💾 Archived View for spam.works › mirrors › textfiles › hacking › mob.txt captured on 2023-06-14 at 16:54:08.

View Raw

More Information

-=-=-=-=-=-=-

The THC Hack/Phreak Archives: MOB.TXT (176 lines)
Note: I did not write any of these textfiles.  They are being posted from
the archive as a public service only - any copyrights belong to the
authors.  See the footer for important information.
==========================================================================


 <-> Hackers in the MOB <->



     According  to Schmidt,  the dollar amounts are only part  of 
the story,  GTE Telemail,  an electronic mail system,  was broken 
into  by  at least four gangs of hackers,  he says.   "They  were 
raising hell.  The system got shut down one time for a day.  None 
of these people have been charged,  nor have any of the 414s been 
charged yet.

     "We have a major problem with hackers, phreaks and thieves," 
says  Schmidt,  who  estimates that 75% of criminal  hackers  are 
teenagers  and  the other 25% are adults using  teenagers  to  do 
their dirty work for them.

     "Adults are masterminding some of this activity.   There are 
industrial  spies,  people  playing  the stock  market  with  the 
information- just  about  any  theft or fraud you can do  with  a 
computer.   There  are no foreign agents or organized crime  yet, 
but it's inevitable," he says.   "I believe there are some people 
out there now with possible organized-crime connections.

     "It's an epidemic.   In practically every upper-middle class 
high school this is going on.   I know of a high-school  computer 
class  in a school in the north Dallas suburbs where the kids are 
trying  everything  they  can  think  of  to  get  into  the  CIA 
computers."

     "It's  a  strange culture," says SRI's Parker,  "a  rite  of 
passage  among technology-oriented youth.   The inner  circle  of 
hackers say they do it primarily for educational purposes and for 
curiosity.   They  want to find out what all those computers  are 
being used for.   There's a meritocracy in the culture,  each one 
trying to out do the other.   The one who provides the most phone 
numbers and passwords to computer systems rises to the top of the 
hackers.

      "For  the most part it's malicious mischief,"  Parker says.  
"They rationalize that they're not really breaking any laws, just 
'visiting' computers.   But that's hard to believe when they also 
say  they've got to do their hacking before they turn 18 so  they 
don't come under adult jurisdiction.   After 18,  they have to do 
it vicariously through surrogates.   They are some grand old  men 
of  hacking who egg on the younger ones...  There have been  some 
cases  of  a  Fagin complex- a gang of kids led by  one  or  more 
adults- in Los Angeles."

      Who are the hackers and what secret knowledge do they have?

     A 17-year-old youth in Beverly Hills,  California, announced 
himself  to  other  hackers  on a bulletin  board  in  this  way: 
"Interests  include  exotic  weapons,   chemicals,  nerve  gases, 
proprietary information from Pacific Telephone..."

     Prized secret knowledge includes the two area codes in North 
America  that have not yet installed electronic switching  system 
central-office  equipment.   Using this information you can  call 
those  areas  and  use  a blue box to  blow  the  central  office 
equipment,  and  then call anywhere in the world without  charge.  
Other  secret information lets you avoid being traced when you do 
this.

     A  knowledge of the phone systems lets hackers share one  of 
the  technological  privileges usually available  only  to  large 
corporate customers: long-distance conference calls connecting up 
to  59  hackers.   Schmidt  estimates  there are  three  or  four 
conference calls made every night.   The hackers swap more inside 
information during the phone calls.

     Thanks  to packet-switching networks and the fact that  they 
don't have to pay long-distance charfus,  time and distance  mean 
almost nothing to hackers.  Desktop microcompters hook into phone 
lines  via  modems  make it easy to obtain  copyrighted  software 
without human intervention.

     "Software piracy exists only because they can do it over the 
phone long distance without paying for it," Schmidt says.   "some 
stuff  gets sent through the mail,  but very little.   There  are 
bulletin  boards  that exist solely for the purpose  of  pirating 
software.   A program called ASCII Express Professional (AE  Pro) 
for  the  Apple  was  designed  specifically  for  modem-to-modem 
transfers.  You can make a copy of anything on that computer.  It 
can be copyrighted stuff- WordStar, anything.  There are probably 
about  three  dozen  boards  like  that.   Some  boards  exchange 
information on breaking onto mainframes.

