Copy Link
Add to Bookmark
Report
Phrack Inc. Volume 03 Issue 32 File 07
==Phrack Classic==
Volume Three, Issue 32, File #7 of 12
13th Annual National Computer Security Conference
October 1-4, 1990
Omni Shoreham Hotel
Washington, D.C.
A "Knight Lightning" Perspective
by Craig M. Neidorf
Dr. Dorothy Denning first hinted at inviting me to take part on her panel
"Hackers: Who Are They?" in May 1990 when we first came into contact while
preparing for my trial. At the time I did not feel that it was a very good
idea since no one knew what would happen to me over the next few months. At
the conclusion of my trial I agreed to participate and surprisingly, my
attorney, Sheldon Zenner (of Katten, Muchin, & Zavis), accepted an invitation
to speak as well.
A few weeks later there was some dissension to the idea of having me appear at
the conference from some professionals in the field of computer security. They
felt that my presence at such a conference undermined what they stood for and
would be observed by computer "hackers" as a reward of sorts for my notoriety
in the hacker community. Fortunately Dr. Denning stuck to her personal values
and did not exclude me from speaking.
Unlike Gordon Meyer, I was unable to attend Dr. Denning's presentation
"Concerning Hackers Who Break Into Computer Systems" and the ethics sessions,
although I was informed upon my arrival of the intense interest from the
conference participants and the reactions to my now very well known article
announcing the "Phoenix Project."
Not wishing to miss any more class than absolutely necessary, I arrived in
Washington D.C. late in the day on Wednesday, October 4th. By some bizarre
coincidence I ended up on the same flight with Sheldon Zenner.
I had attended similar conventions before such as the Zeta Beta Tau National
Convention in Baltimore the previous year, but there was something different
about this one. I suppose considering what I have been through it was only
natural for me to be a little uneasy when surrounded by computer security
professionals, but oddly enough this feeling soon passed as I began to
encounter friends both old and new.
Zenner and I met up with Dorothy and Peter Denning and soon after I met Terry
Gross, an attorney hired by the Electronic Frontier Foundation who had helped
with my case in reference to the First Amendment issues. Emmanuel Goldstein,
editor of 2600 Magazine and probably the chief person responsible for spreading
the news and concern about my indictment last Spring, and Frank Drake, editor
of W.O.R.M. showed up. I had met Drake once before. Finally I ran into Gordon
Meyer.
So for a while we all exchanged stories about different events surrounding our
lives and how things had changed over the years only to be interrupted once by
a odd gentleman from Germany who inquired if we were members of the Chaos
Computer Club. At the banquet that evening, I was introduced to Peter Neumann
(who among many other things is the moderator of the Internet Digest known as
"RISKS") and Marc Rotenberg (Computer Professionals for Social Responsibility).
Because of the great interest in the ethics sessions and comments I had heard
from people who had attended, I felt a strange irony come into play. I've
hosted and attended numerous "hacker" conventions over the years, the most
notable being "SummerCon". At these conventions one of the main time consuming
activities has always been to play detective and attempt to solve the mystery
of which one of the guests or other people at the hotel were there to spy on us
(whether they were government agents or some other form of security personnel).
So where at SummerCon the youthful hackers were all racing around looking for
the "feds," at the NCSC I wondered if the security professionals were reacting
in an inverse capacity... Who Are The Hackers? Despite this attitude or maybe
because of it, I and the other panelists, wore our nametags proudly with a
feeling of excitement surrounding us.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
October 4, 1990
Dorothy Denning had gathered the speakers for an early morning brunch and I
finally got a chance to meet Katie Hafner in person. The panelists discussed
some possibilities of discussion questions to start off the presentation and
before I knew it, it was time to meet the public.
As we gathered in the front of the conference room, I was dismayed to find that
the people in charge of the setting up the nameboards (that would sit in front
of each panelist) had attended the Cook school of spelling and labeled me as
"Neirdorf." Zenner thought this was hysterical. Luckily they were able to
correct the error before we began.
Hackers: Who Are They?
Dr. Denning started the presentation by briefly introducing each panelist and
asking them a couple of questions.
