Security Through Strength
The GUARDIAN Newswire
Volume I, Issue 9
		
DataLynx, Inc.
6633 Convoy Court
San Diego, CA  92111
	 	
(619) 560-8112 (phone)
		
(619) 560-8114 (fax)
	
http://www.dlxguard.com
NETSCAPE SERVER CRACKED
Integrated Computing Engines of Cambridge, Massachusetts used an $83,000 
computer to break the 40-bit DES encryption scheme used in NetScape's 
Commerce Server.  In a previous effort, French students employed 120 
workstations and two supercomputers to crack NetScape's encryption technique.
INCREASED ATTACKS ON DOD
The U.S. Senate Subcommittee on Permanent Investigations has released 
its findings on computer security incidents during 1995.  They report that the 
number of attacks on Department of Defense (DoD) computers and networks 
increased by 80%. The estimated total is reported to be 250,000 separate 
assaults in 1995 ( see:  http://www.epic.org/security/GAO_DOD_security.html ) 
The same Subcommittee also reported that banks and other large corporations 
lost $800 million last year because of attacks on computer systems.
According to another report from the General Accounting Office (GAO), 
approximately two-thirds of the attacks on DoD computers were successful 
and resulted in unauthorized use of computer systems.  The DoD conducted 
a test study and found that only 4% of these break-ins were detected, although 
three-quarters of the detected intrusions were reported.  
Fortunately, most of these attacks were directed at unclassified computers 
linked to the Internet and not the classified, internal government networks.  
However, the GAO noted that computer hackers have occasionally seized 
control of entire systems that support logistics, financial data, and weapons 
research and development.  More importantly, the GAO report also states, 
"The potential exists for foreign terrorists to disrupt U.S. defense operations 
by disabling the collection and communication of intelligence data or the 
controls for issuing military orders."  The GAO report further stated that such 
break-ins are "either a multi-million dollar nuisance to defense or a serious 
threat to national security."  
FEDS USE DATA TAP
In the first case of its type, the U.S. Department of Justice (DOJ) used a 
court-ordered data tap on a computer network in pursuit of Julio Cesar Ardita, 
a citizen of Argentina charged with illegally breaking into government computer 
systems via the Internet.
The DOJ believes that Ardita breached a computer 
system at Harvard University's Faculty of Arts and Sciences and obtained 
passwords that later permitted him to successfully assault networks at NASA, 
the U.S. Navy, and other government installations.  The federal court-order 
permits the DOJ to monitor Internet T-1 access sites, intranet trunk lines, and 
data transmitted across the net for evidence of criminal activity for a period of 
thirty days.
1995 & 1996 SECURITY SURVEYS
The Ernst & Young/Information Week (EY/IW) and the FBI/Computer Security 
Institute (FBI/CSI) security surveys indicate disturbing trends in today's computing 
environment.  Both surveys point out an alarming increase in the number of 
computer break-ins.
Completed in November 1995, the EY/IW study reported that 20% of 1290 
companies surveyed experienced a computer break-in within the previous year.   
Meanwhile, the Spring 1996 FB/CSI report shows 42% of 428 respondents 
experienced unauthorized computer use in the last 12 months.  The attacks 
varied from brute-force password guessing to scanning and spoofing.
Both surveys indicate a changing trend:  - the most common threats to 
computer systems now include a slightly greater risk from external attacks 
via the Internet and modem connections than from internal sources.  In past 
years, internal risks from disgruntled or untrained personnel were seen as the 
major threat, comprising about 80% of computer-security incidents.
Another change involves the type of person conducting the illegal assault on 
computer systems.  In the past, it was more than likely the perpetrators would 
be considered  "hackers" from the electronic underground whereas the current 
threat is just as likely to be a foreign or domestic business competitor or, in the 
case of attacks on government systems, a member of foreign government 
intelligence services.  The EY/IW survey uncovered some painfully expensive 
facts:  
 
- 54% of the 1290 participants reported an information security related 
 financial loss, however, most were unable or unwilling to estimate the dollar
 amount.  20 respondents lost information worth over $1 million.
 
 
- Citibank lost $400,000 in a single cyber-theft 
 
 
- Heller Financial (Glendale, CA) had $150,000 stolen during an 
 illegal wire-transfer.  (See Whatever Happened to Justin Tanner Peterson?,
 next article in this newsletter)
The FBI/CSI survey discovered similarly distressing facts:
- Less than 17% of those companies that were aware of a computer break-in 
 reported it to law enforcement
 
 
- Over 50% of the 428 companies interviewed do not have a policy for 
 dealing with computer break-ins
 
 
- Over 20% of the respondents didn't know if they had been attacked
 
WHATEVER HAPPENED TO...?
Justin Tanner Peterson, also known as "Agent Steal", you may recall was the 
one who pulled off the electronic heist of $150,000 from Heller Financial in Glendale, 
California.  Peterson's criminal career  started in 1991 when he was picked up 
for hacking into TRW and other databases in Dallas.  The subsequent police investigation 
uncovered more offenses and Peterson ultimately received a federal indictment 
that included eight counts of breaking into TRW computer systems.  The indictment 
also charged Peterson with possession of stolen passwords, assuming false identities, 
and fraudulently obtaining credit cards.
Peterson cooperated with law enforcement officials and began a complicated 
involvement in an "undercover capacity" with the federal government.  Court 
records in Los Angeles show that FBI Agents and the U.S. Attorney's Office 
bargained in 1991 to have Peterson released from jail in Texas to conduct 
"investigations".
Peterson would often speak about his undercover work with the FBI and other 
agencies to bring down fellow hackers.  Indeed, Peterson assisted in the case 
against Kevin Mitnick and Kevin Poulsen (see GUARDIAN News, April and 
July 1996).  As  former co-hackers, Peterson and Poulsen conspired together 
to pull off computer break-ins at Pacific Bell - the same offenses which lead to 
Poulsen's arrest.
Due to a series of delayed sentencings after his case was transferred to California, 
Peterson remained out of jail under FBI supervision from September of 1991 through 
October 1993.  Eventually, his case was re-opened and Peterson plead guilty to six 
counts and faced a maximum sentence of 40 years confinement and a $1.5 million 
fine. 
When questioned by a government attorney in October of 1993 if he had been 
breaking the law while on bail, Peterson affirmed that he had.  Later that same 
day, Peterson confided in a friend, "I've got a big problem and I'm splitting."  
Peterson vanished during a meeting with his lawyer and Assistant U.S. Attorney 
David Schindler when he stepped out for a drink of water and never came back.  
Peterson later remarked, "The FBI raided my house and found radio detection 
equipment that I acquired illegally to trace [Kevin] Mitnick.  I panicked and ran."
According to law enforcement officials, Peterson's "big problem" was breaking 
into computer systems at federal investigative agencies and credit card information 
bureaus.  He is also alleged to have illegally acquired over 40 passwords to "secure" 
computer systems.
On August 23, 1994 after spending nearly a year on the run, Peterson was 
apprehended after a foot-chase that commenced when he was spotted getting 
out of a BMW just two blocks from the FBI's West Los Angeles offices.  Just 
weeks before his arrest, Peterson stated during a telephone interview, "I wouldn't 
want the powers I have to be in the wrong hands... someone with malicious 
intentions." 
 
On March 27, Peterson appeared before the U.S. District Court of Los Angeles 
and plead guilty to the electronic wire heist at Heller Financial.  He originally faced 
a maximum sentence of up to 60 years in jail and fines of $2 million for conspiracy, 
mail fraud, illegal interception of wire/electronic communications, money-laundering, 
and removal of property to prevent seizure.  He was awarded and is still serving a 36 
month jail sentence (with another 36 months of supervisory detention to be served 
concurrently). His sentence also includes an order to pay $38,686 in restitution.  
KEVIN MITNICK UPDATE
The most publicized hacker track-down and capture story in history still drags 
on without conclusion (see GUARDIAN News, April 1996).  Originally scheduled 
for sentencing on July 15 of this year, Kevin Mitnick's appearance before the 
Central U.S.District Court of California has been postponed until September 30, 
1996.
To recap the Mitnick case, he was arrested February 15th last year for breaking 
into a long list of computers and telecommunications equipment.  Some of his 
capers include breaking into:  
- The North American Air Defense Command in Colorado 
 
 
- MCI computer systems
 
 
- Motorola, Inc. computer systems
 
 
- Telephone company computers in New York, California, North Carolina 
and Washington state
 
 
- Apple Computer networks
 
 
- Corporate networks where he stole computer programs and technical
 manuals
 
 
- Defense Department networks where he stole a pre-release version 
 of DEC's VMS V5.0 operating system
 
 
- A Navy computer at Naval Air Station Patuxent River
 
 
- The California Department of Motor Vehicles computer systems 
 where he obtained driver's license numbers, photographs and other highly
 sensitive information
 
 
- Netcom where he obtained the credit card numbers of over 20,000 
 subscribers
 
 
- The home computer of Tsutomu Shimomura, a computational 
 physicist at the San Diego Supercomputer Center, which ultimately lead
 to his capture
 
 
- The Well, a commercial on-line service in the San Francisco 
 Bay Area, where he attempted to hide files taken from Tsutomu Shimomura's
 computer
Originally charged with 23 offenses and facing several hundred thousand 
dollars in fines, Mitnick is expected to have all but one charge dropped and 
face a maximum of an eight month sentence.  Mitnick's lawyer, John Yzurdiaga, 
said Mitnick still faces additional charges, but will not discuss details because 
they are under "negotiation". 
For more information about the Mitnick case, two books have been released:  
"Takedown" and "The Fugitive Game - On Line with Kevin Mitnick".  "Takedown" 
is co-written by New York Times reporter John Markhoff and Tsutomu Shimomura 
and portrays Mitnick in a nearly demonic light.  The Fugitive Game" is authored by  
Jonathan Littman and depicts Mitnick  in a much less caustic fashion and as more 
of 'the hunted' than as 'the hunter'.  
The hardcopy edition of The GUARDIAN Newswire is free for DataLynx Customers, all others $24.00 per year.  Contact DataLynx for subscription information.
Copyright ®1997 DataLynx, Inc. 
Security Through Strength
The document above is the GUARDIAN Newswire, Volume I, Issue 9