From: nobody@replay.com (Name withheld on request)
To: cypherpunks@toad.com
Message Hash: 008ba5295533f4e1cb30bccb7b79240f3655560dbe4a9fc890468df093721796
Message ID: <199501050236.AA22300@xs1.xs4all.nl>
Reply To: N/A
UTC Datetime: 1995-01-05 02:35:29 UTC
Raw Date: Wed, 4 Jan 95 18:35:29 PST
From: nobody@replay.com (Name withheld on request)
Date: Wed, 4 Jan 95 18:35:29 PST
To: cypherpunks@toad.com
Subject: British Hacker Story
Message-ID: <199501050236.AA22300@xs1.xs4all.nl>
MIME-Version: 1.0
Content-Type: text/plain
From: newsbytes@clarinet.com (NB-LON)
Subject: London Newspaper Runs Old "Superhacker" Story
01/03/95
Date: 3 Jan 95 20:44:22 GMT
LONDON, ENGLAND, 1995 JAN 3 (NB) -- As the UK started back
to work today after the long Christmas and New Year
shutdown, readers of the Independent newspaper were treated
to the banner headline "British Boy Raided US Defense
Secrets."
The curious thing about the story was that none of the
other nationalpapers or news wires carried any reports. On
investigation, Newsbytes discovered why -- the story dates
back to July of last year, and briefly resurfaced in early
November on the US news wires.
According to the Independent, a 16-year-old British boy has
been arrested in connection with a alleged unauthorized
intrusions into the US government's computers and "was able
to watch secret communications between US agents in North
Korea during the crisis over nuclear inspections last
spring."
The story is quite correct, except that the boy in question
was arrested last July, when the original story broke.
Commenting on the story, Peter Sommer, a leading security
consultant and a senior with the Computer Research Center
at the London School of Economics, said that it smacked of
the British Telecom secrets case of late November,also
reported in the Independent.
That story, as reported by Newsbytes, turned out to be
something of a non-event when the hacker, who posted
details of top secret files on BT's ex-directory computer
"across the Internet," turned out to be Steve Fleming, a
Scottish freelance journalist who worked as a temp for BT
in the summer and broke BT's own security rules by
downloading files from the BT's Customer Service System
(CSS) computer, then mailed them -- across the Internet --
to other people.
"I'm amazed at the Independent running yet another story
involving the Internet," Sommer told Newsbytes, adding that
it is "a very old story. It seems that all they have to do
is to work up a story about a hacking attempt, whether
successful or not, and weave in a story about the Internet,
and it's a headline story."
Ken Young, newly installed editor of Communicate, a leading
industry communications magazine in London, and a veteran
of the UK communications industry for more than a decade,
told Newsbytes that the story seemed a little thin.
"It looks like another hacking story except that (the
newspaper) has written in something about the Internet, and
bingo! You've got a report that the information was
accessible to 32 million users on the Internet," he said.
Sommer, meanwhile, told Newsbytes that he had made his own
discreet inquiries about the story with high level
authorities when it broke last summer.
"There are two problems with this case. Firstly, any lawyer
worth his salt would invoke Section 69 of the Police &
Criminal Evidence Act," he said. This Act, Sommer
explained, requires that, before a computer can be
considered as admissible evidence in court, the owner of
the computer must issue a certificate of correct working.
This, he said, could not be issued, as a casual user of a
PC would be unable to make such a certification.
Sommer went on to explain that the second reason that the
case could be problematic for the prosecution was "that the
lawyer would ask the court for full disclosure of all
affected files on victim's host computers," which, since
such files are almost certain to be classified in the US,
could not be revealed in a British courtroom.
The facts surrounding the case, as reported by Newsbytes,
were that the 16-year-old -- operating under the code name
of Data Stream -- was one of several who gained
unauthorized access to the US defense computer network in
late 1993 and early 1994 and that some files were deleted.
At the time, press reports said that as many as a million
passwords were compromised, and may have compromised the
military readiness of the United States. The case has,
Newsbytes understands, been fully investigated by the US
Air Force Office of Special Investigations (OSI) although
details of the report of the investigation by the USAF OSI
are classified.
Originally, the press reports of the time speculated
whether the youth would be the first under-18 to be
extradited to the US to face charges. It seems that,
following last summer's arrest and submission of the report
to the Crown Prosecution Service that the case is being
quietly shuffled into a file because of the practical
problems in pursuing a prosecution.
Return to January 1995
Return to “nobody@replay.com (Name withheld on request)”
1995-01-05 (Wed, 4 Jan 95 18:35:29 PST) - British Hacker Story - nobody@replay.com (Name withheld on request)