|
<-> Hackers in the MOB <-> ***************************************************************** According to Schmidt, the dollar amounts are only part of the story, GTE Telemail, an electronic mail system, was broken into by at least four gangs of hackers, he says. "They were raising hell. The system got shut down one time for a day. None of these people have been charged, nor have any of the 414s been charged yet. "We have a major problem with hackers, phreaks and thieves," says Schmidt, who estimates that 75% of criminal hackers are teenagers and the other 25% are adults using teenagers to do their dirty work for them. "Adults are masterminding some of this activity. There are industrial spies, people playing the stock market with the information- just about any theft or fraud you can do with a computer. There are no foreign agents or organized crime yet, but it's inevitable," he says. "I believe there are some people out there now with possible organized-crime connections. "It's an epidemic. In practically every upper-middle class high school this is going on. I know of a high-school computer class in a school in the north Dallas suburbs where the kids are trying everything they can think of to get into the CIA computers." "It's a strange culture," says SRI's Parker, "a rite of passage among technology-oriented youth. The inner circle of hackers say they do it primarily for educational purposes and for curiosity. They want to find out what all those computers are being used for. There's a meritocracy in the culture, each one trying to out do the other. The one who provides the most phone numbers and passwords to computer systems rises to the top of the hackers. "For the most part it's malicious mischief," Parker says. "They rationalize that they're not really breaking any laws, just 'visiting' computers. But that's hard to believe when they also say they've got to do their hacking before they turn 18 so they don't come under adult jurisdiction. After 18, they have to do it vicariously through surrogates. They are some grand old men of hacking who egg on the younger ones... There have been some cases of a Fagin complex- a gang of kids led by one or more adults- in Los Angeles." Who are the hackers and what secret knowledge do they have? A 17-year-old youth in Beverly Hills, California, announced himself to other hackers on a bulletin board in this way: "Interests include exotic weapons, chemicals, nerve gases, proprietary information from Pacific Telephone..." Prized secret knowledge includes the two area codes in North America that have not yet installed electronic switching system central-office equipment. Using this information you can call those areas and use a blue box to blow the central office equipment, and then call anywhere in the world without charge. Other secret information lets you avoid being traced when you do this. A knowledge of the phone systems lets hackers share one of the technological privileges usually available only to large corporate customers: long-distance conference calls connecting up to 59 hackers. Schmidt estimates there are three or four conference calls made every night. The hackers swap more inside information during the phone calls. Thanks to packet-switching networks and the fact that they don't have to pay long-distance charfus, time and distance mean almost nothing to hackers. Desktop microcompters hook into phone lines via modems make it easy to obtain copyrighted software without human intervention. "Software piracy exists only because they can do it over the phone long distance without paying for it," Schmidt says. "some stuff gets sent through the mail, but very little. There are bulletin boards that exist solely for the purpose of pirating software. A program called ASCII Express Professional (AE Pro) for the Apple was designed specifically for modem-to-modem transfers. You can make a copy of anything on that computer. It can be copyrighted stuff- WordStar, anything. There are probably about three dozen boards like that. Some boards exchange information on breaking onto mainframes. "In 1982 the FBI really didn't know what to do with all this information," Schmidt says. "There isn't a national computer- crime statue. And unless there's $20,000 involved, federal prosecutors won't touch it." Since then, the public and federal prosecutors' interest has picked up. The film War Games and the arrest of 414 group in Milwaukee "created a lot of interest on Congress and with other people," FBI instructor Lewis says. "But, for ourselves it didn't really have any impact." "We'd been providing the training already," says Jim Barko, FBI unit chief of the EFCTU (economic and financial crimes training unit). He says public interest may make it easier to fight computer crime. "There are more people interested in this particular area now as a problem. War Games identified the problem. But I think it was just circumstantial that the movie came out when it did." Despite the help of knowledgeable informants like Schmidt, tracking down hackers can be frustrating business for the FBI. SRI's Parker explains some of the pitfalls of going after hackers: "Some FBI agents are very discouraged about doing something about the hacking thing. The cost of investigation relative to the seriousness of each case is just too high," he says. "Also, federal regulations from the Department of Justice make it almost impossible for the FBI to deal with a juvenile." An FBI agent cannot question a juvenile without his parents or a guardian being present. The FBI approach has been mostly to support lhe local police because local police are the only ones who can deal with juveniles. Another difficulty the agency faces is the regulations about its jurisdiction. "There has to be an attack on a government agency, a government contractor or a government-insured institution for the FBI to have clear-cut jurisdiction," Parker says. The FBI gets called into a case only after a crime has been detected by the complaining party. The FBI has done a generally competent job of investigating those crimes it was called in to investigate, in Parker's view. But the federal agency's job is not to help government or financial institutions attempt to prevent crimes, nor is its function to detect the crimes in the first place. "We're not out detecting any type of crime," says Lewis. "We like to think we can prevent them. We can make recommendations. But do we detect bank robberies or are they reported to us? Or kidnapping- do we detect those? Or skyjacking? There must be some evidence of crime, a crime over which the FBI has jurisdiction. Then we open a case." And despite the spate of arrests and crackdowns last summer, it looks like the FBI will have its hands full in the future: The hackers have not gone away. Like mice running through the utility passages of a large office building, they create damage and inconvenience, but are tolerated as long as their nuisance remains bearable. That status could change at any time, however. Meanwhile, little electronic "sting" operations similar to Abscam keep the element of danger on the hacker's game. An Air Force telephone network called AUTOVON (a private telephone system connecting computers on every Air Force installation in the world), was reportedly cracked by a hacker last last year. The hacker published lists of AUTOVON dialups on a bulletin board. The breach came to the attention `oo the Department of Defense on late 1983, but apparently nothing was done to stop the hackers. Then, in January, the AUTOVON number was answered in a sultry female voice. We wish to thank one and all for allowing us to make a record of all calls for the past few months. You will be hearing from us real soon. Have a happy New Year." That's a New Year's message calculated to give any hacker a chill. -End of file- . DOWNLOADED FROM P-80 SYSTEMS.......