Copy Link
Add to Bookmark
Report
Phrack Inc. Volume 04 Issue 44 File 05
==Phrack Magazine==
Volume Four, Issue Forty-Four, File 5 of 27
****************************************************************************
Computer Cop Prophile
by The Grimmace
The following file is something I thought of and did
a LOT of research on before writing. It's something that
I haven't seen in PHRACK and I've been a devout fan of
this zine since the beginning.
The "PHRACK PROPHILES" on hackers and phreakers give
readers an insight into the movers and shakers of the P/H
world, but how about a profile or profiles on the
anti-hacker/phreaker establishment that seems to be
growing by leaps and bounds lately?
In the past years we've seen cops and feds who know
nothing about computers and/or telephone systems bungle their
way through search warrants and arrests and have had some good
laughs at their expense. But now it seems that the "computer
cops", the feds especially, are putting a big push on training
agents in the "tricks of the trade" and their conviction rate
is getting better.
The primary source of this training is the Federal Law
Enforcement Training Center in Glynco, Georgia, where they're
teaching computer seizure and analysis techniques,
computer-targeted search warrants, and telecommunications fraud
investigations. (They're very accommodating about giving out
information on the phone as long as you tell them you're a
cop). The FBI Academy in Quantico also has a computer crimes
course.
On the technical side of things, there's an organization
called IACIS which stands for the International Association
of Computer Investigative Specialists based in Portland,
Oregon, and which consists of members of both local law
enforcement agencies nationwide as well as various and
sundry federal agencies. This group teaches and certifies
cops in how to get evidence from computer systems that can't be
attacked in court (Of course, anything CAN be attacked, but
getting the evidence squashed is not always a sure thing unless
the judge is a computerphobe).
As much satisfaction as we've gained at the expense of
the US Secret Service from the Steve Jackson Games case, it's
widely publicized problems may prove to be a double-edged sword
hanging over our heads. Law enforcement learned a LOT of lessons
from mistakes made in that investigation.
Like most of you, I've spent a lot of years
exploring computer systems (usually those belonging to others)
and personally feel that I've done nothing wrong (know the
feeling?). I'm sure others across the country also can
conduct a little socially-engineered reconnaissance and
get the lowdown on some of the people we NEVER want to see
knocking on our doors with a sledge hammer in the middle of the
night.
This profile contains information on the ONLY computer
crime cop I could identify in the Louisville/Jefferson County
area after calling all the major departments posing as a writer
for a law enforcement magazine doing a survey. Information
about him was obtained not only from his department, but from
sources in the local and federal court systems, Ma Bell
Security, and the Federal Law Enforcement Training Center. Lt.
Baker is *not* a potential donor to the CPSR or EFF to say the
least.
I'm currently compiling similar information on other
law enforcement types in the Secret Service, Columbus Ohio PD,
Dallas PD, Georgia Bureau of Investigation and members of Ma
Bell's Data Security Group in Atlanta. Baker was just the
closest to me so I started with him. If I can get the
information I've requested, then future submissions will
also include lesson plans furnished by FLETC on their training
courses and analysis protocols suggested by the USSS...heh...heh.
Yours,
The Grimmace
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
COMPUTER-COP PROFILE I
LT. BILL BAKER
JEFFERSON COUNTY POLICE DEPARTMENT
LOUISVILLE, KENTUCKY
INFORMATION COMPILED BY:
** THE GRIMMACE **
*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
NAME: Bill Baker
RANK: Lieutenant
AGENCY: Jefferson County Police Department
768 Barret Ave.
Louisville, Kentucky 40204
AGE: 43
YEARS OF COMPUTER EXP: 13
YEARS AS A COP: 18
YEARS IN COMPUTER/
TELECOM CRIME: 8
TRAINING: Federal Law Enforcement Training Ctr.
Glynco, Ga.
- Telecommunications Crime
Telecom Fraud
Cellular Fraud
PBX Fraud
- Computer Crime
Illegal Access Crimes
Computer Crime Inves.
Seized System Analysis
FBI Academy
Quantico, Va.
