Copy Link
Add to Bookmark
Report

Phrack Inc. Volume 03 Issue 35 File 03

eZine's profile picture
Published in 
Phrack Inc
 · 5 years ago

  

==Phrack Inc.==

Volume Three, Issue Thirty-five, File 3 of 13

-*[ P H R A C K XXXV P R O P H I L E ]*-

-=>[ Presents ]<=-

Sincerely Yours, Chris Goggans
-===--===--===--===--===--===-
by S. Leonard Spitz
Associate Publisher
INFOSecurity Product News

"A provocative interview with a former member of the "Legion of Doom" suggests
that the ethics of hacking (or cracking) are often in the eye of the beholder."

Malicious hackers, even though most operate undercover, are often notorious for
the colorful pseudonyms they travel under. Reformed hackers, however, prefer a
low profile so as to shed their image of perceived criminality. Kevin Mitnick,
infamous for the DEC caper, is one of the foremost advocates of this strategy.

Now comes Chris Goggans, trailing his former "Legion of Doom" moniker, Erik
Bloodaxe, behind him, to try it his way. Goggans insists that where once he
may have bent the rules, he is now ready to give something back to society.
And coming across with a high degree of sincerity, he affirms his intention to
try. Are he and his colleagues, wearing their newly acquired information
security consultants hats, tilting at windmills, or does their embryonic,
cracker-breaking start-up, Comsec Data Security Co., stand a fighting chance?
We thought we would ask him.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

ISPNews: I am going to ask several legitimate questions. Please answer them
completely, truthfully, and honestly.

Chris Goggans: OK.


JUDGEMENT BY THE MEDIA

ISPNews: Would you react to Computerworld's July 29 piece, "Group Dupes
Security Experts," <also seen in Phrack World News issue 33, part 2
as part of the article called "Legion of Doom Goes Corporate> in
which members of your organization were accused of masquerading as
potential customers to obtain information, proposals, and prices from
other security consultants?

CG: We were all amazed that something like that would ever be printed
because, as we understand common business practices, we weren't doing
anything unusual.

ISPNews: Computerworld reported that the Legion of Doom was "one of the
nation's most notorious hacker groups, according to federal law
enforcers." Can you respond to that?

CG: Notorious is a relative term. There has always been a shroud of
mystery covering the Legion of Doom, because it was an organization
whose membership was private. When you keep people in the dark about
the activities of something, there is always going to be the
perception that more is going on than there really is.

ISPNews: Would you say then that the characterization of being notorious is
unfair?

CG: To some degree, yes. There certainly was activity going on within
the group that could be considered illegal. But most of this was
taking place when members of the group were all between the ages
of 14 and 17. While I don't want to blame immaturity, that's
certainly a factor to be considered.

The Legion of Doom put out four <issues of an> on-line electronic
newsletter <called the Legion of Doom Technical Journals> composed
of different files relating to various types of computer systems
or netware. They explained different operating systems or
outlined different procedures used by networks. They were always
informative and explained how to use a computer. We never said
"This is a computer and this is how to break into it."

Colorful names and words used to describe groups also add to
notoriety. If we had been the "Legion of Flower Pickers," the
"Legion of Good Guys," or the "SuperFriends," there probably
wouldn't be this dark cloud hanging over the group.

ISPNews: Could you be charged with intent to provide information to others
which would make it easier to gain unauthorized access?

CG: I don't see how that could be a charge. There's the first amendment.
I maintain that talking about something and encouraging or forcing
someone to do it are completely different.


EARNING AN "A" IN INFOSECURITY

ISPNews: What attracted you to computer security?

CG: The same thing that would attract anybody to being a hacker. For
half of my life I've been in front of a computer every day.
Sometimes from early in the morning until the wee hours of the night.
And my particular focus has been on computer security.

ISPNews: At least the dark side of that coin.

CG: I wouldn't say the dark side. I'd say the flip side. If you do
something for 11 years, you are going to pick up a lot of knowledge.
And I've always wanted to find some kind of productive career that I
thoroughly enjoyed. So this was just an obvious progression. No one
wants to be a 40-year-old hacker living in fear of the Secret
Service.

ISPNews: When you first applied to enter college, did you feel that it was the
right place to learn about information security?

CG: Yes, I thought it was the right place, mainly because college is the
most obvious choice to pursue an education in any field. I just
assumed that I would be able to find formal training leading to
certification or a degree in this field. Yet, at the University of
Texas, there wasn't anything along those lines.

ISPNews: Did you graduate from the University of Texas?

CG: No, I changed majors and then moved to Houston. I had started out in
computer science but it was completely unrelated to any kind of
career I wanted to pursue. I eventually changed my major to
journalism. There are only two things I like to do: Work on
computers, and write. So, if I wasn't going to get a degree in one,
it was going to be in the other. I'm a semester away, and I do plan
on finishing.

ISPNews: If you were to structure a college curriculum for studies in
information security, would you design it to focus on technical
issues, ethics, business issues, or legal matters?

CG: I would try to focus on all of these. If you don't have a technical
background, you can't understand the way the operating system works,
and you really can't focus on some of the issues that need to be
addressed with information security.

Ethics certainly come into play ass well for obvious reasons. I
don't think hackers are going to go away. Even with the advent of
newer technology, there are always going to be people who have an
interest in that technology and will learn how to manipulate it.


ETHICS, INTELLECTUAL PROPERTY RIGHTS, AND THE LAW

ISPNews: What is your definition of a hacker?

CG: A Hacker is someone who wants to find out everything that there is to
know about the workings of a particular computer system, and will
exhaust every means within his ability to do so.

ISPNews: Would you also comment on the ethics of hacking?

CG: There is an unwritten code of ethics that most people tend to adhere
to. It holds that: no one would ever cause damage to anything; and
no one would use any information found for personal gain of any kind.

For the most part, the only personal gain that I have ever seen from
any sort of hacking activity is the moderate fame from letting others
know about a particular deed. And even in these cases, the total
audience has been limited to just a few hundred.

ISPNews: Are you unaware of hackers who have in fact accessed information,
then sold it or massaged it for money?

CG: No, certainly not. I am just acknowledging and defining a code of
ethics. We of the Legion of Doom tried to adhere to that code of
ethics. For example, members of the original nine who acted
unethically were removed from the group.

ISPNews: Do you believe that penetrating a computer system without either
making changes or removing information is ethical, or a least is not
unethical?

CG: At one time in the past I may have held that belief, but now I
certainly must not, because the whole idea of being involved in the
formation of my new company, Comsec Data Security, would show
otherwise.

ISPNews: So today, you believe that unauthorized entry is unethical.

CG: Exactly. As a hacker, I didn't particularly hold that. But as
things such as invasion of privacy, even though I never caused any
damage, and breach of trust became more apparent to me, I was able to
step back, see the picture, and realize it was wrong.

ISPNews: Can I conclude that you are speaking for you company and its
principals?

CG: Yes, I am speaking for all of the principals.

ISPNews: What are your views on the ownership of information?

CG: I feel that proprietary information, national-security-related
information, information that could be considered a trade secret, all
definitely have ownership, and access should be restricted.

In the past, I felt that information that affected me or had some
relevance to my life should be available to me. I felt that
information should be available to the people it affected, whether
that be phone company information, credit bureau information, banking
information, or computer system information in general. I am saying
this in the past tense.

In the present tense, I feel that the public is entitled only to
information in the public domain. Information not available legally
through normal channels is just going to have to be left at that.

ISPNews: Do you believe that software should always be in the public
domain.?

CG: No, I do not. If I wrote something as wonderful as Lotus, or any of
the Microsoft programs, or Windows, I would want people to pay for
them.

ISPNews: Then you do believe in private ownership of and protection for
software?

CG: Yes, definitely.

ISPNews: What are you views on current U.S. Computer crime laws?

CG: I think that the current laws are too broad. They do not make
distinctions between various types of computer crimes. I consider
breaking into a computer akin to trespassing. If someone simply
walks across my lawn, I might be upset because they trampled my
grass, but I would leave it at that. If someone drives across my
lawn and leaves big trenches, and then comes over and kicks down my
rosebush, well that's another thing. Then, if someone drives up my
steps, goes through my house, through my kitchen, steals all my
silverware, and then leaves, that's something completely different.
And while these physical representations of trespassing can't be
applied directly to an electronic format, distinctions are still
necessary.

ISPNews: And the present computer crime laws do not make these distinctions?

CG: I am no lawyer, but from my understanding they do not. They need to
be brought into focus.

ISPNews: If they were brought into the kind of focus you suggest, would they
be fair and equitable?

CG: Definitely, depending on the punishment that went along with them. I
don't think that people who own and operate computer systems would
view someone who has logged into their system using a guest account
that was deliberately left with no password to be as serious an
intrusion as someone who got the system administrator password and
then went through and deleted all the files. I don't think that
simple intrusion would be considered as serious as unauthorized
penetration along with the wholesale theft and sale to a competitor
of marketing information, and advertising plans, and financial
projections for the next quarter.

ISPNews: What are your views on security training for users?

CG: People need to be taught what the computer operating system is and
how it works. After that, they need to establish some sort of
channel by which information can be transmitted to others. Direct
physical contact between communicating parties, covered by official,
standard company procedures, is the best way to do this.

People need to be aware that their account, no matter the level of
importance, is a link in a chain that makes up the security of the
system. Information from one account can be used as a springboard to
other, more powerful accounts. All users within a network must
understand that their information is just as important in the
security chain as is that of the next person.

ISPNews: Given where you are coming from, why should a potential client trust
you?

CG: I know that is a natural question. Just the very nature of creating
a company should project an image that we are trying to come out of
the shadows, out of the underground. We are saying, "Look everybody,
we've been doing this for a long time, now we want to help. We have
11 years of working information about how people compromise existing
security, and we can help with your particular situation."

ISPNews: I am sure that you understand the natural suspicion that people have.

CG: No, that's what I don't understand. If we at Comsec were out to
compromise information from an existing company's computer network,
we wouldn't have incorporated. We could have done that, and someone
else out there probably has already done so. Then the information
would be available to from one hacker to another.

ISPNews: Are you suggesting there is no system out there that you can't break
into?

CG: No, I'm not suggesting that. But I am saying the vast majority can
be penetrated.

ISPNews: Which system is easiest to crack; and which is most difficult?

CG: It is hard to say which system is more inherently penetrable than
another. From the initial log-in, it's not the operating system;
rather it's the system's operating environment that is the problem.
Users may not have addressed security measures. Certain types of
security holes may not have been closed. That's where a technical
background comes into play: to understand the way the applications
work; how different systems are accessed; to close holes in the
system which have become apparent. You have to deal with human
factors and technical issues. You must understand the way the
computer works and the way programs are run.

ISPNews: What is the best way to foil hackers?

CG: It depends on the hacker. There are different types. Some people
hack with modems. The casual hacker may just stumble across your
particular computer system, and may be foiled with something as
simple as good external security. He may be turned off by physical
security devices such as a call-back modem, some sort of code access,
or smart card.

These measures will not stop a serious hacker who is after your
company specifically. In this case, you have to beef up security,
and take additional steps to ensure the safety of your computer. And
you must make certain that security on the inside is as tight as on
the outside.

ISPN Editor's Note: Chris Goggans will respond, in every other issue of
ISPNews, to your questions on hacking computer systems.
His answers promise to be problem-solving, interesting,
and even entertaining. We invite you to write Chris c/o:

"Hackers' Mailbag"
ISPNews
498 Concord Street
Framingham, MA 01701-2357
_______________________________________________________________________________

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT