home *** CD-ROM | disk | FTP | other *** search
-
-
- ****************************************************************************
- >C O M P U T E R U N D E R G R O U N D<
- >D I G E S T<
- *** Volume 2, Issue #2.09 (October 27, 1990) **
- ****************************************************************************
-
- MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
- ARCHIVISTS: Bob Krause / Alex Smith
- USENET readers can currently receive CuD as alt.society.cu-digest.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source is
- cited. It is assumed that non-personal mail to the moderators may be
- reprinted, unless otherwise specified. Readers are encouraged to submit
- reasoned articles relating to the Computer Underground.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- DISCLAIMER: The views represented herein do not necessarily represent the
- views of the moderators. Contributors assume all responsibility
- for assuring that articles submitted do not violate copyright
- protections.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- CONTENTS:
- File 1: Moderators' Corner
- File 2: Len Rose Arrest
- File 3: Mars was not "Censored"
- File 4: Response to Mars "Censoring"
- File 5: Steve Jackson Games (SJG) Update
- File 6: The Future of Hacking and the System Security Profession
- File 7: The Ultimate Interface: Hackers and the Private Sector
- File 8: CU in the News: "Hackers" and Bank Blackmail in England
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- ----------------------------------------------------------------------
-
- ********************************************************************
- *** CuD #2.09, File 1 of 8: Moderator's corner ***
- ********************************************************************
-
- From: Moderators
- Subject: Moderators' Corner
- Date: October 27, 1990
-
- ++++++++++
- In this file:
- 1. COPYRIGHT ARTICLE INFORMATION
- 2. BIBLIOGRAPHIC RESOURCES
-
- +++++++++++++++
- Copyright Article Information
- +++++++++++++++
-
- CuD is *NOT* copyright, and articles by moderators, anonymous articles, and
- other articles may be reprinted as long as the source is attributed.
- However, occasionally an individual article is copyright protected. The
- article in CuD 2.08 by Jim Warren on "PCs and Political Organizing" is an
- example of a submission that is copyprotected but remains freely available
- for others' use. We have heard horror tales of authors who make public
- posts and then later find their material plagiarized and copyright
- protected under another's name. So, do not copyright others' material as
- your own. That's tacky--very, very tacky. If a CuD article is listed as
- copyright (this notice was excluded from Jim Warren's article), you should
- check directly with that author (not CuD) for permission to reprint it.
-
- ++++++++++++++++++
- Bibliographic Resources
- +++++++++++++++++++
-
- We are trying to compile a list of bibliographic sources related to the CU
- to eventually place in the archives. If you are writing term paper,
- conference papers, or articles, or if you come across books, legal cases,
- or other references that seem relevant, send the full citation over to us.
- If you come across new books, or better, if you do a book review, send the
- titles or the review along as well.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Moderators
- Subject: Len Rose Arrest
- Date: October 26, 1990
-
- ********************************************************************
- *** CuD #2.09: File 2 of 8: Len Rose Arrest ***
- ********************************************************************
-
- Len Rose was arrested on state charges of "computer tampering" in
- Naperville, Ill., Naperville police confirmed Monday night. Len obtained
- a job at Interactive Systems Corporation, a software consulting firm, in
- Naperville and began Monday, October 15. Friday, he was fired. Bail was
- initially set at $50,000, and as of late Friday afternoon, he remained
- in jail.
-
- Len's wife speaks little English and is stuck in Naperville, lacking both
- friends and resources. Len currently has no money to post bond, and this
- leaves he and his family in a dreadful situation.
-
- We caution readers to remember that, under our Constitution, Len is
- *innocent* unless proven otherwise, but there is something quite
- troublesome about this affair. Hopefully, we'll soon learn what specific
- charges and what evidence led to those charges. Even if a "worst case"
- scenario evolves, there are surely better ways to handle such cases in less
- intrusive and devastating ways. Devastated lives and full invocation of
- the CJ process are simply not cost effective for handling these types of
- situations.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Gene Spafford <spaf@CS.PURDUE.EDU>
- Subject: Mars was not "Censored"
- Date: Sat, 20 Oct 90 14:11:52 EST
-
- ********************************************************************
- *** CuD #2.09: File 3 of 8: Mars was not "Censored" ***
- ********************************************************************
-
- I'm against censorship in pretty much any guise. I'm opposed to people who
- try to have gif images pulled from sites soley because of their
- sexually-oriented content.
-
- However, if I were running a news site, I would not carry the current
- alt.sex.pictures newsgroup, nor would I have an archive of the images.
-
- This is not a contradiction in terms.
-
- First off, I am not trying to have anyone else's collection of images
- pulled because of the subject matter, nor am I trying to prevent others
- from seeing those images.
-
- So, if I'm not against the subject matter of the material, why would I
- prevent their transmission through my site and storage on my disk?
-
- Reason number 1 is most of those images were scanned in from magazines and
- films that have active copyright protection. Scanning them in and
- transmitting them around is a violation of copyright. Not only is that not
- legal, I don't view it as proper to infringe on copyright. Storing those
- images is an infringement.
-
- Reason #2 is the quality of most of those images is poor compared with the
- original. If you want stuff like that, almost any bookstore or videotape
- rental place has the originals. Or, you can order by mail. I don't see
- the value of tying up bandwidth and storage to transmit poor copies of
- material that is generally available elsewhere.
-
- If the machine was a personal machine, I wouldn't keep the images because I
- have no use for them. They may (or may not) be interesting to look at some
- of them once, but after that I don't see any use for them. And as things
- go, I barely have enough free disk on most of machines as it is. If the
- machine was a shared machine, this reason would need to be explored with
- the other users, but it holds with most people I've talked with about these
- images.
-
- The bottom line is that there may be legitimate reasons not to have these
- images or carry newsgroups or mailing lists containing them. I think
- prudes are dangerous, but I also realize that everyone declining to have
- these images online is not automatically bowing to censorship or forbidding
- their presence because of content.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: portal!cup.portal.com!dan-hankins@SUN.COM
- Subject: Response to Mars "Censoring"
- Date: Sun, 21 Oct 90 00:04:25 PDT
-
- ********************************************************************
- *** CuD #2.09: File 4 of 8: Response to Mars "Censoring" ***
- ********************************************************************
-
- In article <CuD #2.08 #3>, Karl Lehenbauer <karl@sugar.hackercorp.com> writes,
-
- >I used Prodigy several times, and it is a heavily censored system,...
-
- This is inaccurate. Prodigy is not censored, it is _edited_. There is a
- significant difference. When newspaper articles are removed by government
- order, that's censorship. When the newspaper owners decide to not run an
- article because it is counter to their editorial policies (or personal
- prejudices), then that's editing.
-
- The difference is that in the first case, the State is telling a citizen (by
- threat of force) what she can and cannot do with her own property. In the
- second, a citizen is disposing of his property as he sees fit.
-
- The Prodigy situation is far more like the second case than the first.
- Prodigy resources are owned by IBM and Sears. Since Prodigy is their
- property, they may dispose of it as they see fit. This includes editing their
- databases to remove any information inconsistent with their policies.
-
- Some may argue that the $10 a month (plus fees for other services provided)
- gives the Prodigy subscriber the right to post anything she desires. This
- isn't the case. The subscriber is paying for the right to use the resources
- as provided for in the contract. Unless IBM and Sears agree in the contract
- not to edit or abridge information residing on Prodigy, they continue to have
- the right, both morally and legally, to do so.
-
- Censorship is when some organization says, "You may not say X.". Editing is
- when some organization says, "You may not use _my property_ to say X." This
- is an important distinction to make explicit; there is an increasing tendency
- for people to believe that they have not only the right to say whatever they
- want, but also the unlimited right to use the property of others to do so.
-
- Mr. Lehenbauer also writes,
-
- >If this is IBM's view of the future of personal electronic communications...
- >it is a bleak future indeed... every message must be so inoffensive that
- >*nobody* is going to be offended by it... and that is censorship.
-
- IBM doesn't control electronic communications in this country; the Prodigy
- subscriber is certainly free to go elsewhere to express his views. This is
- what many of them are doing. BIX is getting a lot of former Prodigy users
- these days.
-
- It's not censorship.
-
- It's also worth mentioning here that although the Prodigy bulletin board
- system is edited, Sears and IBM have agreed to not edit email. Users are free
- to form email groups (like Internet mailing lists) to discuss whatever they
- want, from sex to explosives. They just have to pay extra for it.
-
- In article <CuD #2.08 #4), the moderators write,
-
- >In the MARS incident, the NSF flexed its fiscal muscles (according to those
- >on the receiving end).
-
- This is again not censorship. The NSF pays for the Internet, and has the
- right to say how those monies are spent. Since MARS resided on an Internet
- node, the NSF had the right to refuse to pay for those files to be transmitted
- across its network. In fact, the NSF has the right to refuse to pay for
- network connections for any site for any reason whatsoever, unless it has made
- a contract to the contrary. If this is "flexing its fiscal muscles", then so
- be it.
-
- The quoted article quotes some other postings. I reproduce here the relevant
- portions:
-
- >I also don't like the idea of the university having to censor this board to
- >suit the narrow-minded leanings of a few people...
