Masters of Deception: The Gang That Ruled Cyberspace

Read Masters of Deception: The Gang That Ruled Cyberspace Online

Authors: Michele Slatalla,Michele Slatalla

Tags: #Computer security - New York (State) - New York, #Technology & Engineering, #Computer hackers, #Sociology, #Computer crimes - New York (State) - New York, #True Crime, #Social Science, #Computers, #New York, #General, #Computer crimes, #Computer hackers - New York (State) - New York, #Political Science, #Gangs - New York (State) - New York, #Computer security, #Security, #New York (State), #Gangs

BOOK: Masters of Deception: The Gang That Ruled Cyberspace
9.64Mb size Format: txt, pdf, ePub
Prologue

You get a crazy-fast busy signal, like on Mother's Day when all the long-distance lines are jammed. Dial again. Busy. Dial again. Busybusybusybus

Slam it down.

The phone system is crashing. The giant computers that route AT&T customers' long-distance calls, computers called switches, are shutting themselves down, behaving idiotically in a way that only computers can. Switches are the building blocks of the phone network, and when they start throwing electronic tantrums, the world stands still to watch. There's no choice.

It's happening today, all across America, as the phone company slogan "We're all connected" took on a new, darker meaning. Suddenly we're all disconnected. It's January 15, 1990, and millions of people are hopelessly jabbing the keypad, dialing the 1, dialing the three-digit area code, dialing the seven-digit number, waiting, getting a busy signal, trying again, getting a recording. One hundred fifty million long-distance calls a day travel these phone lines, threading through a massively intricate complex of earth-orbiting satellites, microwave transmitters, and millions of miles of fiber optic cable webbed across the globe. Thick-sheathed bundles of cable tunnel under the Atlantic Ocean. Long spindly strands are buried beneath railroad tracks or strung from utility poles that crisscross the Great Plains. The signals they carry all converge on some of the most powerful and delicate computers on the planet. So much could go wrong, but AT&T has never failed so spectacularly before, never let its customers down. No natural disaster has ever compromised the phone company's dependability. A few weeks ago, an earthquake measuring 7. 2 on the Richter scale collapsed freeways in California, and the phones still worked fine.

But not today. AT&T estimates that half of its customers' calls aren't getting through. Seventy-five million calls blocked.

And the failure was sudden. At 2: 25 P. M., one switch failed. Just one at first. Who knew why? It sent out a distress message to another switch, which should have been able to take over. But instead, the second switch went crazy, too, unable to cope with the bad news. It had a cascading effect, as one switch after another took itself out of service. And it was getting worse. Switch after switch after switch.

What caused this damage? What force is so powerful, so dangerous, so heedless, that it crashes a nation's communications system? In AT&T's New Jersey headquarters, dozens of technicians and bosses and engineers and control-center specialists all want the answer. They stare at the world maps, two stories tall, that line one wall in the control room. The maps suddenly flash red in unison, screaming emergency alert. No warning. No gradual escalation.

One minute, the phones work. The next, parts of the Northeast are out. Businesses that depend on the phones are crippled, they're missing tens of millions of dollars in sales. Customer-service departments are sending their 800-line representatives home early; people are panicking because they can't get through to their elderly parents in other states; AT&T operators are giving out Sprint and MCI access numbers to frustrated customers; AT&T spokesmen are calling for calm.

And two teenagers in Queens are wondering if it's all their fault.

Mark keeps vampire hours, cramming-for-exam hours, Late-Late-Late Show hours. Hacker hours. In the middle of a Monday afternoon, Mark should be at his internship, which he has to complete unless he wants to drop out of yet another high school. If not at work, Mark should be asleep. Mark definitely should not be on the phone, calling Paul.

"Did you hear?" Mark says. "AT&T crashed. "

"What?" says Paul. "What did you say?"

"AT&T crashed. It's on the news. "

Paul sits upright on the red-and-black velvet couch in his mom's living room, startled awake from a nap, already knowing there's no way he'll ever go back to sleep. Not today, not tonight, probably not for the rest of his life. AT&T crashed. Oh God.

Paul's scared. Are they saying hackers did it? Did he do it? Could he have done it? He doesn't think so, doesn't want to believe it, has never in his life wanted to believe anything less. But the fact remains that the other night Paul was sitting at the computer in the basement of his family's house in Cambria Heights, the computer clandestinely hooked up through the phone line to a sensitive portion of AT&T's system.

Paul had diddled with the AT&T routing tables on a local switch owned by New York Telephone, typing first this command and then that one in an attempt to understand how the phone system works. This is what Paul likes to do. The routing tables are like train schedules that a New York Telephone switch uses every time a longdistance call comes in. The switch routes each call out over the proper carrier

AT&T, MCI, Sprint

so that the call can shoot instantaneously across

the country and ring the phone in your grandma's house in California. It's a fabulously complex process, and no hacker in America could resist fooling with it if he knew how to get inside the system.

Of course, very few hackers could get past the security in the first place.

Paul had been sneaking in for months. He was the quiet programming genius behind the hacker gang known as the Masters of Deception. And so had Mark, the teacher in MOD, who knew more about phone company computers than just about anyone. A few of the other guys in the group might have been able to do it, too. Like Eli, the handsome smooth-talker. Or John, a newcomer and the only black kid in the gang. Or Julio, John's younger sidekick from the Bronx.

But who could be responsible for damage like this? No self-respecting computer hacker would ever destroy anything. No hacker would ever purposely hurt the phone system. Paul just wanted to look around. He just wanted to learn more. He'd know it if he'd done something bad. Wouldn't he?

And what about Mark? In the six months leading up to this crash, on Martin Luther King Day, Mark alone has made sixty-nine unauthorized calls to AT&T computers in Chicago and Portland, Maine. Each time, Mark secretly coupled his $300

computer to AT&T's multimillion-dollar monsters and, well, looked around. That's what Mark does. He's a hacker, and he breaks into unknown computers and tries to figure out how they work. His calls to AT&T computers totaled more than twelve intoxicating hours of exploration.

Paul and Mark know they're not allowed inside the AT&T system. It's illegal. The truth of the matter is that AT&T doesn't want some inexperienced teenagers from New York City testing the limits of its machinery. The kids are smart, there's no denying it. If they weren't smart, they couldn't get into the computers in the first place. And Paul and Mark are well intentioned. They just want to learn how things work. How else are they going to get access to study such a magnificent panoply of computer hardware? But once inside the corporate computers, Mark and Paul don't know what they're trampling, or where they're headed. Not really. They learn by trial and error.

"What happened?" Paul asks. He's afraid to hear the answer, afraid not to hear it.

"No one's saying, " Mark says.

Paul pictures his friend at the cramped table that serves as his bedroom desk on the other side of Queens. Mark usually sits hunched over the beat-up telephone handset that he has modified and customized with much intuitive fiddling and electrical tape. Mark has taken the thing apart and put it back together, examining its innards so many times that the tape is like a truss holding in the entrails.

"I don't think it could be hackers, " Paul says, in the same deliberate tone that he uses to measure out all his pronouncements. But what he is thinking, what he is fearing, what every bit of his brain is hoping is this: Please, don't let it be my fault.

The phone call from Mark to Paul lasts only a few minutes. In fact, if you really wanted to know how long it takes, you could ask the box. The DNR. The Hekemian Dial Number Recorder that sits on the twenty-third floor of the New York Telephone Company's headquarters in midtown Manhattan, down the hall from the cigarette smoke-filled office of the Security Department's toll fraud unit.

The box knows everything that matters. It watches Mark's phone, knows whenever someone lifts the receiver in the two-story brick row house in Elmhurst, Queens. The box records every phone number dialed from Mark's home, and it notes the hour: the start time, the end time, and the duration of each call. It funnels the information into a mini-computer that stores it for as long as anyone wants. And guess what? The box also watches Paul's phone. It's been watching for a while, months in fact. But don't worry. It's no big deal. The box doesn't stop them from making any calls.

The box just watches. And writes down what it sees. And waits.

ONE

It all started back in 1989, months before the AT&T crash, months before Paul and Mark even knew each other's names.

The whole mess, which would grow into a world-class electronic gang war fought by hackers from New York City to Texas, started back before Paul even knew what a switch was.

If you want to trace it back to one night, to one single instant when you can say the whole story really began, you will see this image: Paul in the dark, peering into a garbage dumpster.

It's an early summer evening, warm on your skin, when Paul leans over the edge of the dumpster as far as he can. This is one way to become a computer hacker, the way Paul has chosen. He tries to snare one of the five or six invitingly swollen bags that sit in the bottom of the dumpster. It's not enough to be six feet tall, because Paul still can't reach the bags, not until his stomach becomes the fulcrum for his body and his feet actually leave solid earth. He dangles; the blood is rushing to his head, making him dizzy. And yet there's nowhere he'd rather be than here, rummaging around in this dark alley in a dumpster full of phone company trash, looking for computer printouts.

He came for the documents. But he also came for adventure. Right after scarfing down a quick supper, Paul had mumbled goodbye to his mom, who was still getting used to the fact that his dad had all of a sudden died. Then he hopped a bus to the end of the line. He got off in Jamaica, Queens, at Parsons Boulevard and Hillside Avenue, an intersection in a neighborhood hot with bodegas, bars, and beeper-rental joints. He stood for a while, afloat in the dwindling stream of commuters flowing from the subway. And then, a black Supra full of teenagers pulled up to the curb and the dark-eyed guy in the driver's seat checked him out, smiled. Paul got in.

"Let's go trashing, " somebody in the back seat said. "There's a C. O. in Astoria. " It's cool to be talking in a kind of hackers' code. The word trashing means climbing around in garbage, where you hope to find computer printouts that list secret passwords and logons. And C. O., as everybody in the Supra knows, means Central Office. As in New York Telephone's Central Office, in Astoria, Queens.

Somebody broke out the Ballantines and the Olde English 800s, and Paul took one. He knew only one of the other guys in the car, and that was his best friend, who calls himself Hac. Until tonight Paul had never physically met the driver, Eli Ladopoulos, only knew him by his nickname, Acid Phreak. This was not unusual. Everybody in the hacker underground has a handle, but you rarely get to meet face-to-face, and even more rarely get to sit together in a dark car speeding in the night toward a dumpster stuffed with telco secrets. With rush hour over, it took less than twenty minutes to drive from Eli's neighborhood to the other end of Queens.

When they reached Astoria, even the building itself thrilled Paul a little, this filthy redbrick giant that takes up most of the block. Across the front, chiseled over the door, it says TELEPHONE BUILDING. Like on a board game or something.

Does the park across the street have a big sign that says PARK over it? No way. This building was named back when there was only one telephone company, Ma Bell.

They sidled up to the front of it. There are bars on all the two-story windows, and through them you can see a vast, loftlike, fluorescent-washed space. Imagine a library, hushed and eerie, but instead of books, all the shelves are filled from floor to ceiling with rack after rack of circuit boards. That's called the frame. There are even rolling ladders, with signs that say CAUTION: LOOK UP BEFORE CLIMBING. Like what kind of doofus wouldn't look up before climbing?

Upstairs in the building, connected to all those wires, is the switch. Paul doesn't even know what to call this large computer. But he's seen one now, and he'd soon learn its name.

The switch is the biggest computer you ever saw, and its job is to control every phone line in Astoria. When a phone company customer in an apartment over the Tae Kwon Do martial arts studio on 31st Street wants to order a pizza from around the corner, the phone call travels on copper cables to the switch, which funnels it to the pizza parlor's line. Multiply that by a couple of hundred thousand lines in this part of Queens, and millions of phone calls a day, and you see what we're dealing with.

Now, if you or your friends knew how to program a switch, or even knew a password to log on to a switch, you could start exploring. Go deep enough, learn your way around, and you'd be pretty powerful. Because then you could control everybody's phone service. You could create an unbillable number for yourself or your friends. You could listen in on phone calls. And best of all, you'd really know how this fabulously complex hunk of electronic circuitry works. That kind of omnipotence is beyond the reach of the CEO of New York Telephone. But maybe not beyond the reach of some teenage computer hacker who was tenacious enough to scrounge around in the garbage until he found a password.

Other books

G-Spot by Noire
License to Shift by Kathy Lyons
Solomon's Kitten by Sheila Jeffries
Black Box by Ivan Turner
The Soldier's Wife by Margaret Leroy
In Sheep's Clothing by Susan May Warren