FOR IMMEDIATE RELEASE CRM
FRIDAY, MARCH 29, 1996 (202) 616-2771
TDD (202) 514-1888
FEDERAL CYBERSLEUTHERS ARMED WITH FIRST EVER COMPUTER
WIRERTAP ORDER NET INTERNATIONAL HACKER CHARGED WITH
ILLEGALLY ENTERING HARVARD AND U.S MILITARY COMPUTERS
WASHINGTON, D.C. -- The first use of a court-ordered wiretap on
a computer network led today to charges against an Argentine man
accused of breaking into Harvard University's computers which he
used as a staging point to crack into numerous computer sites
including several belonging to the Department of Defense and
NASA.
The wiretap, on the computer of Harvard's Faculty of Arts
and Sciences during the last two months of 1995, resulted in the
filing of a criminal complaint against 21-year-old Julio Cesar
Ardita of Buenos Aires. An arrest warrant has been issued for
Ardita.
Attorney General Janet Reno and United States Attorney Donald
K. Stern of the District of Massachusetts said a wiretap order,
typically employed to monitor telephone conversations of
organized crime and drug suspects, was used to trace and identify
the illegal intruder while preserving the confidentiality of
legitimate communications.
The Attorney General said Ardita was believed to have
illegally entered computer systems at additional U.S.
universities, including Cal Tech, the University of
Massachusetts, and Northeastern University, and sites in other
countries such as Korea, Mexico, Taiwan, Chile and Brazil.
She said Ardita obtained access to computer systems
containing important and sensitive information in government
research files on satellites, radiation and energy related
engineering. Ardita was not accused of obtaining classified
information related to the national security.
The intruder was identified by using a specially configured
monitoring computer that conducted the complex searches needed to
isolate his activities.
Law enforcement agencies have done electronic surveillance
on computer systems in the past with the consent of the users.
Court authorization was deemed necessary in this case because the
Harvard computer system does not post a banner informing users
who log onto the system that their communications might be
monitored.
"This is an example of how the Fourth Amendment and a court
order can be used to protect rights while adapting to modern
technology," said Attorney General Reno.
"This is doing it the right way," she said. "We are using a
traditional court order and new technology to defeat a criminal,
while protecting individual rights and Constitutional principles
that are important to all Americans."
According to the complaint, the international hacker invaded
the Harvard computer through a broadly accessible modem bank and
the Internet, and there stole a series of accounts and passwords.
Using these stolen accounts as his base, Ardita gained
unauthorized access to computers at various U.S. military sites
across the country, including the Navy Research Laboratory,
NASA's Jet Propulsion Laboratory and Ames Research Center, the
Los Alamos National Laboratory and the Naval Command Control and
Ocean Surveillance Center. He also tried repeatedly but
unsuccessfully to enter the Army Research Laboratory computer
system.
On December 28, 1995, Ardita's computer files and equipment
were seized at his home in Buenos Aires by authorities acting on
information supplied by Telecom Argentina which U.S. authorities
had contacted for assistance in tracking the intruder.
"This is a case of cyber-sleuthing, a glimpse of what
computer crime fighting will look like in the coming years," said
U.S. Attorney Donald K. Stern. "We have made enormous strides in
developing the investigative tools to track down individuals who
misuse these vital computer networks."
The investigation consisted of three phases:
First, in late August, 1995, the Naval Command and Control
Ocean Surveillance Center detected an intrusion into its computer
network, which contains sensitive, but not classified, Navy
research files on such things as aircraft design, radar
technology and satellite engineering. The intruder was
discovered to have broken into other computer networks, as well,
from the Harvard Faculty of Arts and Sciences (FAS Harvard) host
computer. Initially, it was impossible to identify the intruder
or where he was coming from. The FAS Harvard computer is widely
accessible to approximately 16,500 account holders through modems
and through the Internet, and the intruder was stealing and then
using many different Harvard account holders' passwords.
However, according to the government's complaint, analysis
of the intruder's electronic habits revealed certain patterns.
The Naval Criminal Investigative Service did a painstaking
analysis of the intruder's activities. Investigators were able
to identify words and phrases used by the intruder not commonly
used in the same manner by legitimate users of Harvard's network.
The patterns included signature programs he used to intercept
passwords, pirated accounts he used as a basis for his criminal
activity, and sets of overlapping computer systems he seemed to
break into and work through.
"These patterns of behavior provided us with a general
description of the intruder -- we knew his modus operandi, his
hangouts, his patterns of computer speech, the computer tools he
used for his break-ins, and his disguises," said Stern.
In the second phase of the investigation, the Naval Criminal
Investigative Service and the FBI obtained court authorization
from a federal judge in Boston to conduct electronic surveillance
of the intruder's communications to and from the FAS Harvard host
computer.
"We intercepted only those communications which fit the
pattern," explained Stern. "Even when communications contained
the identifying pattern of the intruder, we limited our initial
examination to 80 characters around the tell-tale sign to further
protect the privacy of innocent communications."
During the course of this electronic surveillance, the
intruder was observed referring to himself by the moniker
"griton," which is Spanish for "screamer." He also was
repeatedly observed accessing the FAS Harvard host computer from
four computer systems in Buenos Aires.
In the third phase of the investigation, the Department of
Justice confirmed the real identity of "griton." Among other
things, investigators discovered that defendant Ardita had used
the name "griton" years before on a computer bulletin board.
That old bulletin board had been posted publicly on the Internet
by its creator, and so was accessible to investigators. Ardita
advertised his own hacker bulletin board, "Scream!," in his
posting and listed a telephone number at his residence where the
Scream! bulletin board could be also accessed. Records in the
United States and Argentina were analyzed, which further
confirmed Ardita's telephone line in Argentina was being used to
unlawfully access the Harvard system.
In addition to facing U.S. felony charges, Ardita is under
investigation in Argentina. The two governments have been
exchanging information.
"We will work with our foreign counterparts to achieve
justice," said the Attorney General. "International teamwork is
being applied to international crimes," she said.
In the United States, the charges are: fraudulent possession
of unauthorized computer passwords, user identification names,
codes and other access devices; destructive activity in
connection with computers; and illegal interception of electronic
communications. These are contained in a criminal complaint
issued by U.S. Magistrate Judge Marianne Bowler.
"This case demonstrates that the real threat to computer
privacy comes from unscrupulous intruders, not government
investigators," said Attorney General Reno. She complimented the
agents who worked on the case for developing procedures that
assured that monitoring would be focused on the intruder's
unlawful activities.
This case was investigated by Naval Criminal Investigative
Service and the Federal Bureau of Investigation. Stephen P.
Heymann, Deputy Chief of the Criminal Division of the United
States Attorney's Office for the District of Massachusetts, is
prosecuting the case, and supervised the electronic surveillance
with the assistance of Department of Justice Attorneys Marty
Stansell-Gamm of the Criminal Division's Computer Crime Unit and
Janet Webb of the Electronic Surveillance Unit of the Criminal
Division's Office of Enforcement Operations.
In Boston, additional information can be obtained from Joy
Fallon or Anne-Marie Kent, 617-223-9445.
###
96-146
NEWSLETTER
|
Join the GlobalSecurity.org mailing list
|
|