Copy Link
Add to Bookmark
Report

Tolmes News Service 13

eZine's profile picture
Published in 
Tolmes News Service
 · 26 Apr 2019

  




#######################################
# #
# #
# ======== =\ = ====== #
# == = \ = = #
# == = \ = ====== #
# == = \ = = #
# == = \= ====== #
# #
# #
# <Tolmes News Service> #
# ''''''''''''''''''''' #
# #
# #
# > Written by Dr. Hugo P. Tolmes < #
# #
# #
#######################################


Issue Number: 13
Release Date: November 19, 1987


TNS Issue #13 will try to help explain the events concerning an article about
Capt. Zap in the Wall Street Journal.


$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$


TITLE: It Takes a Hacker to Catch a Hacker As Well as a Thief
FROM: The Wall Street Journal
DATE: November 3, 1987

Ian Murphy Helps Companies Catch Computer Pirates; But Whose Side Is He On?

By Dennis Kneale


PHILADELPHIA- It is almost 2 a.m., and the room is dark but for the
phosphorous glow of the computer screen that illuminates the cherubic face of
Capt. Zap. He taps the keyboard in his lap and searches for "hackers" who
break into computer systems for fun or malice.
"We've got one," Capt. Zap says. he starts an on-screen dialogue with
the hacker and asks for phone numbers to corporate data bases that might be
fun to hack into. The hacker advises that the best place to look tonight is
the "Holiday Inn," a secret electronic bulletin board that lists such numbers.
The captain heads thataway. Capt. Zap, actually Ian A. Murphy, is well-known
as one of the first convicted computer-hacker thieves. He has since
reformed- he swears it - and has been resurrected as a consultant, working the
other side of the bulletin boards and the right side of the law. His
detractors doubt it.

CRIME CREDENTIALS

Other consultants, many of them graying military veterans, try to flush
out illicit hackers. But few boast the distinction of a real hacker-and one
with a felony among his credentials Capt. Zap is more comfortable at the
screen than in a conversation. Asked to name his closest friend, he shakes his
head and throws up his hands. He has none. "I don't like people," he says.
"They're dreadful."
"He's legendary to the hacking world and has access to what's going on.
That's a very valuable commodity to us," says Robert P. Campbell of
Advanced Information Management in Woodbridge, Va., Mr. Murphy's mentor,
who has hired him for consulting jobs. The 30-year-old Mr. Murphy is
well-connected to his nocturnal netherworld. Every night till 4 a.m.,
he walks a beat through some of the hundreds of electronic bulletin boards
where hackers swap tales and techniques of computer break-ins. They trade
passwords. They debate the fine points of stealing long-distance calls. They
give tutorials: "Feds: How to Find and Eliminate Them." It is very busy these
nights. On the Stonehenge bulletine board, "The Marauder" has put up a
phone number for Citibank's checking and credit-card records, advising,
"Give it a calphy finds a primer for rookie
"hacklings," written by "The Knights of the Shadow." On yet another, he sifts
out network codes for the Defense Department's research agency.
He watches the boards for clients and warns when a system is under
attack. For a fee of $800 a day and up, his firm, IAM/Secure Data Systems Inc.,
will test the securtiy of a data base by trying to break in, investigate how
the security was breached, eavesdrop on anyone you want, and do anything else
that strikes his fancy as a nerd vs. spy. He says his clients have included
Monsanto Co., United Airlines, General Foods Corp. and Peat Marwick. Some
probably don't know he worked for them. His felony rap- not to mention his
caustic style - forces him to work often under a more established
consultant.
"Ian hasn't grown up yet, but he's a technically brilliant kid," says
Lindsey L. Baird, an Army veteran whose firm, Info-Systems Safeguards in
Morristown, N.J., has hired Capt. Zap. Mr. Murphy blames corporate "stupidity"
and laziness for the hacker problem. He says companies aren't alarmed enough
over the lapses, and he blares the blunt message on "Good Morning America,"
at industry seminars and in technical papers. His kinds of services are much
in demand these days, even if his blunt criticisms aren't. Computer break-ins
cost companies millions of dollars each year in corporate espionage, fraud and
hassle. The accounting firm of Ernst & Whinney puts computer-fraud losses at
more than $3 billion a year. Other experts say any figures are bogus
because most thefts of data, software and such things as credit-card
information aren't reported.
Companies don't like admitting they were outfoxed by techies barely
old enough to vote. Lots of hackers have been busy lately. Agents recently
busted "Shadow Hawk," 17-year-old Herbert Zinn of Chicago. He hacked into
American Telephone & Telegraph Co. systems and allegedly heisted software
worth $1 million by "downloading" it to a home computer.

RUINED RESEARCH

This summer, hackers in West Germany tapped into the U.S. space
agency's European network, peeking at files on booster rockets and shuttle
contracts. One of them changed a variable in a scientist's equation from pi
(3.14159265) to 7, ruining two months of research.
Capt. Zap views this underword from a frighteningly cluttered apartment
on the city's north side. Short and pudgy, he hovers at the screen
surrounded by an electronic arsenal: closed-circuit video, printer, police
radio, TV, eavesdropping gear, auto-dialer, shortwave radio, oscilloscopes
and other gizmos.
"He's in control, it's his little world," says his wife, Carole Adrienne,
who uses her psychology training to analyze the hacker mind-set. The place
is so messy she refuses to live there. When they were first separated, Mr.
Murphy admits he spied on her. "I'm an extremely jealous man," he says, "and I
have the technology to stop any man." Says she "You never know when the
surveilance ends."
Mr. Murphy's electronic voyeurism started early. At age 14, he woul back yard to tap into the phone-switch box and listen to
neighbor's calls. (He still eavesdrops now and then.) He quit high school at
age 17. By 19 he was impersonating a student and sneaking into the computing
center at Temple University to play computer games.

EASY TRANSITION

From there it was an easy transition to Capt. Zap's role of breaking
in and peeking at academic records, credit ratings, a Pentagon list of the
sites of missiles aimed at U.S., and other verboten verblage. He left even
his resume inside Bell of Pensylvania's computer, asking for a job.
The elctronic tinkering got him into trouble in 1981. Federal agents
swarmed around his parents' home in the wealthy suburb of Gladwyne, Pa. They
seized a computer and left an arrest warrant. Capt. Zap was in a ring of
eight hackers who ran up $212,000 in long-distance calls by using a "blue
box" that mimics phone-company gear. They also ordered $200,000 in hardware
by charging it to stolen credit-card numbers and using false mail drops and
bogus purchase orders. Mr. Murphy was the leader because "I had the most
contempt" for authority, he says. In 1982, he pleaded guilty to receiving
stolen goods and ws sentenced to 1,000 hours of community service and 2 1/2
years of probation. "It wasn't illegal. It was electronically unethical," he
says, unrepentant. "Do you know anyone who likes the phone company? Who would
have a problem with ripping them off?"
Mr. Murphy, who had installed commercial air conditioning in an
earlier job, was unable to find work after his arrest and conviction. So the
hacker became a hack. One day in his cab he picked up a Dun & Bradstreet
Corp. manager while he was carrying a printout of hacker instructions for
tapping into Dun's systems. Thus, he solicited his first consulting
assignment: "I think you need to talk to me." He got the job.
Now Mr. Murphy treads a thin line between the hackers he revers and the
corporate clients he reviles. The line is so thin that critics doubt that his
reformation is real. "Ian is a nice guy, I like him. I just don't trust his
ethics. I think he's still on both sides of the law," says Carl Jackson, a
security executive at Ford Motor Co. Some say Mr. Murphy is more loyal to
hackers than clients. He claims to employ the nation's top 10 hackers to
break into client computers. This gives executives the jitters. Once hackers
find a way in, while getting paid to do it, what is to stop them from breaking
in again later on? Mr. Murphy won't disclose who is behind a break-in and
won't help catch the culprit. he even advises hackers how to detect bugging
by the feds. "I am not a bouty hunter," he says.
As a consultant, Mr. Murphy gets to do, legally, the shenanigans that
got him into trouble in the first place. "When I was a kid, hacking was
fun. Now I can make money at it and still have a lot of fun." He loves
"tiger teaming" testing a client's security by breaking into his computer
by any means necessary.
In tiger teaming, Mr. Murphy has even crawled through garbage bins in
searchiscarded passwords (To demonstrate this on a moonlit
walk at 3 o'clock one morning, he rips open a dozen trash bags outside an
office building and exposes reams of papers.) Wearing a yellow slicker
labeled "Bell of Pennsylvania," he bluffed his way into an insurance
office posing as a repairman. Once inside, he made a beeline for the
computer room. The inspiration for such capers? Old reruns of "Mission:
Impossible," he says.
Some clients get queasy over his methods. Mr. Murphy had a row with Peat
Marwick when one official balked at his criminal record and how he tiger-teamed
the insurance office. Mr. Murphy says the accounting firm at first wouldn't
pay him the $24,000 he was owed, but it relented. Gary G. Goehringer, a Peat
Marwick manager, confirms he hired Mr. Murphy for two jobs and stresses he was
under close supervision at all times.
Now Ian Murphy looks to his next job. A Chicago company in a
patent-infringment dispute suspects that a rival stole secrets by hacking
into its computer system. Mr. Murphy may tiger-team the client's computer
system to see whether getting is doable. Better yet, he may break into
the rival's computers to see whether the client's data are stored inside. He
must check the legalities, or lack of them, for what doing this. Capt. Zap
can barely wait.


$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

NOTA:

The notes on this article will be extrememly long.


Capt. Zap claims that he is not a "bounty hunter" but there are a few
things to consider:

======================================

"It Takes a Hacker to Catch a Hacker"- Does Capt. Zap catch hackers?


"Ian Murphy Helps Companies Catch Computer Pirates"- Does he really catch
computer pirates (hackers)?

"He taps the keyboard in his lap and searches for 'hackers'"- Again, does he
go searching for them? Like a bounty hunter?

"He walks a beat through some of the hundreds of electronic bulletin boards
where hackers swap tales and techniques"- Walks a beat? Like a cop?

"working the other side of the bulletin boards and the right side of the
law"- Is he on the "other side"?



All of the quoted material comes from the article. The impression that Capt.
Zap tracks them down actually seems to be false. He does NOT work like John
Maxfield (Cable Pair) and the article states that he is not a "bounty hunter"
or is involved in the busting of hackers. Capt. Zap tries to get this across
in the article but the writer of the article should be blamed for any type of
view that Capt. Zap works for the "other side." Capt. Zap does do security
work (as do many other hackers) but don't think of him as a threat or some
agent sent out to infiltrate bulletin boards. Most of his security work is in
protecting systems. Interested persons who would like to employ his services
should contact him (which shouldn't be too difficult since he is on many
bulletin boards across the country.) Personally, I have said some unjust things
about Capt. Zap and should apologize but the article does give a certain
impressihacker tracker.


======================================

Capt. Zap "is well-known as one of the first convicted computer-hacker
thieves"-

Capt. Zap wasn't actually one of the first convicted computer-hacker
thieves. His arrest did not involve computers. But he is well-known in the
hacking world and has been around for a long time.


======================================

"On another board, Mr. Murphy finds a primer for rookie 'hacklings,' written by 'The Knights of the Shadow.'"-

This refers to the series put out by the Knights of the Shadow a long time
ago. There are actually 4 files (introduction and 3 instruction files.) The
files mentioned detail hacking into: DEC-20's, VAX/UNIX, and Data General
systems.


======================================

For a moment I'd just like to stray off the subject. Capt. Zap and Tuc
know each other and are both well-known in the hack/phreak world. Not so long
ago, Capt. Zap learned that Tuc was giving seminars on computer security and
was working as a security consultant. Capt. Zap left the following messages
on various bulletin boards concerning Tuc's actions. These posts are taken
from many different bulletin boards:







87Sep19 From CAPT. ZAP
Yes it seeems that because of one person, we will all have to pay for his
actions. It is very strange that such things happen just when you thought it
was safe to dial... Well the phone police have struck again! And while I
am thinking about it, there seems to be a small leak possible here and I
would like to bringit to the attention of the systems owners. As I have heard
about this person and his ways to do things, we also have the distinct
knowledge that the person is now going to release certain information to
persons unauthorized. I will relay this information by voice only to those
who identify themselves beyond a shadow of a doubt. And to the person who I
am speaking about, we know who you are and your days of asking questions and
trying to be something that yo are not, are comming to a close very soon. And
remember I have your number! For those who wish to find out what and who the
person is and the background information may call 215-634-5749.
\/ Capt. Zap \/
** --------- ** Copyright @ 1987, I.A.M. , IAM /SDS Inc.






87Sep23 From CAPT. ZAP
Well once again its time for news from real world.... First, we have the
continuing story of the Shadow Hawk incident! He will be going away on a
federal or state sponsered vacation, and then we have the civil damages that
will come from his actions and the major lawsuits to be fielded by his
parents. Now I do not know what sort of amounts will be leived, but you can
bet that they will be heavy. As to the continuing story of federal agents and
the like, we have the TUC story brought to by me. It turns out that our large
friend is helping in a seminar produced by the Maryland chamber of commerence.
His little thing will be called "How to break into your computer system". He
has 45 minutes and his title is President of Telecom Corp. Now I wasession that he was working for his father and collecting Cabbage Patch
dolls while reporting on his fellow phreaks to the like of Mr. Maxfield and
Mr. Bowens from MCI security. Now since he is an informant and will be sharing
his knowledge with others, I see this as an excellent reason to use the
copyright law to stop any use of information that he may collect from being
used by others or read by others without permission. I will say that I will be
sending a letter to him and his sponser that will inform him and the sponser
that any and all information that I have posted or provided, is for the use of
AUTHORIZED persons or organizations and that any use without the expressed
written permission will constitute a violation. I THINK THAT IT IS TIME TO PUT
AN END TO TUCS COMPUTER RELATED LIFE! NO ACCESS SO WHAT SO EVER!
\/ Capt. Zap \/ Copyright @ 1987, I.A.M. , IAM/SDS Inc.







Numb: 33
Subj: More Important News!
From: CAPT ZAP
Date: THU SEP 24 7:08:14 PM

Well I have learned that the one person who we all consider a fed will be
speaking in Baltimore and his topic will be....

How to break into yor computer system, presented by none other than our
friend TUC. He has gone over to the other side in a big way and is now
considered to be fair game for all of us to stop! He claims to to be the
president of TELECOM Corporation! I will be perfroming a search to see if such
a company does live! But now is the time to spread the word and in a big way to
stop him from gaining access to ANY SYSTEM throughout the nation. Now I am
wondering if there is a way to put a damper on this project and put a stop to
him once and for all! As you know we have a number of informants on here and
that we have to stop any person or group (federal or phone police) from
gaining access







As you might notice from the previous messages posted by Capt. Zap, he
is definitely angry that TUC is doing computer security work. Even thought he
does almost the exact same thing. His messages tell of TUC giving a lecture
on computer security and not busting people. His messages also suggest that
TUC is working for John Maxfield (as an informer) and also for MCI. Both of the
charges are unsubstantiated but Capt. Zap says that he is doing it anyway.
Now that we've seen how angry Capt. Zap was, let's go back to the article (the
one printed at the beginning of this issue:


"He says companies aren't alarmed enough over the lapses, and he blares the
blunt message on 'Good Morning America,' at industry seminars and in
technical papers"-

You'll notice how Capt. Zap gives even more speaking on hackers than TUC
does. TUC, according to Capt. Zap, did a seminar in Baltimore (and probably
other seminars at other places) but Capt. Zap did the same thing on "Good
Morning, America." Capt. Zap became angry at TUC for working as a security
consultant and claiming to be president of TELECOM Corporation, even though
Capt. Zap is the president of his own corporation (IAM/Secure Data Systems
Inc.) It might even be likely thatfraid that TUC was taking
business away from him. Exactly why Capt. Zap said those things about TUC
when he was doing the same thing is not known. Now we'll continue with a few
more things from the article.


======================================

"On the Stonehenge bulletin board, 'The Marauder' has put up a phone number
for Citibank's checking and credit-card records"-

The Stonehenge bulletin board is most likely one of two boards.

1) The Central Office (also known as Stonehenge)

or

2) Phonehenge (previously Stonehenge)


======================================

"Agents recently busted 'Shadow Hawk,' 17-year-old Herbert Zinn of Chicago."-

For details on Shadow Hawk's bust, see TNS Issues #10 and #11.


======================================

"This summer, hackers in West Germany tapped into the U.S. space agency's
European network"-

For information on the West German hackers, see TNS Issue #9.


======================================

"He claims to employ the nation's top 10 hackers to break into client
computers."-

This is most likely just something that Capt. Zap said to get clients for
his business. It is very unlikely that he employes the nation's top 10 hackers
to break into systems. Very unlikely.


======================================


The events surrounding this article/Capt. Zap/ I.A.M./ and whether or not
he is an informant will be written in TNS as more information is acquired.
As I stated earlier, when I read the article it pissed me off extremely. When
turning the page to continue the article, the top of the page had the
following heading:


"COMPUTER HACKER IAN MURPHY PROWLS A NIGHT BEAT TRACKING DOWN OTHER HACKERS
WHO PIRATE DATA"


The thought of this made me very angry but Capt. Zap has claimed that he is not
a "bounty hunter." the article also has parts that show his loyalty to hackers.
After reading this part (as well as the entire article), I was ready to kill
Zap. Again, any impression that Capt. Zap turns in hackers is the impression
given by the author of the article and doesn't seem to be the truth.


For those who are reading this and are in need of the services of a computer
security consultant, Capt. Zap's telephone number was printed in a post by
him. Remember, don't think that Capt. Zap is an informer.. it appears that
he is just as much of a loyal hacker as the rest of us (well almost).






← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT