File size: 49,088 Bytes
8ecd256
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
                                ==Phrack Inc.==

                     Volume Three, Issue 26, File 11 of 11

            PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
            PWN                                                 PWN
            PWN        P h r a c k   W o r l d   N e w s        PWN
            PWN        %%%%%%%%%%%   %%%%%%%%%   %%%%%%%        PWN
            PWN                Issue XXVI/Part 3                PWN
            PWN                                                 PWN
            PWN                 April 25, 1989                  PWN
            PWN                                                 PWN
            PWN          Created, Written, and Edited           PWN
            PWN               by Knight Lightning               PWN
            PWN                                                 PWN
            PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


Galactic Hacker Party                                            March 30, 1989
%%%%%%%%%%%%%%%%%%%%%
                             GALACTIC HACKER PARTY
                               August 2-4, 1989
                         PARADISO, AMSTERDAM, HOLLAND

During the summer of 1989, the world as we know it will go into overload.  An
interstellar particle stream of hackers, phone phreaks, radioactivists and
assorted technological subversives will be fusing their energies into a media
melt-down as the global village plugs into Amsterdam for three electrifying
days of information interchange and electronic capers.

Aided by the advanced communications technology to which they are accustomed,
the hacker forces will discuss strategies, play games, and generally have a
good time.  Free access to permanently open on-line facilities will enable them
to keep in touch with home base -- wherever that is.

Those who rightly fear the threat of information tyranny and want to learn what
they can do about it are urgently invited to interface in Amsterdam in August.
There will be much to learn from people who know.  Celebrity guests with
something to say will be present in body or electronic spirit.

The Force must be nurtured.  If you are refused transport because your laptop
looks like a bomb, cut off behind enemy lines, or unable to attend for any
other reason, then join us on the networks.  Other hacker groups are requested
to organize similar gatherings to coincide with ours.  We can provide low-cost
international communications links during the conference.

       [  Despite the wishes of those planning the "Galactic Hacker   ]
       [  Party," there will be NO change in plans for SummerCon '89! ]

For further information, take up contact as soon as possible with:

             HACK-TIC                           PARADISO
             P.O. box 22953                     Weteringschans 6-8
             1100 DL  Amsterdam                 1017 SG  Amsterdam
             The Netherlands                    The Netherlands

         tel: +31 20 6001480                tel: +31 20 264521 / +31 20 237348
_______________________________________________________________________________

Subversive Bulletin Boards                                       March 26, 1989
%%%%%%%%%%%%%%%%%%%%%%%%%%
An article in a newspaper from the United Kingdom had an article relating to a
computer bulletin board being run by a 14-year-old boy in Wilmslow, Cheshire,
England.  It contained information relating to such things as making plastic
explosives.

Anti-terrorist detectives are said to be investigating for possible breaches of
the Obscene Publications Act.  Apparently reporters were able to easily gain
access to this bulletin board and peruse articles on such subjects as credit
card fraud, making various types of explosives, street fighting techniques and
dodging police radar traps.

One article was obviously aimed at children and described how to make a bomb
suitable for use on "the car of a teacher you do not like at school," which
would destroy the tire of a car when it was started.

The boy's parents did not seem to think that their son was doing anything
wrong, preferring him to be working with his computer rather than roaming the
streets.

A London computer consultant, Noel Bradford, is quoted as having seen the
bulletin board and found messages discussing "how to crack British Telecom, how
to get money out of people and how to defraud credit card companies.  Credit
card numbers are given, along with PIN numbers, names, addresses and other
details."
_______________________________________________________________________________

Tale Of TWO TAP Magazines!                                       April 24, 1989
%%%%%%%%%%%%%%%%%%%%%%%%%%
It seemed inevitable that the battle for the rights to TAP would come into
play, but many wonder why it has taken so long.

The Renegade Chemist, long time member of Phortune 500 and one of its "Board Of
Directors," has been talking about re-starting TAP Magazine for at least two
years... nothing ever happened with it until now.  TRC claims that the TAP
Magazine crew in Kentucky is just a fraud and that he is putting on the "REAL
McCoy."

For a free issue of The Renegade Chemist's TAP Magazine, send a self-addressed
stamped envelope to:

Data Security Consultants, Inc.
TAP Magazine
P.O. Box 271
South Windam, CT  06266-0271

Now on the other hand, Aristotle of the Kentucky based TAP Magazine has shown
an almost uncaring attitude about The Renegade Chemist's statements about TAP
Magazine.  He says that he does not "really mind if these people put out a
magazine.  Honestly I just want to help the community and the more magazines
and information, the better."

The really big news about the Kentucky based TAP Magazine came Saturday, April
22, 1989.  Apparently, because of problems with local banks and the Internal
Revenue Service, TAP Magazine is now FREE!

The only catch is that if you want it, you have to send them a self-addressed
stamped envelope to get each issue or "you can send cash, but only enough to
pay for postage, 25 cents should cover it."  Do not send any kinds of checks
and/or money orders.  Anyone who did will be receiving their checks back or
at least those checks will not be cashed.  The TAP Magazine staff will be
taking care of the printing costs out of their own pocket.

So for the FREE TAP Magazine, send a self-addressed stamped envelope to:

P.O. Box 20264
Louisville, KY  40220

Issue 93 is due for the end of April 1989, but Aristotle also wanted me to let
everyone know that he will be attending SummerCon '89 and bringing with him
plenty of issues of all the TAPs that he, Olorin The White, and Predat0r have
published.

As I have not seen TRC's TAP, I make no judgements.  Instead, get a copy of
both TAPs FREE and compare them yourself.  The market will decide which TAP
will continue.

                            Information Provided by
                      Aristotle and The Renegade Chemist
_______________________________________________________________________________

Computer Group Wary Of Security Agency                           April 11, 1989
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
Taken from the San Francisco Chronicle

A public interest group said yesterday that the National Security Agency, the
nation's biggest intelligence agency, could exert excessive control over a
program to strengthen the security of computer systems throughout the federal
government.

The group, Computer Professionals for Social Responsibility -- based in Palo
Alto -- urged key members of Congress to focus "particularly close scrutiny" on
the agency's role in helping to implement legislation aimed at safeguarding
sensitive but unclassified information in federal computers.

"There is a constant risk that the federal agencies, under the guise of
enhancing computer security, may find their programs -- to the extent that they
rely upon computer systems -- increasingly under the supervision of the largest
and most secretive intelligence organization in the country," it said.
_______________________________________________________________________________

Verifying Social Security Numbers                                April 11, 1989
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
Taken From The New York Times

Dorcas R. Hardy, Commisssioner of the Social Security Administration, told a
Congressional committee that the agency had verified millions of SSN's for
private credit companies.

TRW, the nation's largest credit reporting company, recently proposed paying
the Social Security Administration $1,000,000 to have 140 million numbers
verified.

Phil Gambino, an agency spokesman, reported last month that the agency had
verified social security numbers only at the request of beneficiaries or
employers and had never verified more than 25 numbers at a time.  He said such
disclosures were required under the Freedom of Information Act.

At the hearing yesterday, Dorcas R. Hardy, denied any other verifications at
first.  However, she later admitted that in the early 1980s, 3,000,000 social
security numbers were verified for CitiCorp and that last year 151,000 numbers
were verified for TRW.  Ms. Hardy said that the 151,000 numbers were just part
of a "test run."

Senator David Pryor, a democrat from Arkansas and chairman of the Special
Committee on Aging, said that previous commissioners; the Congressional
Research Service of the Library of Congress, and Donald A. Gonya, chief counsel
for Social Security have all decided that such verification is illegal.
_______________________________________________________________________________

PWN Quicknotes

1.  Prank Virus Warning Message (March 28, 1989) -- An individual placed a time
    bomb message on a government service system in the San Francisco Bay Area
    saying, "WARNING! A computer virus has infected the system!"  The
    individual is learning that such a prank is considered almost as funny as
    saying that you have a bomb in your carry-on luggage as you board a plane.
    -- Bruce Baker, Information Security Program, SRI International
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2.  Hackers' Dictionary In Japanese? (March 30, 1989) -- What is this you ask?
    This amusing compilation was put together a decade or so ago by artificial
    intelligence (AI) graduate students at Stanford, MIT, and Carnegie-Mellon
    and recorded the then-current vernacular of their shared cultures.  They
    did it for fun, but it somehow ended up getting published.

    The Hackers' Dictionary contains more than a few puns, jokes, and other
    things that are hard to translate such as "moby," as in "moby memory", or
    "fubar" and its regional variants "foo bar" and "foo baz."
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
3.  AT&T's Air Force -- AT&T has an air force that patrols its cable routes,
    some routes 24 hours a day, 365 days a year.  The AT&T air force includes
    helicopters and fixed-wing aircraft.  For some areas, AT&T uses infantry
    and armored cars.  AT&T's Sue Fleming says, "We hope NOT to find any
    activity.  We don't want to 'catch' people.  But if we do spot a digging
    crew, the usual procedure is for the pilot to radio the location back to a
    ground crew, who check it out.  On occasion, they drop notes -- or even
    land -- but that depends on where the site is.  In some areas -- like New
    Jersey -- unauthorized landings bring heavy penalties."
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4.  Terrorist Threat? -- Scientific advisors to the government told a Senate
    panel that telecommunications networks are tempting targets for terrorist
    activity.  The experts said that advances in technology -- like fiber
    optics, which concentrates equipment and data -- and the fragmentation of
    the telecom industry after divestiture are reasons for the increased risk.
    Certainly the Hinsdale, Illinois CO fire and the recent severing of a fiber
    backbone in New Jersey have shown us all how vulnerable our country's
    telecom network is.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5.  FCC Rules On AOS -- The FCC has ruled on a complaint filed this summer by
    two consumer groups against five Alternative Operator Services (AOS)
    companies.  The FCC found the complaint valid and has ordered the AOS
    companies to stop certain practices immediately.

    The ruling states that callers must be told when their calls are being
    handled by an AOS, operators must provide callers with rate information and
    hotel or payphone owners cannot block calls to other long distance
    carriers.  (Callers who don't take any special action when making a call
    will still be routed to the pre-subscribed carrier.)

    The FCC has also ordered the companies to eliminate "splashing" whenever
    technically feasible.  Splashing is transferring a call to a distant
    carrier point-of-presence and charging the caller for the call from that
    point.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6.  Cool New Service -- CompuServe (the world's biggest computer bulletin
    board) users can now dial in and search and find articles from a bunch of
    different technical trade magazines.  The database was put together by an
    outfit called Information Access Company.  It currently contains full-text
    articles for 50 publications and paraphrased abstracts for 75 more.  Most
    coverage begins with the January 1987 issues.

    You can search the publications by magazine name, author, key word, key
    phrase, etc., then pull up the abstracts of the article of interest and, if
    needed and when available, get the full text of the article.  And it's easy
    to use.

    Charge for the service is $24 per hour, $1 for each abstract, and $1.50 for
    each full-text article accessed.  CompuServe charges $12.50 per hour for
    connect time.  Both per hour charges are pro-rated, and, with the databases
    being so easy to use, you'll rarely be on the board for more than 10-15
    minutes, so those costs will drop.

                     CompuServe              800-848-8199
                     Information Access      800-227-8431
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7.  ISDN Calling Number Identification Services (April 7, 1989) -- Bellcore
    Technical Reference TR-TSY-000860, "ISDN Calling Number Identification
    Services" can be purchased for $46 from:

                                   Bellcore
                               Customer Service
                              60 New England Ave
                           Piscataway, NJ 08854-4196
                                (201) 699-5800

    This Technical Reference contains Bellcore's view of generic requirements
    for support of ISDN Calling Number Identification (I-CNIS).  The I-CNIS
    feature extends the concepts of Calling Number Delivery and Calling Number
    Delivery Blocking to ISDN lines.  I-CNIS also allows the customer to
    specify which Directory Number (DN) should be used for each outgoing call
    and provides network screening to ensure that the specified DN is valid.
    I-CNIS handles calling number processing for both circuit-mode and
    packet-mode ISDN calls and provides four component features:  Number
    Provision, Number Screening, Number Privacy, and Number Delivery.  Material
    on Privacy Change by the calling party and Privacy Override by the called
    party is also included.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
8.  Founder of TAP Magazine, Abbie Hoffman, born in 1936, passed away on April
    12, 1989.  He was found dead in his apartment in New Hope, PA.  He was
    fully dressed under the bedcovers.  An autopsy was inconclusive.  An
    article about him appears in the April 24, 1989 issue of Time Magazine,
    "A Flower in a Clenched Fist," page 23.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9.  Bill Landreth aka The Cracker, author of Out Of The Inner Circle, has
    reappeared.  Supposedly, he is now working as a bookbinder in Orange
    County, California and living with the sysop of a bulletin board called the
    "Pig Sty." -- Dark Sorcerer (April 19, 1989)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
10.  Hacker/Phreaker Gets "Stiff" Penalty (Green Bay, Wisconsin) -- David
     Kelsey, aka Stagehand, plead guilty to two counts of class "E" felonies
     and received a 90 day jail term.  Once he has completed his jail term, he
     will serve three years probation and an unknown amount of community
     service hours.

     In addition to these penalties, Stagehand must also pay restitution of
     $511.00 to Schneider Communications of Green Bay, Wisconsin.  Stagehand
     was given all his computer equipment back as part of the plea bargain --
     minus any materials considered to be "ill gotten" gains.
_______________________________________________________________________________
! ***


1:30:22 p.m.    ARE YOU STILL THERE ?
! ***


1:35:22 p.m.    RESPOND OR BE LOGGED OFF
!

y
supervisors who said the taps were for the police.  They were told that many of
the taps were for the FBI.

Another radio amateur, Vincent Clark/KB4MIT, a technician for South-Central
Bell from 1972 to 1981, said he placed illegal wiretaps similar to those done
by Bob Draise on orders from his supervisors -- and on request from local
policemen in Louisville, Kentucky.

When asked how he got started in the illegal wiretap business, Bob said that a
friend called and asked him to come down to meet with the Cincinnati police. An
intelligence sergeant asked Bob about wiretapping some Black Muslims.  He also
told Bob that Cincinnati Bell security had approved the wiretap -- and that it
was for the FBI.  The sergeant pointed to his Masonic ring which Bob also wore
-- in other words, he was telling the truth under the Masonic oath -- something
that Bob put a lot of stock in.

Most of the people first wiretapped were drug or criminal related.  Later on,
however, it go out of hand -- and the FBI wanted taps on prominent citizens.
"We started doing people who had money.  How this information was used, I
couldn't tell you."

The January 29th "Newsday" said Draise had told investigators that among the
taps he rigged from 1972 to 1979 were several on lines used by Wren Business
Communications, a Bell competitor.  It seems that when Wren had arranged an
appointment with a potential customer, they found that Bell had just been there
without being called.  Wren's president is a ham radio operator, David
Stoner/K8LMB.

When spoken with, Dave Stoner said the following;

     "As far as I am concerned, the initial focus for all of this began
     with the FBI.  The FBI apparently set up a structure throughout the
     United States using apparently the security chiefs of the different
     Bell companies.  They say that there have been other cases in the
     United States like ours in Cincinnati but they have been localized
     without the realization of an overall pattern being implicated."

     "The things that ties this all together is if you go way back in
     history to the Hoover period at the FBI, he apparently got together
     with the AT&T security people.  There is an organization that I
     guess exists to this day with regular meetings of the security
     people of the different Bell companies.  This meant that the FBI
     would be able to target a group of 20 or 30 people that represented
     the security points for all of the Bell and AT&T connections in the
     United States.  I believe the key to all of this goes back to Hoover.
     The FBI worked through that group who then created the activity at
     the local level as a result of central planning."

     "I believe that in spite of the fact that many people have indicated
     that this is an early 70's problem -- that there is no disruption to
     that work to this day.  I am pretty much convinced that it is
     continuing.  It looks like a large surveillance effort that
     Cincinnati was just a part of."

     "The federal prosecutor Kathleen Brinkman is in a no-win situation.
     If she successfully prosecutes this case she is going to bring
     trouble down upon her own Justice Department.  She can't
     successfully prosecute the case."

About $200 million in lawsuits have already been filed against Cincinnati Bell
and the Police Department.  Several members of the police department have taken
the Fifth Amendment before the grand jury rather than answer questions about
their roles in the wiretapping scheme.

Bob Draise/WB8QCF has filed a suit against Cincinnati Bell for $78 for
malicious prosecution and slander in response to a suit filed by Cincinnati
Bell against Bob for defamation.  Right after they filed the suit, several
policemen came forward and admitted to doing illegal wiretaps with them.  The
Cincinnati police said they stopped this is 1974 -- although another policeman
reportedly said they actually stopped the wiretapping in 1986.

Now the CBS-TV program "60 Minutes" is interested in the Cincinnati goings-on
and has sent in a team of investigative reporters.  Ed Bradley from "60
Minutes" has already interviewed Bob Draise/WB8QCF and it is expected that
sometime during this month (April) April, we will see a "60 Minutes" report on
spying by the FBI.  We also understand that CNN, Ted Turner's Cable News
Network, is also working up a "Bugging of America" expose.
_______________________________________________________________________________

Crackdown On Hackers Urged                                        April 9, 1989
%%%%%%%%%%%%%%%%%%%%%%%%%%
Taken From the Chicago Tribune (Section 7, Page 12b)

            "Make Punishment Fit The Crime," computer leaders say.

DALLAS (AP) -- The legal system has failed to respond adequately to the threat
that hackers pose to the computer networks crucial to corporate America, a
computer expert says.

Many computer hackers "are given slaps on the wrist," Mark Leary, a senior
analyst with International Data Corp., said at a roundtable discussion last
week.

"The justice system has to step up...to the fact that these people are
malicious and are criminals and are robbing banks just as much as if they
walked up with a shotgun," he said.

Other panelists complained that hackers, because of their ability to break into
computer systems, even are given jobs, sometimes a security consultants.

The experts spoke at a roundtable sponsored by Network World magazine, a
publication for computer network users and managers.

Computer networks have become crucial to business, from transferring and
compiling information to overseeing and running manufacturing processes.

The public also is increasingly exposed to networks through such devices as
automatic teller machines at banks, airline reservation systems and computers
that store billing information.

Companies became more willing to spend money on computer security after last
year's celebrated invasion of a nationwide network by a virus allegedly
unleased by a graduate student [Robert Tappen Morris], the experts said.

"The incident caused us to reassess the priorities with which we look at
certain threats," said Dennis Steinaur, manager of the computer security
management group of the National Institute of Standards and Technology.

But computer security isn't only a matter of guarding against unauthorized
entry, said Max Hopper, senior vice president for information systems as
American Airlines.

Hopper said American has built a "a Cheyenne mountain-type" installation for
its computer systems to guard against a variety of problems, including
electrical failure and natural disaster.  Referring to the Defense Department's
underground nerve center in a Colorado mountain, he said American's precautions
even include a three-day supply of food.

"We've done everything we can, we think, to protect the total environment,"
Hopper said.

Hopper and Steinaur said that despite the high-tech image of computer
terrorism, it remains an administrative problem that should be approached as a
routine management issue.

But the experts agreed that the greatest danger to computer networks does not
come from outside hackers.  Instead, they said, the biggest threat is from
disgruntled employees or others whose original access to systems was
legitimate.

Though employee screening is useful, Steinaur said, it is more important to
build into computer systems ways to track unauthorized use and to publicize
that hacking can be traced.

Steinaur said growing computer literacy, plus the activities of some
non-malicious hackers, help security managers in some respects.

Expanded knowledge "forces us as security managers not be dependent on
ignorance," Steinaur said.

"Security needs to be a part of the system, rather than a 'nuisance addition,'"
Steinaur said, "and we probably have not done a very good job of making
management realize that security is an integral part of the system."

IDC's Leary said the organization surveys of Fortune 1000 companies
surprisingly found a significant number of companies were doing little to
protect their systems.

The discussion, the first of three planned by Network World, was held because
computer sabotage "is a real problem that people aren't aware of," said editor
John Gallant.  Many business people sophisticated networks."

It also is a problem that many industry vendors are reluctant to address, he
said, because it raises questions about a company's reliability.

                        Typed For PWN by Hatchet Molly
_______________________________________________________________________________

Ex-Worker Charged In Virus Case -- Databases Were Alleged Target   Apr 12, 1989
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
by Jane M. Von Bergen (Philadelphia Inquirer)

A former employee was charged yesterday with infecting his company's computer
database in what is believed to be the first computer-virus arrest in the
Philadelphia area.

"We believe he was doing this as an act of revenge," said Camden County
Assistant Prosecutor Norman Muhlbaier said yesterday, commenting on a motive
for the employee who allegedly installed a program to erase databases at his
former company, Datacomp Corp. in Voorhees, New Jersey.

Chris Young, 21, of the 2000 block of Liberty Street, Trenton, was charged in
Camden County with one count of computer theft by altering a database.
Superior Court Judge E. Stevenson Fluharty released Young on his promise to pay
$10,000 if he failed to appear in court.  If convicted, Young faces a 10-year
prison term and a $100,000 fine.  Young could not be reached for comment.

"No damage was done," Muhlbaier said, because the company discovered the virus
before it could cause harm.  Had the virus gone into effect, it could have
damaged databases worth several hundred thousand dollars, Muhlbaier said.

Datacomp Corp., in the Echelon Mall, is involved in telephone marketing.  The
company, which has between 30 and 35 employees, had a contract with a major
telephone company to verify the contents of its white pages and try to sell
bold-faced or other special listings in the white pages, a Datacomp company
spokeswoman said.  The database Young is accused of trying to destroy is the
list of names from the phone company, she said.

Muhlbaier said that the day Young resigned from the company, October 7, 1988 he
used fictitious passwords to obtain entry into the company computer,
programming the virus to begin its destruction December 7, 1988 -- Pearl Harbor
Day.  Young, who had worked for the company on and off for two years -- most
recently as a supervisor -- was disgruntled because he had received some
unfavorable job-performance reviews, the prosecutor said.

Eventually, operators at the company picked up glitches in the computer system.
A programmer, called in to straighten out the mess, noticed that the program
had been altered and discovered the data-destroying virus, Muhlbaier said.
"What Mr. Young did not know was that the computer system has a lot of security
features so they could track it back to a particular date, time and terminal,"
Muhlbaier said.  "We were able to ... prove that he was at that terminal."
Young's virus, Muhlbaier said, is the type known as a "time bomb" because it is
programmed to go off at a specific time.  In this case, the database would have
been sickened the first time someone switched on a computer December 7, he said

Norma Kraus, a vice president of Datacomp's parent company, Volt Information
Sciences Inc, said yesterday that the company's potential loss included not
only the databases, but also the time it took to find and cure the virus.  "All
the work has to stop," causing delivery backups on contracts, she said.  "We're
just fortunate that we have employees who can determine what's wrong and then
have the interest to do something.  In this case, the employee didn't stop at
fixing the system, but continued on to determine what the problem was." The
Volt company, based in New York, does $500 million worth of business a year
with such services as telephone marketing, data processing and technical
support.  It also arranges temporary workers, particularly in the
data-processing field, and installs telecommunication services, Kraus said.
_______________________________________________________________________________

Mexico's Phone System Going Private?                             April 17, 1989
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
By Oryan QUEST (Special Hispanic Corespondent)

The Mexico Telephone Company, aka Telefonos de Mexico, aka Telmex, is likely to
go private in the next year or two.  The Mexican government is giving serious
consideration to selling its controlling interest in that nation's
communications network, despite very stiff opposition from the local unions
which would prefer to see the existing bureaucracy stay in place.

The proposed sale, which is part of a move to upgrade the phone system there --
and it *does* need upgrading -- by allowing more private investment, is part of
a growing trend in Mexico to privatize heretofore nationalized industries.

The Mexico Telephone Company has spent more than a year planning a $14 billion,
five-year restructuring plan which will probably give AT&T and the Bell
regional holding companies a role in the improvements.

