[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: Computer Cop Prophile ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ]
Current issue : #44 | Release date : 1993-11-17 | Editor : Erik Bloodaxe
IntroductionErik Bloodaxe
Phrack Loopback / EditorialPhrack Staff
Line Noise Part IPhrack Staff
Line Noise Part IIPhrack Staff
Computer Cop ProphileThe Grimmace
Conference News Part Ivarious
Conference News Part IIvarious
Conference News Part IIIvarious
Intro to Packet RadioLarry Kollar
The Moeller PapersErhart Moller
Sara Gordon v. Kohntark Part IKohntark
Sara Gordon v. Kohntark Part IIKohntark
Northern Telecom's FMT-150B/C/DFyberLyte
A Guide to Data General's AOS/VS Part IHerd Beast
A Guide to Data General's AOS/VS Part IIHerd Beast
An Interview With Agent StealAgent 005
Visionary - The Story About HimVisionary
Searching The Dialog Information ServiceAl Capone
Northern Telecom's SL-1Iceman
Safe and Easy CardingVaxBuster
DatapacSynapse
An Introduction to the Decserver 200Opticon
LOD Communications BBS Archive Informationunknown
MOD Family Portraitunknown
Gail Takes A Breakunknown
International Scenesvarious
Phrack World NewsDatastream Cowboy
Title : Computer Cop Prophile
Author : The Grimmace
                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Four, File 5 of 27

****************************************************************************

                             Computer Cop Prophile

                                by The Grimmace



    The following file is something I thought of and did
a LOT of research on before writing.  It's something that
I haven't seen in PHRACK and I've been a devout fan of
this zine since the beginning.

    The "PHRACK PROPHILES" on hackers and phreakers give
readers an insight into the movers and shakers of the P/H
world, but how about a profile or profiles on the
anti-hacker/phreaker establishment that seems to be
growing by leaps and bounds lately?

 In the past years we've seen cops and feds who know
nothing about computers and/or telephone systems bungle their
way through search warrants and arrests and have had some good
laughs at their expense.  But now it seems that the "computer
cops", the feds especially, are putting a big push on training
agents in the "tricks of the trade" and their conviction rate
is getting better.

 The primary source of this training is the Federal Law
Enforcement Training Center in Glynco, Georgia, where they're
teaching computer seizure and analysis techniques,
computer-targeted search warrants, and telecommunications fraud
investigations.  (They're very accommodating about giving out
information on the phone as long as you tell them you're a
cop).  The FBI Academy in Quantico also has a computer crimes
course.

    On the technical side of things, there's an organization
called IACIS which stands for the International Association
of Computer Investigative Specialists based in Portland,
Oregon, and which consists of members of both local law
enforcement agencies nationwide as well as various and
sundry federal agencies.  This group teaches and certifies
cops in how to get evidence from computer systems that can't be
attacked in court (Of course, anything CAN be attacked, but
getting the evidence squashed is not always a sure thing unless
the judge is a computerphobe).

 As much satisfaction as we've gained at the expense of
the US Secret Service from the Steve Jackson Games case, it's
widely publicized problems may prove to be a double-edged sword
hanging over our heads.  Law enforcement learned a LOT of lessons
from mistakes made in that investigation.

    Like most of you, I've spent a lot of years
exploring computer systems (usually those belonging to others)
and personally feel that I've done nothing wrong (know the
feeling?).  I'm sure others across the country also can
conduct a little socially-engineered reconnaissance and
get the lowdown on some of the people we NEVER want to see
knocking on our doors with a sledge hammer in the middle of the
night.

    This profile contains information on the ONLY computer
crime cop I could identify in the Louisville/Jefferson County
area after calling all the major departments posing as a writer
for a law enforcement magazine doing a survey.  Information
about him was obtained not only from his department, but from
sources in the local and federal court systems, Ma Bell
Security, and the Federal Law Enforcement Training Center.  Lt.
Baker is *not* a potential donor to the CPSR or EFF to say the
least.

 I'm currently compiling similar information on other
law enforcement types in the Secret Service, Columbus Ohio PD,
Dallas PD, Georgia Bureau of Investigation and members of Ma
Bell's Data Security Group in Atlanta. Baker was just the
closest to me so I started with him.  If I can get the
information I've requested, then future submissions will
also include lesson plans furnished by FLETC on their training
courses and analysis protocols suggested by the USSS...heh...heh.

Yours,

The Grimmace


   *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
                          COMPUTER-COP PROFILE I

                              LT. BILL BAKER

                    JEFFERSON COUNTY POLICE DEPARTMENT
                           LOUISVILLE, KENTUCKY


                         INFORMATION COMPILED BY:

                            ** THE GRIMMACE **

   *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*


       NAME:  Bill Baker
       RANK:  Lieutenant

               AGENCY:    Jefferson County Police Department
                         768 Barret Ave.
                         Louisville, Kentucky  40204

                   AGE:     43
 YEARS OF COMPUTER EXP:     13

        YEARS AS A COP:     18
    YEARS IN COMPUTER/
         TELECOM CRIME:      8

              TRAINING:  Federal Law Enforcement Training Ctr.
                                Glynco, Ga.
                      - Telecommunications Crime
                          Telecom Fraud
                          Cellular Fraud
                          PBX Fraud
                      - Computer Crime
                            Illegal Access Crimes
                            Computer Crime Inves.
                            Seized System Analysis

                 FBI Academy
                 Quantico, Va.
                      - Computers in Narcotics Investigations
                      - Computer Crime Investigations

                 National Intelligence Academy
                 Ft. Lauderdale, Fl.
                      - Supervising Intelligence Operations
                            Surveillance Techniques
                            Electronic Tracking
                            Electronic Eavesdroping
                            Video Evidence Techniques
                      - Telephone Systems
                            Wiretaps
                            Dialed Number Recorders
                            Pager/Fax Intercepts
                            Technical Telephony Course

  PREVIOUS ASSIGNMENTS:  Patrol
                            Criminal Investigations/Burglary
                            Criminal Investigations/Homicide
                            Crime Prevention
                            Special Investigations/Vice-Intel

    MEMBER:  Communications Fraud Control Association
                    Washington, D.C.

  PUBLICATIONS:     Various computer/telecommunications
             crime oriented articles for assorted
             law enforcement and computer industry
             magazines (i.e., POLICE CHIEF, DATA TODAY)


 Posing as a freelance writer from the "Law Enforcement
Journal", I made calls to local police agencies all over this
area asking about their Computer Crime Units and received
replies ranging from "What are you talking about?" to "Maybe
FRAUD handles that...hey, Charlie...do the FRAUD guys do
anything with compoooters?".  So much for the Louisville
Division of Police...no fear there, right?

 But I decided to push on since Louisville, though not a
hotbed of phreakers/hackers, IS the latest home of TAP MAGAZINE
(a la Blitzkrieg BBS and the Predat0r) and has a smattering of
"hometown" folks engaged in less than legal activities through
the local phone lines.

 The call made to the Jefferson County Police got me a
solid response of "You'll have to talk to Lt. Bill Baker.  Hey,
Charlie, where's Lt. Baker working now?" (This guy is so low
key his own department doesn't even know where he works!) They
finally decide he's someplace called "Adam Station" and
through "various" contacts and a friendly local attorney who
rarely pays for telephone calls himself, I managed to obtain
quite a bit of information about Lt. Baker and his obviously
misguided quest.

 Lt. Baker is fairly typical of the "new breed" of
high-tech investigator currently being churned out by the
various federal training schools.  He's aggressive and, from
talking to other members of his department, thought of as a
"computer weenie" who was probably a hacker himself before he
embraced the "dark side" of "the FORCE". (I personally believe
that this may be more fact than fantasy after talking to him on
the phone since he seems to know more about phreaking and
hacking than one would think would be taught in the
aforementioned federal institutes of higher learning.)

 I finally managed to speak with Lt. Baker on the phone
and gave him my "writing about computer crime" rap which he
bought with little suspicion.  The following are excerpts from
the recording I made of the conversation [comments in brackets
are mine]:

TG:     How would you rate the progress of computer and
        telecommunications crime investigations in this area?

Baker:  There have been some good cases made here, but there's
        still a long way to go.  The main problem is that there
        hasn't been a push from local businesses in this area to combat
        these types of crimes.  Most of'em don't want to admit they've
        been hit from the outside.  If there's no complaints,
        then the departments aren't likely to want to spend the money
        to dig up additional crime, right?

TG:     Of the hackers you've worked on, what kind of capabilities
        do they have and how good do you think they are?

Baker:  Well, hackers and phreaks are like any other cross-section
        of a criminal group...there are some that are very good
        and some that are pitiful.  The best thing you can say
        about working hacker/phreaker cases is that a lot of them
        catch themselves.  They have huge egos and tend to brag
        a good deal about what they've done and how they did it.

TG:     Does that mean that you don't think a computer crime
        investigator has to be as good as the criminals
        he chases...I mean, because a lot of these people leave
        so many clues behind?  How would you rate your ability
        in this field?

