About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Phreak
Boxes, Old and New
Bugs and Taps
Cellular Phones
Introduction to Telecommunications
PBX's and Switches
Payphones
Phone Phun
VMB's, Pagers, E-Mail, and S&F Systems
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Electronic Deception, Interception, and Terrorism:


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
Start.

EElectronic Deception, Interception & Terrorism : The Radio Shack Reality!
------------------------------------------------------------------------
presented by

Ian A. Murphy, President & CEO

IAM / Secure Data Systems Inc.
1225 North Second Street
Philadelphia, Pa 19122
(215) 634-5749















"Electronic Deception, Interception & Terrorism : The Radio Shack Reality!
------------------------------------------------------------------------
Objective and Scope of the Problem

The use of personal computers and the growth of electronics into the
mainstream population, will allow almost anyone with basic understanding
of common technology, the possible interception and collection of
information that would not be available under normal conditions.
Suppliers of basic electronic equipment now provide a number of different
devices for the unknown numbers of possibilities for interception of
tele-communications, data communications, and microwave and satellite
communications for a small price. Some equipment is advertised to be a
small as a dime and may be purchased from the back of many electronic
magazines for under $30.00. Other devices are a bit larger and
need more expertise to operate, but are still in the hands of many.

To all of this, we add the entry of the personal computer and its
ability to collect millions of bits of data in seconds instead of the
human needing to ingest and store such information. The information can be
collected onto tape or floppy disk and removed to a safer location with
ease as compared to the removal of such volumes of information in paper
or book form.

Other problems involved with possible comprimised conditions include
outside data communication contact persons who have no authorized
access. Groups known to both law enforcement and the public media have
surfaced from time to time and with some most embarassing information
about corporate and goverment networks and computer systems.

Most invasions occur with little notice at the time of entry and are
only detected when major system problems or audit information are scanned.
Public (private) domain systems are accessible around the clock without
cost to thousands and provide the underground with an excellent source for
information.

These systems contain information for the compromise of various
communications networks and operating systems to the construction of
explosive devices and different methods for gaining physical access to
such networks. All is known to be in the hands of a vast majority of
minors, but if such information is available to anyone with computer
communications ability, then the threat of such incidents occurring
increases tenfold.

The reason is due to the ease of access from anyone with the right
information available to call these outlets of sensitive knowledge.
The statement from Thomas Jefferson, represents the spirit of the words,
"Knowledge is Power." as frightning truth in today's information society.



"Electronic Deception, Interception & Terrorism : The Radio Shack Reality!
------------------------------------------------------------------------
Results to Date

With the continued expansion of computers, many individuals and groups
have been brought to the attention of law enforcement authorities. Groups
with names such as The Legion of Doom, Knights of Shadow, The 414 Gang,
The Brotherhood of Ohm and others. These groups consist of minors who
trade information on a number of computers and telecommunications systems.

These individuals have become known due to their actions on the systems
of their choice. Reasons for discovery include the blatant posting of
about plans to attack such systems, pieced-together information from
telephone company records, credit card frauds committed to obtain computer
hardware and software, and systems security violated numerous times by
outside telecom contacts.

These groups have a small impact on overall communications insecurity
and pose little threat to national and corporate security. But the major
problem associated with the leak of sensitive knowledge, comes from the
lack of true indicators of such incursions in these networks. If persons
with little directed intent are able to gather sensitive data from a
number of public and underground sources, then a directed force will have
a much easier time gathering facts and building upon them. Such fact
gathering abilities come from eastern bloc countries with representives in
this country, using "listening posts" stationed in major urban areas under
diplomatic immunity to average citizens with back yard satellite dishes,
personal computers and home-built or store-bought electronics.

An example; According to statements made by David L. Watters before the
Senate Select Committee on Foreign Intelligence in Febuuary 1977, the
Soviet embassy in Washington, D.C. was in a direct line of interception
for most of the federal goverment microwave communications. The embassy
had the ability to receive any transmissions from sites such as White
House, Tennely Tower, the Pentagon, Ft. George Meade, Ft Belviour,
Andrews Air Force Base, Walter Reed Medical Center and other such
govermental sites.

Costs of such methods do not come cheaply and require industrial
communications equipment to gather and process large amounts of such
traffic in an urban environment. It should be noted that the embassy is
located on the highest piece of land in the city of Washington and that
alone allows for very easy signal reception from such generating
facilities in the metropolitian area.





"Electronic Deception, Interception & Terrorism : The Radio Shack Reality!
------------------------------------------------------------------------
Results to Date (con't.)

With common sense applied, one must assume that the goverment is using
encryption methods to transmit information over communications channels.
The one benefit the such methods allow is for the useful lifetime of
the information to remain valid as well as keeping such information
guarded from unauthorized sources. But since this information is secured
from such easy desemenation, the value of interception decreases to a
point where the ability to decipher such information becomes too costly
in a time value stance.

One interesting twist to the encryption methods used by both the public
and some goverment agencies, is the use of the DES (Digital Encryption
Standard).The DES is an encryption method endorsed by the federal
goverment for use in the public domain. This method is currently protected
from disclosure outside the U.S. and selected NATO countries and has been
classified as a "Material of War". The method was introduced as a secure
method of encryption for information with the possibilities of the correct
information being decoded in a one to a 72,000,000,000,000,000,000 chance.

These odds are not to be ignored and do prove to be most formidable to
unauthorized access with the exception of major goverments. The method was
adopted by the commerical sector and has been deployed over a number of
years in multiple sites, with little hesitation from the users. User
confidence was quite high with this method, but a question must be raised
about the release of such methods into the public domain.

Since this method is secured from decryption in a time value stance
according to goverment information, then why is such a method in the
hands of the public? Can it be possible that the method has accessible
trap doors imbedded to allow inspection of the encrypted information?
Would the federal goverment release a method so secure into the hands
of the general public so that not even they could read such information?
And why is the method not being re-certified by the goverment? Has
the usefulness of this technique reached a saturation point where the
time needed to decrypt the information, has become a matter of hours or
days instead of the reported years?

The weakness of the DES system has been shown by a number of
underground technicans working on the problem of encrypted satellite
television transmissions. In one recent 90 day period, both the Oak Orion
and the HBO scrambling systems have been cracked with skill. Chips for
the decryption of these signals are on the underground market and can
be produced as easily as most other commercially produced chips.




"Electronic Deception, Interception & Terrorism : The Radio Shack Reality!
------------------------------------------------------------------------
Continuing Development Activity

In addition, the increased skill of persons with directed intent who
are able to obtain knowledge for the invasion of networks and systems
allows for penetration of systems with ease. These individuals are
seeking ways to gain entry with little detection involved and may be
using the underground sources of information as roadmaps to targets.
These entries will be planned and used to the fullest possible extent
without the owners of systems being any wiser.

Computer and communications facilities are being attacked by a vast
group of computer literate persons seeking information and challenges
that are not available in a normal data processing environment. People
are seeking out connections to systems that answer and allow connection
to same. The general public is being fed a constant diet of computers
and communications. Society as a whole is undergoing a major re-education
process in information processing and storage. Technology that needed
space larger than any desk could contain is now available to sit on that
desk and has more power than its predecessor, performing the same
funcitions in half the time.

Individuals without computer skills are now able to use the technology
to work better and faster. Others are able to solve problems that could
not be solved 10 years ago due to the technology, and now most commerical
products have some form of directed artifical intellegence in place
and operational.

Information of a special or technical nature about electronics,
communications and computer safeguards, is traded like baseball cards on
the street. Persons have in-depth knowledge of hardware and software
security methods and discuss such topics in open public electronic forums
around the country. Information on software such as IBM's RACF, (R)esource
(A)ccess (C)ontrol (F)acility, Computer Associates "Top Secret", and DEC
Vax / VMS Security methods and the like are discussed as common topics in
underground circles. Meetings are held each and every Friday evening in
New York for the discussion of these topics and more. Conferences held
for science fiction readers contain large populations of these persons
and allow for information to flow to sources not normally exposed to such.

The possibility of information of a sensitive nature being in the hands
of individuals who should not have access to such, is a problem that stems
from the ability of persons to research information from a variety of
sources available to the public. First Amendment rights allow for the
discussion of information and technology and provide the needed
stimulation to continue research and provide for new developments.
Many areas offer small insights to overall changes in technology and
invite inspection of other areas.


