break-in, secure the system and
trace those responsible.  During the process, the AFOSI team discovered
Datastream Cowboy had entered the Rome Air Force computers for the
first time on March 25, according to the report.  Passwords had been
compromised, electronic mail read and deleted and unclassified
"battlefield simulation" data copied off the facility. The
Rome network was also used as a staging area for penetration of other
systems on the Internet.

AFOSI investigators initially traced the break-in back one step to
the New York City provider, Mindvox. According to the Congressional
report, this put the NYC provider under suspicion because "newspaper
articles" said Mindvox's computer security was furnished by two "former
Legion of Doom members." "The Legion of Doom is a loose-knit computer
hacker group which had several members convicted for intrusions into
corporate telephone switches in 1990 and 1991," wrote Gelber and Christy.

AFOSI then got permission to begin monitoring -- the equivalent of
wiretapping -- all communications on the Air Force network.  Limited
observation of other Internet providers being used during the break-in
was conducted from the Rome facilities.  Monitoring told the investigators
the handles of hackers involved in the Rome break-in were Datastream
Cowboy and Kuji.

Since the monitoring was of limited value in determining the whereabouts
of Datastream Cowboy and Kuji, AFOSI resorted to "their human intelligence
network of informants, i.e., stool pigeons, that 'surf the Internet.'
Gossip from one AFOSI 'Net stoolie uncovered that Datastream Cowboy was from
Britain. The anonymous source said he had e-mail correspondence with
Datastream Cowboy in which the hacker said he was a 16-year old living in
England who enjoyed penetrating ".MIL" systems. Datastream Cowboy also
apparently ran a bulletin board system and gave the telephone number to the
AFOSI source.

The Air Force team contacted New Scotland Yard and the British law
enforcement agency identified the residence, the home of Richard
Pryce, which corresponded to Datastream Cowboy's system phone number.
English authorities began observing Pryce's phone calls and noticed
he was making fraudulent use of British Telecom.  In addition,
whenever intrusions at the Air Force network in Rome occurred, Pryce's
number was seen to be making illegal calls out of Britain.

Pryce travelled everywhere on the Internet, going through South America,
multiple countries in Europe and Mexico, occasionally entering the Rome
network.  From Air Force computers, he would enter systems at Jet
Propulsion Laboratory in Pasadena, California, and the Goddard Space
Flight Center in Greenbelt, Maryland. Since Pryce was capturing the logins
and passwords of the Air Force networks in Rome, he was then able to
get into the home systems of Rome network users, defense contractors
like Lockheed.

By mid-April of 1994 the Air Force was monitoring other systems being
used by the British hackers. On the 14th of the month, Kuji logged on
to the Goddard Space Center from a system in Latvia and copied data
from it to the Baltic country.  According to Gelber's report, the
AFOSI investigators assumed the worst, that it was a sign that someone
in an eastern European country was making a grab for sensitive
information.  They broke the connection but not before Kuji had
copied files off the Goddard system.  As it turned out, the Latvian
computer was just another system the British hackers were using as
a stepping stone; Pryce had also used it to cover his tracks when
penetrating networks at Wright-Patterson Air Force Base in Ohio, via
an intermediate system in Seattle, cyberspace.com.

The next day, Kuji was again observed trying to probe various
systems at NATO in Brussels and The Hague as well as Wright-Patterson.
On the 19th, Pryce successfully returned to NATO systems in The
Hague through Mindvox.  The point Gelber and Christy seem to be trying
to make is that Kuji, a 21-year old, was coaching Pryce during some
of his attacks on various systems.

By this point, New Scotland Yard had a search warrant for Pryce
with the plan being to swoop down on him the next time he accessed
the Air Force network in Rome.

In April, Pryce penetrated a system on the Korean peninsula and copied
material off a facility called the Korean Atomic Research Institute
to an Air Force computer in Rome. At the time, the investigators had
no idea whether the system was in North or South Korea.  The impression
created is one of hysteria and confusion at Rome. There was fear that the
system, if in North Korea, would trigger an international incident, with
the hack interpreted as an "aggressive act of war." The system turned
out to be in South Korea.

During the Korean break-in, New Scotland Yard could have intervened and
arrested Pryce.  However, for unknown reasons, the agency did not.  Those
with good memories may recall mainstream news reports concerning Pryce's
hack, which was cast as an entry into sensitive North Korean networks.

It's worth noting that while the story was portrayed as the work of
an anonymous hacker, both the U.S. government and New Scotland Yard knew
who the perpetrator was.  Further, according to Gelber's report English
authorities already had a search warrant for Pryce's house.

Finally, on May 12 British authorities pounced.  Pryce was arrested
and his residence searched.  He crumbled, according to the Times of
London, and began to cry.  Gelber and Christy write that Pryce promptly
admitted to the Air Force break-ins as well as others.  Pryce
confessed he had copied a large program that used artificial intelligence
to construct theoretical Air Orders of Battle from an Air Force computer
to Mindvox and left it there because of its great size, 3-4 megabytes.
Pryce paid for his Internet service with a fraudulent credit card number.
At the time, the investigators were unable to find out the name and
whereabouts of Kuji. A lead to an Australian underground bulletin board
system failed to pan out.

On June 23 of this year, Reuters reported that Kuji -- 21-year-old Mathew
Bevan -- a computer technician, had been arrested and charged in
connection with the 1994 Air Force break-ins in Rome.

Rocker Tom Petty sang that even the losers get lucky some time.  He
wasn't thinking of British computer hackers but no better words could be
used to describe the two Englishmen and a two year old chain of events that
led to fame as international computer terrorists in front of Congress
at the beginning of the summer of 1996.

Lacking much evidence for the case of conspiratorial computer-waged
campaigns of terror and chaos against the U.S., the makers of Congressional
reports resorted to telling the same story over and over, three
times in the space of the hearings on the subject. One envisions U.S.
Congressmen too stupid or apathetic to complain, "Hey, didn't we get that
yesterday, and the day before?" Pryce and Bevan appeared in "Security in
Cyberspace" and twice in Government Accounting Office reports AIMD-96-84
and T-AIMD96-92. Jim Christy, the co-author of "Security in Cyberspace"
and the Air Force Office of Special Investigations' source for the Pryce
case supplied the same tale for Jack Brock, author of the GAO reports.
Brock writes, ". . . Air Force officials told us that at least one of
the hackers may have been working for a foreign country interested in
obtaining military research data or areas in which the Air Force was
conducting advanced research."  It was, apparently, more wishful
thinking.


Notes:

The FAS Web site also features an easy to use search engine which can
be used to pull up the Congressional testimony on hackers and
network intrusion.  These example key words are effective: "Jim
Christy," "Datastream Cowboy".

[=-------------------------------------------------------------------------=]

title: Hackers Find Cheap Scotland Yard Phone Connection
source: Reuters/Variety

Monday August 5 12:01 AM EDT

LONDON (Reuter) - Computer hackers broke into a security system at
Scotland Yard, London's metropolitan police headquarters, to make
international calls at police expense, police said Sunday.

A police spokesman would not confirm a report in the Times newspaper
that the calls totaled one million pounds ($1.5 million). He said
the main computer network remained secure.

"There is no question of any police information being accessed," the
spokesman said. "This was an incident which was investigated by our
fraud squad and by AT&T investigators in the U.S."

AT&T Corp investigators were involved because most of the calls were
to the United States, the Times said.

According to The Times, the hackers made use of a system called PBX
call forwarding that lets employees to make business calls from home
at their employer's expense.

[=-------------------------------------------------------------------------=]

title: U.S. Official Warns OF "Electronic Pearl Harbor"
source: BNA Daily Report - 17 Jul 96

Deputy U.S. Attorney General Jamie Gorelick told a Senate
subcommittee last week that the possibility of "an electronic Pearl
Harbor" is a very real danger for the U.S.  She noted in her
testimony that the U.S. information infrastructure is a hybrid
public/private network, and warned that electronic attacks "can
disable or disrupt the provision of services just as readily as --
if not more than -- a well-placed bomb."  On July 15 the Clinton
Administration called for a President's Commission on Critical
Infrastructure Protection, with the mandate to identify the nature
of threats to U.S. infrastructure, both electronic and physical, and
to work with the private sector in devising a strategy for
protecting this infrastructure.  At an earlier hearing, subcommittee
members were told that about 250,000 intrusions into Defense
Department computer systems are attempted each year, with about a
65% success rate.

[=-------------------------------------------------------------------------=]

title: Suit Challenges State's Restraint of the Internet Via AP
author: Jared Sandberg
source: The Wall Street Journal

Can the state of Georgia hold sway over the global Internet?

A federal lawsuit filed against the state Tuesday by the American
Civil Liberties Union should eventually answer that question. The
suit, filed in federal district court in Georgia, challenges a new
Georgia law that makes it illegal in some instances to communicate
anonymously on the Internet and to use trademarks and logos without
permission.

The ACLU, joined by 13 plaintiffs including an array of public-
interest groups, contends that the Georgia law is "unconstitutionally
vague" and that its restraints on using corporate logos and trade
names are "impermissibly chilling constitutionally protected
expression." The plaintiffs also argue that the Georgia law, which
imposes a penalty of up to 12 months in jail and $1,000 in fines,
illegally tries to impose state restrictions on interstate commerce, a
right reserved for Congress.

The legal challenge is one of the first major assaults on state laws
that seek to rein in the Internet, despite its global reach and
audience. Since the beginning of 1995, 11 state legislatures have
passed Internet statutes and nine others have considered taking
action.

Connecticut passed a law last year that makes it a crime to send an
electronic-mail message "with intent to harass, annoy or alarm another
person" -- despite the Internet's hallowed tradition of "flaming"
users with messages designed to do just that. Virginia enacted a bill
this year making it illegal for a state employee -- including
professors who supposedly have academic freedom on state campuses --
to use state-owned computers to get access to sexually explicit
material. New York state has tried to resurrect prohibitions on
"indecent material" that were struck down as unconstitutional by a
federal appeals panel ruling on the federal Communications Decency Act
three months ago.

Most Internet laws target child pornographers and stalkers. Opponents
argue the well-intended efforts could nonetheless chill free speech
and the development of electronic commerce. They maintain that the
Internet, which reaches into more than 150 countries, shouldn't be
governed by state laws that could result in hundreds of different, and
often conflicting, regulations.

"We've got to nip this in the bud and have a court declare that states
can't regulate the Internet because it would damage interstate
commerce," says Ann Beeson, staff attorney for the ACLU. "Even though
it's a Georgia statute, it unconstitutionally restricts the ability of
anybody on the Internet to use a pseudonym or to link to a Web page
that contains a trade name or logo. It is unconstitutional on its
face."

Esther Dyson, president of high-tech publisher EDventure Holdings
Inc. and chairwoman of the Electronic Frontier Foundation, a high-tech
civil liberties organization that is a co-plaintiff in the lawsuit,
calls the Georgia law "brain-damaged and unenforceable" and adds: "How
are they going to stop people from using fake names? Anonymity
shouldn't be a crime. Committing crimes should be a crime."

But Don Parsons, the Republican state representative who sponsored the
Georgia bill, countered that the law is a necessary weapon to combat
fraud, forgery and other on-line misdeeds. The groups that oppose it,
he says, "want to present (the Internet) as something magical, as
something above and beyond political boundaries." It is none of these
things, he adds.

Nor does the Georgia law seek to ban all anonymity, Mr. Parsons says;
instead, it targets people who "fraudulently misrepresent their (Web)
site as that of another organization." Misrepresenting on-line medical
information, for example, could cause serious harm to an unsuspecting
user, he says.

But Mr. Parsons's critics, including a rival state lawmaker,
Rep. Mitchell Kaye, say political reprisal lies behind the new
law. They say Mr. Parsons and his political allies were upset by the
Web site run by Mr. Kaye, which displayed the state seal on its
opening page and provided voting records and sometimes harsh political
commentary. Mr. Kaye asserts that his Web site prompted the new law's
attack on logos and trademarks that are used without explicit
permission.

"We've chosen to regulate free speech in the same manner that
communist China, North Korea, Cuba and Singapore have," Mr. Kaye
says. "Legislators' lack of understanding has turned to fear. It has
given Georgia a black eye and sent a message to the world -- that we
don't understand and are inhospitable to technology."

Mr. Parsons denies that the political Web site was the primary reason
for his sponsorship of the new statute.

The very local dispute underscores the difficulty of trying to
legislate behavior on the Internet. "It creates chaos because I don't
know what rules are going to apply to me," says Lewis Clayton, a
partner at New York law firm Paul, Weiss, Rifkind, Wharton &
Garrison. "Whose laws are going to govern commercial transactions? You
don't want to have every different state with the ability to regulate
what is national or international commerce."

In the case of the Georgia statute, while its backers say it isn't a
blanket ban of anonymity, opponents fear differing interpretations of
the law could lead to the prosecution of AIDS patients and childabuse
survivors who use anonymity to ensure privacy when they convene on the
Internet.

"Being able to access these resources anonymously really is crucial,"
says Jeffery Graham, executive director of the AIDS Survival Project,
an Atlanta service that joined the ACLU in the lawsuit. His group's
members "live in small communities," he says, and if their identities
were known, "they would definitely suffer from stigmas and reprisals."

[=-------------------------------------------------------------------------=]

title: U.S. Government Plans Computer Emergency Response Team
source: Chronicle of Higher Education - 5 Jul 96

The federal government is planning a centralized emergency response team to
respond to attacks on the U.S. information infrastructure.  The Computer
Emergency Response Team at Carnegie Mellon University, which is financed
through the Defense Department, will play a major role in developing the new
interagency group, which will handle security concerns related to the
Internet, the telephone system, electronic banking systems, and the
computerized systems that operate the country's oil pipelines and electrical
power grids. 

[=-------------------------------------------------------------------------=]

title: Hackers $50K challenge to break Net security system
source: Online Business Today

World Star Holdings in Winnipeg, Canada is looking for
trouble. If they find it, they're willing to pay $50,000 to the
first person who can break their security system. The
company has issued an open invitation to take the "World
Star Cybertest '96: The Ultimate Internet Security Challenge,"
in order to demonstrate the Company's Internet security
system.

Personal email challenges have been sent to high profile
names such as Bill Gates, Ken Rowe at the National Center
for Super Computing, Dr. Paul Penfield, Department of
Computer Science at the M.I.T. School of Engineering and
researchers Drew Dean and Dean Wallach of Princeton
University.

[* Challenging Bill Gates to hack a security system is like
   challenging Voyager to a knitting contest. *]

OBT's paid subscription newsletter Online Business
Consultant has recently quoted the Princeton team in several
Java security reports including "Deadly Black Widow On The
Web: Her Name is JAVA," "Java Black Widows---Sun
Declares War," Be Afraid. Be Very Afraid" and "The
Business Assassin."  To read these reports go to Home Page
Press http://www.hpp.com and scroll down the front page.

Brian Greenberg, President of World Star said, "I personally
signed, sealed and emailed the invitations and am very
anxious to see some of the individuals respond to the
challenge. I am confident that our system is, at this time, the
most secure in cyberspace."

World Star Holdings, Ltd., is a provider of interactive
"transactable" Internet services and Internet security
technology which Greenberg claims has been proven
impenetrable. The Company launched its online contest
offering more than $50,000 in cash and prizes to the first
person able to break its security system.

According to the test's scenario hackers are enticed into a
virtual bank interior in search of a vault. The challenge is to
unlock it and find a list of prizes with inventory numbers and
a hidden "cyberkey" number.  OBT staff used Home Page
Press's Go.Fetch (beta) personal agent software to retrieve the
World Star site and was returned only five pages.

If you're successful, call World Star at 204-943-2256.  Get to
it hackers.  Bust into World Star at http://205.200.247.10 to
get the cash!

[=-------------------------------------------------------------------------=]

title: Criminal cult begins PGP crack attempt
from: grady@netcom.com (Grady Ward)

The Special Master has informed me that Madame Kobrin has asked
her to retain a PC expert to attempt to "crack" a series of
pgp-encrypted multi-megabyte files that were seized along with
more than a compressed gigabyte of other material from my safety
deposit box.

Ironically, they phoned to ask for assistance in supplying them
with a prototype "crack" program that they could use in iterating
and permuting possibilities. I did supply them a good core
pgpcrack source that can search several tens of thousands of
possible key phrases a seconds; I also suggested that they should
at least be using a P6-200 workstation or better to make the
search more efficient.

The undercurrent is that this fresh hysterical attempt to "get"
something on me coupled with the daily settlement pleas reflects
the hopelessness of the litigation position of the criminal cult.

It looks like the criminal cult has cast the die to ensure that
the RTC vs Ward case is fought out to the bitter end.  Which I
modestly predict will be a devastating, humiliating defeat for
them from a pauper pro per.

I have given them a final settlement offer that they can leave or
take. Actually they have a window of opportunity now to drop the
suit since my counterclaims have been dismissed (although Judge
Whyte invited me to re-file a new counterclaim motion on more
legally sufficiant basis).

I think Keith and I have found a successful counter-strategy to
the cult's system of litigation harassment.

Meanwhile, I could use some help from veteran a.r.s'ers. I need
any copy you have of the Cease and Desist letter that you may
have received last year from Eliot Abelson quondam criminal cult
attorney and Eugene Martin Ingram spokespiece.


Physical mail:

Grady Ward
3449 Martha Ct.
Arcata, CA  95521-4884

JP's BMPs or fax-images to:

grady@northcoast.com

Thanks.

Grady Ward

Ps. I really do need all of your help and good wishes after all.
Thanks for all of you keeping the net a safe place to insult
kook kults.

[=-------------------------------------------------------------------------=]

title: Hackers Bombard Internet
author: Dinah Zeiger
source: Denver Post

9/21/96

        Computer hackers have figured out a new way to tie the Internet
in knots - flooding network computers with messages so other users can't
access them.
        Late Thursday, the federally funded Computer Emergency Response
Team at Carnegie-Mellon University in Pittsburgh issued an advisory to
Internet service providers, universities and governments detailing the
nature of the attacks, which have spread to about 15 Internet services
over the past six weeks. Three were reported this week.
        Thus far, none of the Colorado-based Internet providers contacted
has been victimized, but all are on alert and preparing defenses.
        The worst of it is that there is no rock-solid defense, because
the attacks are launched using the same rules - or protocols- that allow
Internet computers to establish a connection.
        The best the Computer Emergency Response Team can do so far is to
suggest modifications that can reduce the likelihood that a site will be
targeted.
        In essence, hackers bombard their victim sites with hundreds of
messages from randomly generated, fictitious addresses. The targeted
computers overload when they try to establish a connection with the false
sites. It doesn't damage the network, it just paralyzes it.
        The Computer Emergency Response Team traces the attacks to two
underground magazines, 2600 and Phrack, which recently published the code
required to mount the assaults.

[* Uh, wait.. above it said messages.. which sounds more like usenet,
   not SYN Floods.. *]

        "It's just mischief," said Ted Pinkowitz, president of Denver
based e-central. "They're just doing it to prove that it can be done."
        One local Internet service provider, who declined to be identified
because he fears being targeted, said it goes beyond pranks.
        "It's malicious," he said. "They're attacking the protocols that
are the most basic glue of the Internet and it will take some subtle work
to fix it. You can't just redesign the thing, because it's basic to the
operation of the entire network."
        The response team says tracking the source of an attack is
difficult, but not impossible.
        "We have received reports of attack origins being identified,"
the advisory says.

[=-------------------------------------------------------------------------=]

title: Crypto Mission Creep
author: Brock N. Meeks

The Justice Department has, for the first time, publicly acknowledged
using the code-breaking technologies of the National Security Agency, to
help with domestic cases, a situation that strains legal boundaries of
the agency.

Deputy Attorney General Jamie Gorelick admitted in July, during an open
hearing of the Senate's Governmental Affairs permanent subcommittee on
investigations, that the Justice Department:  "Where, for example, we
are having trouble decrypting information in a computer, and the
expertise lies at the NSA, we have asked for technical assistance under
our control."

That revelation should have been a bombshell.  But like an Olympic
diver, the revelation made hardly a ripple.

By law the NSA is allowed to spy on foreign communications without
warrant or congressional oversight.  Indeed, it is one of the most
secretive agencies of the U.S. government, whose existence wasn't even
publicly acknowledged until the mid-1960s.   However, it is forbidden to
get involved in domestic affairs.

During the hearing Sen. Sam Nunn (D-Ga.) asked Gorelick if the President
had the "the constitutional authority to override statutes where the
basic security of the country is at stake?"  He then laid out a
scenario:  "Let's say a whole part of the country is, in effect,
freezing to death in the middle of the winter [because a power grid has
been destroyed] and you believe it's domestic source, but you can't
trace it, because the FBI doesn't have the capability.  What do you do?"

Gorelick replied that:  "Well, one thing you could do -- let me say
this, one thing you could do is you could detail resources from the
intelligence community to the law enforcement community.  That is, if
it's under -- if it's -- if you're talking about a technological
capability, we have done that."   And then she mentioned that the NSA
had been called on to help crack some encrypted data.

But no one caught the significance of Gorelick's' statements.  Instead,
the press focused on another proposal she outlined, the creation of what
amounts to a "Manhattan Project" to help thwart the threat of
information warfare.  "What we need, then, is the equivalent of the
'Manhattan Project' for infrastructure protection, a cooperative venture
between the government and private sector to put our best minds together
to come up with workable solutions to one of our most difficult
challenges,'' Gorelick told Congress.  Just a day earlier, President
Clinton had signed an executive order creating a blue-ribbon panel, made
up of several agencies, including the Justice Department, the CIA, the
Pentagon and the NSA and representatives of the private sector.

Though the press missed the news that day; the intelligence agency
shivered.  When I began investigating Gorelick's statement, all I got
were muffled grumbling.   I called an NSA official at home for comments.
"Oh shit," he said, and then silence.   "Can you elaborate a bit on that
statement?" I asked, trying to stifle a chuckle.  "I think my comment
says it all," he said and abruptly hung up the phone.

Plumbing several sources within the FBI drew little more insight.   One
source did acknowledge that the Bureau had used the NSA to crack some
encrypted data "in a handful of instances," but he declined to
elaborate.

Was the Justice Department acting illegally by pulling the NSA into
domestic work?   Gorelick was asked by Sen. Nunn if the FBI had the
legal authority to call on the NSA to do code-breaking work.   "We have
authority right now to ask for assistance where we think that there
might be a threat to the national security," she replied.  But her
answer was "soft."   She continued:  "If we know for certain that there
is a -- that this is a non-national security criminal threat, the
authority is much more questionable."  Questionable, yes, but averted?
No.

If Gorelick's answers seem coy, maybe it's because her public statements
are at odds with one another.   A month or so before her congressional
bombshell, she revealed the plans for the information age"Manhattan
Project" in a speech.   In a story for Upside magazine, by
old-line investigative reporter Lew Koch, where he broke the story,
Gorelick whines in her speech about law enforcement going through "all
that effort" to obtain warrants to search for evidence only to find a
child pornography had computer files "encrypted with DES" that don't
have a key held in escrow.  "Dead end for us," Gorelick says.  "Is this
really the type of constraint we want? Unfortunately, this is not an
imaginary scenario. The problem is real."

All the while, Gorelick knew, as she would later admit to Congress, that
the FBI had, in fact, called the NSA to help break codes.

An intelligence industry insider said the NSA involvement is legal.
"What makes it legal probably is that when [the NSA] does that work
they're really subject to all the constraints that law enforcement is
subject to."    This source went on to explain that if the FBI used any
evidence obtained from the NSA's code-breaking work to make it's case in
court, the defense attorney could, under oath, ask the NSA to "explain
fully" how it managed to crack the codes.  "If I were advising NSA today
I would say, there is a substantial risk that [a defense attorney] is
going to make [the NSA] describe their methods," he said.  "Which means
it's very difficult for the NSA to do its best stuff in criminal cases
because of that risk."

Some 20 years ago, Sen. Frank Church, then chairman of the Senate
Intelligence Committee, warned of getting the NSA involved in domestic
affairs, after investigating the agency for illegal acts.  He said the
"potential to violate the privacy of Americans is unmatched by any other
intelligence agency."   If the resources of the NSA were ever used
domestically, "no American would have any privacy left . . . There would
be no place to hide," he said.  "We must see to it that this agency and
all agencies that possess this technology operate within the law and
under proper supervision, so that we never cross over that abyss.  That
is an abyss from which there is no return," he said.

And yet, the Clinton Administration has already laid the groundwork for
such "mission creep" to take place, with the forming of this "Manhattan
Project."

But if the Justice Department can tap the NSA at will -- a position of
questionable legality that hasn't been fully aired in public debate --
why play such hardball on the key escrow encryption issue?

Simple answer:  Key escrow is an easier route.  As my intelligence
community source pointed out, bringing the NSA into the mix causes
problems when a case goes to court.   Better to have them work in the
background, unseen and without oversight, the Administration feels. With
key escrow in place, there are few legal issues to hurdle.

In the meantime, the Justice Department has started the NSA down the
road to crypto mission creep.  It could be a road of no return.

Meeks out...

