💾 Archived View for spam.works › mirrors › textfiles › hacking › stoll.doc captured on 2023-11-14 at 09:58:28.

View Raw

More Information

⬅️ Previous capture (2023-06-14)

-=-=-=-=-=-=-

I grabbed these philes of a CD-ROM disk, hope you enjoy, they are interresting.
BTW, Cliff's # is 1-617-495-7149.  Hehehe! L8r dudes,
                                                     Chamelion

Journal:   PC-Computing  Oct 1989  v2 n10 p114(9)

Title:     The Cuckoo's egg. (tracing a hacker) (part 2)
Author:    Stoll, Clifford.

Summary:   When Astronomer Clifford Stoll discovered a subtle breach into the
computer system at the Lawrence Berkeley Labs, Stoll knew he might be dealing
with something big. The hacker was apparently after information with national
security implications.  Stoll set out to find and trap the hacker.  Here, in
Part 2 of his story, Stoll follows the trail to West Germany, closing in on
the invader.

Full Text:

THE STORY SO FAR : Whoever had stolen into the computer system at
the Lawrence Berkeley Labs was after something big.  This hacker scanned for
military secrets, and Clifford Stoll knew he might well be a spy working for
a foreign power.  Astronomer Stoll set out to snare the invader. The trail
began with 75 cents' worth of computing time left unaccounted for.  Stoll
quickly discovered that the hacker was entering via the international
communications company Tymnet-he could be coming from anywhere in the world.
The hacker's dabblings in the LBL computer left other bread crumbs-his
mission was to find information about nuclear arms and SDI.  Stoll assembled
a posse to catch his hacker.  They trailed him as he breached the Milnet, a
network that links military computers.  The hacker tapped into CIA and
National Security Agency systems, and meandered through files at the Anniston
army base and the Navy Research Labs. Stoll and company tracked his progress
by tracing his connections and phone calls.  The mystery man entered Tymnet
over an ITT line, they found, one that came through a communications
satellite over the Atlantic-he was in Europe.  Probing deeper, they learned
that the hacker was using the German Datex network, and they solicited the
help of the Bundespost, the German national post office, to draw the net
tighter. PART II Curious whether other people might have a similar problem
with a hacker, I spent a few hours one early December day searching bulletin
boards on the Usenet network for news about hackers and found one note from
Toronto.  I called the author on the phone-I didn't trust electronic mail.
Bob Orr, the manager of the University of Toronto's physics computers, told a
familiar story.

"Some hackers from Germany have invaded our system, changing programs and
damaging our operating system."

"How'd they get in?" "We collaborate with the Swiss physics lab, CERN.  And a
group of German hackers called the Chaos Club has thoroughly walked through
their computers.  They probably stole passwords to our system and linked
directly to us."

As an aside, Bob mentioned that the Chaos Club might have gotten into the US
Fermilab computer as well.

"One guy uses the pseudonym Hagbard," he told me.  "Another, Pengo.  I don't
know their real names."

Next I called Stanford and asked one of their system managers, Dan Kolkowitz,
if he'd heard anything from Germany.

"Come to think of it, someone broke in a few months ago.  I monitored what he
did and have a listing of him."

Dan read the listing over the phone.  Some hacker with the nom-de-guerre of
Hagbard was sending a file of passwords to some hackers named Zombie and
Pengo.

Hagbard and Pengo again.  I wrote them in my logbook.

One good thing was happening.  One by one, I was making contact with other
people who were losing sleep and slugging down Maalox over the same troubles
that obsessed me.  It was comforting to learn that I wasn't completely alone.

A few days later, I received a call telling me that the German Bundespost had
determined that the hacker came from the University of Bremen.  Soon they
found the account he was using to connect across the Atlantic.  They set a
trap on that account: the next time someone used it, they'd trace the can.

The Germans weren't sining around.  The university would monitor the
suspicious account, and the Bundespost would keep track of the network
activity.  More and more mouseholes were being watched.

Friday, December 19, 1986, at 1:38 p.m., the hacker showed up again.  Stayed
around for two hours, fishing on the Milnet.  A pleasant Friday afternoon,
trying to guess passwords to the Strategic Air Command, the European Milnet
Gateway, the West Point Geography Department, and 70 other assorted military
computers.

I phoned Steve White at Tymnet.  "The hacker's on our computer.  Tymnet's
logical port number 14."

"OK," Steve said.  The usual keyboard clatter in the background. Twenty
seconds elapsed, and he called"Got it!"

Steve had traced a connection from California to Germany in less than a
minute.

"He's not coming from Bremen," he told me.  "Today, he's dialing into
Hannover."

"So where is he? In Bremen or Hannover?" "Wolfgang Hoffman, the Datex network
manager in Germany, doesn't know.  For all we know he could be in Paris,
calling long distance."

Yesterday it was Bremen.  Today Hannover.  Where would he hide tomorrow?

The hacker, I discovered, didn't take holidays; he even logged in on New
Year's Day.  His hacker's celebration was saved on my printers.  I scribbled
notes on the printouts, next to his:

WELCOME TO THE ARMY OPTIMIS DATABASE

PLEASE ENTER A WORD OR 'EXIT'.

/ SDI Looking for SDI dope

THE WORD "SDI" WAS NOT FOUND.  But there's none there

PLEASE ENTER A WORD OR 'EXIT'.

/ STEALTH Any word on the Stealth bomber?

THE WORD "STEALTH" WAS NOT FOUND.  No such luck

PLEASE ENTER A WORD OR 'EXIT'.

/ SAC Strategic Air Command?

THE WORD "SAC" WAS NOT FOUND.  Nope

PLEASE ENTER A WORD OR 'EXIT'.

/ NUCLEAR

THANK YOU.

I HAVE FOUND 29 DOCUMENT(S) CONTAINING THE PHRASE 'NUCLEAR'.