Baker:  Nope...not at all.  I think that as technology gets better
        so will the crooks. Let's keep the record straight here.
        Sure, there are bozos out there who read a how-to file in
        an old PHRACK and decide that they have the knowledge
        they need to nuke the phone company or ride a VAX like
        a Hell's Angel rides a Harley.  Those are the easy ones.
        The ones who -write- [author's emphasis] the technical
        articles in PHRACK are the ones to worry about.  There
        are some stomp-down [??] incredibly knowledgeable
        individuals in circulation blasting away with their modems
        at any target of opportunity.

TG:     You didn't mention your own ability for investigating
        these people.

Baker:  (Laughs) Yeah, well...let's say I know enough to get by
        and am smart enough to know that there are no absolute
        experts.

TG:     How would you comment on the Steve Jackson Games case?
        Do you think the Secret Service set a lot of bad
        precedents?

Baker:  (Laughs) Noooooooo....sorry, pal.  That's been jawed to death
        in every phreak/hack mag, legal journal, and Internet
        newsgroup in existence and I'm not about to stick my
        neck out on that one, OK?  I will say that everyone learned
        a lot from that case and I seriously doubt if you'll see the
        same set of problems reoccurring in future cases.  Maybe
        the CSPR or EFF hired guns can come up with a new group
        of loopholes, in which case we'll have to find new ways
        to circumvent those attacks.

TG:     You sound a little critical of the EFF and CSPR efforts
        in their defense of so-called "computer criminals".

Baker:  Well, I'm sure that they believe in what they're doing.
        They must to invest that much cash and energy.  But I
        think there has to be some middle ground agreed upon
        rather than just whining about "all information should
        be free" and "if I can get into your system then I should
        be allowed to look around".  I'm not going to launch into
        a diatribe on organizations that I don't agree with. I'm
        simply going to work harder at dotting every "i" and
        crossing every "t" to make my cases more secure.  Stealing
        telephone service is a crime, defrauding businesses is a
        crime, gaining unauthorized access into someone else's
        computer system is, in most states, a crime, and even if
        there's no law on the books making it a crime, it's
        wrong.

TG:     Since by your own statement, you feel that high-tech
        crime investigation is still in its infancy, what groups
        or organizations would you say are in the lead in trying
        to combat this type of crime?

Baker:  The most significant two I know are the Federal Law
        Enforcement Training Center in Glynco, Georgia, and the
        Communications Fraud Control Association based out of
        Washington, D.C.  FLETC [he pronounces it FLET-SEE]
        probably has the finest computer crimes training program
        in the country.  They bring in acknowledged experts and
        don't cut the students any slack as far as learning to
        do things correctly and, most importantly, legally. The
        CFCA is the leader in Telecommunications security and
        provide training and assistance to telecom and computer
        companies along with law enforcement agencies all over
        the country.

TG:     Why do you think so few law enforcement agencies know
        anything about computer crime investigations?  Are they
        going to leave the phreaks to the feds?

Baker:  Nah...I don't think you can simplify it that easily.
        Most departments don't have dedicated computer crime units
        because of lack of funds to support such a unit, lack of
        trained personnel, lack of understanding of the magnitude
        of the problem, fear of increasing their crime stats or
        any combination of those reasons.  When I first got into
        this, there weren't any experts.  John Maxfield and his
        BOARDSCAN operation got a lot of talk in the hack/phreak
        journals and there were a small handful of others, but
        no real standout authorities. I talked to an awful lot
        of people before I hooked up with Clo Fleming at SPRINT
        Security who helped me a lot.

TG:     Do you still trade information with SPRINT?

Baker:  I have contacts with all the major telecom carriers.
        The training I got at FLETC really helped make some valuable
        contacts.  But I guess SPRINT and Clo Fleming would be
        my first choice simply because they were willing to help
        me when no one else would.  You can't operate in this
        environment without contacts in the OCC's.  It can't be
        done and the OCC's [Other Common Carriers] are a lot
        more willing to assist law enforcement now than they
        were in 1985.  Of course, the telecommunications industry
        is taking a $4-5 billion hit a year from fraud and that
        has a lot to do with it.

TG:     Do you subscribe to the hacker/phreaker magazines?

Baker:  Sure...I subscribe to 2600 and get copies of some
        others.  I think PHRACK's probably the best overall,
        but I can't afford the subscription rate they've imposed
        on government agencies since Craig Neidorf took the hit
        for publishing the "golden" E911 document. I've learned
        a ton of stuff over the years from PHRACK and wish it
        were still free, but they have a right to their info
        just like the people who own the systems attacked by
        hackers.  It'd be kind of hypocritical for me to rip off
        PHRACK and then turn and prosecute some other guy for
        ripping off information from another source, right?

TG:     What problems do you foresee in the future in computer
        and telecom crime investigations?

Baker:  Jeez...why don't you ask me when we'll have world peace
        or something easy? OK, I think we'll probably see the
        larger departments being forced to play catch-up with
        the current trends and always being a little behind in
        this area.  I also think you'll see more officers losing
        cases and being sued, a la SJG, until they get the
        specific training required to handle these cases the
        right way.  Turning seized systems over to the local
        "computer guy" in the department is going to cost'em in
        the long run because every lawyer who gets one of these
        cases is going to compare it bit by bit with the SJG
        case to see if there's anything there he can use for
        his client's defense.

TG:     There has been a lot of discussion about whether or not
        computer systems should be seized rather than just
        making copies of the data for evidence.  What is your
        policy on equipment seizures when working cases like
        this?

Baker:  First of all, I don't go on fishing expeditions with
        search warrants. If I have enough to convict a guy then
        I get the warrant.  I take everything that's there and
        do the analysis.  I've had cases where the defendant has
        requested copies of data he needed for various reasons
        and I've had no problems with furnishing them as long
        as the request is reasonable.  I ask for forfeiture of
        the equipment if I can link it to the crime because the
        law says I can.  If I can't link the computers, then I
        give them back...simple as that.  I think it's kind of
        interesting that most hackers or phreaks will refuse to
        take a guilty plea for a reduced charge, even if I have
        them stone cold and they're looking at a 99.999999%
        chance of conviction in a jury trial, if it means
        they'll lose their equipment in the deal.  It makes good
        leverage in certain situations.

TG:     Did you have any part in Operation Sun-Devil?

Baker:  Nope.  Though I'd have liked to.  I was on a lot of the
        systems taken down in Sun-Devil.

TG:     You said you were on some of the systems busted in the
        Sun-Devil operation, are you still on phreak/hack
        boards and would you name any?

Baker:  (Laughs a lot) I think I'll pass on naming systems I'm
        on, OK?  That'd be cheating. (Laughs again)  But I get
        around enough to know what's going on.  There are lots
        of investigators out there calling the boards.

TG:     I appreciate your time, Lt. Baker, and would like to ask
        one last question.  What motivates you in these cases
        since the alleged "theft" involves pretty intangible
        property?

Baker:  Motivation? Hmmmm...I suppose you could say it's the
        chase that motivates me more than the catch, though
        the catch is pretty good, too.  These cases tend to
        be more one-on-one than some other types and the
        adversaries can be very good at covering their tracks.
        Hell, I probably have more in common with the people
        I target than they'd like to believe.  As for the
        "intangibility" of the stolen goods, well, that's why
        we have court systems, isn't it...to define those
        little details.

TG:     A lot of computer crime investigators would rather stay
        in the background, but you don't seem to have taken that
        position.  Why not?

Baker:  Well, like anyone involved in anything relatively new,
        as opposed to the old standard type crimes like murder
        and armed robbery, it's to my benefit to have anything
        printed informing people of the problems created by
        this type of activity.  We all pay the price for telecom
        fraud, credit card fraud, data loss due to illegal
        access to computers and all the rest.  But the people
        involved in these crimes, for the most part, don't
        exhibit the same profiles as the so-called "violent"
        criminals.  In fact, I've had some very friendly
        conversations with a number of phreaks and hackers.
        Investigators who have problems would probably have
        them no matter what crimes they were investigating.
        I never assume that I'm smarter than anyone I'm
        chasing and I don't rub their noses in it when I make
        a case.  Just like I don't lose sleep when I just can't
        seem to get that last piece of the puzzle and one gets
        away.  It's hide-and-seek in cyberspace.  Pretty good
        game, actually.

For what it's worth, there it is.  The interview printed here
doesn't contain a lot of the bullshit that was thrown back and
forth during our conversation, just the relevant details which
tend to give an insight into this guy.

Frankly, I was impressed by the fact that he didn't seem
anything like I had expected after reading horror stories about
other agencies and investigators.  This guy was personable and
maybe that's an indicator that he's dangerous. Never, ever
underestimate your opponents -- even if they do sound like
"good ole boys" and talk to you like you're the best friend
they ever had.  Always remember that COPS INVENTED SOCIAL
ENGINEERING!

My next "computer cop" profile will deal with a rising star in
the U.S. Secret Service and his connections to the Guidry
Group, a consulting organization working for the cellular phone
industry in combating cellular fraud.


 
[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2021, Phrack Magazine.