US cracks case of hacker who broke into military networks

Posted by Kuji on June 26th, 2008

By TED BRIDIS
Associated Press Writer

WASHINGTON – Federal authorities have cracked the case of an international hacker who broke into roughly 100 unclassified U.S. military networks over the past year, officials said Monday.

Officials declined to identify the hacker, a British citizen, but said he could be indicted as early as Tuesday in federal courts in northern Virginia and New Jersey. Those U.S. court jurisdictions include the Pentagon in Virginia and Picatiny Arsenal in New Jersey, one of the Army’s premier research facilities.

The officials declined Monday to say whether this person was already in custody, but one familiar with the investigation, who spoke only on condition of anonymity, said investigators consider the break-ins the work of a professional rather than a recreational hacker.

Authorities planned to announce details of the investigation Tuesday afternoon.

Officials said U.S. authorities were weighing whether to seek the hacker’s extradition from England, a move that would be exceedingly rare among international computer crime investigations.

Officials said this hacker case has been a priority among Army and Navy investigators for at least one year. One person familiar with the investigation said the hacker broke into roughly 100 U.S. military networks, none of them classified. Another person said the indictments were being drafted to reflect break-ins to a “large number” of military networks.

In England, officials from the Crown Prosecution Service, Scotland Yard and the Home Office declined comment Monday.

A civilian Internet security expert, Chris Wysopal, said that a less-skilled, recreational hacker might be able to break into a single military network, but it would be unlikely that same person could mount attacks against dozens of separate networks.

“Whenever it’s a multistage attack, it’s definitely a more sophisticated attacker,” said Chris Wysopal, a founding member of AtStake Inc., a security firm in Cambridge, Mass. “That’s a huge investigation.”

The cyber-security of U.S. military networks is considered fair, compared to other parts of government and many private companies and organizations. But until heightened security concerns after the Sept. 11 attacks, the Defense Department operated thousands of publicly accessible Web sites. Each represented possible entry-points from the Internet into military systems unless they were kept secured and monitored regularly.

It would be very unusual for U.S. officials to seek extradition. In previous major cyber-crimes, such as the release of the “Love Bug” virus in May 2000 by a Filipino computer student and attacks in February 2000 by a Canadian youth against major American e-commerce Web sites, U.S. authorities have waived interest in extraditing hacker suspects to stand trial here.

Once, the FBI tricked two Russian computer experts, Vasily Gorshkov and Alexey Ivanov, into traveling to the United States so they could be arrested rather than extradited. The Russians were indicted in April 2001 on charges they hacked into dozens of U.S. banks and e-commerce sites, and then demanding money for not publicizing the break-ins.

FBI agents, posing as potential customers from a mock company called Invita Computer Security, lured the Russians to Seattle and asked the pair for a hacking demonstration, then arrested them. Gorshkov was sentenced to three years in prison; Ivanov has pleaded guilty but hasn’t been sentenced.

But the Bush administration has toughened anti-hacking laws since Sept. 11 and increasingly lobbied foreign governments to cooperate in international computer-crime investigations. The United States and England were among 26 nations that last year signed the Council of Europe Convention on Cybercrime, an international treaty that provides for hacker extraditions even among countries without other formal extradition agreements.

There have been other, high-profile hacker intrusions into U.S. military systems.

In one long-running operation, the subject of a U.S. spy investigations dubbed “Storm Cloud” and “Moonlight Maze,” hackers traced back to Russia were found to have been quietly downloading millions of pages of sensitive data, including one colonel’s e-mail inbox. During three years, most recently in April 2001, government computer operators watched as reams of electronic documents flowed from Defense Department computers, among others.

In 1994, two young hackers known as “Kuji” and “Datastream Cowboy” were arrested in England on charges they broke into the U.S. Air Force’s Rome Laboratory. They planted eavesdropping software that allowed them to monitor e-mails and other sensitive information.

(Copyright 2002 by The Associated Press. All Rights Reserved.)

Hackers Rule OK

Posted by Kuji on June 26th, 2008

06:05 Monday 27th December 1999
Will Knight

People may associate it with the US, but
hacking – both legal and illegal – is an international phenomenon. And Britain has its own distinct history of computer exploits

Hackers are often thought of as sinister computer criminals or a grubby and degenerate social underclass. In reality the history of hacking includes some of the greatest technological and intellectual innovations in modern times alongside the better-publicised computer crimes. Many prefer to draw a line between experimentation and programming, on the one hand, and illegal or destructive computer activity (often referred to as “cracking”) on the other.

Hacking is intricately linked with the emergence of the open- source movement, the development of the Internet and the creation of computers, as well as the emergence of a new techno-savvy subculture. The contribution that Brits have made to this saga has been woefully under-represented in the histories of hacking that have proliferated on the Web.

Here, then, are some of the milestones of British hackerdom.

“Hacking might be characterised as ‘an appropriate application of ingenuity’. Whether the result is a quick-and- dirty patchwork job or a carefully crafted work of art, you have to admire the cleverness that went into it.” — Eric Raymond, The Hacker’s Dictionary

1940

Alan Turing and other cryptanalyts apply the scientist’s theory of The Universal Turing Machine at the Government Code and Cipher School (GC&CS) at Bletchley Park to crack the German military’s legendary Enigma code. These tweed and corduroy cyber-cowboys received virtually no public acknowledgement for their exploits because of national secrecy as well as the lack of mean handles such as “laser boy” or pHr3Ak!n tUr1N9.

1952

Government Communications Headquarters (GCHQ) located in Cheltenham takes over from GCCS as Britain’s answer to the US’ NSA (National Security Agency). In charge of developing and implementing computer surveillance technology, GCHQ still plays a vital role fending off the malevolent forces of freelance British hacking.

1960

BT introduces Switched Packet System (SWP) paving the way for increased phone hacking.

1981

IBM introduces the first Personal Computer (PC)

1982

Thieves hack into the telephone line at Lloyds bank in Holborn in order to disable its alarm system.

1983

Head of the metropolitan computer crime unit Ken McPherson predicts that in 15 years all fraud would be computer related.

1984

Ribert Schifreen and Steve Gold break into BT’s prehistoric Prestel messaging system and gain unlawful access to the personal account of beloved royal patriarch Prince Philip. Estimated to have cost Prestel customers a grand total of ?11, Schifreen and Gold are fined ?750 and ?600 respectively.

1988

Peter Sommer creates the influential classic “The Hacker’s Handbook” under the pen-name of Hugo Cornwall. Although now largely outdated, the book is a testament to the heritage of phone phreaking in Britain and contains memorable guides to subverting all manners of computer and telecommunications networks.

The “Mad Hacker”, also known by the slightly less intimidating handle Nick Whitely, is arrested and accused of running amok on the computer systems of the Ministry of Defence and MI5. Whitely claimed to have gathered evidence of Conservative government surveillance of the Labour party and CND. Despite this extraordinary behaviour, Whitely served only two months in prison in 1990.

1990

Briton Tim Berners-Lee co-invents the World Wide Web, paving the way for thousands of script kiddie Web site defacements and denial of service attacks.

The Computer Misuse Act is amended to make it illegal to gain unauthorised access a personal computer or to alter the data on a personal computer without permission. Only a handful of individuals have, however, even been charged under this act. It remains far more practical to prosecute for software piracy and bizarrely even for stealing electricity.

1992

A group of three hackers calling themselves the Little Green Men are arrested, although one famously escapes prosecution after pleading computer addiction.

1994

This is the year when a couple of Limey computer tricksters give the might of the US government a bit of a shock. Matt Bevan and Richard Pryce, AKA Kuji and Datastream Cowboy, made headlines in the national press when they broke into the computer network of a modest little American government compound called the Pentagon.

Group of Russian hackers are arrested in London after breaking into the computer systems at Citibank and stealing more than $10m, one of the few instances of computer fraud that have reached the papers. The International Chamber of Commerce recently admitted it was aware of a number of cases of organised computer extortion and theft. Hardly surprisingly, however, no other British financial institution has ever come clean and admitted to having been targeted by computer hackers.

1996

Conservative Party Web site is cracked in Britain’s first ever politically inspired piece of Web defacement.

1997

Coldfire (Leon Fitch) is arrested after alleged hacking activities. While on bail, he is charged with cloning cellular phones.

