💾 Archived View for aphrack.org › issues › phrack31 › 9.gmi captured on 2021-12-04 at 18:04:22. Gemini links have been rewritten to link to archived content
⬅️ Previous capture (2021-12-03)
-=-=-=-=-=-=-
==Phrack Inc.== Volume Three, Issue Thirty-one, Phile #9 of 10 PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN Phrack World News PWN PWN Issue XXXI, Part Two PWN PWN Compiled by Phreak_Accident PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN {C}omputer {E}mergency {R}esponse {T}eam ---------------------------------------- Some call it "Internet Police" -- Others call it "just stupid." CERT however is a mix. But I do give them credit -- After all, have your number one goal being 'making the Internet more secure' has to be a tough task. Therefore, we give them credit. However, CERT is funded by DARPA, which is a government agency. And anything in my book that the government runs is bad news. Yes, the government pays the 6 man salary and keep their hot-line active 24 hours a day. Ahh.. What do you know about CERT? "Nothing" you say? Well, the following is the press release and other reprints of information about CERT. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Richard Pethia <rdp@SEI.CMU.EDU> DEAR XXXXXXXXX, I have been reviewing our correspondence files and have discovered that your request for information may not have been filled. I apologize for the delay and hope that the information is still useful to you. If, after reading the following, you have additional questions or would like to subscribe to one of our information lists, please send email with your question/request. The Computer Emergency Response Team (CERT) was established by the Defense Advanced Research Projects Agency in November of 1988 to serve members of the Internet Research community. The press release below describes the general role of the CERT. More specifically, the CERT supports individual Internet sites by: -Working with site personnel to help resolve individual computer security incidents. Contact potentially affected sites to warn them of possible security breaches. Work with sites to change the conditions that allowed incidents to occur. -Issuing advisories that alert the community to specific system vulnerabilities or intrusion techniques, as well as the methods to protect against them. -Working with the community and system (primarily Unix) vendors to reslove specific system vulnerabilities. -Maintaining and operating moderated mailing lists that: (1) provide a discussion forum for tools and techniques to improve the security of Unix systems, and (2) provide a discussion forum and alert mechanism for PC viruses, trojan horses, etc. Over the past year we have developed hundreds of working relationships with members of the Internet and other communities and have established an extensive information collection and dissemination network. Because of this network of cooperating individuals and organizations, we are often able to advise the community of problems allowing them to take corrective action before being affeceted by those problems. --------------------- No. 597-88 (202) 695-0192 (Info.) (202) 697-3189 (Copies) IMMEDIATE RELEASE December 6, 1988 (202) 697-5737 (Public/Industry) DARPA ESTABLISHES COMPUTER EMERGENCY RESPONSE TEAM The Defense Advanced Research Projects Agency (DARPA) announced today that it has established a Computer Emergency Response Team (CERT) to address computer security concerns of research users of the Internet, which includes ARPANET. The Coordination Center for the CERT is located at the Software Engineering Institute (SEI), Carnegie Mellon University, Pittsburgh, PA. In providing direct service to the Internet community, the CERT will focus on the special needs of the research community and serve as a prototype for similar operations in other computer communities. The National Computer Security Center and the National Institute of Standards and Technology will have a leading role in coordinating the creation of these emergency response activities. The CERT is intended to respond to computer security threats such as the recent self-replicating computer program ("computer virus") that invaded many defense and research computers. The CERT will assist the research network communities in responding to emergency situations. It will have the capability to rapidly establish communications with experts working to solve the problems, with the affected computer users and with government authorities as appropriate. Specific responses will be taken in accordance with DARPA policies. It will also serve as a focal point for the research community for identification and repair of security vulnerabilities, informal assessment of existing systems in the research community, improvement to emergency response capability, and user security awareness. An important element of this function is the development of a network of key points of contact, including technical experts, site managers, government action officers, industry contacts, executive level decision-makers and investigative agencies, where appropriate. Because of the many network, computer, and systems architectures and their associated vulnerabilities, no single organization can be expected to maintain an in-house expertise to respond on its own to computer security threats, particularly those that arise in the research community. As with biological viruses, the solutions must come from an organized community response of experts. The role of the CERT Coordination Center at the SEI is to provide the supporting mechanisms and to coordinate the activities of experts in DARPA and associated communities. The SEI has close ties to the Department of Defense, to defense and commercial industry, and to the research community. These ties place the SEI in a unique position to provide coordination support to the software experts in research laboratories and in industry who will be responding in emergencies and to the communities of potentially affected users. The SEI is a federally-funded research and development center, operating under DARPA sponsorship with the Air Force Systems Command (Electronic Systems Division) serving as executive agent. Its goal is to accelerate the transition of software technology to defense systems. Computer security is primarily a software problem, and the presence of CERT at the SEI will enhance the technology transfer mission of the SEI in security-related areas. -END- QUESTIONS AND ANSWERS: DARPA ESTABLISHES CERT, 12/6/88 Q: Can you provide background on earlier break-ins? A: On November 2, 1988, thousands of computers connected to unclassified DoD computer networks were attacked by a virus. Although the virus did not damage or compromise data, it did have the effect of denying service to thousands of computer users. The computer science research community associated with the Defense Advanced Research Projects Agency (DARPA), along with many other research laboratories and military sites that use these networks, quickly responded to this threat. They developed mechanisms to eliminate the infection, to block the spread of the self-replicating program, and to immunize against further attack by similar viruses. Software experts from the University of California at Berkeley, with important contributions from the Massachusetts Institute of Technology and other network sites, rapidly analyzed the virus and developed immunization techniques. These same software experts also provided important assistance in the more recent Internet intrusion of 27-28 November. As the events unfolded, DARPA established an ad hoc operation center to help coordinate the activities of software experts working around the clock and to provide information to appropriate government officials. The operations center had three main tasks. It facilitated communications among the many groups affected, it ensured that government organizations were promptly informed of developments, and it provided initial technical analysis in DoD. Although the threat was contained quickly, a more maliciously designed virus could have done serious damage. The recent events serve as a warning that our necessarily increasing reliance on computers and networks, while providing important new capabilities, also creates new kinds of vulnerabilities. The Department of Defense considers this an important national issue that is of major concern in both the defense and commercial sectors. The DoD is developing a technology and policy response that will help reduce risk and provide an emergency reaction response. Q: Who will be on the CERT? A: The CERT will be a team of over 100 experts located throughout the U.S. whose expertise and knowledge will be called upon when needed. When not being called upon, they will continue their normal daily work. As noted in the release, these experts will include: technical experts, site managers, government action officers, industry contacts, executive-level decision-makers and representatives from investigative agencies. recommendations that will be acted upon by DoD authorities. Q: Is the CERT fully operational now? A: We are in the very early stages of gathering people for the CERT. We are first concentrating on collecting technical experts. A staff is in place at SEI, but details are still being worked out. Q: Will there just be one CERT? A: The intent is that each major computer community may decide to establish its own CERT. Each CERT will therefore serve only a particular community and have a particular technical expertise. (The DARPA/SEI CERT will serve, for example, the research community and have expertise in Berkeley-derived UNIX systems and other systems as appropriate.) The National Computer Security Center and the National Institute of Standards and Technology will support the establishment of the CERTs and coordinate among them. Q: What are the special needs of the research community that their CERT will serve? A: The special challenge of the research community is improving the level of computer security without inhibiting the innovation of computer technology. In addition, as is often DARPA's role, their CERT will serve as a prototype to explore the CERT concept so that other groups can learn and establish their own. Q: Does the CERT Coordination Center have a press point of contact? A: No. Their function is to serve as a nerve center for the user community. .end _______________________________________________________________________________ USA Today and the devil ----------------------- Many controversies have been made of the article printed in USA Today after Operation Sun-Devil took it's toll. Phrack inc. tried to contact the author, and with no luck she wasn't accepting phone calls. Please remember, this is only a USA Today article -- C'mon, get real USAT. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - byline 'Debbie Howlett, USA Today' reads: A network of computer hackers operating in 14 cities -- which bilked phone companies of $50 million -- has been unplugged, police say. "We're not talking about somebody who played Space Invaders too many times," says Tim Holtzen, spokesman for the U.S. attorney in Phoenix. The hackers -- the largest such ring discovered in the USA --broke into phone company and bank computer systems to obtain account numbers and run up an unknown total in debts, police say. "The main thing is the life-threatening information these computer hackers were trying to get into," says Richard Adams of the Secret Service. "It goes beyond being monetary to totally mischievous." The ring was uncovered 18 months ago, when members tried and failed to infiltrate computers at Barrows Neurological Institute in Phoenix. They later tried to block incoming calls to the 911 emergency service in Chicago. The motivation? "The primary reason is as kind of a malicious hobby." says Gary Chapman of Computer Professionals for Social Responsibility. "People are interested in testing their skills against security measures." But, Adams says, "I hate to minimize it by saying it was just for kicks." Police seized 40 computers and 23,000 disks during searches Tuesday in 14 cities, officials said Wednesday. Five men, between the ages of 19 and 24, have been arrested. What's been uncovered so far, says Holtzen, may be "just the tip of the iceberg." [END OF STORY] _______________________________________________________________________________