- Computers in Narcotics Investigations
- Computer Crime Investigations
National Intelligence Academy
Ft. Lauderdale, Fl.
- Supervising Intelligence Operations
Surveillance Techniques
Electronic Tracking
Electronic Eavesdroping
Video Evidence Techniques
- Telephone Systems
Wiretaps
Dialed Number Recorders
Pager/Fax Intercepts
Technical Telephony Course
PREVIOUS ASSIGNMENTS: Patrol
Criminal Investigations/Burglary
Criminal Investigations/Homicide
Crime Prevention
Special Investigations/Vice-Intel
MEMBER: Communications Fraud Control Association
Washington, D.C.
PUBLICATIONS: Various computer/telecommunications
crime oriented articles for assorted
law enforcement and computer industry
magazines (i.e., POLICE CHIEF, DATA TODAY)
Posing as a freelance writer from the "Law Enforcement
Journal", I made calls to local police agencies all over this
area asking about their Computer Crime Units and received
replies ranging from "What are you talking about?" to "Maybe
FRAUD handles that...hey, Charlie...do the FRAUD guys do
anything with compoooters?". So much for the Louisville
Division of Police...no fear there, right?
But I decided to push on since Louisville, though not a
hotbed of phreakers/hackers, IS the latest home of TAP MAGAZINE
(a la Blitzkrieg BBS and the Predat0r) and has a smattering of
"hometown" folks engaged in less than legal activities through
the local phone lines.
The call made to the Jefferson County Police got me a
solid response of "You'll have to talk to Lt. Bill Baker. Hey,
Charlie, where's Lt. Baker working now?" (This guy is so low
key his own department doesn't even know where he works!) They
finally decide he's someplace called "Adam Station" and
through "various" contacts and a friendly local attorney who
rarely pays for telephone calls himself, I managed to obtain
quite a bit of information about Lt. Baker and his obviously
misguided quest.
Lt. Baker is fairly typical of the "new breed" of
high-tech investigator currently being churned out by the
various federal training schools. He's aggressive and, from
talking to other members of his department, thought of as a
"computer weenie" who was probably a hacker himself before he
embraced the "dark side" of "the FORCE". (I personally believe
that this may be more fact than fantasy after talking to him on
the phone since he seems to know more about phreaking and
hacking than one would think would be taught in the
aforementioned federal institutes of higher learning.)
I finally managed to speak with Lt. Baker on the phone
and gave him my "writing about computer crime" rap which he
bought with little suspicion. The following are excerpts from
the recording I made of the conversation [comments in brackets
are mine]:
TG: How would you rate the progress of computer and
telecommunications crime investigations in this area?
Baker: There have been some good cases made here, but there's
still a long way to go. The main problem is that there
hasn't been a push from local businesses in this area to combat
these types of crimes. Most of'em don't want to admit they've
been hit from the outside. If there's no complaints,
then the departments aren't likely to want to spend the money
to dig up additional crime, right?
TG: Of the hackers you've worked on, what kind of capabilities
do they have and how good do you think they are?
Baker: Well, hackers and phreaks are like any other cross-section
of a criminal group...there are some that are very good
and some that are pitiful. The best thing you can say
about working hacker/phreaker cases is that a lot of them
catch themselves. They have huge egos and tend to brag
a good deal about what they've done and how they did it.
TG: Does that mean that you don't think a computer crime
investigator has to be as good as the criminals
he chases...I mean, because a lot of these people leave
so many clues behind? How would you rate your ability
in this field?
Baker: Nope...not at all. I think that as technology gets better
so will the crooks. Let's keep the record straight here.
Sure, there are bozos out there who read a how-to file in
an old PHRACK and decide that they have the knowledge
they need to nuke the phone company or ride a VAX like
a Hell's Angel rides a Harley. Those are the easy ones.
The ones who -write- [author's emphasis] the technical
articles in PHRACK are the ones to worry about. There
are some stomp-down [??] incredibly knowledgeable
individuals in circulation blasting away with their modems
at any target of opportunity.
