💾 Archived View for aphrack.org › issues › phrack35 › 5.gmi captured on 2021-12-04 at 18:04:22. Gemini links have been rewritten to link to archived content
⬅️ Previous capture (2021-12-03)
-=-=-=-=-=-=-
== Phrack Inc. == Volume Three, Issue Thirty-five, File 5 of 13 ______________________________________________________________ || || || Don't let THIS happen to you! || || || || __________ || || Heh | |/No life, no future... || || /Heh! | 0 H S L Q I F X || || O | --|-- || || --|-- | / \ || || / \ | / \ || || / \____|____ E N _ R _ P M E N _ || || Dale ^ || || Drew | || || Will this be YOU?! || ||______________________________________________________________|| The following is a reprint of the article "Sting Operations" from the book _Dedicated Computer Crime Units_ (pages 101-103) written by J. Thomas McEwen for the U.S. Department of Justice and published in June 1989. If you would like to get your own FREE copy of this book, or its companion books: - Organizing for Computer Crime Investigation and Prosecution - Electronic Fund Transfer and Crime - Electronic Fund Transfer Fraud you can contact: U.S. Department of Justice Office of Justice Programs National Institute of Justice Washington, D.C. 20531 (301)251-5500 (800)851-3420 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - S T I N G O P E R A T I O N S ~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~ Will *YOU* Be The Next Victim?! Transcribed by Sovereign Immunity ELECTRONIC BULLETIN BOARDS An electronic bulletin board allows for the storage of information which can be retrieved by other systems calling into the board. It is essentially a database maintained by a system that is accessible by others over telephone lines. Most bulletin boards have been created for specific purposes, usually for the exchange of messages and information among parties with common interests. For example, members of computer clubs maintain bulletin boards for communicating with each other between meetings. Bulletin boards are especially popular among microcomputer users. Establishment of a bulletin board is facilitated by programs that can be purchased or obtained from public domain software. With one of these programs, a user can establish tailored menus for anyone dialing into the board. These menus will usually contain options on information about the board, bulletins, news summaries, personal mail, conferences, and leaving messages. In addition, most bulletin boards have different levels of access to restrict users from certain parts of the board. The bulletin board owner, usually called the System Operator (SYSOP), personally establishes the authorized access levels for each user and enters this information into the system. Access is determined by having a user provide their name and password when signing on to the system. A telephone line into the system is the only other requirement for establishing a board on a microcomputer. Access to bulletin boards generally operates along the following lines: - A user dials into the bulletin board. - The board responds with a message asking for the person's name and password. - The board then provides a menu showing the options available to the user. - The user selects an option and starts interacting with the system. - During a session, a user typically may read messages, leave messages, download files, upload files, or join a conference. - The user eventually "quits" the session and hangs up from the board. While most bulletin boards have been established for legitimate purposes, there are also "pirate" or "elite" boards that contain illegal information or have been established to advance an illegal activity. Security on those boards is tightly controlled by the owners. With these bulletin boards, users usually have to contact the owner directly to obtain a password for access to different levels of the system. A degree of trust must therefore be established before the owner will allow access to the board, and the owners develop "power" over who can use the system. Pirate boards have been found with a variety of illegal information on them including the following: - Stolen credit card account numbers - Long distance telephone service codes - Telephone numbers to mainframe computers, including passwords and account numbers - Procedures for making illegal drugs - Procedures for making car bombs - Hacking programs - Tips on how to break into computer systems - Schematics for electronic boxes (e.g., black box) These boards obviously are a threat to communities, and their existence has gained the attention of some police departments. STING OPERATIONS WITH BULLETIN BOARDS The experiences of the Maricopa County, Arizona, Sheriff's Department and the Fremont, California, Police Department are very instructive on how local departments can establish their own bulletin boards and become part of the network with other boards. Members of the Maricopa County Sheriff's Department were the first in the country to establish such a board. Their board resulted in over 50 arrests with the usual charge being telecommunications fraud. In September, 1985, the Fremont Police Department established a bulletin board for the primary purpose of gathering intelligence on hackers and phreakers in the area. The operation was partially funded by VISA, Inc. with additional support from Wells Fargo Bank, Western Union, Sprint, MCI, and ITT. After establishing their bulletin board, they advertised it on other boards as the newest "phreak board" in the area. Within the first four days, over 300 calls were received on the board. During the next three months, the board logged over 2,500 calls from 130 regular users. Through the bulletin board, they persuaded these groups that they had stolen or hacked long-distance telephone service codes and credit account numbers. They were readily accepted and were allowed access to pirate boards in the area. The board was operated for a total of three months. During that period, over 300 stolen credit card numbers and long-distance telephone service codes were recovered. Passwords to many government, educational, and corporate computers were also discovered on other boards. The operation resulted in the apprehension of eight teenagers in the area who were charged with trafficking in stolen credit card accounts, trafficking in stolen long-distance telephone service codes, and possession of stolen property. Within the next week, seven more teenagers in California and other states were arrested on information from this operation. It was established that this group had been illegally accessing between ten and fifteen businesses and institutions in California. They were regularly bypassing the security of these systems with stolen phone numbers and access codes. One victim company estimated that it intended to spend $10,000 to improve its security and data integrity procedures. Other victimized businesses were proceeding along the same lines. CONCLUSIONS There are several reasons for conducting Sting operations of this type. One of the most important is that it provides a proactive method of identifying hackers and phreakers in the area. These groups are particularly hard to find since they operate in closed circles with personal networks developed from friendships. Another byproduct of these operations is the publicity surrounding the cases. Sting operations result in considerable amount of attention from the media. The publicity has the effect of closing down other pirate boards in the area. One of the greatest fears of these offenders in that their systems will be taken, and in the Fremont operation over $12,000 of computer equipment was seized. The publicity associated with these seizures seems to be the primary reason for others to stop their pirate boards. These operations also lead to other types of offenses. In Fremont, for example, drug and alcohol cases were developed as a result of the Sting operation. This has been typical of these operations. The Sting operations with bulletin boards have been criticized because teenagers, rather than hardened criminals, are arrested. Many hackers believe that they have a right to the data in other systems and that their activities are not illegal since the companies can afford the losses. On the other hand, as one investigator observed, the hackers of today may be the sophisticated computer criminals of tomorrow. It is therefore important to set a lesson early in their careers steering them away from these offenses. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - RESPONSE FROM A MEMBER OF THE HACKER COMMUNITY: Now lets take a look at this article and the ignorant author J. Thomas McEwen. "Pirate boards have been found with a variety of illegal information on them..." The author names: "Telephone numbers to mainframe computers" -- There is nothing illegal in having the telephone number to a mainframe computer. It is illegal to access a computer without authorization. "Procedures for making illegal drugs" -- It is NOT illegal to know how to manufacture illegal drugs, only to actually manufacture or use them. "Procedures for making car bombs" -- It is NOT illegal to know how to manufacture car bombs, only to actually manufacture or use them. "Hacking programs" -- Indeed most security companies, private security consultants, or mainframe owners and operators use these to test their systems very often. It would only be illegal to use one on a machine that you are not authorized to use it on. "Tips on how to break into computer systems" -- Again, it is NOT illegal to know how to break into a computer... although for a change, according to a section of the Computer Fraud & Abuse Act of 1986 (Federal Law), it would be illegal to traffic in passwords, codes, and theoretically any instructions that would be the equivalent of passwords or codes for the unauthorized entry into computer systems. "Schematics for electronic boxes (e.g., black box)" -- This is getting boring. It is NOT illegal to know how to build these devices, only the actual construction or use of them is illegal. "These boards obviously are a threat to communities, and their existence has gained the attention of some police departments." How are they obviously a threat? The author would like us to believe that if the information on how to make telephone devices, explosives, or narcotics is available on bulletin boards, this is enough to make them a threat to communities. What he ignores is that the same information can be found in public and university libraries, text books, and technical journals; He ignores that the mere possession of information on how a crime MIGHT be committed is NOT a crime; and finally, He fails to recognize any First Amendment rights whatsoever of computer bulletin boards to have all such information to begin with. "It is therefore important to set a lesson early in the careers steering them away from these offenses." Of course an arrest for some minor computer mischief is not going to be great resume material when these teenagers start applying for jobs, even though the establishment has inspired within them the socially acceptable goal of conforming to society's expectations. CONCLUSIONS The author, J. Thomas McEwen, does not know much about freedom of speech and for that matter, he does not know much about the law. He does know a lot about how to sensationalize very benign conduct into dangerous conspiracy. Perhaps he is close friends with Geraldo Rivera. Bulletin board operators and users take note of the law and your rights. Don't let yourself get taken in by Sting boards or ignorant law enforcement officers looking for some gratification on the job since they aren't getting it at home. S o v e r e i g n I m m u n i t y - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Editor's Comments by: Dispater Sting boards have been a popular topic in Phrack and Phrack World News over the years. In this file, Sovereign Immunity, showed us an excerpt that discussed a Sting bulletin board in Fremont, California. As it turns out, Knight Lightning had some material about this way back in Phrack World News Issue 3 (which actually appeared in Phrack Issue 4). The article was titled "Phoenix Phortress Stings 7." There have also been many other articles in Phrack World News about sting operations and bulletin boards. Additionally, Phrack Issues 21-23 each carried one part of Knight Lightning's "Vicious Circle" Trilogy. The first two parts of which ("Shadows Of A Future Past" and "The Judas Contract") contained a lot of material about sting boards and informants. Although Phrack has not presented material concerning Sting boards in Maricopa County, Arizona, there was discussion about a bulletin board (The Dark Side) in Arizona (602) run by "The Dictator" (Dale Drew) as a sting operation revealed in Computer Underground Digest 3.02 and recently we heard that he was back in action under the name "Blind Faith." Dispater _____________________________________________________________________________?_