ITEM* MARKS* TITLE

1 20-lF IG INSPECTIONS (HEADQUARTERS, DEPART

MENT OF THE ARMY)

2 50A NUCLEAR, CHEMICAL, AND BIOLOGICAL NATION

AL SECURITY AFFAIRS

3 50B NUCLEAR, CHEMICAL, AND BIOLOGICAL WAR

FARE ARMS CONTROLS

4 50D NUCLEAR AND CHEMICAL STRATEGY

FORMULATIONS 5 50E NUCLEAR AND CHEMICAL POLITICO-MILITARY

AFFAIRS 6 5OF NUCLEAR AND CHEMICAL REQUIREMENTS

7 5OG NUCLEAR AND CHEMICAL CAPABILITIES

8 50H THEATER NUCLEAR FORCE STRUCTURE

DEVELOPMENTS 9 501 NUCLEAR AND CHEMICAL WARFARE BUDGET

FORMULATIONS 10 50J NUCLEAR AND CHEMICAL PROGRESS AND STA

TISTICAL REPORTS 11 50K ARMY NUCLEAR, CHEMICAL, AND BIOLOGICAL

DEFENSE PROGRAM 12 50M NUCLEAR AND CHEMICAL COST ANALYSES

13 5ON NUCLEAR, CHEMICAL WARFARE, AND BIOLOGI

CAL DEFENSE SCIENTIFIC AND TECHNICAL

INFORMATION 14 50P NUCLEAR COMMAND AND CONTROL

COMMUNICATIONS

15 50Q CHEMICAL AND NUCLEAR DEMILITARIZATIONS

16 5OR CHEMICAL AND NUCLEAR PLANS

17 50-5A NUCLEAR ACCIDENT/INCIDENT CONTROLS

18 50-5B NUCLEAR MANPOWER ALLOCATIONS

19 50-5C NUCLEAR SURETY FILES

20 50-5D NUCLEAR SITE RESTORATIONS

21 50,5-lA NUCLEAR SITE UPGRADING FILES

22 50-115A NUCLEAR SAFETY FILES

23 55-355FRTD DOMESTIC SHIPMENT CONTROLS

24 200-IC HAZARDOUS MATERIAL MANAGEMENT FILES

25 385-11K RADIATION INCIDENT CASES

26 385-11M RADIOACTIVE MATERIAL LICENSING

27 385-40C RADIATION INCIDENT CASES

28 700-65A INTERNATIONAL NUCLEAR LOGISTICS FILES

29 1125-2-300A PLANT DATA

And he wasn't satisfied with the titles to these documents-he dumped all 29
over the line printer.  Page after page was filled with army doubletalk.  At
one point, my printer jammed.  The old DECwriter had paid its dues for the
past ten years and now needed an adjustment with a sledgehammer.  Damn.
Right where the hacker had listed the army's plans for nuclear bombs in the
central European theater, there was only an ink blot.

Around noon on Sunday, January 4, my beeper sounded.  I jumped for the
computer, checked that the hacker was around, then called Steve White.
Within a minute, he'd started the trace.

The hacker tried the Air Force Systems Command, Space Division, and managed
to log in as Field Service: not as an ordinary user but as one

with a completely privileged account.

His first command was to show what privileges he'd

garnered.  The air force computer responded automatically: System Privilege,
and a slew of other rights, including the ability to read, write, or erase
any file on the system.

He was even authorized to run security audits on the air force computer.  I
could imagine him sitting behind his terminal in Germany, staring in
disbelief at the screen.  He didn't just have free run of the Space Command's
computer; he controlled it.

Confident that he was undetected, he probed nearby computers.  In a moment,
he'd discovered four on the air force network and a pathway to connect to
others.  From his high ground, none of these were hidden from him; if their
passwords weren't guessable, he could steal them by setting up Trojan horses.

This wasn't a little desktop computer he'd broken into.  He found thousands
of files on the system, and hundreds of users.

He commanded the air force computer to list the names of all its files; it
went merrily along typing out names like "Laser-design-plans" and
"Shuttlelaunch-manifest." But he didn't know how to shut off the spigot.  For
two hours, it poured a Niagara of information onto his terminal.

Finally, at 2:30, he hung up.  While the hacker stepped through the air force
computer, Steve White traced Tymnet's lines.  I asked Steve for the details.

"I checked with Wolfgang Hoffman at the Bundespost.  Your visitor is coming
from Karlsruhe today.  The University of Karlsruhe."

My hacker was moving around.  Or maybe he was staying in one place, playing a
shell game with the telephone system.  Perhaps he was a student, visiting
different campuses and showing off to his friends.  Was I certain that there
was only one hacker-or was I watching several people?

Two days later, the hacker was back.  He went straight over thc Milnet to the
Air Force Space Division.  I watched him log in as Field Service.

He didn't waste a minute.  He went straight to the authorization software,
searched for an old, unused account, and modified it, giving it system
privileges and a new password: AFHACK.

AFHACK-what arrogance.  He's thumbing his nose at the United States Air
Force.

From now on, he didn't need the field service account.  Disguised as an
officer in the air force, he had unlimited access to the Space Division's
computer.

A call to Steve White started a trace rolling.  Within five minutes, he'd
traced the connection to Hannover and called the Bundespost.

A few minutes of silence then: "Cliff does the con

nection look like it will be

a long one?"

"I can't tell, but I think so," I said.

"OK." Steve was on another telephone; I could hear only an occasional shout.

In a minute, Steve returned to my fine.  "Wolfgang is tracing the call in
Hannover.  It's a local call.  They're going to try to trace it all the way."

Here's news! A local call in Hannover meant that the hacker was somewhere in
Hannover.

Steve shouted instructions from Wolfgang: "Whatever you do, don't disconnect
the hacker.  Keep him on the line if you can!"

But he's rifling files at the air force base.  It was like letting a burglar
rob your home while you watched.

He went for operational plans.  Documents describing air force payloads for
the space shuttle. Test results from satellite detection systems.  SDI
research proposals.  A description of an astronaut-operated camera system.

Tymnet came back on the I'm sorry, Cliff, but the trace in Germany is
stymied."

"Can't they trace the call?" "Well, the hacker's line comes from Hannover,
all right," Steve replied.  "But Hannover's phone fines connect through
mechanical switches-noisy, complicated widgets-and these can be traced only
by people, not by computers."

Another opportunity lost.  I cut off the hacker's connection so that he
couldn't do more harm.

Later, Steve White explained that American telephones are computer
controlled, so it's pretty easy to trace them.  But in Germany they need
someone at the Hannover exchange to trace the call.

"So we can't trace him unless the hacker calls during the day or evening?" I
asked.

"Worse than that.  It'll take an hour or two to make the trace once it's
started."

Lately, the hacker had been showing up for five minutes at a time.  Long
enough to wake me up, but hardly enough for a two-hour trace.  How could I
keep him on for a couple of hours?

The answer, I realized, was disarmingly simplegive him what he wants: all the
classified data, all the top-secret information he could gather.  Not for
real, of course.  Instead, I'd create a phony database.  Its documents would
describe a new Star Wars project.  An outsider reading them would believe
that Lawrence Berkeley Laboratories had just landed a fat government contract
to manage a new computer network.  The SDI Network.

This bogus network, which would apparently link together scores of classified
computers,would extend to military bases around the world.  By reading the
files, you'd find lieutenants and colonels, scientists and engineers.  Here
and there, I would drop hints of meetings and classified reports.

And I invented Barbara Sherwin, the sweet, bumbling secretary trying to
figure out her new word processor and keep track of the endless stream of
documents produced by our newly invented "Strategic Defense Initiative
Network Office."

