Return to CLS Main Page

Return to CLS Bibliography Page

AOL List


Date: Fri Jan 10, 1997 10:06 am CST

From: David J. Loundy

EMS: INTERNET / MCI ID: 376-5414

MBX: David@loundy.com

TO: * Nicholas Johnson / MCI ID: 103-5393

Subject: LACC: AOL: The Happy Hacker

>Date: Thu, 09 Jan 1997 01:32:39 -0800 (PST)

>From: David Cassel <destiny@crl.com>

>Subject: The AOL List: The Happy Hacker

>Sender: owner-aol-list@cloud9.net

>To: The AOL List <aol-list@cloud9.net>

>

> T h e H a p p y H a c k e r

>

>~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~

>

>In 1995 a hacker named Happy Hardcore wrote a program that granted

>unlimited free access to AOL. Yesterday AOL issued a press release

>applauding his conviction in a court in Virginia.

>(http://www.prnewswire.com/pdata/19970108-DCW022.html)

>

>According to press accounts, Nicholas Ryan -- who studies computer science

>at Yale university -- was found guilty of a felony offense under the

>Computer Fraud and Abuse Act: he illegally accessed AOL "and violated

>AOL's terms of service".

>

>But AOL's press release doesn't tell the whole story. The Washington Post

>reported that in fact, AOL dropped over 370,000 subscribers between March

>and June of 1996 "for credit card fraud, hacking, etc." [9/16/96] Up

>until September of 1995, AOL didn't even verify the authenticity of credit

>card information submitted for free-trial accounts. (And as of last year,

>they'd distributed over 100 million of them.) Monday AOL shut local phone

>access to the entire nation of Russia because it couldn't collect enough

>accurate information to cover their expenses.

>

>Ryan was targeted because he created a program used by other hackers--and

>because he publicly taunted AOL in the program's documentation. He

>included internal AOL e-mail (stolen by other hackers) discussing the

>company's plans to thwart his program. Ryan wasn't charged with creating

>the program, but for accessing the system illegally--a crime he shared

>with nearly half a million others.

>

>For six months of access, he faces a maximum of five years in prison and

>$250,000 in fines. Under AOL's new value plan, the stolen time would have

>a cash value of $60.

>

>AOL's public statements indicate they want to appear tough on hackers --

>especially now that they're seeking revenue from on-line transactions. A

>press release announcing the appointment of a vice president to AOL's

>optimistically-named "Integrity Assurance" division stressed her previous

>employment at the CIA--saying Tatiana Gau wants to "improve the world's

>most secure online environment". (The phrase "most secure" appeared

>three times.) Yesterday's announcement even asserted AOL had achieved "the

>first successful computer fraud prosecution involving an Internet online

>network." (One technology correspondent quipped, "Maybe it means that

>Kevin Mitnick is just a figment of Tsutomu Shimomoura's imagination.")

>AOL's announcement went so far as to claim that AOL is safer than the

>internet because AOL uses a private network.

>

>But safety still depends on how a network is administered. In 1995, a

>beta of AOL's telnet client put users directly behind their firewalls--and

>earlier that year, AOL's mail server was accessible via telnet, allowing

>forged mail from any AOL address. Hackers even took the stage during a

>1995 celebrity appearance on AOL--then taunted the scheduled guest and the

>event sponsors. (http://www.aolsucks.org/security/recondite.html). "I am

>sure Corporate Communications will be getting some questions about it,"

>read an internal e-mail titled "Hacker Attack In the Rotunda Last Night".

>Ironically, that message later ended up on the AOL Security Page--"What

>AOL Does Not Tell You." http://www.netvirtual.com/blank/aol)

>

>The next month AOL's CEO Steve Case wrote a letter to all users about

>hacker problems, arguing that "it happens everywhere", and adding that

>"when we discover hackers", AOL "aggressively take measures to head them

>off". But within days of that announcement, hackers were posting internal

>mail that they'd stolen to the internet. They continued undaunted, posting

>internal memos, and even Case's home address. In probably the most

>embarrassing development, in-house mail ABOUT the hackers was being

>circulated BY The hackers (ftp://ftp.crl.com/users/de/destiny/aol/hacker1)

>At the time, AOL spokeswoman Pam McGraw told me, "We've encountered these

>problems in the past, and we make changes to the service as appropriate--

>and as we can".

>

>The hackers had reverse-engineered AOL's "Rainman" software, which had

>been mistakenly stored in AOL file libraries accessible by their hundreds

>of remote staffers. The company fumbled for an explanation--Pam McGraw

>told the press AOL believed the heist was effected with the Visual Basic

>macro program AOHell. (Some later attributed her remarks to a deliberate

>disinformation campaign--especially when, to suppress the program's

>distribution, AOL later told Boardwatch magazine AOHell contained built-in

>child pornography. ftp://ftp.boardwatch.com/aohell.txt)

>

>But AOL's attempts to cover-up security breaches left their members even

>more vulnerable. "I went to a bunch of new member chat rooms, used AOHell

>to fish for passwords, and got 25 of them," one Usenet poster gloated.

