SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : Computer Learning

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: mr.mark who started this subject4/11/2001 1:52:26 PM
From: mr.mark   of 110626
 
"You'd be surprised how many modems are still out there to
dial into. How many companies depend on their partners' security to
provide them with security. For instance, you can link through four
Department of Defense contractors straight to the Pentagon right
now. It shouldn't be that way, but it is."


"Three Minutes With Hacker 'Fosdick'

A 17-year veteran of the hacking world talks about
ethics, the dangers of hacking, and the security of
government information.

Kim Zetter, PCWorld.com
Thursday, April 05, 2001

Fosdick, who goes by various names online, is a 27-year-old hacker
who works as a programming engineer. He began hacking at age 10
after his father, a prominent judicial official in the East Coast city
where he grew up, bought him his first computer. Within five months
of receiving it, Fosdick hacked into a bank. From there he progressed
to phone companies, utilities, and government systems. Most of the
time, he says, he just looks at data, but he has occasionally altered
it. He usually downloads whatever files interest him, then sifts
through the info while sipping coffee at Starbucks. We spoke to him
via IRC about his activities. We are withholding his real name at his
request.

PCW: When you hacked into the bank at age 10, what did you do?

Fosdick: I mostly looked around at FedEx transfers, wire transfers,
bank account information. I didn't want to screw anything up. The
thought, of course, entered my mind to change data, but I couldn't
have if I wanted to back then--it was an operating system I wasn't
familiar with ... just a jumble of impressive-looking numbers.

PCW: Why did you pick the bank?

Fosdick: It was down the street from me.

PCW: Describe your progression into hacking.

Fosdick: I mostly played around with whatever I could find. I just
picked numbers out of thin air and tried them [dialing random phone
numbers through a modem in hopes they were connected to a
computer]. When I was 12, I went for the summer to a program for
gifted kids at a university in Missouri. There wasn't a lot of
supervision there, and there was a "dungeon" full of computers I
could use when I wanted, provided I felt like sneaking downstairs.
And I did.

That summer I started getting much more hard core ... and I dialed
my first BBS [bulletin board service--the precursor to Usenet groups,
where hackers would share tips about exploiting systems]. At that
point I started being less cautious. I got maybe 3 hours of sleep a
night for three years of high school.

PCW: Did your father know what you were doing all this time?

Fosdick: Not until years later. One night he had had it with me
sneaking down in the middle of the night and using the phone line;
he put two and two together, found my hidden files, printed them
out, and yelled at me.

PCW: Have you ever done a denial-of-service attack?

Fosdick: Yes. In 1994 and 1995 I wrote some code that would do it.
It was just for amusement, to protest AOL. Their mail servers were
having lots of problems for a while [as a result]. But it was just a
game. I never took [AOL] down, out of respect. Someone could get
fired, and in general I don't like hurting people.

PCW: Would you consider yourself a black hat or a white hat
hacker?

Fosdick: What I do is certainly criminal ... [such as hacking into]
government computers. But I don't "destroy" systems I am on. For
the most part I just look around.

Of course, I've inserted and removed data where I had no business
doing so. I've played practical jokes here and there, forged e-mail,
changed features on phone lines, manipulated databases, that sort
of thing. I've had the opportunity on several occasions to make out
stocks-wise, but I haven't [done that].

PCW: How much time do you spend hacking?

Fosdick: Anywhere from 20 hours a week to nonstop for three to
four days at a stretch, with maybe a few hours sleep here and
there. But those latter times are getting rare. I'm getting old.

PCW: Is there such a thing as a hacker's ethic?

Fosdick: Hackers all have what they believe to be ethics. I'm using
ethics in a Nietzschean sense. In general, if you're doing what you
believe in, then you're ethical, to yourself. But everybody's ethics
differ. So I guess by that definition, even crackers have ethics.

PCW: Are hackers dangerous?

Fosdick: I think ignorance is the real danger. What's dangerous are
hackers who are out there doing this stuff because it's cool but don't
have the knowledge to give it respect.

PCW: But you've said that the really dangerous hackers are not the
ones making headlines. Who is dangerous then?

Fosdick: It's dangerous that corporate America thinks that the
hackers making noise are the danger. [Because] while [these
hackers are] getting attention, anybody who really wanted to could
just ...

PCW: Do what?

Fosdick: You'd be surprised how many modems are still out there to
dial into. How many companies depend on their partners' security to
provide them with security. For instance, you can link through four
Department of Defense contractors straight to the Pentagon right
now. It shouldn't be that way, but it is.

PCW: You mean that while the government is busy securing itself,
it's forgotten about securing the companies it does business with?

Fosdick: They haven't forgotten. I've worked at a Department of
Defense contractor ... [they have] firewall after firewall, machines
kept in locked rooms with TEMPEST-proof walls.

The DoD contractors try [to maintain security], but there's always a
need to exchange data with other companies. Say you're Lockheed
Martin. You're working on one part of an airplane, and another
company is working on the radio, and another the flight control
software. All these huge CAD files have to be exchanged so that
everything will work together. That cannot be done by e-mail. So
you need a dial-up or an FTP.... It's nobody's fault, really. It's just
the way business works. Security is not compatible with business.

PCW: The government says that classified information is not on
computers that are connected to the Net.

Fosdick: It's usually not. But you'd be surprised how many modems
are still available to dial into. [A modem] might be connected to a
computer that's connected to a computer that's connected to a
computer that has the single point of entrance into some
"forbidden" network.

PCW: Last fall, hackers broke into Microsoft's corporate network and
accessed source code for the latest versions of Windows and Office.
Do you think it will be possible in the future for hackers to place
malicious code, such as a Trojan horse, in a company like Microsoft's
source code?

Fosdick: Microsoft is a big target, but it's less likely to be Trojaned
than, say, Napster, or any of a dozen popular Net plug-ins like
Winamp or mIRC. Big companies tend to have more sophisticated
processes and better source-code control. Hacks there are more
likely to get noticed. But small companies tend to be more careless.

PCW: But isn't Napster so popular that few hackers would want to
harm the program?

Fosdick: Which is why it would be the perfect target. Between
mIRC, Napster, Eudora, and Winamp, you probably have about 85
percent of the Windows computers on the Net.

PCW: Will we see this kind of hack soon?

Fosdick: That requires skills most hackers don't have. And those
programs aren't free source, so if it happens you'll probably never
even hear about it.

Kim Zetter is a senior associate editor covering computer security for PCWorld.com."

pcworld.com
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext