[fa.human-nets] HUMAN-NETS Digest V6 #74

Human-Nets-Request%rutgers@brl-bmd.UUCP (Human-Nets-Request@rutgers) (11/16/83)

HUMAN-NETS Digest       Thursday, 17 Nov 1983      Volume 6 : Issue 74

Today's Topics:
     Computers and the Law - "19 year old UCLA hacker" (4 msgs),
             Computers on TV - The ethics of "Whiz Kids"
----------------------------------------------------------------------

Date: Tue 15 Nov 83 13:34:56-PST
From: David Rogers <DRogers@SUMEX-AIM.ARPA>
Subject: "19 year old UCLA hacker"

    Well, that 19 year old hacker was here at Stanford, and here is a
system programmers account of what it was like. After reading this
message, I took the problem of hackers much less casually.

    (By the way, "call-back" systems are good, but if the computer is
on a network, it's virtually impossible to keep the hackers out. Read
on.)

 9-Nov-83 16:47:37-PST,8835;000000000000
Return-Path: <@SU-SCORE.ARPA:mail-daemon@Glacier>
Date: Wednesday, 9 November 1983 16:44:19-PST
To: su-bboards@Score
Subject: the breakin: short summary of a media event
From: Brian Reid <reid@Glacier>

Enough people have asked me "what really happened" that I thought it
was worth posting a medium-sized note to bboard explaining what this
computer intruder stuff is all about. I will also tell the tale of how
it came to be a full-fledged media phenomenon.

Early morning on September 17 I had logged on to Shasta and noticed an
unseemly slowness to the logon process. I was the only user on the
system, which made it even more curious. I was too sleepy to care, but
filed it away for future puzzleement. A few hours later Jeff Mogul
telephoned me with the truth, which he had discovered and explained.
The Shasta directory /usr/local/bin contained a file named "stty",
whose contents was actually a shell script that copied /bin/csh into
~somewhere/.$USER, then chmod u+s $USER .$USER, then an exec of the
real stty. Translating into English from Unix-ese, this means that
when some innocent victim ran this false "stty" program, it would
store in the perpetrator's directory a copy of the shell (a shell is
like the Tops-20 EXEC) set up in such a way that when the perpetrator
later executed that shell, he would acquire all of the permissions and
access rights of the victim. The unseemly delay that I had noticed at
5:30 a.m. was caused by the length of time that it took to copy the
64KB shell file into the intruder's directory.

The "stty" program on Unix is used by virtually all users to set up
their terminal characteristics when logging on, and most Shasta users
have their search lists set up to look in /usr/local/bin before
/usr/bin. This means that after the passage of a few hours, the
perpetrator's directory contained many files with names like ".reid"
or ".mogul" or ".hennessey", each rigged so that if he executed it he
could read or write any files to which reid or mogul or hennessey had
access.

The account used by the perpetrator belonged to Jim Miller, who had
visited HPP last year, and who had left quite some time ago. Tom
Rindfleisch assured me that Miller was an honest person who would not
do such a thing; we therefore concluded that some alien was using the
account. I spent a couple of minutes finding out some biographical
data about him, and was easily able to guess his password. That solved
the mystery of how the intruder was using Miller's account.

We waited for the perpetrator to log on again, and when he did so, he
was coming in through the Internet from Purdue. I traced the net
connections back to find out that he was logged on as Mark Bronson at
Purdue, and immediately called Walter Tichy at Purdue to ask about
Bronson, and was told that Mark Bronson had graduated a year ago and
gone to work for a certain company in another state, which
intriguingly enough was the same company that Miller worked for. This
"clue" turned out to be a red herring, but it distracted us for a day.
Chris Kent of Purdue traced the network connections back to SU-TAC,
where the perpetrator was dialed in on a 300-baud line.

At this point I wanted to go home for dinner, so I shut down Shasta's
internet service, which made it impossible for him to telnet in to
Shasta from ARPA-land. I figured that he would think Shasta had just
crashed. To my amazement, he was logged back on within 30 seconds,
this time coming in from Navajo via PUP telnet (which I had not shut
off). A quick trace of the net connections showed that he was logged
on to Navajo as Anita Mayo. Steve Hartwell phoned Anita in New York to
ask her if she was doing this; she said no, she wasn't, but her
password would be pretty easy to guess. I tried guessing "Anita", and
sure enough it worked. Wanting to go home for dinner, I changed
Anita's Navajo password to something unrememberable and killed the
Mayo job on Navajo, figuring that this would keep him out.

30 seconds later he was back on again, this time coming in from
Diablo, where he was logged on as Jeff Adams. I was unsuccessful at
guessing Jeff Adams' password, but I realized at this point that I was
dealing with organized crime and not just with some casual password
hacker: he clearly had access to lists of account names and passwords
all over the place. I hotwired Shasta's "login" so that only people
actually physically in ERL could log in, and went home a bit shaken.

At this point I called Ralph Gorin to ask for advice, and he advised
me to call the FBI. It took 24 hours to get them to return my call,
and another 24 hours to get them to believe that a real crime was
taking place. They came to campus and spent a day talking to me, to
Len Bosack, and to Ralph. The following morning they obtained
permission authorizing Pacific Telephone to put a "trap" on the SU-TAC
dialin lines; simultaneously, Len and Benjy Levy connected a hardcopy
terminal to the TAC dialin line so that we could get a transcript of
what the intruder was doing, to use as evidence if necessary.

Meanwhile back at Shasta, we were walking the fine line between
keeping this intruder out of our files and keeping him interested
enough to stay on the line long enough for us to trace the call. We
did this by leaving his Trojan horse in place, and periodically
getting volunteers to run it, whereupon he would get quite excited and
spend an hour or two checking to see if he had acquired any
interesting new privileges.  Steve Przybylski, Glenn Trewitt, Steve
Hartwell and I took turns at this babysitting task.

Pacific Telephone told us that the calls were being made from a
certain travel agency in San Bruno. The FBI folks made a visit there,
and found no evidence of any such thing. Pacific Telephone then
suspected that the telephone wires in that building had been
compromised, but after another day of fooling around, Pac Tel admitted
that what was *really* going on was that the call was coming in
through a long-distance calling service, such as Sprint or MCI. The
long-distance calling service people refused to cooperate; Len and the
FBI obtained the necessary search warrant (another delay); they
cooperated and told us that the calls were coming from Los Angeles.

At this point I went out of town for a program committee meeting, so I
am a little fuzzy on the exact details, but Len and the FBI together
managed to get the necessary traps in place on the Los Angeles local
telephone end. I returned from the trip to resume my shift at
babysitting Shasta to make sure the intruder did not get too carried
away. By this point we had a fairly automatic notification mechanism
set up; we doctored "login" so that whenever the intruder logged on it
would send mail notification to all of us who were participating in
the chase.

But he never logged in again. After a few days of wondering whether he
had detected our traps and chickened out, I got word from Ralph that
Ralph had gotten word that the Los Angeles police had raided some
teenager's apartment and seized a computer. The date and time of the
raid mesh fairly well with the last recorded instance of our intruder
coming in, but of course we have no hard evidence that it is the same
person. The FBI might have further evidence; they aren't talking.

That was September 22. I had thought the whole issue was dead, but
last week somebody at Purdue told a reporter for the Los Angeles Times
that I had located this intruder and informed Purdue of his existence;
the L.A. Times reporter called me and I told him the story pretty much
as you read it above. It appeared in the Sunday LA Times, and went out
on the LA Times News Service newswire.

Well, it seems that when the LA Times runs a story on something it
becomes Big News. The following morning (Tuesday a.m.) Len and I
started getting calls from every imaginable reporter (Only his name
and mine appeared in the LA Times story). Before 10am, 10 radio
stations, 4 TV stations, all of the local newspapers, even the
Stanford Daily had picked up on this hot story of evil alien spies
penetrating the Department of Defense through Stanford University, and
all had to have the story first-hand.