[=-------------------------------------------------------------------------=]

title: Hacker posts nudes on court's Web pages
author: Rob Chepak
source: The Tampa Tribune


       TALLAHASSEE - The Internet home of the Florida Supreme Court isn't
the kind of place you'd expect to find nudity.
       But that's what happened Wednesday morning when a judge in
Tallahassee found a pornographic photo while he was looking for the latest
legal news.
       A computer hacker broke into the high court's cyberhome, placing at
least three pornographic photos and a stream of obscenities on its Web pages.
       ``All I looked at was the one picture, then I checked with the
court,'' said a surprised Charles Kahn Jr., a 1st District Court of Appeal
judge.
       The altered pages were immediately turned off. The Florida Department
of Law Enforcement is investigating the incident and the U.S. Justice
Department has been contacted. The hacker didn't tamper with any official
records, court officials said.
       ``We've got three photos and we're looking for more,'' said Craig
Waters, executive assistant to Chief Justice Gerald Kogan. The culprit
``could be anyone from someone in the building to the other side of
the world.''

[* I bet they are looking for more.. *]

       The Florida Court's Web site is used to post information about court
opinions, state law and legal aid. Thousands of people, including children,
use the court system's more than 500 Internet pages each month, Waters said.
       The court and other state agencies usually keep their most vital
information on separate computers that can't be accessed on the Internet.
       Officials aren't sure how the culprit broke in, and FDLE had no
suspects Thursday afternoon. But court officials long have suspected their
Web site could be a target for hackers armed with the computer equipment to
impose photos on the Web. The Florida Supreme Court became the first state
Supreme Court in the nation to create its own Internet pages two years ago.
       While the episode sounds like a well-crafted high school prank,
computer hackers are becoming a big problem for government agencies, which
increasingly are finding themselves the victims of criminal tampering on
the Internet. In August, someone placed swastikas and topless pictures of
a TV star on the U.S.
       Department of Justice's home page. The Central Intelligence Agency
has been victimized, too.
       ``It's certainly a common problem,'' said P.J. Ponder, a lawyer for
the Information Resource Commission, which coordinates the state
government's computer networks. However, there are no statistics on
incidences of tampering with state computers.
       The best way for anyone to minimize damage by computer hackers is by
leaving vital information off the Internet, said Douglas Smith, a consultant
for the resource commission. Most state agencies follow that advice, he added.
       ``I think you have to weigh the value of security vs. the value of
the information you keep there,'' he said.
       Court officials would not reveal details of the sexually explicit
photos Thursday, but Liz Hirst, an FDLE spokeswoman, said none were of
children.
       Penalties for computer tampering include a $5,000 fine and five
years in jail, but the punishment is much higher if it involves child
pornography, she said.
       Without a clear motive or obvious physical evidence, FDLE
investigators, who also investigate child pornography on the Internet,
hope to retrace the culprit's steps in cyberspace. However, Ponder said
cases of Internet tampering are ``very difficult to solve.''
       Thursday, the state's top legal minds, who are used to handing out
justice, seemed unaccustomed to being cast as victims.
       ``No damage was done,'' Kogan said in a statement. ``But this
episode did send a message that there was a flaw in our security that we
now are fixing.''

[* I tell you (and other agencies) I do security consulting!! Please?! *]

[=-------------------------------------------------------------------------=]

title: Hacking Into Piracy
source: The Telegraph

22nd October 1996

Computer crime investigators are using the techniques of their
adversaries to crack down on illegally traded software. Michael
McCormack reports.

The adage "Set a thief to catch a thief" is being updated for the
electronic age as online investigators use hackers' techniques to fight
a thriving trade in counterfeit and pirate software that is reckoned to
cost British program-makers more than £3 billion a year.

"Jason", a computer crime investigator employed by Novell to shut down
bulletin boards that trade pirate copies of its software, leads a
confusing double life. First he spends weeks in his office, surfing the
Internet and wheedling secrets from hackers around Europe; then he
compiles dossiers of evidence on the system operators who deal in Novell
wares, flies to their bases, presents the local police with his reports,
and accompanies them on the inevitable raid.

"Every day I'm on IRC [the Internet's chat lines, where information can
be exchanged quickly and relatively anonymously] looking for tips on new
bulletin boards that might have Novell products on them," he says.

"Our policy has been to go country by country through Europe and try to
take down the biggest boards in each one"

"It tends to be the biggest boards that have our products, and those can
be difficult to get on to. The operators have invested a lot of time and
cash in setting them up and they're sometimes quite careful who they'll
let on. I often start by joining dozens of little boards in the area to
get myself a good reputation, which I can use as a reference to get on
to the big board.

"Our policy has been to go country by country through Europe and try to
take down the biggest boards in each one. That has a chilling effect on
the other operators. They think, 'If he could get caught, I'm doomed.'
Within days of us taking down a big board, Novell products disappear off
the smaller ones."

Once Jason gains entry to a big board, the game begins in earnest:
"Bulletin boards work on the principle that if you want to take
something off, you first have to put something in. Obviously I can't put
in Novell's products, or any other company's; instead, we use a program
we wrote ourselves. It's huge, and it has an impressive front end full
of colour screen indicators and menus. It doesn't actually do anything
but it looks impressive and it lets you start pulling things off the
site."

Once Jason finds company products on a board, he makes a video of
himself logging on and retrieving a copy of the software.

[* Talk about freako bizarre narc fetishes.. *]

Bulletin boards often have restricted areas closed to all but a few
trusted members, and these are where the most illegal products - such as
expensive business or word-processing packages copied from beta releases
or pirate disks - are kept. Penetrating these areas takes a skill
learned from the hackers. "It's called social engineering," says Jason.
"It just means chatting up the operator until he decides to trust you
with the goodies."

Once Jason finds company products on a board, he makes a video of
himself logging on and retrieving a copy of the software. Then it's on
to a plane to go and lodge a complaint with the local police.

He is helped by Simon Swale, a fellow Novell investigator and former
Metropolitan Police detective who uses his experience of international
police procedures and culture to ensure that foreign forces get all the
technical help they need.

In the past six months, Jason's investigations have shut down seven
bulletin boards across Europe, recovering software valued at more than
£500,000. The company reckons the closed boards would have cost it more
than £2.5 million in lost sales over the next year.

Jason has vivid memories of the early-morning raid on the operator's
house.

One of the Jason's biggest successes came earlier this year in Antwerp,
when he guided Belgian police to the Genesis bulletin board, which held
more than £45,000 worth of Novell products and a slew of other pirate
software. Jason has vivid memories of the early-morning raid on the
operator's house: "The first thing he said was, 'I have nothing illegal
on my system.' So I set up my laptop and mobile and dialled into it from
his kitchen. All the police watched as I tapped into my keyboard and
everything popped up on his screen across the room. I went straight
in to the Novell stuff and he said, 'Okay, maybe I have a little'."

The system operator, Jean-Louis Piret, reached a six-figure out-of-court
settlement with Novell. More importantly for the company, its products
have all but disappeared from Belgium's boards in the wake of the raid.

There are, however, many more fish to fry. Jason already has another
three raids lined up for autumn . . .

[=-------------------------------------------------------------------------=]

title: Revealing Intel's Secrets

The Intel's Secrets site may not be around for long if Intel has anything
to say about it. The site provides a look at details, flaws, and programming
tips that the giant chip manufacturer would rather not share with the general
public. One particular page exposes some unflattering clitches of the P6
chip and a bug in the Intel486 chip. The site even has two separate hit
counters: one for the average visitor, and one that counts the number of
times Intel has stopped by.  

[=-------------------------------------------------------------------------=]

title: Internet Boom Puts Home PCs At Risk Of Hackers
author: Nick Nuttall
source: The London Times

18th October 1996

Home computers, which carry everything from private banking details to
love letters, are becoming vulnerable to hackers as more households
connect to the Internet. 

The boom in electronic services is making the home PC as open to attack
as company and government systems, a survey of hackers has disclosed.
The Internet is also helping hackers to become more skilful as they
exchange tips and computer programs around the globe. 

[* Survey of hackers?! Bullshit. *]

A spokesman for Kinross and Render, which carried out the survey for
Computacenter, said: "Breaking into home computers is now increasingly
possible and of great interest to hackers. It may be a famous person's
computer, like Tony Blair's or a sports personality. Equally it could be
yours or my computer carrying personal details which they could use for
blackmailing." 

Passwords remain easy to break despite warnings about intrusion.
Companies and individuals frequently use simple name passwords such as
Hill for Damon Hill or Blair for the Labour leader. Hackers also said
that many users had failed to replace the manufacturer's password with
their own. 

Hackers often use programs, downloaded from the Internet, which will
automatically generate thousands of likely passwords. These are called
Crackers and have names such as Satan or Death.

[* Satan? Death? Ahhhh! *]

John Perkins, of the National Computing Centre in Manchester, said
yesterday: "The linking of company and now home computers to the
global networks is making an expanding market for the hackers." The
Computacenter survey was based on interviews with more than 130
hackers, supplemented by interviews over the Internet. The average
hacker is 23, male and a university student. At least one of those
questioned began hacking ten years ago, when he was eight. 

[* No offense to anyone out there, but how in the hell could they
   validate any claims in a survey like that? And especially with
   that amount? *]

Most said it was getting easier, rather than harder, to break in and
many hackers would relish tighter computer security because this would
increase the challenge. Existing laws are held in contempt and almost 80
per cent said tougher laws and more prosecutions would not be a
deterrent. Eighty-five per cent of those questioned had never been
caught.

Most said the attraction of hacking lay in the challenge, but a hard
core were keen to sabotage computer files and cause chaos, while others
hoped to commit fraud.

[* Excuse me while I vomit. *]

[=-------------------------------------------------------------------------=]

title: Computer hacker Mitnick pleads innocent

September 30, 1996

LOS ANGELES (AP) -- The notorious computer hacker Kevin Mitnick pleaded
innocent Monday to charges he mounted a multimillion-dollar crime wave
in cyberspace during 2 1/2 years as a fugitive.

Mitnick, 33, held without bail on a fraud conviction, told the judge
not to bother reading the indictment, which includes 25 new counts of
computer and wire fraud, possessing unlawful access devices, damaging
computers and intercepting electronic messages.

"Not guilty," Mitnick said.  His indictment, handed up Friday by a
federal grand jury, follows an investigation by a national task force
of FBI, NASA and federal prosecutors with high-tech expertise.

It charges Mitnick with using stolen computer passwords, damaging
University of Southern California computers and stealing software
valued at millions of dollars from technology companies, including
Novell, Motorola, Nokia, Fujitsu and NEC.