-
- >Again i am sorry that CENSORSHIP found its way into another democratic haven
- >of society...
-
- This is just more of the sort of illogic I referred to earlier. If these
- folks want their X-rated pictures, then they can have them. They just can't
- expect somebody else (the NSF or their University) to pay for them. They are
- certainly free to start their own BBS or post the material on a private BBS or
- Usenet mail server that allows such stuff.
-
- >Can a few angry letters to a federal bureaucrat invoke threats of fiscal
- >blackmail?
-
- If I boycott your business because I find some of your activities
- objectionable, am I threatening you with fiscal blackmail? Why should the
- NSF or a university be any different? The NSF is just boycotting sites that
- carry material it finds offensive, and the universities are just exercising
- their right to control use of their property.
-
- >It would seem that officials could confiscate the equipment of a sysop who
- >maintained adult .gif/.gl files.
-
- If you are concluding this on the basis of the "federal prosecutions and
- application of RICO" referred to earlier, then I agree with you that it's
- something to be worried about. It would be a violation of various First
- Amendment rights.
-
- If you're concluding this by extension from the NSF actions, I must
- disagree. A government agency deciding what it wants to spend its money on is
- hardly analogous to confiscating someone's property. The legal right to do
- one does not provide the legal right to do the other.
-
- >A recent article... raised the spectre of "licensing" BBSs.
-
- Now _this_ is something to worry about. This reminds me of the situation
- in oppressive regimes, where printing presses and photocopiers are "licensed".
- Somehow I don't think they'll get away with this one. Any such regulation
- would be a clear violation of First (and other) Amendment rights.
-
- CLARIFICATION:
-
- When an organization is funded by extortion (i.e. taxes), those who fund it
- have a moral right to say how those funds will be spent, over and above the
- organization's aims. The receivers of the service _still_ don't have any
- rights of control, unless they have entered into a contract with the provider
- that gives them that right.
-
- In a constitutionally limited republic such as ours, that taxpayer control is
- exerted in one of two ways. The first is by electing to government those we
- believe will implement the policies we want. The second (and far more rare
- option) is referendum.
-
- As long as its decisions remain within the policies set for it by elected
- officials and referendum, the NSF has the right to spend (or refuse to spend)
- its money as it likes.
-
- If the article I read in CuD is any indication, the purpose of the NSFnet is
- to only support the exchange of "scholarly" information. X-rated GIFs don't
- belong in that category, in most folks' eyes.
-
- :END CLARIFICATION
-
- By the way, with PC-Pursuit costs, I pay $40 a month for Net access. Yet at
- work there is an Internet gateway I could sign up for access to and use to
- make my posts (for free!). The reason I don't is that I don't think it's
- moral to use IBM resources for purposes IBM wouldn't approve of, such as
- expressing disapproval of their policies; it's their property. So I'm not
- just spouting rhetoric that doesn't cost me anything.
-
- +++++++++
-
- Dan Hankins
-
- dan-hankins@cup.portal.com
- dan-hankins@pro-realm.cts.com
-
- Complete the following: Pro is to Con as Progress is to ________.
-
- Disclaimer: I don't work for the NSF or Sears. Although I have a contract
- with IBM to provide programming services to them in return for a salary, this
- does not constitute approval for their policies. In particular, I think that
- their Prodigy policies, while not immoral, are particularly stupid. The kind
- of editing they do on the bulletin board, their ridiculously high email
- charges, and their complete lack of upload/download capability will simply
- drive customers to other services. I am not a Prodigy subscriber, nor do I
- intend to become one. For the same $10 a month, I like Portal much better.
- And I post things in alt.individualism that you'd never see on Prodigy BBS.
- I defend your right to freedom of expression. Just don't ask me or anyone
- else to foot the bill.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: Steve Jackson
- Subject: Steve Jackson Games (SJG) Update
- Date: October 23, 1990
-
- ********************************************************************
- *** CuD #2.09: File 5 of 8: Steve Jackson Games Update ***
- ********************************************************************
-
- %The following, by Steve Jackson, is reprinted with permission
- from two posts on The Well--moderators%.
-
- ++++++++++++
- UPDATE ON SJ GAMES
- ++++++++++++
-
- We were raided on March 1. Most people here have heard that story, though
- I'm working on an article for upload. This is an excerpt, because I don't
- know when I'll have time to finish the whole thing.
-
- The brief story: The Secret Service took 3 computers, a laser printer, lots
- of assorted hardware, lots of disks and papers, and lots of my business
- data. In particular, they took every current copy, on paper or disk, of
- the new book we were about to send to the printer.
-
- Because of the confiscation of the GURPS Cyberpunk book, our business came
- to a standstill for six weeks - the time it took us to reconstruct it and
- get it to the printer.
