[iwar] [fc:FBI.operation.penetrates.hacker.underground]

From: Fred Cohen (fc@all.net)
Date: 2001-09-17 07:16:26


Return-Path: <sentto-279987-1970-1000748009-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Mon, 17 Sep 2001 10:34:09 -0700 (PDT)
Received: (qmail 25995 invoked by uid 510); 17 Sep 2001 17:33:45 -0000
Received: from n1.groups.yahoo.com (216.115.96.51) by 204.181.12.215 with SMTP; 17 Sep 2001 17:33:45 -0000
X-eGroups-Return: sentto-279987-1970-1000748009-fc=all.net@returns.onelist.com
Received: from [10.1.4.56] by hh.egroups.com with NNFMP; 17 Sep 2001 17:33:29 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_3_2_2); 17 Sep 2001 17:33:29 -0000
Received: (qmail 69183 invoked from network); 17 Sep 2001 14:16:32 -0000
Received: from unknown (10.1.10.27) by l10.egroups.com with QMQP; 17 Sep 2001 14:16:32 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta2 with SMTP; 17 Sep 2001 14:16:32 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id HAA10609 for iwar@onelist.com; Mon, 17 Sep 2001 07:16:26 -0700
Message-Id: <200109171416.HAA10609@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Mon, 17 Sep 2001 07:16:26 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:FBI.operation.penetrates.hacker.underground]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

FBI operation penetrates hacker underground 
By Dan Verton, ComputerWorld, 9/17/2001
<a href="http://www.computerworld.com/cwi/story/0,1199,NAV47_STO63711,00.html">http://www.computerworld.com/cwi/story/0,1199,NAV47_STO63711,00.html>

The FBI has gained a foothold in the hacker underground thanks to an
18-month undercover operation launched during the height of the U.S. 
military's 1999 bombing campaign in Kosovo. 

What started out as a Defense Department operation designed to ferret
out pro-Serbian hackers responsible for the April 1999 denial-of-service
attacks against U.S.  government and NATO Web sites soon led to the
first coordinated undercover operation targeting U.S.-based hackers,
Computerworld has learned. 

The operation, whose code name is being withheld for security reasons,
involved a joint team of half a dozen FBI and Pentagon criminal
investigators who posed as hackers on the Internet.  Dozens of
investigations by the Justice Department have been opened as a result of
the operation's success, including some that are continuing. 

During the course of the operation, agents developed multiple informants
within the hacker underground, conducted more than a dozen authorized
defacements of government Web sites to establish a reputation among the
hackers and received assistance and training from hackers they had
arrested. 

William Swallow is director of incident response for the Cyber Attack
Tiger Team (CATT) at Exodus Communications Inc.  in Santa Clara, Calif. 
He is also the former lead investigator in the sting operation and one
of the agents who for a year posed as a hacker.  Although the team never
defaced a corporate Web site, it received permission to hack into and
deface government Web sites and then posted those defacements to
Attrition.org, a Web site that archives hacker defacements, he said. 

"Even a half-dozen hacks got you a pretty good reputation," said
Swallow.  "I had to be able to demonstrate to them that I could do it."

The plan worked.  Swallow and the other investigators developed close,
even competitive, relationships with hackers through the use of Internet
Relay Chat rooms.  Soon, hackers were trying to get the investigators to
take part in coordinated hacking attacks and offering to share stolen
information. 

"It took about six months to really get them to feel comfortable enough
to pass information along," said Swallow.  "I had hackers pass stolen
credit cards to me and request help in hacks." Some of those young
hackers had relationships with Russian mafia organizations and were
trying to sell the information. 

Swallow came up with the idea for the investigation shortly after he was
detailed to the FBI's computer intrusion squad in Los Angeles in 1999. 
He had been sent there by the Pentagon to help develop sources in the
Serbian hacker community who might be able to lead investigators to the
perpetrators of the April denial-of-service attack against Defense
Department Web sites.  He managed to uncover a valuable informant who
helped him collect volumes of intelligence information on hackers around
the world.  But when the Serbian hacker operation was about to come to
an end, Swallow realized that he and others had managed to penetrate a
good portion of the hacker underground in the U.S. 

Rather than shut down the operation, the FBI agreed to keep it going. 

Although Swallow and others didn't know it at the time, the undercover
investigation would come to play a pivotal role in the eventual
prosecution of the 17-year-old hacker known as "Mafiaboy." The Canadian
hacker pleaded guilty to 58 charges stemming from the February 2000
denial-of-service attacks against Web sites belonging to five companies,
including Amazon.com Inc., Dell Computer Corp., eBay Inc., Yahoo Inc. 
and CNN. 

On the night that Mafiaboy launched his attack, Swallow and other
hackers watched in disbelief as he bragged about what he had just done. 
Nobody, including the other hackers who were present in the chat room,
believed him.  As a result, Swallow, who had operator status in the chat
room -- giving him the authority to control who was allowed in -- kicked
Mafiaboy out and banned him from returning. 

"Most of us really didn't have much respect for him," said Swallow.  "We
didn't believe him and didn't think he was that good.  I don't think he
was that good.  I think he just had access to the right tools." Hacker
informants would later lead the FBI to the teenager. 

A U.S.  attorney who spoke on condition of anonymity said undercover
operations, including this one and others that are ongoing, have been
"very important" to the FBI's ability to track down hackers, "especially
with people that are beyond the reach of our courts overseas."

Eric Friedberg, a former computer and telecommunications crime
coordinator at the U.S.  Attorney's Office in New York, said that
although undercover operations are "the wave of the future," there are
risks. 

Hacker informants can be "extremely unreliable," said Friedberg, now a
computer crime consultant at Stroz and Associates in New York. 

"It's hard to engender a sense of loyalty in that community," he said. 
"They see it as sort of a game.  Many of them don't appreciate that
they're jammed up [in trouble with the law].  It makes for very dicey
work."


------------------------ Yahoo! Groups Sponsor ---------------------~-->
Secure your servers with 128-bit SSL encryption! Grab your copy of VeriSign's FREE Guide, "Securing Your Web
site for Business" and learn all about serious security. Get it Now!
http://us.click.yahoo.com/r0k.gC/oT7CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-09-29 21:08:44 PDT