Hacker Crackdown by Bruce Sterling (the reader ebook txt) đ
- Author: Bruce Sterling
- Performer: 055356370X
Book online «Hacker Crackdown by Bruce Sterling (the reader ebook txt) đ». Author Bruce Sterling
If there was a final spur needed to get the police off the dime, it came in the realization that the emergency 911 system was vulnerable. The 911 system has its own specialized software, but it is run on the same digital switching systems as the rest of the telephone network. 911 is not physically different from normal telephony. But it is certainly culturally different, because this is the area of telephonic cyberspace reserved for the police and emergency services.
Your average policeman may not know much about hackers or phone-phreaks. Computer people are weird; even computer COPS are rather weird; the stuff they do is hard to figure out. But a threat to the 911 system is anything but an abstract threat. If the 911 system goes, people can die.
Imagine being in a car-wreck, staggering to a phone-booth, punching 911 and hearing âTinaâ pick up the phonesex line somewhere in New York! The situationâs no longer comical, somehow.
And was it possible? No question. Hackers had attacked 911 systems before. Phreaks can max-out 911 systems just by siccing a bunch of computer-modems on them in tandem, dialling them over and over until they clog. Thatâs very crude and low-tech, but itâs still a serious business.
The time had come for action. It was time to take stern measures with the underground. It was time to start picking up the dropped threads, the loose edges, the bits of braggadocio here and there; it was time to get on the stick and start putting serious casework together. Hackers werenât âinvisible.â They THOUGHT they were invisible; but the truth was, they had just been tolerated too long.
Under sustained police attention in the summer of â89, the digital underground began to unravel as never before.
The first big break in the case came very early on: July 1989, the following month. The perpetrator of the âTinaâ switch was caught, and confessed. His name was âFry Guy,â a 16-year-old in Indiana. Fry Guy had been a very wicked young man.
Fry Guy had earned his handle from a stunt involving French fries. Fry Guy had filched the log-in of a local MacDonaldâs manager and had logged-on to the MacDonaldâs mainframe on the Sprint Telenet system. Posing as the manager, Fry Guy had altered MacDonaldâs records, and given some teenage hamburger-flipping friends of his, generous raises. He had not been caught.
Emboldened by success, Fry Guy moved on to credit-card abuse. Fry Guy was quite an accomplished talker; with a gift for âsocial engineering.â If you can do âsocial engineeringââfast-talk, fake-outs, impersonation, conning, scammingâthen card abuse comes easy. (Getting away with it in the long run is another question).
Fry Guy had run across âUrvileâ of the Legion of Doom on the ALTOS Chat board in Bonn, Germany. ALTOS Chat was a sophisticated board, accessible through globe-spanning computer networks like BITnet, Tymnet, and Telenet. ALTOS was much frequented by members of Germanyâs Chaos Computer Club. Two Chaos hackers who hung out on ALTOS, âJaegerâ and âPengo,â had been the central villains of Clifford Stollâs CUCKOOâS EGG case: consorting in East Berlin with a spymaster from the KGB, and breaking into American computers for hire, through the Internet.
When LoD members learned the story of Jaegerâs depredations from Stollâs book, they were rather less than impressed, technically speaking. On LoDâs own favorite board of the moment, âBlack Ice,â LoD members bragged that they themselves could have done all the Chaos breakins in a week flat! Nevertheless, LoD were grudgingly impressed by the Chaos rep, the sheer hairy-eyed daring of hash-smoking anarchist hackers who had rubbed shoulders with the fearsome big-boys of international Communist espionage. LoD members sometimes traded bits of knowledge with friendly German hackers on ALTOSâphone numbers for vulnerable VAX/VMS computers in Georgia, for instance. Dutch and British phone phreaks, and the Australian clique of âPhoenix,â âNom,â and âElectron,â were ALTOS regulars, too. In underground circles, to hang out on ALTOS was considered the sign of an elite dude, a sophisticated hacker of the international digital jet-set.
Fry Guy quickly learned how to raid information from credit-card consumer-reporting agencies. He had over a hundred stolen credit-card numbers in his notebooks, and upwards of a thousand swiped long-distance access codes. He knew how to get onto Altos, and how to talk the talk of the underground convincingly. He now wheedled knowledge of switching-station tricks from Urvile on the ALTOS system.
Combining these two forms of knowledge enabled Fry Guy to bootstrap his way up to a new form of wire-fraud. First, heâd snitched credit card numbers from credit-company computers. The data he copied included names, addresses and phone numbers of the random card-holders.
Then Fry Guy, impersonating a card-holder, called up Western Union and asked for a cash advance on âhisâ credit card. Western Union, as a security guarantee, would call the customer back, at home, to verify the transaction.
But, just as he had switched the Florida probation office to âTinaâ in New York, Fry Guy switched the card-holderâs number to a local payphone. There he would lurk in wait, muddying his trail by routing and re-routing the call, through switches as far away as Canada. When the call came through, he would boldly âsocial-engineer,â or con, the Western Union people, pretending to be the legitimate card-holder. Since heâd answered the proper phone number, the deception was not very hard. Western Unionâs money was then shipped to a confederate of Fry Guyâs in his home town in Indiana.
Fry Guy and his cohort, using LoD techniques, stole six thousand dollars from Western Union between December 1988 and July 1989. They also dabbled in ordering delivery of stolen goods through card-fraud. Fry Guy was intoxicated with success. The sixteen-year-old fantasized wildly to hacker rivals, boasting that heâd used rip-off money to hire himself a big limousine, and had driven out-of-state with a groupie from his favorite heavy-metal band, Motley Crue.
Armed with knowledge, power, and a gratifying stream of free money, Fry Guy now took it upon himself to call local representatives of Indiana Bell security, to brag, boast, strut, and utter tormenting warnings that his powerful friends in the notorious Legion of Doom could crash the national telephone network. Fry Guy even named a date for the scheme: the Fourth of July, a national holiday.
This egregious example of the begging-for-arrest syndrome was shortly followed by Fry Guyâs arrest. After the Indiana telephone company figured out who he was, the Secret Service had DNRsâDialed Number Recordersâinstalled on his home phone lines. These devices are not taps, and canât record the substance of phone calls, but they do record the phone numbers of all calls going in and out. Tracing these numbers showed Fry Guyâs long-distance code fraud, his extensive ties to pirate bulletin boards, and numerous personal calls to his LoD friends in Atlanta. By July 11, 1989, Prophet, Urvile and Leftist also had Secret Service DNR âpen registersâ installed on their own lines.
The Secret Service showed up in force at Fry Guyâs house on July 22, 1989, to the horror of his unsuspecting parents. The raiders were led by a special agent from the Secret Serviceâs Indianapolis office. However, the raiders were accompanied and advised by Timothy M. Foley of the Secret Serviceâs Chicago office (a gentleman about whom we will soon be hearing a great deal).
Following federal computer-crime techniques that had been standard since the early 1980s, the Secret Service searched the house thoroughly, and seized all of Fry Guyâs electronic equipment and notebooks. All Fry Guyâs equipment went out the door in the custody of the Secret Service, which put a swift end to his depredations.
The USSS interrogated Fry Guy at length. His case was put in the charge of Deborah Daniels, the federal US Attorney for the Southern District of Indiana. Fry Guy was charged with eleven counts of computer fraud, unauthorized computer access, and wire fraud. The evidence was thorough and irrefutable. For his part, Fry Guy blamed his corruption on the Legion of Doom and offered to testify against them.
Fry Guy insisted that the Legion intended to crash the phone system on a national holiday. And when AT&T crashed on Martin Luther King Day, 1990, this lent a credence to his claim that genuinely alarmed telco security and the Secret Service.
Fry Guy eventually pled guilty on May 31, 1990. On September 14, he was sentenced to forty-four monthsâ probation and four hundred hoursâ community service. He could have had it much worse; but it made sense to prosecutors to take it easy on this teenage minor, while zeroing in on the notorious kingpins of the Legion of Doom.
But the case against LoD had nagging flaws. Despite the best effort of investigators, it was impossible to prove that the Legion had crashed the phone system on January 15, because they, in fact, hadnât done so. The investigations of 1989 did show that certain members of the Legion of Doom had achieved unprecedented power over the telco switching stations, and that they were in active conspiracy to obtain more power yet. Investigators were privately convinced that the Legion of Doom intended to do awful things with this knowledge, but mere evil intent was not enough to put them in jail.
And although the Atlanta ThreeâProphet, Leftist, and especially Urvileâhad taught Fry Guy plenty, they were not themselves credit-card fraudsters. The only thing theyâd âstolenâ was long-distance serviceâand since theyâd done much of that through phone-switch manipulation, there was no easy way to judge how much theyâd âstolen,â or whether this practice was even âtheftâ of any easily recognizable kind.
Fry Guyâs theft of long-distance codes had cost the phone companies plenty. The theft of long-distance service may be a fairly theoretical âloss,â but it costs genuine money and genuine time to delete all those stolen codes, and to re-issue new codes to the innocent owners of those corrupted codes. The owners of the codes themselves are victimized, and lose time and money and peace of mind in the hassle. And then there were the credit-card victims to deal with, too, and Western Union. When it came to rip-off, Fry Guy was far more of a thief than LoD. It was only when it came to actual computer expertise that Fry Guy was small potatoes.
The Atlanta Legion thought most ârulesâ of cyberspace were for rodents and losers, but they DID have rules. THEY NEVER CRASHED ANYTHING, AND THEY NEVER TOOK MONEY. These were rough rules-of-thumb, and rather dubious principles when it comes to the ethical subtleties of cyberspace, but they enabled the Atlanta Three to operate with a relatively clear conscience (though never with peace of mind).
If you didnât hack for money, if you werenât robbing people of actual fundsâmoney in the bank, that isâthen nobody REALLY got hurt, in LoDâs opinion. âTheft of serviceâ was a bogus issue, and âintellectual propertyâ was a bad joke. But LoD had only elitist contempt for rip-off artists, âleechers,â thieves. They considered themselves clean. In their opinion, if you didnât smash-up or crash any systemsâ(well, not on purpose, anyhowâaccidents can happen, just ask Robert Morris) then it was very unfair to call you a âvandalâ or a âcracker.â When you were hanging out on-line with your âpalsâ in telco security, you could face them down from the higher plane of hacker morality. And you could mock the police from the supercilious heights of your hackerâs quest for pure knowledge.
But from the point of view of law enforcement and telco security, however, Fry Guy was not really dangerous. The Atlanta Three WERE dangerous. It wasnât the crimes they were committing, but the DANGER, the potential hazard, the sheer TECHNICAL POWER LoD had accumulated, that had made the situation untenable.
Fry Guy was not LoD. Heâd never laid eyes on anyone in
Comments (0)