[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: Phrack Profile of Chris Goggans ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ] [ 71 ]
Current issue : #35 | Release date : 1991-11-17 | Editor : Dispater
Introduction to Phrack 34Dispater & Crimson Death
Phrack LoopbackPhrack Staff
Phrack Profile of Chris GoggansS. Leonard Spitz
Telenet/Sprintnet's PC Pursuit Outdial DirectoryAmadeus
Sting OperationsSovereign Immunity
Social Security Numbers & PrivacyChris Hibbert
Users Guide to VAX/VMS Part 1 of 3Black Kat
A Beginners Guide to Novell Netware 386The Butler
Auto-Answer ItTwisted Pair
PWN/Part 1Dispater
PWN/Part 2Dispater
PWN/Part 3Dispater
PWN/Part 4Dispater
Title : Phrack Profile of Chris Goggans
Author : S. Leonard Spitz
                                ==Phrack Inc.==

                Volume Three, Issue Thirty-five, File 3 of 13

                 -*[  P H R A C K  XXXV  P R O P H I L E  ]*-

                             -=>[  Presents  ]<=-      

                        Sincerely Yours, Chris Goggans
                        -===--===--===--===--===--===-
                             by S. Leonard Spitz
                             Associate Publisher
                          INFOSecurity Product News

"A provocative interview with a former member of the "Legion of Doom" suggests
that the ethics of hacking (or cracking) are often in the eye of the beholder."

Malicious hackers, even though most operate undercover, are often notorious for
the colorful pseudonyms they travel under.  Reformed hackers, however, prefer a
low profile so as to shed their image of perceived criminality.  Kevin Mitnick,
infamous for the DEC caper, is one of the foremost advocates of this strategy.

Now comes Chris Goggans, trailing his former "Legion of Doom" moniker, Erik
Bloodaxe, behind him, to try it his way.  Goggans insists that where once he
may have bent the rules, he is now ready to give something back to society.
And coming across with a high degree of sincerity, he affirms his intention to
try.  Are he and his colleagues, wearing their newly acquired information
security consultants hats, tilting at windmills, or does their embryonic,
cracker-breaking start-up, Comsec Data Security Co., stand a fighting chance?
We thought we would ask him.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

ISPNews: I am going to ask several legitimate questions.  Please answer them
          completely, truthfully, and honestly.

Chris Goggans:  OK.


JUDGEMENT BY THE MEDIA

ISPNews: Would you react to Computerworld's July 29 piece, "Group Dupes
          Security Experts," <also seen in Phrack World News issue 33, part 2
          as part of the article called "Legion of Doom Goes Corporate> in
          which members of your organization were accused of masquerading as
          potential customers to obtain information, proposals, and prices from
          other security consultants?

     CG: We were all amazed that something like that would ever be printed
          because, as we understand common business practices, we weren't doing
          anything unusual.

ISPNews:  Computerworld reported that the Legion of Doom was "one of the
          nation's most notorious hacker groups, according to federal law
          enforcers."  Can you respond to that?

     CG: Notorious is a relative term.  There has always been a shroud of
          mystery covering the Legion of Doom, because it was an organization
          whose membership was private.  When you keep people in the dark about
          the activities of something, there is always going to be the
          perception that more is going on than there really is.

ISPNews: Would you say then that the characterization of being notorious is
          unfair?

     CG: To some degree, yes.  There certainly was activity going on within
          the group that could be considered illegal.  But most of this was
          taking place when members of the group were all between the ages
          of 14 and 17.  While I don't want to blame immaturity, that's
          certainly a factor to be considered.

          The Legion of Doom put out four <issues of an> on-line electronic
          newsletter <called the Legion of Doom Technical Journals> composed
          of different files relating to various types of computer systems
          or netware.  They explained different operating systems or
          outlined different procedures used by networks.  They were always
          informative and explained how to use a computer.  We never said
          "This is a computer and this is how to break into it."

          Colorful names and words used to describe groups also add to
          notoriety.  If we had been the "Legion of Flower Pickers," the
          "Legion of Good Guys," or the "SuperFriends," there probably
          wouldn't be this dark cloud hanging over the group.

ISPNews:  Could you be charged with intent to provide information to others
          which would make it easier to gain unauthorized access?

     CG: I don't see how that could be a charge.  There's the first amendment.
          I maintain that talking about something and encouraging or forcing
          someone to do it are completely different.


EARNING AN "A" IN INFOSECURITY

ISPNews:  What attracted you to computer security?

     CG: The same thing that would attract anybody to being a hacker.  For
          half of my life I've been in front of a computer every day.
          Sometimes from early in the morning until the wee hours of the night.
          And my particular focus has been on computer security.

ISPNews:  At least the dark side of that coin.

     CG:  I wouldn't say the dark side.  I'd say the flip side.  If you do
          something for 11 years, you are going to pick up a lot of knowledge.
          And I've always wanted to find some kind of productive career that I
          thoroughly enjoyed.  So this was just an obvious progression.  No one
          wants to be a 40-year-old hacker living in fear of the Secret
          Service.

ISPNews: When you first applied to enter college, did you feel that it was the
          right place to learn about information security?

     CG: Yes, I thought it was the right place, mainly because college is the
          most obvious choice to pursue an education in any field.  I just
          assumed that I would be able to find formal training leading to
          certification or a degree in this field.  Yet, at the University of
          Texas, there wasn't anything along those lines.

ISPNews:  Did you graduate from the University of Texas?

     CG: No, I changed majors and then moved to Houston.  I had started out in
          computer science but it was completely unrelated to any kind of
          career I wanted to pursue.  I eventually changed my major to
          journalism.  There are only two things I like to do:  Work on
          computers, and write.  So, if I wasn't going to get a degree in one,
          it was going to be in the other.  I'm a semester away, and I do plan
          on finishing.

ISPNews:  If you were to structure a college curriculum for studies in
          information security, would you design it to focus on technical
          issues, ethics, business issues, or legal matters?

     CG: I would try to focus on all of these.  If you don't have a technical
          background, you can't understand the way the operating system works,
          and you really can't focus on some of the issues that need to be
          addressed with information security.

          Ethics certainly come into play ass well for obvious reasons.  I
          don't think hackers are going to go away.  Even with the advent of
          newer technology, there are always going to be people who have an
          interest in that technology and will learn how to manipulate it.


ETHICS, INTELLECTUAL PROPERTY RIGHTS, AND THE LAW

ISPNews:  What is your definition of a hacker?

     CG: A Hacker is someone who wants to find out everything that there is to
          know about the workings of a particular computer system, and will
          exhaust every means within his ability to do so.

ISPNews:  Would you also comment on the ethics of hacking?

     CG: There is an unwritten code of ethics that most people tend to adhere
          to.  It holds that: no one would ever cause damage to anything; and
          no one would use any information found for personal gain of any kind.

          For the most part, the only personal gain that I have ever seen from
          any sort of hacking activity is the moderate fame from letting others
          know about a particular deed.  And even in these cases, the total
          audience has been limited to just a few hundred.

ISPNews:  Are you unaware of hackers who have in fact accessed information,
          then sold it or massaged it for money?

     CG: No, certainly not.  I am just acknowledging and defining a code of
          ethics.  We of the Legion of Doom tried to adhere to that code of
          ethics.  For example, members of the original nine who acted
          unethically were removed from the group.

ISPNews:  Do you believe that penetrating a computer system without either
          making changes or removing information is ethical, or a least is not
          unethical?

     CG:  At one time in the past I may have held that belief, but now I
          certainly must not, because the whole idea of being involved in the
          formation of my new company, Comsec Data Security, would show
          otherwise.

ISPNews:  So today, you believe that unauthorized entry is unethical.

     CG:  Exactly.  As a hacker, I didn't particularly hold that.  But as
          things such as invasion of privacy, even though I never caused any
          damage, and breach of trust became more apparent to me, I was able to
          step back, see the picture, and realize it was wrong.

ISPNews:  Can I conclude that you are speaking for you company and its
          principals?

     CG:  Yes, I am speaking for all of the principals.

ISPNews:  What are your views on the ownership of information?

     CG:  I feel that proprietary information, national-security-related
          information, information that could be considered a trade secret, all
          definitely have ownership, and access should be restricted.

          In the past, I felt that information that affected me or had some
          relevance to my life should be available to me.  I felt that
          information should be available to the people it affected, whether
          that be phone company information, credit bureau information, banking
          information, or computer system information in general.  I am saying
          this in the past tense.

          In the present tense, I feel that the public is entitled only to
          information in the public domain.  Information not available legally
          through normal channels is just going to have to be left at that.

ISPNews:  Do you believe that software should always be in the public
domain.?

     CG: No, I do not.  If I wrote something as wonderful as Lotus, or any of
          the Microsoft programs, or Windows, I would want people to pay for
          them.

ISPNews:  Then you do believe in private ownership of and protection for
          software?

     CG:  Yes, definitely.

ISPNews:  What are you views on current U.S.  Computer crime laws?

     CG:  I think that the current laws are too broad.  They do not make
          distinctions between various types of computer crimes.  I consider
          breaking into a computer akin to trespassing.  If someone simply
          walks across my lawn, I might be upset because they trampled my
          grass, but I would leave it at that.  If someone drives across my
          lawn and leaves big trenches, and then comes over and kicks down my
          rosebush, well that's another thing.  Then, if someone drives up my
          steps, goes through my house, through my kitchen, steals all my
          silverware, and then leaves, that's something completely different.
          And while these physical representations of trespassing can't be
          applied directly to an electronic format, distinctions are still
          necessary.

ISPNews: And the present computer crime laws do not make these distinctions?

     CG: I am no lawyer, but from my understanding they do not.  They need to
          be brought into focus.

ISPNews: If they were brought into the kind of focus you suggest, would they
          be fair and equitable?

     CG: Definitely, depending on the punishment that went along with them.  I
          don't think that people who own and operate computer systems would
          view someone who has logged into their system using a guest account
          that was deliberately left with no password to be as serious an
          intrusion as someone who got the system administrator password and
          then went through and deleted all the files.  I don't think that
          simple intrusion would be considered as serious as unauthorized
          penetration along with the wholesale theft and sale to a competitor
          of marketing information, and advertising plans, and financial
          projections for the next quarter.

ISPNews:  What are your views on security training for users?

     CG: People need to be taught what the computer operating system is and
          how it works.  After that, they need to establish some sort of
          channel by which information can be transmitted to others. Direct
          physical contact between communicating parties, covered by official,
          standard company procedures, is the best way to do this.

          People need to be aware that their account, no matter the level of
          importance, is a link in a chain that makes up the security of the
          system.  Information from one account can be used as a springboard to
          other, more powerful accounts.  All users within a network must
          understand that their information is just as important in the
          security chain as is that of the next person.

ISPNews: Given where you are coming from, why should a potential client trust
          you?

     CG: I know that is a natural question.  Just the very nature of creating
          a company should project an image that we are trying to come out of
          the shadows, out of the underground.  We are saying, "Look everybody,
          we've been doing this for a long time, now we want to help.  We have
          11 years of working information about how people compromise existing
          security, and we can help with your particular situation."

ISPNews: I am sure that you understand the natural suspicion that people have.

     CG:  No, that's what I don't understand.  If we at Comsec were out to
          compromise information from an existing company's computer network,
          we wouldn't have incorporated.  We could have done that, and someone
          else out there probably has already done so.  Then the information
          would be available to from one hacker to another.

ISPNews: Are you suggesting there is no system out there that you can't break
          into?

     CG: No, I'm not suggesting that.  But I am saying the vast majority can
          be penetrated.

ISPNews:  Which system is easiest to crack; and which is most difficult?

     CG:  It is hard to say which system is more inherently penetrable than
          another.  From the initial log-in, it's not the operating system;
          rather it's the system's operating environment that is the problem.
          Users may not have addressed security measures.  Certain types of
          security holes may not have been closed.  That's where a technical
          background comes into play: to understand the way the applications
          work; how different systems are accessed; to close holes in the
          system which have become apparent.  You have to deal with human
          factors and technical issues.  You must understand the way the
          computer works and the way programs are run.

ISPNews:  What is the best way to foil hackers?

     CG: It depends on the hacker.  There are different types.  Some people
          hack with modems.  The casual hacker may just stumble across your
          particular computer system, and may be foiled with something as
          simple as good external security.  He may be turned off by physical
          security devices such as a call-back modem, some sort of code access,
          or smart card.

          These measures will not stop a serious hacker who is after your
          company specifically.  In this case, you have to beef up security,
          and take additional steps to ensure the safety of your computer.  And
          you must make certain that security on the inside is as tight as on
          the outside.

ISPN Editor's Note:  Chris Goggans will respond, in every other issue of
                     ISPNews, to your questions on hacking computer systems.
                     His answers promise to be problem-solving, interesting,
                     and even entertaining.  We invite you to write Chris c/o:

                     "Hackers' Mailbag"
                     ISPNews
                     498 Concord Street
                     Framingham, MA  01701-2357
_______________________________________________________________________________
[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2024, Phrack Magazine.