Feeds

Sprint security faulted in Vegas hacks

Telco facing audits

  • alert
  • submit to reddit

SANS - Survey on application security programs

Citing the "compelling, credible testimony" of ex-hacker Kevin Mitnick, state officials urged Nevada regulators to force a series of dramatic security reforms on Las Vegas telephone company Sprint of Nevada last week, as final arguments were filed in the case of an in-room adult entertainment operator who believes he's being driven out of business by phone hackers.

Sprint would be required to retain outside computer security consultants, launch a security training program for company employees, develop a process for detecting a deterring intrusion attempts into its network, and begin documenting its security investigations, if the Public Utilities Commission follows the recommendations of its regulatory operations staff, acting as independent investigators in the case.

Plaintiff Eddie Munoz first complained to the commission in 1994 that the phone company was allowing mercenary hackers to cripple his business by diverting, monitoring and blocking his phone calls - a complaint that's been echoed by private investigators, bail bondsmen and some of Munoz's competitors over the years. Sprint has maintained that Munoz's problems are in his own equipment, and that as far as they know their systems have never suffered a single intrusion.

But the company's invulnerability was brought into question in a series of hearings earlier this year in which Sprint officials admitted that they'd lost or destroyed years of investigatory records in a reorganization of their security department, and that they permitted dial-up access into their switches for maintenance purposes with little logging.

The hearings concluded in June with testimony by Mitnick -- hired by Munoz as a consultant and an expert witness. The ex-hacker testified that prior to his 1995 arrest he had illicit control of the company's Las Vegas switching systems through the dial-ups, and also enjoyed unfettered access to a computerized testing system manufactured by Nortel Networks called CALRS -- pronounced "callers" -- that allows users to monitor phone lines and intercept or originate calls.

Sprint: Mitnick's a Liar

Challenged to prove his claims, Mitnick used a break in the hearing to visit an old rented storage locker, returning with a list of passwords he said unlocked the CALRS system at the time of his arrest (Contacted by SecurityFocus Online, Nortel Networks spokesman David Chamberlin declined to comment on CALRS, writing in an email, "I'd point you back to Sprint to discuss their phone network with them.")

Sprint opposes a new docket to supervise their security, and slammed Mitnick's testimony. In the company's closing arguments Friday, outside counsel Patrick Riley described the ex-hacker as an unreformed "con artist," reminded the commission of Mitnick's criminal record, and pointed accusingly to his authorship of the upcoming Wiley book on social engineering titled "The Art of Deception: Controlling the Human Element of Security."

The company also claimed Mitnick lacked the technical know-how to be an expert witness on Sprint's security ills because the hacker never worked as a "switch engineer" for a telephone company. "Although Mr. Munoz presented Mr. Mitnick as an 'expert' witness, Mr. Mitnick is an expert in only one thing-- lying," wrote Riley.

But PUC staff attorney Louise Uttinger found Mitnick's detailed testimony -- coupled with Sprint's admissions in some areas, and silence in others -- credible enough to raise serious questions about the security of Sprint's Nevada network. Those questions, Uttinger wrote, "could impact economic, social, and national matters of importance to all Nevadans and to anyone conducting business in Nevada."

While they disagree on Mitnick's credibility as a witness, commission staff agreed with Sprint that Munoz never produced a smoking gun in his case. Pointing to undisciplined testing procedures and unclear record-keeping by Munoz, as well as several tests that failed to show any unexplained dropped calls, Uttinger recommended that the complaint be dismissed.

In his closing argument, Munoz attorney Peter Alpert argued that his client had limited resources and access, and asked the commission to compel Sprint to conduct a battery of additional tests under PUC supervision. "It is respectfully suggested that Mr. Munoz has come upon a flaw in Sprint's system which only Sprint is capable of detecting since only it has access to the network."

The commission is expected to rule this fall.

© 2002 SecurityFocus.com, all rights reserved.

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Arts and crafts store Michaels says 3 million credit cards exposed in breach
Meanwhile, Target investigators prepare for long process in nabbing hackers
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.