It has all blown over now; today something else is Big News. Please,
everyone, please make sure your passwords are hard to guess. Try to
make them non-pronounceable, and long, and certainly make them
unrelated to your life. And try to understand that not every quote you
read in the papers is correct.

Brian

------------------------------

Date: Tue, 15 Nov 83 15:49:07 PST
From: Willard Korfhage <korfhage@UCLA-ATS>
Subject: Computer break-in at UCLA

Our computer at UCLA was one of the ones being used by the crackers,
so I am at least partially aware of what was being done about them.

It was common knowledge that the system had been broken into, and we
even knew what id's the cracker's were using. To gather evidence and
information about them, the systems people reprogrammed a number of
the system programs, like "talk", so they recorded everything people
said or did. Then an administrator most of his time for the last
couple months wading through the material looking for relevant
information.

Presumably the bugs have been taken out of the programs now, but some
people still use their own, unbugged versions of the programs, just to
make sure no one can listen in on them. That's one way to maintain
your privacy.

As for sensitive information, I don't know of any around here and I
don't know what they got into elsewhere. The school paper says they
messed up one's person's files, but I don't know details.


                                        Willard Korfhage

------------------------------

Date: Tue 15 Nov 83 14:16:31-PST
From: Richard Treitel <TREITEL@SUMEX-AIM.ARPA>
Subject: Re: HUMAN-NETS Digest   V6 #71

Sorry to disturb someone's confortable assumption, but I think I just
realised why the "call-back" method does not offer very good security.
Given that most phone company computers can handle call forwarding,
all it needs is for some cracker to crack into Ma Bell and arrange to
get all your calls forwarded to his number ... this will work
especially well if you have a separate phone for your computer's sole
use.  Of course it can be detected eventually, but not before much
damage can have been done.
                                                        - Richard

P.S. on terminology: since the media are trying to pervert the word
"hacker" to mean "computer criminal", I suggest we offer them the word
"cracker" instead, and restore "hacker" to its real meaning.  In
recent British English usage, the word "crackers" does duty as an
adjective, meaning, roughly, "halfway insane".

------------------------------

Date: 15 Nov 83 10:24:57 PST (Tue)
From: Katz.uci-750a@Rand-Relay
Subject: Crackers and sensative data



What is sensative data doing accessable to the public?  Regardless of
how much one dreams otherwise, any network which is connected (either
directly or indirectly) to the public phone system is accessable to
the public.  One can use administrative and system security approaches
to reduce the extent of access, but not to eliminate it.  Once a
determined person has gained access, there is probably no way to
prevent the use of probes and booby traps to gain at least the amount
of access which the most priviledged normal user has.

Remember, if you want to limit access to data,
limit access to the medium and then encrypt it!

------------------------------

Date: Tue, 15 Nov 83 3:06:03 EST
From: Ron Natalie <ron@brl-vgr>
Subject: Re:  HUMAN-NETS Digest V6 #71

I must admit that I've never viewed "Whiz Kids" because I work during
prime time and limit my viewing mostly to cable services, however
judging from other peoples descriptions, I get the impression that
these kids doing illegal things are depicted as the heroes of the
show.

Well, the NAB has a thing called the television code.  Most every
television station subscribes to it including all the networks.  It is
even fairly well honored.  One of it's statements is that although
there may be bad guys in the program they will not be shown as the
heroes.

Assuming a fairly civic minded broadcast industry (I won't even begin
to debate whether this is true or not) either they have disregarded
this code or they do not recognize that this computer invasion is a
very serious crime.  They may not realize that this activity is
setting of the wrong kind of role model for television viewing
community.

Suggestion: Write the networks and your local stations (maybe even the
NAB?) and perhaps someone should send them a copy of Geoff's testimony
on the difference between hackers and computer crime so they can get
the definitions right.

------------------------------

End of HUMAN-NETS Digest
************************