-
- THE RETURN
-
- In early June, we started talking to the people setting up the EFF, and
- word leaked out; I got several inquiries from reporters. On June 20, quite
- suddenly, the Secret Service called to say we could have our property back.
- So we went to pick it up. They really did give most of our stuff back. They
- kept one hard disk and some assorted hardware, as well as some papers. Of
- the things they returned, one computer required $200 in repairs before it
- would work. Another has so much visible damage that I don't even want to
- turn it on.
-
- Loyd hasn't gotten ANY of his things back.
-
- And we still don't know why they raided us. They took our book; they took
- our BBS computer; they took a lot of things. And their application for a
- search warrant is STILL sealed. So we can speculate, but that's all.
-
- Nobody connected with the business has been arrested. Nobody has been
- indicted. Nobody has been charged. Nobody has even been QUESTIONED again.
- And these guys are still saying "No comment." Well, if I were in their
- shoes, I wouldn't have any comment, either.
-
- OUR CURRENT STATUS (SIGH)
-
- We're not a big business, and the cost of the raid (now well over $125,000)
- pushed us to the wall. We have been squeaking by ever since then -
- sometimes things look more hopeful, sometimes less. The problem is cash
- flow.
-
- We have kept up with our long-term debt (in fact, we've cleared all but
- $50K of it up, making most payments on the last day of the grace period),
- but we have been very slow-paying with current suppliers. We simply have no
- margin for error; any unexpected expense or failure of income will knock us
- off. As I write this, a couple of big receivables didn't come in when they
- should have; we're about to default on a note payment, and our big printers
- are demanding CASH NOW OR NO MORE PRINTING, for which I can't blame them.
-
- So the current news is not good. We should still be all right if we make it
- into 1991, but current cash is tighter than it has been for months.
-
- +++++++++++++
- SIGNIFICANT STATUS UPDATE:
- +++++++++++++
-
- The warrant application under which my offices were raided has been
- unsealed. It was unsealed a month ago! Apparently this was just after the
- last request from Silverglate and Good, but they were not informed that it
- had been unsealed. (Question of etiquette here?)
-
- At any rate, I got a copy today in a package from Senator Bentsen's office,
- in reply to my last letter asking if the Senator could help get this
- information. He could and did.
-
- Ver-r-r-r-y interesting. A copy has gone to Silverglate and Good, who
- should have comments shortly. Brief answers to oft-repeated questions, now
- that I really do know what's going on:
-
- Yes, this was connected to the Neidorf case. Specifically, my managing
- editor was being "accused" of receiving a copy of the Phrack issue with the
- E911 file and posting it on the BBS, Phoenix Project. The description of
- the E911 file included the same wild allegations that were exploded during
- the Phrack trial.
-
- No, there is nothing in the application to indicate that the GURPS
- CYBERPUNK game was a target when they came in the door (which does not
- mitigate the seriousness of their effective suppression of the text).
-
- Yes, they definitely knew that they were raiding a BBS system; it was one
- of the things they were after. The application specifically defined what a
- BBS is - though it did not mention the ECPA or the protections granted
- therein.
-
- No, they alleged no criminal behavior on my part or on the company's part.
- SJ Games was invaded because Loyd Blankenship was an employee and a
- co-sysop and frequent user of our BBS.
-
- No, there's nothing there to change my attitude toward Loyd. He is a valued
- employee, innocent until proven guilty, and they haven't even STARTED to
- prove anything.
-
- I am, no doubt, oversimplifying in my attempt to boil a large stack of
- paper down to a short update - but that does seem to me to be the gist of
- it. I'm sure the attorneys will have more to add soon.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: BORGVM
- Subject: The Future of Hacking and the System Security Profession
- Date: 22 Oct., '90
-
- ********************************************************************
- *** CuD #2.09: File 6 of 8: Hacking and System Security ***
- ********************************************************************
-
- Before I begin the discussion of my views on the future of hacking and the
- system security profession, I feel it necessary to offer an introduction
- which I hope will aid in the understanding of my views. I am an ex-hacker,
- yet in saying so I do not rule out a few things which I associate with my
- personal perspective on hacking. To begin with, I have always associated
- hacking with a genuine lust for knowledge. Whether or not that knowledge
- was restricted solely depends on the views of the individual. For me,
- however, hacking was an acquisition of knowledge a form the military likes
- to give as a good reason to join it. You know, hands-on training, of
- course!
-
- It was an attempt to learn as many operating systems as possible. Their
- strengths in comparison to one another, their weaknesses, and their
- nuances. When I was hacking, data was sacred. It was something which
- must not be harmed. I can say with genuine conviction that every time I
- heard of destructive viruses, malicious crashes, or the like, I would
- become enraged far more than would your common security professional, who
- would most likely eye the event as a possibility to acquire cash,
- reputation in the foiling of the plot, or as leverage to gain funding and
- public support.
-
- Although my respect towards data is still very healthy, my urge to hack is
- not. After entering higher education, I have been granted an account on
- the mainframe with internet and bitnet access. This situation had served
- as a fuel towards my already healthy paranoia of law enforcement and their
- new technologies: its just not worth the risk.
-
- After my 'retirement', however, I began to ponder the devices available
- during the apex of my hacking career such as ANI (Automatic Number
- Identification) and CLID (Caller Line Identification) which could
- instantaneously register the number of any 800 caller, and processes
- inherent in some digital switching systems which register calls to local
- packet-switched networks, that about 20% of my hacks could be traced right
- to my doorstep by the right investigator.
-
- I also noted the increase in these types of investigators and the
- development of more organized computer-security networks involving FBI,
- Secret Service, and private computer security enterprises which developed
- highly efficient training methods: the numbers of security representatives
- in the telephone companies and computer networks has increased
- dramatically, and to a point where telephone company toll fraud is no
- longer convenient, for danger and convenience rarely coexist.
-
- I believe that the future will offer much protection from hacking, but only
- to a certain extent. One needs only to examine the header of a message
- originating from some microcomputer host which UUCP's it through half a
- dozen Usenet sites, the Internet, and finally to its BITNET destination to
- visualize, quite realistically, a phone number tagged onto the end of the
- originating userid.
-
- With digital technology advancing at its current rate, the possibilities
- are endless. It is for these reasons that the private computer security
- profession (at its current size) is only a short-term success sparked by
- mass press-generated hysteria, and blatant disinformation. The computer
- security profession did not receive its recognition from the voices of
- concerned individuals or even gluttonous corporations: it received the
- necessary attention and nurturing due to the paranoias of a corrupt
- military-minded government which knows exactly what it keeps on its systems
- and exactly why no one else must. You see, its a matter of 'national'
- security! Any good real hacker who has been around a few nets knows this.
-
- The time will come when a hacker will sit down at his terminal to hack a
- computer somewhere far away. This hacker might dial up a local network
- such as Tymnet or Telenet and connect to a computer somewhere. That remote
- computer's standard issue security drivers will sense an intrusion (user
- John Doe calling form a network address originating in California which is
- inconsistent with Mr. Doe's schedule,) request the network's CLID result,
- and forward the information directly to Mr. Hacker's local police
- department which is, in this day and age, fully equipped with the ability
- to centrally tap telco lines (data or otherwise.) The expert system at
- the police department verifies that the local data tap is indeed consistent
- with the victim computer's John Doe Session and sends out a dispatch.
-
- Sound like fantasy? Every bit of it is perfectly possible with our
- existing technology, and upon review of the chronology of computer security
- over the last three years, certainly probable.
-
- Data security professionals are as easily replacable by computers as are
- assembly-line workers. In this day (which will be, incidentally, just
- prior to the banning of Orwell's "1984") there will be a small but very
- knowledgeable and powerful group of hackers able to circumvent some of
- these security mechanisms. A group of hackers not large enough to present
- an obvious threat, but powerful enough to give a self-perpetuating
- technological dictatorship and its docile society a nice, re-asserting slap
- on the rear.
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- Subject: The Ultimate Interface: Hackers and the Private Sector
- From: Dark Adept
- Date: Tue, 23 Oct 90 22:19 CDT
-
- ********************************************************************
- *** CuD #2.09: File 7 of 8: Hackers and the Private Sector ***
- ********************************************************************
-
- The Ultimate Interface: Hackers and The Private Sector
-
- A major problem in Cyberspace is the lack of communication between hackers
- and non-hackers. Corporations are fully entitled to their privacy, and so
- they feel threatened by the hacker "menace." They view the hacker as the
- enemy, and so they persecute him. This is a valid belief since history
- shows that when a group does not understand another group, they try to
- destroy it. Saying this is valid does not make it right. If hackers and
- corporations and security companies and software companies, etc., etc.,
- etc. were to overcome their differences much could be done. By trading
- bits and pieces of knowledge, the two opposing groups could together
- develop revolutionary advances in computing that would benefit all. The
- problem is to get the two groups to trust one another. In some upcoming
- G-Philes and submissions to CuD, I hope to break down this barrier of
- resentment by crossing over the lines of the Underground into the "real"
- world and providing valuable information about systems, security,
- interfacing, etc. from a hacker's/member-of-the-underground's point of
- view. I hope others will follow suit, and that the private sector will
- reciprocate by allowing technical information to flow into the Underground.
- Ultimately, I hope that there will be a rapport between hackers and members
- of the private sector so that we may learn from each other and make the
- best use possible of this greatest of inventions, the computer. Without
- further delay, then, I present the first of what I hope will be a long and
- successful series of articles. These must be short since they are merely
- articles, but I have planned a few full-length works that will be more
- in-depth; I will send them to the CuD archives as they become available. I
- hope you enjoy them.
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
-
- System Security: Security Levels and Partitioning
-
- by The Dark Adept
-
- Traditionally, security levels are used to prevent a user from gaining
- access to areas where he lacked legitimate interest. They also have
- another very useful purpose that is seldom recognized. They can be used as
- a firewall of sorts to stop the spread of viruses and the destruction of
- files by an intruder. A good analogy of this theory is ship design. When
- a ship is designed, the lower compartments are designed separate from each
- other so that if the hull is punctured, the flooding compartment may be
- sealed off thus localizing the damage and stopping the ship from sinking.
- In the same way accounts should be assigned security levels. However, if
- the accounts are fully isolated from one another, it is too restrictive to
- be of any real use. A user in Accounting would not be able to access the
- records from Personnel to find an employee's rate of pay, for example.
- Optimally, then, one would want a balance between freedom and security.
- This optimal assignment of security levels is accomplished through a
- two-stage step.
-
- The first stage is the creation of generic accounts. Many computer
- systems, such as those of schools, use generic accounts as their sole
- source of security. This is VERY dangerous. By generic accounts, I mean a
- set of basic accounts where each member has certain privileges assigned to
- it that differ from the other members. For example, in schools the
- teachers often receive one type of account, and students another. Besides
- the systems operator's account, these are the only two types of accounts
- available. The teachers have a wide-range of freedoms including being able
- to look into files that don't belong to their department since they can be
- trusted. The students have a limited amount of ability, mostly restricted
- to accessing their files only. But what happens if an intruder grabs a
- teacher's account? You got it, he has access to A LOT of stuff!
- Obviously, this won't do. However, generic accounts are useful if used in
- combination with other devices. This leads to the implementation of the
- second stage: security levels.
-
- Example: Let X, Y, and Z be generic accounts in system S with the
- following maximum abilities:
-
- X can access file areas A, B, C, D
- Y can access file areas B, D, J, K
- Z can access file areas B, C, J, L
-
- Assume some User, u, needs access to file areas B and L alone. Assign him
- account type Z with security modifications such that he may access only
- file areas B and L.
-
- This results in User u being restricted to the proper file areas, B and L,
- but allows ease of modification later if he needs access to areas C or J.
- It also allows for the greatest amount of security since his account type
- is Z so by definition he cannot access file areas A, D, or K without
- receiving a new account. Therefore, if an intruder takes control of
- account u, he cannot destroy more than areas B and L without modification.
- The most he can modify account u to have access to is areas B, C, J, and L.
- Therefore the damage will be localized to file areas B, C, J, and L. The
- only way he can enter the other areas is to get a new account. This is much
- more difficult than modifying one he already has.
-
- The same sort of setup may be applied to commands, usage times, dialup
- ports, etc. For example, say the editor of a newspaper has account Z that
- has maximum port capability of T, t1, t2, t3 where T is a terminal in his
- office and t1, t2, and t3 are outside lines. At first he is assigned a
- security level that allows access to T only so his account cannot be
- accessed from intruders outside thus stopping someone from deleting all of
- tomorrow's edition. Now, if he must go on location somewhere, it would be
- a simple matter to modify his account to give him access to t1 so he can
- call up and review the submissions. Yet, again, if there exist ports t4,
- t5, etc., these would NEVER be able to access the files since account type
- Z is incapable of being accessed through these ports.
-
- What follows here is a mathematical model of account partitioning using
- concepts of discrete mathematics. Since this is a text file and cannot use
- graphics characters, some common mathematical symbols must be defined using
- regular characters.
-
- Symbols:
- --------
-
- | = "such that" (ordinarily a vertical bar)
- %e% = "is an element of" (ordinarily an emphasized epsilon)
- <==> = "if and only if"
-
- Model:
- -----
-
- Let S represent a computer system.
-
- Let S1 be a set of different areas of interest in a computer system. This
- is modelled by S1=%a1,a2,a3,...,an% where n is some integer, and a1,a2,
- a3,... are the areas of interest in S.
-
- Let S2 be a set of different user accounts in a computer system. This is
- modelled by S2=%u1,u2,u3,...,uq% where q is some integer, and u1,u2,
- u3,... are the user accounts in S.
-
- Let x %e% S2. Let y %e% S1. Let r be a relation on S defined as this:
-
- xry <==> x %e% S2 | x has access to y.
-
- Now r becomes a partitioning relation on S2. The function that defines r
- is determined by how the operator wants his accounts set up.
-
- Further, the equivalence class of x, [x], defines the generic account.
-
- Example: Say S has accounts u1, and u2. It also has areas of interest a1,
- a2,a3. Now say the operator wants u1 to have access to a1 and a2, and u2 to
- have access to a1 and a3. By defining r in the proper manner he gets:
- r =%(u1,a1), (u1,a2), (u2,a1), (u2,a3)%. Now [u1]=%a1, a2% and
- [u2] = %a2, a3%. Thereby defining the generic accounts.
-
- Now let G be the set of all of the equivalence classes determined by xry
- that define generic accounts in S. This is seen as G=%[x]|x /e/ S2%.
-
- For clarity, let g1 = [u1], g2 = [u2], ... so we have G=%g1,g2,...gq% where
- q is some integer.
-
- Now let d %e% G. We define w to be a relation as such:
-
- dwy <==> d %e% G | d has access to y.
-
- Now w becomes a partitioning relation on G. The function that defines w
- is determined by how the operator wants to implement a generic account
- for a particular user.
-
- Further, the equivalence class of d, [d], defines the specific user
- account.
-
- Example: Say S has generic account g1 set up. It has areas of interest
- a1, a2, and a3. g1 is partitioned in such a way that it can only access a1
- and a3. Now say the operator wants a certain holder of a generic account
- type g1 to have access only to a1. By defining w in the proper manner he
- obtains: w=%(g1,a1)%. Now [g1]=%a1% thereby defining an appropriate user
- account.
-
- As some may have noticed, accounts can be partitioned ad infinitum. In
- most cases I have found two partitions to be sufficient. An interesting
- adaptation is also to use this method to define what users have access to
- which commands. It again allows much room for change while keeping things
- safely separate.
-
- The ultimate safety would come when the first partition is defined in the
- operating/timesharing system itself. For example, if Unix (Tm of AT&T)
- came with say 30 different file areas and accounts accessing those areas in
- specialized ways, then even if an intruder grabbed the root account, he
- could not change the first level of partitioning to access all those
- accounts.
-
- As I hope I have shown, the proper use of generic accounts and security
- levels allows the optimum balance of security and ability. By properly
- partitioning accounts, the system operator can isolate a problem to a
- relatively small area allowing faster restructuring afterward.
-
- I hope you have enjoyed this article. I can be reached for comments,
- criticism, and E-mail bombs at Ripco BBS (312)-528-5020. Also, if you
- liked this article, you may comment to Jim Thomas (editor of CuD) and he
- can pass the general reception on to me.
-
- Written 10/21/90 in Chicago, IL -- The Dark Adept
-
- ********************************************************************
- >> END OF THIS FILE <<
- ***************************************************************************
-
- ------------------------------
-
- From: P.A.Taylor@EDINBURGH.AC.UK
- Subject: CU in the News: "Hackers" and Bank Blackmail in England
- Date: 24 Oct 90 12:59:34 bst
-
- ********************************************************************
- *** CuD #2.09: File 8 of 8: CU in the News: Hackers/English Banks**
- ********************************************************************
-
- Taken from: "The Independent On Sunday," October 14, '90:
- Mysterious computer experts demand money to reveal how they penetrated
- sophisticated security.
-
- HACKERS BLACKMAIL FIVE BANKS by Richard Thomson
-
- At least four British clearing banks and one merchant bank in the City are
- being blackmailed by a mysterious group of computer hackers who have broken
- into their central computer systems over the last six months. These
- breaches of computer security may be the largest and most sophisticated
- ever among British Banks.
-
- The electronic break-ins which began last May, could cause chaos for the
- banks involved. Once inside their systems, the hackers could steal
- information or indulge in sabotage, such as planting false data or damaging
- complex computer programs.It is unlikely, however, they would be able to
- steal money. So far, the hackers have contented themselves with demanding
- substantial sums of money in return for showing the banks how their systems
- where penetrated. None of the banks has yet paid.
-
- The break-ins are evidence of the rapid growth in computer fraud and
- manipulation in Britain. Although most hacking is relatively trivial, the
- latest cases show much sophistication. The hackers have concentrated on
- tapping the banks' electronic switching systems which, among other things,
- control the routing of funds around the world.
-
- Some of the hackers are in contact with each other, but they are believed
- to be operating individually. One computer expert described their level of
- expertise and knowledge of the clearing bank computer systems as "truly
- frightening". They are not believed to have links with organised crime,
- which has become heavily involved in computer hacking in the US over the
- last two to three years.
