TUCoPS :: Truly Miscellaneous :: rsreal.txt

Electronic Deception, Interception, and Terrorism: The Radio Shack Reality

Start.


EElectronic Deception, Interception & Terrorism : The Radio Shack Reality!
------------------------------------------------------------------------
                             presented by 
 
                    Ian A. Murphy, President & CEO
 
                    IAM / Secure Data Systems Inc.
                       1225 North Second Street
                        Philadelphia, Pa 19122
                            (215) 634-5749 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
"Electronic Deception, Interception & Terrorism : The Radio Shack Reality!
 ------------------------------------------------------------------------
Objective and Scope of the Problem 
 
 The use of personal computers and the growth of electronics into the 
mainstream population, will allow almost anyone with basic understanding 
of common technology, the possible interception and collection of 
information that would not be available under normal conditions. 
Suppliers of basic electronic equipment now provide a number of different 
devices for the unknown numbers of possibilities for interception of 
tele-communications, data communications, and microwave and satellite 
communications for a small price. Some equipment is advertised to be a 
small as a dime and may be purchased from the back of many electronic 
magazines for under $30.00. Other devices are a bit larger and 
need more expertise to operate, but are still in the hands of many. 
 
 To all of this, we add the entry of the personal computer and its 
ability to collect millions of bits of data in seconds instead of the 
human needing to ingest and store such information. The information can be 
collected onto tape or floppy disk and removed to a safer location with 
ease as compared to the removal of such volumes of information in paper 
or book form. 
 
 Other problems involved with possible comprimised conditions include 
outside data communication contact persons who have no authorized 
access. Groups known to both law enforcement and the public media have 
surfaced from time to time and with some most embarassing information 
about corporate and goverment networks and computer systems. 
 
 Most invasions occur with little notice at the time of entry and are 
only detected when major system problems or audit information are scanned. 
Public (private) domain systems are accessible around the clock without 
cost to thousands and provide the underground with an excellent source for 
information. 
 
 These systems contain information for the compromise of various 
communications networks and operating systems to the construction of 
explosive devices and different methods for gaining physical access to 
such networks. All is known to be in the hands of a vast majority of 
minors, but if such information is available to anyone with computer 
communications ability, then the threat of such incidents occurring 
increases tenfold. 
 
 The reason is due to the ease of access from anyone with the right 
information available to call these outlets of sensitive knowledge. 
The statement from Thomas Jefferson, represents the spirit of the words, 
"Knowledge is Power." as frightning truth in today's information society.
 
 
 
 
 
"Electronic Deception, Interception & Terrorism : The Radio Shack Reality!
 ------------------------------------------------------------------------
Results to Date
 
 With the continued expansion of computers, many individuals and groups 
have been brought to the attention of law enforcement authorities. Groups 
with names such as The Legion of Doom, Knights of Shadow, The 414 Gang, 
The Brotherhood of Ohm and others. These groups consist of minors who 
trade information on a number of computers and telecommunications systems. 
 
 These individuals have become known due to their actions on the systems 
of their choice. Reasons for discovery include the blatant posting of 
about plans to attack such systems, pieced-together information from 
telephone company records, credit card frauds committed to obtain computer 
hardware and software, and systems security violated numerous times by 
outside telecom contacts.
 
 These groups have a small impact on overall communications insecurity
and pose little threat to national and corporate security. But the major 
problem associated with the leak of sensitive knowledge, comes from the
lack of true indicators of such incursions in these networks. If persons 
with little directed intent are able to gather sensitive data from a 
number of public and underground sources, then a directed force will have 
a much easier time gathering facts and building upon them. Such fact 
gathering abilities come from eastern bloc countries with representives in 
this country, using "listening posts" stationed in major urban areas under 
diplomatic immunity to average citizens with back yard satellite dishes, 
personal computers and home-built or store-bought electronics. 
 
 An example; According to statements made by David L. Watters before the 
Senate Select Committee on Foreign Intelligence in Febuuary 1977, the 
Soviet embassy in Washington, D.C. was in a direct line of interception 
for most of the federal goverment microwave communications. The embassy 
had the ability to receive any transmissions from sites such as White 
House, Tennely Tower, the Pentagon, Ft. George Meade, Ft Belviour, 
Andrews Air Force Base, Walter Reed Medical Center and other such 
govermental sites. 
 
 Costs of such methods do not come cheaply and require industrial 
communications equipment to gather and process large amounts of such 
traffic in an urban environment. It should be noted that the embassy is 
located on the highest piece of land in the city of Washington and that 
alone allows for very easy signal reception from such generating 
facilities in the metropolitian area. 
 
 
 
 
 
 
 
 
"Electronic Deception, Interception & Terrorism : The Radio Shack Reality!
 ------------------------------------------------------------------------
Results to Date (con't.)
 
 With common sense applied, one must assume that the goverment is using 
encryption methods to transmit information over communications channels. 
The one benefit the such methods allow is for the useful lifetime of 
the information to remain valid as well as keeping such information 
guarded from unauthorized sources. But since this information is secured 
from such easy desemenation, the value of interception decreases to a 
point where the ability to decipher such information becomes too costly 
in a time value stance. 
 
 One interesting twist to the encryption methods used by both the public 
and some goverment agencies, is the use of the DES (Digital Encryption 
Standard).The DES is an encryption method endorsed by the federal 
goverment for use in the public domain. This method is currently protected 
from disclosure outside the U.S. and selected NATO countries and has been 
classified as a "Material of War". The method was introduced as a secure 
method of encryption for information with the possibilities of the correct 
information being decoded in a one to a 72,000,000,000,000,000,000 chance.
 
 These odds are not to be ignored and do prove to be most formidable to 
unauthorized access with the exception of major goverments. The method was 
adopted by the commerical sector and has been deployed over a number of 
years in multiple sites, with little hesitation from the users. User 
confidence was quite high with this method, but a question must be raised 
about the release of such methods into the public domain.
 
 Since this method is secured from decryption in a time value stance 
according to goverment information, then why is such a method in the 
hands of the public? Can it be possible that the method has accessible 
trap doors imbedded to allow inspection of the encrypted information?
Would the federal goverment release a method so secure into the hands 
of the general public so that not even they could read such information? 
And why is the method not being re-certified by the goverment? Has 
the usefulness of this technique reached a saturation point where the 
time needed to decrypt the information, has become a matter of hours or 
days instead of the reported years?    
 
 The weakness of the DES system has been shown by a number of 
underground technicans working on the problem of encrypted satellite 
television transmissions. In one recent 90 day period, both the Oak Orion 
and the HBO scrambling systems have been cracked with skill. Chips for 
the decryption of these signals are on the underground market and can 
be produced as easily as most other commercially produced chips.
 
 
 
 
 
 
"Electronic Deception, Interception & Terrorism : The Radio Shack Reality!
 ------------------------------------------------------------------------
Continuing Development Activity
 
 In addition, the increased skill of persons with directed intent who 
are able to obtain knowledge for the invasion of networks and systems 
allows for penetration of systems with ease. These individuals are 
seeking ways to gain entry with little detection involved and may be 
using the underground sources of information as roadmaps to targets. 
These entries will be planned and used to the fullest possible extent 
without the owners of systems being any wiser.  
 
 Computer and communications facilities are being attacked by a vast 
group of computer literate persons seeking information and challenges 
that are not available in a normal data processing environment. People 
are seeking out connections to systems that answer and allow connection 
to same. The general public is being fed a constant diet of computers 
and communications. Society as a whole is undergoing a major re-education 
process in information processing and storage. Technology that needed 
space larger than any desk could contain is now available to sit on that 
desk and has more power than its predecessor, performing the same 
funcitions in half the time.  
 
 Individuals without computer skills are now able to use the technology 
to work better and faster. Others are able to solve problems that could 
not be solved 10 years ago due to the technology, and now most commerical 
products have some form of directed artifical intellegence in place 
and operational.  
 
 Information of a special or technical nature about electronics,
communications and computer safeguards, is traded like baseball cards on 
the street. Persons have in-depth knowledge of hardware and software 
security methods and discuss such topics in open public electronic forums 
around the country. Information on software such as IBM's RACF, (R)esource 
(A)ccess (C)ontrol (F)acility, Computer Associates "Top Secret", and DEC 
Vax / VMS Security methods and the like are discussed as common topics in 
underground circles. Meetings are held each and every Friday evening in 
New York for the discussion of these topics and more. Conferences held 
for science fiction readers contain large populations of these persons 
and allow for information to flow to sources not normally exposed to such.
 
 The possibility of information of a sensitive nature being in the hands 
of individuals who should not have access to such, is a problem that stems 
from the ability of persons to research information from a variety of 
sources available to the public. First Amendment rights allow for the 
discussion of information and technology and provide the needed 
stimulation to continue research and provide for new developments. 
Many areas offer small insights to overall changes in technology and 
invite inspection of other areas. 
 
 
 
"Electronic Deception, Interception & Terrorism : The Radio Shack Reality!
 ------------------------------------------------------------------------
Continuing Development Activity (con't)
 
 Collection of information by electronic methods has become very 
standard in today's society. Multiple devices can be placed in locations 
never suspected as being active listening posts, and size is no longer 
considered a problem due to the development of integrated circuits. 
Some support devices can offer close unlimited range with proper set-up. 
Others allow for the interception through standard off-the-shelf 
technology and completely bypass any common physical security methods 
used to enforce. 
 
 Low cost systems may be purchased and bastardized for the required 
purpose. Small radio transmissions systems with ranges stated to be in 
excess of one mile are very easy to obtain by calling or writing the 
manufacturer. Others are discussed in the general print media and 
complete volumes are available with plans, parts lists and construction 
methods needed for operation. 
 
 All this information and equipment is in the hands of the general 
population and if it is so available, then what is the way to protect 
such information from interception and use? Is the trust of the user of 
this information questioned? Is the information real or placed in the 
media to dis-inform possible threats? What is the truth of the matter? 
Facts presented in one media are contested in others. 
Papers are presented and discussed with point and counter-point. All 
offer a number of possible facts that allow for the gathering of small 
but connected thoughts that provide the necessary details. 
 
 Techno-fables are widespread; goverment, industry and the general 
public refuse to accept such stories due to lack of understanding. 
Capabilities well beyond what most of us would think are in the hands 
of common persons. Simple electronics offer a whole new world of 
eavesdropping and collection abilities for under 200.00 dollars and 
still we have persons who think such things are science fiction. 
 
 Imagine using a common household microwave oven for such actions. 
Most would not see the use of such a device, but microwave ovens may be 
purchased for under $59 dollars in most areas and with a bit of 
component re-structuring, can produce frequencies well within commerical 
transmission range as well as front-end equipment damage to such sites. 
Belief in the "tap proof" security of fiber optics has been smashed. 
Simple fiber technology is the way, and counter-devices may cost 100 to 
1000 times more for the detection and protection of such circuits. 
 
 
 
 
 
 
 
"Electronic Deception, Interception & Terrorism : The Radio Shack Reality!"
 ------------------------------------------------------------------------
Continuing Development Activity (con't)
 
Home-made satellite transmissions stations are being constructed by 
HAMS and such for under $100 dollars, while current orbiting systems are 
completely vunerable to outside interference and jamming. The classic 
example is the Captain Midnight caper in early 1986. "Tempest" frequencies 
readers or scanners may be built for under $150.00 dollars and plans for 
such devices may be purchased for $19.95 through the mails. Cable location 
service is just an 800 number call away, and still the industry does 
nothing about the problem, cause or solution!  
 
Summary
 
 The use of common electronics and standard research in public domain 
databases wil allow for the possibilities of simple terroristic activities 
happening with regularity to major telecommunications and computer 
centers. Already, computer centers in western nations have become the 
target of terroristic organzations. Computer hackers are reported as 
standard news today, and reports of special frauds and thefts continue 
with predictable time periods between each case and the results always 
being hidden from view to authorities due to the lack of understanding. 
Some results of such frauds are presented in plain view at times, and 
the investigators cannot "see the forest for the trees." The general 
population does not see computer intrusions as a problem related to them. 
 
 Public knowledge of "computer crimes" comes from embellished stories 
presented by the media. Crimes committed against the different telephone 
carriers are responded to with a sense of wonder and awe from the general 
populace. The resident problem stated comes to the simple premise of basic 
"today" education. But if the education teaches the populace how to 
interact with the systems, is it able to police the same with confidence? 
Can the users be educated with the basic instruction for security as they 
have been about other forms of security? Do they understand what is being 
presented in the new age and are they willing to learn new methods for 
insuring security for all users? Can the security be maintained for the 
information as the information and its vessel grows? 
 
Conclusion
 
 The need for security in today's information age will require more 
thought and understanding of a criminal nature to secure the assets. 
A new form of asset transference is as available as the six shooter was 
in the early days of the West. To close, the words of Thomas Jefferson 
once again state the truth for this age, " If you remove a little bit of 
freedom for the sake of security, then in time you will have neither.".  
 
Ian A. Murphy 
 
  Copyright Ian A. Murphy , IAM / Secure Data Systems, Inc., 1987
 


TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH