- Home
- by Winn Schwartau
Terminal Compromise Page 6
Terminal Compromise Read online
Page 6
Excellent! Hey, Lori's on the line. gotta go.
TA
[[[ CONNECTION TERMINATED ]]]
The screen of his communications program returned to a list of names and phone numbers. Lori said she'd be over in an hour and Steven Billings was tempted to dial another couple of numbers before his date with Lori. But if he found something interesting it might force him to be late, and Lori could not tolerate play- ing second fiddle to a computer.
Steven Billings, known as "KIRK, where no man has gone before", by fellow hackers, had finished his midterms at San Diego State University. The ritual labors were over and he looked forward to some relax time. Serious relax time.
The one recreation he craved, but downplayed to Lori, was spend- ing time with his computer. She was jealous in some respects, in that it received as much attention from Steve as she did. Yet, she also understood that computers were his first love, and they were part of his life long before she was. So, they came with the territory. Steve attended, upon occasion, classes at SDSU, La Jolla. For a 21 year old transplant from Darien, Connecticut, he lived in paradise.
Steve's single largest expense in life was his phone bill, and instead of working a regular job to earn spending money, Steve tutored other students in their computer courses. Rather than flaunt his skills to his teachers and risk extra assignments, he was more technically qualified than they were, he kept his mouth shut, sailed through classes, rarely studied and became a full time computer hacker. He translated his every wish into a com- mand that the computer obeyed.
Steve Billings did not fill the picture of a computer nerd. He was almost dashing with a firm golden tanned 175 pound body, and dark blond hair that caused the girls to turn their heads. He loved the outdoors, the hot warmth of the summer to the cooler warmth of the winter, surfing at the Cardiff Reef and betting on fixed jai-alai games in Tijuana. He played soccer and OTL, a San Diego specific version of gloveless and topless co-ed beach softball. In short, he was a guy. A regular guy.
The spotlessly groomed image of Steve Billings in white tennis shorts and a "Save the Whales" tank-top eclectically co-existed with the sterile surroundings of the mammoth super computer center. The Cray Y-MP is about as big and bad a computer as money can buy, and despite Steve's well known skills, the head of the Super Computing Department couldn't help but cringe when Steve leaned his surf board against the helium cooled memory banks of the twelve million dollar computer.
He ran his shift at the computer lab so efficiently and effort- lessly that over time he spent more and more of his hours there perusing through other people's computers. Now there was a feel- ing. Hacking through somebody else's computer without their knowledge. The ultimate challenge, an infinity of possibilities, an infinity of answers.
The San Diego Union was an awful paper, Steve thought, and the evening paper was even worse. So he got copies of the New York City Times when possible, either at a newsstand, borrowed from yesterday's Times reader or from the library. Nice to get a real perspective on the world. This Sunday he spent the $4.00 to get his own new, uncrumpled and unread copy of his revered paper, all thirty four pounds of it. Alone. Peace.
Reading by the condo pool an article caught his eye. Steve remembered a story he had heard about a hacker who had invaded and single handedly stopped INTERNET, a computer network that connected together tens of thousands of computers around the country.
* * * * *
Government Defense Network Halted by Hacker
by Scott Mason, New York City Times
Vaughn Chase, a 17 year old high school student Galbraith High School in Ann Arbor, Michigan was indicted today on charges that he infected the nationwide INTERNET network with a computer virus. This latest attack upon INTERNET is reminiscent of a similar incident launched by Robert Morris of Cornell University in November, 1988.
According to the Computer Emergency Response Team, a DARPA spon- sored group, if Mr. Chase had not left his name in the source code of his virus, there would have been no way to track down the culprit.
A computer virus is a small software program that is secretly put into a computer, generally designed to cause damage. A virus attaches itself to other computer programs secretively. At some time after the parasite virus program is 'glued' into the comput- er, it is reawakened on a specific date or by a particular se- quence of events.
Chase, though, actually infected INTERNET with a Worm. A Worm is a program that copies itself, over and over and over, either filling the computer's memory to capacity or slowing down its operation to a snail's pace. In either case, the results are devastating effectively, the computer stops working.
Chase, a math wizard according to his high school officials, released the Worm into Internet in early August with a detonation date of September 1, which brought thousands of computers to a grinding halt.
INTERNET ties together tens of thousands of computers from the Government, private industry, universities and defense contrac- tors all over the country. Chase said he learned how to access the unclassified computer network from passwords and keys dis- tributed on computer Bulletin Boards.
Computer security experts worked for 3 days hours to first deter- mine the cause of the network slowdown and then to restore the network to normal operation. It has been estimated that almost $100 Million in damage was caused by Mr. Chase's Worm. Mr. Chase said the Worm was experimental, and was accidentally released into INTERNET when a piece of software he had written malfunc- tioned. He apologized for any inconvenience he caused.
The Attorney General of the State of Michigan is examining the legal aspects of the case and it is expected that Mr. Chase will be tried within in a year. Mr. Chase was released on his own recognizance.
This is Scott Mason wondering why the Pentagon doesn't shoot worms instead of bombs at enemy computers.
* * * * *
The next day Steve Billings signed on to the SDSU/BBS from his small Mission Beach apartment. It was a local university Bulletin Board Service or BBS. A BBS is like a library. There are li- braries of software which are free, and as a user you are recip- rocally expected to donate software into the Public Domain. Con- ference Halls or Conversation Pits on the BBS are free-for-all discussions where people at their keyboards can all have a 'live' conversation. Anyone, using any computer, anywhere in the world can call up any BBS using regular phone lines. No one cared or knew if you were skinny, fat, pimpled, blind, a double for Christy Brinkley or too chicken shit to talk to girls in person. Here, everyone was equal.
Billings 234
XXXXXXXXXXXXXXXX
There was a brief pause.
WELCOME TO THE SDSU/BBS. STEVE BILLINGS, YOU ARE USER #109
Steve Chose (12) for SERVICES:
The menu changed to a list of further options. Each option would permit the user to gain access to other networks around the country. From one single entry point with a small computer, anyone could 'dial up' as it's called, almost any of over 20,000,000 computers in the country tied into any of ten thousand different networks.
SDSU/BBS WINDOW ON THE WORLD
NETWORK SERVICES MENU
Steve selected CALNET, a network at Cal Tech in Los Angeles. Many of the Universities have permanent connections between their computers.
LOGON: Billings014
PASSWORD: XXXXKIRKXXXX
Again, there was a pause, this time a little longer. Now, from his room, he was talking to a computer in Los Angeles. There was another menu of options, and a list of other widely dispersed computer networks. He requested the SUNYNET computer, the State University of New York Network. From there, he asked the comput- er for a local phone line so he could dial into a very private, very secret computer called NEMO.
It took Steve a grand total of 45 seconds to access NEMO in New York, all at the price of a local phone call.
NEMO was a private BBS that was restricted to an elite few. Those who qualifications and reputations allowed them entry into the exclusive domain of hacking. NEMO was bo
rn into this world by Steve and a few of his friends while they were in high school in Darien. NEMO was a private club, for a few close friends who enjoyed their new hobby, computers.
NEMO's Menu was designed for the professional hacker.
1. PASSWORDS
2. NEW NETS
3. DANGER ZONES
4. CRACKING TOOLS
5. WHO'S NEW?
6. PHREAKING
7. CRYPTO
8. WHO ELSE?
9. U.S. NETWORKS
10. INTERNATIONAL NETWORKS
11. FOR TRADE
12. FORTUNE 500 DOORKEYS
He selected (8), WHO ELSE? Steve wanted to see who else was 'on- line' now. He wanted to talk about this Chase guy who was giving hackers a bad name. The computer responded:
CONVERSATION PIT: LA CREME, RAMBO. DO YOU WANT TO JOIN IN?
That was great! Two of the half dozen of NEMO's founders were there. La Creme de la Creme was KIRK's college roommate, but he had not yet returned to San Diego for the fall term. RAMBO, 'I'll get through any door' was the same age as Kirk and Creme, but chose to study at Columbia in New York's Harlem. Hackers picked alter ego monikers as CB'ers on the highways did; to project the desired image. Steve and his cohorts picked their aliases when they were only fifteen, and kept them ever since.
Steve typed in a 'Y' and the ENTER key.
WHO ARE YOU?
NEMO was asking for an additional password.
Kirk
Steve typed. A brief pause, and the computer screen came to life.
WELCOME TO THE CONVERSATION PIT, KIRK. HOW HAVE YOU BEEN?
That was his invitation to interrupt any conversation in progress. Steve typed in,
Dudes!
HOW'D EXAMS GO? [LA CREME]
Greased'em. Ready to come back?
FAST AS THE PLANE WILL GO. PICK ME UP? 7:20 ON AMERICAN[LA CRE]]
Sure. Hey, what's with the Morris copy cat? Some phreak blowing it for the rest of us.
SO YOU HEARD. CHASE IS REALLY GONNA SCREW THINGS UP. [RAMBO]
What the hell really happened? I read the Times. Said that he claimed it was accident.
ACCIDENTAL ON PURPOSE MAYBE [LA CREME]
HOW MANY WAYS ARE THERE INFECT A NATIONAL DEFENSE NETWORK? ONE THAT I KNOW OF. YOU PUT THE VIRUS IN THERE. THAT'S NO ACCIDENT. [RAMBO]
Ten-Four. Seems like he don't wanna live by the code. Must be some spoiled little brat getting too big for his britches . . .
BEST GUESS IS THAT HE DID IT TO IMPRESS HIS OLD MAN. HE SUPPOS- EDLY CREATED AN ANTIDOTE, TOO. HE WANTED TO SET OFF A BIG VIRUS SCARE AND THEN LOOK LIKE A HERO WITH A FAST FIX. THE VIRUS WORKED ALL TOO WELL. THE ANTIDOTE, IF THERE WAS ONE, SUCKED. SO INTERNET HAD GAS SO BAD, COMPUTING CAME TO A HALT FOR A COUPLE OF DAYS TILL THEY CLEANED OUT THE PROVERBIAL SEWERS. [LA CREME]
SURE SOUNDS LIKE A PUBLICITY GAG TO ME [RAMBO]
Jeez. Anyone else been hit yet?
NO, BUT WE'VE BEEN EXTRA CAREFUL SINCE. A LOT OF DOORS HAVE BEEN CLOSED SO IT'S BACK TO SQUARE ONE ON A BUNCH, BUT WE DIDN'T LOSE EVERYTHING. THE DOORKEY DOWNLOAD WILL UPDATE YOU. [RAMBO]
OK, I'll be supersleuth. Any word on CHAOS? Legion of Doom, The Crusaders?
IT'S ONE BIG DEAL IN THE E-MAIL: NEW CHAOS VIRUSES, EVERY DICK AND JANE IS WRITING THEIR OWN VIRUSES. COMPUTING WITH AIDS.
Funny. Why don't you put a rubber on your big 640K RAM? Or your mouse?
GOT SOMETHING AGAINST SAFE COMPUTING? IF HALF OF WHAT THEY SAY IS TRUE, WE'RE ALL IN TROUBLE. TAKE A LOOK AT THE PUBLIC BBS'S. QUITE A CHAT. [LA CREME]
Will do. Any word on the new Central Census Data Base? Every- thing about every American stored in one computer. All of their personal data, ripe for the picking. Sounds like the kind of library that would do the bad guys a lot of good.
CAN'T FIND A DOOR FROM THE INTERNET GATE. THE JUSTICE LINK WAS STILL GOOD YESTERDAY AND THE FBI STILL HASN'T CHANGED A PASSWORD, SO THAT SHOULD BE AN EASY OPEN ONCE WE FIND THE FRONT DOOR. GIMME A COUPLE OF DAYS AND WE SHOULD KNOW DAN QUAYLES' JOCK SIZE. [RAMBO]
Zero! Ha! Keep me in mind.
* * * * *
Steve copied several pages of names, phone numbers and passwords from NEMO's data base into his computer 3000 miles across the country. These were the most valuable and revered types of files in the underground world of hackerdom. They include all of the information needed to enter and play havoc inside of hundreds of secret and private computers.
National Institute of Health 301-555-6761
USER: Fillstein PASSWORD: Daddy1
USER: Miller9 PASSWORD: Secret
VMS 1.01
SUPERUSER: B645_DICKY
VTEK NAS, Pensacola, Fla 904-555-2113
USER: Major101 PASSWORD: Secret
USER: General22 PASSWORD: Secret1
USER: Forestall PASSWORD: PDQS
IBM, Armonk, Advanced Research 914-555-0965
USER: Port1 PASSWORD: Scientist
USER: Port2 PASSWORD: Scientist
USER: Port3 PASSWORD: Scientist
There were seventeen pages of updated and illegal access codes to computer systems across the country. Another reason NEMO was so secret. Didn't want just anybody climbing the walls of their private playground. Can't trust everyone to live by the Code.
Steve finished downloading the files from NEMO's distant data base and proceeded to print them out for a hardcopy reference. He laughed to himself. Big business and government never wizened up. Predictable passwords, like 'secret' were about as kinder- garten as you could get. And everyone wonders why folks like us parade around their computers. He had in his hand a list of over 250 updated and verified private, government and educational institutions who had left the keys to the front doors of their computers wide open. And those were just the ones that NEMO knew about today.
There is no accurate way to determine how many groups of hackers like NEMO existed. But, even if only 1/100 of 1% of computer users classified themselves as hackers, that's well over 100,000 people breaking into computers. Enough reason to give Big Busi- ness cause for concern. Yet, no one did anything serious to lock the doors.
Steve spent the next several hours walking right into computer systems all over the country. Through the Bank of California in San Francisco, (Steve's first long distance call) he could reach the computers of several corresponding banks. He read through the new loan files, saw that various developers had defaulted on their loans and were in serious trouble. Rates were going to start rising. Good enough for a warm up.
Steve still wanted back into the NASA launch computers. On line launch information, results of analysis going back twenty years, and he had had a taste of it, once. Then, one day, someone inside of NASA got smart and properly locked the front door. He and NEMO were ever on the search for a key back into NASA's computers.
He figured that Livermore was still a good bet to get into NASA. That only meant a local call, through the SDSU/BBS to Cal Tech then into Livermore. From San Diego, to LA, to San Francisco for a mere 25 cents.
Livermore researchers kept the front doors of their computers almost completely open. Most of the workers, the graduate stu- dents, preferred a free exchange of information between all scientists, so their computer security was extraordinarily lax. For a weapons research laboratory, funded by the Department of Energy, it was a most incongruous situation.
Much of the information in the Livermore computers was considered sensitive but unclassified, whatever that meant in government speak, but for an undergraduate engineering major cum hacker, it was great reading. The leading thinkers from the most technical- ly demanding areas in science today put down their thoughts for the everyone to read. The Livermore scientists believed in freedom of information, so nearly everyone who wanted in, got in. To the obvious consternation and dismay of Livermore management. And its funding agency.
Steve poked around the Livermore computers for a while and learned that SDI funding was in more serious jeopardy than pub- licly acknowledged. He discovered that the last 3 underground nuclear t
est explosions outside of Las Vegas were underyield, and no one knew why. Then he found some super-technical proposals that sounded like pure science fiction:
Moving small asteroids from between Mars and Jupiter into orbit around the Earth would make lovely weapons to drop on your ene- mies. War mongers.
All of this fascinating information, available to anyone with a computer and a little chutzbah.
* * * * *
Alexander Spiradon had picked Sir George and his other subjects carefully, as he had been trained to do.
He had spent the better part of twenty years working for West German Military Intelligence, Reichenbunnestrad Dunnernecht Deutchelande, making less money than he required to live in the style he desired. To supplement his income, he occasionally performed extracurricular activities for special interest groups throughout Europe. A little information to the IRA in Northern Ireland, a warning to the Red Brigade about an impending raid. Even the Hizballah, the Party of God for Lebanese terrorists had occasion to use Alex's Services. Nothing that would compromise his country, he rationalized, just a little help to the various political factions that have become an annoyance to their respec- tive governments.
Alex suddenly resigned in 1984 when he had collected enough freelance fees to support his habits, but he was unaware that his own agency had had him under surveillance for years, waiting for him to slip up. He hadn't, and with predictable German Govern- ment efficiency, upon his departure from the RDD, his file was promptly retired and his subsequent activities ignored.
Alex began his full time free-lance career as a 'Provider of Information'. With fees of no less than 250,000 DM, Alex didn't need to work much. He could pick and choose his clients as he weighed the risks and benefits of each potential assignment. With his network of intelligence contacts from Scotland Yard, Le Surite, and the Mossad, he had access to the kind of information that terrorists pay for dearly .