💾 Archived View for spam.works › mirrors › textfiles › hacking › mob.txt captured on 2023-11-14 at 09:55:42.
View Raw
More Information
⬅️ Previous capture (2023-06-14)
-=-=-=-=-=-=-
The THC Hack/Phreak Archives: MOB.TXT (176 lines)
Note: I did not write any of these textfiles. They are being posted from
the archive as a public service only - any copyrights belong to the
authors. See the footer for important information.
==========================================================================
<-> Hackers in the MOB <->
- ****************************************************************
According to Schmidt, the dollar amounts are only part of
the story, GTE Telemail, an electronic mail system, was broken
into by at least four gangs of hackers, he says. "They were
raising hell. The system got shut down one time for a day. None
of these people have been charged, nor have any of the 414s been
charged yet.
"We have a major problem with hackers, phreaks and thieves,"
says Schmidt, who estimates that 75% of criminal hackers are
teenagers and the other 25% are adults using teenagers to do
their dirty work for them.
"Adults are masterminding some of this activity. There are
industrial spies, people playing the stock market with the
information- just about any theft or fraud you can do with a
computer. There are no foreign agents or organized crime yet,
but it's inevitable," he says. "I believe there are some people
out there now with possible organized-crime connections.
"It's an epidemic. In practically every upper-middle class
high school this is going on. I know of a high-school computer
class in a school in the north Dallas suburbs where the kids are
trying everything they can think of to get into the CIA
computers."
"It's a strange culture," says SRI's Parker, "a rite of
passage among technology-oriented youth. The inner circle of
hackers say they do it primarily for educational purposes and for
curiosity. They want to find out what all those computers are
being used for. There's a meritocracy in the culture, each one
trying to out do the other. The one who provides the most phone
numbers and passwords to computer systems rises to the top of the
hackers.
"For the most part it's malicious mischief," Parker says.
"They rationalize that they're not really breaking any laws, just
'visiting' computers. But that's hard to believe when they also
say they've got to do their hacking before they turn 18 so they
don't come under adult jurisdiction. After 18, they have to do
it vicariously through surrogates. They are some grand old men
of hacking who egg on the younger ones... There have been some
cases of a Fagin complex- a gang of kids led by one or more
adults- in Los Angeles."
Who are the hackers and what secret knowledge do they have?
A 17-year-old youth in Beverly Hills, California, announced
himself to other hackers on a bulletin board in this way:
"Interests include exotic weapons, chemicals, nerve gases,
proprietary information from Pacific Telephone..."
Prized secret knowledge includes the two area codes in North
America that have not yet installed electronic switching system
central-office equipment. Using this information you can call
those areas and use a blue box to blow the central office
equipment, and then call anywhere in the world without charge.
Other secret information lets you avoid being traced when you do
this.
A knowledge of the phone systems lets hackers share one of
the technological privileges usually available only to large
corporate customers: long-distance conference calls connecting up
to 59 hackers. Schmidt estimates there are three or four
conference calls made every night. The hackers swap more inside
information during the phone calls.
Thanks to packet-switching networks and the fact that they
don't have to pay long-distance charfus, time and distance mean
almost nothing to hackers. Desktop microcompters hook into phone
lines via modems make it easy to obtain copyrighted software
without human intervention.
"Software piracy exists only because they can do it over the
phone long distance without paying for it," Schmidt says. "some
stuff gets sent through the mail, but very little. There are
bulletin boards that exist solely for the purpose of pirating
software. A program called ASCII Express Professional (AE Pro)
for the Apple was designed specifically for modem-to-modem
transfers. You can make a copy of anything on that computer. It
can be copyrighted stuff- WordStar, anything. There are probably
about three dozen boards like that. Some boards exchange
information on breaking onto mainframes.
"In 1982 the FBI really didn't know what to do with all this
information," Schmidt says. "There isn't a national computer-
crime statue. And unless there's $20,000 involved, federal
prosecutors won't touch it."
Since then, the public and federal prosecutors' interest has
picked up. The film War Games and the arrest of 414 group in
Milwaukee "created a lot of interest on Congress and with other
people," FBI instructor Lewis says. "But, for ourselves it didn't
really have any impact."
"We'd been providing the training already," says Jim Barko,
FBI unit chief of the EFCTU (economic and financial crimes
training unit). He says public interest may make it easier to
fight computer crime. "There are more people interested in this
particular area now as a problem. War Games identified the
problem. But I think it was just circumstantial that the movie
came out when it did."
Despite the help of knowledgeable informants like Schmidt,
tracking down hackers can be frustrating business for the FBI.
SRI's Parker explains some of the pitfalls of going after
hackers: "Some FBI agents are very discouraged about doing
something about the hacking thing. The cost of investigation
relative to the seriousness of each case is just too high," he
says. "Also, federal regulations from the Department of Justice
make it almost impossible for the FBI to deal with a juvenile."
An FBI agent cannot question a juvenile without his parents
or a guardian being present. The FBI approach has been mostly
to support lhe local police because local police are the only
ones who can deal with juveniles. Another difficulty the agency
faces is the regulations about its jurisdiction.
"There has to be an attack on a government agency, a
government contractor or a government-insured institution for the
FBI to have clear-cut jurisdiction," Parker says.
The FBI gets called into a case only after a crime has been
detected by the complaining party. The FBI has done a generally
competent job of investigating those crimes it was called in to
investigate, in Parker's view. But the federal agency's job is
not to help government or financial institutions attempt to
prevent crimes, nor is its function to detect the crimes in the
first place.
"We're not out detecting any type of crime," says Lewis.
"We like to think we can prevent them. We can make
recommendations. But do we detect bank robberies or are they
reported to us? Or kidnapping- do we detect those? Or
skyjacking? There must be some evidence of crime, a crime over
which the FBI has jurisdiction. Then we open a case." And
despite the spate of arrests and crackdowns last summer, it looks
like the FBI will have its hands full in the future: The hackers
have not gone away. Like mice running through the utility
passages of a large office building, they create damage and
inconvenience, but are tolerated as long as their nuisance
remains bearable.
That status could change at any time, however.
Meanwhile, little electronic "sting" operations similar to
Abscam keep the element of danger on the hacker's game. An Air
Force telephone network called AUTOVON (a private telephone
system connecting computers on every Air Force installation in
the world), was reportedly cracked by a hacker last last year.
The hacker published lists of AUTOVON dialups on a bulletin
board.
The breach came to the attention `oo the Department of
Defense on late 1983, but apparently nothing was done to stop the
hackers. Then, in January, the AUTOVON number was answered in a
sultry female voice. We wish to thank one and all for allowing
us to make a record of all calls for the past few months. You
will be hearing from us real soon. Have a happy New Year."
That's a New Year's message calculated to give any hacker a
chill.
-End of file-
.
DOWNLOADED FROM P-80 SYSTEMS.......