219 lines
12 KiB
Plaintext
219 lines
12 KiB
Plaintext
|
==Phrack Inc.==
|
||
|
Volume Three, Issue Thirty-one, Phile #9 of 10
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
PWN Phrack World News PWN
|
||
|
PWN Issue XXXI, Part Two PWN
|
||
|
PWN Compiled by Phreak_Accident PWN
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
|
||
|
|
||
|
{C}omputer {E}mergency {R}esponse {T}eam
|
||
|
----------------------------------------
|
||
|
Some call it "Internet Police" -- Others call it "just stupid."
|
||
|
CERT however is a mix. But I do give them credit -- After all, have your
|
||
|
number one goal being 'making the Internet more secure' has to be a tough task.
|
||
|
Therefore, we give them credit.
|
||
|
However, CERT is funded by DARPA, which is a government agency. And
|
||
|
anything in my book that the government runs is bad news. Yes, the government
|
||
|
pays the 6 man salary and keep their hot-line active 24 hours a day.
|
||
|
Ahh.. What do you know about CERT? "Nothing" you say? Well, the
|
||
|
following is the press release and other reprints of information about CERT.
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Richard Pethia <rdp@SEI.CMU.EDU>
|
||
|
DEAR XXXXXXXXX,
|
||
|
I have been reviewing our correspondence files and have discovered
|
||
|
that your request for information may not have been filled. I
|
||
|
apologize for the delay and hope that the information is still useful
|
||
|
to you. If, after reading the following, you have additional
|
||
|
questions or would like to subscribe to one of our information lists,
|
||
|
please send email with your question/request.
|
||
|
The Computer Emergency Response Team (CERT) was established by the Defense
|
||
|
Advanced Research Projects Agency in November of 1988 to serve members
|
||
|
of the Internet Research community. The press release below describes
|
||
|
the general role of the CERT.
|
||
|
More specifically, the CERT supports individual Internet sites by:
|
||
|
-Working with site personnel to help resolve individual computer security
|
||
|
incidents. Contact potentially affected sites to warn them of
|
||
|
possible security breaches. Work with sites to change the
|
||
|
conditions that allowed incidents to occur.
|
||
|
-Issuing advisories that alert the community to specific system
|
||
|
vulnerabilities or intrusion techniques, as well as the methods to
|
||
|
protect against them.
|
||
|
-Working with the community and system (primarily Unix) vendors to
|
||
|
reslove specific system vulnerabilities.
|
||
|
-Maintaining and operating moderated mailing lists that: (1) provide a
|
||
|
discussion forum for tools and techniques to improve the security of
|
||
|
Unix systems, and (2) provide a discussion forum and alert mechanism
|
||
|
for PC viruses, trojan horses, etc.
|
||
|
Over the past year we have developed hundreds of working relationships
|
||
|
with members of the Internet and other communities and have
|
||
|
established an extensive information collection and dissemination
|
||
|
network. Because of this network of cooperating individuals and
|
||
|
organizations, we are often able to advise the community of problems
|
||
|
allowing them to take corrective action before being affeceted by
|
||
|
those problems.
|
||
|
---------------------
|
||
|
No. 597-88
|
||
|
(202) 695-0192 (Info.)
|
||
|
(202) 697-3189 (Copies)
|
||
|
IMMEDIATE RELEASE December 6, 1988 (202) 697-5737
|
||
|
(Public/Industry)
|
||
|
DARPA ESTABLISHES COMPUTER EMERGENCY RESPONSE TEAM
|
||
|
The Defense Advanced Research Projects Agency (DARPA) announced today
|
||
|
that it has established a Computer Emergency Response Team (CERT) to
|
||
|
address computer security concerns of research users of the Internet,
|
||
|
which includes ARPANET. The Coordination Center for the CERT is
|
||
|
located at the Software Engineering Institute (SEI), Carnegie Mellon
|
||
|
University, Pittsburgh, PA.
|
||
|
In providing direct service to the Internet community, the CERT will
|
||
|
focus on the special needs of the research community and serve as a
|
||
|
prototype for similar operations in other computer communities. The
|
||
|
National Computer Security Center and the National Institute of
|
||
|
Standards and Technology will have a leading role in coordinating the
|
||
|
creation of these emergency response activities.
|
||
|
The CERT is intended to respond to computer security threats such as
|
||
|
the recent self-replicating computer program ("computer virus") that
|
||
|
invaded many defense and research computers.
|
||
|
The CERT will assist the research network communities in responding to
|
||
|
emergency situations. It will have the capability to rapidly
|
||
|
establish communications with experts working to solve the problems,
|
||
|
with the affected computer users and with government authorities as
|
||
|
appropriate. Specific responses will be taken in accordance with
|
||
|
DARPA policies.
|
||
|
It will also serve as a focal point for the research community for
|
||
|
identification and repair of security vulnerabilities, informal
|
||
|
assessment of existing systems in the research community, improvement
|
||
|
to emergency response capability, and user security awareness. An
|
||
|
important element of this function is the development of a network of
|
||
|
key points of contact, including technical experts, site managers,
|
||
|
government action officers, industry contacts, executive level
|
||
|
decision-makers and investigative agencies, where appropriate.
|
||
|
Because of the many network, computer, and systems architectures and
|
||
|
their associated vulnerabilities, no single organization can be
|
||
|
expected to maintain an in-house expertise to respond on its own to
|
||
|
computer security threats, particularly those that arise in the
|
||
|
research community. As with biological viruses, the solutions must
|
||
|
come from an organized community response of experts. The role of the
|
||
|
CERT Coordination Center at the SEI is to provide the supporting
|
||
|
mechanisms and to coordinate the activities of experts in DARPA and
|
||
|
associated communities.
|
||
|
The SEI has close ties to the Department of Defense, to defense and
|
||
|
commercial industry, and to the research community. These ties place
|
||
|
the SEI in a unique position to provide coordination support to the
|
||
|
software experts in research laboratories and in industry who will be
|
||
|
responding in emergencies and to the communities of potentially
|
||
|
affected users.
|
||
|
The SEI is a federally-funded research and development center,
|
||
|
operating under DARPA sponsorship with the Air Force Systems Command
|
||
|
(Electronic Systems Division) serving as executive agent. Its goal is
|
||
|
to accelerate the transition of software technology to defense
|
||
|
systems. Computer security is primarily a software problem, and the
|
||
|
presence of CERT at the SEI will enhance the technology transfer
|
||
|
mission of the SEI in security-related areas.
|
||
|
-END-
|
||
|
|
||
|
QUESTIONS AND ANSWERS: DARPA ESTABLISHES CERT, 12/6/88
|
||
|
Q: Can you provide background on earlier break-ins?
|
||
|
A: On November 2, 1988, thousands of computers connected to
|
||
|
unclassified DoD computer networks were attacked by a virus. Although
|
||
|
the virus did not damage or compromise data, it did have the effect of
|
||
|
denying service to thousands of computer users. The computer science
|
||
|
research community associated with the Defense Advanced Research
|
||
|
Projects Agency (DARPA), along with many other research laboratories
|
||
|
and military sites that use these networks, quickly responded to this
|
||
|
threat. They developed mechanisms to eliminate the infection, to
|
||
|
block the spread of the self-replicating program, and to immunize
|
||
|
against further attack by similar viruses. Software experts from the
|
||
|
University of California at Berkeley, with important contributions
|
||
|
from the Massachusetts Institute of Technology and other network
|
||
|
sites, rapidly analyzed the virus and developed immunization
|
||
|
techniques. These same software experts also provided important
|
||
|
assistance in the more recent Internet intrusion of 27-28 November.
|
||
|
As the events unfolded, DARPA established an ad hoc operation center
|
||
|
to help coordinate the activities of software experts working around
|
||
|
the clock and to provide information to appropriate government
|
||
|
officials. The operations center had three main tasks. It
|
||
|
facilitated communications among the many groups affected, it ensured
|
||
|
that government organizations were promptly informed of developments,
|
||
|
and it provided initial technical analysis in DoD. Although the
|
||
|
threat was contained quickly, a more maliciously designed virus could
|
||
|
have done serious damage.
|
||
|
The recent events serve as a warning that our necessarily increasing
|
||
|
reliance on computers and networks, while providing important new
|
||
|
capabilities, also creates new kinds of vulnerabilities. The
|
||
|
Department of Defense considers this an important national issue that
|
||
|
is of major concern in both the defense and commercial sectors. The
|
||
|
DoD is developing a technology and policy response that will help
|
||
|
reduce risk and provide an emergency reaction response.
