GENWiki

Premier IT Outsourcing and Support Services within the UK

User Tools

Site Tools


archive:news:shadow.hac
		_______________________________________
		[				      ]
		[THE SHADOWY WORLD OF COMPUTER HACKERS]
		[   An Article on us 'Naughty Boys'   ]
		[	Typed by: Shadow's Pawn       ]
		[  Original article in U.S. News and  ]
		[      World Report June 3, 1985      ]
		[				      ]
		[     Converted to 80 Columns by      ]
		[	    The Slipped Disk	      ]
		[				      ]
		[	   The Fifth Precinct	      ]
		[	     [502] 245-8270	      ]
		[_____________________________________]
Flash!:  The FBI and private firms are cracking down on teenagers who use
   terminals to swap tips on how to break the law.
The following article recently published in U.S.  News and World Report (June

3, 1985) reveals the shocking truth about the underworld of the Computer Hacker, or does it? This is basically educating thier reader on the crimes that are committed each and every day on bulletin board system around the United States.

Read and enjoy…

     Shadow's Pawn/Control

Want to learn the intricacies of picking locks?  The recipe for nitro-

glycerin? Or methods of making free long-distance phone calls? How about someone else's credit-card number for a shopping spree? Curious how to kill with your bare hands?

Until a few weeks ago, all this was available to users of COSMOS, a comput-

erized "bulletin board" run by a 16-year-old high-school student known as Time Lord to his fellow 'hackers,' or computer tinkerers. His board collapsed in late April after police and agents of the Federal Bureau of Investigation and the Secret Service came to his West Bloomfield, Mich., home. Dad took away the computer.

Time Lord escaped arrest, but six high-school students in Waukesha, Wis.,

weren't so lucky. On April 25, they were arrested in a seperate case for allegedly using stolen credit-card numbers to obtain thousands of dollars' worth of computer equipment. The numbers, said the Milwaukee Journal, were disseminated over a computer bulletin board called the World of Cryton.

These incidents shed light on a shadowy subculture in which hackers- nearly

all teenage boys- swap information and joust over who knows the most, and whose exploits are the most daring. To read their exchanges on computer monitors is to enter a world of bright young zealots whose talents at manipulating complex computers are often accompanied by a blithe disregard for authority. Some are barely in their teens and already are lawbreakers. Almost all come from affluent famlies.

Messages that cross back and forth bring to mind a fraternity food fight, a

detailed phone-system manual, a sex novel and a bomb factory rolled into one. many seem sophmoric –strewn with profanities questioning the masculinity of other system users.

"The bulletin boards,"says FBI agent John Anthony in Detroit,"give this aura

of Robin Hood, and young kids-particularly bright young kids- get involved in this as a challenge to the Establishment."

MOST LEGITAMITE.  Bulletin boards are do-it-yourself electronic-message

systems. Anyone with a personal computer and a modem-a device that lets computers communicate over phone lines- can participate. Special software is needed to operate a board.

More than 1,000 (GET REAL!) such bulletin boards exist now.  The great bulk of

them are totally legitimate. They offer to people with common in- terests an electronic meeting place to exchange messages about using their computers and software. Some boards are dedicated to a special interest, such as humor, law, education or health. Others allow users to order goods and are, in effect, electronic shopping services.

"The subject matter ranges from software swapping to games to information

about specific programs to finding the woman of your life," says James Cambron of Kansas City, who runs a bulletin board that distributes facts about other boards.

But a minority of boards cater to interests distinctly outside the main-

stream. On the political left, a Long Island board, called the Revolution, carries messages assailing President Reagan's Central America policy and calling for a campaign against the opening of a nearby nuclear power plant. When the user signs off, the system says, "Dosvedonia comrade"-an approximation of 'goodbye' in Russian.

On the right is a network of boards that attack blacks and Communists.Elec-

tronic files called "Know Your Enemies" claim to provide details about Jewish organizations and 'race traitors". Their operators, according to the Anti- defamation League of N'nai B'rith, are right wing extremists who "seek to spr- ead their hate propaganda among young people, surely the most vulnerable to its influence."

The segment run and used by young hackers, however, attracts the most at-

tention from law-enforcement agencies and companies whose computers store vast amounts of information. John Maxfield, a Detroit consultant who monitors such boards for business clients, says they are strewn with material that is "either borderline illegal or outright illegal or encourages illegal activities."

"PHREAKING." Telephone companies are especially upset about bulletin boards

that contain sections devoted to "phreaking" - making toll calls free of charge. Phreaking includes such techniques as breaking into corporate switchboards through phone lines to make conference calls and using ill-gotten identifacation numbers for Sprint, MCI and other toll services.

Explains maxfield:  "If you're into calling bulletin boards, a big problem is

phone-bill shock at the end of the month. So a lot of boards, while not catering necessarily to illegal activities, generate a lot of fraudulent calls."

Many hacker-phreakers see nothing wrong with phone scams.  " I only abuse

people who charge too much for thier long-distance calls," says one called the Comedian, a 17-year-old from Bethesda, Md "I've heard some pretty bad things about the phone company."