"Electronic Deception, Interception & Terrorism : The Radio Shack Reality!
------------------------------------------------------------------------
Continuing Development Activity (con't)

Collection of information by electronic methods has become very
standard in today's society. Multiple devices can be placed in locations
never suspected as being active listening posts, and size is no longer
considered a problem due to the development of integrated circuits.
Some support devices can offer close unlimited range with proper set-up.
Others allow for the interception through standard off-the-shelf
technology and completely bypass any common physical security methods
used to enforce.

Low cost systems may be purchased and bastardized for the required
purpose. Small radio transmissions systems with ranges stated to be in
excess of one mile are very easy to obtain by calling or writing the
manufacturer. Others are discussed in the general print media and
complete volumes are available with plans, parts lists and construction
methods needed for operation.

All this information and equipment is in the hands of the general
population and if it is so available, then what is the way to protect
such information from interception and use? Is the trust of the user of
this information questioned? Is the information real or placed in the
media to dis-inform possible threats? What is the truth of the matter?
Facts presented in one media are contested in others.
Papers are presented and discussed with point and counter-point. All
offer a number of possible facts that allow for the gathering of small
but connected thoughts that provide the necessary details.

Techno-fables are widespread; goverment, industry and the general
public refuse to accept such stories due to lack of understanding.
Capabilities well beyond what most of us would think are in the hands
of common persons. Simple electronics offer a whole new world of
eavesdropping and collection abilities for under 200.00 dollars and
still we have persons who think such things are science fiction.

Imagine using a common household microwave oven for such actions.
Most would not see the use of such a device, but microwave ovens may be
purchased for under $59 dollars in most areas and with a bit of
component re-structuring, can produce frequencies well within commerical
transmission range as well as front-end equipment damage to such sites.
Belief in the "tap proof" security of fiber optics has been smashed.
Simple fiber technology is the way, and counter-devices may cost 100 to
1000 times more for the detection and protection of such circuits.





"Electronic Deception, Interception & Terrorism : The Radio Shack Reality!"
------------------------------------------------------------------------
Continuing Development Activity (con't)

Home-made satellite transmissions stations are being constructed by
HAMS and such for under $100 dollars, while current orbiting systems are
completely vunerable to outside interference and jamming. The classic
example is the Captain Midnight caper in early 1986. "Tempest" frequencies
readers or scanners may be built for under $150.00 dollars and plans for
such devices may be purchased for $19.95 through the mails. Cable location
service is just an 800 number call away, and still the industry does
nothing about the problem, cause or solution!

Summary

The use of common electronics and standard research in public domain
databases wil allow for the possibilities of simple terroristic activities
happening with regularity to major telecommunications and computer
centers. Already, computer centers in western nations have become the
target of terroristic organzations. Computer hackers are reported as
standard news today, and reports of special frauds and thefts continue
with predictable time periods between each case and the results always
being hidden from view to authorities due to the lack of understanding.
Some results of such frauds are presented in plain view at times, and
the investigators cannot "see the forest for the trees." The general
population does not see computer intrusions as a problem related to them.

Public knowledge of "computer crimes" comes from embellished stories
presented by the media. Crimes committed against the different telephone
carriers are responded to with a sense of wonder and awe from the general
populace. The resident problem stated comes to the simple premise of basic
"today" education. But if the education teaches the populace how to
interact with the systems, is it able to police the same with confidence?
Can the users be educated with the basic instruction for security as they
have been about other forms of security? Do they understand what is being
presented in the new age and are they willing to learn new methods for
insuring security for all users? Can the security be maintained for the
information as the information and its vessel grows?

Conclusion

The need for security in today's information age will require more
thought and understanding of a criminal nature to secure the assets.
A new form of asset transference is as available as the six shooter was
in the early days of the West. To close, the words of Thomas Jefferson
once again state the truth for this age, " If you remove a little bit of
freedom for the sake of security, then in time you will have neither.".

Ian A. Murphy

Copyright Ian A. Murphy , IAM / Secure Data Systems, Inc., 1987

 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Php
Withstanding an EMP
Good computer destroyer?
Wow, I never thought the navy would be so obvious.
Alternatives Internets to HTTP
Anti-Virus
a way to monitor someones AIM conversation
VERY simple question: browser history
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS