File size: 21,128 Bytes
8ecd256 | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 | ==Phrack Magazine==
Volume Four, Issue Forty-Four, File 27 of 27
PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN
PWN PWN
PWN Phrack World News PWN
PWN PWN
PWN Compiled by Datastream Cowboy PWN
PWN PWN
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
Feds Pull The Plug On Phiber Optik November 4, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Joshua Quitner (Newsday) (Page 57)
The biggest case of computer intrusion in US history drew to a close yesterday
when a young Elmhurst, Queens, man was sentenced to a year and a day in jail
for his part in an electronic gang that, for years, roamed the nation's
largest telephone and data networks.
Mark Abene, 21, renowned in the digital underground as Phiber Optik, was the
last of five young New York City men to plead guilty in federal court to one
felony count of conspiracy for being in a hacker group known as MOD.
Abene apologized for his deeds yesterday. "I'm just sorry they were
misconstrued as malicious in any way," he said in Manhattan's federal
district court.
Prosecutors claimed that the young men rumbled on computer networks,
disconnecting other hackers' phone service and posting embarrassing
information culled from confidential credit networks like TRW on
underground bulletin boards. They also used their power skills to get
telephone numbers or credit reports for celebrities, including Julia
Roberts, John Gotti, Geraldo Rivera, Christina Applegate and Mad Magazine
founder William Gaines.
John Lee, 22, a co-defendant is now serving a one year sentence in a
"shock incarceration" boot camp in Lewisburg, PA. Lee and Julio Fernandez,
18, were the only gang members who made money from the two years of
break-ins.
In addition to Lee and Fernandez, Paul Stira, 23, of Cambria Heights,
Queens, and Elias Ladopoulos, 24, of Jamaica, Queens, are serving six-month
sentences in federal prisons in Pennsylvania. Fernandez has been cooperating
with authorities and is not expected to be jailed.
-------------------------------------------------------------------------------
Computer Caper Is Unpluged
~~~~~~~~~~~~~~~~~~~~~~~~~~ October 1, 1993
by Tim Bryant (St. Louis Dispatch) (Page A1)
Investigators said 18-year-old computer hacker Paul J. Gray of Creve Coeur,
MO, was arrested on a state charge of tampering with computer data, a
misdemeanor. The college freshman reportedly used his home computer to
spy electronically on files of a federal appeals court and charge
long-distance telephone calls to Mercantile Bank
-------------------------------------------------------------------------------
Teen Hacker Admits Having Illegal Credit Information June 17, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by James McClear (Detroit News) (Page B7)
Ander Monson, 18, of Houghton, MI, whose electronic misadventures uploaded
him into the high-tech world of computer fraud, pleaded guilty in Oakland
County Probate Court to illegal possession of credit card information.
-------------------------------------------------------------------------------
In The Jungle Of MUD September 13, 1993
~~~~~~~~~~~~~~~~~~~~
by Ellen Germain (Time) (Page 61)
Virtual worlds you can hook into--and get hooked on--are the latest
rage on the computer networks.
[Ah, yes, Virtual Reality as perceived through the minds of the computer
illiterate. But wait, it's electronic crack! Keep an eye out for your
children!]
-------------------------------------------------------------------------------
NCIC Abuse - Is Legislation The Answer October, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Brian Miller
Confidential information is being illegally released from the National
Crime Information Center network. But abuse of the system is difficult
to detect, and those caught are seldom punished.
A former law enforcement officer tracked town his ex-girlfriend with
information from an FBI-run law enforcement information system. Then
he killed her.
A terminal operator in Pennsylvania used the same system to conduct
background searches for her drug dealing boyfriend to see if his customers
were undercover agents.
It is hard to trace abuse to a single user because many agencies don't
require personal access codes which would keep track of who made specific
inquiries on the system and when they occurred. The General Accounting
Office polled all the states and found that 17 don't require a personal
code to access the NCIC. Most of these had an identifier only for the
terminal or agency accessing the system.
And if someone is caught abusing the system, they are seldom charged with
a crime. The GAO found that the most common penalty was a reprimand, with
some suspensions and firings. Of the 56 cases of abuse found by the GAO,
only seven people were prosecuted.
The FBI cannot force the states to adopt certain security measures
because compliance with the guidelines is voluntary. The reason for this is
that the guts of the NCIC come from the states, and the FBI simply
maintains the network.
"The main thing that can be done today is to enforce the law, and create
stronger penalties for abusing the system," said Marc Rotenbertg of
Computer Professionals for Social Responsibility, an advocacy group
based in Palo Alto, California.
-------------------------------------------------------------------------------
Live Wires September 6, 1993
~~~~~~~~~~
by Barbara Kantrowitz et.al. (Time) (Page 63)
&
Technoid Circus
~~~~~~~~~~~~~~~
by Rex Weiner (Spin) (Page 72) September, 1993
[K-K00l cYbUR P|_|n|< aRt1Cl3zzzz
Jump On The Cyber Bandwagon!
More Journalists ride that old info highway straight to HELL!]
** BUT WAIT! A "Cyber" article we can all dig! **
Speciale Cyber Settembre, 1993
~~~~~~~~~~~~~~
di Sergio Stingo (King) (P. 131)
Il cyberpunk: tutti ne parlano, ma pochi sanno cosa sia veramente. Libri
elettronici? Scenari inquietanti del futuro prossimo venturo? Conferenze
telematiche? Nuovi tipi di abbigliamento usa-e-getta? La piu' grande
rivoluzione democratica dei nostri anni? Una rivoluzione strisciante e
silenziosa? Ia nostro stingo, sempre curioso del <<nuovo>>, S'e' messo
a girare l'italia per iundagare il fenomeno. E' stato come scoperchiare
una pentola in ebollizione. Piu' incontrava <<cyber>> e piu' scopriva che
c'era da scoprire. Dal teorico della <<brain machine>>, che sperimenta
l'oggetto misterioso tra discoteche e universita', alla prima galleria
dove sono esposte opere di hacker art. Dalle riviste-bandiera del cyber,
come <<decoder>>, alle band che stanno inventando una nuova musica. Per non
parlare del sesso, che grazie alla tecnologia cerca di ampliare la
gamma delle sensazioni possibili. Insomma, il viaggio oltre i confini di
questo mondo e' stato talmente ricco e avventuroso, che abbiamo dovuto
suddividere il reportage in due puntate. In questo numero presentiamo
la prima. E, come si dice tra cybernauti, buona navigazione.
[I don't know what that says, but its in another language, so it has to
be cooler than the American CyberCrap]
-------------------------------------------------------------------------------
Security Products Abound, But Is Toll Fraud Too Tough? August 30, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Dan O'Shea (Telephony) (Page 7)
Telecommunications toll fraud is an increasingly popular crime that
collectively costs its victims billions of dollars each year. Although
carriers have responded with a wave of security products and services,
the problem might be much bigger than was once thought.
Some carriers claim that industry wide toll fraud losses amount to between
$2 billion and $5 billion a year, but the true figure is closer to $8 billion,
according to Bernie Milligan, president of CTF Specialists Inc.,
a consulting group that studies toll fraud and markets security services to
large corporate telecommunications users. [ed: remember HoHo Con? Yes...THAT
Bernie]
Toll fraud involving calls coming into AT&T's 800 network dropped 75% since
the introduction of NetProtect, while Sprint estimates a 95% decrease from
last year (since the introduction of their fraud detection service). Average
losses across the industry have plummeted from $120,000 per incident to
$45,000.
Despite the offensive against telecom fraud, the problem persists and is
becoming more frequent, and new technologies will only represent potential
new adventures for hackers, CFT's Milligan said. Hacker activity is growing
at an annual rate of 35%. Some 65% to 80% of toll fraud involves
international calling, and fraud occurs on a much wider scale than just
inbound 800 calls, Milligan said. So, while losses of this type of fraud
drop, collective fraud losses are increasing by 25% each year. Customers
are still liable financially in toll fraud cases, and the carriers continue
to get paid.
-------------------------------------------------------------------------------
Misfit Millionaires December, 1993
~~~~~~~~~~~~~~~~~~~
by Steve Fishman (Details) (Page 158)
[Author profiles several of the early Microsoft programmers, namely
Richard Brodie, Jabe Blumenthal, Kevin DeGraaf, Neil Konzen and Doug
Klunder]
-------------------------------------------------------------------------------
Intercourse With Lisa Palac 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Melissa Plotsky (Axcess) (Page 62)
&
Turned On By Technology In The World Of Cybersex August 30, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Marco R. della Cava (USA Today) (Page 4D)
[An interview and an overview dealing with online nastiness. Lisa Palac
editor of Future Sex and producer of Cyborgasm talks about all kinds of
stuff. As a regular peruser of Future Sex (for the articles of course)
I can't help but wonder why we haven't seen HER naked yet. Email
her at futursex@well.sf.ca.us and demand some gifs.]
-------------------------------------------------------------------------------
Don't Try This At Home
~~~~~~~~~~~~~~~~~~~~~~ August, 1993
(Compute) (Page 62)
Welcome to desktop forgery.
Susan Morton, senior forensic document examiner with the US Postal Service
in San Francisco, has seen gangs travelling the country packing computers,
scanners, and laser printers. Arriving in town, their first move is to rob
a mailbox to acquire some checks that were mailed to, say, a local utility
company. They will copy the account and routing code off some citizen's
check and decide what branch bank that person probably uses. Then they forge
a large corporate or government check to that person, using information from
other checks they found in the mail. Packing a forged ID, a gang member
will then go to a branch across town where presumably nobody knows the
citizen and deposit part of that forged check. The check may be for $5000,
of which the forger takes $2000 as cash, smiles and leaves.
One check forging gang was chased across Texas for about six months in the
late 1980s, recalls Robert Ansley, corporate security manager for Dell
Computer in Austin, Texas, then with the Austin police department. Armed
with a stolen Macintosh and an ID maker stolen from a highway patrol
substation, they passed more than $100,000 in bogus checks in Austin alone.
Sources say other gangs have used laser printers to forge security ID
badges to get into office buildings and steal the computers, nodding at the
friendly security guard at the front desk while trudging out with their
arms full.
"We have been urging corporations to move forward with EDI (Electronic
Data Interchange) for more and more of their business transactions and
avoid paper, since it will become so vulnerable," says Donn Parker,
computer crime expert with SRI International in Menlo Park, California.
In 1991, the Secret Service busted 66 traditional counterfeiting operations,
while seizing 52 office machines that had been used for counterfeiting
-------------------------------------------------------------------------------
Subduing Software Pirates October, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~
by Suzanne Weisband and Seymour Goodman (Technology Review) (Page 30)
[The software manufacturers claim they lose between 9 and 12 billion
annually. Thank GOD for the SPA and the BSA. Like they are go to
Singapore or Hong Kong with guns and get the REAL culprits. Noooo.
Let's raid BBSes and businesses.
Their people at COMDEX told me they really weren't interested in
taking my money to help me combat Phrack Piracy. I think we all know
where THEIR interests lie.]
-------------------------------------------------------------------------------
Mindvox: Urban Attitude Online November, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Charles Platt (Wired) (Page 56)
[Another of those cute Mindvox RULES articles. "Fancher looked too neat,
clean, and classy to be a hacker, but he enjoyed the cut-and-thrust of
online jousting as much as anyone." But wait, there's a little
name dropping too: Wil Wheaton, Kurt Larson, Billy Idol, THE LEGION OF DOOM!
Don't get me wrong, I love Vox. And I really like the author of this story's
last book "The Silicon Man," I just get kinda edgy about stuff in Wired.
Favorite quote: "Unix is arcane," says Bruce, "and it's weird, and most
users don't want to deal with it." I know I don't. Not.]
-------------------------------------------------------------------------------
Intel To Protect Chips October 22, 1993
~~~~~~~~~~~~~~~~~~~~~~
(Newswire Sources)
One of the nation's largest manufacturers of computer chips said Friday it
will start to put serial numbers on its products in an effort to stem the
rising tide of robberies. Intel Corp. said it was taking its actions
after a flurry of armed takeover robberies at warehouses in California's
Silicon Valley over the last six months.
What the robbers are after is microprocessors -- the brains that power
personal computers. Among their favorite targets has been Intel's 486
microprocessor.
Julius Finkelstein, head of Santa Clara's High Tech Crime Task Force,
called chip robberies "the gang crime of the 1990s." "They are just
as valuable as cocaine," he said. "But they are easier to get rid of
and if you are caught the penalties aren't as severe."
The gangs, Finkelstein said, are Asian, well organized and very
knowledgable about computer components. They generally drive up to a
warehouse door as if coming for a shipment, but once inside pull out
their weapons and force the employees to the floor.
Last month, a takeover robbery at the Wylie Laboratories Electronic
Marketing Group in Santa Clara netted thieves an estimated $1 million in
chips. Finkelstein said that robbery took only about 15 minutes.
-------------------------------------------------------------------------------
Chip Robberies Continue November 5, 1993
~~~~~~~~~~~~~~~~~~~~~~~
(Newswire Sources)
Authorities said a gang of Vietnamese-speaking bandits staged a violent
takeover robbery of a San Jose computer parts company Thursday, wounding
one man and escaping with an undisclosed amount of electronic equipment.
Lt. Rob Davis said the robbery began at 1:01 a.m. when as many as
five gunmen forced their way into the Top Line Electronics Co., a
computer board manufacturer. The bandits rounded up the employees and
beat them in an attempt to find where the computer parts were stored.
One employee was shot in the hip as he tried to escape. Davis said
the man was treated at a local hospital and was listed in stable
condition.
-------------------------------------------------------------------------------
Hacker Revelled In Spotlight, Court Told August 23, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(The Age)
A hacker who broke into a computer at NASA in the United States,
and contemplated sending it a message not to launch a space shuttle, was
delighted with the effect he was having, the County Court was told yesterday.
The prosecutor, Mr Richard Maidment, said that in a three-way
conversation between Nahshon Even-Chaim, David John Woodcock
and another computer hacker, Woodcock discussed sending a message
to a computer at NASA to stop the launch of a space shuttle, after
Woodcock talked about the shuttle Challenger, which blew up several
years before, and said "I have got to do something about NASA."
Even-Chaim, 22, formerly of Narong Road, Caulfield, yesterday
pleaded guilty to 15 charges relating to unauthorized obtaining,
altering, inserting, and erasing of data stored in a computer, and
the interfering and obstruction of the lawful use of a computer.
Woodcock, 25, formerly of Ashleigh Avenue, Frankston, pleaded
guilty to two counts of being knowingly concerned in the obtaining
of unauthorized access by Even-Chaim to data stored in a computer.
The court was told that a co-offender, Richard Martin Jones
was earlier sentenced to six months jail, but was released on a $500,
six-month good behavior bond.
The court was told that Even-Chaim obtained free use of telephone
lines for many hours to connect his home computer to other systems
in the United States.
Mr. Maidment said that Even-Chaim, Woodcock, and Jones, who
collectively called themselves "The Realm", were arrested in April 1990
by the Australia Federal Police after an investigation that began with
information received from the United States Secret Service.
-------------------------------------------------------------------------------
The Last Hacker September 26, 1993
~~~~~~~~~~~~~~~
by Jonathan Littman (LA Times)
[This is the bet article I've seen yet about Kevin Poulsen. Please go
find it and read it. It covers Poulsen from beginning to end. All the
crazy stunts, the life on the run, the show down with the feds. Everything.
Here is a small excerpt.]
KIIS-Fm called it a "Win a Porsche by Friday": eight Porsches - about
$400,000 worth of steel, leather and status - given away, one a week. You could
hardly live or work in Los Angeles without being caught up in the frenzy. It
seems that the gleaming, candy-red convertibles were plastered on nearly every
billboard and bus in town. Listeners were glued to KIIS, hoping to make the
102nd call after Dees spun the third song in the magical series.
Housewives, businessmen, students and contest freaks jammed the lines with
their car phones and auto-dialers. They all had hopes, but one 24-year-old high
school dropout had a plan. America's most wanted hacker and his associates
sat by their computers and waited. On the morning of June 1, 1990 KIIS played
'Escapade,' 'Love Shack; and then, yes, "Kiss." "We blew out the phone lines,"
every line was ringing says Karen Tobin, the stations promotional director. "We
picked up the calls and counted."
The hacker was counting too. At the precise moment Price's "Kiss" hit the air
he seized control of the station's 25 phone liens, blocking out all calls but
his own. Then the man, who identified himself as Michael B. Peters, calmly
dialed the 102nd call and won a Porsche 944 S2.
It was child's play. Especially for Kevin Lee Poulsen. Computer hacking had
once seemed an innocent obsession to Poulsen, a native of Pasadena, but now it
was his life, and it had taken him over the line. This October, Poulsen will
face the first of two trials, one in San Jose and another in Los Angeles, that
federal prosecutors say are critical to the government. Because of the
seriousness of his alleged breaches of national security, they intend to use the
case as an example to the hacker underground.
As a teen-ager, Poulsen had burrowed deep into the giant switching networks
of Pacific Bell, exploring and exploiting nearly every element of its powerful
computers, from the common systems responsible for creating, changing and
maintaining phone service to the shadow systems that guard the secrets of
national security, according to accusations in a federal indictment. The U.S.
attorney in San Jose says that Poulsen had wiretapped the intimate phone calls
of a Hollywood starlet, allegedly conspired to steal classified military orders,
and reportedly uncovered unpublished telephone numbers for the Soviet Consulate
in San Francisco.
-------------------------------------------------------------------------------
|