                           ...........

Mitnick pleaded guilty in April to a North Carolina fraud charge of
using 15 stolen phone numbers to dial into computer databases.
Prosecutors then dropped 22 other fraud charges but warned that new
charges could follow.

Mitnick also admitted violating probation for a 1988 conviction in Los
Angeles where he served a year in jail for breaking into computers at
Digital Equipment Corp. At 16, he served six months in a youth center
for stealing computer manuals from a Pacific Bell switching center.

Mitnick also got a new lawyer Monday, Donald C. Randolph, who
represented Charles Keating Jr.'s top aide, Judy J. Wischer, in the
Lincoln Savings swindle.

[=-------------------------------------------------------------------------=]

title: Hackers Destroy Evidence of Gulf War Chemical/Biological Weapons
source: WesNet News

Saturday, Nov. 2, 5:00 p.m.

WASHINGTON DC -- Hackers broke into a Web site (http://insigniausa.com)
containing suppressed evidence of Gulf War chemical and biological weapons
Friday, erasing all files.

"Someone hacked in Friday around 4 p.m. and completely trashed our
machine," said Kenneth Weaver, webmaster of W3 Concepts, Inc.
(http://ns.w3concepts.com) of Poolesville, Maryland (a suburb of Washington
D.C.), which houses the site. 

The Web site contained recently-released supressed Department of Defense
documents exposing biological and chemical warfare materials that U.S.
companies allegedly provided to Iraq before the war. 

Bruce Klett, publisher, Insignia Publishing said they are now restoring the
files. "We plan to be operational again Saturday evening or Sunday," he
said. "We encourage anyone to copy these files and distribute them." There
are over 300 files, requiring 50 MB of disk space.

The Department of Defense has its own version of these files on its
Gulflink Web site (http://www.dtic.dla.mil/gulflink/).

Insignia plans to publish Gassed In the Gulf, a book on the government's
coverup by former CIA analyst Patrick Eddington, in six to eight weeks,
Klett added.

Hackers also brought down SNETNEWS and IUFO, Internet mailing lists
covering conspiracies and UFOs, on Oct. 25, according to list administrator
Steve Wingate. He plans to move the lists to another Internet service
provider be be back in operation soon.

"We've seen this happen regularly when we get too close to sensitive
subjects," Wingate said. "The election is Tuesday. This is a factor."

He also said a "quiet" helicopter buzzed and illuminated his Marin County
house and car Thursday night for several minutes.

[=-------------------------------------------------------------------------=]

title: Criminals Slip Through The Net
source: The Telegraph, London

5th November 1996

Britain is way behind in the fight against computer crime and it's time
to take it seriously, reports Michael McCormack


BRITAIN'S police forces are lagging behind the rest of the world in
combating computer crime, according to one of the country's most
experienced computer investigators - who has just returned to walking
the beat.

Police Constable John Thackray, of the South Yorkshire Police, reached
this grim conclusion after a three-month tour of the world's leading
computer crime units, sponsored by the Winston Churchill Memorial Trust.

All of the five countries he studied, he says, are putting Britain's
efforts against electronic crime to shame.

"The level of education and understanding of computer crime is far more
advanced outside Britain," said Thackray.

"Here, police forces are shying away from even attempting to investigate
computer crimes. You see experienced detectives who lose all interest in
pursuing cases where there are computers involved.

"We know that computer crime, particularly software piracy, is closely
connected with organised crime - they like the high profits and the low
risk - but those connections aren't followed up."

He adds:"We are far behind our own criminals on these matters. We only
catch them when they get complacent and keep using old technology and
old methods. If they simply keep up with current technology, they are so
far ahead they are safe." Thackray was one of the officers responsible
for closing down one of the largest pirate bulletin boards in the
country, estimated to have stolen software worth thousands last year and
has assisted officers from other forces in several similar cases.
Pirates recently named a new offering of bootleg software "Thackray1 and
2" in his honour.

He has seen how seriously such crimes are taken by police forces abroad:
"In America there are specialist units in every state and a similar
system is being put in place in Australia. There's nothing nearly as
comprehensive in in Britain.

"We have the Computer Crimes Unit at Scotland Yard and a small forensic
team at Greater Manchester, but they're both badly under-resourced and
there's little interest in, or support for, investigating computer
crimes in other forces.

"Our officers must get a better education, to start with, on what
computer crime is, how it works and who is being hurt by it. We need to
bury the impression that this is a victimless crime with no serious
consequences."

Thackray is preparing a report on his impressions of anti-crime
initiatives in other countries and what must be done in Britain to equal
them. "In my view, we need specially detailed officers who are educated
in computer crime issues.

"We also need to become much more pro-active in our approach. It's not
good enough to sit back and wait for the complaints."

But perhaps symptomatic of Britain's efforts is the way Thackray's
valuable experience is being used. He is putting away his laptop and
getting out his boots.

"I'm now being moved back into uniform. The two year experience I have
gained in investigating these matters is not going to be used to its
full potential."

"We pride ourselves on being an effective police service in Britain, and
other countries look up to us. But when it comes to computer crime, we
have to start following their lead."

-EOF