####################################### # # # # # ======== =\ = ====== # # == = \ = = # # == = \ = ====== # # == = \ = = # # == = \= ====== # # # # # # # # ''''''''''''''''''''' # # # # # # > Written by Dr. Hugo P. Tolmes < # # # # # ####################################### Issue Number: 13 Release Date: November 19, 1987 TNS Issue #13 will try to help explain the events concerning an article about Capt. Zap in the Wall Street Journal. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ TITLE: It Takes a Hacker to Catch a Hacker As Well as a Thief FROM: The Wall Street Journal DATE: November 3, 1987 Ian Murphy Helps Companies Catch Computer Pirates; But Whose Side Is He On? By Dennis Kneale PHILADELPHIA- It is almost 2 a.m., and the room is dark but for the phosphorous glow of the computer screen that illuminates the cherubic face of Capt. Zap. He taps the keyboard in his lap and searches for "hackers" who break into computer systems for fun or malice. "We've got one," Capt. Zap says. he starts an on-screen dialogue with the hacker and asks for phone numbers to corporate data bases that might be fun to hack into. The hacker advises that the best place to look tonight is the "Holiday Inn," a secret electronic bulletin board that lists such numbers. The captain heads thataway. Capt. Zap, actually Ian A. Murphy, is well-known as one of the first convicted computer-hacker thieves. He has since reformed- he swears it - and has been resurrected as a consultant, working the other side of the bulletin boards and the right side of the law. His detractors doubt it. CRIME CREDENTIALS Other consultants, many of them graying military veterans, try to flush out illicit hackers. But few boast the distinction of a real hacker-and one with a felony among his credentials Capt. Zap is more comfortable at the screen than in a conversation. Asked to name his closest friend, he shakes his head and throws up his hands. He has none. "I don't like people," he says. "They're dreadful." "He's legendary to the hacking world and has access to what's going on. That's a very valuable commodity to us," says Robert P. Campbell of Advanced Information Management in Woodbridge, Va., Mr. Murphy's mentor, who has hired him for consulting jobs. The 30-year-old Mr. Murphy is well-connected to his nocturnal netherworld. Every night till 4 a.m., he walks a beat through some of the hundreds of electronic bulletin boards where hackers swap tales and techniques of computer break-ins. They trade passwords. They debate the fine points of stealing long-distance calls. They give tutorials: "Feds: How to Find and Eliminate Them." It is very busy these nights. On the Stonehenge bulletine board, "The Marauder" has put up a phone number for Citibank's checking and credit-card records, advising, "Give it a calphy finds a primer for rookie "hacklings," written by "The Knights of the Shadow." On yet another, he sifts out network codes for the Defense Department's research agency. He watches the boards for clients and warns when a system is under attack. For a fee of $800 a day and up, his firm, IAM/Secure Data Systems Inc., will test the securtiy of a data base by trying to break in, investigate how the security was breached, eavesdrop on anyone you want, and do anything else that strikes his fancy as a nerd vs. spy. He says his clients have included Monsanto Co., United Airlines, General Foods Corp. and Peat Marwick. Some probably don't know he worked for them. His felony rap- not to mention his caustic style - forces him to work often under a more established consultant. "Ian hasn't grown up yet, but he's a technically brilliant kid," says Lindsey L. Baird, an Army veteran whose firm, Info-Systems Safeguards in Morristown, N.J., has hired Capt. Zap. Mr. Murphy blames corporate "stupidity" and laziness for the hacker problem. He says companies aren't alarmed enough over the lapses, and he blares the blunt message on "Good Morning America," at industry seminars and in technical papers. His kinds of services are much in demand these days, even if his blunt criticisms aren't. Computer break-ins cost companies millions of dollars each year in corporate espionage, fraud and hassle. The accounting firm of Ernst & Whinney puts computer-fraud losses at more than $3 billion a year. Other experts say any figures are bogus because most thefts of data, software and such things as credit-card information aren't reported. Companies don't like admitting they were outfoxed by techies barely old enough to vote. Lots of hackers have been busy lately. Agents recently busted "Shadow Hawk," 17-year-old Herbert Zinn of Chicago. He hacked into American Telephone & Telegraph Co. systems and allegedly heisted software worth $1 million by "downloading" it to a home computer. RUINED RESEARCH This summer, hackers in West Germany tapped into the U.S. space agency's European network, peeking at files on booster rockets and shuttle contracts. One of them changed a variable in a scientist's equation from pi (3.14159265) to 7, ruining two months of research. Capt. Zap