| ==Phrack Inc.== | |
| Volume Two, Issue Ten, Phile #8 of 9 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN <-=*} Phrack World News {*=-> PWN | |
| PWN PWN | |
| PWN Issue IX/Part One PWN | |
| PWN PWN | |
| PWN Compiled, Written, and Edited by PWN | |
| PWN PWN | |
| PWN Knight Lightning PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| In PWN Issue Seven/Part One, we had an article entitled "Maxfield Strikes | |
| Again." It was about a system known as "THE BOARD" in the Detroit 313 NPA. | |
| The number was 313-592-4143 and the newuser password was "HEL-N555,ELITE,3" | |
| (then return). It was kind of unique because it was run off of an HP2000 | |
| computer. On August 20, 1986 the following message was seen on "THE BOARD." | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Welcome to MIKE WENDLAND'S I-TEAM sting board! | |
| (Computer Services Provided By BOARDSCAN) | |
| 66 Megabytes Strong | |
| 300/1200 baud - 24 hours. | |
| Three (3) lines = no busy signals! | |
| Rotary hunting on 313-534-0400. | |
| Board: General Information & BBS's | |
| Message: 41 | |
| Title: YOU'VE BEEN HAD!!! | |
| To: ALL | |
| From: HIGH TECH | |
| Posted: 8/20/86 @ 12.08 hours | |
| Greetings: | |
| You are now on THE BOARD, a "sting" BBS operated by MIKE WENDLAND of the | |
| WDIV-TV I-Team. The purpose? To demonstrate and document the extent of | |
| criminal and potentially illegal hacking and telephone fraud activity by the | |
| so-called "hacking community." | |
| Thanks for your cooperation. In the past month and a half, we've received all | |
| sorts of information from you implicating many of you to credit card fraud, | |
| telephone billing fraud, vandalism, and possible break-ins to government or | |
| public safety computers. And the beauty of this is we have your posts, your | |
| E-Mail and--- most importantly ---your REAL names and addresses. | |
| What are we going to do with it? Stay tuned to News 4. I plan a special | |
| series of reports about our experiences with THE BOARD, which saw users check | |
| in from coast-to-coast and Canada, users ranging in age from 12 to 48. For our | |
| regular users, I have been known as High Tech, among other ID's. John Maxfield | |
| of Boardscan served as our consultant and provided the HP2000 that this "sting" | |
| ran on. Through call forwarding and other conveniences made possible by | |
| telephone technology, the BBS operated remotely here in the Detroit area. | |
| When will our reports be ready? In a few weeks. We now will be contacting | |
| many of you directly, talking with law enforcement and security agents from | |
| credit card companies and the telephone services. | |
| It should be a hell of a series. Thanks for your help. And don't bother | |
| trying any harassment. Remember, we've got YOUR real names. | |
| Mike Wendland | |
| The I-team | |
| WDIV, Detroit, MI. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| This then is the result: | |
| Phrack World News proudly presents... | |
| Mike Wendland & the I-Team Investigate | |
| "Electronic Gangsters" | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Carman Harlan: Well we've all heard of computer hackers, those electronic | |
| gangsters who try to break into other people's computer | |
| systems. Tonight on the first of a three part news 4 [WDIV-TV, | |
| Channel 4 in Detroit] extra, Mike Wendland and the I-Team will | |
| investigate how such computer antics jeopardize our privacy. | |
| Mike joins us now to tell us what at first may have been | |
| innocent fun may now be affecting our pocket books. | |
| Mike Wendland: Well Carman and Mort, thanks to the media and movies just about | |
| everyone knows about hackers and phone phreaks. By hooking | |
| their Apples, their Ataris, and their Commodores into telephone | |
| lines these electronic enthusiasts have developed a new form of | |
| communication, the computer bulletin board. There are probably | |
| 10,000 of these message swapping boards around the country | |
| today, most are innocent and worthwhile. There are an | |
| estimated 1,000 pirate or hacker boards where the main | |
| activities are electronic trespassing, and crime [Estimates | |
| provided by John Maxfield]. | |
| [Clipping From Wargames comes on] | |
| In movies like Wargames computer hackers are portrayed as | |
| innocent hobbyist explorers acting more out of mischief than | |
| malice. But today a new generation of hackers have emerged. A | |
| hacker that uses his knowledge of computers to commit crimes. | |
| Hackers have electronically broken into banks, ripped off | |
| telephone companies for millions of dollars, trafficked in | |
| stolen credit card numbers, and through there network of | |
| computer bulletin boards traded information on everything from | |
| making bombs to causing terrorism. | |
| [Picture of John Maxfield comes on] | |
| John Maxfield: Well, now there are electronic gangsters, not just electronic | |
| explorers they are actually gangsters. These hackers meet | |
| electronically through the phone lines or computer bulletin | |
| boards. They don't meet face to face usually, but it is a | |
| semi-organized gang stile activity, much like a street gang, or | |
| motorcycle gang. | |
| Mike Wendland: John Maxfield of Detroit is America's foremost "Hacker | |
| Tracker". He has worked for the F.B.I. and various other law | |
| enforcement and security organizations. Helping catch dozens | |
| of hackers around the country, who have used their computers | |
| for illegal purposes. To find out how widespread these | |
| electronic gangsters have become, we used John Maxfield as a | |
| consultant to setup a so-called "sting" bulletin board [THE | |
| BOARD]. | |
| We wrote and designed a special program that would allow us to | |
| monitor the calls we received and to carefully monitor the | |
| information that was being posted. We called our undercover | |
| operation "The Board", and put the word out on the underground | |
| hacker network that a new bulletin board was in operation for | |
| the "Elite Hacker". Then we sat back and watched the computer | |
| calls roll in. | |
| In all we ran our so called "Sting" board for about a month and | |
| a half, 24 hours a day, 7 days a week. We received literally | |
| hundreds of phone calls from hackers coast to coast, ranging in | |
| age from 17 to 43. All of them though had one thing in common, | |
| they were looking for ways to cheat the system. | |
| The hackers identified themselves by nicknames or handles like | |
| CB radio operators use, calling themselves things like Ax | |
| Murderer, Big Foot, and Captain Magic. They left messages on a | |
| variety of questionable subjects, this hacker for instance told | |
| how to confidentially eavesdrop on drug enforcement radio | |
| conversations. A New York hacker called The Jolter swapped | |
| information on making free long-distance calls through stolen | |
| access codes, and plenty of others offered credit card numbers | |
| to make illegal purchases on someone else's account. | |
| John Maxfield: Well these kids trade these credit card numbers through the | |
| computer bulletin boards much like they'd trade baseball cards | |
| at school. What we've seen in the last few years is a series | |
| of hacker gangs that are run by an adult, sort of the | |
| mastermind who stays in the background and is the one who | |
| fences the merchandise that the kids order with the stolen | |
| credit cards. | |
| Mike Wendland: Then there were the malicious messages that had the potential | |
| to do great harm. The Repo Man from West Virginia left this | |
| message telling hackers precisely how to break into a hospital | |
| computer in the Charleston, WV area. | |
| [Picture of Hospital] | |
| This is where that number rings, the Charleston Area Medical | |
| Center. We immediately notified the hospital that there | |
| computer security had been breached. Through a spokesperson, | |
| the hospital said that a hacker had indeed broken into the | |
| hospital's computer and had altered billing records. They | |
| immediately tightened security and began an investigation. | |
| They caught the hacker who has agreed to make restitution for | |
| the damages. Maxfield says though, "Most such break-ins are | |
| never solved". | |
| John Maxfield: When you are talking about electronic computer intrusion, it's | |
| the perfect crime. It's all done anonymously, it's all done by | |
| wires, there's no foot prints, no finger prints, no blood | |
| stains, no smoking guns, nothing. You may not even know the | |
| system has been penetrated. | |
| Mike Wendland: Our experience with the "Sting" bulletin board came to a sudden | |
| and unexpected end. Our cover was blown when the hackers | |
| somehow obtained confidential telephone company records. The | |
| result a campaign of harassment and threats that raised serious | |
| questions about just how private our supposedly personal | |
| records really are. That part of the story tomorrow. [For a | |
| little more detail about how their cover was "blown" see PWN | |
| Issue 7/Part One, "Maxfield Strikes Again." Heh heh heh heh.] | |
| Mort Crim: So these aren't just kids on a lark anymore, but who are the | |
| hackers? | |
| Mike Wendland: I'd say most of them are teenagers, our investigation has | |
| linked about 50 of them hardcore around this area, but most | |
| very young. | |
| Mort Crim: Far beyond just vandalism! | |
| Mike Wendland: Yep. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| A few quicknotes in between shows, Mike Wendland and John Maxfield set up THE | |