     "In 1982 the FBI really didn't know what to do with all this 
information,"  Schmidt says.   "There isn't a national  computer-
crime  statue.   And  unless there's  $20,000  involved,  federal 
prosecutors won't touch it."

     Since then, the public and federal prosecutors' interest has 
picked  up.   The  film War Games and the arrest of 414 group  in 
Milwaukee  "created a lot of interest on Congress and with  other 
people," FBI instructor Lewis says. "But, for ourselves it didn't 
really have any impact."

     "We'd been providing the training already," says Jim  Barko, 
FBI  unit  chief  of  the EFCTU (economic  and  financial  crimes 
training  unit).   He says public interest may make it easier  to 
fight computer crime.   "There are more people interested in this 
particular  area  now as a problem.   War  Games  identified  the 
problem.   But  I think it was just circumstantial that the movie 
came out when it did."

     Despite  the help of knowledgeable informants like  Schmidt, 
tracking  down hackers can be frustrating business for  the  FBI.  
SRI's  Parker  explains  some  of the  pitfalls  of  going  after 
hackers:  "Some  FBI  agents  are very  discouraged  about  doing 
something  about  the hacking thing.   The cost of  investigation 
relative  to the seriousness of each case is just too  high,"  he 
says.   "Also, federal regulations from the Department of Justice 
make it almost impossible for the FBI to deal with a juvenile."

     An FBI agent cannot question a  juvenile without his parents 
or a  guardian being present.   The FBI  approach has been mostly 
to  support  lhe local police because local police are  the  only 
ones who can deal with juveniles.   Another difficulty the agency 
faces is the regulations about its jurisdiction.

     "There  has  to  be  an attack on  a  government  agency,  a 
government contractor or a government-insured institution for the 
FBI to have clear-cut jurisdiction," Parker says.

     The FBI gets called into a case only after a crime has  been 
detected by the complaining party.   The FBI has done a generally 
competent  job of investigating those crimes it was called in  to 
investigate,  in Parker's view.   But the federal agency's job is 
not  to  help  government or financial  institutions  attempt  to 
prevent  crimes,  nor is its function to detect the crimes in the 
first place.

     "We're  not  out detecting any type of crime,"  says  Lewis.  
"We   like  to  think  we  can  prevent  them.    We   can   make 
recommendations.  But  do  we detect bank robberies or  are  they 
reported  to  us?    Or  kidnapping- do  we  detect  those?    Or 
skyjacking?   There must be some evidence of crime,  a crime over 
which  the  FBI  has jurisdiction.   Then we open a  case."   And 
despite the spate of arrests and crackdowns last summer, it looks 
like the FBI will have its hands full in the future:  The hackers 
have  not  gone  away.   Like mice running  through  the  utility 
passages  of  a large office building,  they  create  damage  and 
inconvenience,  but  are  tolerated  as long  as  their  nuisance 
remains bearable.

     That status could change at any time, however.

     Meanwhile,  little  electronic "sting" operations similar to 
Abscam keep the element of danger on the hacker's game.   An  Air 
Force  telephone  network  called AUTOVON  (a  private  telephone 
system  connecting  computers on every Air Force installation  in 
the  world),  was reportedly cracked by a hacker last last  year.  
The  hacker  published  lists of AUTOVON dialups  on  a  bulletin 
board.

     The  breach  came  to the attention `oo  the  Department  of 
Defense on late 1983, but apparently nothing was done to stop the 
hackers.   Then, in January, the AUTOVON number was answered in a 
sultry  female voice.   We wish to thank one and all for allowing 
us  to make a record of all calls for the past few  months.   You 
will be hearing from us real soon.  Have a happy New Year."

     That's a New Year's message calculated to give any hacker  a 
chill.

-End of file-

.



DOWNLOADED FROM P-80 SYSTEMS.......