views this underword from a frighteningly cluttered apartment on the city's north side. Short and pudgy, he hovers at the screen surrounded by an electronic arsenal: closed-circuit video, printer, police radio, TV, eavesdropping gear, auto-dialer, shortwave radio, oscilloscopes and other gizmos. "He's in control, it's his little world," says his wife, Carole Adrienne, who uses her psychology training to analyze the hacker mind-set. The place is so messy she refuses to live there. When they were first separated, Mr. Murphy admits he spied on her. "I'm an extremely jealous man," he says, "and I have the technology to stop any man." Says she "You never know when the surveilance ends." Mr. Murphy's electronic voyeurism started early. At age 14, he woul back yard to tap into the phone-switch box and listen to neighbor's calls. (He still eavesdrops now and then.) He quit high school at age 17. By 19 he was impersonating a student and sneaking into the computing center at Temple University to play computer games. EASY TRANSITION From there it was an easy transition to Capt. Zap's role of breaking in and peeking at academic records, credit ratings, a Pentagon list of the sites of missiles aimed at U.S., and other verboten verblage. He left even his resume inside Bell of Pensylvania's computer, asking for a job. The elctronic tinkering got him into trouble in 1981. Federal agents swarmed around his parents' home in the wealthy suburb of Gladwyne, Pa. They seized a computer and left an arrest warrant. Capt. Zap was in a ring of eight hackers who ran up $212,000 in long-distance calls by using a "blue box" that mimics phone-company gear. They also ordered $200,000 in hardware by charging it to stolen credit-card numbers and using false mail drops and bogus purchase orders. Mr. Murphy was the leader because "I had the most contempt" for authority, he says. In 1982, he pleaded guilty to receiving stolen goods and ws sentenced to 1,000 hours of community service and 2 1/2 years of probation. "It wasn't illegal. It was electronically unethical," he says, unrepentant. "Do you know anyone who likes the phone company? Who would have a problem with ripping them off?" Mr. Murphy, who had installed commercial air conditioning in an earlier job, was unable to find work after his arrest and conviction. So the hacker became a hack. One day in his cab he picked up a Dun & Bradstreet Corp. manager while he was carrying a printout of hacker instructions for tapping into Dun's systems. Thus, he solicited his first consulting assignment: "I think you need to talk to me." He got the job. Now Mr. Murphy treads a thin line between the hackers he revers and the corporate clients he reviles. The line is so thin that critics doubt that his reformation is real. "Ian is a nice guy, I like him. I just don't trust his ethics. I think he's still on both sides of the law," says Carl Jackson, a security executive at Ford Motor Co. Some say Mr. Murphy is more loyal to hackers than clients. He claims to employ the nation's top 10 hackers to break into client computers. This gives executives the jitters. Once hackers find a way in, while getting paid to do it, what is to stop them from breaking in again later on? Mr. Murphy won't disclose who is behind a break-in and won't help catch the culprit. he even advises hackers how to detect bugging by the feds. "I am not a bouty hunter," he says. As a consultant, Mr. Murphy gets to do, legally, the shenanigans that got him into trouble in the first place. "When I was a kid, hacking was fun. Now I can make money at it and still have a lot of fun." He loves "tiger teaming" testing a client's security by breaking into his computer by any means necessary. In tiger teaming, Mr. Murphy has even crawled through garbage bins in searchiscarded passwords (To demonstrate this on a moonlit walk at 3 o'clock one morning, he rips open a dozen trash bags outside an office building and exposes reams of papers.) Wearing a yellow slicker labeled "Bell of Pennsylvania," he bluffed his way into an insurance office posing as a repairman. Once inside, he made a beeline for the computer room. The inspiration for such capers? Old reruns of "Mission: Impossible," he says. Some clients get queasy over his methods. Mr. Murphy had a row with Peat Marwick when one official balked at his criminal record and how he tiger-teamed the insurance office. Mr. Murphy says the accounting firm at first wouldn't pay him the $24,000 he was owed, but it relented. Gary G. Goehringer, a Peat Marwick manager, confirms he hired Mr. Murphy for two jobs and stresses he was under close supervision at all times. Now Ian Murphy looks to his next job. A Chicago company in a patent-infringment dispute suspects that a rival stole secrets by hacking into its computer system. Mr. Murphy may tiger-team the client's computer system to see whether getting is doable. Better yet, he may break into the rival's computers to see whether the client's data are stored inside. He must check the legalities, or lack of them, for what doing this. Capt. Zap can barely wait. $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$ NOTA: The notes on this article will be extrememly long. Capt. Zap claims that he is not a "bounty hunter" but there are a few things to consider: ====================================== "It Takes a Hacker to Catch a Hacker"- Does Capt. Zap catch hackers? "Ian Murphy Helps Companies Catch Computer Pirates"- Does he really catch computer pirates (hackers)? "He taps the keyboard in his lap and searches for 'hackers'"- Again, does he go searching for them? Like a bounty hunter? "He walks a beat through some of the hundreds of electronic bulletin boards where hackers swap tales and techniques"- Walks a beat? Like a cop? "working the other side of the bulletin boards and the right side of the law"- Is he on the "other side"? All of the quoted material comes from the article. The impression that Capt. Zap tracks them down actually seems to be false. He does NOT work like John Maxfield (Cable Pair) and the article states that he is not a "bounty hunter" or is involved in the busting of hackers. Capt. Zap tries to get this across in the article but the writer of the article should be blamed for any type of view that Capt. Zap works for the "other side." Capt. Zap does do security work (as do many other hackers) but don't think of him as a threat or some agent sent out to infiltrate bulletin boards. Most of his security work is in protecting systems. Interested persons who would like to employ his services should contact him (which shouldn't be too difficult since he is on many bulletin boards across the country.) Personally, I have said some unjust things about Capt. Zap and should apologize but the article does give a certain impressihacker tracker. ====================================== Capt. Zap "is well-known as one of the first convicted computer-hacker thieves"- Capt. Zap wasn't actually one of the first convicted computer-hacker thieves. His arrest did not involve computers. But he is well-known in the hacking world and has been around for a long time. ====================================== "On another board, Mr. Murphy finds a primer for rookie 'hacklings,' written by 'The Knights of the Shadow.'"- This refers to the series put out by the Knights of the Shadow a long time ago. There are actually 4 files (introduction and 3 instruction files.) The files mentioned detail hacking into: DEC-20's, VAX/UNIX, and Data General systems. ====================================== For a moment I'd just like to stray off the subject. Capt. Zap and Tuc know each other and are both well-known in the hack/phreak world. Not so long ago, Capt. Zap learned that Tuc was giving seminars on computer security and was working as a security consultant. Capt. Zap left the following messages on various bulletin boards concerning Tuc's actions. These posts are taken from many different bulletin boards: 87Sep19 From CAPT. ZAP Yes it seeems that because of one person, we will all have to pay for his actions. It is very strange that such things happen just when you thought it was safe to dial... Well the phone police have struck again! And while I am thinking about it, there seems to be a small leak possible here and I would like to bringit to the attention of the systems owners. As I have heard about this person and his ways to do things, we also have the distinct knowledge that the person is now going to release certain information to persons unauthori˙ed. I will relay this information by voice only to those who identify themselves beyond a shadow of a doubt. And to the person who I am speaking about, we know who you are and your days of asking questions and trying to be something that yo are not, are comming to a close very soon. And remember I have your number! For those who wish to find out what and who the person is and the background information may call 215-634-5749. \/ Capt. Zap \/ ** --------- ** Copyright @ 1987, I.A.M. , IAM /SDS Inc. 87Sep23 From CAPT. ZAP Well once again its time for news from real world.... First, we have the continuing story of the Shadow Hawk incident! He will be going away on a federal or state sponsered vacation, and then we have the civil damages that will come from his actions and the major lawsuits to be fielded by his parents. Now I do not know what sort of amounts will be leived, but you can bet that they will be heavy. As to the continuing story of federal agents and the like, we have the TUC story brought to by me. It turns out that our large friend is helping in a seminar produced by the Maryland chamber of commerence. His little thing will be called "How to break into your computer system". He has 45 minutes and his title is President of Telecom Corp. Now I wasession that he was working for his father and collecting Cabbage Patch dolls while reporting on his fellow phreaks to the like of Mr. Maxfield and Mr. Bowens from MCI security. Now since he is an informant and will be sharing his knowledge with others, I see this as an excellent reason to use the copyright law to stop any use of information that he may collect from being used by others or read by others without permission. I will say that I will be sending a letter to him and his sponser that will inform him and the sponser that any and all information that I have posted or provided, is for the use of AUTHORIZED persons or organizations and that any use without the expressed written permission ˙ill constitute a violation. I THINK THAT IT IS TIME TO PUT AN END TO TUCS COMPUTER RELATED LIFE! NO ACCESS SO WHAT SO EVER! \/ Capt. Zap \/ Copyright @ 1987, I.A.M. , IAM/SDS Inc. Numb: 33 Subj: More Important News! From: CAPT ZAP Date: THU SEP 24 7:08:14 PM Well I have learned that the one person who we all consider a fed will be speaking in Baltimore and his topic will be.... How to break into yor computer system, presented by none other than our friend TUC. He has gone over to the other side in a big way and is now considered to be fair game for all of us to stop! He claims to to be the president of TELECOM Corporation! I will be perfroming a search to see if such a company does live! But now is the time to spread the word and in a big way to stop him from gaining access to ANY SYSTEM throughout the nation. Now I am wondering if there is a way to put a damper on this project and put a stop to him once and for all! As you know we have a number of informants on here and that we have to stop any person or group (federal or phone police) from gaining access As you might notice from the previous messages posted by Capt. Zap, he is definitely angry that TUC is doing computer security work. Even thought he does almost the exact same thing. His messages tell of TUC giving a lecture on computer security and not busting people. His messages also suggest that TUC is working for John Maxfield (as an informer) and also for MCI. Both of the charges are unsubstantiated but Capt. Zap says that he is doing it anyway. Now that we've seen how angry Capt. Zap was, let's go back to the article (the one printed at the beginning of this issue: "He says companies aren't alarmed enough over the lapses, and he blares the blunt message on 'Good Morning America,' at industry seminars and in technical papers"- You'll notice how Capt. Zap gives even more speaking on hackers than TUC does. TUC, according to Capt. Zap, did a seminar in Baltimore (and probably other seminars at other places) but Capt. Zap did the same thing on "Good Morning, America." Capt. Zap became angry at TUC for working as a security consultant and claiming to be president of TELECOM Corporation, even though Capt. Zap is the president of his own corporation (IAM/Secure Data Systems Inc.) It might even be likely thatfraid that TUC was taking business away from him. Exactly why Capt. Zap said those things about TUC when he was doing the same thing is not known. Now we'll continue with a few more things from the article. ====================================== "On the Stonehenge bulletin board, 'The Marauder' has put up a phone number for Citibank's checking and credit-card records"- The Stonehenge bulletin board is most likely one of two boards. 1) The Central Office (also known as Stonehenge) or 2) Phonehenge (previously Stonehenge) ====================================== "Agents recently busted 'Shadow Hawk,' 17-year-old Herbert Zinn of Chicago."- For details on Shadow Hawk's bust, see TNS Issues #10 and #11. ====================================== "This summer, hackers in West Germany tapped into the U.S. space agency's European network"- For information on the West German hackers, see TNS Issue #9. ====================================== "He claims to employ the nation's top 10 hackers to break into client computers."- This is most likely just something that Capt. Zap said to get clients for his business. It is very unlikely that he employes the nation's top 10 hackers to break into systems. Very unlikely. ====================================== The events surrounding this article/Capt. Zap/ I.A.M./ and whether or not he is an informant will be written in TNS as more information is acquired. As I stated earlier, when I read the article it pissed me off extremely. When turning the page to continue the article, the top of the page had the following heading: "COMPUTER HACKER IAN MURPHY PROWLS A NIGHT BEAT TRACKING DOWN OTHER HACKERS WHO PIRATE DATA" The thought of this made me very angry but Capt. Zap has claimed that he is not a "bounty hunter." the article also has parts that show his loyalty to hackers. After reading this part (as well as the entire article), I was ready to kill Zap. Again, any impression that Capt. Zap turns in hackers is the impression given by the author of the article and doesn't seem to be the truth. For those who are reading this and are in need of the services of a computer security consultant, Capt. Zap's telephone number was printed in a post by him. Remember, don't think that Capt. Zap is an informer.. it appears that he is just as much of a loyal hacker as the rest of us (well almost). [OTHER WORLD BBS] Downloaded From P-80 International Information Systems 304-744-2253