-
- It is a severe embarrassment for the banking community which is frightened
- that public awareness of the security breach could undermine public
- confidence. As a result, they have not called in the police but have hired
- a firm of private investigators, Network Security Management, which is
- owned by Hambros Bank and specialises in computer fraud. It is common for
- banks not to report fraud and security failures to the police for fear of
- damaging publicity.
-
- All the banks approached either denied that they were victims of the
- blackmail attempt or refused to comment. The hunt for the hackers is being
- led by David Price, managing director of NSM, who confirmed his firm was
- investigating computer security breaches at five British banks. "I am
- confident of success in catching the hackers," he said. "The amount of
- information they can get from the banks will vary depending on the computer
- systems and the ways the hackers broke into them," he added. "They could
- go back in and sabotage the systems, but they are not threatening to do
- so."
-
- The ease with which the hackers appear to have penetrated the systems
- highlights the vulnerability of the computer data. Clearing banks in
- particular rely on huge computer systems to control their operations, from
- cash dispenser payments to massive international transfers of funds.
- Security measures were tightened after a large computer fraud at a leading
- City bank three years ago Although the bank involved was never named, it is
- understood the money was never recovered.
-
- Nevertheless, the speed with which computer technology has developed in the
- last few years has made the detection of security breaches more difficult.
- According to an expert, who recently advised one of the big four clearers
- on its computer systems, there are few people who understand the banks
- system well enough even to detect a break-in.
-
- Computer-related fraud has boomed over the last decade as businesses have
- come to rely more heavily on electronic information. According to some
- reputable UK and US estimates, up to 5% of the gross national product of
- western economies disappears in fraud. Experts say that the senior managers
- of many companies simply do not appreciate the need for tight security.
-
- The British legal system has been slow to respond. The Computer Misuse Act
- which makes it illegal to access a computer without authorisation, came
- into effect only at the end of August this year.
- (end article)
-
- ++++++++++++++++++++++++++++++++++++++++++++
-
- The follow-up article (from The Independent on Oct 21), also by Richard
- Thomson, is basically much of the same thing. He quotes a hacker from the
- US who's computer "nom de guerre" is Michael Jordan who makes the following
- points.
-
- 1.One large US bank is notorious for lax security and it has effectively
- become a training ground for hackers.
-
- 2. Guessing passwords is sometimes "absurdly simple", they tend to choose
- words like "Sex, Porsche, or Password"
-
- 3.Social Engineering techniques are used and he would spend approx 6 weeks
- trying to suss out from a manager's secretary etc. anything he could find
- out that would help him have a better chance of accessing a bank's system.
-
- The main body of the article is pretty glib; it has the usual stock phrases
- like..."Hackers and Bank employees have always been a danger, but now there
- are signs that yesterdays bank robbers have hung up their sawn-off
- shot-guns and are turning to computers instead." and even more hypey is ...
- " Mr Jordan claims to have been shown pictures of people in organised
- crime.
-
- "They're East End lads who've become more sophisticated now. I've been told
- that if they ask you to help them and you refuse, it's baseball bats at
- dawn."
-
- There's also a discussion of the reliability of fraud figures, a mention of
- how various definitions can exaggerate the actual role played by the
- computer. Detective Chief Superintendent Perry Nove head of the city fraud
- squad defines "computer fraud" as ... "It is when the computer system
- itself is attacked rather than just used to facilitate an offence" The main
- conclusion on the whole area of fraud is "...the subject remains cloaked in
- mythology and mystery.Naturally, no one knows how many frauds are commited
- that are never discovered. Matters are further obscured because banks
- fearful of bad publicity, sometimes do not report frauds to the police- a
- situation that Mr Nove accepts with resignation. There is general agreement
- among hackers and other experts that it is more widespread and more
- sophisticated in the US, that it is growing in Britain, but that British
- Banks are more secure than those in America and the Continent. That is
- about as reliable as the detailed information gets."
-
- I hope I've summed up the general tone of the whole article, it was in the
- business section of The Independent On Sunday, 21st Oct. The paper's
- normally a very good one, so the generally bad coverage this bloke Thomson
- gave to the subject of hacking, and the amount of what I'd call "casual
- empiricism" he used to back up his arguments, is sadly probably indicative
- of what the CU is up against in the way of ignorance and bad reporting. I
- thought it was quite ironic that he recognised the role of mystery and
- mythology, since he seemed to be doing his best to add to it. Finally, if
- he'd of mentioned the word expert once more ..grrrrrrr.... Cheers for now,
-
- P.A.T.
-
- ********************************************************************
-
- ------------------------------
-
- **END OF CuD #2.09**
- ********************************************************************
-