[iwar] FBI agent charged with hacking

From: Fred Cohen (fc@all.net)
Date: 2002-08-16 06:23:41


Return-Path: <sentto-279987-5193-1029504166-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Fri, 16 Aug 2002 06:25:08 -0700 (PDT)
Received: (qmail 20116 invoked by uid 510); 16 Aug 2002 13:21:15 -0000
Received: from n14.grp.scd.yahoo.com (66.218.66.69) by all.net with SMTP; 16 Aug 2002 13:21:15 -0000
X-eGroups-Return: sentto-279987-5193-1029504166-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.66.95] by n14.grp.scd.yahoo.com with NNFMP; 16 Aug 2002 13:22:46 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_7_4); 16 Aug 2002 13:22:45 -0000
Received: (qmail 47264 invoked from network); 16 Aug 2002 13:22:45 -0000
Received: from unknown (66.218.66.217) by m7.grp.scd.yahoo.com with QMQP; 16 Aug 2002 13:22:45 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta2.grp.scd.yahoo.com with SMTP; 16 Aug 2002 13:22:45 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g7GDNfs12438; Fri, 16 Aug 2002 06:23:41 -0700
Message-Id: <200208161323.g7GDNfs12438@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Fri, 16 Aug 2002 06:23:41 -0700 (PDT)
Subject: [iwar] FBI agent charged with hacking
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit
X-Spam-Status: No, hits=0.0 required=5.0 tests=DIFFERENT_REPLY_TO version=2.20
X-Spam-Level: 

FBI agent charged with hacking 

Russia alleges agent broke law by downloading evidence 

By Mike Brunker 
MSNBC 

Aug. 15 =97 In a first in the rapidly evolving field of cyberspace law,
Russia=92s counterintelligence service on Thursday filed criminal charges
against an FBI agent it says lured two Russian hackers to the United
States, then illegally seized evidence against them by downloading data
from their computers in Chelyabinsk, Russia. 

 The case was the first in the FBI=92s history to =91utilize the technique
of extra-territorial seizure.=92 
=97 FBI PRESS RELEASE

        IGOR TKACH, an investigator with Russia=92s Federal Security
Service, or FSB, started criminal proceedings against FBI Agent Michael
Schuler for unauthorized access to computer information, according to the
Interfax news agency.

      The agency reported the complaint had been forwarded to the U.S.
Justice Department and that the FSB was awaiting a response.
      The FBI said Thursday it had no comment on the case, and the Justice
Department did not immediately respond to a request seeking comment.
      Interfax quoted sources with the FSB as describing the criminal
complaint as an effort to restore traditional law enforcement borders.
      =93If the Russian hackers are sentenced on the basis of information
obtained by the Americans through hacking, that will imply the future
ability of U.S. secret services to use illegal methods in the collection
of information in Russia and other countries,=94 the news agency quoted
one source as saying.

RUSE WAS WIDELY PRAISED
      Schuler and other agents were widely praised for an elaborate ruse
that led to the arrests of Vasily Gorshkov, 25, and Alexey Ivanov, 20, in
November 2000. Court papers described the men as kingpins of Russian
computer crime who hacked into the networks of at least 40 U.S. companies
and then attempted to extort money.
      The pair was lured to the United States after Ivanov identified
himself in an e-mail threatening to destroy data at a victimized company,
Stephen Schroeder, a now-retired assistant U.S. attorney in Seattle who
prosecuted Gorshkov, told MSNBC.com last year.
      FBI agents then found Ivanov=92s resum=E9 online and, posing as
representatives of a fictitious network security company called Invita,
contacted him to offer him a job.
      Once Ivanov and Gorshkov arrived in Seattle, agents posing as Invita
officials asked the men to demonstrate their prowess on a computer
outfitted with =93sniffer=94 software to record every keystroke. After
arresting the men, the agents used account numbers and passwords obtained
by the program to gain access to data stored on the pair=92s computers in
Russia. 
      Fearing that an associate would =93pull the plug=94 on the computer
in Russia, the agents downloaded evidence before obtaining a search
warrant, according to court papers.

AGENTS HONORED 
      In a news release issued last week honoring Agents Schuler and Marty
Prewett with the director=92s award for excellence, the FBI=92s field
office in Seattle said the case was the first in the the bureau=92s
history to =93utilize the technique of extra-territorial seizure.=94 The
procedures employed by the agents had been incorporated into the attorney
general=92s guidelines for law enforcement personnel, it said.  