Katie Hafner disputed the notion that her work has caused a glorification
of hacking because of the severe hardships the people she interviewed had to
endure. I found myself sympathizing with her as I knew what it was like to
be in their positions. Many people commented later that her defense of Mitnick
seemed a little insincere as he had indeed committed some serious acts. Not
knowing all of the details surrounding Mitnick's case and not relying on the
general newsmedia as a basis for opinion I withheld any sort of judgment.
Emmanuel Goldstein and Frank Drake appeared to take on the mantle of being the
spokespersons for the hackers, although I'm unsure if they would agree with
this characterization. Drake's main point of view dealt with the idea that
young hackers seek to be able to use resources that they are otherwise excluded
from. He claimed to once have been a system intruder, but now that he is in
college and has ample computing resources available to him, he no longer sees a
need to "hack."
Goldstein on the other hand sought to justify hacking as being beneficial to
society because the hackers are finding security holes and alerting security to
fix these problems before something catastrophic occurs.
Gordon Meyer tried to explain the hacker mind-set and how the average hackers
does not see using corporate resources as having a real financial burden to
today's companies. Some people misunderstood his remarks to be speaking from a
factual position and took offense, stating that the costs are great indeed.
He also explained the differences between Phrack and the Computer Underground
Digest. Most notable is that CuD does not print tutorials about computer
systems.
Sheldon Zenner focused on the freedom of the speech and press issues. He also
spoke about technical details of the U.S. v. Neidorf case and the court rulings
that resulted from it. One major point of interest was his quite reasonable
belief that the courts will soon be holding companies financially liable for
damages that may occur because of illegal intrusion into their systems. This
was not to suggest that a criminal defense strategy could be that a company did
not do enough to keep an intruder out, but instead that the company could be
held civilly liable by outside parties.
Zenner and Denning alike discussed the nature of Phrack's articles. They found
that the articles appearing in Phrack contained the same types of material
found publicly in other computer and security magazines, but with one
significant difference. The tone of the articles. An article named "How to
Hack Unix" in Phrack usually contained very similar information to an article
you might see in Communications of the ACM only to be named "Securing Unix
Systems." But the differences were more extreme than just the titles. Some
articles in Phrack seemed to suggest exploiting security holes while the
Communications of the ACM concentrated more on fixing the problem. The
information in both articles would be comparable, but the audiences reading and
writing these articles were often very different.
I explained the concept and operation of Phrack and wandered into a discussion
about lack of privacy concerning electronic mail on the Internet from
government officials, system managers, and possibly even by hackers. I went on
to remark that the security professionals were missing the point and the
problem. The college and high-school students while perhaps doing some
exploration and causing some slight disturbances are not the place to be
focusing their efforts. The real danger comes from career criminals and
company insiders who know the systems very well from being a part of it. These
people are the source of computer crime in this country and are the ones who
need to be dealt with. Catching a teenage hacker may be an easier task, but
ultimately will change nothing. To this point I agreed that a hacker gaining
entry and exposing holes on computer systems may be a service to some degree,
but unlike Goldstein, I could not maintain that such activity should bring
prosecutorial immunity to the hacker. This is a matter of discretion for
security personnel and prosecutors to take into consideration. I hope they do.
To a large degree I was rather silent on stage. Perhaps because I was cut off
more than once or maybe even a little stagefright, but largely because many of
the questions posed by the audience were wrong on their face for me to answer.
I was not going to stand and defend hacking for its own sake nor was I there to
explain the activities of every hacker in existence.
So I let Goldstein and Drake handle questions geared to be answered by a system
intruder and I primarily only spoke out concerning the First Amendment and
Phrack distribution. In one instance a man upset both by Drake's comments
about how the hackers just want to use resources they can't get elsewhere and
by Goldstein's presentation of the Operation Sun-Devil raids and the attack on
"Zod" in New York spoke up and accused us of being viciously one sided.
He said that none of us (and he singled me out specifically) look to be age 14
(he said he could believe I was 18) and that "our" statement that its ok for
hackers to gain access to systems simply because they lacked the resources
elsewhere meant it was ok for kids to steal money to buy drugs.
I responded by asking him if he was suggesting that if these "kids" were rich
and did not steal the money, it would be ok to purchase drugs? I was sure that
it was just a bad analogy so I changed the topic afterwards. He was right to a
certain extent, all of the hackers are not age 14 or even in highschool or
college, but is this really all that important of a distinction?
The activities of the Secret Service agents and other law enforcement officials
in Operation Sun-Devil and other investigations have been overwhelming and very
careless. True this is just their standard way of doing business and they may
not have even singled out the hackers as a group to focus excess zeal, but
recognizing that the hackers are in a worst case scenario "white-collar
offenders," shouldn't they alter their technique? Something that might be
important to make clear is that in truth my indictment and the indictments on
members of the Legion of Doom in Atlanta had absolutely nothing to do with
Operation Sun-Devil despite the general media creation.
Another interesting point that was brought out at the convention was that there
was so much activity and the Secret Service kept so busy in the state of
Arizona (possibly by some state official) concerning the hacker "problem" that
perhaps this is the reason the government did not catch on to the great Savings
& Loan multi-Billion dollar loss.
One gentleman spoke about his son being in a hospital where all his treatments
were being run by computer. He added that a system intruder might quite by
accident disrupt the system inadvertently endangering his son's life. Isn't
this bad? Obviously yes it is bad, but what was worse is that a critical
hospital computer system would be hooked up to a phoneline anyway. The main
reason for treatment in a hospital is so that the doctors are *there* to
monitor and assist patients. Could you imagine a doctor dialing in from home
with a modem to make his rounds?
There was some discussion about an editor's responsibility to inform
corporations if a hacker were to drop off material that he/she had breached
their security. I was not entirely in opposition to the idea, but the way I
would propose to do it was probably in the pages of a news article. This may
seem a little roundabout, but when you stop and consider all of the private
security consultants out there, they do not run around providing information to
corporations for free. They charge enormous fees for their services. There
are some organizations that do perform services for free (CERT comes to mind),
but that is the reason they were established and they receive funding from the
government which allows them to be more generous.
It is my belief that if a hacker were to give me some tips about security holes
and I in turn reported this information to a potential victim corporation, the
corporation would be more concerned with how and from whom I got the
information than with fixing the problem.
One of the government's expert witnesses from U.S. v. Neidorf attended this
session and he prodded Zenner and I with questions about the First Amendment
that were not made clear from the trial. Zenner did an excellent job of
clarifying the issues and presenting the truth where this Bellcore employee
sought to show us in a poor light.
During the commentary on the First Amendment, Hafner, Zenner, and I discussed a
July 22, 1988 article containing a Pacific Bell telephone document copied by a
hacker and sent to John Markoff that appeared on the front page of the New York
Times. A member of the audience said that this was ok, but the Phrack article
containing the E911 material was not because Phrack was only sent to hackers.
Zenner went on to explain that this was far from true since private security,
government employees, legal scholars, reporters, and telecom security personnel
all received Phrack without discrimination. There really is a lot that both
the hackers and security professionals have to learn about each other.
It began to get late and we were forced to end our session. I guess what
surprised me the most were all of the people that stayed behind to speak with
us. There were representatives from NASA, U.S. Sprint, Ford Aerospace, the
Department of Defense, a United States Army Lt. Colonel who all thanked us
for coming to speak. It was a truly unique experience in that a year ago I
would have presumed these people to be fighting against me and now it seems
that they are reasonable, decent people, with an interest in trying to learn
and help end the problems. I also met Mrs. Gail Meyer for the first time in
person as well.
I was swamped with people asking me how they could get Phrack and for the most
part I referred them to Gordon Meyer and CuD (and the CuD ftp). Just before we
went to lunch I met Donn Parker and Art Brodsky, an editor from Communications
Daily. So many interesting people to speak with and so little time. I spent a
couple hours at the National Gallery of Art with Emmanuel Goldstein, flew back
to St. Louis, and returned to school.
It was definitely an enLightening experience.
++++++++++++++++++++++++++++++
A very special thank you goes to Dorothy Denning, a dear friend who made it
possible for me to attend the conference.
:Craig M. Neidorf a/k/a Knight Lightning
C483307 @ UMCVMB.MISSOURI.EDU
C483307 @ UMCVMB.BITNET
_______________________________________________________________________________