UnderGround Information










UnderGround Information










UnderGround Information






 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

                               E.D.I.T

                               -------

 

Electronic Deception, Interception & Terrorism : The Radio Shack Reality!

------------------------------------------------------------------------

                             presented by 

 

                    Ian A. Murphy, President & CEO

 

                    IAM / Secure Data Systems Inc.

                       1225 North Second Street

                        Philadelphia, Pa 19122

                            (215) 634-5749 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 




"Electronic Deception, Interception & Terrorism : The Radio Shack Reality!
� ------------------------------------------------------------------------

Objective and Scope of the Problem 

 

 The use of personal computers and the growth of electronics into the 

mainstream population, will allow almost anyone with basic understanding 

of common technology, the possible interception and collection of 

information that would not be available under normal conditions. 

Suppliers of basic electronic equipment now provide a number of different 

devices for the unknown numbers of possibilities for interception of 

tele-communications, data communications, and microwave and satellite 

communications for a small price. Some equipment is advertised to be a 

small as a dime and may be purchased from the back of many electronic 

magazines for under $30.00. Other devices are a bit larger and 

need more expertise to operate, but are still in the hands of many. 

 

 To all of this, we add the entry of the personal computer and its 

ability to collect millions of bits of data in seconds instead of the 

human needing to ingest and store such information. The information can be 

collected onto tape or floppy disk and removed to a safer location with 

ease as compared to the removal of such volumes of information in paper 

or book form. 

 

 Other problems involved with possible comprimised conditions include 

outside data communication contact persons who have no authorized 

access. Groups known to both law enforcement and the public media have 

surfaced from time to time and with some most embarassing information 

about corporate and goverment networks and computer systems. 

 

 Most invasions occur with little notice at the time of entry and are 

only detected when major system problems or audit information are scanned. 

Public (private) domain systems are accessible around the clock without 

cost to thousands and provide the underground with an excellent source for 

information. 

 

 These systems contain information for the compromise of various 

communications networks and operating systems to the construction of 

explosive devices and different methods for gaining physical access to 

such networks. All is known to be in the hands of a vast majority of 

minors, but if such information is available to anyone with computer 

communications ability, then the threat of such incidents occurring 

increases tenfold. 

 

 The reason is due to the ease of access from anyone with the right 

information available to call these outlets of sensitive knowledge. 

The statement from Thomas Jefferson, represents the spirit of the words, 

"Knowledge is Power." as frightning truth in today's information society.

 

 

 

 




"Electronic Deception, Interception & Terrorism : The Radio Shack Reality!

 ------------------------------------------------------------------------

Results to Date

 

 With the continued expansion of computers, many individuals and groups 

have been brought to the attention of law enforcement authorities. Groups 

with names such as The Legion of Doom, Knights of Shadow, The 414 Gang, 

The Brotherhood of Ohm and others. These groups consist of minors who 

trade information on a number of computers and telecommunications systems. 

 

 These individuals have become known due to their actions on the systems 

of their choice. Reasons for discovery include the blatant posting of 

about plans to attack such systems, pieced-together information from 

telephone company records, credit card frauds committed to obtain computer 

hardware and software, and systems security violated numerous times by 

outside telecom contacts.

 

 These groups have a small impact on overall communications insecurity

and pose little threat to national and corporate security. But the major 

problem associated with the leak of sensitive knowledge, comes from the

lack of true indicators of such incursions in these networks. If persons 

with little directed intent are able to gather sensitive data from a 

number of public and underground sources, then a directed force will have 

a much easier time gathering facts and building upon them. Such fact 

gathering abilities come from eastern bloc countries with representives in 

this country, using "listening posts" stationed in major urban areas under 

diplomatic immunity to average citizens with back yard satellite dishes, 

personal computers and home-built or store-bought electronics. 

 

 An example; According to statements made by David L. Watters before the 

Senate Select Committee on Foreign Intelligence in Febuuary 1977, the 

Soviet embassy in Washington, D.C. was in a direct line of interception 

for most of the federal goverment microwave communications. The embassy 

had the ability to receive any transmissions from sites such as White 

House, Tennely Tower, the Pentagon, Ft. George Meade, Ft Belviour, 

Andrews Air Force Base, Walter Reed Medical Center and other such 

govermental sites. 

 

 Costs of such methods do not come cheaply and require industrial 

communications equipment to gather and process large amounts of such 

traffic in an urban environment. It should be noted that the embassy is 

located on the highest piece of land in the city of Washington and that 

alone allows for very easy signal reception from such generating 

facilities in the metropolitian area. 

 

 

 

 

 

 

 




"Electronic Deception, Interception & Terrorism : The Radio Shack Reality!

 ------------------------------------------------------------------------

Results to Date (con't.)

 

 With common sense applied, one must assume that the goverment is using 

encryption methods to transmit information over communications channels. 

The one benefit the such methods allow is for the useful lifetime of 

the information to remain valid as well as keeping such information 

guarded from unauthorized sources. But since this information is secured 

from such easy desemenation, the value of interception decreases to a 

point where the ability to decipher such information becomes too costly 

in a time value stance. 

 

 One interesting twist to the encryption methods used by both the public 

and some goverment agencies, is the use of the DES (Digital Encryption 

Standard).The DES is an encryption method endorsed by the federal 

goverment for use in the public domain. This method is currently protected 

from disclosure outside the U.S. and selected NATO countries and has been 

classified as a "Material of War". The method was introduced as a secure 

method of encryption for information with the possibilities of the correct 

information being decoded in a one to a 72,000,000,000,000,000,000 chance.

 

 These odds are not to be ignored and do prove to be most formidable to 

unauthorized access with the exception of major goverments. The method was 

adopted by the commerical sector and has been deployed over a number of 

years in multiple sites, with little hesitation from the users. User 

confidence was quite high with this method, but a question must be raised 

about the release of such methods into the public domain.

 

 Since this method is secured from decryption in a time value stance 

according to goverment information, then why is such a method in the 

hands of the public? Can it be possible that the method has accessible 

trap doors imbedded to allow inspection of the encrypted information?

Would the federal goverment release a method so secure into the hands 

of the general public so that not even they could read such information? 

And why is the method not being re-certified by the goverment? Has 

the usefulness of this technique reached a saturation point where the 

time needed to decrypt the information, has become a matter of hours or 

days instead of the reported years?    

 

 The weakness of the DES system has been shown by a number of 

underground technicans working on the problem of encrypted satellite 

television transmissions. In one recent 90 day period, both the Oak Orion 

and the HBO scrambling systems have been cracked with skill. Chips for 

the decryption of these signals are on the underground market and can 

be produced as easily as most other commercially produced chips.

 

 

 

 

 




"Electronic Deception, Interception & Terrorism : The Radio Shack Reality!

 ------------------------------------------------------------------------

Continuing Development Activity

 

 In addition, the increased skill of persons with directed intent who 

are able to obtain knowledge for the invasion of networks and systems 

allows for penetration of systems with ease. These individuals are 

seeking ways to gain entry with little detection involved and may be 

using the underground sources of information as roadmaps to targets. 

These entries will be planned and used to the fullest possible extent 

without the owners of systems being any wiser.  

 

 Computer and communications facilities are being attacked by a vast 

group of computer literate persons seeking information and challenges 

that are not available in a normal data processing environment. People 

are seeking out connections to systems that answer and allow connection 

to same. The general public is being fed a constant diet of computers 

and communications. Society as a whole is undergoing a major re-education 

process in information processing and storage. Technology that needed 

space larger than any desk could contain is now available to sit on that 

desk and has more power than its predecessor, performing the same 

funcitions in half the time.  

 

 Individuals without computer skills are now able to use the technology 

to work better and faster. Others are able to solve problems that could 

not be solved 10 years ago due to the technology, and now most commerical 

products have some form of directed artifical intellegence in place 

and operational.  

 

 Information of a special or technical nature about electronics,

communications and computer safeguards, is traded like baseball cards on 

the street. Persons have in-depth knowledge of hardware and software 

security methods and discuss such topics in open public electronic forums 

around the country. Information on software such as IBM's RACF, (R)esource 

(A)ccess (C)ontrol (F)acility, Computer Associates "Top Secret", and DEC 

Vax / VMS Security methods and the like are discussed as common topics in 

underground circles. Meetings are held each and every Friday evening in 

New York for the discussion of these topics and more. Conferences held 

for science fiction readers contain large populations of these persons 

and allow for information to flow to sources not normally exposed to such.

 

 The possibility of information of a sensitive nature being in the hands 

of individuals who should not have access to such, is a problem that stems 

from the ability of persons to research information from a variety of 

sources available to the public. First Amendment rights allow for the 

discussion of information and technology and provide the needed 

stimulation to continue research and provide for new developments. 