|
||
|
Q: Who will be on the CERT?
|
||
|
A: The CERT will be a team of over 100 experts located throughout the
|
||
|
U.S. whose expertise and knowledge will be called upon when needed.
|
||
|
When not being called upon, they will continue their normal daily
|
||
|
work. As noted in the release, these experts will include: technical
|
||
|
experts, site managers, government action officers, industry contacts,
|
||
|
executive-level decision-makers and representatives from investigative
|
||
|
agencies.
|
||
|
recommendations that will be acted upon by DoD authorities.
|
||
|
Q: Is the CERT fully operational now?
|
||
|
A: We are in the very early stages of gathering people for the CERT.
|
||
|
We are first concentrating on collecting technical experts. A staff
|
||
|
is in place at SEI, but details are still being worked out.
|
||
|
Q: Will there just be one CERT?
|
||
|
A: The intent is that each major computer community may decide to
|
||
|
establish its own CERT. Each CERT will therefore serve only a
|
||
|
particular community and have a particular technical expertise. (The
|
||
|
DARPA/SEI CERT will serve, for example, the research community and
|
||
|
have expertise in Berkeley-derived UNIX systems and other systems as
|
||
|
appropriate.) The National Computer Security Center and the National
|
||
|
Institute of Standards and Technology will support the establishment
|
||
|
of the CERTs and coordinate among them.
|
||
|
Q: What are the special needs of the research community that their
|
||
|
CERT will serve?
|
||
|
A: The special challenge of the research community is improving the
|
||
|
level of computer security without inhibiting the innovation of
|
||
|
computer technology. In addition, as is often DARPA's role, their
|
||
|
CERT will serve as a prototype to explore the CERT concept so that
|
||
|
other groups can learn and establish their own.
|
||
|
Q: Does the CERT Coordination Center have a press point of contact?
|
||
|
A: No. Their function is to serve as a nerve center for the user
|
||
|
community.
|
||
|
.end
|
||
|
_______________________________________________________________________________
|
||
|
USA Today and the devil
|
||
|
-----------------------
|
||
|
Many controversies have been made of the article printed in USA Today
|
||
|
after Operation Sun-Devil took it's toll.
|
||
|
Phrack inc. tried to contact the author, and with no luck she wasn't
|
||
|
accepting phone calls. Please remember, this is only a USA Today article --
|
||
|
C'mon, get real USAT.
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
|
||
|
byline 'Debbie Howlett, USA Today' reads:
|
||
|
A network of computer hackers operating in 14 cities -- which bilked phone
|
||
|
companies of $50 million -- has been unplugged, police say.
|
||
|
"We're not talking about somebody who played Space Invaders too many
|
||
|
times," says Tim Holtzen, spokesman for the U.S. attorney in Phoenix.
|
||
|
The hackers -- the largest such ring discovered in the USA --broke into
|
||
|
phone company and bank computer systems to obtain account numbers and run
|
||
|
up an unknown total in debts, police say.
|
||
|
"The main thing is the life-threatening information these computer hackers
|
||
|
were trying to get into," says Richard Adams of the Secret Service. "It
|
||
|
goes beyond being monetary to totally mischievous."
|
||
|
The ring was uncovered 18 months ago, when members tried and failed to
|
||
|
infiltrate computers at Barrows Neurological Institute in Phoenix.
|
||
|
They later tried to block incoming calls to the 911 emergency service in
|
||
|
Chicago. The motivation? "The primary reason is as kind of a malicious
|
||
|
hobby." says Gary Chapman of Computer Professionals for Social
|
||
|
Responsibility. "People are interested in testing their skills against
|
||
|
security measures." But, Adams says, "I hate to minimize it by saying it
|
||
|
was just for kicks."
|
||
|
Police seized 40 computers and 23,000 disks during searches Tuesday in 14
|
||
|
cities, officials said Wednesday. Five men, between the ages of 19 and 24,
|
||
|
have been arrested.
|
||
|
What's been uncovered so far, says Holtzen, may be "just the tip of the
|
||
|
iceberg."
|
||
|
[END OF STORY]
|
||
|
_______________________________________________________________________________
|