💾 Archived View for aphrack.org › issues › phrack35 › 3.gmi captured on 2021-12-03 at 14:04:38. Gemini links have been rewritten to link to archived content
-=-=-=-=-=-=-
==Phrack Inc.== Volume Three, Issue Thirty-five, File 3 of 13 -*[ P H R A C K XXXV P R O P H I L E ]*- -=>[ Presents ]<=- Sincerely Yours, Chris Goggans -===--===--===--===--===--===- by S. Leonard Spitz Associate Publisher INFOSecurity Product News "A provocative interview with a former member of the "Legion of Doom" suggests that the ethics of hacking (or cracking) are often in the eye of the beholder." Malicious hackers, even though most operate undercover, are often notorious for the colorful pseudonyms they travel under. Reformed hackers, however, prefer a low profile so as to shed their image of perceived criminality. Kevin Mitnick, infamous for the DEC caper, is one of the foremost advocates of this strategy. Now comes Chris Goggans, trailing his former "Legion of Doom" moniker, Erik Bloodaxe, behind him, to try it his way. Goggans insists that where once he may have bent the rules, he is now ready to give something back to society. And coming across with a high degree of sincerity, he affirms his intention to try. Are he and his colleagues, wearing their newly acquired information security consultants hats, tilting at windmills, or does their embryonic, cracker-breaking start-up, Comsec Data Security Co., stand a fighting chance? We thought we would ask him. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - ISPNews: I am going to ask several legitimate questions. Please answer them completely, truthfully, and honestly. Chris Goggans: OK. JUDGEMENT BY THE MEDIA ISPNews: Would you react to Computerworld's July 29 piece, "Group Dupes Security Experts," <also seen in Phrack World News issue 33, part 2 as part of the article called "Legion of Doom Goes Corporate> in which members of your organization were accused of masquerading as potential customers to obtain information, proposals, and prices from other security consultants? CG: We were all amazed that something like that would ever be printed because, as we understand common business practices, we weren't doing anything unusual. ISPNews: Computerworld reported that the Legion of Doom was "one of the nation's most notorious hacker groups, according to federal law enforcers." Can you respond to that? CG: Notorious is a relative term. There has always been a shroud of mystery covering the Legion of Doom, because it was an organization whose membership was private. When you keep people in the dark about the activities of something, there is always going to be the perception that more is going on than there really is. ISPNews: Would you say then that the characterization of being notorious is unfair? CG: To some degree, yes. There certainly was activity going on within the group that could be considered illegal. But most of this was taking place when members of the group were all between the ages of 14 and 17. While I don't want to blame immaturity, that's certainly a factor to be considered. The Legion of Doom put out four <issues of an> on-line electronic newsletter <called the Legion of Doom Technical Journals> composed of different files relating to various types of computer systems or netware. They explained different operating systems or outlined different procedures used by networks. They were always informative and explained how to use a computer. We never said "This is a computer and this is how to break into it." Colorful names and words used to describe groups also add to notoriety. If we had been the "Legion of Flower Pickers," the "Legion of Good Guys," or the "SuperFriends," there probably wouldn't be this dark cloud hanging over the group. ISPNews: Could you be charged with intent to provide information to others which would make it easier to gain unauthorized access? CG: I don't see how that could be a charge. There's the first amendment. I maintain that talking about something and encouraging or forcing someone to do it are completely different. EARNING AN "A" IN INFOSECURITY ISPNews: What attracted you to computer security? CG: The same thing that would attract anybody to being a hacker. For half of my life I've been in front of a computer every day. Sometimes from early in the morning until the wee hours of the night. And my particular focus has been on computer security. ISPNews: At least the dark side of that coin. CG: I wouldn't say the dark side. I'd say the flip side. If you do something for 11 years, you are going to pick up a lot of knowledge. And I've always wanted to find some kind of productive career that I thoroughly enjoyed. So this was just an obvious progression. No one wants to be a 40-year-old hacker living in fear of the Secret Service. ISPNews: When you first applied to enter college, did you feel that it was the right place to learn about information security? CG: Yes, I thought it was the right place, mainly because college is the most obvious choice to pursue an education in any field. I just assumed that I would be able to find formal training leading to certification or a degree in this field. Yet, at the University of Texas, there wasn't anything along those lines. ISPNews: Did you graduate from the University of Texas? CG: No, I changed majors and then moved to Houston. I had started out in computer science but it was completely unrelated to any kind of career I wanted to pursue. I eventually changed my major to journalism. There are only two things I like to do: Work on computers, and write. So, if I wasn't going to get a degree in one, it was going to be in the other. I'm a semester away, and I do plan on finishing. ISPNews: If you were to structure a college curriculum for studies in information security, would you design it to focus on technical issues, ethics, business issues, or legal matters? CG: I would try to focus on all of these. If you don't have a technical background, you can't understand the way the operating system works, and you really can't focus on some of the issues that need to be addressed with information security. Ethics certainly come into play ass well for obvious reasons. I don't think hackers are going to go away. Even with the advent of newer technology, there are always going to be people who have an interest in that technology and will learn how to manipulate it. ETHICS, INTELLECTUAL PROPERTY RIGHTS, AND THE LAW ISPNews: What is your definition of a hacker? CG: A Hacker is someone who wants to find out everything that there is to know about the workings of a particular computer system, and will exhaust every means within his ability to do so. ISPNews: Would you also comment on the ethics of hacking? CG: There is an unwritten code of ethics that most people tend to adhere to. It holds that: no one would ever cause damage to anything; and no one would use any information found for personal gain of any kind. For the most part, the only personal gain that I have ever seen from any sort of hacking activity is the moderate fame from letting others know about a particular deed. And even in these cases, the total audience has been limited to just a few hundred. ISPNews: Are you unaware of hackers who have in fact accessed information, then sold it or massaged it for money? CG: No, certainly not. I am just acknowledging and defining a code of ethics. We of the Legion of Doom tried to adhere to that code of ethics. For example, members of the original nine who acted unethically were removed from the group. ISPNews: Do you believe that penetrating a computer system without either making changes or removing information is ethical, or a least is not unethical? CG: At one time in the past I may have held that belief, but now I certainly must not, because the whole idea of being involved in the formation of my new company, Comsec Data Security, would show otherwise. ISPNews: So today, you believe that unauthorized entry is unethical. CG: Exactly. As a hacker, I didn't particularly hold that. But as things such as invasion of privacy, even though I never caused any damage, and breach of trust became more apparent to me, I was able to step back, see the picture, and realize it was wrong. ISPNews: Can I conclude that you are speaking for you company and its principals? CG: Yes, I am speaking for all of the principals. ISPNews: What are your views on the ownership of information? CG: I feel that proprietary information, national-security-related information, information that could be considered a trade secret, all definitely have ownership, and access should be restricted. In the past, I felt that information that affected me or had some relevance to my life should be available to me. I felt that information should be available to the people it affected, whether that be phone company information, credit bureau information, banking information, or computer system information in general. I am saying this in the past tense. In the present tense, I feel that the public is entitled only to information in the public domain. Information not available legally through normal channels is just going to have to be left at that. ISPNews: Do you believe that software should always be in the public domain.? CG: No, I do not. If I wrote something as wonderful as Lotus, or any of the Microsoft programs, or Windows, I would want people to pay for them. ISPNews: Then you do believe in private ownership of and protection for software? CG: Yes, definitely. ISPNews: What are you views on current U.S. Computer crime laws? CG: I think that the current laws are too broad. They do not make distinctions between various types of computer crimes. I consider breaking into a computer akin to trespassing. If someone simply walks across my lawn, I might be upset because they trampled my grass, but I would leave it at that. If someone drives across my lawn and leaves big trenches, and then comes over and kicks down my rosebush, well that's another thing. Then, if someone drives up my steps, goes through my house, through my kitchen, steals all my silverware, and then leaves, that's something completely different. And while these physical representations of trespassing can't be applied directly to an electronic format, distinctions are still necessary. ISPNews: And the present computer crime laws do not make these distinctions? CG: I am no lawyer, but from my understanding they do not. They need to be brought into focus. ISPNews: If they were brought into the kind of focus you suggest, would they be fair and equitable? CG: Definitely, depending on the punishment that went along with them. I don't think that people who own and operate computer systems would view someone who has logged into their system using a guest account that was deliberately left with no password to be as serious an intrusion as someone who got the system administrator password and then went through and deleted all the files. I don't think that simple intrusion would be considered as serious as unauthorized penetration along with the wholesale theft and sale to a competitor of marketing information, and advertising plans, and financial projections for the next quarter. ISPNews: What are your views on security training for users? CG: People need to be taught what the computer operating system is and how it works. After that, they need to establish some sort of channel by which information can be transmitted to others. Direct physical contact between communicating parties, covered by official, standard company procedures, is the best way to do this. People need to be aware that their account, no matter the level of importance, is a link in a chain that makes up the security of the system. Information from one account can be used as a springboard to other, more powerful accounts. All users within a network must understand that their information is just as important in the security chain as is that of the next person. ISPNews: Given where you are coming from, why should a potential client trust you? CG: I know that is a natural question. Just the very nature of creating a company should project an image that we are trying to come out of the shadows, out of the underground. We are saying, "Look everybody, we've been doing this for a long time, now we want to help. We have 11 years of working information about how people compromise existing security, and we can help with your particular situation." ISPNews: I am sure that you understand the natural suspicion that people have. CG: No, that's what I don't understand. If we at Comsec were out to compromise information from an existing company's computer network, we wouldn't have incorporated. We could have done that, and someone else out there probably has already done so. Then the information would be available to from one hacker to another. ISPNews: Are you suggesting there is no system out there that you can't break into? CG: No, I'm not suggesting that. But I am saying the vast majority can be penetrated. ISPNews: Which system is easiest to crack; and which is most difficult? CG: It is hard to say which system is more inherently penetrable than another. From the initial log-in, it's not the operating system; rather it's the system's operating environment that is the problem. Users may not have addressed security measures. Certain types of security holes may not have been closed. That's where a technical background comes into play: to understand the way the applications work; how different systems are accessed; to close holes in the system which have become apparent. You have to deal with human factors and technical issues. You must understand the way the computer works and the way programs are run. ISPNews: What is the best way to foil hackers? CG: It depends on the hacker. There are different types. Some people hack with modems. The casual hacker may just stumble across your particular computer system, and may be foiled with something as simple as good external security. He may be turned off by physical security devices such as a call-back modem, some sort of code access, or smart card. These measures will not stop a serious hacker who is after your company specifically. In this case, you have to beef up security, and take additional steps to ensure the safety of your computer. And you must make certain that security on the inside is as tight as on the outside. ISPN Editor's Note: Chris Goggans will respond, in every other issue of ISPNews, to your questions on hacking computer systems. His answers promise to be problem-solving, interesting, and even entertaining. We invite you to write Chris c/o: "Hackers' Mailbag" ISPNews 498 Concord Street Framingham, MA 01701-2357 _______________________________________________________________________________