My snare was baited.  If the hacker bit, he'd take two hours to swallow the
bait.  Long enough for the Germans to track him down.

The next move was the hacker's.

My beeper sounded at 5:14 p.m., Friday, January 16.  There's the hacker.

It didn't take him very long to swallow the hook; soon he broke into my phony
SDInet.  Quickly, I got on the phone to Steve White.

"Steve, call Germany.  The hacker's on, and it'll be a long session."

"Spot-on, Cliff.  Call you back in ten minutes." For the next 45 minutes, the
hacker dumped out file after file, reading all the garbage that I had
created.  Boring, tedious ore, with an occasional nugget of technical
information.

Then he dumped the file named FORM LETTER:

DEAR SIR:

THANK YOU FOR YOUR INQUIRY ABOUT SDINET.  WE ARE HAPPY TO COMPLY WITH YOUR
REQUEST FOR MORE INFORMATION ABOUT THIS NETWORK.  THE FOLLOWING DOCUMENTS ARE
AVAILABLE FROM THIS OFFICE.  PLEASE STATE WHICH DOCUMENTS YOU WISH MAILED TO
YOU:

#37.6 SDINET OVERVIEW DESCRIPTION DOCUMENT

19 PAGES, REVISED SEPT.  1985

#41.7 STRATEGIC DEFENSE INITIATIVE AND COMPUTER NETWORKS:

PLANS AND IMPLEMENTATIONS (CONFERENCE NOTES) 227 PAGES, REVISED SEPT.  1985

#45.2 STRATEGIC DEFENSE INITIATIVE AND COMPUTER NETWORKS:

PLANS AND IMPLEMENTATIONS (CONFERENCE NOTES) 300 PAGES, JUNE 1986

#47.3 SDINET CONNECTIVITY REQUIREMENTS

65 PAGES, REVISED APRIL 1986

#48.8 How TO LINK INTO THE SDINET

25 PAGES, JULY 1986

#49.1 X.25 AND X.75 CONNECTIONS TO SDINET (INCLUDES JAPA

NESE, EUROPEAN, AND HAWAIIAN NODES) 8 PAGES, DECEMBER 1986 #55.2 SDINET
MANAGEMENT PLAN FOR 1986 TO 1988

47 PAGES, NOVEMBER 1985

#62.7 UNCLASSIFIED SDINET MEMBERSHIP LIST (INCLUDES MAJOR

MILNET CONNECTIONS) 24 PAGES, NOVEMBER 1986

#65.3 CLASSIFIED SDINET MEMBERSHIP LIST

9 PAGES, NOVEMBER 1986

#69.1 DEVELOPMENTS IN SDINET AND SDI DISNET

28 PAGES, OCTOBER 1986

SINCERELY YOURS,

MRS.  BARBARA SHERWIN

DOCUMENTS SECRETARY

SDINET PROJECT

Steve White called back from Tymnet.  "I've traced your connection over to
the University of Bremen.  And the Bundespost has traced the Datex line from
Bremen into Hannover.  In the past half hour, the technician traced the line
and has narrowed it down to one of 50 telephone numbers."

"Why can't they get the actual number?" "Wolfgang's unclear about that.  It
sounds like they've determined the number to be from a group of local phones,
but the next time they make a trace, they'll zero in on the actual telephone.
From tile sound of Wolfgang's message, they're excited about solving this
case."

The next day, at 10:17 a.m., the hacker came back.  This time, he wasn't
interested in SDI files.  Instead, he went out over the Milnet, trying to
break into military computers.

He was concentrating on air force and army computers, though he occasionally
knocked on the navy's door as well.  Places I'd never heard of, like the Air
Force Weapons Lab, Descom headquarters, Air Force CC OIS, and the CCA-amc.
Fifty places, all without success.

Then he slid across the Milnet into a computer named Buckner.  He got right
in .  .  .  didn't even need a password on the account named "guest."

He'd broken into the Army Communications Center in Building 23, Room 121, of
Fort Buckner.  Fort Buckner was in Okinawa.

What a connection! From Hannover, Germany, the hacker linked to the
University of Bremen, across a transatlantic cable into Tymnet, then into my
Berkeley computer, and into the Milnet, finally reaching Okinawa.

A bit after 11 in the morning, he finally grew tired and logged off.

While he'd circled the globe with his spiderweb of connections, the German
Bundespost had homed in on him.

The phone rang-had to be Steve White.  "Hi Cliff," Steve said, "The trace is
complete." "The Germans got the guy?" "They know his phone number." "Well,
who is he?" I asked.

"They can't say right now, but you're supposed to tell the FBI."

"Just tell me this much," I asked Steve.  "Is it a computer or a person?"

"A person with a computer at his home.  Or should I say, at his business."

Days later, Tymnet passed along a chilling message: "This is not a benign
hacker.  It is quite serious.  The scope of the investigation is being
extended.  Thirty people are now working on this case.  Instead of simply
breaking into the apartments of one or two people, locksmiths are making keys
to the houses of the hackers, and the arrests will be made when the hackers
cannot destroy the evidence.  These hackers are linked to the shady dealings
of a private company."

Throughout the spring, I kept making new bait.  My mythical Barbara Sherwin
created memos and letters, requisitions and travel orders.  Here and there,
she sprinkled a few technical articles, explaining how the SDI network
interconnected all sorts of classified computers.

On Monday, April 27, came one of the biggest shocks.  A letter arrived,
addressed to the imaginary Barbara Sherwin.

Triam International, Inc.

6512 Ventura Drive

Pittsburgh, PA 15236 April 21, 1987

Dear Mrs.  Sherwin:

I am interested in the following documents.  Please send me a price list and
an update on SDI Network Project.  Thank you for your cooperation.

Very truly yours,

Laszlo J.  Balogh

Balogh then asked for every phony document I had made up in the file called
FORM LETTER.

Someone had swallowed the bait and was asking for more information! I could
understand it if the letter came from Hannover.  But Pittsburgh?

I called Mike Gibbons at the Alexandria FBI office and told him about it.

"OK," Mike said.  "Listen up carefully.  Don't touch that letter.
Especially, don't touch around the edges.  Go find a glassine envelope.
Gently insert the paper in the envelope.  Then express mail it to me.
Whatever you do, don't handle it.  Wear gloves if you must."

This sounded like Dick Tracy's "Crimestoppers," but I followed orders.

A hacker in Hannover, Germany, learns a secret from Berkeley, California.
Three months later, a Hungarian named Laszlo Balogh living in Pittsburgh
writes us a letter.  What's happening here? Tuesday moming, June 23, Mike
Gibbons called from the FBI.

"You can close up shop, Cliff." "What's happened?" "Arrest warrants were
issued this morning at IO." "Anyone arrested?" "I can't say." Something was
happening.  But Mike wouldn't say what.

A few hours later, Wolfgang Hoffman sent a message: "An apartment and a
company were searched, and nobody was home at the time.  Printouts, disks,
and tapes were seized and will be analyzed in the next few days.  Expect no
further break-ins."

Finally, it was over.  The FBI still wasn't talking, but I managed to fmd out
who the Germans had fingered; I could now attach a name to the shadowy hacker
I had chased across two continents: Markus Hess.

So what really happened? Was Hess working alone, or was he in league with
others? And why was he breaking into defense department computers? Here's my
estimate, based on interviews, police reports, newspaper accounts, and
messages from German computer programmers.

In the mid-1980s, a dozen hackers started the Chaos Computer Club, whose
members specialized in creating viruses, breaking into computers, and serving
as a computer counterculture.  Through electronic bulletin boards and
telephone links, they anonymously exchanged phone numbers of hacked
computers, as well as stolen passwords and credit cards.

Markus Hess knew of the Chaos Club, although he was never a central figure
there.  Rather, he kept his distance as a freelance hacker.  During thc day,
he worked at a small software firm in downtown Hannover.

Over a crackling phone connection, an astronomer friend in Hannover explained
to me, "You see, Hess knew Hagbard, who kept in touch with other hackers in
Germany, Eke Pengo and Frimp.  Hagbard is a pseudonym, of course, his real
name is .  .  .  "

Hagbard.  I'd heard that name before-he'd broken into Fermilab and Stanford.

Hagbard worked closely with Markus Hess.  The two drank beers together at
Hannover bars and spent evenings behind Hess's computer.

Apparently, Hess apparently just played around the networks at first,
searching for ways to connect around the world.  Like a ham-radio operator,
he started out a hobbyist, trying to reach as far away as possible.  In the
beginning, he managed to connect to Karlsruhe; later he reached Bremen over
the Datex network.

Soon he discovered that many system managers hadn't locked their back doors.
Usually these were university computers, but Markus Hess began to wonder: how
many other systems were wide open? What other ways could you sneak into
computers?

By September 1985, Hagbard and Pengo were routinely breaking into computers
in North America: mostly high energy physics labs, but a few NASA sites as
well.  Excitedly, Hagbard described his exploits to Hess.

Hess began to explore outside of Germany.  But he no longer cared about
universities and physics laboratories-he wanted some real excitement.  Hess
now targeted the military.

The leaders of the Chaos Computer Club had issued a warning to their members:
"Never penetrate a military computer.  The security people on the other side
will be playing a game with you almost like chess.  Remember that they've
practiced this game for a long time.  .  .  .  " Markus Hess wasn't
listening.

Hess apparently found his way into an unprotected computer belonging to a
German subsidiary of U.S.  defense contractor Mitre.  Once inside that
system, he discovered detailed instructions to link into Mitre's computers in
Bedford, Massachusetts, and McLean, Virginia.

By summer 1986, Hess and Hagbard were operating separately but frequently
comparing notes. Meanwhile, Hess worked in Hannover, programming VAX
computers and managing several systems.

Hess soon expanded his beachhead at Mitre.  He explored the system
internally, then sent out tentacles into other American computers.  He
collected telephone numbers and network addresses and methodically attacked
these systems.  On August 20, he struck Lawrence Berkeley Labs.

Even then, Hess was only fooling around.  He'd realized that he was privy to
secrets, both industrial and national, but kept his mouth shut.  Then, around
the end of September, in a smoky Hannover beergarden, he described his latest
exploit to Hagbard.

Hagbard smelled money.  And Hagbard knew who to contact: Pengo, in West
Berlin.

Pengo, with his contacts to hackers across Germany, knew how to use Hess's
information. Carrying Hess's printouts, one of the Berlin hackers crossed
into East Berlin and met with agents from the East German
Staatssicherheitsdienst-the Secret Service.

The deal was.  made: around 30,000 deutschemarks-$18,000-for printouts and
passwords.

From there, who knows what happened to the information? The East German
Secret Service cooperates closely with the Soviet KGB; surely the
Staatssicherheitsdienst would tell the KGB about this new form of espionage.

The KGB wasn't just paying for printouts, though.  Hess and company
apparently sold their techniques as well: how to break into VAX computers;
which networks to use when crossing the Atlantic; details on how the Milnet
operates.

Even more important to the KGB was obtaining research data about Western
technology, including integrated circuit design, computer-aided
manufacturing, and, especially, operating system software that was under U.S.
export control.  They offered 250,000 deutschemarks for copies of Digital
Equipment's VMS operating system.

According to the German television station NDR, the Berlin hackers supplied
much of this order, including source code to the Unix operating system
designs for high-speed gallium-arsenide integrated circuits, and computer
programs used to engineer computer memory chips.  Hagbard wanted more than
money.  He demanded co

caine.  The East German Secret Service was a willing supplier.

Hagbard passed some of the money (but none of the cocaine) to Hess in retum
for printouts, passwords, and network information.  Hagbard's cut went toward
paying his telephone bill which sometimes ran over $1,000 a month as he
called computers around the world.

Hess saved everything.  He kept a detailed notebook and saved every session
on a floppy disk. This way, after he disconnected from a military computer,
he could print out the interesting parts and pass these along to Hagbard and
on to the KGB.

Also on the KGB's wish list was SDI data.  As Hess searched for it, I
naturally detected SDI showing up in his requests.  And I had fed Hess plenty
of SDI  fodder.

But could the East Germans (or KGB?) trust these printouts? How could they be
sure Hagbard wasn't inventing all of this to feed his own coke habit?

The KGB decided to verify the German hacker ring.  The mythical Barbara
Sherwin served as a perfect way to test the validity of this new form of
espionage.  She had, after all, invited people to write to her for more
information.

But secret services don't handle things directly.  They use intermediaries.
The East Germans (KGB?) contacted another agency-either the Hungarian or
Bulgarian intelligence service.  They, in tum, apparently had a professional
relationship with a contact in Pittsburgh: Laszlo Balogh.

Does the FBI have enough evidence to indict Laszlo Balogh? They won't tell
me.  But the way I see it, Laszlo's in deep trouble: the FBI is watching him,
and whoever's pulling his puppet strings isn't pleased.

The West German police, though, have plenty of evidence against Markus Hess.
Printouts, phone traces, and my logbook.  When they broke into his apartment
on June 29, 1987, they seized a hundred floppy disks, a computer, and
documentation describing the U.S.  Milnet.

But when the police raided Hess's apartment, nobody was home.  Though I was
waiting patiently for him to appear on my computer, the German police entered
his place when he wasn't connected.

At his first trial, Hess got off on appeal.  His lawyer argued that since
Hess wasn't connected at the moment his apartment was raided, he might not
have done the hacking.  This, along with a problem in the search warrants,
was enough to overtum the case against Hess on computer theft.  But the
German federal police continued to investigate.

On March 2, 1989, German authorities charged five people with espionage:
Pengo, Hagbard, Peter Carl, Dirk Bresinsky, and Markus Hess.

Peter Carl met regularly with KGB agents in East Berlin, selling any data the
others could find.

When the German officials caught up with him, he was about to run off to
Spain.  He's now in jail, waiting for trial, along with Dirk Bresinsky, who
was jailed for desertion from the German army.

Pengo is having second thoughts about his years working for the KGB.  He says
that he hopes he "did the right thing by giving the German police detailed
information about my involvement." But as long as there's an active criminal
case, he'll say no more.

All the same, the publicity hasn't helped Pengo's professional life as a
computer consultant. His business partners have shied away from backing him,
and several of his computing projects have been canceled.  Outside of his
business losses, I'm not sure that he feels there's anything wrong with what
he did.

Today, Markus Hess is walking the streets of Hannover, free on bail while
awaiting a trial for espionage.

Hagbard, who hacked with Hess for a year, tried to kick his cocaine habit in
late 1988.  But not before spending his profits from the KGB: he was deep in
debt and without a job.  In spring 1989 he found a job at the office of a
political party in Hannover.  By cooperating with the police, he and Pengo
avoided prosecution for espionage.

Hagbard was last seen alive on May 23, 1989.  In an isolated forest outside
of Hannover, police found his chaffed bones next to a melted can of gasoline.
A borrowed car was parked nearby, keys still in the ignition.

No suicide note was found.

Journal:   PC-Computing  Sept 1989  v2 n9 p112(8)

Title:     The cuckoo's egg. (excerpts from book on hacker espionage)
Author:    Stoll, Clifford.

Full Text:

Me, a wizard?

Until a week before, I had been an astronomer, contentedly designing
telescope optics.  But then I found myself transferred from the Keck
Observatory at the Lawrence Berkeley Lab (LBL) down to the computer center in
the basement of the same building.

On either side of my new cubicle were the offices of two systems people,
Wayne Graves and Dave Cleveland, the old hands of the system.  Together,
Wayne, Dave, and I were to run the computers as a labwide utility.  We
managed a dozen mainframe computers-giant workhorses for solving physics
problems, together worth around $6 million.  The scientists using the
computers were supposed to see a simple, powerful computing system, as
reliable as the electric company.  This meant keeping the machines running
full-time, around the clock.  And just like a utility company, we charged for
every cycle of computing that was used.

On my second day, Dave was mumbling about a hiccup in the Unix accounting
system.  Someone must have used a few seconds of computing time without
paying for it.  The computer's books didn't quite balance; last month's bills
of $2,387 showed a 75-cent shortfall.

Now, an error of a few thousand dollars is obvious, and isn't hard to find.
But errors in the pennies column arise from deeply buried problems, so
finding these bugs is a natural test for a budding software wizard.

Around about 7 p.m., my eye caught the name of one user, Hunter. This guy
didn't have a valid billing address.  Ha! Hunter had used 75 cents of time in
the past month, but nobody had paid for him.  Here was the source of our
imbalance.  Someone had screwed up while adding a user to our system.  A
trivial problem caused by a trivial error.

A day later, an obscure computer named Dockmaster sent us an electronic-mail
message.  Its system manager claimed that someone from our laboratory had
tried to break into his computer over the weekend.  I guessed Dockmaster was
some navy shipyard.  It wasn't important, but it seemed worth spending a few
minutes looking into.

The message gave the date and time when someone on our Unix computer tried to
log in to Dockmaster's computer.  Our stock Unix accounting file showed a
user, Sventek, logging in to our system at 8:25, doing nothing for half an
hour, and then disconnecting.  No time-stamped activity in between.  Our
homebrew software also recorded Sventek's activity, but it showed him using
the networks from 8:31 until 9:01 a.m.

Jeez.  Another accounting problem.  The timestamps didn't agree. One recorded
activity when the other account said everything was dormant.

Why were the two accounting systems keeping different times? And why was some
activity logged in one file without showing up in the other? Was this related
to the earlier accounting problem? Had I screwed things up when I poked
around before? Or was there some other explanation-was there a hacker on the
loose?

So how do you find a hacker? I figured it was simple: just watch for anyone
using Sventek's accounts, and try to trace the connection.  I spent Thursday
watching people log in to the computer.  I wrote a program to beep my
terminal whenever someone connected.

At 12:33 on Thursday afternoon, Sventek logged in.  I felt a rush of
adrenaline, then a complete letdown when he disappeared within a minute.
Where was he? The only pointer left for me was the identifier of his
terminal: he had used terminal port tt23.  I suspected a dial-in modem,
connected fRom some telephone line, but it might conceivably be someone at
the laboratory.

By lucky accident, the connection had left some footprints behind.  Paul
Murray, a reclusive hardware technician who hides in thickets of telephone
wire, had been collecting statistics on how many people used our
communications switchyard.  By chance he had recorded the port numbers of
each connection for the past month.  Since I knew when Sventek was active on
port tt23, we could figure out where he came from.  The printout of the
statistics showed a one-minute, 1,200-bit-per-second connection had taken
place at 12:33.

Any lab employee here on the hill would run at high speed-9,600 or 19,200
bps.  Only someone calling through a modem would let his data dribble out a
1,200-bps soda straw.  But how to catch him? About the only place to watch
our incoming traffic was in between the modems and the computers.  Our modem
lines were flat, 25-conductor wires, snaking underneath the switchyard's
false floor.  A printer or personal computer could be wired in parallel with
each of these lines, recording every keystroke that came through.

A kludge? Yes.  Workable? Maybe.

All we'd need were 50 teletypes, printers, and portable computers.  I rounded
them up; strewn with four dozen obsolete teletypes and portable terminals,
the floor looked like a computer engineer's nightmare.  I slept in the
middle, nursing the printers and computers.  Each was grabbing data from a
different line, and whenever someone dialed our system, I'd wake up to the
chatter of their typing.  Every half-hour, a printer would run out of paper
or a computer out of disk space, so I'd have to roll over and reload.
Saturday morning, a coworker shook me awake. "Well, where's your hacker?"

The first 49 printers and monitors showed nothing interesting.  But from the
50th trailed 80 feet of printout.  During the night, someone had sneaked in
through a hole in the operating system.

For three hours a hacker had strolled through my system, reading whatever he
wished.  Unknown to him, my DECwriter had saved his session on singlespaced
computer paper.  Here was every command he issued, every typing mistake, and
every response from the computer.

This printer monitored the line from Tymnet, a communications company that
interconnected computers around the world.  Our hacker might be anywhere.

How the Cuckoo Laid Its Egg

The hacker had become a super-user.  He was like a cuckoo bird.  The cuckoo
is a nesting parasite that lays her eggs in other birds' nests: some other
bird will raise her young.  The survival of cuckoo chicks depends on the
ignorance of other species.  Our mysterious visitor had laid an egg-program
into our computer, letting the system hatch it and feed it privileges.

That morning, the hacker wrote a short program to grab privileges.  Normally,
Unix won't allow such a program to run, since it never gives privileges
beyond what a user is assigned.  But if our hacker ran this program from a
privileged account, he'd become privileged.  His problem was to masquerade
this special program-the cuckoo's egg-so that it would be hatched by the
system.

Every five minutes, the Unix system executes its own program called atrun.
In turn, atnin schedules other jobs and does routine housecleaning tasks.  It
runs in a privileged mode, with the full power and trust of the operating
system behind it.  If a bogus atrun program were substituted, it would be
executed within five minutes, with full system privileges.  For this reason,
atrun sits in a protected area of the system, available only to the system
manager.  Nobody else has license to tamper with atrun.

Here was the cuckoo's nest: for five minutes he would swap his egg for the
system's atrun program.  For this attack, he needed to find a way to move his
egg-program into the protected systems nest.  The operating system's barriers
are built specifically to prevent this.  But there was a wildcard that we'd
never noticed.

We used a powerful editing program called GnuEmacs.  But Gnu's much more than
just a text editor-it's a foundation upon which other programs can be built.
It even has its own mail facility built in.  just one problem: there's a bug
in that software.

Because of the way it was installed on our Unix computer, the Gnu-Emacs
editor lets you forward a mail file from your own directory to anyone else's.
It doesn't check to see who's receiving it, or even whether they want the
file.  No problem to send a file from your area to mine.  But you'd better
not be able to move a file into the protected systems area: only the systems
manager is allowed there.

Gnu didn't check.  It let anyone move a file into protected systems space.
The hacker knew this; we didn't.  He used Gnu to swap his special atrun file
for the system's legitimate version. Five minutes later, the system hatched
his egg, and he held the keys to my computer.

In front of me, the first few feet of the printout showed the cuckoo
preparing the nest, laying the egg, and waiting for it to hatch.  The next 70
feet showed the fledgling cuckoo testing its wings.

As a super-user, he had the run of our system and could read anybody's work.
By studying several scientists' command files and scripts, he discovered
pathways into other lab computers. Every night, our computer automatically
calls 20 others, to exchange mail and network news.  When the hacker read
these phone numbers, he learned 20 new targets.

I had to weave a net fine enough to catch the hacker but coarse enough to let
our scientists through.  I'd have to detect the hacker as soon as he came
online and call Tymnet's technicians to trace the call.

If I knew the stolen account names, it would be easy to write a program that
watched for the bad guy to show up.  No need to check out every person using
the computer; just ring a bell when a stolen account was in use.  But I also
had to stay invisible to the hacker, so I wrote the program for a new Unix-8
system we had just installed.  I could connect it to our local area network,
secure it against all possible attacks, and let it watch the other computers,
all the while recording the traffic on printers.

Wednesday afternoon, September 3, 1986, marked a week since we'd first
detected the hacker. Suddenly, the terminal beeped twice: Sventek's account
was active.  I ran to the switchyard; the top of the ream of paper showed
that the hacker had logged in at 2:26 and was still active.

Logged in as Sventek, he first listed the names of everyone connected.
Lucky-there was nobody but the usual gang of physicists and astronomers; my
watchdog program was well concealed within the Unix-8 computer.

He didn't become a super-user; rather, he checked that the Gnu-Emacs file
hadn't been modified. At 2:37, 11 minutes after logging in, he abruptly
logged off.  But not before we'd started the trace.

Ron Vivier traces Tymnet's network within North America 'In a couple of
minutes he had traced the connection from LBL's Tymnet port into an Oakland
Tymnet office, where someone had dialed in.

It's easier to call straight into our Berkeley lab than to go through
Oakland's Tymnet office. Calling the local Tymnet access number instead of
our lab was like taking the interstate to drive three blocks.  But calling
via Tymnet added one more layer to trace.  Whoever was at the other end of
the line knew how to hide.

The morning after we had watched the hacker break in to our system, my boss
met with Aletha Owens, the lab's attorney.  She wasted no time in calling the
FBI.

Our local FBI office didn't raise an eyebrow.  Fred Wyniken, special agent
with the Oakland resident agency, asked incredulously"You're calling us
because you've lost 75 cents in computer time?" Owens tried explaining
information security and the value of our data.  Wyniken interrupted, "Look,
if you can demonstrate a loss of more than a million dollars, or that
someone's prying through classified data, then we'll open an investigation.
Until then, leave us alone."

Wednesday, September 10, at 7:51 a.m., the hacker appeared in our system for
six minutes.  I wasn't at the lab to watch, but the printer saved three pages
of his trail.  He logged in to our computer from Tymnet as Sventek, then
jumped into another network.  Using Milnet, a network that links military
computers, he connected to address 26.0.0.113.  He logged in there as Hunter,
checked that they had a copy of Gnu-Emacs, and disappeared.

The hacker left an indelible trail downstream to the Redstone Army Depot in
Anniston, Alabama, the home of the army's Redstone missile complex2,000 miles
from Berkeley.  He listed files at the Anniston system.  judging from the
dates of these files, he'd been in Anniston's computers since early June.
For four months, an illegitimate system manager had been using an army
computer.  Yet he'd been discovered by accident, not through some logic bomb
or lost information.

Looking closely at the morning's printout, I saw that, on the Anniston
computer, the hacker had changed Hunter's password to Hedges.  A clue at
last: of zillions of possible passwords, he'd chosen Hedges.  Hedges Hunter?
Hunter Hedges? A hedge hunter?

Time was running out; if I didn't catch the hacker soon, the lab would shut
down my tracking operation and put me on other work.  At 2:30 in the
afternoon, the printer advanced a page and the hacker logged in with a new
stolen account, Goran.  A minute after the hacker connected, I called the
phone company and Ron Vivier at Tymnet.  I took notes as Ron mumbled.  "He's
coming into your port 14 and entering Tymnet from Oakland.  It's our port
322, which is, uh, let me see here." I could hear him tapping his keyboard.
"Yeah, it's 2902.  430-2902.  That's the number to trace.'

The phone company, by law, couldn't reveal information about the trace to me,
but my printers showed his every move.  While I talked to Tymnet and the
telephone techs, the hacker had prowled through my computer.  He wasn't
satisfied reading the system manager's mail; he also snooped through mail for
several nuclear physicists.

After 15 minutes of reading our mail, he jumped back into Goran's stolen
account, using a new password, Benson.  He started a program that searched
our users' files for passwords; while that executed, he called up the Milnet
Network Information Center and asked for a pathway into the CIA.

Instead of their computer, though, he found four people who worked at the
CIA.  Later, I phoned one of them.

I didn't know where to begin.  How do you introduce yourself to a spy?

"Uh, you don't know me, but I'm a computer manager, and we've been following
a computer hacker."

"Uh-huh." "Well, he searched for a pathway to try to get into the CIA's
computers.  He found your name and phone number."

"Who are you?" Nervously, I told him, expecting him to send over a gang of
hit men in trench coats.  I described our laboratory, making sure he
understood that the People's Republic of Berkeley didn't have official
diplomatic relations with his organization.

He sent over a delegation several days later.  OK, so they didn't wear trench
coats.  Not even sunglasses.  just boring suits and ties.  Wayne saw the four
of them walk up the drive and flashed a message to my terminal: "All hands on
deck.  Sales reps approach through starboard portal. Charcoal gray suits.
Set warp speed to avoid IBM sales pitch." If only he knew.

The four spooks introduced themselves.  One guy in his fifties said he was
there as a "navigator" and didn't give his name-he just sat there quietly the
whole time.  The second spy, Greg Fennel, I guessed to be a computer jockey,
because he seemed uncomfortable in a suit.  The third agent, Teejay, was
built like a halfback.  The fourth guy must have been the bigwig: everyone
shut up when he talked.  Together, they looked more like bureaucrats than
spies.

The four of them sat quietly while we gave them an overview of what we'd
seen.  Mr.  Big nodded and asked, "What keywords has he scanned for?"

"He looks for words like password, nuclear, SDI, and Norad He's picked some
curious passwords: lblhack hedges, jaeger, hunter, and benson.  The accounts
he stole, Goran, Sventek, Whitberg, and Mark don't say much about him,
because the names are people here at the laboratory."

Mr.  Big nodded and asked, "Tell me, what did he do at Anniston?"

"I don't have much of a printout there," I said.  "He was into their system
for several months, perhaps as long as a year.  Now, since he knows they've
detected him, he logs in only for a moment."

Mr.  Big fidgeted a bit, meaning that the meeting was about to break up.
Greg asked one more question.  "What machines has he attacked?"

"Ours, of course, and the army base in Anniston.  He's tried to get into
White Sands Missile Range, and some navy shipyard in Maryland.  I think it's
called Dockmaster."

"Shit!" Greg and Teejay simultaneously exclaimed.  Greg said, "How do you
know he hit Dockmaster?"

"About the same time he screwed up our accounting, this Dockmaster place sent
us a message saying that someone had tried to break in there."

"Did he succeed?" "I don't think so.  What is this Dockmaster place, anyway?
Aren't they some navy shipyard?"

They whispered among themselves, and Mr.  Big nodded.  Greg explained:
"Dockmaster isn't a navy shipyard.  It's run by the National Security
Agency."

A hacker breaking into the NSA? Bizarre.  This wanted to get into the CIA,
the NSA, army missile bases, and the North

American Air Defense headquarters.  "Dockmaster is NSA's only unclassified
computer," Greg said.

"It belongs to its computer security group, which is actually public."

Mr.  Big started talking slowly.  "There's not much we can do about this
affair.  I think there's no evidence of foreign espionage."

"Well, who should be working on this case?" I asked.

"The FBI.  I'm sorry, but this isn't our bailiwick.  Our entire involvement
has been the exposure of four names-names that are already in the public
domain, I might add."

Then they were gone.

The spooks were no help, so I was on my own again.  I searched the Berkeley
phone book for Jaegers and Bensons; I figured I ought to try Stanford as
well.  So I stopped by the library. Maggie Morley, our 45-year-old
documentmeister, plays rough-and-tumble Scrabble: posted on her door is a
list of all legal three-letter Scrabble words.

"I need a Stanford telephone book," I I'm looking for everyone in Silicon
Valley named Jaeger or Benson."

'Jaeger.  A word that's been kind to me," Maggie smiled.  "Worth 16 points,
but I once won a game with it, when the [J] landed on a triple-letter score.
Turned into 75 points."

"Yeah, but I need it because it's the hacker's password.  Hey, I didn't know
names were legal in Scrabble."

"Jaeger's not a name.  Well, maybe it's a nameEllsworth jaeger, the famous
omithologist, for instance-but it's a type of bird.  Gets its name from the
German word meaning hunter."

"Huh? Did you say hunter?"

"Yes.  Jaegers are hunting birds that badger other birds with full beaks.
They harass weaker birds until they drop their prey."

"Hot ziggity! You answered my question.  I don't need the phone book."

"Well, what else I can do for you?"

"How about explaining the relationship between the words hedges, jaeger,
hunter, and benson?"

"Well, jaeger and hunter is obvious to anyone who knows German.  And smokers
know Benson & Hedges."

Omigod-my hacker smokes Benson & Hedges.  Maggie had won on a triple-word
score.

During one of the phone traces, I had copied down all the numbers and digits
I heard from the technician.  I called all combinations of them and ended up
at a computer modem at Mitre, a defense contractor just down the road from
CIA headquarters in McLean, Virginia.  How deeply was Mitre's system
infested? By listing its directory, I saw that the hacker had created a
Trojan horse there on June 17.  For six months, someone had silently
booby-trapped Mitre's computers.

In alllikelihood, Mitre served as a way station, a stepping-stone on the way
to breaking into other computers.  Someone dialed into Mitre, turned around,
and dialed out from it.  This way, Mitre paid the bills both ways: the
incoming Tymnet connection and the outgoing long-distance phone call.  Even
nicer, Mitre served as a hiding place, a hole in the wall that couldn't be
traced.

Monday morning, I called a man named Bill Chandler at Mitre and told him the
news.  Bill wanted me to be quiet about the problems I had found.  Well, yes,
but I had a price.

"Say, Bill, could you send me copies of your computer's phone bills?"

"What for?" "It might be fun to see where else this hacker got into."

Two weeks later, a thick envelope arrived, stuffed with long-distance bills
from Chesapeake and Potomac.  Six months of phone bills.  Dates, times, phone
numbers, and cities.  Probably 5,000 in all.  So many that I couldn't analyze
them by hand.  Perfect for analyzing on a computer-there's plenty of software
designed to search out correlations.  All I had to do was enter them into my
Macintosh computer and run a few programs.

Ever type 5,000 phone numbers? It's as boring as it sounds.  And I had to do
it twice, to make sure I didn't make any mistakes.  Took me two days.

After running an analysis, I found that this hacker hadn't just broken into
my computer.  He was into more than six, and possibly a dozen.

From Mitre, the hacker had made long connections to Norfolk, Oak Ridge,
Omaha, San Diego, Pasadena, Livermore, and Atlanta.

At least as interesting: he had made hundreds of one-minute phone calls, all
across the country.

To air force bases, navy shipyards, aircraft builders, and defense
contractors.  What can you learn from a oneminute phone call to an army
proving ground?

For six months, this hacker had been breaking into bases and computers all
across the country. Nobody knew it.  He was out there, alone, silent,
anonymous, persistent, and apparently successful-but why? What was he after?
What had he already learned? And what was he doing with this information?
Friday, December 5, the hacker showed up again at 1:21 in the afternoon.
Nine minutes later, he disappeared.

Enough time for me to trace the connection to Tymnet.  But the network's
sorcerer, Ron Vivier, was taking a long lunch that day, so

Tymnet couldn't make the trace.  Another chance lost.

Ron returned my call an hour later.

"Hey, Cliff, how come you never call me at night?"

"Guess the hacker doesn't show up at night.  I wonder why." He started me
thinking.  My logbook recorded every time the hacker had shown up.  On the
average, when was he active?

I'd remembered him on at 6 a.m.  and at 7 p.m.  But never at midnight.  Isn't
midnight operation the very image of a hacker?

On the average, the hacker showed up at noon, Pacific time.  So what did this
mean? Suppose he lives in California.  Then he's hacking during the day.  If
he's on the East Coast, he's three hours ahead of us, so he works around 3 or
4 in the afternoon.

This didn't make sense.  He'd work at night to save on long-distance
telephone fees.  To avoid network congestion.  And to avoid detection.  Yet
he brazenly breaks in during the day.  Why?

When it's noon in California, I wondered, where is it evening? Lunchtime in
Berkeley is bedtime in Europe.  Was the hacker coming from Europe?

On a Saturday afternoon, the hacker hit again.  I called Tymnet's Ron Vivier
at home.

"I've got a live one for you," I gasped.  "Just trace my port  14."

"Right.  It'll take a minute." A couple of eons passed, and Ron came back on
the line.  "Hey, Cliff, are you certain that it's the same guy?,"

I watched the hacker searching for the word ]DI on our computer"Yes, it's
him."

"He's coming in from a gateway that I've never heard of.  I'm locked onto his
network address, so it doesn't matter if he hangs up.  But the guy's coming
from somewhere strange."

"Where's that?"

"I don't know.  It's Tymnet node 3513, which is a strange one.  I'll have to
look it up in our directory." In the background, Ron's keyboard clicked.
"Here it is.  Your hacker is coming from outside the Tymnet system.  He's
entering Tymnet from a communications line operated by the International
Telephone and Telegraph company."

"So what?"

"ITT takes a Westar downlink, the communications satellite over the Atlantic.
It handles ten or twenty thousand phone calls at once."

"So my hacker is coming from Europe?"

"For sure."

"Where?"

"That's the part I don't know, and I probably can't find out.  But hold on,
and I'll see what's there." More keyboard clicks.

Ron came back to the phone.  "Well, ITT identifies the line as DSEA 744031.
That's their line number.  It can connect to either Spain, France, Germany,
or Britain."

"Well, which is it?" "Sorry, I don't know.  In three days they'll send us
billing information, and then I can find out.  Meantime, I can't tell you
much more than that."

Ron rang off, but the hacker was still on my computer, trying to chisel into
the Navy Research Labs, when one of Tymnet's international specialists, Steve
White, called.

"Ron can't trace any farther," Steve said.  "I'll do the trace myself"

I kept watching the hacker on my screen, hoping that he wouldn't hang up
while Steve made the trace.

Steve came back on the line.  In his modulated, almost theatrical British
accent, he said, "Your hacker has the calling address DNIC dash 2624 dash
542104214."

"So where's the hacker coming from?"

"West Germany.  The German Datex network."

"What's that?"

"It's their national network to connect computers together.  We'll have to
call the Bundespost to find out more."

"Who's the Bundespost?"

"They're the German national postal office.  The government communications
monopoly."

Steve seemed pessimistic about completing a successful "We know where he
connects into the system.  But there's a couple of possibilities there.  The
hacker might be at a computer in Germany, simply connected over the German
Datex network.  If that's the case, then we've got him cold, We know his
address, the address points to his computer, and the computer points to him."

"It is unlikely.  More likely, the hacker is coming into the German Datex
network through a dial-in modem."

Just like Tymnet, Datex let anyone dial into its system and connect to
computers on the network.

Perfect for businesspeople and scientists.  And hackers.

"The real problem is in German law," Steve said.  "I don't think they
recognize hacking as a crime."

"You're kidding, of course." "No," he said.  "A lot of countries have
outdated laws.  In Canada, a hacker who broke into a computer was convicted
of stealing electricity, rather

than trespassing.  He was prosecuted only because the connection had used a
microwatt of power from the computer."

Steve's pessimism was contagious.  But his trace jogged my spirits.  So what
if we couldn't nail the hacker-our circle was closing around him.

Germany.  I remembered my librarian recognizing the hacker's password.
"Jaeger-it's a German word meaning hunter." The answer had been right in
front of me, but I'd been blind.

Some details were still fuzzy, but I understood how he operated. Somewhere in
Europe, the hacker called into the German Datex network.  He asked for
Tymnet, and the Bundespost made the connection.  Once he reached the States,
he connected to my laboratory and hacked his way around Milnet.

Mitre must have been his stopover point.  Now I realized why Mitre paid for a
thousand one-minutelong phone calls.  The hacker would connect to Mitre and
instruct the system to phone another computer.  When it answered, he would
try to log in with a default name and password. Usually he failed and went on
to another phone number.  He'd been scanning computers, with Mitre picking up
the tab.

But he'd left a trail.  On Mitre's phone bills.

The path led back to Germany, but it might not end there.  Conceivably,
someone in Berkeley could have called Berlin, connected to the Datex network,
connected through Tymnet, and come back to Berkeley.  Maybe the start of the
path was in Mongolia.  Or Moscow.  I couldn't tell.  For the present, my
working hypothesis would be Germany.

And he scanned for militaly secrets.  Could I be following a spy? A real spy,
working for them-but who's "them"?

Three months ago, I'd seen some mouse droppings in my accounting files.
Quietly we'd watched this mouse sneak through our computer, out through a
hole, and into the military networks and computers.

At last I knew what this rodent was after.  And where he was from.  I'd been
mistaken.

This wasn't a mouse.  It was a rat.