Mitnick Testifies on Telco's Security 217
Woefdram writes "Our favourite computer criminal (?) Kevin Mitnick testified in a case against Telco Sprint that their security was like Swiss cheese: full of holes. The story on SecurityFocus quotes Mitnick, saying, 'I had access to most, if not all, of the switches in Las Vegas,' and tells how he came up with a list of 100 challenge-response codes." We've written about this case before.
Why do it? (Score:2, Interesting)
Re:Why do it? (Score:2, Interesting)
Re:Why do it? (Score:5, Funny)
Can you prove it?
Wait here for a few minutes..
**a few minutes later**
Here are the passwords for your central switches, I had them on file in one of my drop points down the street. Lucky me that it was still there.
**laywer fumbles and swears**
Remember, Hackers are like boyscouts, they're always prepared.. they just prepare for alot more than preventing forest fires and walking old ladies across the road.
-GiH
-This isn't my dog, this is an aibo. My dog is years more advanced than this.
Re:Why do it? (Score:2)
And what's up with that question mark (?) after the word criminal? If Mitnick's not a criminal, I don't know who is.
-Russ
Re:Why do it? (Score:2)
Yeah he broke laws, he intruded on systems, he stole source code. He's not a criminal anymore though, because now he's an independant security consultant, and can essentially do almost everything that he did as a 'criminal' (except steal source code) and get paid to do it, all legally. As for source code, as a consultant he can look at it for security vulnerabilities, which was why the guy stole code in the first place.
He always had ethics about what he did, and he was sorely mistreated by the criminal justice system. To congressmen and the legal system a "Hacker" Is a terrorist, and they may as well be Witch Doctors too. Judges, police the FBI none of these guys had a clue about what mitnick could really do. It was all bad rumours, you'd think the guy had a modem in his head, because they expected him to be able to send faxes and access the internet from an ordinary jail phone.
Mitnick found a way to hack while obeying the law, and I seriously doubt the guy wants to deal with the crap that the legal system throws at (cr/h)ackers again.
Should they (Score:1)
or this is a company policy to keep system insecure to gain more PR from hacker incidentes?
Re: (Score:3, Interesting)
Re:What I want to know... (Score:5, Informative)
No. He's already been tried for this specific crime - it would be double jeopardy. (Yes, like the movie with Ashley Judd, only with less sex appeal, since there's no women's prison involved.) You can't be tried for the same crime twice. If you commit two murders you can be tried twice, but they can't try you twice for the same murder.
Re: Double Jeopardy (Score:1, Interesting)
It's like saying that if you rob a bank the first time, you're going to jail. But each time you rob it after that, you can't be tried because you've already been tried once. Not likely, you're still going to jail again and again.
Re: Double Jeopardy (Score:1)
Re: Double Jeopardy (Score:2)
Land in jail for 20 years.
Sue goverment, get 20 million or so.
Land back in jail for another 20 years.
Use eBay extensively.
That'd be the pattern right?
Re:What I want to know... (Score:2)
Re:What I want to know... (Score:2)
Re:What I want to know... (Score:2)
Correct, he was absolved of criminal wrongdoing. He was then sued in civil, as opposed to criminal, court, by the famlies of the victims, and was found responsible for their 'wrongful deaths.' Or some such, I forget the actual wording. But the point here is that he was found civilly liable for the deaths, if not criminally guilty.
So, similarly, Mitnick might not be criminally liable for his actions, but they might still be able to take him to civil court and sue for lots of money.
Re:What I want to know... (Score:2)
Re:What I want to know... (Score:2)
Re:What I want to know... (Score:1)
Re:What I want to know... (Score:1)
But they must be pursued at the same time. As an example, the prosecutors did not have 400 or so attempts to try McVeigh for blowing up the building, even though he committed 400 or so murders in that event.
Re:What I want to know... (Score:2)
In the case of multiple homicides especially prosecuters will hold back counts if they would not increase the penalty and leaving them out do not affect the case. For example, if a mother drowns her 5 children you first carge and try her for 2 counts of murder. If for some reason she is aquitted you can charge her with the other counts. There is no double jeopardy in this case.
Re:What I want to know... (Score:2)
Yes. That is absolutely correct.
In the case of multiple homicides especially prosecuters will hold back counts if they would not increase the penalty and leaving them out do not affect the case. For example, if a mother drowns her 5 children you first carge and try her for 2 counts of murder. If for some reason she is aquitted you can charge her with the other counts. There is no double jeopardy in this case.
Nope, you are absolutely wrong here. You must charge all of the crimes following out of a single act at the same time. You cannot bring two charges against a mother and then see if she is convicted on those two, and then file for the other three if she got off. McVeigh was slightly different because there were both state and federal claims against him. The eight murders he was first convicted of were brought in federal court. The federal DA couldn't charge him of the state law crimes of murder, so there is no due process violation, and the trials must be difurcated.
Re:What I want to know... (Score:2)
if two people commit a crime together, they are tried together or separately depending on how the prosecutors think the outcome might be. maybe one will squeel on the other and as a result might be tried separately under lesser charges.
Re:NOT Double Jeopardy (Score:3, Informative)
Re:What I want to know... (Score:4, Informative)
"With the five year statute of limitations long expired, Mitnick appeared comfortable describing with great specificity how he first gained access to Sprint's systems..."
Re: (Score:2)
Re:What I want to know... (Score:2)
Re:What I want to know... (Score:2)
How many other telcos do? That's my point.
Re: (Score:2)
Publicity grubbing... (Score:4, Interesting)
I liked this quote "The only way I know that this is a Nortel document is to take you at your word, correct?," asked Riley. "How do we know that you're not social engineering us now?" - now *that* guy is thinking correctly!
Re:Publicity grubbing... (Score:4, Insightful)
Mitnick suggested calmly that Sprint try the list out, or check it with Nortel. Nortel could not be reached for comment after hours Monday Perhaps he knew that spring/nortel couldn't be reached. But you should still at least include the response if you're gonna quote something like that.
Re:Publicity grubbing... (Score:3, Insightful)
Re:Publicity grubbing... (Score:3, Insightful)
He left a trail a mile wide...
Re:Publicity grubbing... (Score:5, Interesting)
Under the circumstances, I can't say I blame him. The man isn't allowed to touch a computer. Nowadays that means he can't even work at McDonalds.
Cashing in on his celebrity is the only carreer option the guy has.
Re:Publicity grubbing... (Score:2, Insightful)
-Nano.
Re:Publicity grubbing... (Score:2, Insightful)
Re:Publicity grubbing... (Score:2, Insightful)
Why should we surprised by whoring notorious characters on the tech side?
Re:Publicity grubbing... (Score:2)
Of course there are. We don't know who they are though because they haven't been caught.
Re:Publicity grubbing... (Score:2)
Now a days your not allowed in the lobby unless you have a pass card.
No doupt based on the kinds of cracks he was found guilty of he used socal hacking techniques.
He may be forbidden to use his technical skills but there is nothing keeping him from using the human conterpart.
Plead the Fifth! (Score:3, Funny)
*FREE KEVIN*
Re:Plead the Fifth! (Score:1)
The real speech... (Score:4, Funny)
(yeah, my
Sentence (Score:3, Interesting)
Re:Sentence (Score:2)
Re:Sentence (Score:1)
Being forbidden to do any computer related role makes it hard to maintain any job these days. Actually he cannot even sit at a counter nor a bus driver... almost any device has a omputer in it these days... I haven't read the minutes of Kevins trials but I think the sentence was a bit less restrictive than that.
Re:Sentence (Score:2)
And besides, the judge knows the system. He wouldn't even be allowed to testify in court if it broke his parole.
Re:Sentence (Score:4, Interesting)
"Once he is released from prison, Mitnick will be on supervised release for three years, during which time his access to computers and his employment in the computer industry will be severely restricted."
While testifying in a case isn't technically work in the computer industry, consulting definetly would be. Maybe this is outside the scope because we're talking about telco equipment and not computers per se (which, coincidentally, goes back to Mitnick's roots as a marginally talented phreaker and a decent social engineer)?
Or perhaps Mitnick's just an outright idiot. I don't recall him getting wailed on by Sprint during his legal proceedings, so I'm not certain that he's exempted from prosecution by way of double jeopardy. A curious thing, this testimoney.
Re:Sentence (Score:1, Informative)
Re:Sentence (Score:1)
Of course, maybe that's what the delay they had in getting him on the stand was all about. Hard to tell...
Re:Sentence (Score:3, Informative)
Re:Sentence (Score:2)
I re-interate. It was my experience that Kevin clears all of his significant activities that could possibly be construed as "consulting" with the individual responsible for supervising his release. At this time I worked with him, I do believe he even had to clear visits to his mom (a LasVegas resident) because the trip exceeded his residency area boundaries.
Kevin's participation in this proceeding could ONLY happen if he had permission. With only 0 years, 6 months, 24 days, 8 hours, 43 minutes, 25 seconds left to go, why Fsck this up now?
Re:Sentence (Score:2)
Kevin works very closely with those monitoring his "Supervised Release". Kevin is very serious about having his life and freedoms returned to him.
I worked with Kevin for several months on his Radio Show, "The Darkside of the Internet" on KFI, Los Angeles.
Re:Sentence (Score:2)
Kevin is an amazing guy. One little known fact about him is that he can dial a phone faster than I thought humanly possible. He has an almost photographic memory for phone numbers, IP addresses, URLS and other snippets of information.
Just has to get the parole officer to approve it.. (Score:2)
He's a security consultant now, and I'm sure that he can get work related use of computers approved, as long as the company is wiling to keep mitnicks activites on computers as detailed as law enforcement requires.
And if he has to agree to run everything through a keylogger, I'm sure he's not going to break any laws while using a PC for supervised work related activities.
You have to wonder. (Score:3, Interesting)
Re:You have to wonder. (Score:2)
Re:You have to wonder. (Score:1)
Re:You have to wonder. (Score:2)
BTW, this testimony is a real-world example of what "white-hat" hacking is supposed to be all about -- exposing security weaknesses that might be exploited by others. Of course, Mitnick might have had his black hat on back in the day when he was doing it.
Have to wonder. (Score:1)
Not surprising (Score:5, Interesting)
Vendors to blame (Score:3, Interesting)
Had the same problem with a bunch of calling card switches installed by PCM (Priority Call Management - somewhat of a bigger name in that world).
Root passwords were "root", no OS patches (SCO & QNX) were ever applied since "they hadn't tested whether their software would interoperate with a patched version of the OS",
Course, then there's the time we were paying Lucent $75,000 to install voice access concentrators and they complained that they couldn't telnet to them. Lucent set 200.200.200.0/24 addresses on all the systems they built - just made up a number - and couldn't figure out why the numbers wouldn't route across the open Internet. Boy did I get a stupid look when I asked the Lucent people what the Comite Gestor no Brasil thought about their address scheme... (whois 200.200.200.0@whois.arin.net)
Really, how do these folks stay in business?
*scoove*
Re:Vendors to blame (Score:2)
Maybe that's why we aren't "beaming" up, telecommuting on Mars, or any of the other cool futuristic stuff we should've done by now --- because we're dragged down by the Norms.
Re:Vendors to blame (Score:2)
Right now it looks like some of them might not.
It's probably an issue of how easy it would be for someone to switch supplier. Even though modern telephone systems are highly modular you can't mix and match bits from different suppliers.
Re:Another example (Score:2)
Include a little ditty on secure passwords in the preamble to the install instructions.
An interesting turn-about (Score:5, Interesting)
What is most vital is that in this case, unlike other previous Mitnick cases, the telco is arguing that Mitnick didn't break in while Mitnick is insisting that he did. Mitnick is offering proof in the form of documents and passwords and the Sprint of Nevada lawyer is saying that the information Mitnick is bogus or publicly available. This is such an exact turnaround from the last legal tangle that Mitnick was in that I gotta wonder if it's even the same universe.