Many areas offer small insights to overall changes in technology and 

invite inspection of other areas. 

 

 




"Electronic Deception, Interception & Terrorism : The Radio Shack Reality!

 ------------------------------------------------------------------------

Continuing Development Activity (con't)

 

 Collection of information by electronic methods has become very 

standard in today's society. Multiple devices can be placed in locations 

never suspected as being active listening posts, and size is no longer 

considered a problem due to the development of integrated circuits. 

Some support devices can offer close unlimited range with proper set-up. 

Others allow for the interception through standard off-the-shelf 

technology and completely bypass any common physical security methods 

used to enforce. 

 

 Low cost systems may be purchased and bastardized for the required 

purpose. Small radio transmissions systems with ranges stated to be in 

excess of one mile are very easy to obtain by calling or writing the 

manufacturer. Others are discussed in the general print media and 

complete volumes are available with plans, parts lists and construction 

methods needed for operation. 

 

 All this information and equipment is in the hands of the general 

population and if it is so available, then what is the way to protect 

such information from interception and use? Is the trust of the user of 

this information questioned? Is the information real or placed in the 

media to dis-inform possible threats? What is the truth of the matter? 

Facts presented in one media are contested in others. 

Papers are presented and discussed with point and counter-point. All 

offer a number of possible facts that allow for the gathering of small 

but connected thoughts that provide the necessary details. 

 

 Techno-fables are widespread; goverment, industry and the general 

public refuse to accept such stories due to lack of understanding. 

Capabilities well beyond what most of us would think are in the hands 

of common persons. Simple electronics offer a whole new world of 

eavesdropping and collection abilities for under 200.00 dollars and 

still we have persons who think such things are science fiction. 

 

 Imagine using a common household microwave oven for such actions. 

Most would not see the use of such a device, but microwave ovens may be 

purchased for under $59 dollars in most areas and with a bit of 

component re-structuring, can produce frequencies well within commerical 

transmission range as well as front-end equipment damage to such sites. 

Belief in the "tap proof" security of fiber optics has been smashed. 

Simple fiber technology is the way, and counter-devices may cost 100 to 

1000 times more for the detection and protection of such circuits. 

 

 

 

 

 

 




"Electronic Deception, Interception & Terrorism : The Radio Shack Reality!"

 ------------------------------------------------------------------------

Continuing Development Activity (con't)

 

Home-made satellite transmissions stations are being constructed by 

HAMS and such for under $100 dollars, while current orbiting systems are 

completely vunerable to outside interference and jamming. The classic 

example is the Captain Midnight caper in early 1986. "Tempest" frequencies 

readers or scanners may be built for under $150.00 dollars and plans for 

such devices may be purchased for $19.95 through the mails. Cable location 

service is just an 800 number call away, and still the industry does 

nothing about the problem, cause or solution!  

 

Summary

 

 The use of common electronics and standard research in public domain 

databases will allow for the possibilities of simple terroristic 

activities happening with regularity to major telecommunications and 

computer centers. Already, computer centers in western nations have 

become the target of terroristic organzations. Computer hackers are 

reported as standard news today, and reports of special frauds and thefts 

continue with predictable time periods between each case and the results 

always being hidden from view to authorities due to the lack of 

understanding. Some results of such frauds are presented in plain view at 

times, and the investigators cannot "see the forest for the trees." 

The general population does not see computer intrusions as a problem 

related to them. 

 

 Public knowledge of "computer crimes" comes from embellished stories 

presented by the media. Crimes committed against the different telephone 

carriers are responded to with a sense of wonder and awe from the general 

populace. The resident problem stated comes to the simple premise of basic 

"today" education. But if the education teaches the populace how to 

interact with the systems, is it able to police the same with confidence? 

Can the users be educated with the basic instruction for security as they 

have been about other forms of security? Do they understand what is being 

presented in the new age and are they willing to learn new methods for 

insuring security for all users? Can the security be maintained for the 

information as the information and its vessel grows? 

 

Conclusion

 

 The need for security in today's information age will require more 

thought and understanding of a criminal nature to secure the assets. 

A new form of asset transference is as available as the six shooter was 

in the early days of the West. To close, the words of Thomas Jefferson 

once again state the truth for this age, " If you remove a little bit of 

freedom for the sake of security, then in time you will have neither.".  

 

Ian A. Murphy 

 


  Copyright Ian A. Murphy , IAM / Secure Data Systems, Inc., 1987