A group called Milw0rm, containing a number of British hackers, targets Indian nuclear bases at the time of India’s controversial nuclear testing.

Paul Spiby is arrested and accused of nefarious telephone activities.

Pipex Dial 0800 loophole allows free unauthorised Internet access until details of the flaw were inadvertently published in underground magazine Port Sniffer.

1999

Endorsing the view that one politician is as good as the next, another bunch of crackers deface the Labour Party’s site, much to the annoyance of the supposedly techno-savvy new government.

An individual is apprehended for alledgedly gaining illegal access to a 0800 number created by a BT employee and enjoying the luxury of totally free Internet access (the case is ongoing).

Computer hacking appears to have entered public consciousness (albeit with particularly negative connotations) to such an extent that even the technophobic Tory party blames hackers for the exposure of its shady financial dealings.

British cyber activists attempt to co-ordinate even the most technologically inept into a mass denial of service attack on the World Trade Organisation. Misfires somewhat, but still illustrates the growing importance of computer “misuse” to the average Brit.

Hacking: A history

Posted by Kuji on June 26th, 2008

Friday, 27 October, 2000, 17:57 GMT 18:57 UK
Hacking: A history

The ILOVEYOU virus as victims saw it

By BBC News Online internet reporter Mark Ward

Great hacks of our time

The original meaning of the word “hack” was born at MIT, and originally meant an elegant, witty or inspired way of doing almost anything.

Many early hacks took the form of elaborate practical jokes. In 1994, MIT students put a convincing replica of a campus police car on top of the Institute’s Great Dome.

Now the meaning has changed to become something of a portmanteau term associated with the breaking into or harming of any kind of computer or telecommunications system.

Purists claim that those who break into computer systems should be properly called “crackers” and those targeting phones should be known as “phreaks”.

1969

Arpanet, the forerunner of the internet, is founded. The first network has only four nodes.

1971

First e-mail program written by Ray Tomlinson and used on Arpanet which now has 64 nodes.

1972

John Draper, also known as Captain Crunch, finds that a toy whistle given away in the cereal with the same name could be used to mimic the 2600 hertz tones phone lines used to set up long distance calls.

1980

In October, Arpanet comes to a crashing halt thanks to the accidental distribution of a virus.

1983

The internet is formed when Arpanet is split into military and civilian sections.

Wargames, a film that glamorises hacking, is released. Many hackers later claim it inspired them to start playing around with computers and networks.

1986

In August, while following up a 75 cent accounting error in the computer logs at the Lawrence Berkeley Lab at the University of California, Berkeley, network manager Clifford Stoll uncovers evidence of hackers at work. A year-long investigation results in the arrest of the five German hackers responsible.

1988

Robert Morris, a graduate student at Cornell University, sets off an internet worm program that quickly replicates itself to over 6,000 hosts bringing almost the whole network to a halt. Morris is arrested soon afterwards and is punished by being fined $10,000, sentenced to three years on probation and ordered to do 400 hours of community service.

1989

Kevin Mitnick: Arrested
twice for hacking
Kevin Mitnick is
convicted of stealing software from Digital Equipment and codes for long-distance lines from US telephone company MCI. He is the first person convicted under a new law against gaining access to an interstate computer network for criminal purposes. He serves a one-year prison term.

At the Cern laboratory for research in high- energy physics in Geneva, Tim Berners-Lee and Robert Cailliau develop the protocols that will become the world wide web.

1993

Kevin Poulsen, Ronald Austin and Justin Peterson are charged with conspiring to rig a radio phone-in competition to win prizes. The trio seized control of phone lines to the radio station ensuring only their calls got through. The group allegedly netted two Porsches, $20,000 in cash and holidays in Hawaii.

1994

A 16-year-old music student called Richard Pryce, better known by the hacker alias Datastream Cowboy, is arrested and charged with breaking into hundreds of computers including those at the Griffiths Air Force base, Nasa and the Korean Atomic Research Institute. His online mentor, “Kuji”, is never found.

Also this year, a group directed by Russian hackers breaks into the computers of Citibank and transfers more than $10 million from customers’ accounts. Eventually, Citibank recovered all but $400,000 of the pilfered money.

1995

In February, Kevin Mitnick is arrested for a second time. He is charged with stealing 20,000 credit card numbers. He eventually spends four years in jail and on his release his parole conditions demand that he avoid contact with computers and mobile phones.

On November 15, Christopher Pile becomes the first person to be jailed for writing and distributing a computer virus. Mr Pile, who called himself the Black Baron, was sentenced to 18 months in jail.

The US General Accounting Office reveals that US Defense Department computers sustained 250,000 attacks in 1995.

1996

Popular websites are attacked and defaced in an attempt to protest about the treatment of Kevin Mitnick.

The internet now has over 16 million hosts and is growing rapidly.

1999

David Smith: Creator of
the Melissa virus
In March, the Melissa
virus goes on the rampage and wreaks havoc with computers worldwide. After a short investigation, the FBI tracks down and arrests the writer of the virus, a 29-year- old New Jersey computer programmer, David L Smith.

2000

In February, some of the most popular websites in the world such as Amazon and Yahoo are almost overwhelmed by being flooded with bogus requests for data.

In May, the ILOVEYOU virus is unleashed and clogs computers worldwide. Over the coming months, variants of the virus are released that manage to catch out companies that didn’t do enough to protect themselves.

In October, Microsoft admits that its corporate network has been hacked and source code for future Windows products has been seen.

Hacker infiltrates military satellite

Posted by Kuji on June 26th, 2008

Hacker infiltrates military satellite
By Sean Fleming
Posted: 01/03/1999 at 16:42 GMT

The UK Ministry of Defence has come under attack from a hacker who is allegedly threatening to target military satellites unless a £3 million ransom is handed over.

According to a story in today?s Daily Mail, the hacker has already seized control of one satellite, altering its course. The satellite in question is said to be involved in co- ordinating bombing raids on Iraq. Other targets for the hacker have been GCHQ – the spying operation that listens in on telephone calls and other communications – and a number of UK operations overseas. Officers from the Metropolitan Police Computer Crime Unit are said to be engaged in tracking down the source of the attacks. The authorities are said to have been so concerned about the attack on the satellite that the prime minister, Tony Blair, was informed. High profile hackings are becoming more common. One of the most well known was involved two UK hackers, Datastream Cowboy (Richard Pryce) and Kuji (Mathew Bevan), who caught the CIA’s attention in 1994 after the Pentagon?s computer was broken into. The South Korean atomic research institute was also hacked, provoking fears that World War III might be started by a teenage computer hacker sitting in his bedroom.

Hacker turns to vendors as IT PI

Posted by Kuji on June 26th, 2008

Hacker turns to vendors as IT PI

Steve Masters [05-12-1997]

One of the two hackers accused of almost starting World War III from his bedroom in the UK walked free from court on 21 November because the law is not set up to deal with cases like his, writes Sean Fleming.

In an interview with Computing, Matthew Bevan announced he is now considering a career in IT security.

Bevan was arrested on 21 June 1996 and charged with intent to secure access to computer systems belonging to the US Air Force and defence manufacturer Lockheed. His accusers maintained he knew that such access would be unauthorised.

More than three years and 14 court appearances later, the case has been dropped. The prosecution declared it would not be in the public interest to pursue the matter.

Bevan, who used the name Kuji, and Richard Pryce – known as Datastream Cowboy – stood accused of hacking into a research centre at Griffiss Air Force base in New York state. It took two years for the US authorities to admit the break-in had taken place.

In a statement to the court, US Air Force investigator Jim Christy said the incident cost the US Air Force $211,722 (#124,000) – exclusive of the cost of their investigations.

Christy outlined the events that almost brought East and West to the brink of war. He described how Datastream Cowboy (aged 16 at the time) hacked his way into a research facility in Korea. The US authorities became aware of this when they realised that the contents of the Korean Atomic Research Institute’s database had been deposited on USAF’s New York system.

‘Initially it was unclear whether the system belonged to North Korea or South Korea,’ Christy said. ‘The concern was that if it was North Korea, they would think the transfer of data was an intrusion by the US Air Force.’

It turned out to be South Korean data, but it is not hard to imagine the potential outcome had the 16-year-old found his way into North Korea’s system. The US press referred to Bevan and Pryce as ‘digital delinquents’.

Pryce walked out of court this summer with a #1,200 fine – not much of a slap on the wrists for actions that might have sparked a war. The lenience of his sentence was the key to Bevan escaping punishment altogether.

Simon Evenden, Bevan’s solicitor, told Computing why the prosecution chose not pursue his client. He stressed that in court, judge Jeffrey Rivlin QC made it clear that he felt the prosecution had in no way done anything wrong when preparing its case.

‘The case collapsed simply because it was not economically viable to take it forward. It would have cost hundreds of thousands of pounds to bring witnesses over from the US and because of what happened to Pryce, Matthew would probably only have been fined or given community service. So it was agreed that it was not in the public interests to continue.’

Had the case continued, getting the prosecution evidence to stand up in court could have proved problematic. It is unlikely the court would have accepted any evidence stored on a computer, unless it could satisfy itself it had not been tampered with. The US authorities were happy to supply copies of emails plus records showing times and dates at which computers were hacked into, but they would not allow the court access to original information.

In the light of the Bevan case, the defence and prosecution teams are to come together in an attempt to plug some of the gaps in the law. They will be arguing for changes to a system that is clearly finding it hard to keep pace with technological change.

From the horse’s mouth Interview with Matthew Bevan

Offered the choice between pleading guilty in the hope of the court being lenient or fighting it out, Matthew Bevan plumped for the latter. He explained why to Computing. ‘As far as I was concerned, I was charged with conspiracy, which was not true, and charged with working with Richard Pryce, which was not true. As well as having to prove that I did it, the prosecution would have had to prove there had been intent. I was accused of putting a sniffer on one of the computers. The point of a sniffer is to sit undetected on a computer monitoring who’s using it and copying their passwords. It’s not there to impair the performance of the computer. So, even if they could have proved I put it there, they couldn’t prove intent to cause damage.’ Bevan is now considering a career in IT security. ‘If I can find a job where I can get paid for doing the same sort of thing as hacking, I won’t complain,’ he said.

Confessions of a hacker by Mathew Bevan

Posted by Kuji on June 26th, 2008

Taken from “The Sunday Business Post Online” www.sbpost.ie
Cib Cover Story Confessions of a hacker
Dublin , Ireland, April 1, 2001

Mathew Bevan was known as Kuji, hacker extraordinaire, probing everything from company ceo’s files to US military bases. The Pentagon described him as “the number one threat to US security”. One day men in dark suits arrested him and he faced charges that might have sent him to jail for 15 years

This, in his own words, is his story.

I cannot help being a hacker. I have always been clever and resourceful. Later on, I became addicted to the adrenaline of electronically rifling a chief executive’s files or looking at the latest space station plans at NASA. In the months leading up to my arrest, I was described by a Pentagon official as “possibly the single biggest threat to world peace since Adolf Hitler”. Then, I faced 15 years in prison.

But first I would like to tell you about my background. I believe it will help you understand why I became what I am. This is my story.
I was 12 when I first got a computer. I was given a Sinclair ZX81 and a subscription to some computing magazines.

When I was 12, I was a nerd. I was beaten and bullied almost every day of my young school life. Through my latter school years the physical abuse was replaced with name-calling and other mental abuse.

Later on, I realised that it was this time in my life which proved the precursor to my hacking.
Like most nerds, I upgraded my machine as often as I could. At the age of 15, I bought an Amiga 500. To me, the Amiga was a piece of computing genius. Not only did it have better graphics than any PC, but also had four channel stereo sound, something that would prove useful in the months to come.

My first revelation was in discovering bulletin boards. A bulletin board was what would be described as a usenet chat forum today. Except it was much more basic. And much less regulated. My friend gave me his 2,400 baud modem and, for a month, I called every BBS (Bulletin Board) number I could get my hands on.

At the end of the month, my mother showed me a ?400 phone bill. She said she never wanted to see a phone bill like that again. From that point onwards, she never did.

I began learning about manipulation of the phone system. Not only could I make free calls, but I could obfuscate call origin. Like every aspiring hacker, I wanted to be anonymous. I found I could do so by diverting the call through several countries before reaching my destination.

I had the ability to call anywhere in the world for free and be untraceable. I was given the number to a bulletin board in Belgium called Sin City. It was a hangout for electronic deviants. I met people on that bulletin boards who were interested in the skills I had accumulated on the phone system. As a trade for that information they gave me documents, files and other information to break into computers.

Then, hackers were free with their information and less wary of the law. Then, there was no such thing as a Computer Misuse Act (British legislation) and hackers could see no harm in anything they were doing. (Today, we face longer prison sentences than those who have committed the most heinous of crimes. We can now be dealt with under the new [British] anti-terrorist laws putting our crimes above that of murder.)

So I began to make friends. I was able for the first time to interact with people all across the globe. These people wanted nothing more than to share interests and as a result we became good friends, even though I would only ever actually meet a handful of them in person. Here, in the computer realm, I was strong and fearless, even if I felt scared and powerless in real life. I would get up and go to school, hate it, return home and get on the internet until about 4am or 5am. Then I would sleep for an hour or two and repeat the cycle.

I began taking the path of the computer mis-user very quickly, and it was not long before I was breaking into all sorts of machines, big and small. I did it purely because I could. One way of describing it is in relation to the curiosity that a parent feels when they find their child’s diary. They know it is wrong to read it, but something inside is just too inquisitive.

Hacking is like that in many ways. You know it’s wrong but the excitement, the rush of being in a powerful institution’s files is overwhelming. That is where the addictive nature of hacking can take hold. You feel the rush once — you want it again. And again. And again.

I cannot actually remember the first; I hacked so many machines in quick succession that the specifics elude me for all but the most memorable.
But this was soon to come.

I hacked everything I could, but there was something lacking; I wanted a direction. I found that needed direction on a bulletin board based in Australia. The bulletin board was called Destiny Stone and was run by a phone phreaker called Ripmax. A phone phreaker is a term for someone who hacks at systems using a phone connection. Ripmax had ended up on the wrong side of the law. What I found on his system were hundreds of documents about UFOs, government cover-ups and conspiracy theories.

I became interested. At that time, a hacker publication called PHRACK released a story about the alleged disappearance of 40 hackers. They had been targeting military systems to try an uncover the truth.

PHRACK printed the names of the bases that were thought to have been the targets by the missing group. I noted all of the military bases that were named in the various UFO documents I had downloaded.

I then began a systematic attack on each of the ones I could find with online equivalents. I had many jump-off points with which to attack these military bases. I thought I was safe.

I had already broken so many other systems, corporate, educational, and government contractors that it would be easy to find routes into the systems.

I was naive. While I was penetrating the different bases, four thousand miles away a group of high-ranking military personnel from the Air Force Office of Special Investigations (AFOSI) and Air Force Information Warfare Centre (AFIWAC) were gathered around a few computer terminals at Griffiss Air Force Base in Rome, New York.
This group, I learned from later reports (and three subsequent US Senate enquiries), were `hacker trackers’. They monitored all activity including keystrokes within the network and they were watching a particular chain of events closely. Over the preceding days, they had been following the activities of two hackers, Datastream Cowboy and Kuji, who had penetrated numerous sensitive computer systems belonging to the army and Air Force.

They discovered via an informant on an Internet chat system, IRC, that Datastream Cowboy was a 15 year old English boy. Shortly afterwards, a boy, Richard Pryce was arrested by the Metropolitan Computer Crime Unit, in England.
For legal reasons, I must be careful now about how I continue. The other hacker was deemed more elusive and wily and the only thing the group had to go on was his handle Kuji. Little was known about this hacker. Kuji had been spotted on an Australian bulletin board by investigators but that is where information ran dry. Investigators said that Kuji would stay online for only short periods of time, never long enough to be traced successfully.

The investigators said that while Datastream Cowboy made mistakes, Kuji seemes flawless in his technique. They would observe what they believed to be Datastream Cowboy attempting to attack a site, fail, talk to Kuji and a minute later successfully get in.

They concluded that Kuji was far more sophisticated and had financial motives. They decided that Kuji was a spy, tutoring the younger Datastream Cowboy in exchange for military secrets. It did not occur to them that the culprit could be an 18 year old kid living in Cardiff with very little stashed under the floorboards.
In the following year, Kuji became the subject of unprecedented comment and speculation. The story of the hacking broke. US Senate enquiries ensued. One pentagon official described Kuji as “possibly the single biggest threat to world peace since Adolf Hitler”.

One year later, a year after Pryce’s arrest (he was later fined ?1,200), a tip-off to the police identified ‘Kuji’ and subsequently I was arrested at work.

At the time, I was working in the IT department of an Insurance company and was fixing the MD’s computer. A group of dark suited men walked into the office. I was read my rights and arrested for various computer crimes against NATO, NASA, the US Air Force and other military installations.
I had a suspicion they might find me, but believed that due to them looking for a spy the chances were slim. My reaction was one of calm. I had read reports of Pryce’s arrest and was aware that he had broken down in tears. Reports had claimed that he began shouting “God, what have I done”. I did not want that to be held against me.

I was taken to the local police station for questioning and charged with conspiracy under the (British) Computer Misuse Act.
For the next 18 months I was prosecuted and underwent preparation for a trial which could have sent me to prison for 15 years.
I maintained throughout that any hacking I had done was on my own. There was no conspiracy. My argument was that I was in competition. As such I refused to accept any deals with which the prosecution offered based upon conspiracy.
In addition, conflicting information regarding sensitive information held on the sites and various other technical faults affected the prosecution’s case.

By the time the prosecution realised there was no conspiracy, they had run out of time to charge me with the other original offence, unauthorised access. This left them with only three more serious offences including unauthorised access with intent to impair the operation of the computer. This was nonsense. I would never wish to impair a machine I am having fun using to attack other machines.

The case was finally decided before going to trial with the prosecution offering no evidence. That meant a full acquittal with not guilty verdicts recorded. The British Crown Prosecution Service held that it was not in the public interest to prosecute me. They estimated the cost of a four month trial at ?10,000 a day plus the cost of bringing high ranking military personnel from America.

Looking back, I now believe that my case was not about hacking, but an exercise in propaganda. In the same year that a handful of hackers were caught, there was an estimated 250,000 attacks on computers in the US Department of Defence.
It was a prime target. I believe it was no coincidence that when the Senate was being asked for money to fund protection against Information Warfare, a case study appearing to proving their point fell in their laps.

But I am not bitter. I have respect, now. I am not bullied anymore. I will not attack your company anymore. I now work on the right side of the law as a computer consultant, mainly work performing penetration tests. I also volunteer my time and technical ability to www.antichildporn.org.

But I am still a hacker.

Mathew Bevan can be reached at hacker@kujimedia.com or www.kujimedia.com

Tales of Digital Crime from the Shadows of Cyberspace – Chapter Six

Posted by Kuji on June 26th, 2008

Tangled Web:

Tales of Digital Crime from the Shadows of Cyberspace

Chapter Six

One of the greatest misconceptions among the many who hamper the defense of cyberspace is the idea that all hacking is done only by juvenile joy riders: i.e., youthful geniuses bent on embarrassing law enforcement and the military. Of course, one of the ways in which this misconception is spread is through the mainstream media. Most cases that reach the light of day usually do end up involving juvenile hackers.

Why? Well, cases involving true cyberterrorists, information warriors, intelligence agencies, and corporate spies slip below the surface of the headlines. They are lost in the murky waters of “classified operations” or are swept under thick corporate carpets. (You’ll read more about such cases in Chapter 10 and Chapter 12.)

Juvenile hackers or other “sport hackers” (a term used to describe hackers who break into systems for the same reasons but aren’t minors) end up in the newspapers because they get caught. They also end up in the headlines because they seek the limelight. Furthermore, acknowledging their activities doesn’t open a Pandora’s box for the government agency or the corporation that was hit. If a government agency acknowledged an intelligence operation conducted by another country, there could be serious diplomatic or even military consequences. If a major corporation acknowledged a hack attack in which trade secrets were compromised seemingly by another corporation, there would be a public relations debacle: for example, their stock could dive, lawsuits could get filed, etc.

Nevertheless, juvenile or sport hackers, or joy riders, have wreaked a lot of havoc and mayhem over the years.

Here are some of the details of three high-profile stories, stretching from 1994 to 1999, that illustrate some of the lessons learned and unlearned along the way.

The Rome Labs Case: Datastream Cowboy and Kuji Mix It Up with the U.S. Air Force

The Rome Air Development Center (Rome Labs), located at Griffiss Air Force Base (New York), is the U.S. Air Force’s premier command-and- control research facility.

Rome Lab researchers collaborate with universities, defense contractors, and commercial research institutions on projects involving artificial intelligence systems, radar guidance systems, and target detection and tracking systems.

On March 28, 1994, Rome Labs’s system administrators (sysadmins) noticed that a password sniffer, a hacking tool that gathers user’s login information, had been surreptitiously installed on a system linked to the Rome Labs network. The sniffer had collected so much information that it filled the disk and crashed the system, according to James Christy, who was director of Computer Crime Investigations for the Air Force Office of Special Investigations.

The sysadmins informed the Defense Information Systems Agency (DISA) that the Rome Labs network had been hacked into by an as yet unknown perpetrator. The DISA Computer Emergency Response Team (CERT), in turn, informed the Air Force Office of Special Investigations (AFOSI) of the report of an intrusion. The AFOSI, in turn, informed the Air Force Information Warfare Center (AFIWC), headquartered in San Antonio, Texas.

An AFOSI team of cybercrime investigators and security experts was dispatched to Rome Labs. They reviewed audit trails and interviewed the sysadmins. The conclusions that they reached in their preliminary investigation were very disturbing.

Two hackers had broken into seven different computers on the Rome Labs network. They had gained unlimited access, downloaded data files, and secreted sniffers on every one of them. The seven sniffers had compromised a total of 30 of Rome Labs’s systems.

These systems contain sensitive research and development data.

System security logs disclosed that Rome Labs’s systems had been actually been hacked into for the first time on March 23, five days before the discovery made on March 28.

The investigation went on to disclose that the seven sniffers had compromised the security of more than 100 more user accounts by capturing user logons and passwords. Users’ e-mail messages had been snooped, duplicated, and deleted. Sensitive battlefield simulation program data had been pursued and purloined. Furthermore, the perpetrators had used Rome Labs’s systems as a jumping-off point for a series of hack attacks on other military, government, and research targets around the world. They broke into user accounts, planted sniffer programs, and downloaded massive quantities of data from these systems as well.

The investigators offered the Rome Labs commanding officer the option of either securing all the systems that had been hacked or leaving one or more of them open to attack. If they left a few systems open, they could monitor the comings and goings of the attackers in the hope of following them back to the their point of origination and identifying them.

The commander opted to leave some of the systems open to lay a trap for the intruders.

Investigators Wrestle with Legal Issues and Technical Limitations

Using standard software and computer systems commands, the attacks were initially traced back one leg of their path. The majority of the attacks were traced back to two commercial Internet service providers, cyberspace.com, in Seattle, Washington and mindvox.phantom.com, in New York City.

Newspaper articles indicated that the individuals who provided mindvox.phantom.com’s computer security described themselves as “two former East Coast Legion of Doom members.”

The Legion of Doom (LoD) was a loose-knit computer hacker group that had several members convicted for intrusions into corporate telephone switches in 1990 and 1991. Because the agents did not know whether the owners of the New York Internet service provider were willing participants or merely a transit point for the break-ins at Rome Labs, they decided not to approach them. Instead, they simply surveiled the victim computer systems at Rome Labs’s network to find out the extent of the intruders’ access and identify all the victims.

Following legal coordination and approval with Headquarters, AFOSI’s legal counsel, the Air Force General Counsel’s Office, and the Computer Crime Unit of the Department of Justice, real-time content monitoring was established on one of Rome Labs’s networks. Real-time content monitoring is analogous to performing a wiretap because it allows you to eavesdrop on communications, or in this case, text. The investigative team also began full keystroke monitoring at Rome. The team installed a sophisticated sniffer program to capture every keystroke performed remotely by any intruder who entered the Rome Labs.

This limited context monitoring consisted of subscribing to the commercial ISPs’ services and using only software commands and utilities the ISP authorized every subscriber to use. The team could trace the intruder’s path back only one leg. To determine the next leg of the intruder’s path required access to the next system on the hacker’s route. If the attacker was using telephone systems to access the ISP, a court-ordered “trap and trace” of telephone lines was required.

Due to time constraints involved in obtaining such an order, this was not a viable option. Furthermore, if the attackers changed their path, the trap and trace would not be fruitful. During the course of the intrusions, the investigative team monitored the hackers as they intruded on the system and attempted to trace the intruders back to their origin. They found the intruders were using the Internet and making fraudulent use of the telephone systems, or “phone phreaking.”

Because the intruders used multiple paths to launch their attacks, the investigative team was unable to trace back to the origin in real-time due to the difficulty in tracing back multiple systems in multiple countries.

In my interview with James Christy for this book, he provided fascinating insight into the deliberations over what capabilities could be used to pursue the investigation.

“The AFIWC worked the Rome Labs case with us,” Christy says. “They developed the Hackback tool right at Rome.” According to Christy, Hackback is a tool that does a finger back to the system the attack came from, then launches a scripted hack attack on that system, surveils the system, finds the next leg back, and then launches a scripted attack on that system. Hackback was designed to follow them all the way back over the Internet to their point of origination.

“Well, AFIWC developed this tool,” Christy continues, “but we told them, ‘Hey, you can’t use that ’cause it’s illegal. You’re doing the same thing as the hacker is doing: You’re breaking into systems.’ They said, General Minihan [who was at that time the head of the NSA] says, ‘We’re at war, we’re going to use it.’ My guys had to threaten to arrest them if they did. So we all said, ‘Let’s try something.’ ”

Christy tells me there was a big conference call involving the DoJ, the Secret Service, the FBI, AFOSI, and the guys that were up at Rome Labs. “We all claimed exigent circumstances, a hot pursuit. Scott Charney [who was at that time the head of DoJ’s computer crime unit] gave us the approval to go run Hackback one time. We did it, but it didn’t buy us anything. The hackers weren’t getting into those nodes via the Internet. They were getting in through telephone dial-ups. So it dead-ended where we already knew it was coming from.”

Datastream Cowboy’s Biggest Mistake

As the result of the monitoring, the investigators could determine that the hackers used the nicknames Datastream and Kuji. With this clue, AFOSI Computer Crime Investigators turned to their human intelligence network of informants that surf the Internet. The investigators levied their informants to identify the two hackers using the handles Datastream and Kuji.

“Our investigators went to their sources,” Christy recalls, “saying, ‘Help us out here, anybody know who these guys are?’ And a day and a half later, one of these sources came back and said, ‘Hey, I got this guy. Here’s his e-mail!'”

According to Christy, these informants have diverse motivations. Some of them want to be cops; some of them want to do the right thing; some of them simply find hacking exciting; some of them have pressure brought to bear on them because of their own illegal activities.

Indeed, whatever the motivation, on April 5, 1994, an informant told the investigators he had a conversation with a hacker who identified himself as Datastream Cowboy.

The conversation was via e-mail and the individual stated that he was from the United Kingdom. The on-line conversation had occurred three months earlier. In the e-mail provided by the informant, Datastream indicated he was a 16-year-old who liked to attack .mil sites because they were so insecure.

Datastream had even provided the informant with his home telephone number for his own hacker bulletin board systems he had established.

Bragging of his hacking feats, as Christy explains, was Datastream Cowboy’s big mistake.

“It was the only way we solved the case,” he said. “If we had to rely on surveillance alone, we never would have traced it back to them because of all the looping and weaving through South America. We would have been working with multiple countries.

“Did these South American countries have laws against hacking?” Christy continues. “No. Would the South Americans have been able to do a trap and trace? Maybe not. Remember, they were using telephone lines.”

The Air Force agents had previously established a liaison with New Scotland Yard who could identify the individuals living at the residence associated with Datastream’s telephone numbers.

New Scotland Yard had British Telecom initiate monitoring of the individual’s telephone lines with pen registers. A pen register records all the numbers dialed by the individuals at the residence. Almost immediately, monitoring disclosed that someone from the residence was phone phreaking through British Telecom, which is also illegal in the United Kingdom.

Within two days, Christy and the investigative team knew who Datastream Cowboy was. For the next 24 days, they monitored Datastream’s online activity and collected data.

During the 26-day period of attacks, the two hackers, Datastream Cowboy and Kuji, made more than 150 known intrusions.

Scotland Yard Closes in on Datastream Cowboy

New Scotland Yard found that every time an intrusion occurred at Rome Labs, the individual in the United Kingdom was phone-phreaking the telephone lines to make free telephone calls out of Britain. Originating from the United Kingdom, his path of attack was through systems in multiple countries in South America and Europe, and through Mexico and Hawaii; occasionally he would end up at Rome Labs. From Rome Labs, he was able to attack systems via the Internet at NASA’s Jet Propulsion Laboratory in California and its Goddard Space Flight Center in Greenbelt, Maryland.

Continued monitoring by the British and American authorities disclosed that on April 10, 1994, Datastream successfully penetrated an aerospace contractor’s home system. The attackers captured the contractor’s logon at Rome Labs with sniffer programs when the contractor logged on to home systems in California and Texas. The sniffers captured the addresses of the contractor’s home system, plus the logon and password for that home system. After the logon and password were compromised, the attackers could masquerade as that authorized user on the contractor’s home system. Four of the contractor’s systems were compromised in California and a fifth was compromised in Texas.

Datastream also used an Internet Scanning Software (ISS)1 attack on multiple systems belonging to this aerospace contractor. ISS is a hacker tool developed to gain intelligence about a system. It attempts to collect information on the type of operating system the computer is running and any other available information that could be used to assist the attacker in determining what attack tool might successfully break into that particular system. The software also tries to locate the password file for the system being scanned, and then tries to make a copy of that password file.

The significance of the theft of a password file is that, even though password files are usually stored encrypted, they are easily cracked. Several hacker “password cracker” programs are available on the Internet. If a password file is stolen or copied and cracked, the attacker can then log on to that system as what the systems perceive is a legitimate user.

Monitoring activity disclosed that, on April 12, Datastream initiated an ISS attack from Rome Labs against Brookhaven National Labs, Department of Energy, New York. Datastream also had a two-hour connection with the aerospace contractor’s system that was previously compromised.

Kuji Hacks into Goddard Space Flight Center

On April 14, 1994, remote monitoring activity of the Seattle ISP conducted by the Air Force indicated that Kuji had connected to the Goddard Space Flight Center through an ISP from Latvia. The monitoring disclosed that data was being transferred from Goddard Space Flight Center to the ISP. To prevent the loss of sensitive data, the monitoring team broke the connection. It is still not known whether the data being transferred from the NASA system was destined for Latvia. (Latvia as a destination for sensitive data was, of course, something that concerned investigators. After all, the small Baltic nation had only recently become independent of Russian domination. It had been a part of the former U.S.S.R.)

Further remote monitoring activity of cyberspace.com disclosed that Datastream was accessing the National Aero-Space Plane Joint Program Office, a joint project headed by NASA and the Air Force at Wright- Patterson Air Force Base, Ohio. Monitoring disclosed a transfer of data from Wright-Patterson traversing through cyberspace.com to Latvia.

Apparently, Kuji attacked and compromised a system in Latvia that was just being used as conduit to prevent identification. Kuji also initiated an ISS attack against Wright-Patterson from cyberspace.com the same day. He also tried to steal a password file from a computer system at Wright- Patterson Air Force Base.

Kuji Attempts to Hack NATO HQ

On April 15, real-time monitoring disclosed Kuji executing the ISS attack against NATO Headquarters in Brussels, Belgium, and Wright-Patterson from Rome Labs. Kuji did not appear to gain access to any NATO systems from this particular attack. However, when interviewed on April 19 by AFOSI, a systems administrator from NATO’s SHAPE Technical Center in the Hague, Netherlands, disclosed that Datastream had successfully attacked one of SHAPE’s computer systems from the ISP mindvox.phantom.com in New York.

After authorities confirmed the hacker’s identity and developed probable cause, New Scotland Yard requested and obtained a search warrant for the Datastream Cowboy’s residence. The plan was to wait until the individual was online at Rome Labs, and then execute the search warrant. The investigators wanted to catch Datastream online so that they could identify all the victims in the path between his residence and Rome Labs. After Datastream got online at Rome Labs, he accessed a system in Korea, downloaded all data stored on the Korean Atomic Research Institute system, and deposited it on Rome Labs’s system.

Initially, it was unclear whether the Korean system belonged to North or South Korea. Investigators were concerned that, if it did belong to North Korea, the North Koreans would think the logical transfer of the storage space was an intrusion by the U.S. Air Force, which could be perceived as an aggressive act of war. During this time frame, the United States was in sensitive negotiations with the North Koreans regarding their nuclear weapons program. Within hours, it was determined that Datastream had hacked into the South Korean Atomic Research Institute.

At this point, New Scotland Yard decided to expand its investigation, asked the Air Force to continue to monitor and collect evidence in support of its investigation, and postponed execution of the search warrant.

Scotland Yard Knocks on Datastream Cowboy’s Door

On May 12, investigators from New Scotland Yard executed their search warrant on Datastream’s residence. When they came through the door, 16- year-old Richard Pryce (a.k.a. Datastream Cowboy) curled up in the fetal position and wept.

The search disclosed that Datastream had launched his attacks with only a 25 MHz, 486 SX desktop computer with only a 170 megabyte hard drive. This is a modest system, with limited storage capacity. Datastream had numerous documents that contained references to Internet addresses, including six NASA systems and U.S. Army and U.S. Navy systems with instructions on how to loop through multiple systems to avoid detection.

At the time of the search, New Scotland Yard detectives arrested and interviewed Datastream. Detectives stated that Datastream had just logged out of a computer system when they entered his room. Datastream admitted to breaking into Rome Labs numerous times as well as multiple other Air Force systems (Hanscom Air Force Base, Massachusetts, and Wright-Patterson). (He was charged with crimes spelled out in Britain’s Computer Misuse Act of 1990.)

Datastream admitted to stealing a sensitive document containing research regarding an Air Force artificial intelligence program that dealt with Air Order of Battle. He added that he searched for the word missile, not to find missile data but to find information specifically about artificial intelligence. He further explained that one of the files he stole was a 3_4 megabyte file (approximately three to four million characters in size). He stored it at mindvox.phantom.com’s system in New York because it was too large to fit on his home system.

Datastream explained he paid for the ISP’s service with a fraudulent credit card number that was generated by a hacker program he had found on the Internet. Datastream was released on bail following the interview.

This investigation never revealed the identity of Kuji. From conduct observed through the investigators’ monitoring, Kuji was a far more sophisticated hacker than the teenage Datastream. Air Force investigators observed that Kuji would only stay on a telephone line for a short time, not long enough to be traced successfully. No informant information was available except that Computer Crime Investigators from the Victoria Police Department in Australia had seen the name Kuji on some of the hacker bulletin-board systems in Australia.

Unfortunately, Datastream provided a great deal of the information he stole to Kuji electronically. Furthermore, Kuji appears to have tutored Datastream on how to break into networks and on what information to obtain. During the monitoring, the investigative team could observe Datastream attack a system and fail to break in. Datastream would then get into an online chat session with Kuji, which the investigative team could not see due to the limited context monitoring at the Internet service providers. These chat sessions would last 20_40 minutes. Following the on-line conversation, the investigative team would then watch Datastream attack the same system he had previously failed to penetrate, but this time he would be successful.

Apparently Kuji assisted and mentored Datastream and, in return, received stolen information from Datastream. Datastream, when interviewed by New Scotland Yard’s Computer Crime Investigators, told them he had never physically met Kuji and only communicated with him through the Internet or on the telephone.

Kuji’s Identity Is Finally Revealed

In 1996, New Scotland Yard was starting to feel some pressure from the glare of publicity surrounding the upcoming hearings in the U.S. Senate, chaired by Sam Nunn (D-Georgia). Two years had passed since the arrest of the Datastream Cowboy, and yet Kuji was still at large.

New Scotland Yard investigators went back to take a closer look at the evidence they had seized and found a phone number that they hadn’t traced back to its origin. When they did trace it, they discovered Kuji’s true identity. Ten days after Jim Christy’s initial testimony concerning the Rome Lab intrusions, 21-year-old Matthew Bevan (a.k.a. Kuji) was finally apprehended.

In court, Pryce pleaded guilty to 12 hacking offenses and paid a nominal fine of 1,200 British pounds.

But Bevan, whose father was a police officer, “lawyered-up.”

After 20 hearings in which the defense challenged the Crown’s evidence, the prosecution made a “business decision” and dropped the charges.

Bevan is now a computer security consultant. His Web site, http:// www.bogus.net/, features an archive of news media coverage of the Rome Labs case, a timeline of his exasperating and successful legal maneuvers, photographs of his arresting officers, and scanned headlines from the London tabloids.

In my interview with Bevan, I asked him about the motivation in the attack on Rome.

“My quest,” he tells me, “was for any information I could find relating to a conspiracy or cover-up of the UFO phenomenon. I was young and interested in the UFO stuff that I had read and of course as I had the access to such machines that were broken (i.e., with poor security) it was a natural progression to seek out information.

“Also,” Bevan continues, “I was bullied almost every day of my school life; the hacking world was pure escapism. I could go to school, endure the day, come home, and log on to another world. Somewhere I could get respect, somewhere that I had friends.

“At school I may have been bullied but in the back of my mind was ‘Well, I hacked NASA last night, and what did you do?'”

I also asked Bevan if he wanted to set the record straight in regard to how authorities handled the case or how the media reported it.

“One of the biggest concerns that I have about the reporting of the case relates to the InfoWar aspect,” he says. “It is suggested that we were taken to the brink of WWIII because of an attack on the Korean nuclear research facility. A Secret Service agent here alleged that bombers were already on their way to Korea to do a preemptive strike as it was thought that when they discovered the attack, said to have come from a U.S. military computer, they would retaliate.

“In the evidence presented in the case,” Bevan says, “there was a snippet of a log that shows Datastream Cowboy logging into said facility with the user ID of ‘sync,’ and as the user has no Unix shell associated with it, the login is terminated. Nowhere else in the logs is any record of the intrusion being successful, and in my opinion the logs do not reflect that. Being called ‘the single biggest threat to world peace since Adolf Hitler’ is a tad annoying, but then even the layman can see that is just hype and propaganda.”

Who Can Find the Bottom Line?

A damage assessment of the intrusions into the Rome Labs’s systems was conducted on October 31, 1994. The assessment indicated a total loss to the United States Air Force of $211,722. This cost did not include the costs of the investigative effort or the recovery and monitoring team.

No other federal agencies that were victims of the hackers (for example, NASA) conducted damage assessments.

The General Accounting Office conducted an additional damage assessment at the request of Senator Nunn. (See GAO Report, Information Security: Computer Attacks at Department of Defense Pose Increasing Risks [AIMD-96-84], May 22, 1996.)

Some aspects of this investigation remain unsolved:

The extent of the attack. The investigators believe they uncovered only a portion of the attack. They still don’t know whether the hackers attacked Rome Labs at previous times before the sniffer was discovered or whether the hackers attacked other systems where they were not detected.

The extent of the damage. Some costs can be attributed to the incident, such as the cost of repair and the cost of the investigative effort. The investigation, however, was unable to reveal what they downloaded from the networks or whether they tampered with any data. Given the sensitive information contained on the various computer networks (at Rome Labs, Goddard Space Flight Center, the Jet Propulsion Laboratory, Wright- Patterson AFB, or the National Aero-Space Plane Program), it is very difficult to quantify the loss from a national security perspective.

HotterthanMojaveinmyheart:2 The Case of Julio Cesar Ardita

On March 29, 1996, the U.S. Justice Department announced it had charged Julio Cesar Ardita (a.k.a. “El Griton”), a 21-year-old Argentine, with breaking into Harvard University’s computer network and using it as a staging platform for many other hacks into sites throughout cyberspace. Like Kuji and the Datastream Cowboy, Ardita targeted sites belonging to NASA, DoD, several American universities, and those in other countries (for example, Korea, Mexico, Taiwan, Chile, and Brazil). Like Kuji and the Datastream Cowboy, Ardita gained unauthorized access to important and sensitive information in his explorations. In Ardita’s case, the research information that was compromised involved satellites, radiation, and energy-related engineering.

Peter Garza of Evidentdata (Ranchero Cucamonga, California) was a special agent for the Naval Criminal Investigative Services. He led the digital manhunt that ended in Buenos Aires. Garza described Ardita as a dedicated hacker. “Ardita was no ordinary script kiddie,”

Garza tells me. “He didn’t run automated hacking scripts downloaded from someone else’s site. He did his hacking the old-fashioned way. He used a terminal emulator program, and he conducted manual hacks. He was prodigious. He had persistence and stamina. Indeed, I discovered records of ten thousand sessions on Ardita’s home computer after it was seized. During the technical interviews we did of Ardita in Argentina (after his arrest), he would describe all-night sessions hacking into systems all over the Internet.

“Early on in the investigation,” Garza adds, “I had guessed this would be a solvable case because of this persistence. I had guessed that because this was such a prolific hacker, he had to use the same file names, techniques, and hiding places just so that he would be able to remember where he left collected userids and passwords behind on the many hacked systems. Also, I hoped the hacker was keeping records to recall the hacked sites. Records that would help further the investigation if we were successful in tracking the hacker down. It was gratifying that I was right on both counts. Records on his seized computer, along with his detailed paper notes, helped us reconstruct much of what he had done.”

Like the investigation that led to the identification and arrest of the Rome Labs hackers, the pursuit that led to the identification and arrest of Ardita accelerated the learning curve of those responsible for tracking down cybercriminals and bringing them to justice.

The following account, drawn from my interview with Garza and the court affidavit written by Garza himself in support of the criminal complaint against Ardita, sheds light on the details of the investigations and the groundbreaking work that the case required.

How the Search for “El Griton” Began

Sysadmins at a U.S. Navy research center in San Diego detected that certain system files had been altered. Taking a closer look, they uncovered certain files, including a sniffer he left behind, the file that contained the passwords he was logging, and a couple programs he used to gain root access and cover up his tracks.

This evidence enabled Garza to construct a profile of the hacker.

Coincidentally, and fortuitously, Garza and other naval security experts happened to be at the San Diego facility for a conference on the day that the intrusion was detected.

They worked late into the night. They succeeded in tracking the as-yet- unidentified hacker to a host system administered by the Faculty of Arts and Sciences (FAS) at Harvard University, Cambridge, Massachusetts. The hacker was making unauthorized use of accounts on the FAS host and trying to access other systems connected to Harvard’s network via the Internet.

(As early as July 1995, host computers across the United States as well as in Mexico and the United Kingdom reported both successful and unsuccessful hacking attempts seeming to originate from the FAS Harvard host. But this U.S. Navy investigation that commenced in late August would lead to Ardita’s arrest.)

Although it was impossible at first to determine the hacker’s true identity because he was using the legitimate account holders’ identities as his aliases or covers, investigators could distinguish the hacker from other users of the FAS Harvard host and the Internet through certain distinctive patterns of illicit activity. But to track the hacker all the way back to his point of origination, Garza was going to need a court order for a wiretap.

“I called the U.S. Attorney’s office in Boston on a Thursday and asked if we could have the court order in place by Monday,” Garza recounts. “They laughed. Six months was considered the ‘speed of light’ for wiretap approval. But we started to put the affidavit together anyway, and got it okayed in only six weeks, which at that time was unheard of.

More Naked Gun than Top Gun – Guardian Online

Posted by Kuji on June 26th, 2008

The cream of US military intelligence last week had their bungled attempt to prosecute a bedroom hacker thrown out by a British court. Duncan Campbell discovers why the spooks are firing blanks in the infowar
More Naked Gun than Top Gun

THE THREE year long case of the world?s most notorious ?information warfare? attack on US government computer systems collapsed last Friday. On a grey morning in a south London court, a 23-year-old computer programmer from Cardiff walked free as crown prosecutors told the judge it wasn’t worth the cost of trying to hold his trial. They acknowledged that he had posed no threat to security.

But Matthew Bevan, who was obsessed with the X-Files and the search for alien spacecraft, and his 16-year-old accomplice, Richard Pryce, had achieved a notoriety out of all proportion to their actions. They were “Kuji” and “Datastream Cowboy” hackers whose haphazard penetration of US Air Force and defence contractors’ computers have been portrayed since 1994 as the work of foreign agents and the greatest electronic danger yet to hit the US Air Force on its home turf.

The collapse of Bevan’s trial has exposed the US infowarriors. On the back of overblown rhetoric and oversold threats, they have won lavish funding from Congress for new military and intelligence “infowar” units, and recently sold their security services to private corporations.

But the inside story of the Bevan and Pryce cases shows their forensic work to have been so poor it would have been unlikely to have stood up in court and convicted Bevan. The public portrayal of the two Britons as major threats to US national security was pure hype.

The case began in April 1994, when computer managers at an obscure US Air Force base at Rome, New York State, noticed that some of their computers had been penetrated via the Net. Over the next few weeks, a team of 50 infowar experts combed USAF and other computers to try to track the interlopers.

In May 1994, a USAF investigator told the Senate that the duo had “downloaded large volumes of data from penetrated systems”. But the computer used by Pryce to hack the US Air Force systems had already been discovered and seized by Scotland Yard. It was an aging 486 with a midget 170Mb hard disk. Bevan was no better equipped.

Although the two did allegedly download one or two classified files, those who have studied the detailed evidence in the case say that their approach was entirely haphazard and (so far as Bevan was concerned) motivated by the belief that a captured alien spacecraft, held secretly at the remote Nevada airbase Area 51 (as featured in last year?s film Independence Day), was reality.

In 1994, Bevan?s activities drew attention not in Nevada but Texas. Close to San Antonio is the Medina Annex of Lackland Air Force Base. Here, Air Force staff of the Consolidated Security Operations Center process communications from around the world. Like the real Area 51, Medina is one of the US government?s highest security facilities. San Antonio is home to the Electronic Security Command, the US Air Force section of the intelligence agency NSA. It also now hosts an Information Warfare Centre.

When on March 28, 1994 the emergency call came from New York to San Antonio, the infowar team were alerted to defend their country. Captain Kevin Ziese, chief of Advanced Counter Measures Research for the Infowar Centre, led a six-strong team whose members or so he told Fortune magazine “slept under their desks for three weeks, hacking backwards” until Pryce was arrested.

Since then, Ziese has hit the US lecture circuit and privatised his infowar business. As the WheelGroup corporation of San Antonio, he now sells ‘friendly’ hacking services to top US corporations.

Meanwhile in Britain, the case against Bevan fell apart because testimony from Ziese and others wasn’t going to stand up in court. ‘Much of the US evidence would have collapsed on detailed scrutiny,’ according to Peter Sommer, the LSE computer security and Internet expert who advised the defence teams for both men. Much of the ‘evidence’ they gave to the Crown Prosecution Service was not valid evidence at all, but e-mails of edited files that had been relayed to Ziese and others.

Ziese?s technical investigation quickly ran dry, even after his team inserted their own anti-hacking and monitoring tools onto the Net. They had discovered that the hackers were entering USAF systems from two private Net sites, Cyberspace in Seattle and Mindvox in New York.

But where were the hackers really coming from? To answer that question, the USAF team obtained legitimate accounts on the Cyberspace computer. They used these to launch snooper programs codenamed Stethoscope and Pathfinder at the Cyberspace computer. It failed, as it could not determine how the hackers were phoning into Cyberspace.

US investigators have claimed the programs they used were legal because they did not access information that other users could not get. But they have refused to produce the programs.

Traditional police methods, not arcane infowar techniques, identified Pryce. A hacker who was an undercover informant had chatted to Pryce a few weeks earlier. Pryce had used his hacker name and given the informant his London phone number. Scotland Yard?s Computer Crimes Unit were soon at Pryce?s door with a search warrant. Bevan was eventually located in a similar way. His phone number was on Pryce?s computer. Had it not been for Scotland Yard, the relatively innocuous Pryce and Bevan would never have been found ? and the US Senate would still be hearing about ?cyberterrorists? from faraway lands.

A further flaw in the USAF evidence appeared in May, when they refused to let defence experts examine and test programs they had used to monitor the Net. ?Worst of all,? says Sommer, ?having set traps to catch hackers, they neglected to produce ?before? and ?after? file dumps of the target computers.?

In the end, all the Americans handed over was patchy and circumstantial evidence that their computers had been hacked from Britain. To have attempted to fill in the holes in the evidence could have meant flying two dozen USAF witnesses to Britain to face lengthy and embarrassing cross-examination.

UK SPYMASTER SAYS TOO MANY SPOOKS SPOIL THE PLOT

British business security chiefs were last week lectured on the risks and realities of infowar at a conference on Business Crime and Risk at the Royal Society of Arts in London. But the highlight of the meeting was an unexpected call for British intelligence agencies to be cut down and realigned.

David Bickford was legal adviser to the intelligence and security services from 1987 until 1995, where he taught MI5 how to turn its work into evidence that its agents could present in court ? skills that the US Air Force could do well to catch up with.

Bickford said that British intelligence ?is not doing its job properly?. The ?750 million a year cost of maintaining three intelligence agencies ? the Security Service (MI5), Secret Intelligence Service (MI6) and GCHQ (responsible for electronic eavesdropping) ? was now completely unjustified. There was ?triplication of management, triplication of bureaucracy and triplication of turf battles?.

As a result, British intelligence was now turning ?a blind eye to the fact that economic crime, including organised racketeering in narcotics, kidnap, extortion, product contamination and fraud, now poses the greatest threat to the security of the international community?.

Bickford revealed that, in 1995, the intelligence agencies had secretly suggested to the Major government that they develop links to large companies in order to provide them with ?protective business intelligence?. The plan was turned down. Officially, it was claimed that the problem was distinguishing between ?protective intelligence? and economic espionage. But the truth, he suggested, was that MI5, MI6 and GCHQ had bickered about how to finance and run the proposed new scheme.

Until difficulties like this were hammered out, said Bickford, taxpayers? funds would be wasted and business damaged by the unavailability of important information that was kept only in government hands. A merger now would save ‘tens of millions of pounds’, and provide for the ‘focused direction, integration and analysis of electronic and human intelligence to reduce risk’, he added.

A cabinet office team is currently doing a year-long review of the structure of British intelligence. Their review should be ?quite fierce?, suggested Bickford.

Internal threats had all but disappeared ? and with them the raison d?etre of MI5. The main threat to Britain now was ‘serious economic crime’ and ‘super-terrorism’, involving the use of weapons of mass destruction, he said. Because of ‘the common international nature of these threats’, arguments for having three different intelligence services ‘falls at the first hurdle’.

Not only were ‘operational officers with long experience in intelligence’ being lost to the private sector, others were lost because they had to take up management posts instead of carrying on in intelligence. Tax payers were having to pay for this ‘waste of experience’, Bickford claimed.

A new ?national intelligence agency? should be formed, he added, in order to provide protective business intelligence. It could even charge for its services. It was ?long overdue? for the Parliamentary Intelligence Oversight Committee to instigate the process of amalgamating the three agencies.

Hostility and in-fighting between MI5 and MI6 has long been notorious. The situation only began to change in the mid-1970s, when the two agencies formed a joint section to fight Irish terrorism. Since 1990, MI5 has seen its traditional concerns of Soviet espionage and so-called ?internal subversion? all but vanish. Faced with the additional threat of a ceasefire in Ireland, MI5 has sought to move into police areas including fraud, money laundering, narcotics and organised crime. MI6 and GCHQ have also been retargeted into these areas.

Bickford?s call for more intelligence and security expertise for business was backed by Sir Peter Imbert, former Commissioner of the Metropolitan Police, and other senior ex-police officers.

While legal adviser to MI5 and MI6, Bickford helped draft the legislation that brought the once officially invisible organisations ‘in from the cold’ and put them on a statutory legal basis. Since leaving the agencies, Bickford has attacked the government?s willingness to allow British offshore islands to remain as tax havens, claiming that this constituted tacit support for money laundering and organised crime.

[Duncan Campbell is a freelance writer and broadcaster, and not the Guardian?s crime correspondent of the same name]

26 November 1997

US Air force lets british hacker walk – Tabloid

Posted by Kuji on June 26th, 2008

SAN FRANCISCO (TABLOID NEWS SERVICES) — One of cyberspace’s most shocking cases of hacking came to a pathetic close late last week when all the charges had to be dropped against a London kid who made himself famous by breaking into the Pentagon and touching off a nuclear weapons panic in the U.S. Air Force.

British prosecutors said it’s a waste of time and money to continue trying to convict 23-year-old Matthew “Kuji” Bevan, a hacker who made world headlines in 1995 when he was arrested along with his 16-year-old cohort Richard Pryce, aka “Datastream Cowboy.”

Led by Pryce, the pair apparently broke into U.S. military computers at the Griffiss Air Force Base in New York and accessed sensitive weapons information. And from there they hopped over to the computers of a nuclear research facility on the Korean peninsula.

U.S. military officials were so confused by the two hackers they thought at least one of Bevan’s break-ins was the work of an Eastern European spy ring. And when the military saw that the intruders had used USAF computers to hack a link into the Korean military site, then copy information back on the USAF computers, they were positively panicked. The military cyber-cops didn’t know if the Korean computers were in North or South Korea — and they feared the hack would be seen by crazy Communist North Korea as an act of war.

According to the tech news service Newsbytes, the incident touched off a “diplomatic crisis” between the U.S. and South Korea, where the facility turned out to be located, although other reports have portrayed the pair’s adventures as mostly harmless.

It was an embarrassing shock to U.S. military’s cyber cops when it was revealed that their online assailants were a pair of bored London kids.

When cops arrived to arrest Pryce at his parents’ home in 1995, he reportedly curled up in a ball on the floor and cried.

Pryce was fined nearly $2,000 for the crime back in 1996, but Bevan’s case dragged on until last week.

It finally ran out of steam when British prosecutors realized they weren’t going to get any help from their American colleagues, according to Newsbytes.

The case was dumped when the court and prosecutors were told that classified military information would be made public during the trial, and that the case would be incredibly expensive to prosecute. Witnesses would have to be flown from the U.S. and the technical details would take months to explain, the court heard.

Worse, the government was pretty sure it would lose, because the U.S. was refusing to turn over information about how it traced and identified the hackers.

“The U.S. cyber sleuth teams simply did not understand the difference between conducting a technical investigation and producing robust admissible evidence,” said Peter Sommer, a senior fellow at the London School of Economics’ Computer Security Research Center, according to Newsbytes. Sommer testified as a defense expert for both Pryce and Bevan.

Sommer said the U.S. government had flubbed the case from the start. The government detectives “neglected to produce ‘before’ and ‘after’ file dumps of the target computers,” Sommer said. Such raw data dumps could show what changed the hackers made while they had access to the USAF systems.

And the Americans refused to turn over the source code to the software it used to monitor the hackers’ attacks. Without that, the court would have no opportunity to test the software to make sure it was working right.

Bevan left the court last week without talking to reporters. The only word came from his lawyers, who said the young man was happy it was over.

Ex-hacker to help Nintendo with viral marketing

Posted by Kuji on June 26th, 2008

Ex-hacker to help Nintendo with viral marketing
By: John Leyden
Posted: 29/03/2001 at 14:44 GMT

A well-known former computer hacker has been hired to do viral marketing for games firm Nintendo and TV channel E4.

Mathew Bevan, whose hacker handle is Kuji, was accused of breaking into US military computer systems but escaped without punishment when a 1997 case at Woolwich Crown Court was dropped after a long-running legal battle.

After the case Bevan became an ethical hacker and security consultant with Tiger Computer Security, and later on a freelance basis with his firm the Kuji Media Corporation.

Bevan was reluctant to go into details of his marketing work just yet, but said he was offered work for Nintendo and the E4 site, e4chained, through a third party and the Kuji Media Corporation. As a security expert it was felt he had the talent to help run a successful viral marketing campaign.

Bevan, and Richard Pryce (Datastream Cowboy) were accused of hacking into a research centre at Griffiss Air Force base in New York state and faced charges related to the Computer Misuse Act.

The case revolved an incident when the Korean Atomic Research Institute’s database was found to have had been deposited on USAF’s systems.

In court, USAF investigators admitted that they initially feared the data had come from North Korea – something that could spark a major international incident. This provoked fears that World War III might be started by a teenage computer hacker sitting in his bedroom.

An inquiry into the hack led investigators to Bevan and Pryce, who were subsequently charged.

Pryce, who was 16 at the time, was fined £1,200 in a hearing before the Woolwich Crown Court case. The prosecution against Bevan was dropped because after the leniency shown to Pryce, prosecutors concluded it was too expensive to continue with the case. ?



Copyleft © 2007 - 2012+ Kuji Media Corporation Ltd.. All rights reserved.