You are on page 1of 5

This article appeared in the August 22,1990 Wall Street Journal

Open Sesame
--------------
In the Arcane Culture Of Computer Hackers, Few Doors Stay Closed
--------------
Frank Darden Easily Broke Into BellSouth's Network
Trading Tips With Others
--------------
Entering the Legion of Doom
--------------
By John R. Wilke, staff reporter of The Wall Street Journal

ATLANTA- Frank Darden got his first computer at the age of 16, a
Christmas present from his parents. Sitting on a desk in his bedroom,
it opened a window on a world he found so consuming that he quit high
school and spent most days and nights at the keyboard.

His parents often wondered what their son found so compelling in the
endless hours he spent alone in his room. Then one afternoon last
summer, a dozen Secret Service agents burst into the family's suburban
home. Agents held Edward and Lou Darden at gunpoint as they swarmed
into their son's room, seizing scores of disks mloads of files and
three computers.

When Frank got home an hour later, the terrified young man confessed
that he had used his home computer to break into BellSouth Corp.'s
telephone network. In February, Mr. Darden and two others were
indicted on felony charges of conspiracy and wire fraud.

"I guess now my parents know what I was doing in my room." says a
remorseful Mr. Darden, a bright, impatient 24-year-old with
shoulder-length hair and a tie-dyed T-shirt.

Just Passing Through

Mr. Darden thus became another of the growing number of "hackers"


nabbed by federal agents. For a long time, these high-tech trespassers
operated in relative obscurity, using their computers and phone lines
to go where few people were meant to go. But lately, in a string of
highly publicized cases, hacking has moved towards the forefront of
white-collar crime. Increasingly, banks, businesses, credit bureaus and
telephone companies are discovering that someone, often in the dead of
night, has wandered into their computer systems- and left his mark.

As Mr. Darden's experience reveals, hacking has developed its own


subculture, rich with literature and legend and peopled by electronic
vandals, voyeurs and explorers known by fanciful code names. "Any
business that has a computer hooked to a phone is vulnerable," warns
Mr. Darden, who calls himself the "The Leftist." Before the bust, he
was one of the best.

Starting Early

An early target in the crackdown was the Legion of Doom, an elite


clique of hackers that included Mr. Darden and was targeted by the
Secret Service because of its members' notable skills. "The Legion of
Doom had the power to jeopardize the entire phonetwork," says Kent B.
Alexander, an assistant U.S. attorney prosecuting Mr. Darden's case in
Atlanta.

In a Secret Service affidavit filed in U.S. District Court in Atlanta,


BellSouth investigators call the Legion of Doom "a severe threat to
U.S. financial and telecommunications industries." Federal agents
suspect the Legion was responsible for software " time bombs" -
destructive programs designed to shut down major switching hubs-planted
in telephone company computers in Denver, Atlanta and New Jersy last
year. The programs were defused before causing damage, investigators
say, but the intrusions, which weren't disclosed by the phone
companies, could have knocked out service to hundreds of thousands of
customer phone lines.

The government sweep so far has bagged a motley band, mostly loners and
young rebels in their teens or early twenties. In past cases, many of
the hackers who have admitted breaking into computers have insisted
that they didn't damage the systems they penetrated. They did it for
sport.

"There's no thrill quite the same as getting into your first system,"
says Phrack, an electronic magazine run out of a University of Missouri
dorm and accessed by computer. Before it was shutdown in the latest
sweep, Phrack (for phone-freak hacking) published tips on cracking
computer security. One issue offers a "hacker's code of ethics," which
advises, "Do not intentionally damage any system" or alter files "other
than the ones you need to ensure your escape." Another rule: "Don't be
afraid to be paranoid. Remember, you are braking the law." Mr. Darden
says he strictly adhered to the code.

But the hackers' creed means nothing in court. There, hacking is


treated much like any other form of criminal trespass under a law
Congress passed in 1988. The law persuaded many hackers to end their
illicit forays. But it turned other hobbyists into criminals.

During his hacker days, Mr. Darden's world was an oddly solitary one.
For hours on end he sat in front of the computer screen, finding his
only human contact in the words and arcane code that arrived via
computer from other hackers. "Once he got into ubject, there was no
stopping," recalls his mother. "he was always studying up on
something. He read encyclopedias as a pastime."

Geography was meaningless; friends from around the world were just a
few keystrokes away, thanks to modems that connect computers through
the phone lines. Mr. Darden says he has struck up many lasting
friendships on-line with people he has never met in person.

In this silent, cerebral world, age is also irrelevant. Only computer


skills count. Once on-line, a hacker can be anyone he or she wants to
be. "No one knows if you're fat, pimply, or scared to talk to girls,"
says Sheldon Zenner, a Chicago attorney w recently defended an editor
of Phrack on felony wire-fraud charges. "Suddenly you're no longer
just the shy adolescent, but Knight Lightning or The Prophet."

Tough Choice

"It's a compulsion for some of these people," adds Mr. Alexander, the
Atlanta prosecutor. "I'm convinced that if Lotus 1-2-3 was behind Door
No. 1, and Cheryl Tiegs was standing behind Door No. 2, a hacker would
go for the software.

Mr. Darden recounts his hacking days with disapproval- and just a touch
of pride. He broke into his first system at the age of 17, dialing his
way into a big computer at Hayes Microcomputer Products Inc., in
Norcross, Ga., and nosing around the system I didn't take anything, I
was just trying to see if it could be done," he says now. Hayes
uncovered the breach and quickly tightened security, he says.

Hacking sessions often stretched into the early morning hours. He would
start by checking lists of computer phone numbers collected by his
computer the night before through an automatic process called "war
dialing." That's the brute force approach to king, when the computer
runs through the night, methodically dialing every number in a
telephone exchange. It records the number whenever it hits a "carrier
tone" signaling a computer is on the other end.

In a typical night of war dialing, in which the computer might check


thousands of numbers, perhaps 100 computer carrier tones would be
unearthed, "each one a potential treasure chest," Mr. Darden says. He
would then begin calling down the "hit list" with his computer, each
time trying to determine what kind of system was on the other end. Fax
machines were a problem, because they emit a tone that sounds like a
computer, so he wrote software that ignored them.

Hello, Are You There?

Each kind of computer had a distinctive response to his call, so he


would tailor his approach to the type of system he encountered.
Computers that used the Unix software operating system were especially
easy to break into, while Digital Equipment Corp.'s VAX computers,
which have multiple levels of security, presented a bigger challenge.
But he says he was fond of the VAX because of its widely used software.
"For a hacker, the VAX is like putting on an old Jimi Hendrix record in
a bar- it's a real clasic." Using purloined telephone credit-card
numbers, which his computer generated through a trial and error, he got
into computers all over the world, including an encounter with a VAX
that spoke Finnish.

He devised password-cracking programs that automated the hacking


process. He also devised a program that let him capture legitimate
users' passwords as they logged onto the system. When he found a
password the target computer recognized, his screen wo typically
respond with a prompt, such as a sign. "Once you get that, you have an
open door," he says. Often he would play "cat-and-mouse games" with a
company's computer operators. "I'd send a little greeting to their
printer, to let them know I was there. It drove them crazy."

Credit bureaus were a favorite target. And, despite the warnings of


other hackers that it might give him away, his first move was to look
up his own credit report. "Naturally, I didn't have one," he says. He
found his parents' report, and looked up ot s for friends.

To make the process more efficient, and to show off, Mr. Darden and
other hackers traded phone numbers and system-cracking tips on pirate
"bulletin boards"- computer systems that store and forward text and
electronic mail over phone lines. "Black Ice" is one such board.
Access was tightly limited to an elite circle.
No Busy Signal Here

Mr. Darden's biggest thrill as a hacker- and ultimately his downfall-


came when he broke into a big BellSouth computer in Atlanta used by
technicians to maintain and control the phone system. He learned how to
navigate within the system by asking questions of BellSouth's own
on-line "help" program. Once inside, he found he had the ability to
reroute telephone calls or bring down switching centers, neither of
which he says he did. Mr. Darden did, however, listen in on a few phone
lines, but only those of other hackers, he insists, and only to prove
his prowess.

"If we wanted to, we could have knocked out service across the
Southeastern U.S.," he says. "The fact that I could get into the
system amazed me. But we were careful not to damage anything."

Not surprisingly, when BellSouth discovered hackers were rummaging


through its computer, it reacted swiftly. It put 42 investigators on
the task of tracking the intruders down, and spent $1.5 million on the
effort. Once it found the source of the intrusions, it called the
Secret Service, which enforces computer-crime laws.

In the indictment, Mr. Darden and two co-defendants, Robert J. Riggs,


21, a.k.a. The Prophet, and Adam E. Grant, 22, a.k.a. The Urvile, were
charged with taking copies of proprietary software from BellSouth
during their ramblings in the system, and with unauthorized intrusion,
possessing illegal phone credit-card numbers with intent to defraud,
and conspiracy. Messrs. Darden and Riggs pleaded guilty to conspiracy
and face a maximum of five years in prison and a $250,000 fine. Mr.
Grant pleaded guilty to possessing BellSouth computer access codes with
the intent to defraud and faces a maximum of 10 years in prison and a
$250,000 fine. Sentencing is scheduled for Sept. 14.

The only good thing to come out of the whole experience, Mr. Darden
muses, is that after he was indicted, his high-school sweetheart- whom
he often spurned in favor of his computer- saw his picture on the
front page of the local paper and got back in ch.

Mr. Darden, who now works installing systems for a local computer
company, views himself as a purist, hacking for the thrill of exploring
the forbidden. He looks down on those who use their skills simply to
steal phone and credit-card numbers. But in thi s game, information is
everything, and not even Mr. Darden can control its spread. During
their sweep, federal agents have found some hackers using code-cracking
information dug up by the Legion of Doom to perpetrate their own
practical jokes and fraud.

For a few days last year, for example, phone calls to the Delray
Beach, Fla., probation office were mysteriously rerouted to a
dial-a-porn line in New York. Secret Service agents say it's the kind
of thing the Legion might have done.

And in Elwood, Ind., a 15-year-old calling himself Fry Guy allegedly


used information he got from the Legion to carry out an elaborate
fraud. Secret Service agents say he used his computer to break into a
credit rating service in Maryland to pilfer VISA and MasterCard credit
information. He then entered BellSouth's control network and altered a
pay phone on a street corner in nearby Paducah, Ky., to residential
status. Next, he called Western Union and had cash wired out of
credit-card accounts to the Pa ducah Western Union office. When Western
Union called the credit-card holders to verify the transactions, the
calls were forwarded to the pay phone and then to the youth's home
phone, where he posed as the credit-card holders and gave approval. The
cash w as then picked up at the Western Union window, investigators
say.

In all, Fry Guy siphoned more than $10,000 in cash and purchases from
credit-card accounts, alleges William M. Gleason, the Secret Service
investigator. He also found evidence that Fry Guy, whose name hasn't
been released, hacked his way into a payrol computer for a local
McDonalds Corp. outlet, giving pay raises to his friends working at
the restaurant.

Fry Guy's case is being handled by state and federal juvenile


authorities and, because of his age, it is unclear what punishment he
might get. At the very least, his parents are likely to watch the
family phone bill more closely. In a recent meeting w federal
prosecutors, Fry Guy's exasperated father wore a baseball cap bearing
the legend "Kids: They'll drive you crazy."

Federal agents admit that, when they detect an intruder inside a


computer, there isn't any way of telling if it's a precocious teenager
or a crook out to commit fraud. So they simply execute the law.

"When a hacker gets into a system, it's no different from a burglar


breaking into your home or office," says Secret Service agent James
Cool. If the door is open, the law treats a trespasser differently, he
adds. But if a hacker cracks a password to g into a system, "it's the
same as kicking in a locked door- and we're going to come after them."

Ed Darden wishes he had known all of this before he gave his son that
Apple II for Christmas eight years ago. "I'd have thought twice about
it," he says. "Maybe we should have given him a bicycle."

*end of file*

You might also like