|
<<
^
>>
Date: 2000-04-01
Hacker, Konfident, Krimineller
-.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
Nicht mehr ganz taufrisch, für die Aussendung waren didaktische
Gründe Ausschlag gebend: Wie es einem selbst erklärten "ethical
hacker" ergehen kann, der sich mit den gesetzlich ermächtigten
Behörden einläßt.
post/scrypt: Heute, 18.30 im fünften Teil der 3sat-Serie "Big Brother"
müßte eigentlich ein dem p.t Publico nicht völlig unbekannter
Depeschen/diener zu sehen sein.
http://www.3sat.de/nano/serien/05433/index.html
-.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
relayed by Fred Cohen <fc@all.net> via secedu@onelist.com
-.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
Max Ray Butler seemed to be at the top of his game. For two years,
the computer expert was a confidential source for an elite FBI
computer crime squad, helping to ferret out scofflaws on the Internet.
Butler, also knog wn as Max Vision, was also a self-described
``ethical hacker'' from the Silicon Valley who boasted that he could
test the security of any computer system by penetrating it.
...
Butler, 27, of Berkeley appeared in federal court in San Jose
yesterday on a 15-count federal indictment charging him with
hacking into computers used by the University of California at
Berkeley, national laboratories, federal departments, air force bases
across the country and a NASA flight center.
...
The indictment, handed down March 15, said Butler caused
``reckless damage'' as a result of intrusions in May 1998. Butler was
also charged with possession, with intent to defraud, of 477
passwords belonging to customers of a Santa Clara- based Internet
service provider.
...
``Sources are often very close to criminal activity, and sometimes
they cross the line,'' said Special Agent George Grotz, an FBI
spokesman in San Francisco.
Grotz declined to say how Butler became an FBI informant and
whether he was a federal source at the time of the alleged crimes.
Grotz said Butler is no longer associated with the agency.
Friends of the suspect told the Associated Press that Butler was
caught possibly violating the law several years ago and began
working with the FBI to avoid charges. Seth Alves, 27, told the news
agency that Butler was unfairly targeted after refusing to comply with
an FBI request.
...
Butler grew up in Idaho and lived with his family in Washington,
where authorities said he has a 1997 misdemeanor conviction for
attempted trafficking of stolen property.
He developed a proficiency with computers, eventually attracting the
attention of the FBI's Computer Crime Squad, which used him as a
confidential informant.
An FBI search warrant affidavit said Butler was ``well known'' to
squad members and ``has provided useful and timely information on
computer crimes in the past.''
In 1997, Butler started a company known as Max Vision in Mountain
View, specializing in ``penetration testing'' and ``ethical hacking''
procedures in which he would simulate for clients how a hacker
would penetrate their computer systems, according to the company
Web site.
...
It was also from that apartment, according to the FBI, that Butler
hacked into computers by using a computer software vulnerability
known as a buffer overflow, which sends commands into a system
that ordinarily would not be allowed.
Butler also allegedly invaded computers used by the Lawrence
Berkeley National Laboratory. Vern Paxson, a computer scientist at
the lab, noticed an online intruder conducting unauthorized scans of
laboratory and UC Berkeley computers in May 1998 and used a
monitoring device that later helped identify the source of the
intrusions.
....
Full story
http://www.sfgate.com/cgi-bin/article.cgi?file=/chronicle/archive/2000/03/24/MN57003.DTL
-.- -.-. --.-
- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
edited by
published on: 2000-04-01
comments to office@quintessenz.at
subscribe Newsletter
- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
<<
^
>>
|
|
|
|