| ==Phrack Inc.== | |
| Volume Two, Issue 24, File 12 of 13 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN P h r a c k W o r l d N e w s PWN | |
| PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN | |
| PWN Issue XXIV/Part 2 PWN | |
| PWN PWN | |
| PWN February 25, 1989 PWN | |
| PWN PWN | |
| PWN Created, Written, and Edited PWN | |
| PWN by Knight Lightning PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Shadow Hawk Gets Prison Term February 17, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| An 18 year old telephone phreak from the northside/Rogers Park community in | |
| Chicago who electronically broke into U.S. military computers and AT&T | |
| computers, stealing 55 programs was sentenced to nine months in prison on | |
| Tuesday, February 14, 1989 in Federal District Court in Chicago. | |
| Herbert Zinn, Jr., who lives with his parents on North Artesian Avenue in | |
| Chicago was found guilty of violating the Computer Fraud and Abuse Act of | |
| 1986 by Judge Paul E. Plunkett. In addition to a prison term, Zinn must pay | |
| a $10,000 fine, and serve two and a half years of federal probation when | |
| released from prison. | |
| United States Attorney Anton R. Valukas said, "The Zinn case will serve to | |
| demonstrate the direction we are going to go with these cases in the future. | |
| Our intention is to prosecute aggressively. What we undertook is to address | |
| the problem of unauthorized computer intrusion, an all-too-common problem that | |
| is difficult to uncover and difficult to prosecute..." | |
| Zinn, a dropout from Mather High School in Chicago was 16-17 years old at | |
| the time he committed the intrusions, using his home computer and modem. Using | |
| the handle "Shadow Hawk," Zinn broke into a Bell Labs computer in Naperville, | |
| IL; an AT&T computer in Burlington, NC; and an AT&T computer at Robbins Air | |
| Force Base, GA. No classified material was obtained, but the government views | |
| as 'highly sensitive' the programs stolen from a computer used by NATO which is | |
| tied into the U.S. missile command. In addition, Zinn made unlawful access to a | |
| a computer at an IBM facility in Rye, NY, and into computers of Illinois Bell | |
| Telephone Company and Rochester Telephone Company, Rochester, NY. | |
| Assistant United States Attorney William Cook said that Zinn obtained access to | |
| the AT&T/Illinois Bell computers from computer bulletin board systems, which he | |
| described as "...just high-tech street gangs." During his bench trial during | |
| January, Zinn spoke in his own defense, saying that he took the programs to | |
| educate himself, and not to sell them or share them with other phreaks. The | |
| programs stolen included very complex software relating to computer design and | |
| artificial intelligence. Also stolen was software used by the BOC's (Bell | |
| Operating Companies) for billing and accounting on long distance telephone | |
| calls. | |
| The Shadow Hawk -- that is, Herbert Zinn, Jr. -- operated undetected for at | |
| least a few months in 1986-87, but his undoing came when his urge to brag about | |
| his exploits got the best of him. It seems to be the nature of phreaks and | |
| hackers that they have to tell others what they are doing. On a BBS notorious | |
| for its phreak/pirate messages, Shadow Hawk provided passwords, telephone | |
| numbers and technical details of trapdoors he had built into computer systems, | |
| including the machine at Bell Labs in Naperville. | |
| What Shadow Hawk did not realize was that employees of AT&T and Illinois Bell | |
| love to use that BBS also; and read the messages others have written. Security | |
| representatives from IBT and AT&T began reading Shadow Hawk's comments | |
| regularly; but they never were able to positively identify him. Shadow Hawk | |
| repeatedly made boasts about how he would "shut down AT&T's public switched | |
| network." Now AT&T became even more eager to locate him. When Zinn finally | |
| discussed the trapdoor he had built into the Naperville computer, AT&T decided | |
| to build one of their own for him in return; and within a few days he had | |
| fallen into it. Once he was logged into the system, it became a simple matter | |
| to trace the telephone call; and they found its origin in the basement of the | |
| Zinn family home on North Artesian Street in Chicago, where Herb, Jr. was busy | |
| at work with his modem and computer. | |
| Rather than move immediately, with possibly not enough evidence for a good, | |
| solid conviction, everyone gave Herb enough rope to hang himself. For over two | |
| months, all calls from his telephone were carefully audited. His illicit | |
| activities on computers throughout the United States were noted, and logs were | |
| kept. Security representatives from Sprint made available notes from their | |
| investigation of his calls on their network. Finally the "big day" arrived, | |
| and the Zinn residence was raided by FBI agents, AT&T/IBT security | |
| representatives and Chicago Police detectives used for backup. At the time of | |
| the raid, three computers, various modems and other computer peripheral devices | |
| were confiscated. The raid, in September, 1987, brought a crude stop to Zinn's | |
| phreaking activities. The resulting newspaper stories brought humiliation and | |
| mortification to Zinn's parents; both well-known and respected residents of the | |
| Rogers Park neighborhood. At the time of the younger Zinn's arrest, his father | |
| spoke with authorities, saying, "Such a good boy! And so intelligent with | |
| computers!" | |
| It all came to an end Tuesday morning in Judge Plunkett's courtroom in Chicago, | |
| when the judge imposed sentence, placing Zinn in the custody of the Attorney | |
| General or his authorized representative for a period of nine months; to be | |
| followed by two and a half years federal probation and a $10,000 fine. The | |
| judge noted in imposing sentence that, "...perhaps this example will defer | |
| others who would make unauthorized entry into computer systems." Accepting the | |
| government's claims that Zinn was "simply a burglar; an electronic one... a | |
| member of a high-tech street gang," Plunkett added that he hoped Zinn would | |
| learn a lesson from this brush with the law, and begin channeling his expert | |
| computer ability into legal outlets. The judge also encouraged Zinn to | |
| complete his high school education, and "become a contributing member of | |
| society instead of what you are now, sir..." | |
| Because Zinn agreed to cooperate with the government at his trial, and at any | |
| time in the future when he is requested to do so, the government made no | |
| recommendation to the court regarding sentencing. Zinn's attorney asked the | |
| court for leniency and a term of probation, but Judge Plunkett felt some | |
| incarceration was appropriate. Zinn could have been incarcerated until he | |
| reaches the age of 21. | |
| His parents left the courtroom Tuesday with a great sadness. When asked to | |
| discuss their son, they said they preferred to make no comment. | |
| Information Collected From Various Sources | |
| _______________________________________________________________________________ | |
| FBI National Crime Information Center Data Bank February 13, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Evelyn Richards (Washington Post) | |
| "Proposed FBI Crime Computer System Raises Questions on Accuracy, Privacy -- | |
| Report Warns of Potential Risk Data Bank Poses to Civil Liberties" | |
| On a Saturday afternoon just before Christmas last year, U.S. Customs officials | |
| at Los Angeles International Airport scored a "hit." | |
| Running the typical computer checks of passengers debarking a Trans World | |
| Airlines flight from London, they discovered Richard Lawrence Sklar, a fugitive | |
| wanted for his part in an Arizona real estate scam. | |
| As their guidelines require, Customs confirmed all the particulars about Sklar | |
| with officials in Arizona - his birth date, height, weight, eye and hair color | |
| matched those of the wanted man. | |
| Sklar's capture exemplified perfectly the power of computerized crime fighting. | |
| Authorities thousands of miles away from a crime scene can almost instantly | |
| identify and nab a wanted person. | |
| There was only one problem with the Sklar case: He was the wrong man. The | |
| 58-year old passenger - who spent the next two days being strip-searched, | |
| herded from one holding pen to another and handcuffed to gang members and other | |
| violent offenders - was a political science professor at the University of | |
| California at Los Angeles. | |
| After being fingered three times in the past dozen years for the financial | |
| trickeries of an impostor, Sklar is demanding that the FBI, whose computer | |
| scored the latest hit, set its electronic records straight. "Until this person | |
| is caught, I am likely to be victimized by another warrant," Sklar said. | |
| Nowhere are the benefits and drawbacks of computerization more apparent than | |
| at the FBI, which is concluding a six-year study on how to improve its National | |
| Crime Information Center, a vast computer network that already links 64,000 law | |
| enforcement agencies with data banks of 19 million crime-related records. | |
| Although top FBI officials have not signed off on the proposal, the current | |
| version would let authorities transmit more detailed information and draw on a | |
| vastly expanded array of criminal records. It would enable, for example, | |
| storage and electronic transmission of fingerprints, photos, tattoos and other | |
| physical attributes that might prevent a mistaken arrest. Though | |
| controversial, FBI officials have recommended that it include a data bank | |
| containing names of suspects who have not been charged with a crime. | |
| The proposed system, however, already has enraged computer scientists and | |
| privacy experts who warn in a report that the system would pose a "potentially | |
| serious risk to privacy and civil liberties." The report, prepared for the | |
| House subcommittee on civil and constitutional rights, also contends that the | |
| proposed $40 million overhaul would not correct accuracy problems or assure | |
| that records are secure. | |
| Mostly because of such criticism, the FBI's revamped proposal for a new system, | |
| known as the NCIC 2000 plan, is a skeleton of the capabilities first suggested | |
| by law enforcement officials. Many of their ideas have been pared back, either | |
| for reasons of practicality or privacy. | |
| "Technical possibility should not be the same thing as permissible policy," | |
| said Marc Rotenberg, an editor of the report and Washington liaison for | |
| Computer Professionals for Social Responsibility, a California organization. | |
| The need to make that tradeoff - to weigh the benefits of technological | |
| advances against the less obvious drawbacks - is becoming more apparent as | |
| nationwide computer links become the blood vessels of a high-tech society. | |
| Keeping technology under control requires users to double-check the accuracy of | |
| the stored data and sometimes resort told-fashioned paper records or | |
| face-to-face contact for confirmation. Errors have plagued the NCIC for many | |
| years, but an extensive effort to improve record-keeping has significantly | |
| reduced the problem, the FBI said. | |
| Tapped by federal, state and local agencies, the existing FBI system juggles | |
| about 10 inquiries a second from people seeking records on wanted persons, | |
| stolen vehicles and property, and criminal histories, among other things. Using | |
| the current system, for example, a police officer making a traffic stop can | |
| fine out within seconds whether the individual is wanted anywhere else in the | |
| United States, or an investigator culling through a list of suspects can peruse | |
| past records. | |
| At one point, the FBI computer of the future was envisioned as having links to | |
| a raft of other data bases, including credit records and those kept by the | |
| Immigration and Naturalization Service, the Internal Revenue Service, the | |
| Social Security Administration and the Securities and Exchange Commission. | |
| One by one, review panels have scaled back that plan. | |
| "There's a lot of sensitive information in those data bases," said Lt. Stanley | |
| Michaleski, head of records for the Montgomery County [Maryland] police. "I'm | |
| not going to tell you that cops aren't going to misuse the information." | |
| The most controversial portion of the planned system would be a major expansion | |
| to include information on criminal suspects - whose guilt has not yet been | |
| established. | |
| The proposed system would include names of persons under investigation in | |
| murder, kidnapping or narcotics cases. It would include a so-called "silent | |
| hit" feature: An officer in Texas, for instance, would not know that the | |
| individual he stopped for speeding was a suspect for murder in Virginia. But | |
| when the Virginia investigators flipped on their computer the next morning, it | |
| would notify them of the Texas stop. To Michaleski, the proposal sounded like | |
| "a great idea. Information is the name of the game." But the "tracking" | |
| ability has angered critics. | |
| "That [data base] could be enlarged into all sorts of threats - suspected | |
| communists, suspected associates of homosexuals. There is no end once you | |
| start," said Rep. Don Edwards (D-Calif.), whose subcommittee called for the | |
| report on the FBI's system. | |
| The FBI's chief of technical services, William Bayse, defends the proposed | |
| files, saying they would help catch criminals while containing only carefully | |
| screened names. "The rationale is these guys are subjects of investigations, | |
| and they met a certain guideline," he said. | |
| So controversial is the suspect file that FBI Director William Sessions | |
| reportedly may not include it when he publicly presents his plan for a new | |
| system. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| A case similar to Sklar's was that of Terry Dean Rogan, who was arrested five | |
| times because of outstanding warrants caused by someone else masquerading as | |
| him. He finally settled for $50,000 in damages. | |
| _______________________________________________________________________________ | |
| Legal Clamp-Down On Australian Hackers February 14, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Julie Power (The Financial Review) | |
| Federal Cabinet is expected to endorse today draft legislation containing tough | |
| penalties for hacking into Commonwealth computer systems. It is understood | |
| that the Attorney-General, Mr. Lionel Bowen, will be proposing a range of tough | |
| new laws closely aligned with the recommendations of the Attorney-General's | |
| Department released in December. Mr. Bowen requested the report by the Review | |
| of Commonwealth Criminal Law, chaired by Sir Harry Gibbs, as a matter of | |
| urgency because of the growing need to protect Commonwealth information and | |
| update the existing legislation. | |
| Another consideration could be protection against unauthorized access of the | |
| tax file number, which will be stored on a number of Government databases. | |
| If the report's recommendations are endorsed, hacking into Commonwealth | |
| computers will attract a $48,000 fine and 10 years imprisonment. In addition, | |
| it would be an offense to destroy, erase, alter, interfere, obstruct and | |
| unlawfully add to or insert data in a Commonwealth computer system. | |
| The legislation does not extend to private computer systems. However, the | |
| Attorney-General's Department recommended that it would be an offense to access | |
| information held in a private computer via a Telecom communication facility or | |
| another Commonwealth communication facility without due authority. | |
| _______________________________________________________________________________ | |
| Multi-Gigabuck Information Theft February 8, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Bob Mitchell (Toronto Star)(Edited for this presentation) | |
| A man has been arrested and charged with unauthorized use of computer | |
| information, following a 2-month police investigation. The suspect was an | |
| associate of a "very big" Toronto company: "A company that people would know, | |
| with offices across Canada." Police are keeping the company's name secret at | |
| its request. They say the perpetrator acted alone. | |
| A password belonging to the company was used to steal information which the | |
| company values at $4 billion (Canadian). This information includes computer | |
| files belonging to an American company, believed to contain records from | |
| numerous companies, and used by large Canadian companies and the United States | |
| government. | |
| "We don't know what this individual was planning to do with the information, | |
| but the potential is unbelievable. I'm not saying the individual intended to | |
| do this, but the program contained the kind of information that could be sold | |
| to other companies," said Lewers. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Further investigation of the above details led to the following; | |
| Multi-Gigabuck Value Of Information Theft Denied February 17, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Different facts about the information theft were reported two days after the | |
| original story. | |
| The information in this article is from the Toronto Globe & Mail. The article | |
| is headlined "Computer Information Theft Detected By Security System, Company | |
| Says." And it begins as follows: | |
| "The theft of information from a company's computer program was | |
| detected by the firm's own computer security system. | |
| Mike Tillson, president of HCR Corporation, which specializes in | |
| developing computer software, said yesterday an unusual pattern | |
| of computer access was noticed on the company's system last week." | |
| The article continues by saying that police reports valuing the "program" at $4 | |
| billion (Canadian) were called grossly exaggerated by Tilson: "It's more in | |
| the tens of thousands of dollars range." He also said that the illegal access | |
| had been only a week before; there was no 2-month investigation. And asked | |
| about resale of the information, he said, "It's not clear how one would profit | |
| from it. There are any number of purposes one could imagine to idle curiosity. | |
| There is a possibility of no criminal intent." | |
| The information not being HCR customer data, and Tilson declining to identify | |
| it, the article goes on to mention UNIX, to mumble about AT&T intellectual | |
| property, and to note that AT&T is not in the investigation "at this stage." | |
| _______________________________________________________________________________ | |
| More Syracuse Busts February 6, 1989 | |
| ~~~~~~~~~~~~~~~~~~~ | |
| St. Elmos Fire was arrested after a supposed friend turned him in to the police | |
| and signed an affidavit. His crimes include hacking into his school's HP3000 | |
| and the FBI and Telenet are trying to get him for hacking into another HP3000 | |
| system in Illinois. | |
| However, it was the "friend" that was actually the person responsible for the | |
| damage done to the computer in Illinois. The problem is that Telenet traced | |
| that calls to Syracuse, New York and because of the related crimes, the | |
| authorities are inclined to believe that both were done by the same | |
| individual. | |
| St. Elmos Fire has already had his arraignment and his lawyer says that there | |
| is very little evidence to connect SEF to the HP3000 in Syracuse, NY. However,, | |
| nothing is really known at this time concerning the status of the system in | |
| Illinois. | |
| Information Provided by Grey Wizard | |
| _______________________________________________________________________________ | |
| Television Editor Charged In Raid On Rival's Files February 8, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| >From San Jose Mercury News | |
| TAMPA, Fla. (AP) - A television news editor hired away from his station by a | |
| competitor has been charged with unlawfully entering the computer system of his | |
| former employer to get confidential information about news stories. | |
| Using knowledge of the system to bypass a security shield he helped create, | |
| Michael L. Shapiro examined and destroyed files relating to news stories at | |
| Tampa's WTVT, according to the charges filed Tuesday. | |
| Telephone records seized during Shapiro's arrest in Clearwater shoed he made | |
| several calls last month to the computer line at WTVT, where he worked as | |
| assignment editor until joining competitor WTSP as an assistant news editor in | |
| October. | |
| Shapiro, 33, was charged with 14 counts of computer-related crimes grouped into | |
| three second-degree felony categories: Offenses against intellectual property, | |
| offenses against computer equipment and offenses against computer users. He | |
| was released from jail on his own recognizance. | |
| If convicted, he could be sentenced to up to 15 years in prison and fined | |
| $10,000 for each second-degree felony count. | |
| Bob Franklin, WTVT's interim news director, said the station's management | |
| discovered several computer files were missing last month, and Shapiro was | |
| called to provide help. Franklin said the former employee claimed not to know | |
| the cause of the problem. | |
| At a news conference, Franklin said: "Subsequent investigation has revealed | |
| that, at least since early January, WTVT's newsroom computer system has been | |
| the subject of repeated actual and attempted 'break-ins.' The computers | |
| contain highly confidential information concerning the station's current and | |
| future news stories." | |
| The news director said Shapiro was one of two people who had responsibility for | |
| daily operation and maintenance of the computer system after it was installed | |
| about eight months ago. The other still works at WTVT. | |
| Terry Cole, news director at WTSP, said Shapiro has been placed on leave of | |
| absence from his job. Shapiro did not respond to messages asking for comment. | |
| Franklin said Shapiro, employed by WTVT from February 1986 to September, 1988, | |
| left to advance his career. "He was very good at what he did," Franklin said. | |
| "He left on good terms." | |
| _______________________________________________________________________________ | |