The Implications of Cyberwar for National Security and Business

Posted by Kuji on June 26th, 2008

INFORMATION SECURITY:

The Implications of Cyberwar for National Security and Business

by Zachary Selden

November 1996

In the Summer of 2003, Iran?s armed forces are closing in on Saudi Arabia in a bid to control Middle Eastern oil production. The U.S. gathers its allies and prepares to repel Iran, but finds itself virtually paralyzed as invisible and untraceable computer assailants shut down power grids, cause trains to collide, disrupt financial transactions and close down telephone systems. The Second Gulf War has become the First Cyberwar.

This not the opening chapter of Tom Clancy?s latest novel- it is the basis of an recent Pentagon exercise. US government officials are increasingly concerned about the national security implications of cyberwar and cyber-terrorism. In earlier forms of warfare, railroad junctions and communication systems were bombed to confound the enemy?s ability to transport equipment and transmit commands. Today, they can be rendered just as inoperable by a modem-equipped PC.

The terms information warfare, cyberwar and information security have become media buzzwords. But what is information warfare and what are the realistic threats to U.S. national security? Information warfare (IW) can encompass everything from electronic jamming to psychological operations. The focus here, however, is defense against the deliberate exploitation of information systems? inherent vulnerabilities in a manner that affects national security. The reality of information warfare is that all systems are vulnerable. As states grow more dependent on information systems, vulnerabilities will increase.

These weaknesses are compounded by the fact that U.S. military and civilian information systems are intimately linked. Railroads, for example, are controlled by relatively penetrable civilian systems, and much of the military?s unclassified message traffic travels on the internet. In cyberwar, civilian information systems can be as critical as military systems, and any effort to built a truly secure national information system will require close cooperation between American business and government.

As war becomes more information intensive, the need for such cooperation grows. The Gulf War taught us that strong information management skills can translate into battlefield success. But, information technology shares one characteristic with older military technology: defensive countermeasures are both simpler and cheaper.

Cyberwar requires a small capital investment to achieve tremendous results. The necessary computer equipment is easily obtained and is becoming less expensive every day. A team of computer mercenaries could be hired for less than the cost of one fighter aircraft. Information warfare can also be carried out remotely. A state or terrorist organization could easily disperse its operatives around the world making it difficult to pinpoint any attack and retaliate. The bottom line is that information warfare is cheap, effective and well within the reach of almost any state or well-endowed terrorist organization. The potential for the Davids of the world to fling a well placed rock against the Goliaths may actually be greater in the information age than in the industrial age.

Information system vulnerabilities can also be exploited to fund terrorist activities. In the 1970s and 1980s, terrorists turned to hijackings and kidnappings to raise funds. With billions of dollars in electronic transit every day, cyberspace may provide a funding source that is both less risky and more profitable than conventional means of raising funds.

The vulnerabilities of military information systems are obviously an area of paramount concern. Most of the more than 250,000 attacks on military information systems each year fail, but a few successes can cause widespread damage. For example, in 1994, Air Force computer security experts discovered that their classified network at the Rome (New York) Laboratories had been breached. A subsequent investigation revealed that the hackers had gained complete access to all Rome Labs networks, and had breached other classified sites, like the South Korean Atomic Research Institute, through access to the Rome Labs system. This latter problem illustrates one of the most serious problems of network security: once a hacker has found a valid ID and logon, he can transfer to other sites that might be better defended. The security of an information system is only as good as its weakest link.

Identifying the intruders was virtually impossible because they skillfully manipulated the phone system and ran their connection through multiple locations from New York to Latvia. While the intruders? computer codenames? Datastream and Kuji? were discovered, their identities remained secret until an informant revealed an e-mail conversation with a British hacker who bragged about his exploits in Rome Labs and left his phone number with the informant. A tap was put on the line and he was subsequently arrested. Datastream turned out to be a sixteen year-old armed with nothing more than a 486sx PC. Had he been a bit more mature, like his colleague Kuji who remains at large, he most likely would still be breaking into military sites at will.

National security planners face difficult questions: How many other Datastreams are out there, who will employ them and to what ends? If one teenager with fairly unsophisticated equipment can penetrate supposedly secure systems, consider the damage that ten or twenty equally skilled individuals could do in the employ of a rogue state or terrorist organization. The PC may soon be one of the most dangerous components in the terrorist?s arsenal.

If military sites can be compromised, civilian networks are even easier to crack. Financial institutions are reluctant to reveal information systems intrusions for fear of sparking a panic, but such incidents appear to be relatively common. In 1994, for example, Citibank lost $400,000 to a group of Russian hackers, who were attempting to steal millions. A survey of computer security companies by the Senate Subcommittee on Investigations revealed that their corporate clients in the United States had lost $400 million last year alone.1 It is impossible to estimate the additional loses in comparative advantage due to computer industrial espionage.

Without a serious effort to strengthen and coordinate security measures, American business stands to lose hundreds of millions every year, and the U.S. military effectiveness could be compromised. Incidents like the Rome Labs penetration have created a consensus in favor of action. While support for coordination information security programs is strong, this consensus breaks down when one moves to the level of specific recommendations.

To date, no clear government strategy for information security exists. A host of government agencies and informal public-private groups have been convened to discuss this problem, but actual results are minimal. One senior intelligence official compares the state of coordination to “a toddler soccer game where everyone just runs around trying to kick the ball somewhere.”2

Efforts to comprehensively protect the entire information infrastructure will face strong opposition from private industry actors who are reluctant to encourage government intrusion. As Richard Wilhelm, Vice President Gore?s security advisor puts it, private companies “are not begging for more government meddling.”3 The present battle over encryption? which pits civil liberties advocates and law enforcement officials who hope to “tap” information networks?is simply the tip of the iceberg. In today?s rapidly changing technological environment, the prospects for extensive government-industry cooperation remain limited. The lack of cooperation between industry and government on this issue is reflected in the President?s Commission on National Infrastructure Protection. While ostensibly a forum to bring together industry and government to coordinate the security of the nation?s information networks, some industry representatives claim that they have been relegated to minor positions in what has become a high-level bureaucrats club. The Commission is expected to release its report next year, but if industry is as isolated as some of its representatives believe, it will not be a comprehensive plan.

Clearly, there is some movement toward a plan to protect the national information infrastructure, but it has yet to move past the theoretical stages. As the global leader in technology and information systems, the United States is particularly vulnerable to cyberwar or cyber-terrorism. The requisite skill and technology to wreak havoc via computer already exists: it is only a question of time before a state or terrorist organization decides to wage cyberwar against the United States. Coping with this emerging threat will require cooperation between the American business community and Government to devise means of protecting both civilian and military information systems.

The information technology revolution spawned both tremendous promise and new threats. At the moment, however, the means of coping with the potential threat is barely in formation. While the recent attempts to secure the national information infrastructure appear to be a good start, they may ultimately prove to be a case of too little, too late.

1 U.S. Senate Permanent Subcommittee on Investigations, Staff Statement for Hearing on Security in Cyberspace. June 5 1996, p.41.

2 ibid, p.26

3 “IW Study May Guide U.S. Policy,” Defense News, March 10, 1996: 3.

Source: Business Executives for National Security; http://www.bens.org/ pubs/Cyber.html

Infowar.Com & Interpact, Inc. WebWarrior@Infowar.Com

Submit articles to: infowar@infowar.com
Voice: 813.393.6600 Fax: 813.393.6361
Last modified: Sun, 03 Jan 1999 00:05:58 GMT

Cyber Terrorism – American Banker

Posted by Kuji on June 26th, 2008

Cyber Terrorism – American Banker
Mon, Sep 08 1997

Thanksgiving dinner last November. William Marlow is just pushing back from the family table when the phone rings. One of his clients, an unnamed Midwestern financial institution, thinks it’s under cyber- attack. For Marlow, the next few days are all long, filled with pizza.

Marlow is a svp at McLean, VA-based Science Applications International Corp. (SCI), which operates a computer security team headed by Marlow and Dr. Mark Rasch, formerly U.S. Attorney for Computer Crime at the Department of Justice. The team has 47 bank clients worldwide, including, they say, three of the nation’s largest.

When the call came, the computer security team assembled in their war room in McLean, established a secure link with their client’s network, and began systematically securing the client’s computer operations while metaphorically patrolling the walls, looking for anything from a simple mistake that might have accidentally set off the alarms, to a sophisticated timing attack, designed to distract the firewall while intruders slip into the system. “What the client was afraid of was that a Trojan horse had been introduced,” says Marlow. A Trojan horse is a program that enters the computer network disguised as a harmless message, then opens a so- called “back door” for the attackers. “While we were doing that, we received a message from two individuals that was an extortion demandowe’re talking significant dollars, enough to alter our fee structure,” says Marlow.

The Federal Bureau of Investigation (FBI) was brought in by the client, and the two teams, working together, tracked down the perpetrators. Marlow and his team built a chain of custody of evidence for the prosecution under Rasch’s supervision, while the FBI pounded the pavement, locating and arresting the criminals, who are reportedly awaiting trial.

At press time, the FBI said it needed more specific information before it could comment on Marlow’s experience.

Marlow’s client got off easy. Last year, The Times of London a publication not known for its sensational has reported that several London financial institutions had paid up to $400 million to fend off extortionists who used logic bombs (software programs that cause systematic errors) to demonstrate their ability to destroy those institution’s global operations. At least one of the attacks sent the proceeds to Russia, according to The Times story, which ran on the front page of its June 2, 1996 edition. Other journalists have confirmed the report, although officials steadfastly deny it. Both these incidents were probably more a matter of cyber- gangsterism than anything elseojust a new way to hold up banks. But in today’s strange new world, they could as easily have been perpetrated for kicks by a kid in Cedar Rapids, for money by a former programmer from the Soviet Ministry of Defense working for the Russian Mafiya, or, more dangerously, by a politically motivated terrorist trained by the CIA in Afghanistan, working in the Sudan with financing from a Saudi billionaire and intending to harm America by attacking its lifeblood.

Every Country for Itself?

And therein lies the rub: Once a bank is under cyber attack, it doesn’t much matter whether the enemy wants your money or your life; the lines between mere criminality and political action are blurred by the anonymity of the attack. And since in cyberspace national boundaries aren’t even lines on a map, computer attacks don’t always yield to tidy legalistic solutions, even if the computer that launched the attack can be traced and happens to be in a nation with laws against themoby no means a universal condition. Monaco, for instance, has no laws covering computer crime.

The result for America’s banks is a sort of medieval world in which anything can happen, law is nonexistent, and everyone needs strongholds and armed escorts when traveling from one world to the other. And because the world is filled with persons who consider America’s role as the citadel of democratic capitalism, and the exemplar of modern scientific civilization to be fundamental attacks on their way of life, a cyber attack on one bank could as easily be a first step in a plan to crash the international payments system as an attempted robbery.

And examples of cyber terrorismoor at least how vulnerable we are to themodo exist, though no official will admit to a cyber terrorist attack on a U.S. bank.

In 1994, for instance, according to 1996 Congressional testimony, two hackers named Datastream Cowboy and Kuji crashed the computer systems at Rome Air Force Base in Rome, NY, for 18 days. Rome AFB works on very sensitive defense projects; according to the testimony, not only were sensitive files stolen, but successful attacks were launched from the Rome computers to NASA’s Goddard Space Flight Center, Wright- Patterson AFB, and defense contractors around the country.

Datastream Cowboy was eventually arrested in England and convicted there of telecommunications theft. Kuji is still at large; no one knows what happened to the stolen data.

The same testimony disclosed not only that the Defense Information Systems Agency’s internal testing successfully penetrates Defense Department systems 65 percent of the time, but also that it estimates Defense systems are attacked about 250,000 times a year. It doesn’t take much to see that if a Defense Department computer system can be penetrated, so can a bank’s.

This is no secret to Admiral J. Mike McConnell, a Booz, Allen & Hamilton partner who recently retired as director of the once super- secret National Security Agency. “Banks talk about their systems as though (they have) no external connections,” he says. “What most people don’t appreciate today is that most banks today, when they are communicating, are traveling on the public switch networkothe phone system structure. When people say they’re using the Internet, all they really mean is that they’re riding around on the public switch network. That induces a certain amount of vulnerability.”

Downloading Attack Tools

Banks will tell you they have “leased lines” between their branches, he says. “But they don’t really have a physical lineothey have a restoral priority; it means they’ll get service, but they don’t know whether it’ll go through New Orleans or Chicago. So the point is, that opens you to potential vulnerabilities.

“Now you can encrypt that message, and it will be more difficult to interfere with anything; and a bank can have certain kinds of defensesofirewalls and whatnotobut once you understand and appreciate them, there are ways to attack them. Nothing is 100 percent guaranteed impenetrable. In my experience, when you are testing something to see if there is a vulnerability, you most always find a vulnerability.”

Added to that, says McConnell, is that on the Internet, all the attack tools can be downloaded; there is a “tremendous, richly robust hacker group that shares all these techniques” used for system penetrations, while readily available Silicon Graphics workstations make very capable platforms for cyber attacks.

Today, with all our networking, the vulnerability does not end with the transmission (of data), McConnell cautions. “It’s gone from worrying about data in motion to also worrying about data at rest,” because much information is stored on hard drives. “That’s where the vulnerability is,” he says.

Luckily, bankers are a paranoid lotosafes and vaults were more or less invented for themoand banking systems are on the whole among the most secure around. This was well demonstrated during the recent “war game” simulations conducted in June and July by McConnell in his McLean, VA, offices for the President’s Commission for Critical Infrastructure Protection (PCCIP).

Global Ops Riskier

After two and a half days simulating escalating problems that began as apparently unconnected events and eventually manifested themselves as a full-scale cyber attack on the United States in which truck bombs were exploding at airports, the water supply was compromised, and attempts were made to penetrate FedWire and CHIPs, only the banking and nuclear power systems were left intactoevery other critical infrastructure had been forced to request government help. Among those with poor marks: law enforcement and intelligence, which didn’t share information.

The PCCIP was created last year by President Clinton to address the fact that most of the computer networks in this country are interrelated and vulnerable to cyber attack both by terrorists, who may or may not be state-sponsored, as well as attacks by state- sponsored groups.

This vulnerability is only magnified, say PCCIP officials, by the fact that corporate outsourcing has created concentrations of services in a few hands, disruptions of which could create significant vulnerabilities within whole industries, including financial services. And modern business models built around the Internet only worsen those problems. “You’re looking at an emerging business model in an emerging (global) economy that is very different from the old one, where you had manufacturing on the bottom floor and management on the top floor,” says Peter Daly, a PCCIP commissioner and U.S. Treasury official. “Now you’ve got a CEO in Baltimore, his manufacturing is in China, his software is written in India, his telemarketing is in Irelandothe Internet enables that, and that’s what we’re focusing on. The infrastructure is the carrier of commerce now, and there are important new kinds of risks there.”

It was stimuli like these, say officials at the General Accounting Office (GAO), that led it this year to begin testing the financial system for potential weaknesses. The testing is occurring now; first it will try to penetrate banks, and then it will try to penetrate FedWire. The effort is being conducted out of the GAO’s San Francisco office.

At the level at which the PCCIP is working, say officials, the worry is less about computer attacks on individual banks than it is about attacks on major computer centers that support the nation’s financial infrastructureothe problem being that at a certain level, the two are virtually identical and that a simple truck bomb, like those exploded at the World Trade Center or in Oklahoma City, could cause significant damage to, say, the New York Stock Exchange or Brussels-based Society for Worldwide Interbank Financial Telecommunication (S.W.I.F.T)., while taking down the telecommunications system with logic bombs would obviously affect the financial system along with the rest of the country.

How to Fight Attacks

But there are also high-tech attacks to worry about. Some attacks, like exploding a microwave or flux generator bomb outside the Richmond Federal Reserve, potentially taking down FedWire by destroying its computer system, require substantial resources and are impractical; both sorts of bombs are very large and would have to be delivered by truck, requiring the same sort of industrial base needed to build nuclear weapons. A flux generator bomb is capable of throwing an enormous magnetic field around a building, crashing all the systems within.

But there are lower tech attacks that even small banks need to worry about, since they could be used in smaller-scale extortion. A HERF, or high energy radio frequency, gun, for instance, is a small, futuristic device that sends an energy “spike” through a metal system, frying it.

These devices, which police forces are considering issuing to some of their personnel as a means of stopping escaping vehicles, are basically ray guns, right out of Buck Rogers. The technology, which is nowhere near as sophisticated as a flux generator bomb, could easily move from law enforcement to the criminal and terrorist population as it becomes more widespread. Tazers, readily available today, can also be used to attack and disrupt computer networks.

But these, at least, are not tough to defend against, according to a paper written by Carlo Kopp, an Australian computer scientist. Since a HERF or Tazer attack made against a LAN is an electrical attack in which a power spike does the damage, he says, simply replacing the copper- based LAN with fiber-optic cable provides a practical defense. More advanced measures advocated by Kopp start with isolating the computer power system from the main power supply with an old-fashioned motor- generator power isolator, and go as far as building the sort of copper- mesh “Faraday Cage,” sometimes put around a clean computer room, around an entire building.

Cost of Protection

But there’s a price to be paid for upping the security ante, says an official at Washington, D.C.-based American Bankers Association, who requested anonymity. “(A determined group) can always kidnap somebody’s family and make them do what they want, so I’m not sure how far you want to go” he says. “The thing you’ve got to remember is that these days, you’ve got guys carrying bombs with toggle switches instead of timers.” Toggle switches are manual triggering devices used by suicide bombers.

“Low probability events are things banks have to deal with when they’re catastrophic, and when they can be reasonably managed,” he continues. “The thing is, we’ve got tremendous measures in place already, and the only other things (we could do) is to do full-field investigations (of employees) so not only do we know who our guys are, but that the government knows who our guys are, so they’d be more willing to tell our guys what’s going on.”

That cooperation could become far-reaching. Because the implications of cyber attack are transnational, and the interpenetration of terrorism and plain criminality has become so complete, many are calling for international police efforts. “We’re totally behind the eight-ball, and everybody’s stymied by this brick wall called national sovereignty, which the bad guys laugh about,” says Arnaud de Borchgrave, who was Newsweek’s chief foreign correspondent for 30 years, and who now heads the Center for Strategic and International Studies, based in Washington. “Any thinking person knows that the traditional prerogatives of national sovereignty have not only been overtaken by the information revolution, but that things like logic bombs and worms are the new arsenal in a new geopolitical calculus that enables the non-states, and even individuals, to take on a superpower. That’s the sort of world we’re living in, and our leaders don’t want to face up to it.

“You need laws that enable you to operate beyond (national) borders,” he adds. “Right now, if the Pentagon is attacked, they don’t have the right to retaliate, even when they know the source of attack. We’re a long way from an international SWAT team or teams, which is what I’m thinking about.”

As things stand, meanwhile, most large banks have either contracted with companies like SAI, or maintain their own computer security teams, generally denying to the public that they face any real dangers and, it’s widely assumed, leaving their own computer security crises unreported. This is exactly the wrong way to handle it, says Senator John Kerry, of Massachusetts. Senator Kerry’s recently published book, The New War: The Web of Crime that Threatens America’s Security, highlights the increasing incidents of money laundering facilitated, in part, by computer- savvy criminals. “It goes to their overall attitude to the whole thing,” he says. “You have to put this thing out there; people have to know and understand it. The longer they’re quiet and the longer these guys can operate without a sense of public outrage and concern, the harder it’s going to be to marshal the forces to change the situation.”

Making Attacks Public

“They’ll need government help to fight these incursions from the Net,” he says. “But acting on their own can’t be adequate. You can do certain things, but if you keep this thing covert, you’ll never summon the kind of clout you need to have a legitimate cure.

“That legitimate cure will involve some kind of understanding about how you’re dealing with encryption, with how you’re dealing with secrecy, of how privacy rights and access rights are going to exist, and of course law enforcement’s rights with respect to all this,” Kerry says. “It’ll have to be a cooperative effort, and will involve some public law.”

INTERNET POSES GREATER RISK

Serious cyber attacks on banks are still not common: SAI estimates they see only about five serious attempts on banks in any year. But a 1994 study by the RAND Corporation points out that as a simple matter of statistics, the danger of attacks on institutions of all sorts, including financial institutions, is bound to grow in tandem with the spread of computer use and the growth of the Internet.

Statistics on computer incidents reported to CERT, a computer security information clearing house and research facility located at Pittsburgh’s Carnegie-Mellon University and financed by the Defense Advanced Research Projects Agency (DARPA), grew about ten-fold between 1990 and 1996. An apparent leveling off of reported incidents since 1994, says a spokesman, is more probably due to a multiplying of places to report such incidents than a slackening in hacker activity. An incident can affect one computer or, on a LAN, 1,000. CERT began life in 1988 as DARPA’s computer emergency response team.

And a 1997 study by San Francisco’s Computer Security Institute, conducted in association with the FBI, says that the 249 organizations who replied to their survey reported losses totaling $100,119,555. System penetration, fraud, sabotage, theft of proprietary information and virus attacks accounted for $65,623,700. Financial services companies, including banks, accounted for 18.77 percent of responses.

CSI officials say the average loss to financial fraud was $957,384, while losses to system penetration averaged $132,250. In comparison, losses from Internet abuse by employees totaled about $1 million.

HISTORY-INDUCED TERROR

Ironically, it was our triumph in the Cold War that set the stage for our present problems. The United States won the Cold War. But Russia was not occupied.

This historic anomaly loosened control over both the former KGB and its clients in the world of terror. The result is less actual terroroviolent attacks on civilians by trained, politically motivated peopleobut more trained people left to shift for themselves. “The collapse of the Soviet Union has obviously let loose a tremendous amount of human capital and talent that has a lot of abilities that would normally be used for legitimate business purposes or purposes of the State, but now does not have an outlet,” says Francis Fukuyama, noted author of The End of History. “A lot of that is going to come out in illegitimate activities, including things like cyber terrorism.”

And in any event, Russia today is only partly what Americans think of as a nation, says Ambassador L. Paul Bremer, managing director at New York’s Kissinger & Associates and former Roving Ambassador for Counterterrorism in the second Reagan Administration. “It’s a bit of a combination of both,” he says. “It is in a sense a country in that you’ve got 145 million people who mostly speak the same language, who have all grown up under a central rule from Moscow, who use a common currency, and who are more or less defended by a common army. But there is a lot of warlordism; you do have governors and other satraps out there who have a lot of authority. I don’t think the last chapter is written yet; it could go either way in Russia.”

(Copyright American Banker Inc. – Bond Buyer 1997)

_____via IntellX_____

Copyright 1997, American Banker. All rights reserved. Republication and redistribution of American Banker content is expressly prohibited without the prior written consent of American Banker. American Banker shall not be liable for errors or delays in the content, or for any actions taken in reliance thereon.

Infowar.Com & Interpact, Inc. WebWarrior@Infowar.Com

Submit articles to: infowar@infowar.com
Voice: 813.393.6600 Fax: 813.393.6361
Last modified: Sun, 03 Jan 1999 00:05:20 GMT

Revealed: Welsh Man accused by NATO and NASA – Wales on Sunday

Posted by Kuji on June 26th, 2008

This is the mystery figure at the centre of a remarkable court case.

Cardiff computer student Matthew James Bevan appeared before Bow Street magistrates in London on Friday accused of hacking into the top secrets computer systems of NATO, NASA and the United States Air Force.

Military beefing up its hacker defenses – Computerworld

Posted by Kuji on June 26th, 2008

Military beefing up its hacker defenses
Computerworld

Why can’t the world’s most powerful military keep Internet hackers out of its computer systems?

Experts say part of the answer is that no system connected to the Internet is 100% secure, even at the Pentagon. And hackers just love to pesterbig institutions such as the military.

HACKER PAYS THE PIPER: AGE (MELBORNE)

Posted by Kuji on June 26th, 2008

O1 Apr 97 HACKER PAYS THE PIPER: AGE (MELBORNE) Reuter Textline

Music student RICHARD PRYCE, was only 16 when he first appeared at Bow Street Magistrates Court in London in 1994, charged with hacking into the US Air Force computer system using the PC in his bedroom. Last week his case was finally concluded. He pleaded guilty to 12 charges under Britain’s Computer Misuse Act, 1990, and was fined 1200 (Dollars A2400).

Reuter Textline
Copyright (C) Reuters Limited 1980-1997

HACKER FINED FOR UNAUTHORISED ACCESS Telecomworldwire

Posted by Kuji on June 26th, 2008

HACKER FINED FOR UNAUTHORISED ACCESS

LOVELL WHITE DURRANT recently represented Richard Pryce at Bow Street Magistrates Court, UK charged with 12 offences of gaining unauthorised access to computer systems. Pryce was sixteen years old when in 1994 he hacked into computer systems in the USA, including those of the US Air Force. Pryce pleaded guilty in respect of the 12 offences and Lovell White Durrant made a plea in mitigation which stressed that Pryce had since been punished by substantial disruption to his career, was of good character and had only acted through curiosity and had not exploited the vulnerabilities of the computer systems. Pryce was fined GBP1,200.

Copyright: 1997 M2 Communications, Ltd., All Rights Reserved.

HACKER FINED FOR UNAUTHORISED ACCESS., Telecomworldwire, 03-25-1997.

Richard Pryce fined GBP 1,200 for offences under the computer misuse act 1990

Posted by Kuji on June 26th, 2008

LOVELL WHITE DURRANT: Richard Pryce fined GBP 1,200 for offences under the computer misuse act 1990

Mr Bartle, a magistrate at Bow Street Magistrates Court, today accepted Richard Pryce’s plea of guilty
in respect of 12 offences of gaining unauthorised access to computer systems under the Computer Misuse Act 1990 when, aged 16, he “hacked” into computer systems in the United States of America, including those of the US Air Force, from a personal computer installed at his home. Following a plea in mitigation which stressed that Richard had been motivated by the curiosity of a teenager, had since been punished by substantial disruption to his career over a three year period and was of good character, the magistrate fined him GBP 1,200. Mr Pryce was represented by international law firm Lovell White Durrant.

The charges against Richard Pryce Richard was arrested at his parents’ home on 12 May
1994, when he was 16, by members of the Computer Crime Unit of New Scotland Yard, who were executing a search warrant. He had been traced by the US authorities to England after an informant provided them with a copy of an on-line conversation which had occurred several months earlier in which Richard disclosed that he was 16, from England and interested in US military systems. He had also provided the informant with his home telephone number. Following his arrest, Richard was released the same day on police bail. On 7 June 1995 – some 13 months after his original arrest, by which time he was in the middle of his A-level exams – he was charged at Holborn police station with 12 offences under Section 1(1) of the Computer Misuse Act 1990.

Three of these charges were later dropped and three more inserted in their place. On 19 June 1996 Richard was charged with two offences of conspiracy to commit an offence under Sections 1 and 3 of the same Act – charges which were withdrawn on 14 March 1997 after an abuse of process application was commenced by the defence. Despite implying that they would charge him with other offences under Section 3, the Prosecution eventually decided to proceed solely in respect of the revised set of 12 offences under Section 1(1).

The plea in mitigation The Defendant’s legal team stressed three points in the plea in mitigation made on his behalf.

First, Richard was not motivated by malice or by a desire for financial gain, and did not erase or alter
data on the computer systems or disclose any sensitive information.

His actions were motivated by the curiosity of a bright 16 year old who was not a sophisticated
computer user; he exploited vulnerabilities of the computer systems using information and methods to
gain access to insecure systems which were widely known and available.

Second, instead of being charged in a juvenile court, where he would have been dealt with speedily and with little publicity, Richard had suffered very public disruption to his career over a period of three
years. He had been punished severely already, through the repeated hearings and frequent alteration of the charges against him, extensive media and public interest in him and the case, and confiscation of equipment and material being used for his A-level studies.

Third, he had received excellent character references, had no previous convictions and had co-
operated with the police throughout.

The sentence After hearing the evidence, Mr Bartle accepted Richard’s plea of guilty. He rejected the option of a custodial sentence, on the grounds that it would be excessive in the light of the offences committed. He also rejected the option of a Community Service Order, on the grounds that it would have interfered unfairly with his music studies. Instead, the magistrate opted for a fine, at GBP 1,200 set at a level which takes account of Richard’s financial circumstances as a student (notably the fact that he receives a means-tested local authority grant). He also ordered him to pay GBP 250 towards costs.

Mr Pryce was represented in Court by Mr Martin Hicks, lead by Mr Geoffrey Robertson QC. Mr Geoffrey
Robertson, QC said: “The sentence handed down in this case should not be
misconstrued or interpreted in a way that suggests that the Courts do not take “hacking”, and its
effect, very seriously indeed. The particular combination of circumstances – the age of the
defendant, the delays in the prosecution process and the co-operation given by Richard – all contributed to the sentence which, in the circumstance, is just and fair. However, it should also be said that the case against Richard has been blown out of all proportion by the police, politicians (particularly in the United States) and the media, for reasons which have nothing to do with the facts of the case.

We are pleased that the magistrate saw reason and accepted our plea in mitigation. Richard has already paid heavily for what was, in effect, a schoolboy prank. It was not his fault that security systems in the computing and defense industries left something to be desired.

Mrs Pryce, Richard’s mother, said: On behalf of my son and the family as a whole, I would just like to say that we are relieved this is all over and very much hope that Richard will now be allowed to get on with his studies at the Royal College of Music. He has had a very tough time for nearly three years – despite accepting his guilt for the offences with which he was finally charged and his willingness to co-operate with the police – and would now like to put it all behind him.

NOTES FOR EDITORS

Richard Pryce
Richard Charles Vaughan Pryce was born on 26 May 1977. He lives with his parents, Nick and Alison, and his two sisters, Sally (aged 17) and Katie (aged 15) in Kingsbury, North London. His father and mother run their own business restoring musical instruments.

In September 1995, Richard started his studies at the Royal College of Music, where he has been awarded a scholarship following auditions at the Royal College.

He is an accomplished double bass player: he was the youngest member of the Brittan Pears orchestra and has toured in the UK and Europe with other orchestras.

At the time the offences were committed, Richard was
a pupil at Purcell School, Harrow in Middlesex. He
took his A-levels in 1995 (receiving an A in music
and a D in computer science).

The Computer Misuse Act 1990
Under Section 1 of the Computer Misuse Act 1990, it
is a criminal offence to cause a computer to perform
any function with a view to securing unauthorised
access, knowing at the time that that is the case.
The maximum sentence for an adult on conviction is
six months imprisonment or a fine not exceeding GBP
5,000 or both.

Under Section 3 of the Computer Misuse Act 1990, it
is a criminal offence to do any act which causes
unauthorised modification of the contents of a
computer with intent to impair its operation, prevent
or hinder access to a program or data, or to impair
the operation of a program or the reliability of any
data. Where the matter is dealt with in the
Magistrates’ Court, the maximum sentence for an adult
on conviction is six months imprisonment or a fine
not exceeding GBP 5,000 or both. Where the matter is
tried on indictment in the Crown Court, the maximum
sentence for an adult on conviction is five years
imprisonment or a fine (unlimited) or both

CONTACT: Fenella Gentleman, marketing communications
manager, Lovell White Durrant
Tel: +44 (0)171 236 0066
e-mail: fenella.gentleman@lovellwhitedurrant.com
WWW: http://www.lovellwhitedurrant.com

*M2 COMMUNICATIONS DISCLAIMS ALL LIABILITY FOR
INFORMATION PROVIDED WITHIN M2 PRESSWIRE. DATA
SUPPLIED BY NAMED PARTY/PARTIES.*

Copyright ? 1997 M2 Communications, Ltd., All Rights Reserved.

LOVELL WHITE DURRANT: Richard Pryce fined GBP 1,200 for offences under the computer misuse act 1990., M2 PressWIRE, 03-24-1997.

View Previous Article View Article Index View Next Article

SOUTH CHINA MORNING POST: HACKER OF THE WEEK

Posted by Kuji on June 26th, 2008

23 Mar 97 SOUTH CHINA MORNING POST: HACKER OF THE WEEK
:The teenage security threat: Asia Intelligence Wire

RICHARD PRYCE

If you had to imagine the number one threat to America’s security, you might go for a terrorist group or a coalition of Iraq, Libya and North Korea. You would be unlikely to select a teenage double bass player at a British music college.

But RICHARD PRYCE, from a north London suburb, can count himself among those who have been elevated to the ranks of major threats to United States national security up there alongside Iraqi leader Saddam Hussein.

Pryce’s claim to fame, or infamy, lies in the way he hacked into America’s deepest defence secrets. At one point, he was even accused of having caused more harm to the US defence and missile systems than Russian intelligence. One might, equally, imagine that such a number one threat would operate from a secret base filled with the latest computers and advanced software. But PRYCE did it all from his bedroom in the suburb of Colindale, with equipment worth a grand total of GBP7SO (HK$9,315).

He was just 16 at the time. PRYCE, who only got a D grade in computer science, obtained the passwords to download super-secret computer records in New York and California, including an Air Force base which deals with sensitive subjects such as artificial intelligence.

When he was brought to trial last week, his solicitor said that officials believed he was being manipulated by an East European outfit.
A US congressional report on computer attacks said he had been seizing control of defence department computers on the direction of an unknown third In the Senate in Washington, PRYCE was accused of “causing more harm than the KGB” and described as the number one threat to US security.
The magistrates took a more lenient view. Fining PRYCE GBP1,200 on Friday, they accepted his innocent motives after he admitted 12 charges of gaining access to the computers.

But they did order his computer equipment to be confiscated.
PRYCE, now 19, was arrested after the US Air Force Office of Special Intelligence investigated the hacking.
They codenamed the unknown culprit “Datastream Cowboy”, and finally got his name from other computer users.

The Pentagon said yesterday it was taking measures to stop its systems coming under computer attack.

British teenager fined after hacking into US defence system

Posted by Kuji on June 26th, 2008

22 Mar 97 British teenager fined after hacking into US defence system:
His lawyer says RICHARD PRYCE used information he learned on the Internet to gain access.

By JASON BENNETTO LONDON

LONDON – A British teenager who barely passed computer science was fined Friday for hacking into United States defence and missile systems and removing files on artificial intelligence and battle management.

RICHARD PRYCE was only 16 when he used a basic dollars 1,650 computer from his bedroom in north London to infiltrate some of America’s top security establishments.

Codenamed Datastream Cowboy, PRYCE, now 18, was the subject of allegations in the US Senate, where the unknown ‘spy’ was accused of ‘causing more harm than the KGB.’

He has also been described as ‘the number one threat to US security.’ But his lawyer insisted Friday it was a ‘schoolboy prank’ and that the teenager with just six months experience had used information taken off the Internet to break into the US networks.

Lawyers believe the case shows the extraordinary lax security deployed within US military systems.

PRYCE was fined dollars 3,200 after pleading guilty to 12 charges of gaining unauthorized access to computer systems in March and April 1994.
He has now dropped his interest in computers in favor of a double bass that he studies at the Royal College of Music in London.

The first that Pryce’s parents, Nick and Alison, knew of their son’s activities was when members of Scotland Yard’s Computer Crime Unit arrived at the home in Colindale to arrest him.
Bow Street Magistrates’ Court heard that PRYCE managed to hack into the Griffiss Air Force Base in New York.

It is alleged he downloaded material from the air force base about artificial intelligence and battlefield management systems.
He also broke into the Lockheed Space and Missile Company in California. The systems he was said to have obtained access to included those for ballistic weapons research and aircraft design, payroll, procurement, personnel records and electronic mail.

Pryce’s forays led to allegations that a spy had managed to infiltrate secret intelligence data.
His hacking was described as an example of a growing and serious threat to US national security in reports and testimony to a Senate committee by the US General Accounting Office.

Some of the more outlandish allegations about the effects of Pryce’s hacking exploits were later seen as an attempt to obtain extra funding. Indeed, US officials later insisted PRYCE had been unable to access any secret information.

Despite these claims it is understood that the British authorities were considering using a Public Immunity Certificate, a gagging order, to cover part of the hearing, but decided not to bother after the more serious charges were dropped.

Defence lawyer Geoffrey Robertson said that what the Pentagon had at first suspected was a European spy-ring was later
discovered to be the teenaged Londoner.

‘He was riding, rather than surfing, the Internet.
‘He made no profit and there was no subversion of defence systems,’ he said.
His lawyer says RICHARD PRYCE used information he learned on the Internet to gain access.

The Vancouver Sun Page A10
FINAL Copyright (C) The Vancouver Sun 1994-1997

BRITON CHARGED WITH HACKING INTO PENTAGON DATA: REUTER NEWS

Posted by Kuji on June 26th, 2008

23 Jun 96 BRITON CHARGED WITH HACKING INTO PENTAGON DATA: REUTER NEWS

LONDON

British police said on Sunday they had charged a second man with hacking into US military computers months after the arrest of a teenage whizzkid accused of gaining access to messages from US agents in North Korea. MATHEW BEVAN, a 21-year-old information technology technician, has been charged with conspiracy to gain unauthorised access to computers and conspiracy to cause unauthorised modification to computers.

A spokeswoman for Scotland Yard said both charges related to computer systems operated by the US military and the Lockheed missile and space company.
Bevan’s co-defendant, RICHARD PRYCE, was charged last year with using a computer in his bedroom in north London to tap into several US Defence Department systems over a period of seven months.

PRYCE, who was just 16 at the time, got access to files on ballistic weapons research and messages from US agents in North Korea during a crisis over nuclear inspection in 1994, according to reports last year in The Independent newspaper.

Police sources said the two were arrested after a long search instigated by the US Air Force’s Office of Special Investigations based in Washington. BEVAN, from Cardiff in Wales, is to appear before magistrates in central London on July 11.
A recent study by the General Accounting Office of Congress said attempts to hack into Pentagon computers were running at a rate of 250,000 a year.
The GAO said the attacks were, at least, a multi-million dollar nuisance and, at worst, could pose a serious threat to national security.

(c) Reuters Limited 1996
Reuter News Service – United Kingdom. Reuter Economic News.
Companies: LCKHED LOCKHEED MARTIN CORPORATION HLDG (USA)
Reuter Textline
Copyright (C) Reuters Limited 1980-1997



Copyleft © 2007 - 2012+ Kuji Media Corporation Ltd.. All rights reserved.