**************************************************************************** >C O M P U T E R U N D E R G R O U N D< >D I G E S T< *** Volume 2, Issue #2.09 (October 27, 1990) ** **************************************************************************** MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet) ARCHIVISTS: Bob Krause / Alex Smith USENET readers can currently receive CuD as alt.society.cu-digest. COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted as long as the source is cited. It is assumed that non-personal mail to the moderators may be reprinted, unless otherwise specified. Readers are encouraged to submit reasoned articles relating to the Computer Underground. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Contributors assume all responsibility for assuring that articles submitted do not violate copyright protections. ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ CONTENTS: File 1: Moderators' Corner File 2: Len Rose Arrest File 3: Mars was not "Censored" File 4: Response to Mars "Censoring" File 5: Steve Jackson Games (SJG) Update File 6: The Future of Hacking and the System Security Profession File 7: The Ultimate Interface: Hackers and the Private Sector File 8: CU in the News: "Hackers" and Bank Blackmail in England ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ---------------------------------------------------------------------- ******************************************************************** *** CuD #2.09, File 1 of 8: Moderator's corner *** ******************************************************************** From: Moderators Subject: Moderators' Corner Date: October 27, 1990 ++++++++++ In this file: 1. COPYRIGHT ARTICLE INFORMATION 2. BIBLIOGRAPHIC RESOURCES +++++++++++++++ Copyright Article Information +++++++++++++++ CuD is *NOT* copyright, and articles by moderators, anonymous articles, and other articles may be reprinted as long as the source is attributed. However, occasionally an individual article is copyright protected. The article in CuD 2.08 by Jim Warren on "PCs and Political Organizing" is an example of a submission that is copyprotected but remains freely available for others' use. We have heard horror tales of authors who make public posts and then later find their material plagiarized and copyright protected under another's name. So, do not copyright others' material as your own. That's tacky--very, very tacky. If a CuD article is listed as copyright (this notice was excluded from Jim Warren's article), you should check directly with that author (not CuD) for permission to reprint it. ++++++++++++++++++ Bibliographic Resources +++++++++++++++++++ We are trying to compile a list of bibliographic sources related to the CU to eventually place in the archives. If you are writing term paper, conference papers, or articles, or if you come across books, legal cases, or other references that seem relevant, send the full citation over to us. If you come across new books, or better, if you do a book review, send the titles or the review along as well. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Moderators Subject: Len Rose Arrest Date: October 26, 1990 ******************************************************************** *** CuD #2.09: File 2 of 8: Len Rose Arrest *** ******************************************************************** Len Rose was arrested on state charges of "computer tampering" in Naperville, Ill., Naperville police confirmed Monday night. Len obtained a job at Interactive Systems Corporation, a software consulting firm, in Naperville and began Monday, October 15. Friday, he was fired. Bail was initially set at $50,000, and as of late Friday afternoon, he remained in jail. Len's wife speaks little English and is stuck in Naperville, lacking both friends and resources. Len currently has no money to post bond, and this leaves he and his family in a dreadful situation. We caution readers to remember that, under our Constitution, Len is *innocent* unless proven otherwise, but there is something quite troublesome about this affair. Hopefully, we'll soon learn what specific charges and what evidence led to those charges. Even if a "worst case" scenario evolves, there are surely better ways to handle such cases in less intrusive and devastating ways. Devastated lives and full invocation of the CJ process are simply not cost effective for handling these types of situations. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Gene Spafford Subject: Mars was not "Censored" Date: Sat, 20 Oct 90 14:11:52 EST ******************************************************************** *** CuD #2.09: File 3 of 8: Mars was not "Censored" *** ******************************************************************** I'm against censorship in pretty much any guise. I'm opposed to people who try to have gif images pulled from sites soley because of their sexually-oriented content. However, if I were running a news site, I would not carry the current alt.sex.pictures newsgroup, nor would I have an archive of the images. This is not a contradiction in terms. First off, I am not trying to have anyone else's collection of images pulled because of the subject matter, nor am I trying to prevent others from seeing those images. So, if I'm not against the subject matter of the material, why would I prevent their transmission through my site and storage on my disk? Reason number 1 is most of those images were scanned in from magazines and films that have active copyright protection. Scanning them in and transmitting them around is a violation of copyright. Not only is that not legal, I don't view it as proper to infringe on copyright. Storing those images is an infringement. Reason #2 is the quality of most of those images is poor compared with the original. If you want stuff like that, almost any bookstore or videotape rental place has the originals. Or, you can order by mail. I don't see the value of tying up bandwidth and storage to transmit poor copies of material that is generally available elsewhere. If the machine was a personal machine, I wouldn't keep the images because I have no use for them. They may (or may not) be interesting to look at some of them once, but after that I don't see any use for them. And as things go, I barely have enough free disk on most of machines as it is. If the machine was a shared machine, this reason would need to be explored with the other users, but it holds with most people I've talked with about these images. The bottom line is that there may be legitimate reasons not to have these images or carry newsgroups or mailing lists containing them. I think prudes are dangerous, but I also realize that everyone declining to have these images online is not automatically bowing to censorship or forbidding their presence because of content. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: portal!cup.portal.com!dan-hankins@SUN.COM Subject: Response to Mars "Censoring" Date: Sun, 21 Oct 90 00:04:25 PDT ******************************************************************** *** CuD #2.09: File 4 of 8: Response to Mars "Censoring" *** ******************************************************************** In article , Karl Lehenbauer writes, >I used Prodigy several times, and it is a heavily censored system,... This is inaccurate. Prodigy is not censored, it is _edited_. There is a significant difference. When newspaper articles are removed by government order, that's censorship. When the newspaper owners decide to not run an article because it is counter to their editorial policies (or personal prejudices), then that's editing. The difference is that in the first case, the State is telling a citizen (by threat of force) what she can and cannot do with her own property. In the second, a citizen is disposing of his property as he sees fit. The Prodigy situation is far more like the second case than the first. Prodigy resources are owned by IBM and Sears. Since Prodigy is their property, they may dispose of it as they see fit. This includes editing their databases to remove any information inconsistent with their policies. Some may argue that the $10 a month (plus fees for other services provided) gives the Prodigy subscriber the right to post anything she desires. This isn't the case. The subscriber is paying for the right to use the resources as provided for in the contract. Unless IBM and Sears agree in the contract not to edit or abridge information residing on Prodigy, they continue to have the right, both morally and legally, to do so. Censorship is when some organization says, "You may not say X.". Editing is when some organization says, "You may not use _my property_ to say X." This is an important distinction to make explicit; there is an increasing tendency for people to believe that they have not only the right to say whatever they want, but also the unlimited right to use the property of others to do so. Mr. Lehenbauer also writes, >If this is IBM's view of the future of personal electronic communications... >it is a bleak future indeed... every message must be so inoffensive that >*nobody* is going to be offended by it... and that is censorship. IBM doesn't control electronic communications in this country; the Prodigy subscriber is certainly free to go elsewhere to express his views. This is what many of them are doing. BIX is getting a lot of former Prodigy users these days. It's not censorship. It's also worth mentioning here that although the Prodigy bulletin board system is edited, Sears and IBM have agreed to not edit email. Users are free to form email groups (like Internet mailing lists) to discuss whatever they want, from sex to explosives. They just have to pay extra for it. In article In the MARS incident, the NSF flexed its fiscal muscles (according to those >on the receiving end). This is again not censorship. The NSF pays for the Internet, and has the right to say how those monies are spent. Since MARS resided on an Internet node, the NSF had the right to refuse to pay for those files to be transmitted across its network. In fact, the NSF has the right to refuse to pay for network connections for any site for any reason whatsoever, unless it has made a contract to the contrary. If this is "flexing its fiscal muscles", then so be it. The quoted article quotes some other postings. I reproduce here the relevant portions: >I also don't like the idea of the university having to censor this board to >suit the narrow-minded leanings of a few people... >Again i am sorry that CENSORSHIP found its way into another democratic haven >of society... This is just more of the sort of illogic I referred to earlier. If these folks want their X-rated pictures, then they can have them. They just can't expect somebody else (the NSF or their University) to pay for them. They are certainly free to start their own BBS or post the material on a private BBS or Usenet mail server that allows such stuff. >Can a few angry letters to a federal bureaucrat invoke threats of fiscal >blackmail? If I boycott your business because I find some of your activities objectionable, am I threatening you with fiscal blackmail? Why should the NSF or a university be any different? The NSF is just boycotting sites that carry material it finds offensive, and the universities are just exercising their right to control use of their property. >It would seem that officials could confiscate the equipment of a sysop who >maintained adult .gif/.gl files. If you are concluding this on the basis of the "federal prosecutions and application of RICO" referred to earlier, then I agree with you that it's something to be worried about. It would be a violation of various First Amendment rights. If you're concluding this by extension from the NSF actions, I must disagree. A government agency deciding what it wants to spend its money on is hardly analogous to confiscating someone's property. The legal right to do one does not provide the legal right to do the other. >A recent article... raised the spectre of "licensing" BBSs. Now _this_ is something to worry about. This reminds me of the situation in oppressive regimes, where printing presses and photocopiers are "licensed". Somehow I don't think they'll get away with this one. Any such regulation would be a clear violation of First (and other) Amendment rights. CLARIFICATION: When an organization is funded by extortion (i.e. taxes), those who fund it have a moral right to say how those funds will be spent, over and above the organization's aims. The receivers of the service _still_ don't have any rights of control, unless they have entered into a contract with the provider that gives them that right. In a constitutionally limited republic such as ours, that taxpayer control is exerted in one of two ways. The first is by electing to government those we believe will implement the policies we want. The second (and far more rare option) is referendum. As long as its decisions remain within the policies set for it by elected officials and referendum, the NSF has the right to spend (or refuse to spend) its money as it likes. If the article I read in CuD is any indication, the purpose of the NSFnet is to only support the exchange of "scholarly" information. X-rated GIFs don't belong in that category, in most folks' eyes. :END CLARIFICATION By the way, with PC-Pursuit costs, I pay $40 a month for Net access. Yet at work there is an Internet gateway I could sign up for access to and use to make my posts (for free!). The reason I don't is that I don't think it's moral to use IBM resources for purposes IBM wouldn't approve of, such as expressing disapproval of their policies; it's their property. So I'm not just spouting rhetoric that doesn't cost me anything. +++++++++ Dan Hankins dan-hankins@cup.portal.com dan-hankins@pro-realm.cts.com Complete the following: Pro is to Con as Progress is to ________. Disclaimer: I don't work for the NSF or Sears. Although I have a contract with IBM to provide programming services to them in return for a salary, this does not constitute approval for their policies. In particular, I think that their Prodigy policies, while not immoral, are particularly stupid. The kind of editing they do on the bulletin board, their ridiculously high email charges, and their complete lack of upload/download capability will simply drive customers to other services. I am not a Prodigy subscriber, nor do I intend to become one. For the same $10 a month, I like Portal much better. And I post things in alt.individualism that you'd never see on Prodigy BBS. I defend your right to freedom of expression. Just don't ask me or anyone else to foot the bill. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: Steve Jackson Subject: Steve Jackson Games (SJG) Update Date: October 23, 1990 ******************************************************************** *** CuD #2.09: File 5 of 8: Steve Jackson Games Update *** ******************************************************************** {The following, by Steve Jackson, is reprinted with permission from two posts on The Well--moderators}. ++++++++++++ UPDATE ON SJ GAMES ++++++++++++ We were raided on March 1. Most people here have heard that story, though I'm working on an article for upload. This is an excerpt, because I don't know when I'll have time to finish the whole thing. The brief story: The Secret Service took 3 computers, a laser printer, lots of assorted hardware, lots of disks and papers, and lots of my business data. In particular, they took every current copy, on paper or disk, of the new book we were about to send to the printer. Because of the confiscation of the GURPS Cyberpunk book, our business came to a standstill for six weeks - the time it took us to reconstruct it and get it to the printer. THE RETURN In early June, we started talking to the people setting up the EFF, and word leaked out; I got several inquiries from reporters. On June 20, quite suddenly, the Secret Service called to say we could have our property back. So we went to pick it up. They really did give most of our stuff back. They kept one hard disk and some assorted hardware, as well as some papers. Of the things they returned, one computer required $200 in repairs before it would work. Another has so much visible damage that I don't even want to turn it on. Loyd hasn't gotten ANY of his things back. And we still don't know why they raided us. They took our book; they took our BBS computer; they took a lot of things. And their application for a search warrant is STILL sealed. So we can speculate, but that's all. Nobody connected with the business has been arrested. Nobody has been indicted. Nobody has been charged. Nobody has even been QUESTIONED again. And these guys are still saying "No comment." Well, if I were in their shoes, I wouldn't have any comment, either. OUR CURRENT STATUS (SIGH) We're not a big business, and the cost of the raid (now well over $125,000) pushed us to the wall. We have been squeaking by ever since then - sometimes things look more hopeful, sometimes less. The problem is cash flow. We have kept up with our long-term debt (in fact, we've cleared all but $50K of it up, making most payments on the last day of the grace period), but we have been very slow-paying with current suppliers. We simply have no margin for error; any unexpected expense or failure of income will knock us off. As I write this, a couple of big receivables didn't come in when they should have; we're about to default on a note payment, and our big printers are demanding CASH NOW OR NO MORE PRINTING, for which I can't blame them. So the current news is not good. We should still be all right if we make it into 1991, but current cash is tighter than it has been for months. +++++++++++++ SIGNIFICANT STATUS UPDATE: +++++++++++++ The warrant application under which my offices were raided has been unsealed. It was unsealed a month ago! Apparently this was just after the last request from Silverglate and Good, but they were not informed that it had been unsealed. (Question of etiquette here?) At any rate, I got a copy today in a package from Senator Bentsen's office, in reply to my last letter asking if the Senator could help get this information. He could and did. Ver-r-r-r-y interesting. A copy has gone to Silverglate and Good, who should have comments shortly. Brief answers to oft-repeated questions, now that I really do know what's going on: Yes, this was connected to the Neidorf case. Specifically, my managing editor was being "accused" of receiving a copy of the Phrack issue with the E911 file and posting it on the BBS, Phoenix Project. The description of the E911 file included the same wild allegations that were exploded during the Phrack trial. No, there is nothing in the application to indicate that the GURPS CYBERPUNK game was a target when they came in the door (which does not mitigate the seriousness of their effective suppression of the text). Yes, they definitely knew that they were raiding a BBS system; it was one of the things they were after. The application specifically defined what a BBS is - though it did not mention the ECPA or the protections granted therein. No, they alleged no criminal behavior on my part or on the company's part. SJ Games was invaded because Loyd Blankenship was an employee and a co-sysop and frequent user of our BBS. No, there's nothing there to change my attitude toward Loyd. He is a valued employee, innocent until proven guilty, and they haven't even STARTED to prove anything. I am, no doubt, oversimplifying in my attempt to boil a large stack of paper down to a short update - but that does seem to me to be the gist of it. I'm sure the attorneys will have more to add soon. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: BORGVM Subject: The Future of Hacking and the System Security Profession Date: 22 Oct., '90 ******************************************************************** *** CuD #2.09: File 6 of 8: Hacking and System Security *** ******************************************************************** Before I begin the discussion of my views on the future of hacking and the system security profession, I feel it necessary to offer an introduction which I hope will aid in the understanding of my views. I am an ex-hacker, yet in saying so I do not rule out a few things which I associate with my personal perspective on hacking. To begin with, I have always associated hacking with a genuine lust for knowledge. Whether or not that knowledge was restricted solely depends on the views of the individual. For me, however, hacking was an acquisition of knowledge a form the military likes to give as a good reason to join it. You know, hands-on training, of course! It was an attempt to learn as many operating systems as possible. Their strengths in comparison to one another, their weaknesses, and their nuances. When I was hacking, data was sacred. It was something which must not be harmed. I can say with genuine conviction that every time I heard of destructive viruses, malicious crashes, or the like, I would become enraged far more than would your common security professional, who would most likely eye the event as a possibility to acquire cash, reputation in the foiling of the plot, or as leverage to gain funding and public support. Although my respect towards data is still very healthy, my urge to hack is not. After entering higher