One plan being discussed by the Mexican government is a complete break-up of
Telmex, similar to the court-ordered divestiture of AT&T a few years ago.
Under this plan, there would be one central long distance company in Mexico,
with the government retaining control of it, but privately owned regional firms
providing local and auxiliary services.

Representatives of the Mexican government have talked on more than one
occasion with some folks at Southwestern Bell about making a formal proposal.
Likewise, Pacific Bell has been making some overtures to the Mexicans.  It will
be interesting to see what develops.

About two years ago, Teleconnect Magazine, in a humorous article on the
divestiture, presented a bogus map of the territories assigned to each BOC,
with Texas, New Mexico and Arizona grouped under an entity called "Taco Bell."

Any phone company which takes over the Mexican system will be an improvement
over the current operation, which has been slowly deteriorating for several
years.

PS:  I *Demand* To Be Let Back On MSP!
_______________________________________________________________________________

                                ==Phrack Inc.==

                     Volume Three, Issue 26, File 11 of 11

            PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
            PWN                                                 PWN
            PWN        P h r a c k   W o r l d   N e w s        PWN
            PWN        %%%%%%%%%%%   %%%%%%%%%   %%%%%%%        PWN
            PWN                Issue XXVI/Part 3                PWN
            PWN                                                 PWN
            PWN                 April 25, 1989                  PWN
            PWN                                                 PWN
            PWN          Created, Written, and Edited           PWN
            PWN               by Knight Lightning               PWN
            PWN                                                 PWN
            PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


Galactic Hacker Party                                            March 30, 1989
%%%%%%%%%%%%%%%%%%%%%
                             GALACTIC HACKER PARTY
                               August 2-4, 1989
                         PARADISO, AMSTERDAM, HOLLAND

During the summer of 1989, the world as we know it will go into overload.  An
interstellar particle stream of hackers, phone phreaks, radioactivists and
assorted technological subversives will be fusing their energies into a media
melt-down as the global village plugs into Amsterdam for three electrifying
days of information interchange and electronic capers.

Aided by the advanced communications technology to which they are accustomed,
the hacker forces will discuss strategies, play games, and generally have a
good time.  Free access to permanently open on-line facilities will enable them
to keep in touch with home base -- wherever that is.

Those who rightly fear the threat of information tyranny and want to learn what
they can do about it are urgently invited to interface in Amsterdam in August.
There will be much to learn from people who know.  Celebrity guests with
something to say will be present in body or electronic spirit.

The Force must be nurtured.  If you are refused transport because your laptop
looks like a bomb, cut off behind enemy lines, or unable to attend for any
other reason, then join us on the networks.  Other hacker groups are requested
to organize similar gatherings to coincide with ours.  We can provide low-cost
international communications links during the conference.

       [  Despite the wishes of those planning the "Galactic Hacker   ]
       [  Party," there will be NO change in plans for SummerCon '89! ]

For further information, take up contact as soon as possible with:

             HACK-TIC                           PARADISO
             P.O. box 22953                     Weteringschans 6-8
             1100 DL  Amsterdam                 1017 SG  Amsterdam
             The Netherlands                    The Netherlands

         tel: +31 20 6001480                tel: +31 20 264521 / +31 20 237348
_______________________________________________________________________________

Subversive Bulletin Boards                                       March 26, 1989
%%%%%%%%%%%%%%%%%%%%%%%%%%
An article in a newspaper from the United Kingdom had an article relating to a
computer bulletin board being run by a 14-year-old boy in Wilmslow, Cheshire,
England.  It contained information relating to such things as making plastic
explosives.

Anti-terrorist detectives are said to be investigating for possible breaches of
the Obscene Publications Act.  Apparently reporters were able to easily gain
access to this bulletin board and peruse articles on such subjects as credit
card fraud, making various types of explosives, street fighting techniques and
dodging police radar traps.

One article was obviously aimed at children and described how to make a bomb
suitable for use on "the car of a teacher you do not like at school," which
would destroy the tire of a car when it was started.

The boy's parents did not seem to think that their son was doing anything
wrong, preferring him to be working with his computer rather than roaming the
streets.

A London computer consultant, Noel Bradford, is quoted as having seen the
bulletin board and found messages discussing "how to crack British Telecom, how
to get money out of people and how to defraud credit card companies.  Credit
card numbers are given, along with PIN numbers, names, addresses and other
details."
_______________________________________________________________________________

Tale Of TWO TAP Magazines!                                       April 24, 1989
%%%%%%%%%%%%%%%%%%%%%%%%%%
It seemed inevitable that the battle for the rights to TAP would come into
play, but many wonder why it has taken so long.

The Renegade Chemist, long time member of Phortune 500 and one of its "Board Of
Directors," has been talking about re-starting TAP Magazine for at least two
years... nothing ever happened with it until now.  TRC claims that the TAP
Magazine crew in Kentucky is just a fraud and that he is putting on the "REAL
McCoy."

For a free issue of The Renegade Chemist's TAP Magazine, send a self-addressed
stamped envelope to:

Data Security Consultants, Inc.
TAP Magazine
P.O. Box 271
South Windam, CT  06266-0271

Now on the other hand, Aristotle of the Kentucky based TAP Magazine has shown
an almost uncaring attitude about The Renegade Chemist's statements about TAP
Magazine.  He says that he does not "really mind if these people put out a
magazine.  Honestly I just want to help the community and the more magazines
and information, the better."

The really big news about the Kentucky based TAP Magazine came Saturday, April
22, 1989.  Apparently, because of problems with local banks and the Internal
Revenue Service, TAP Magazine is now FREE!

The only catch is that if you want it, you have to send them a self-addressed
stamped envelope to get each issue or "you can send cash, but only enough to
pay for postage, 25 cents should cover it."  Do not send any kinds of checks
and/or money orders.  Anyone who did will be receiving their checks back or
at least those checks will not be cashed.  The TAP Magazine staff will be
taking care of the printing costs out of their own pocket.

So for the FREE TAP Magazine, send a self-addressed stamped envelope to:

P.O. Box 20264
Louisville, KY  40220

Issue 93 is due for the end of April 1989, but Aristotle also wanted me to let
everyone know that he will be attending SummerCon '89 and bringing with him
plenty of issues of all the TAPs that he, Olorin The White, and Predat0r have
published.

As I have not seen TRC's TAP, I make no judgements.  Instead, get a copy of
both TAPs FREE and compare them yourself.  The market will decide which TAP
will continue.

                            Information Provided by
                      Aristotle and The Renegade Chemist
_______________________________________________________________________________

Computer Group Wary Of Security Agency                           April 11, 1989
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
Taken from the San Francisco Chronicle

A public interest group said yesterday that the National Security Agency, the
nation's biggest intelligence agency, could exert excessive control over a
program to strengthen the security of computer systems throughout the federal
government.

The group, Computer Professionals for Social Responsibility -- based in Palo
Alto -- urged key members of Congress to focus "particularly close scrutiny" on
the agency's role in helping to implement legislation aimed at safeguarding
sensitive but unclassified information in federal computers.

"There is a constant risk that the federal agencies, under the guise of
enhancing computer security, may find their programs -- to the extent that they
rely upon computer systems -- increasingly under the supervision of the largest
and most secretive intelligence organization in the country," it said.
_______________________________________________________________________________

Verifying Social Security Numbers                                April 11, 1989
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
Taken From The New York Times

Dorcas R. Hardy, Commisssioner of the Social Security Administration, told a
Congressional committee that the agency had verified millions of SSN's for
private credit companies.

TRW, the nation's largest credit reporting company, recently proposed paying
the Social Security Administration $1,000,000 to have 140 million numbers
verified.

Phil Gambino, an agency spokesman, reported last month that the agency had
verified social security numbers only at the request of beneficiaries or
employers and had never verified more than 25 numbers at a time.  He said such
disclosures were required under the Freedom of Information Act.

At the hearing yesterday, Dorcas R. Hardy, denied any other verifications at
first.  However, she later admitted that in the early 1980s, 3,000,000 social
security numbers were verified for CitiCorp and that last year 151,000 numbers
were verified for TRW.  Ms. Hardy said that the 151,000 numbers were just part
of a "test run."

Senator David Pryor, a democrat from Arkansas and chairman of the Special
Committee on Aging, said that previous commissioners; the Congressional
Research Service of the Library of Congress, and Donald A. Gonya, chief counsel
for Social Security have all decided that such verification is illegal.
_______________________________________________________________________________

PWN Quicknotes

1.  Prank Virus Warning Message (March 28, 1989) -- An individual placed a time
    bomb message on a government service system in the San Francisco Bay Area
    saying, "WARNING! A computer virus has infected the system!"  The
    individual is learning that such a prank is considered almost as funny as
    saying that you have a bomb in your carry-on luggage as you board a plane.
    -- Bruce Baker, Information Security Program, SRI International
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2.  Hackers' Dictionary In Japanese? (March 30, 1989) -- What is this you ask?
    This amusing compilation was put together a decade or so ago by artificial
    intelligence (AI) graduate students at Stanford, MIT, and Carnegie-Mellon
    and recorded the then-current vernacular of their shared cultures.  They
    did it for fun, but it somehow ended up getting published.

    The Hackers' Dictionary contains more than a few puns, jokes, and other
    things that are hard to translate such as "moby," as in "moby memory", or
    "fubar" and its regional variants "foo bar" and "foo baz."
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
3.  AT&T's Air Force -- AT&T has an air force that patrols its cable routes,
    some routes 24 hours a day, 365 days a year.  The AT&T air force includes
    helicopters and fixed-wing aircraft.  For some areas, AT&T uses infantry
    and armored cars.  AT&T's Sue Fleming says, "We hope NOT to find any
    activity.  We don't want to 'catch' people.  But if we do spot a digging
    crew, the usual procedure is for the pilot to radio the location back to a
    ground crew, who check it out.  On occasion, they drop notes -- or even
    land -- but that depends on where the site is.  In some areas -- like New
    Jersey -- unauthorized landings bring heavy penalties."
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4.  Terrorist Threat? -- Scientific advisors to the government told a Senate
    panel that telecommunications networks are tempting targets for terrorist
    activity.  The experts said that advances in technology -- like fiber
    optics, which concentrates equipment and data -- and the fragmentation of
    the telecom industry after divestiture are reasons for the increased risk.
    Certainly the Hinsdale, Illinois CO fire and the recent severing of a fiber
    backbone in New Jersey have shown us all how vulnerable our country's
    telecom network is.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5.  FCC Rules On AOS -- The FCC has ruled on a complaint filed this summer by
    two consumer groups against five Alternative Operator Services (AOS)
    companies.  The FCC found the complaint valid and has ordered the AOS
    companies to stop certain practices immediately.

    The ruling states that callers must be told when their calls are being
    handled by an AOS, operators must provide callers with rate information and
    hotel or payphone owners cannot block calls to other long distance
    carriers.  (Callers who don't take any special action when making a call
    will still be routed to the pre-subscribed carrier.)

    The FCC has also ordered the companies to eliminate "splashing" whenever
    technically feasible.  Splashing is transferring a call to a distant
    carrier point-of-presence and charging the caller for the call from that
    point.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6.  Cool New Service -- CompuServe (the world's biggest computer bulletin
    board) users can now dial in and search and find articles from a bunch of
    different technical trade magazines.  The database was put together by an
    outfit called Information Access Company.  It currently contains full-text
    articles for 50 publications and paraphrased abstracts for 75 more.  Most
    coverage begins with the January 1987 issues.

    You can search the publications by magazine name, author, key word, key
    phrase, etc., then pull up the abstracts of the article of interest and, if
    needed and when available, get the full text of the article.  And it's easy
    to use.

    Charge for the service is $24 per hour, $1 for each abstract, and $1.50 for
    each full-text article accessed.  CompuServe charges $12.50 per hour for
    connect time.  Both per hour charges are pro-rated, and, with the databases
    being so easy to use, you'll rarely be on the board for more than 10-15
    minutes, so those costs will drop.

                     CompuServe              800-848-8199
                     Information Access      800-227-8431
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7.  ISDN Calling Number Identification Services (April 7, 1989) -- Bellcore
    Technical Reference TR-TSY-000860, "ISDN Calling Number Identification
    Services" can be purchased for $46 from:

                                   Bellcore
                               Customer Service
                              60 New England Ave
                           Piscataway, NJ 08854-4196
                                (201) 699-5800

    This Technical Reference contains Bellcore's view of generic requirements
    for support of ISDN Calling Number Identification (I-CNIS).  The I-CNIS
    feature extends the concepts of Calling Number Delivery and Calling Number
    Delivery Blocking to ISDN lines.  I-CNIS also allows the customer to
    specify which Directory Number (DN) should be used for each outgoing call
    and provides network screening to ensure that the specified DN is valid.
    I-CNIS handles calling number processing for both circuit-mode and
    packet-mode ISDN calls and provides four component features:  Number
    Provision, Number Screening, Number Privacy, and Number Delivery.  Material
    on Privacy Change by the calling party and Privacy Override by the called
    party is also included.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
8.  Founder of TAP Magazine, Abbie Hoffman, born in 1936, passed away on April
    12, 1989.  He was found dead in his apartment in New Hope, PA.  He was
    fully dressed under the bedcovers.  An autopsy was inconclusive.  An
    article about him appears in the April 24, 1989 issue of Time Magazine,
    "A Flower in a Clenched Fist," page 23.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9.  Bill Landreth aka The Cracker, author of Out Of The Inner Circle, has
    reappeared.  Supposedly, he is now working as a bookbinder in Orange
    County, California and living with the sysop of a bulletin board called the
    "Pig Sty." -- Dark Sorcerer (April 19, 1989)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
10.  Hacker/Phreaker Gets "Stiff" Penalty (Green Bay, Wisconsin) -- David
     Kelsey, aka Stagehand, plead guilty to two counts of class "E" felonies
     and received a 90 day jail term.  Once he has completed his jail term, he
     will serve three years probation and an unknown amount of community
     service hours.

     In addition to these penalties, Stagehand must also pay restitution of
     $511.00 to Schneider Communications of Green Bay, Wisconsin.  Stagehand
     was given all his computer equipment back as part of the plea bargain --
     minus any materials considered to be "ill gotten" gains.
_______________________________________________________________________________
! ***


1:30:22 p.m.    ARE YOU STILL THERE ?
! ***


1:35:22 p.m.    RESPOND OR BE LOGGED OFF
!