Does this have any relevance to legal cases outside the Munoz "Vegas escort" case? I don't know, but I could see it happening: Hollywood lawyers calling on DeCSS authors and users, arguing that the software they have doesn't actually promote piracy. Could be interesting!
Re:An interesting turn-about (Score:2)
Security through Obscurity (Score:2)
'nuff said
- SWM
from a former Nortel employee... (Score:4, Insightful)
This is a common problem in this industry. Having complex systems when you're the defacto standard makes a great revenue stream in your consulting and training systems, but kills the reliability of said systems. Nortel/Cisco/IBM never take the fall for it however, because they can just say "well, you didn't configure it right" and Sprint/etc can't even argue - it would take 2 years and 10 consultants to even find out.
Re:from a former Nortel employee... (Score:3, Insightful)
However, very few systems are proof against social engineering, encryption or not.
Re:from a former Nortel employee... (Score:5, Insightful)
The DMS-100s were broken the good old fashioned way -- use a war dialer to find the dialup number, then call the switch directly. Once connected, try the obvious passwords first (either admin/admin or admin/NORTEL_DEFAULT_PASSWORD, which Mitnick had learned from Nortel docs)
Deander2 got it right -- Nortel designed an absurdly complex product, and was unmotivated to clean house because they were able to rake in the consulting bucks. WHEN (not if) this comes back to bite a client in the butt (like it did with Sprint) Nortel takes no heat for it, and in fact most likely gets even MORE consulting dollars for a hasty clean-up effort.
Re:from a former Nortel employee... (Score:2)
From what I know of Nortel, I'd bet that the company ran courses that laid out exactly what you should do to secure the equipment. Its no use these companies going crying to their mommies because they didn't use the flipping equipment properly. Kevin RTFM and they didn't. So it's in the manual too.
The use of default passwords wasn't out of line with the time. Nowadays you'd have to explicitly switch it on to get it to work. Back then, probably not. Heck, over the weekend I was reading about the Alcatel ADSL modem. Apparently the tftp server on it doesn't even HAVE a password- that modem looks wide open to me. And that wasn't designed 15 years ago, more like 2 or 3. Who's more culpable?
The customer. They bought the equipment, they specified the equipment, they didn't set the passwords on the equipment, they didn't read the manual that comes with the equipment. They didn't make a big fuss to Nortel about how insecure the equipment was. It certainly wasn't the customers fault that they were hacked, but they did everything except hold the door open for him.
Re:from a former Nortel employee... (Score:2)
Since the telephone numbers of the configuration modems were apparently random then most likely someone had do do some sort of configuration. It's not as if using a dialup modem is the only way to remotely configure the system anyway. Alternatives would be a private IP or X25 network or a direct line to a NOC. Indeed using a dialup connection has the problem that a misconfiguration could disable the dialup line.
Heck, over the weekend I was reading about the Alcatel ADSL modem. Apparently the tftp server on it doesn't even HAVE a password- that modem looks wide open to me.
The TFTP protocol dosn't use passwords. The question would be more "why does an ADSL modem need a TFTP server in the first place?"
Re:from a former Nortel employee... (Score:2)
It isn't insecure. It's only when the customer wires it up to the public telephone networks, without first bothering to set the passwords up that it becomes insecure.
And for what it's worth, your Alcatel DSL router isn't a case of bad design.
Yes it is, no default passwords, tftp server you can't switch off; oh and did I forget to mention the so called 'cryptographic' backdoor?
For a DSL router this isn't a big deal if you don't accpet connections on the WAN port.
It doesn't but it still is a big deal because there is a way of bouncing packets off the LAN and accessing the tftp server that way.
If I recall correctly, TFTP doesn't have a password scheme. The first T is for trivial. There's no authentication and it's sessionless.
Ok... But what you seem to have missed is why did they have a tftp server at all... why IS there a tftp server in the box in the first place? Oh yeah, one file is readable that might interest you, via the tftp server you can do little things like read/set the password file.
Re:from a former Nortel employee... (Score:2)
Oh right, if you redefine the English language then of course you are completely correct. Normal people call plugging the mains lead in the back, and pressing the power button "turning it on". Connecting a node to the public networks is referred to as "turning it up"; but not in your world apparently. Oh yeah, and that Alcatel ADSL modem is "secure" in your terms too. Way to go!
p.s. you seem to have an axe to grind- when were you fired from Nortel?
Re:from a former Nortel employee... (Score:2)
So then you're not talking about the defaults, you're talking about authentication infrastructures; and then you have to get customer buy in that its even a good idea. It all gets hugely messy. It's worth doing, but persuading people that, is hard.
Re:from a former Nortel employee... (Score:2)
The telco managed to read the rest of the installation manual. They must have since they have hardware people can use to make telephone calls with. As opposed to a pile of hardware which dosn't do anything useful.
Sprint used the DMS the way Nortel intended the box to be used: Powered Up, Connected to the public network, switching telephone calls.
So Nortel shipped Sprint some hardware which was pre configured, they also have access to the rest of Sprint's network to configure it to realise that the new box was there? Or did Nortel ship Sprint some hardware which Sprint needed to configure?
If Sprint gave Nortel access to their network then it was their responsibility to ensure that they did so in a secure way. If Sprint configured their own hardware then it's their responsibility to know what they were doing.
Re:from a former Nortel employee... (Score:2)
"Turn it on" would simply be a case of applying power to it. (Which in the case of telephone switching equiptment is typically 50V DC from a battery.)
If they do so without taking an additional step of setting the passwords, the system is vulnerable. The default state is what you get PRIOR to taking the additional steps.
Actually it's even worst than that. Since you can't simply plug it into the telephone network and expect it to work. You'd first need to configure both it and other bits of the telephone network in order for it to do anything at all.
Saying that it's secure until you wire it up and turn it on is absurd.
If it's simply wired and powered up then it is perfectly secure. It's once it has been configured to be part of the telephone network and such things as dialup remote admin ports have been configured that it becomes insecure.
Re:from a former Nortel employee... (Score:2)
The article explains that employees were willing to give away "secret" phone numbers and challenge/response pairs to a stranger over the phone.
Encryption won't help with that. Token-based authentication won't help much -- "Hi, this is system security, we're upgrading the smart card system, could you please help us test by inserting your card and going to this URL?"
I have to quibble about the awareness of security in the telco industry, though. Phone system security has been a headline issue since Captain Crunch. I'm not willing to excuse anyone who used an unlisted phone number and a cleartext password to "secure" a mission-critical system. They knew they'd be attacked.
Re:from a former Nortel employee... (Score:2)
In which case the owner of that URL learns nothing useful about the token. Assuming that the token has a crypto processor on board capable of public-key signature, it neatly prevents this attack. The web server sends a random string, the token signs the string with its private key, and the web server validates the signature with the token's public key. The web server does not gain the ability to impersonate the token.
Re:from a former Nortel employee... (Score:2)
This has nothing to do with the internet. Configuration was apparently by a dialup modem on an obscure telephone number.
Re:from a former Nortel employee... (Score:2)
Re:from a former Nortel employee... (Score:1)
Re:from a former Nortel employee... (Score:2, Informative)
a.c.
Incredible article. (Score:1)
Telco myths resolved. (Score:2, Funny)
After working for several Fortune infinity companies, I have come to the conclusion of my $5,000,000 granted study that anyone able to pick up a telephone is a susceptible hacker. It is about time the telco in every neighborhood started locking down their systems with finger-printing and place a mark on the wrist or hand of every telephone subscriber that he may not buy or sell anything over the phone without this mark. With further granted jurisdiction, the telco should be able to establish a real-time video and audio presence in the homes of each and every telco subscriber and relay this information across satelites so the whole world may be allowed to intrude on anyone's privacy in attempt to prevent people from worshipping anyone but the telco. Kevin Mitnick shall, upon appearance, be put to confinement in a maximum security stone cave, a rock rolled in front of it, and the cave sealed with wax so the telco will know whether the prison had been disturbed within any 3-day period. This is the only way people, and the telco shall have rights to your first post and first born. Anyone that has not lathered sheep's blood above their doorway shall have their building demolished by the telco. As of yesterday, the staff of slashdot.org and the users of the United Nations' oxygen on planet earth must comply or face harsh punnishment from internation agencies that don't like United States citizens. Thankyou for your time.
Sincerely,
Bob Grover
What's the '?' for... (Score:3, Insightful)
Is there any doubt that Mitnick is a criminal?
Since is when is cell phone cloning, carding, and cracking legal?
Since when is running from the law (he was a fugitive) legal?
I think there's no question as to the legality of Mitnick's actions. Weather or not the legal system handled the case correctly is another story, but he is definitely guilty of those crimes.
Re:What's the '?' for... (Score:2)
Re:What's the '?' for... (Score:2, Insightful)
"Our favourite (?) computer criminal...."
Re:What's the '?' for... (Score:2)
Now I'll be the first to admit that yeah, Mitnik screwed up. He made several mistakes and more importantly, broke the law. However, he more than paid for it by the inhumane (at best) treatment that the law system gave him[1], even when he admitted his guilt. The courts used him as an example of how they treat hackers who get caught.
It's yet another perfect example of what's wrong with the legal system in this country.
Mitnik's "officially" done his time, but thanks to the power of the government, media, and press, he'll continue be prosecuted by the public for the rest of his life.
1) Details of his unfair and unconstitutional treatment can be found all over the internet from independent resources. The government still won't admit that they did anything wrong and you can bet the press wouldn't challenge that.
Re:What's the '?' for... (Score:2)
Complete with a realtime ticker of how long until he's a free man.
Hmm... (Score:4, Insightful)
Commissioner Escobar Chanos accepted the list as an exhibit over the objections of Sprint attorney Patrick Riley...
So here's a question - since this password list is now an exhibit in a public trial, what's to stop someone from getting the list through Freedom of Information and using it to further compromise Sprint's network?
It would be like a sinister version of what the Fishman affidavit [peghole.com] did for Scientology. Any lawyers want to weigh in?
The FOIA doesn't work that way (Score:3, Insightful)
The Freedom of Information Act covers government records, it doesn't apply to evidence presented at trials. Judges can and do seal evidence, especially when it contains confidential information like trade secrets. Furthermore, it's a federal statute and doesn't cover state governments.
Sorry, just because something was submitted as evidence doesn't mean you can get it.
Also, even when the FOIA does apply, the feds can hold up the process for a decade or more.
Not a Trial? (Score:2)
Kevin Poulsen (Score:2)
There's something ironic about Kevin Poulsen writing an article in a mainstream magazine about how Kevin Mitnick is testifying for the good guys in a hacking case. Kind of reminds me of the aging hackers in "Sneakers"... :-)
Re:Kevin Poulsen (Score:2)
On the good side of the Mafia... (Score:3, Interesting)
Sprint's security DOES suck, first hand story. (Score:5, Interesting)
I live in Arizona, and I have four Sprint PCS phones: One for myself and three are for my "on-call" employees. These phones are on 24 hours a day for obvious reasons.
A disgruntled ex-employee in Delaware (who had been fired years ago), who happens to know my phone number, strolled into a Sprint PCS store in Kentucky, and asked the proprietor (or rather, the idiot working there) to bring up my account information. Now remember: All this person knew was my phone number. The Sprint PCS idiot happily punched up my account and showed the unidentified person my account details: All my phone numbers, numbers that had been called on these phones, how much my bill was... it goes on and on. In short, someone who only knew my phone number got access to all my "private" information, no questions asked.
I discovered this when the person in Delaware (who was in Kentucky at the time) called and told me, in the form of a threat. I immediately called the Sprint PCS customer support line and told them of the problem. They had some explaining to do, and I expected them to immediately change my phone numbers and account information. They refused, and explained that any such breach of security was impossible: The gentleman in the store should have asked for an account password. If the customer didn't know the password (or so claimed the customer support woman), the account information could not be accessed. This made sense, as computers do ask for passwords before showing any protected information. So I assumed the ex-employee was lying to annoy me, and dropped the issue.
Later that night, angry employees began calling me repeatedly and complaining of crank calls. Then, I got a call from the disgruntled shmoe in Delaware. Turns out, my assumption had been wrong. I came to the conclusion that private account information is protected by nothing more than a company policy: The employees in the stores can bring up any account, and the password is DISPLAYED along with all the other information. They're SUPPOSED TO ask you for the password before giving out any information. That's one hell of a security system, eh? So I immediately called Sprint PCS's customer support thing again, but this time, when they answered, I demanded to talk to a supervisor. The conversation went something like this:
Sprint PCS lady: May I ask about the nature of the call?
Me THE NATURE OF THE CALL IS SPRINT PCS GIVING OUT MY PERSONAL INFORMATION TO STRANGERS WITHOUT MY CONSENT!
Sprint PCS lady: One moment...
At this point, a supervisor lady answered, and I explained (rather angrily, I may add) exactly what happened, and DEMANDED that they change all my phone numbers IMMEDIATELY. (I was doing this as an immediate action, to be followed by any number of things, including the high possibility of cancelling my account altogether, followed by strong legal action.) Now the supervisor freaked out and got a bunch of people on my case within minutes. She explained that my conclusion about their security had been correct (that nothing is password protected at all), but that I could optionally make my account "high security", which basically means that certain other information (like a social security number or something) is needed before account details can be accessed. So I demanded that my account immediately be made high security. Then, she began the process of changing my phone numbers, and mentioned that it would cost some amount of dollars to make the change. At that point, I became pissed and said, "I'M STILL CONSIDERING WHETHER I'M GOING TO SUE YOU AND YOU'RE GOING TO CHARGE ME TO CHANGE THE PHONE NUMBERS, AFTER YOUR COMPANY SCREWED UP?!?!?!?" She realized the error of her ways and waived the fees. I continued to raise hell with Sprint PCS for an hour or so, making DAMN SURE that no errors would occur in my next bill (because every time a change is made with them, errors show up in the next bill or two and you have to call and bitch about it, especially when you have multiply phones), and that international calls won't be disabled on the phones (because enabling international calls is a long and complicated process with them, one that raised my blood pressure to the sky too), and that various other problems won't pop up. In all, they were a bit helpful, considering they did screw me over.
But anyway, that was MY story of how much their security sucks.
Re:Sprint's security DOES suck, first hand story. (Score:2)
shouldn't that be... (Score:2, Funny)
jealous script kiddie.
Re:Why is he a free man? (Score:2, Insightful)
For example...you are miffed at Kevin for what he did (as am I) but would you feel the same way if someone were arrested for hacking a CueCat scanner and making software that didn't report to the company, then left "to rot"? Or would you be shouting that the government was commiting a travisty of justice?
You can not have it both ways...It has to be fair to all or fair to none.
Phoenix
(and yes I know that it frequently doesn't live up to the ideals on the Constitution, but let's not help make it worse Ok?)
Actually (Score:2)
Hacking the Phones, listening in on private conversations, using blackmale, stealing credit cards, etc. harms us all.
Your moral equivalancy doesn't hold up.
Re:Living In Las Vegas (Score:2)
What makes you think that this isn't hacking the systems on his own? A security hole is a security hole, whether it's engineered or configured into the switches, or whether its because of blabbermouth telco employees. Who the hell set up the arrangement where Nortel could call Sprint to get passwords over the phone in the first place? Sheer boneheadedness, and an obvious security hole. (Even without 20/20 hindsight; where I work you mention your password to nobody under any circumstances even in secure areas, never mind over the phone!)
"Social engineering" is a skill too, and as Mitnick demonstrates it's just as valuable as technical skills to a cracker. Don't belittle it. And don't give out any of your passwords over the phone either!