⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 neidor~1.txt

📁 黑客培训教程
💻 TXT
📖 第 1 页 / 共 3 页
字号:
are the approximate dates that the violations or the activitiesoccured that are alleged in the indictment.          Specifically, in the second, the second count of theindictment alleges that on July 22, 1988 as part of the wire fraudscheme, Mr. Neidorf generated an issue of PHRACK World News in which- 9 -Cook -- opening statementhe announced the instigation of the Phoenix Project, the PhoenixProject because it had been a year since the 1987, in their parlance,collapse of the computer world by virtue of a series of lawenforcement raids. Mr. Neidorf announced here that he wanted the hackercommunity to come together again to be more effective than ever.          The next activity is the third count of the indictment,September 19, 1988, a wire fraud allegation again, E-mail,electronic mail, generated from Mr. Neidorf to Mr. Riggs andMr. Scott O, a computer hacker.          This electronic mail, this electronic mail here also,these are efforts by Mr. Neidorf reaching out to consolidate,identify and pull together a group of hackers that he could beworking with for the publication of PHRACK, people that would supplyhim with information and articles, and, as it turned out, people thatin fact, supplied him with stolen information, stolen from computers.          These allegations refer more directly to the interstatetransportation and movement and file transfers of the E911 text file.          Count Seven refers to the publication of a series ofcomputer articles that deal with how to break into a UNIX operatingsystem.          Counts Eight and Nine refer to the text file being sent fromNeidorf back to Riggs, from Neidorf in Missouri to Riggs who wasphysically in Atlanta, but who used the bulletin board, computerbulletin board, in Lockport, Illinois, sending it back for review andto make sure that Neidorf had done an adequate job of concealing the- 10 -Cook -- opening statementnature of the file fro the point of view not the contents so muchof the file, but concealing where Riggs had stolen it from to protectRiggs, and, to a large degree, to protect himself so that it couldn'tbe identified exactly where the document had been stolen from.          Finally, we have the publication of the E911 text file inthe PHRACK newsletter by Mr. Neidorf.          you will be seeing the indictment in the jury room as youdeliberate. This is just an overview to give you an overfocus ofwhere the allegations are going to fall and the types of informationthat you are going to be hearing about.          Now, if I were you, if I were you, I would be sittingthere, as some of you may be, thinking to myself, "What have I gottenmyself in for? He's talking about computers. He's talking aboutoperating systems. Whooooaaaa!"          First of all, you don't need to be a computer user, or acomputer ace, to understand what this case is going to be about. Itreally deals with, in its most essential form, stealing property andtransferring property, the interstate transportation of stolenproperty. So it's a simple stealing and a simple fraudulenttaking, taking by deception. But it just involves some relativelyhigh-tech tools. Don't let the tools confuse you from the fact of thetaking and the bottom-line information. I'm telling you to relaxabout the computer jargon.          There are several concepts that we're going to be talkingabout here. What I'm going to give you is a kind of a lawyer's- 11 -Cook -- opening statementdescription. That is supposed to let you know that it is far froman expert's opinion on some of the things you're going to be hearing.          (Blackboard) Well, let's talk about some of the technologythat's involved, and see if we can't make ourselves more comfortablewith it.          I referred to the UNIX operating system. UNIX...U-N-I-X.What is that? Well, computers speak a language. Computers speakthe language that the people that built the computer want them tospeak, or they speak the language that the people that run thecomputer want it to speak. Sometimes computers can be set up so thatyou can have them speak several different languages. UNIX is just alanguage. It is just the language that the computer speaks. Ittalks UNIX. Some of you talk about MS/DOS. It's a microsoft diskoperating system. Forget it! It's just the language that thecomputer speaks.          (Blackboard) Now, this is a theft of information. You aregong to be coming in contact with the concept that when you takeinformation from a computer, what you really do is you order thecomputer to make a duplicate original o what its memory is or whatit contains with respect to that particular item. And when you areasking the computer to send that information to you, you are doing afile transfer. I'll get to that later. You are just telling thecomputer to send it to you. What the computer sends to you is acopy. It's an exact copy in every respect of the originalinformation on the computer.- 12 -Cook -- opening statement          So the value of the property comes from the fact that itcontains information. There is an expression that, "Information ispower". It is only power if it's communicated. That's where thevalue of information comes from in our society.          Certain types of information are protected by companies.They are reasonably protected by companies, especially when theybecome sensitive. The E911 road map and the information about whereall the stops along the way are, that was a sensitive piece ofinformation. You're going to be hearing about the protections thatBellSouth put on that information, and the efforts that they made tosafeguard it. So when the information is stolen, what is stolen is acopy of the information. You will be receiving further instructions>from the judge on all that. So it is the information that is beingstolen.          (Blackboard) Now, the next concept--I talked aboutprotection--file transfers. File transfers. Here's a riddle for you:                  "Why is a file transfer the same as a high                  school graduation?"Here's the answer. When you hear about this, think about a highschool graduation. They call your name from the audience. You comeup to the stirs, probably by the path that the nun ordered you totake to get to the stage, and you had better not vary from the path.You follow that route up to the stage, across the stage, and a filetransfer takes place at center stage in the auditorium. You reachout, you shake hands with the principal, and with the other hand,after you have shaken hands with the principal, you receive your- 13 -Cook -- opening statementdiploma, or you receive your information, you receive your file.That's really all a file transfer is on a computer. You come up,you are ordered, someone in a remote location, the principal in thiscase, calls your name, you come up to the stage, you are thecomputer on one side and he is the computer on the other side. Youshake hands. And in the computer world, all that means is that youare able to communicate. It's actually called that. It is called a"handshake relationship" with another computer. There are some otherwords, like "protocol" and things like that, but, really, it is justa handshake relationship with another computer.          