==Phrack Inc.==

               Volume Three, Issue Thirty-five, File 3 of 13

                -*[  P H R A C K  XXXV  P R O P H I L E  ]*-

                            -=>[  Presents  ]<=-

                       Sincerely Yours, Chris Goggans
                       -===--===--===--===--===--===-
                            by S. Leonard Spitz
                            Associate Publisher
                         INFOSecurity Product News

"A provocative interview with a former member of the "Legion of Doom" suggests
that the ethics of hacking (or cracking) are often in the eye of the beholder."

Malicious hackers, even though most operate undercover, are often notorious for
the colorful pseudonyms they travel under.  Reformed hackers, however, prefer a
low profile so as to shed their image of perceived criminality.  Kevin Mitnick,
infamous for the DEC caper, is one of the foremost advocates of this strategy.

Now comes Chris Goggans, trailing his former "Legion of Doom" moniker, Erik
Bloodaxe, behind him, to try it his way.  Goggans insists that where once he
may have bent the rules, he is now ready to give something back to society.
And coming across with a high degree of sincerity, he affirms his intention to
try.  Are he and his colleagues, wearing their newly acquired information
security consultants hats, tilting at windmills, or does their embryonic,
cracker-breaking start-up, Comsec Data Security Co., stand a fighting chance?
We thought we would ask him.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

ISPNews: I am going to ask several legitimate questions.  Please answer them
         completely, truthfully, and honestly.

Chris Goggans:  OK.


JUDGEMENT BY THE MEDIA

ISPNews: Would you react to Computerworld's July 29 piece, "Group Dupes
         Security Experts," <also seen in Phrack World News issue 33, part 2
         as part of the article called "Legion of Doom Goes Corporate> in
         which members of your organization were accused of masquerading as
         potential customers to obtain information, proposals, and prices from
         other security consultants?

    CG: We were all amazed that something like that would ever be printed
         because, as we understand common business practices, we weren't doing
         anything unusual.

ISPNews:  Computerworld reported that the Legion of Doom was "one of the
         nation's most notorious hacker groups, according to federal law
         enforcers."  Can you respond to that?

    CG: Notorious is a relative term.  There has always been a shroud of
         mystery covering the Legion of Doom, because it was an organization
         whose membership was private.  When you keep people in the dark about
         the activities of something, there is always going to be the
         perception that more is going on than there really is.

ISPNews: Would you say then that the characterization of being notorious is
         unfair?

    CG: To some degree, yes.  There certainly was activity going on within
         the group that could be considered illegal.  But most of this was
         taking place when members of the group were all between the ages
         of 14 and 17.  While I don't want to blame immaturity, that's
         certainly a factor to be considered.

         The Legion of Doom put out four <issues of an> on-line electronic
         newsletter <called the Legion of Doom Technical Journals> composed
         of different files relating to various types of computer systems
         or netware.  They explained different operating systems or
         outlined different procedures used by networks.  They were always
         informative and explained how to use a computer.  We never said
         "This is a computer and this is how to break into it."

         Colorful names and words used to describe groups also add to
         notoriety.  If we had been the "Legion of Flower Pickers," the
         "Legion of Good Guys," or the "SuperFriends," there probably
         wouldn't be this dark cloud hanging over the group.

ISPNews:  Could you be charged with intent to provide information to others
         which would make it easier to gain unauthorized access?

    CG: I don't see how that could be a charge.  There's the first amendment.
         I maintain that talking about something and encouraging or forcing
         someone to do it are completely different.


EARNING AN "A" IN INFOSECURITY

ISPNews:  What attracted you to computer security?

    CG: The same thing that would attract anybody to being a hacker.  For
         half of my life I've been in front of a computer every day.
         Sometimes from early in the morning until the wee hours of the night.
         And my particular focus has been on computer security.

ISPNews:  At least the dark side of that coin.

    CG:  I wouldn't say the dark side.  I'd say the flip side.  If you do
         something for 11 years, you are going to pick up a lot of knowledge.
         And I've always wanted to find some kind of productive career that I
         thoroughly enjoyed.  So this was just an obvious progression.  No one
         wants to be a 40-year-old hacker living in fear of the Secret
         Service.

ISPNews: When you first applied to enter college, did you feel that it was the
         right place to learn about information security?

    CG: Yes, I thought it was the right place, mainly because college is the
         most obvious choice to pursue an education in any field.  I just
         assumed that I would be able to find formal training leading to
         certification or a degree in this field.  Yet, at the University of
         Texas, there wasn't anything along those lines.

ISPNews:  Did you graduate from the University of Texas?

    CG: No, I changed majors and then moved to Houston.  I had started out in
         computer science but it was completely unrelated to any kind of
         career I wanted to pursue.  I eventually changed my major to
         journalism.  There are only two things I like to do:  Work on
         computers, and write.  So, if I wasn't going to get a degree in one,
         it was going to be in the other.  I'm a semester away, and I do plan
         on finishing.

ISPNews:  If you were to structure a college curriculum for studies in
         information security, would you design it to focus on technical
         issues, ethics, business issues, or legal matters?

    CG: I would try to focus on all of these.  If you don't have a technical
         background, you can't understand the way the operating system works,
         and you really can't focus on some of the issues that need to be
         addressed with information security.

         Ethics certainly come into play ass well for obvious reasons.  I
         don't think hackers are going to go away.  Even with the advent of
         newer technology, there are always going to be people who have an
         interest in that technology and will learn how to manipulate it.


ETHICS, INTELLECTUAL PROPERTY RIGHTS, AND THE LAW

ISPNews:  What is your definition of a hacker?

    CG: A Hacker is someone who wants to find out everything that there is to
         know about the workings of a particular computer system, and will
         exhaust every means within his ability to do so.

ISPNews:  Would you also comment on the ethics of hacking?

    CG: There is an unwritten code of ethics that most people tend to adhere
         to.  It holds that: no one would ever cause damage to anything; and
         no one would use any information found for personal gain of any kind.

         For the most part, the only personal gain that I have ever seen from
         any sort of hacking activity is the moderate fame from letting others
         know about a particular deed.  And even in these cases, the total
         audience has been limited to just a few hundred.

ISPNews:  Are you unaware of hackers who have in fact accessed information,
         then sold it or massaged it for money?

    CG: No, certainly not.  I am just acknowledging and defining a code of
         ethics.  We of the Legion of Doom tried to adhere to that code of
         ethics.  For example, members of the original nine who acted
         unethically were removed from the group.

ISPNews:  Do you believe that penetrating a computer system without either
         making changes or removing information is ethical, or a least is not
         unethical?

    CG:  At one time in the past I may have held that belief, but now I
         certainly must not, because the whole idea of being involved in the
         formation of my new company, Comsec Data Security, would show
         otherwise.

ISPNews:  So today, you believe that unauthorized entry is unethical.

    CG:  Exactly.  As a hacker, I didn't particularly hold that.  But as
         things such as invasion of privacy, even though I never caused any
         damage, and breach of trust became more apparent to me, I was able to
         step back, see the picture, and realize it was wrong.

ISPNews:  Can I conclude that you are speaking for you company and its
         principals?

    CG:  Yes, I am speaking for all of the principals.

ISPNews:  What are your views on the ownership of information?

    CG:  I feel that proprietary information, national-security-related
         information, information that could be considered a trade secret, all
         definitely have ownership, and access should be restricted.

         In the past, I felt that information that affected me or had some
         relevance to my life should be available to me.  I felt that
         information should be available to the people it affected, whether
         that be phone company information, credit bureau information, banking
         information, or computer system information in general.  I am saying
         this in the past tense.

         In the present tense, I feel that the public is entitled only to
         information in the public domain.  Information not available legally
         through normal channels is just going to have to be left at that.

ISPNews:  Do you believe that software should always be in the public
domain.?

    CG: No, I do not.  If I wrote something as wonderful as Lotus, or any of
         the Microsoft programs, or Windows, I would want people to pay for
         them.

ISPNews:  Then you do believe in private ownership of and protection for
         software?

    CG:  Yes, definitely.

ISPNews:  What are you views on current U.S.  Computer crime laws?

    CG:  I think that the current laws are too broad.  They do not make
         distinctions between various types of computer crimes.  I consider
         breaking into a computer akin to trespassing.  If someone simply
         walks across my lawn, I might be upset because they trampled my
         grass, but I would leave it at that.  If someone drives across my
         lawn and leaves big trenches, and then comes over and kicks down my
         rosebush, well that's another thing.  Then, if someone drives up my
         steps, goes through my house, through my kitchen, steals all my
         silverware, and then leaves, that's something completely different.
         And while these physical representations of trespassing can't be
         applied directly to an electronic format, distinctions are still
         necessary.

ISPNews: And the present computer crime laws do not make these distinctions?

    CG: I am no lawyer, but from my understanding they do not.  They need to
         be brought into focus.

ISPNews: If they were brought into the kind of focus you suggest, would they
         be fair and equitable?

    CG: Definitely, depending on the punishment that went along with them.  I
         don't think that people who own and operate computer systems would
         view someone who has logged into their system using a guest account
         that was deliberately left with no password to be as serious an
         intrusion as someone who got the system administrator password and
         then went through and deleted all the files.  I don't think that
         simple intrusion would be considered as serious as unauthorized
         penetration along with the wholesale theft and sale to a competitor
         of marketing information, and advertising plans, and financial
         projections for the next quarter.

ISPNews:  What are your views on security training for users?

    CG: People need to be taught what the computer operating system is and
         how it works.  After that, they need to establish some sort of
         channel by which information can be transmitted to others. Direct
         physical contact between communicating parties, covered by official,
         standard company procedures, is the best way to do this.

         People need to be aware that their account, no matter the level of
         importance, is a link in a chain that makes up the security of the
         system.  Information from one account can be used as a springboard to
         other, more powerful accounts.  All users within a network must
         understand that their information is just as important in the
         security chain as is that of the next person.

ISPNews: Given where you are coming from, why should a potential client trust
         you?

    CG: I know that is a natural question.  Just the very nature of creating
         a company should project an image that we are trying to come out of
         the shadows, out of the underground.  We are saying, "Look everybody,
         we've been doing this for a long time, now we want to help.  We have
         11 years of working information about how people compromise existing
         security, and we can help with your particular situation."

ISPNews: I am sure that you understand the natural suspicion that people have.

    CG:  No, that's what I don't understand.  If we at Comsec were out to
         compromise information from an existing company's computer network,
         we wouldn't have incorporated.  We could have done that, and someone
         else out there probably has already done so.  Then the information
         would be available to from one hacker to another.

ISPNews: Are you suggesting there is no system out there that you can't break
         into?

    CG: No, I'm not suggesting that.  But I am saying the vast majority can
         be penetrated.

ISPNews:  Which system is easiest to crack; and which is most difficult?

    CG:  It is hard to say which system is more inherently penetrable than
         another.  From the initial log-in, it's not the operating system;
         rather it's the system's operating environment that is the problem.
         Users may not have addressed security measures.  Certain types of
         security holes may not have been closed.  That's where a technical
         background comes into play: to understand the way the applications
         work; how different systems are accessed; to close holes in the
         system which have become apparent.  You have to deal with human
         factors and technical issues.  You must understand the way the
         computer works and the way programs are run.

ISPNews:  What is the best way to foil hackers?

    CG: It depends on the hacker.  There are different types.  Some people
         hack with modems.  The casual hacker may just stumble across your
         particular computer system, and may be foiled with something as
         simple as good external security.  He may be turned off by physical
         security devices such as a call-back modem, some sort of code access,
         or smart card.

         These measures will not stop a serious hacker who is after your
         company specifically.  In this case, you have to beef up security,
         and take additional steps to ensure the safety of your computer.  And
         you must make certain that security on the inside is as tight as on
         the outside.

ISPN Editor's Note:  Chris Goggans will respond, in every other issue of
                    ISPNews, to your questions on hacking computer systems.
                    His answers promise to be problem-solving, interesting,
                    and even entertaining.  We invite you to write Chris c/o:

                    "Hackers' Mailbag"
                    ISPNews
                    498 Concord Street
                    Framingham, MA  01701-2357
_______________________________________________________________________________