education, I have been granted an account on the mainframe with internet and bitnet access. This situation had served as a fuel towards my already healthy paranoia of law enforcement and their new technologies: its just not worth the risk. After my 'retirement', however, I began to ponder the devices available during the apex of my hacking career such as ANI (Automatic Number Identification) and CLID (Caller Line Identification) which could instantaneously register the number of any 800 caller, and processes inherent in some digital switching systems which register calls to local packet-switched networks, that about 20% of my hacks could be traced right to my doorstep by the right investigator. I also noted the increase in these types of investigators and the development of more organized computer-security networks involving FBI, Secret Service, and private computer security enterprises which developed highly efficient training methods: the numbers of security representatives in the telephone companies and computer networks has increased dramatically, and to a point where telephone company toll fraud is no longer convenient, for danger and convenience rarely coexist. I believe that the future will offer much protection from hacking, but only to a certain extent. One needs only to examine the header of a message originating from some microcomputer host which UUCP's it through half a dozen Usenet sites, the Internet, and finally to its BITNET destination to visualize, quite realistically, a phone number tagged onto the end of the originating userid. With digital technology advancing at its current rate, the possibilities are endless. It is for these reasons that the private computer security profession (at its current size) is only a short-term success sparked by mass press-generated hysteria, and blatant disinformation. The computer security profession did not receive its recognition from the voices of concerned individuals or even gluttonous corporations: it received the necessary attention and nurturing due to the paranoias of a corrupt military-minded government which knows exactly what it keeps on its systems and exactly why no one else must. You see, its a matter of 'national' security! Any good real hacker who has been around a few nets knows this. The time will come when a hacker will sit down at his terminal to hack a computer somewhere far away. This hacker might dial up a local network such as Tymnet or Telenet and connect to a computer somewhere. That remote computer's standard issue security drivers will sense an intrusion (user John Doe calling form a network address originating in California which is inconsistent with Mr. Doe's schedule,) request the network's CLID result, and forward the information directly to Mr. Hacker's local police department which is, in this day and age, fully equipped with the ability to centrally tap telco lines (data or otherwise.) The expert system at the police department verifies that the local data tap is indeed consistent with the victim computer's John Doe Session and sends out a dispatch. Sound like fantasy? Every bit of it is perfectly possible with our existing technology, and upon review of the chronology of computer security over the last three years, certainly probable. Data security professionals are as easily replacable by computers as are assembly-line workers. In this day (which will be, incidentally, just prior to the banning of Orwell's "1984") there will be a small but very knowledgeable and powerful group of hackers able to circumvent some of these security mechanisms. A group of hackers not large enough to present an obvious threat, but powerful enough to give a self-perpetuating technological dictatorship and its docile society a nice, re-asserting slap on the rear. ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ Subject: The Ultimate Interface: Hackers and the Private Sector From: Dark Adept Date: Tue, 23 Oct 90 22:19 CDT ******************************************************************** *** CuD #2.09: File 7 of 8: Hackers and the Private Sector *** ******************************************************************** The Ultimate Interface: Hackers and The Private Sector A major problem in Cyberspace is the lack of communication between hackers and non-hackers. Corporations are fully entitled to their privacy, and so they feel threatened by the hacker "menace." They view the hacker as the enemy, and so they persecute him. This is a valid belief since history shows that when a group does not understand another group, they try to destroy it. Saying this is valid does not make it right. If hackers and corporations and security companies and software companies, etc., etc., etc. were to overcome their differences much could be done. By trading bits and pieces of knowledge, the two opposing groups could together develop revolutionary advances in computing that would benefit all. The problem is to get the two groups to trust one another. In some upcoming G-Philes and submissions to CuD, I hope to break down this barrier of resentment by crossing over the lines of the Underground into the "real" world and providing valuable information about systems, security, interfacing, etc. from a hacker's/member-of-the-underground's point of view. I hope others will follow suit, and that the private sector will reciprocate by allowing technical information to flow into the Underground. Ultimately, I hope that there will be a rapport between hackers and members of the private sector so that we may learn from each other and make the best use possible of this greatest of inventions, the computer. Without further delay, then, I present the first of what I hope will be a long and successful series of articles. These must be short since they are merely articles, but I have planned a few full-length works that will be more in-depth; I will send them to the CuD archives as they become available. I hope you enjoy them. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- System Security: Security Levels and Partitioning by The Dark Adept Traditionally, security levels are used to prevent a user from gaining access to areas where he lacked legitimate interest. They also have another very useful purpose that is seldom recognized. They can be used as a firewall of sorts to stop the spread of viruses and the destruction of files by an intruder. A good analogy of this theory is ship design. When a ship is designed, the lower compartments are designed separate from each other so that if the hull is punctured, the flooding compartment may be sealed off thus localizing the damage and stopping the ship from sinking. In the same way accounts should be assigned security levels. However, if the accounts are fully isolated from one another, it is too restrictive to be of any real use. A user in Accounting would not be able to access the records from Personnel to find an employee's rate of pay, for example. Optimally, then, one would want a balance between freedom and security. This optimal assignment of security levels is accomplished through a two-stage step. The first stage is the creation of generic accounts. Many computer systems, such as those of schools, use generic accounts as their sole source of security. This is VERY dangerous. By generic accounts, I mean a set of basic accounts where each member has certain privileges assigned to it that differ from the other members. For example, in schools the teachers often receive one type of account, and students another. Besides the systems operator's account, these are the only two types of accounts available. The teachers have a wide-range of freedoms including being able to look into files that don't belong to their department since they can be trusted. The students have a limited amount of ability, mostly restricted to accessing their files only. But what happens if an intruder grabs a teacher's account? You got it, he has access to A LOT of stuff! Obviously, this won't do. However, generic accounts are useful if used in combination with other devices. This leads to the implementation of the second stage: security levels. Example: Let X, Y, and Z be generic accounts in system S with the following maximum abilities: X can access file areas A, B, C, D Y can access file areas B, D, J, K Z can access file areas B, C, J, L Assume some User, u, needs access to file areas B and L alone. Assign him account type Z with security modifications such that he may access only file areas B and L. This results in User u being restricted to the proper file areas, B and L, but allows ease of modification later if he needs access to areas C or J. It also allows for the greatest amount of security since his account type is Z so by definition he cannot access file areas A, D, or K without receiving a new account. Therefore, if an intruder takes control of account u, he cannot destroy more than areas B and L without modification. The most he can modify account u to have access to is areas B, C, J, and L. Therefore the damage will be localized to file areas B, C, J, and L. The only way he can enter the other areas is to get a new account. This is much more difficult than modifying one he already has. The same sort of setup may be applied to commands, usage times, dialup ports, etc. For example, say the editor of a newspaper has account Z that has maximum port capability of T, t1, t2, t3 where T is a terminal in his office and t1, t2, and t3 are outside lines. At first he is assigned a security level that allows access to T only so his account cannot be accessed from intruders outside thus stopping someone from deleting all of tomorrow's edition. Now, if he must go on location somewhere, it would be a simple matter to modify his account to give him access to t1 so he can call up and review the submissions. Yet, again, if there exist ports t4, t5, etc., these would NEVER be able to access the files since account type Z is incapable of being accessed through these ports. What follows here is a mathematical model of account partitioning using concepts of discrete mathematics. Since this is a text file and cannot use graphics characters, some common mathematical symbols must be defined using regular characters. Symbols: -------- | = "such that" (ordinarily a vertical bar) \e\ = "is an element of" (ordinarily an emphasized epsilon) <==> = "if and only if" Model: ----- Let S represent a computer system. Let S1 be a set of different areas of interest in a computer system. This is modelled by S1={a1,a2,a3,...,an} where n is some integer, and a1,a2, a3,... are the areas of interest in S. Let S2 be a set of different user accounts in a computer system. This is modelled by S2={u1,u2,u3,...,uq} where q is some integer, and u1,u2, u3,... are the user accounts in S. Let x \e\ S2. Let y \e\ S1. Let r be a relation on S defined as this: xry <==> x \e\ S2 | x has access to y. Now r becomes a partitioning relation on S2. The function that defines r is determined by how the operator wants his accounts set up. Further, the equivalence class of x, [x], defines the generic account. Example: Say S has accounts u1, and u2. It also has areas of interest a1, a2,a3. Now say the operator wants u1 to have access to a1 and a2, and u2 to have access to a1 and a3. By defining r in the proper manner he gets: r ={(u1,a1), (u1,a2), (u2,a1), (u2,a3)}. Now [u1]={a1, a2} and [u2] = {a2, a3}. Thereby defining the generic accounts. Now let G be the set of all of the equivalence classes determined by xry that define generic accounts in S. This is seen as G={[x]|x /e/ S2}. For clarity, let g1 = [u1], g2 = [u2], ... so we have G={g1,g2,...gq} where q is some integer. Now let d \e\ G. We define w to be a relation as such: dwy <==> d \e\ G | d has access to y. Now w becomes a partitioning relation on G. The function that defines w is determined by how the operator wants to implement a generic account for a particular user. Further, the equivalence class of d, [d], defines the specific user account. Example: Say S has generic account g1 set up. It has areas of interest a1, a2, and a3. g1 is partitioned in such a way that it can only access a1 and a3. Now say the operator wants a certain holder of a generic account type g1 to have access only to a1. By defining w in the proper manner he obtains: w={(g1,a1)}. Now [g1]={a1} thereby defining an appropriate user account. As some may have noticed, accounts can be partitioned ad infinitum. In most cases I have found two partitions to be sufficient. An interesting adaptation is also to use this method to define what users have access to which commands. It again allows much room for change while keeping things safely separate. The ultimate safety would come when the first partition is defined in the operating/timesharing system itself. For example, if Unix (Tm of AT&T) came with say 30 different file areas and accounts accessing those areas in specialized ways, then even if an intruder grabbed the root account, he could not change the first level of partitioning to access all those accounts. As I hope I have shown, the proper use of generic accounts and security levels allows the optimum balance of security and ability. By properly partitioning accounts, the system operator can isolate a problem to a relatively small area allowing faster restructuring afterward. I hope you have enjoyed this article. I can be reached for comments, criticism, and E-mail bombs at Ripco BBS (312)-528-5020. Also, if you liked this article, you may comment to Jim Thomas (editor of CuD) and he can pass the general reception on to me. Written 10/21/90 in Chicago, IL -- The Dark Adept ******************************************************************** >> END OF THIS FILE << *************************************************************************** ------------------------------ From: P.A.Taylor@EDINBURGH.AC.UK Subject: CU in the News: "Hackers" and Bank Blackmail in England Date: 24 Oct 90 12:59:34 bst ******************************************************************** *** CuD #2.09: File 8 of 8: CU in the News: Hackers/English Banks** ******************************************************************** Taken from: "The Independent On Sunday," October 14, '90: Mysterious computer experts demand money to reveal how they penetrated sophisticated security. HACKERS BLACKMAIL FIVE BANKS by Richard Thomson At least four British clearing banks and one merchant bank in the City are being blackmailed by a mysterious group of computer hackers who have broken into their central computer systems over the last six months. These breaches of computer security may be the largest and most sophisticated ever among British Banks. The electronic break-ins which began last May, could cause chaos for the banks involved. Once inside their systems, the hackers could steal information or indulge in sabotage, such as planting false data or damaging complex computer programs.It is unlikely, however, they would be able to steal money. So far, the hackers have contented themselves with demanding substantial sums of money in return for showing the banks how their systems where penetrated. None of the banks has yet paid. The break-ins are evidence of the rapid growth in computer fraud and manipulation in Britain. Although most hacking is relatively trivial, the latest cases show much sophistication. The hackers have concentrated on tapping the banks' electronic switching systems which, among other things, control the routing of funds around the world. Some of the hackers are in contact with each other, but they are believed to be operating individually. One computer expert described their level of expertise and knowledge of the clearing bank computer systems as "truly frightening". They are not believed to have links with organised crime, which has become heavily involved in computer hacking in the US over the last two to three years. It is a severe embarrassment for the banking community which is frightened that public awareness of the security breach could undermine public confidence. As a result, they have not called in the police but have hired a firm of private investigators, Network Security Management, which is owned by Hambros Bank and specialises in computer fraud. It is common for banks not to report fraud and security failures to the police for fear of damaging publicity. All the banks approached either denied that they were victims of the blackmail attempt or refused to comment. The hunt for the hackers is being led by David Price, managing director of NSM, who confirmed his firm was investigating computer security breaches at five British banks. "I am confident of success in catching the hackers," he said. "The amount of information they can get from the banks will vary depending on the computer systems and the ways the hackers broke into them," he added. "They could go back in and sabotage the systems, but they are not threatening to do so." The ease with which the hackers appear to have penetrated the systems highlights the vulnerability of the computer data. Clearing banks in particular rely on huge computer systems to control their operations, from cash dispenser payments to massive international transfers of funds. Security measures were tightened after a large computer fraud at a leading City bank three years ago Although the bank involved was never named, it is understood the money was never recovered. Nevertheless, the speed with which computer technology has developed in the last few years has made the detection of security breaches more difficult. According to an expert, who recently advised one of the big four clearers on its computer systems, there are few people who understand the banks system well enough even to detect a break-in. Computer-related fraud has boomed over the last decade as businesses have come to rely more heavily on electronic information. According to some reputable UK and US estimates, up to 5% of the gross national product of western economies disappears in fraud. Experts say that the senior managers of many companies simply do not appreciate the need for tight security. The British legal system has been slow to respond. The Computer Misuse Act which makes it illegal to access a computer without authorisation, came into effect only at the end of August this year. (end article) ++++++++++++++++++++++++++++++++++++++++++++ The follow-up article (from The Independent on Oct 21), also by Richard Thomson, is basically much of the same thing. He quotes a hacker from the US who's computer "nom de guerre" is Michael Jordan who makes the following points. 1.One large US bank is notorious for lax security and it has effectively become a training ground for hackers. 2. Guessing passwords is sometimes "absurdly simple", they tend to choose words like "Sex, Porsche, or Password" 3.Social Engineering techniques are used and he would spend approx 6 weeks trying to suss out from a manager's secretary etc. anything he could find out that would help him have a better chance of accessing a bank's system. The main body of the article is pretty glib; it has the usual stock phrases like..."Hackers and Bank employees have always been a danger, but now there are signs that yesterdays bank robbers have hung up their sawn-off shot-guns and are turning to computers instead." and even more hypey is ... " Mr Jordan claims to have been shown pictures of people in organised crime. "They're East End lads who've become more sophisticated now. I've been told that if they ask you to help them and you refuse, it's baseball bats at dawn." There's also a discussion of the reliability of fraud figures, a mention of how various definitions can exaggerate the actual role played by the computer. Detective Chief Superintendent Perry Nove head of the city fraud squad defines "computer fraud" as ... "It is when the computer system itself is attacked rather than just used to facilitate an offence" The main conclusion on the whole area of fraud is "...the subject remains cloaked in mythology and mystery.Naturally, no one knows how many frauds are commited that are never discovered. Matters are further obscured because banks fearful of bad publicity, sometimes do not report frauds to the police- a situation that Mr Nove accepts with resignation. There is general agreement among hackers and other experts that it is more widespread and more sophisticated in the US, that it is growing in Britain, but that British Banks are more secure than those in America and the Continent. That is about as reliable as the detailed information gets." I hope I've summed up the general tone of the whole article, it was in the business section of The Independent On Sunday, 21st Oct. The paper's normally a very good one, so the generally bad coverage this bloke Thomson gave to the subject of hacking, and the amount of what I'd call "casual empiricism" he used to back up his arguments, is sadly probably indicative of what the CU is up against in the way of ignorance and bad reporting. I thought it was quite ironic that he recognised the role of mystery and mythology, since he seemed to be doing his best to add to it. Finally, if he'd of mentioned the word expert once more ..grrrrrrr.... Cheers for now, P.A.T. ******************************************************************** ------------------------------ **END OF CuD #2.09** ********************************************************************