After the handshake is there and the principal recognizesyou to be the problem kid that he's glad to get rid of--he didn'tlike you--then he gives you the file. That's the file transfer. Itis no different transferring information from one computer toanother.          (Blackboard)  Computer network. Well, that is probably apretty easy concept to get hold of these days. It is really not muchdifferent than with your televisions, especially if you have cabletelevision where you have some designated programming and it comes into your machine, your television in this case. Of course, thedifference is with cable television as opposed to a computer, withthe computer you are able to have more of an interchange with the TVand what is going on with the program. So don't be concerned aboutthe network idea. Keep in mind the idea of a cable coming into yourcomputer as part of a centralized system. That is really all the- 14 -Cook -- opening statementnetwork is, a series of computers joined together.          In the case of BellSouth, you are going to see that that isa very expensive computer network. In order to provide service totheir customers, they hang a lot of computers on that network,computers that do different things, computers that keep track ofwhere the people that are using the phones are at, computers thatkeep track of what telephone number goes with what address, computersthat keep track of the switches, the computer switches. Now,that's another concept I'll talk about for a second.          (Chart) When people think of computer switches, theyare telephone switches. The concept of a lady at the switchboardalways comes to mind with a knob here that goes to a hole up here,connecting one person to another person. Today, all of that is doneby high-speed computers, high-speed switches. They are electrical.Because they are electrical, they are referred to as ESS. All thismeans is an electronic switch. This is a computer. This computerhas the memory of how to get the numbers that are diales to thephone that corresponds with those numbers. These computers also havethe information about how to get your call all the way across thecountry, which route are we going to take to get there, whichroad are we going to take.          The Enhanced 911 system was built on these computers.Part of the reason was because of the high speed that is involved.You can get the emergency call through faster if it goes like thing.          Now, the switches at various areas: Switch 1, Switch 2.- 15 -Cook -- opening statementThis is the first switch we produced, Switch 1. And the secondswitch we produced, Switch 2. The fifth switch, Switch 5.          When they increased the capabilities of those switches, theway they kept track of which switch they were talking about was tolabel the switches: 1 or 1A, 2, 3, 4, 5, a fairly easy way to keeptrack of the switch development. But the idea is that all electronicswitches operate essentially the same. So if you have the key toget into this (indicating), you have the keys to get into them all.          The evidence will show that the hackers in the BellSouthRegion had the keys to get into them for a period of time.          Now, another question, a riddle:               "Why is computer security like a hotel?"Mr. Garcia is going to be explaining that to you. Actually, it's alot like staying in a private hotel.          In the case of the computers at BellSouth, the computersthat drive the E911 system and support the phone company systemaren't known to the public. They are unpublished numbers. Theyhave their own network. The network, to be sure, has interlinkswith the private sector and can be reached by field people in thetelephone company, but it is really a closed system. It is designedto be for protection.         So the hotel, the computer, is not known to the outsideworld. Where the door is is not known to the outside world. Whenyou walk into the hotel, it's like if you try to walk into a hotelin downtown Chicago. If you go to the desk and ask them, you know,- 16 -Cook -- opening statement               "I want to have Joe Jones' room".Well, first of all you say:              "I want to see Mr. Jones."                   "Well, we can't tell you if he's here."               "Well, if you tell me he's here, I want               to talk to him. I want to speak to him.               Give me his room number.                   "Well, we're not going to give you                   his room number. You are going to                   have to call him on the house phone                   and he'll have to verify that you're                   somebody he knows."So there are a series of checks that are set up inside the system.But once you get inside the hotel, you can make contact with Jones.And you will see, just as in real life, you have a number of peopleat one hotel. You will have people going back and forth in thehotel. And the person that runs the hotel assumes that they're allthere for good valid reasons. He's not going to do anything butjust a cursory check to make sure that everything is still in order.          It is really the same thing and the same principle isinvolved if you are the system administrator on one of thesecomputers. You are in the position, in the shoes, of the hoteloperator, the guy that runs the hotel or the lady that runs thehotel. You make sure that the right people show the rightcredentials to get in and you exercise and upfront control. You alsoexercise control over some of the common spaces. You make sure thehalls are lit. You make sure that things aren't being badlydestroyed to the best of your knowledge, although you don't know always- 17 -Cook -- opening statementwhat's going on inside each of the rooms. It's very much the same.So when you hear a person talk about running a system or computersystem security, think to the analogy of being a hotel operator.We have a man, Mr. Garcia, from BellSouth, who will be testifyingto that and to that analogy, and I think you'll find it mostinteresting.          (Blackboard) Text file. You will hear a lot about that.That is probably a new term for you when you walked in: text file.Just think of it as a book or a pamphlet stored on a computer.That's it. That's the end of the mystery. A book or a pamphletstored on a computer. But because it is stored on a computer, itcan be copied if you can get into the computer. That's whathappened here.          (Blackboard) BBS. It means bulletin board system.Sometimes it will have a "C" in front of it. All that means iscomputer bulletin board system.          Now, here's my analogy to that. The computer bulletinboard system is a lot like a private high school where you have tohave permission to get in the front door. And the people that runthe high school have to give you permission to get into theirprivate location. But once you get into their private high schooland as you walk through, one of the first things that meets you asyou walk into the private high school is a bulletin board withmessages posted on it. And what you will also see along the sides ofit are going to be lockers, student lockers.- 18 -Cook -- opening statement          The principal bulletin board that you are going to behearing about during the course of this case is the Jolnet bulletinboard in Lockport, Illinois. The Jolnet bulletin board in Lockport,Illinois, acted as a central clearing house for the information that

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -