Advertisement

Harvard Astronomer Breaks Spy Ring

Stoll Prevents Spies in West Germany From Using Military Research Computers

BOSTON--A Harvard astronomer was instrumental in the arrests in West Germany this week of three men who allegedly broke into key military and research computers in the United States, Western Europe and Japan, West German officials said.

Clifford Stoll, a 38 year-old computer expert at the Harvard-Smithsonian Observatory, broke the East European spy ring by setting up a complex monitoring system on his computer.

The astronomer originally started out in 1986 to find a 75-cent accounting error in his computer system. When he found that the extra charge was due to a mysterious hacker who had tapped into his system, he rigged his computer so that an electronic beeper would sound every time a hacker entered the system.

After discovering the intruders were stealing passwords to get into sensitive military computers, Stoll got help from the FBI. Almost a year later, he succeeded in tracing them to Hanover, West Germany.

"In one sense, it was exciting," he said in an interview Thursday. "In another sense, it was dreadful, because I got zero astronomy done for two years."

Advertisement

A German television network reported that authorities believe the West German hackers were recruited by the Soviet KGB in 1985 and "were paid with cash and drugs and were later forced to provide the codes and passwords to the Soviets."

FBI spokesperson Greg Jones said yesterday that the bureau would not comment on the investigation. But others connected with the probe said Stoll deserved much of the credit.

"I would say he was largely responsible for cracking the case," said Charles S. Hurley, former spokesperson for the Lawrence Berkeley Laboratory in Berkeley, Calif., where Stoll was working when the initial computer break-in occurred. "He pursued them with extraordinary persistence."

Stoll said the puniness of the accounting error initially drew his attention.

"If it had been $1,000 off, I wouldn't have thought anything of it," he said. "It's like, if your house collapses, you just assume there's been an earthquake. But if you find a tiny termite hole, you think, 'Geez, I'd better investigate.' It's the little problems that are the most fascinating."

Stoll, who holds a doctorate in astronomy from the University of Arizona, said the hackers were "no geniuses, but certainly clever."

To hide their location, he said, they attacked military computers via modems, or telephone computer links, through a constantly changing series of computers at West German universities, American research labs and defense contractors.

To gain access to sensitive data, they sometimes planted so-called "Trojan Horse" programs, which look helpful but actually function to steal passwords.

In other cases, Stoll said, the hackers succeeded with "very simple, you might even say crude techniques," such as trying common passwords like "field," "guest" and "system."

Last May, Stoll published an article about his pursuit of the Trojan horsemen in a technical journal, Communications of the Association for Computer Machinery.

Advertisement