TG: You didn't mention your own ability for investigating
these people.
Baker: (Laughs) Yeah, well...let's say I know enough to get by
and am smart enough to know that there are no absolute
experts.
TG: How would you comment on the Steve Jackson Games case?
Do you think the Secret Service set a lot of bad
precedents?
Baker: (Laughs) Noooooooo....sorry, pal. That's been jawed to death
in every phreak/hack mag, legal journal, and Internet
newsgroup in existence and I'm not about to stick my
neck out on that one, OK? I will say that everyone learned
a lot from that case and I seriously doubt if you'll see the
same set of problems reoccurring in future cases. Maybe
the CSPR or EFF hired guns can come up with a new group
of loopholes, in which case we'll have to find new ways
to circumvent those attacks.
TG: You sound a little critical of the EFF and CSPR efforts
in their defense of so-called "computer criminals".
Baker: Well, I'm sure that they believe in what they're doing.
They must to invest that much cash and energy. But I
think there has to be some middle ground agreed upon
rather than just whining about "all information should
be free" and "if I can get into your system then I should
be allowed to look around". I'm not going to launch into
a diatribe on organizations that I don't agree with. I'm
simply going to work harder at dotting every "i" and
crossing every "t" to make my cases more secure. Stealing
telephone service is a crime, defrauding businesses is a
crime, gaining unauthorized access into someone else's
computer system is, in most states, a crime, and even if
there's no law on the books making it a crime, it's
wrong.
TG: Since by your own statement, you feel that high-tech
crime investigation is still in its infancy, what groups
or organizations would you say are in the lead in trying
to combat this type of crime?
Baker: The most significant two I know are the Federal Law
Enforcement Training Center in Glynco, Georgia, and the
Communications Fraud Control Association based out of
Washington, D.C. FLETC [he pronounces it FLET-SEE]
probably has the finest computer crimes training program
in the country. They bring in acknowledged experts and
don't cut the students any slack as far as learning to
do things correctly and, most importantly, legally. The
CFCA is the leader in Telecommunications security and
provide training and assistance to telecom and computer
companies along with law enforcement agencies all over
the country.
TG: Why do you think so few law enforcement agencies know
anything about computer crime investigations? Are they
going to leave the phreaks to the feds?
Baker: Nah...I don't think you can simplify it that easily.
Most departments don't have dedicated computer crime units
because of lack of funds to support such a unit, lack of
trained personnel, lack of understanding of the magnitude
of the problem, fear of increasing their crime stats or
any combination of those reasons. When I first got into
this, there weren't any experts. John Maxfield and his
BOARDSCAN operation got a lot of talk in the hack/phreak
journals and there were a small handful of others, but
no real standout authorities. I talked to an awful lot
of people before I hooked up with Clo Fleming at SPRINT
Security who helped me a lot.
TG: Do you still trade information with SPRINT?
Baker: I have contacts with all the major telecom carriers.
The training I got at FLETC really helped make some valuable
contacts. But I guess SPRINT and Clo Fleming would be
my first choice simply because they were willing to help
me when no one else would. You can't operate in this
environment without contacts in the OCC's. It can't be
done and the OCC's [Other Common Carriers] are a lot
more willing to assist law enforcement now than they
were in 1985. Of course, the telecommunications industry
is taking a $4-5 billion hit a year from fraud and that
has a lot to do with it.
TG: Do you subscribe to the hacker/phreaker magazines?
Baker: Sure...I subscribe to 2600 and get copies of some
others. I think PHRACK's probably the best overall,
but I can't afford the subscription rate they've imposed
on government agencies since Craig Neidorf took the hit
for publishing the "golden" E911 document. I've learned
a ton of stuff over the years from PHRACK and wish it
were still free, but they have a right to their info
just like the people who own the systems attacked by
hackers. It'd be kind of hypocritical for me to rip off
PHRACK and then turn and prosecute some other guy for
ripping off information from another source, right?
TG: What problems do you foresee in the future in computer
and telecom crime investigations?
Baker: Jeez...why don't you ask me when we'll have world peace
or something easy? OK, I think we'll probably see the
larger departments being forced to play catch-up with
the current trends and always being a little behind in
this area. I also think you'll see more officers losing
cases and being sued, a la SJG, until they get the
specific training required to handle these cases the
right way. Turning seized systems over to the local
"computer guy" in the department is going to cost'em in
the long run because every lawyer who gets one of these
cases is going to compare it bit by bit with the SJG
case to see if there's anything there he can use for
his client's defense.
TG: There has been a lot of discussion about whether or not
computer systems should be seized rather than just
making copies of the data for evidence. What is your
policy on equipment seizures when working cases like
this?
Baker: First of all, I don't go on fishing expeditions with
search warrants. If I have enough to convict a guy then
I get the warrant. I take everything that's there and
do the analysis. I've had cases where the defendant has
requested copies of data he needed for various reasons
and I've had no problems with furnishing them as long
as the request is reasonable. I ask for forfeiture of
the equipment if I can link it to the crime because the
law says I can. If I can't link the computers, then I
give them back...simple as that. I think it's kind of
interesting that most hackers or phreaks will refuse to
take a guilty plea for a reduced charge, even if I have
them stone cold and they're looking at a 99.999999%
chance of conviction in a jury trial, if it means
they'll lose their equipment in the deal. It makes good
leverage in certain situations.
TG: Did you have any part in Operation Sun-Devil?
Baker: Nope. Though I'd have liked to. I was on a lot of the
systems taken down in Sun-Devil.
TG: You said you were on some of the systems busted in the
Sun-Devil operation, are you still on phreak/hack
boards and would you name any?
Baker: (Laughs a lot) I think I'll pass on naming systems I'm
on, OK? That'd be cheating. (Laughs again) But I get
around enough to know what's going on. There are lots
of investigators out there calling the boards.
TG: I appreciate your time, Lt. Baker, and would like to ask
one last question. What motivates you in these cases
since the alleged "theft" involves pretty intangible
property?
Baker: Motivation? Hmmmm...I suppose you could say it's the
chase that motivates me more than the catch, though
the catch is pretty good, too. These cases tend to
be more one-on-one than some other types and the
adversaries can be very good at covering their tracks.
Hell, I probably have more in common with the people
I target than they'd like to believe. As for the
"intangibility" of the stolen goods, well, that's why
we have court systems, isn't it...to define those
little details.
TG: A lot of computer crime investigators would rather stay
in the background, but you don't seem to have taken that
position. Why not?
Baker: Well, like anyone involved in anything relatively new,
as opposed to the old standard type crimes like murder
and armed robbery, it's to my benefit to have anything
printed informing people of the problems created by
this type of activity. We all pay the price for telecom
fraud, credit card fraud, data loss due to illegal
access to computers and all the rest. But the people
involved in these crimes, for the most part, don't
exhibit the same profiles as the so-called "violent"
criminals. In fact, I've had some very friendly
conversations with a number of phreaks and hackers.
Investigators who have problems would probably have
them no matter what crimes they were investigating.
I never assume that I'm smarter than anyone I'm
chasing and I don't rub their noses in it when I make
a case. Just like I don't lose sleep when I just can't
seem to get that last piece of the puzzle and one gets
away. It's hide-and-seek in cyberspace. Pretty good
game, actually.
For what it's worth, there it is. The interview printed here
doesn't contain a lot of the bullshit that was thrown back and
forth during our conversation, just the relevant details which
tend to give an insight into this guy.
Frankly, I was impressed by the fact that he didn't seem
anything like I had expected after reading horror stories about
other agencies and investigators. This guy was personable and
maybe that's an indicator that he's dangerous. Never, ever
underestimate your opponents -- even if they do sound like
"good ole boys" and talk to you like you're the best friend
they ever had. Always remember that COPS INVENTED SOCIAL
ENGINEERING!
My next "computer cop" profile will deal with a rising star in
the U.S. Secret Service and his connections to the Guidry
Group, a consulting organization working for the cellular phone
industry in combating cellular fraud.