| BOARD. Carman Harlan and Mort Crim are newscasters. | |
| Also if anyone is interested in the stupidity of Mike Wendland, he flashed the | |
| post that contained the phone number to the hospital across the screen, Bad | |
| Subscript put the VCR on pause and got the number. If interested please | |
| contact Bad Subscript, Ctrl C, or myself. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Carman Harlan: Tonight on the second part of a news 4 [WDIV-TV, Channel 4 in | |
| Detroit] extra Mike Wendland and the I-Team report on how they | |
| setup a sting bulletin board to see how much they could get on | |
| these criminal hackers. Mike joins us now to explain that | |
| information, that was not the only thing they got. | |
| Mike Wendland: That's right, Carman & Mort. Our so called sting bulletin | |
| board received hundreds of calls from hackers all over America, | |
| and even Canada. They offered to trade stolen credit cards, | |
| and they told how to electronically break into sensitive | |
| government computers. But our investigation came to a sudden | |
| end when our sting board was stung. Our cover was blown when | |
| a hacker discovered that this man, computer security expert | |
| John Maxfield was serving as the I-Team consultant on the | |
| investigation. Maxfield specializes as a hacker tracker and | |
| has worked for the F.B.I. and various other police and security | |
| agencies. The hacker discovered our sting board by getting a | |
| hold of Maxfield's supposedly confidential telephone records. | |
| John Maxfield: And in the process of doing that he discovered the real number | |
| to the computer. We were using a different phone number that | |
| was call forwarded to the true phone number, he found that | |
| number out and called it to discover he was on the sting board. | |
| Mike Wendland: But the hacker didn't stop at exposing the sting, instead he | |
| posted copies of Maxfield's private telephone bill on other | |
| hacker bulletin boards across the country. | |
| John Maxfield: The harassment started, all of the people on my phone bill got | |
| calls from hackers. In some cases their phone records were | |
| also stolen, friends and relatives of theirs got calls from | |
| hackers. There was all sorts of other harassment, I got a call | |
| from a food service in Los Angeles asking where I wanted the | |
| 500 pounds of pumpkins delivered. Some of these kids are | |
| running around with guns, several of them made threats that | |
| they were going to come to Detroit, shoot me and shoot Mike | |
| Wendland. | |
| Mike Wendland: A spokesperson from Michigan Bell said that the breakdown in | |
| security that led to the release of Maxfield's confidential | |
| records was unprecedented. | |
| Phil Jones (MI Bell): I think as a company were very concerned because we work | |
| very hard to protect the confidentially of customer's | |
| records. [Yeah, right]. | |
| Mike Wendland: The hacker who got a hold of Maxfield's confidential phone | |
| records is far removed from Michigan, he lives in Brooklyn, NY | |
| and goes by the name Little David [Bill From RNOC]. He says | |
| that getting confidential records from Michigan Bell or any | |
| other phone company is child's play. Little David is 17 years | |
| old. He refused to appear on camera, but did admit that he | |
| conned the phone company out of releasing the records by simply | |
| posing as Maxfield. He said that he has also sold pirated | |
| long-distance access codes, and confidential information | |
| obtained by hacking into the consumer credit files of T.R.W. | |
| Little David says that one of his customers is a skip-tracer, a | |
| private investigator from California who specializes in finding | |
| missing people. Maxfield, meanwhile, says that his own | |
| information verified Little David's claim. | |
| John Maxfield: The nearest I can determine the skip-tracer was using the | |
| hacker, the 17 year old boy to find out the whereabouts of | |
| people he was paid to find. He did this by getting into the | |
| credit bureau records for the private eye. This is an invasion | |
| of privacy, but it's my understanding that this boy was getting | |
| paid for his services. | |
| Mike Wendland: In Long Island in New York, Maxfield's telephone records were | |
| also posted on a bulletin board sponsored by Eric Corley, | |
| publisher of a hacker newsletter [2600 Magazine]. Corley | |
| doesn't dispute the harassment that Maxfield received. | |
| Eric Corley: Any group can harass any other group, the difference with hackers | |
| is that they know how to use particular technology to do it. If | |
| you get a malevolent hacker mad at you there's no telling all the | |
| different things that can happen. | |
| Mike Wendland: What can happen? Well besides getting your credit card number | |
| or charging things to your account, hackers have been known to | |
| change people's credit ratings. It is really serious business! | |
| And tomorrow night we'll hear about the hacker philosophy which | |
| holds that if there is information out there about you it is | |
| fair game. | |
| Mort Crim: "1984" in 1986. | |
| Mike Wendland: It is! | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Carman Harlan: News four [WDIV-TV, Channel 4 in Detroit] extra, Mike Wendland | |
| and the I-Team look at how these hackers are getting out of | |
| hand. | |
| Mike Wendland: The problem with hackers is not just with mischief anymore, | |
| unscrupulous hackers are not only invading your privacy, they | |
| are costing you money. Case and point, your telephone bills, | |
| because American telephone companies have long been targets of | |
| computer hackers and thieves we are paying more than we should. | |
| Experts say the long distance companies lose tens of millions | |
| of dollars a year to, these self described "Phone Phreaks." | |
| For example in Lansing, the Michigan Association of | |
| Governmental Employees received a phone bill totalling nearly | |
| three hundred and twenty one thousand dollars. For calls | |
| illegally racked up on there credit card by hackers. Such | |
| victims seldom get stuck paying the charges, so hackers claim | |
| there piracy is innocent fun. | |
| Phil Jones (MI Bell): Nothing could be further from the truth, it becomes a | |
| very costly kind of fun. What happens is that the | |
| majority of the customers who do pay there bills on | |
| time, and do use our service lawfully end up quitting | |
| after that bill. | |
| Mike Wendland: That's not all, hackers regularly invade our privacy, they | |
| leave pirated credit card numbers and information how to break | |
| into electronic computer banks on bulletin boards. Thousands | |
| of such electronic message centers exist across the country, | |
| most operated by teenagers. | |
| John Maxfield: There is no law enforcement, no parental guidance, they're just | |
| on their own so they can do anything they want. So the few bad | |
| ones that know how to steal and commit computer crimes teach | |
| the other ones. | |
| Mike Wendland: There is very little that is safe from hackers, from automatic | |
| teller machines and banks to the internal telephone systems at | |
| the White House. Hackers have found ways around them all | |
| hackers even have their own underground publication of sorts | |
| that tells them how to do it. | |
| [Close up of publication] | |
| Its called 2600 [2600 Magazine], after the 2600 hertz that | |
| phone phreaks use to bypass telephone companies billing | |
| equipment. It tells you how to find credit card numbers and | |
| confidential records in trash bins, break into private | |
| mainframe computers, access airline's computers, and find | |
| financial information on other people through the nations | |
| largest credit bureau, TRW. 2600 is published in a | |
| ram-shackled old house at the far end of Long Island, New York | |
| by this man, Eric Corley. He argues that hackers aren't | |
| electronic gangsters. | |
| Eric Corley: We like to call them freedom fighters. Hackers are the true | |
| individuals of the computer revolution, they go were people tell | |
| them not to go, they find out things they weren't supposed to | |
| find out. | |
| Mike Wendland: Corley's newsletter supports a hacker bulletin board called the | |
| Private Sector. Last year the F.B.I. raided it. | |
| Eric Corley: They managed to charge the system operator with illegal | |
| possession of a burglary tool in the form of a computer program. | |
| Mike Wendland: But the bulletin board is still in operation. Corley resents | |
| the suspicion that hackers are involved in criminal activities. | |
| Eric Corley: Hackers are not the people who go around looking for credit cards | |
| and stealing merchandise. That's common thievery. Hackers are | |
| the people who explore. So basically what we are saying is more | |
| knowledge for more people. That will make it better for | |
| everybody. | |
| Mike Wendland: He claims that hackers, in their own ways, really protect our | |
| rights by exposing our vulnerabilities. Well hackers may | |
| expose our vulnerabilities, but they also invade our privacy. | |
| There activities have really spotlighted the whole question of | |
| privacy raised by the massive files that are now out there in | |
| electronic data banks. Much of that information that we think | |
| is personal and confidential is often available to the whole | |
| world. | |
| Original transcript gathered and typed by | |
| Ctrl C & Bad Subscript | |
| Major editing by Knight Lightning | |
| _______________________________________________________________________________ | |