       Court papers allege that Ivanov and Gorshkov broke into and
obtained financial information from a number of large U.S. companies and
penetrated the computer networks of two banks =97 the Nara Bank of Los
Angeles and Central National Bank-Waco, based in Texas.
      They also were accused of orchestrating =93a massive scheme=94 to
defraud the Internet-based payment company PayPal, based in Palo Alto,
Calif., by using =93proxy=94 e-mail addresses from such institutions as
public schools and stolen credit-card numbers to buy goods.
      Prosecutors have indicated they also believe the Russians are linked
to two other high-profile cases: the theft of data on 300,000 credit cards
from the CD Universe Web site and another 
      15,700 credit cards from a Western Union Web site. 
      Gorshkov was convicted in Seattle in September 2001 of 20 counts of
wire fraud, charges that carry a maximum sentence of 100 years in prison.
Sentencing was scheduled for January, but court records do not reflect
that a punishment had been imposed.
      Ivanov also has been indicted in New Jersey and Connecticut, where
he currently is in custody and awaiting trial.
      In pretrial motions, Gorshkov=92s lawyer, Kenneth Kanev, argued that
the FBI agents had violated Gorshkov=92s Fourth Amendment right against
unreasonable search and seizure by secretly obtaining passwords and
account numbers.
      But U.S. District Judge John C. Coughenour of Seattle ruled that
Gorshkov and Ivanov gave up any expectation of privacy by using computers
in what they believed were the offices of a public company. 

NO EXPECTATION OF PRIVACY
      =93When (the) defendant sat down at the networked computer =85 he
knew that the systems administrator could and likely would monitor his
activities,=94 Coughenour wrote. =93Indeed, the undercover agents told
(Gorshkov) that they wanted to watch in order to see what he was capable
of doing.=94
      He also found that the Fourth Amendment did not apply to the
computers, =93because they are the property of a non-resident and located
outside the United States,=94 or to the data =97 at least until it was
transmitted to the United States. 
      The judge noted that investigators obtained a search warrant before
viewing the vast store of data =97 nearly 250 gigabytes, according to
court records. He rejected the argument that the warrant should have been
obtained before the data was downloaded, noting that =93the agents had
good reason to fear that if they did not copy the data, (the)
defendant=92s co-conspirators would destroy the evidence or make it
unavailable.=94
      Finally, Coughenour rejected defense arguments that the FBI=92s
actions =93were unreasonable and illegal because they failed to comply
with Russian law,=94 saying that Russian law does not apply to the
agents=92 actions.

NT VULNERABILITY EXPLOITED
      Ivanov, Gorshkov and other unidentified associates used the Internet
to gain illegal access to the U.S. companies=92 computers, often by
exploiting a known security vulnerability in Windows NT, according to
court papers. A =93patch=94 for the vulnerability had been posted on the
Microsoft Web site for almost two years, but the companies hit by the
cyberbandits hadn=92t updated their software.
      (MSNBC is a Microsoft-NBC joint venture.)
      At least one company, Lightrealm Communications of Kirkland, Wash.,
acceded to a demand that it hire Ivanov as a security consultant after he
broke into the Internet service provider=92s computers, according to court
documents. Ivanov then used a Lightrealm account to break into other
companies=92 computers, they indicated.
      Eastern Europe and nations of the former Soviet Union have become a
hotbed for computer crime aimed at businesses in the United States and
other Western nations.
      When MSNBC.com first reported on the problem of overseas computer
crime in 1999, Mark Batts, the special agent in charge of the FBI=92s
Financial Institution Fraud Unit, said he was not aware of any
prosecutions of credit card thieves operating from Eastern Europe and the
nations of the former Soviet Union.  

--This communication is confidential to the parties it is intended to serve--
Fred Cohen		Fred Cohen & Associates.........tel/fax:925-454-0171
fc@all.net		The University of New Haven.....http://www.unhca.com/
http://all.net/		Sandia National Laboratories....tel:925-294-2087


------------------------ Yahoo! Groups Sponsor ---------------------~-->
4 DVDs Free +s&p Join Now
http://us.click.yahoo.com/pt6YBB/NXiEAA/RN.GAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:32 PDT