>"Doesn't AOL tell its users to not do that?" There were worse abuses.

>When AOL realized hackers could "sniff" passwords during TCP/IP

>connections, staffers say they were warned--but not the customers. "I

>hope that AOL alerts the General Membership to this problem in a timely

>manner," one staffer complained, "and not, as in the previous situation,

>wait until they are forced to by negative news coverage." Sources had

>told the Wall Street Journal that the 1995 security breach included

>hackers distributing customer credit card numbers in AOL hacker chat

>rooms, and AOL had warned staffers about the breach--but didn't tell their

>users (until the story broke in nationwide news reports.)

>

>The staffers complained AOL's hush-hush policy was aimed more at

>protecting their image than protecting their customers. In a memo warning

>staffers not to speak to the press, Steve Case countered that "We need

>everyone's support...to protect AOL's interest". That even applied AOL's

>content providers. Shortly before hackers took the stage at his live

>event, the producer of AOL's MacWorld area asked AOL about earlier

>problems. He told me AOL had attributed them to "some security holes that

>AOL promised were closed."

>

>It was when hackers took the stage that he found they were not.

>

>Even AOL's latest statements are suspect. The press release claims that

>AOL "immediately upgraded its security measures to prevent AOL4FREE or any

>similar software from working". But Nicholas Ryan told a different story.

>"AOL found a way to detect users of AOL4Free," began the program's

>documentation. "However, with only a few lines of additional code

>AOL4Free is again undetectable!"

>

>Tatiana Gau's claims that AOL has a "zero tolerance" policy for hackers is

>patently implausible. Macromedia's software piracy suit fingered 67

>screen names in 1995. And over 70 came into play for the "Hacker Riot"

>that November--a coordinated attack on the New Member Lounges

>(http://www.getnet.com/~onion/work/planetmag/current/features/aolside.html)

>lasting several hours and affecting hundreds of users. This August AOL's

>Chief Financial Officer even pointed to the fake accounts as a possible

>culprit for the high figures on their subscriber churn rate. And just six

>weeks ago hackers doctored text at AOL keyword: legal.

>(http://www.news.com/News/Item/0,4,5712,00.html). Even yesterday,

>aolsucks.org received the comment, "AOL SUX!!!!! Thats why I make fake

>accounts with them!!!"

>

>Ironically, the documentation for AOL4Free ends with the classic hacker

>manifesto "The Conscience of a Hacker." The 1986 document ends, "I am a

>criminal. My crime is that of curiosity..."

>

>And most technology pundits agree. AOL's MacWorld area was mailbombed for

>a week and a half, with dozens of junk posts to its bulletin boards. "We

>hate that," their producer told me. "Does that mean the FBI needs to be

>brought in? Probably not." Chris Flores of Microsoft's Developer

>Division agreed. "If a Visual Basic program can automate hitting this key

>and hitting that key, the blame should be on AOL for allowing a certain

>keystroke to be hit... They should think of AOHell as a blessing. Since

>they know about it, they know that they have a fault in their system."

>MacWorld's producer added, "You've got to admire the hacker ethic in a

>certain way, because it's how things get done...how holes get patched."

>

>Indeed, as a result of the hacker presence, AOL began accompanying all

>e-mail and instant messages with a warning in red letters--that AOL staff

>will never ask you for your password. One Florida resident with a degree

>in criminology pointed out on Usenet that this alone wouldn't be

>sufficient--because password-fishers were incorporating the warnings into

>their scams! ("Enter your password to confirm that you understand the

>warning below." "Enter your password now to turn on pass-block, which

>offers protection beyond the simple password warning given below.")

>

>Now AOL's 3.0 software requires users to download small software changes

>before they can access the system. Unfortunately, there's no way to opt

>out--which creates a major security hole waiting to backfire.

>

>In any case, the hacker presence belies AOL's claims of the "highest level

>of security". In fact, Wired News reported that "Gau is confident, but

>she knows she has her work cut out for her. She's already spotted a link

>on the Web announcing her arrival. It was titled 'Hackers are laughing.'".

>

>

>It was my page.

>

>

>

>THE LAST LAUGH

>

>Within days of its creations, AOL threatened the AOL Security page with

>charges of copyright infringement.

>

>Unfortunately, the tactic inspired three other sites to mirror the

>documents--which are still there to this day.

>

>

> David Cassel

> More Information - http://www.wco.com/~destiny/time.htm

>

>

>~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~

> Please forward with subscription information and headers in-tact.

>

> To subscribe to this moderated list, send a message to MAJORDOMO@CLOUD9.NET

> containing the phrase SUBSCRIBE AOL-LIST in the message body. To unsubscribe

> send a message saying UNSUBSCRIBE AOL-LIST to MAJORDOMO@CLOUD9.NET

>~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~++~>

Return to CLS Main Page

Return to CLS Bibliography Page