Reflecting the youth of most users, a hacker known as Access Finder recently

said on a board in Colorado called the Operating Room that he had been inactive for a while because "my computer had a major [expletive] when my mother spilled water from the plants all over it." He then asked other users to supply him with "codes for anything, " including businesses,government agencies, phone firms and banks.

Typical of the subterranean boards is one in Boulder, Colo., called Off The

Wall. Operated by Psycho, the board requires the last four digits of a users phone number and a seven character password for access. To make certain that they are not infiltrated by police or security agents, most system operators subject new users to "character checks" before granting passwords or access to some of the systems' more dubious sections. Some operators demand references from other hackers and automatically look askance at anyone older then 20.

"The bulletin boards out there have far better security than most corporate

mainframes. and that's pretty frightening and astounding,"says former hacker Ian Murphy, now a security consultant.

LAYERS OF ACCESS.  Users with "Level I" security clearence on Off The Wall can

read and leave messages on subboards dedicated to specific computer brands, product reviews and general announcements. The next level permits access to messages dealing with such topics as software trading and X-rated and destructive materials. The highest level brings one to messages providing passwords and access codes for commercial computers and details on ways to make illegal long-distance phone calls.

   Among some tidbits found recently on Off The Wall--
o Excerpts from sexually explicit material published in Penthouse magazine.
o Account numbers and passwords of Dow Jones News/Retrieval and CompuServe
  commercial data bases.
o Personal identifacation numbers for various Sprint and MCI long-distance
  accounts.
o Purported recipies for a biotoxin of wheat, a "cheap,very explosive,water-
  sensitive device" made with potassium and emptied cold capsules.
Before its abrupt end, COSMOS, in addition to its message boards, carried long

atricles on such subjects as making drugs, the basics of hand-to-hand combat, the ins and outs of the big TRW computers that house credit data on 120 million Americans, how to build devices for making toll free calls and ways to convince an operator that you work for the phone company. "It's amazing how many people know so much about our operators and how to use our system,"says Neal Norman, a district manager of corporate security for American Tele- phone & Telegraph.

COSMOS also contained a subsection for "trashing"--searching a company's

garbage for discarded credit-card carbons or computer printouts carrying valuable access codes. One trasher's advice: "Look everywhere and anywhere. People are dumb these days you can get good trash anywhere."

PIRATES ONLY.  Boards like POBBS-- Pirates Only Bulletin Board System-- in

suburban New York are drawing notice from software firms trying to stamp out piracy of thier copyrighted products. Operated by Exorcist, a 19 year-old college student, POBBS exists mainly to allow users of International Business Machines personal computers to swap commercial software over the phonelines . Dozens of copyrighted programs,including Lotus 1-2-3 and Wordstar, are ava- ilable free through POBBS.

Fun and games for curious teenagers?	That's the attitude they often convey .

"It's enjoyable taking risks,and it gives you a feeling of power because it puts you above most of the population," explains Demon of the Boston area.

Victims of these teenagers are not amused.  So seriously do long-distance

companies view the problem that they formed the Communications Fraud Control Association to exchange information about illegal bulletin boards and lobby for stronger legislation. "One person with one code is not enough to give us much of a problem," says Van Willson, a security official for GTE Sprint. "The problem is that the little fellows start posting them on the boards."

PRECAUTIONS.	All of the major toll carriers, as well as TRW claim to moni-

tor the boards closely. AT&T regularly briefs operators about fraud scams. TRW offers seminars on security for clients , who use it's service to check thier customers credit ratings. A key point: TRW people never call clients asking them to "confirm" thier subscriber numbers.

Police also are looking at bulletin boards more carefully.  But prosecution is

sometimes difficult.Thomas Tcimpidis , a 34-year-old TV engineer in Calif- ornia, was arrested on state charges after someone posted a telephone credit -card number on his board. Tcimpidis argued that he was unaware that the stolen number was there. Charges against him were dropped last February. California's Legislature is being asked to outlaw the unauthorized placement of personal information on bulletin boards. State Senator John Doolittle intro- duced this proposal not long after New- sweek reporter Richard Sandza told of harassment by vengeful hackers angry about the article he had written on underground boards. One of them broke into a TRW computer, obtained Sandza's credit-card and Social Security numbers and published them on bulletin boards around the country.

A RIGHT?  Many law enforcers feel powerless against the boards.  Using stolen

code or card numbers is clearly illegal. Is posting those numbers on a computer bulletin board a crime as well ? Answers are murky. Some lawyers argue that this activity is a First Amendment right,no matter how unsavory.

County officials in Phoenix interpret Arizona's computer-crime aw broad- ly.

Reasoning that illegal toll calls are routed through a phone company's computerized switchboard, authorities recently arrested two system operators whose boards listed long-distance access codes belonging to others and char- ged them with facilitating computer fraud.

So hackers are starting to feel the heat.  Some say they are cutting back on

thier activities. "A lot of people are very paranoid," says Shadow, an 18-year -old in New Jersey.

Like Shadow, other young computer wizards now must weigh the thrills of using

high-tech skills to challenge "the system" against the possibility of a criminal record.




/home/gen.uk/domains/wiki.gen.uk/public_html/data/pages/archive/news/shadow.hac.txt · Last modified: 1999/08/01 17:08 by 127.0.0.1

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki