The Hacker Crackdown - BestLightNovel.com
You’re reading novel The Hacker Crackdown Part 20 online at BestLightNovel.com. Please use the follow button to get notification about the latest chapter next time when you visit BestLightNovel.com. Use F11 button to read novel in full-screen(PC only). Drop by anytime you want to read free – fast – latest novel. It’s great if you could leave a comment, share your opinion about the new chapters, new novel with others on the internet. We’ll do our best to bring you the finest, latest novel everyday. Enjoy
Inside, Leftist was greeted by Special Agent James Cool of the US Secret Service, Atlanta office. Leftist was flabbergasted.
He'd never met a Secret Service agent before. He could not imagine that he'd ever done anything worthy of federal attention.
He'd always figured that if his activities became intolerable, one of his contacts in telco security would give him a private phone-call and tell him to knock it off.
But now Leftist was pat-searched for weapons by grim professionals, and his bag of floppies was quickly seized. He and his parents were all shepherded into separate rooms and grilled at length as a score of officers scoured their home for anything electronic.
Leftist was horrified as his treasured IBM AT personal computer with its forty-meg hard disk, and his recently purchased 80386 IBM-clone with a whopping hundred-meg hard disk, both went swiftly out the door in Secret Service custody. They also seized all his disks, all his notebooks, and a tremendous booty in dogeared telco doc.u.ments that Leftist had snitched out of trash dumpsters.
Leftist figured the whole thing for a big misunderstanding.
He'd never been into MILITARY computers. He wasn't a SPY or a COMMUNIST.
He was just a good ol' Georgia hacker, and now he just wanted all these people out of the house. But it seemed they wouldn't go until he made some kind of statement.
And so, he levelled with them.
And that, Leftist said later from his federal prison camp in Talladega, Alabama, was a big mistake. The Atlanta area was unique, in that it had three members of the Legion of Doom who actually occupied more or less the same physical locality. Unlike the rest of LoD, who tended to a.s.sociate by phone and computer, Atlanta LoD actually WERE "tightly knit." It was no real surprise that the Secret Service agents apprehending Urvile at the computer-labs at Georgia Tech, would discover Prophet with him as well.
Urvile, a 21-year-old Georgia Tech student in polymer chemistry, posed quite a puzzling case for law enforcement. Urvile--also known as "Necron 99," as well as other handles, for he tended to change his cover-alias about once a month--was both an accomplished hacker and a fanatic simulation-gamer.
Simulation games are an unusual hobby; but then hackers are unusual people, and their favorite pastimes tend to be somewhat out of the ordinary.
The best-known American simulation game is probably "Dungeons & Dragons,"
a multi-player parlor entertainment played with paper, maps, pencils, statistical tables and a variety of oddly-shaped dice. Players pretend to be heroic characters exploring a wholly-invented fantasy world.
The fantasy worlds of simulation gaming are commonly pseudo-medieval, involving swords and sorcery--spell-casting wizards, knights in armor, unicorns and dragons, demons and goblins.
Urvile and his fellow gamers preferred their fantasies highly technological.
They made use of a game known as "G.U.R.P.S.," the "Generic Universal Role Playing System," published by a company called Steve Jackson Games (SJG).
"G.U.R.P.S." served as a framework for creating a wide variety of artificial fantasy worlds. Steve Jackson Games published a smorgasboard of books, full of detailed information and gaming hints, which were used to flesh-out many different fantastic backgrounds for the basic GURPS framework.
Urvile made extensive use of two SJG books called GURPS High-Tech and GURPS Special Ops.
In the artificial fantasy-world of GURPS Special Ops, players entered a modern fantasy of intrigue and international espionage.
On beginning the game, players started small and powerless, perhaps as minor-league CIA agents or penny-ante arms dealers.
But as players persisted through a series of game sessions (game sessions generally lasted for hours, over long, elaborate campaigns that might be pursued for months on end) then they would achieve new skills, new knowledge, new power.
They would acquire and hone new abilities, such as marksmans.h.i.+p, karate, wiretapping, or Watergate burglary. They could also win various kinds of imaginary booty, like Berettas, or martini shakers, or fast cars with ejection seats and machine-guns under the headlights.
As might be imagined from the complexity of these games, Urvile's gaming notes were very detailed and extensive.
Urvile was a "dungeon-master," inventing scenarios for his fellow gamers, giant simulated adventure-puzzles for his friends to unravel. Urvile's game notes covered dozens of pages with all sorts of exotic lunacy, all about ninja raids on Libya and break-ins on encrypted Red Chinese supercomputers.
His notes were written on sc.r.a.p-paper and kept in loose-leaf binders.
The handiest sc.r.a.p paper around Urvile's college digs were the many pounds of BellSouth printouts and doc.u.ments that he had snitched out of telco dumpsters.
His notes were written on the back of misappropriated telco property.
Worse yet, the gaming notes were chaotically interspersed with Urvile's hand-scrawled records involving ACTUAL COMPUTER INTRUSIONS that he had committed.
Not only was it next to impossible to tell Urvile's fantasy game-notes from cybers.p.a.ce "reality," but Urvile himself barely made this distinction.
It's no exaggeration to say that to Urvile it was ALL a game. Urvile was very bright, highly imaginative, and quite careless of other people's notions of propriety. His connection to "reality" was not something to which he paid a great deal of attention.
Hacking was a game for Urvile. It was an amus.e.m.e.nt he was carrying out, it was something he was doing for fun. And Urvile was an obsessive young man.
He could no more stop hacking than he could stop in the middle of a jigsaw puzzle, or stop in the middle of reading a Stephen Donaldson fantasy trilogy. (The name "Urvile" came from a best-selling Donaldson novel.)
Urvile's airy, bulletproof att.i.tude seriously annoyed his interrogators.
First of all, he didn't consider that he'd done anything wrong.
There was scarcely a shred of honest remorse in him. On the contrary, he seemed privately convinced that his police interrogators were operating in a demented fantasy-world all their own. Urvile was too polite and well-behaved to say this straight-out, but his reactions were askew and disquieting.
For instance, there was the business about LoD's ability to monitor phone-calls to the police and Secret Service.
Urvile agreed that this was quite possible, and posed no big problem for LoD. In fact, he and his friends had kicked the idea around on the "Black Ice" board, much as they had discussed many other nifty notions, such as building personal flame-throwers and jury-rigging fistfulls of blasting-caps. They had hundreds of dial-up numbers for government agencies that they'd gotten through scanning Atlanta phones, or had pulled from raided VAX/VMS mainframe computers.
Basically, they'd never gotten around to listening in on the cops because the idea wasn't interesting enough to bother with.
Besides, if they'd been monitoring Secret Service phone calls, obviously they'd never have been caught in the first place. Right?
The Secret Service was less than satisfied with this rapier-like hacker logic.
Then there was the issue of cras.h.i.+ng the phone system. No problem, Urvile admitted sunnily. Atlanta LoD could have shut down phone service all over Atlanta any time they liked. EVEN THE 911 SERVICE?
Nothing special about that, Urvile explained patiently.
Bring the switch to its knees, with say the UNIX "makedir" bug, and 911 goes down too as a matter of course. The 911 system wasn't very interesting, frankly. It might be tremendously interesting to cops (for odd reasons of their own), but as technical challenges went, the 911 service was yawnsville.
So of course the Atlanta Three could crash service.
They probably could have crashed service all over BellSouth territory, if they'd worked at it for a while.
But Atlanta LoD weren't crashers. Only losers and rodents were crashers. LoD were ELITE.
Urvile was privately convinced that sheer technical expertise could win him free of any kind of problem.
As far as he was concerned, elite status in the digital underground had placed him permanently beyond the intellectual grasp of cops and straights. Urvile had a lot to learn.
Of the three LoD stalwarts, Prophet was in the most direct trouble.
Prophet was a UNIX programming expert who burrowed in and out of the Internet as a matter of course. He'd started his hacking career at around age 14, meddling with a UNIX mainframe system at the University of North Carolina.
Prophet himself had written the handy Legion of Doom file "UNIX Use and Security From the Ground Up."
UNIX (p.r.o.nounced "you-nicks") is a powerful, flexible computer operating-system, for multi-user, multi-tasking computers. In 1969, when UNIX was created in Bell Labs, such computers were exclusive to large corporations and universities, but today UNIX is run on thousands of powerful home machines. UNIX was particularly well-suited to telecommunications programming, and had become a standard in the field. Naturally, UNIX also became a standard for the elite hacker and phone phreak.
Lately, Prophet had not been so active as Leftist and Urvile, but Prophet was a recidivist. In 1986, when he was eighteen, Prophet had been convicted of "unauthorized access to a computer network" in North Carolina. He'd been discovered breaking into the Southern Bell Data Network, a UNIX-based internal telco network supposedly closed to the public.
He'd gotten a typical hacker sentence: six months suspended, 120 hours community service, and three years' probation.
After that humiliating bust, Prophet had gotten rid of most of his tonnage of illicit phreak and hacker data, and had tried to go straight.
He was, after all, still on probation. But by the autumn of 1988, the temptations of cybers.p.a.ce had proved too much for young Prophet, and he was shoulder-to-shoulder with Urvile and Leftist into some of the hairiest systems around.
In early September 1988, he'd broken into BellSouth's centralized automation system, AIMSX or "Advanced Information Management System."
AIMSX was an internal business network for BellSouth, where telco employees stored electronic mail, databases, memos, and calendars, and did text processing. Since AIMSX did not have public dial-ups, it was considered utterly invisible to the public, and was not well-secured --it didn't even require pa.s.swords. Prophet abused an account known as "waa1," the personal account of an unsuspecting telco employee.
Disguised as the owner of waa1, Prophet made about ten visits to AIMSX.
Prophet did not damage or delete anything in the system.
His presence in AIMSX was harmless and almost invisible.
But he could not rest content with that.
One particular piece of processed text on AIMSX was a telco doc.u.ment known as "Bell South Standard Practice 660-225-104SV Control Office Administration of Enhanced 911 Services for Special Services and Major Account Centers dated March 1988."
Prophet had not been looking for this doc.u.ment. It was merely one among hundreds of similar doc.u.ments with impenetrable t.i.tles.
However, having blundered over it in the course of his illicit wanderings through AIMSX, he decided to take it with him as a trophy.
It might prove very useful in some future boasting, bragging, and strutting session. So, some time in September 1988, Prophet ordered the AIMSX mainframe computer to copy this doc.u.ment (henceforth called simply called "the E911 Doc.u.ment") and to transfer this copy to his home computer.
No one noticed that Prophet had done this. He had "stolen"
the E911 Doc.u.ment in some sense, but notions of property in cybers.p.a.ce can be tricky. BellSouth noticed nothing wrong, because BellSouth still had their original copy. They had not been "robbed" of the doc.u.ment itself. Many people were supposed to copy this doc.u.ment--specifically, people who worked for the nineteen BellSouth "special services and major account centers,"
scattered throughout the Southeastern United States. That was what it was for, why it was present on a computer network in the first place: so that it could be copied and read-- by telco employees. But now the data had been copied by someone who wasn't supposed to look at it.