| ==Phrack Inc.== | |
| Volume Three, Issue 26, File 11 of 11 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN P h r a c k W o r l d N e w s PWN | |
| PWN %%%%%%%%%%% %%%%%%%%% %%%%%%% PWN | |
| PWN Issue XXVI/Part 3 PWN | |
| PWN PWN | |
| PWN April 25, 1989 PWN | |
| PWN PWN | |
| PWN Created, Written, and Edited PWN | |
| PWN by Knight Lightning PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Galactic Hacker Party March 30, 1989 | |
| %%%%%%%%%%%%%%%%%%%%% | |
| GALACTIC HACKER PARTY | |
| August 2-4, 1989 | |
| PARADISO, AMSTERDAM, HOLLAND | |
| During the summer of 1989, the world as we know it will go into overload. An | |
| interstellar particle stream of hackers, phone phreaks, radioactivists and | |
| assorted technological subversives will be fusing their energies into a media | |
| melt-down as the global village plugs into Amsterdam for three electrifying | |
| days of information interchange and electronic capers. | |
| Aided by the advanced communications technology to which they are accustomed, | |
| the hacker forces will discuss strategies, play games, and generally have a | |
| good time. Free access to permanently open on-line facilities will enable them | |
| to keep in touch with home base -- wherever that is. | |
| Those who rightly fear the threat of information tyranny and want to learn what | |
| they can do about it are urgently invited to interface in Amsterdam in August. | |
| There will be much to learn from people who know. Celebrity guests with | |
| something to say will be present in body or electronic spirit. | |
| The Force must be nurtured. If you are refused transport because your laptop | |
| looks like a bomb, cut off behind enemy lines, or unable to attend for any | |
| other reason, then join us on the networks. Other hacker groups are requested | |
| to organize similar gatherings to coincide with ours. We can provide low-cost | |
| international communications links during the conference. | |
| [ Despite the wishes of those planning the "Galactic Hacker ] | |
| [ Party," there will be NO change in plans for SummerCon '89! ] | |
| For further information, take up contact as soon as possible with: | |
| HACK-TIC PARADISO | |
| P.O. box 22953 Weteringschans 6-8 | |
| 1100 DL Amsterdam 1017 SG Amsterdam | |
| The Netherlands The Netherlands | |
| tel: +31 20 6001480 tel: +31 20 264521 / +31 20 237348 | |
| _______________________________________________________________________________ | |
| Subversive Bulletin Boards March 26, 1989 | |
| %%%%%%%%%%%%%%%%%%%%%%%%%% | |
| An article in a newspaper from the United Kingdom had an article relating to a | |
| computer bulletin board being run by a 14-year-old boy in Wilmslow, Cheshire, | |
| England. It contained information relating to such things as making plastic | |
| explosives. | |
| Anti-terrorist detectives are said to be investigating for possible breaches of | |
| the Obscene Publications Act. Apparently reporters were able to easily gain | |
| access to this bulletin board and peruse articles on such subjects as credit | |
| card fraud, making various types of explosives, street fighting techniques and | |
| dodging police radar traps. | |
| One article was obviously aimed at children and described how to make a bomb | |
| suitable for use on "the car of a teacher you do not like at school," which | |
| would destroy the tire of a car when it was started. | |
| The boy's parents did not seem to think that their son was doing anything | |
| wrong, preferring him to be working with his computer rather than roaming the | |
| streets. | |
| A London computer consultant, Noel Bradford, is quoted as having seen the | |
| bulletin board and found messages discussing "how to crack British Telecom, how | |
| to get money out of people and how to defraud credit card companies. Credit | |
| card numbers are given, along with PIN numbers, names, addresses and other | |
| details." | |
| _______________________________________________________________________________ | |
| Tale Of TWO TAP Magazines! April 24, 1989 | |
| %%%%%%%%%%%%%%%%%%%%%%%%%% | |
| It seemed inevitable that the battle for the rights to TAP would come into | |
| play, but many wonder why it has taken so long. | |
| The Renegade Chemist, long time member of Phortune 500 and one of its "Board Of | |
| Directors," has been talking about re-starting TAP Magazine for at least two | |
| years... nothing ever happened with it until now. TRC claims that the TAP | |
| Magazine crew in Kentucky is just a fraud and that he is putting on the "REAL | |
| McCoy." | |
| For a free issue of The Renegade Chemist's TAP Magazine, send a self-addressed | |
| stamped envelope to: | |
| Data Security Consultants, Inc. | |
| TAP Magazine | |
| P.O. Box 271 | |
| South Windam, CT 06266-0271 | |
| Now on the other hand, Aristotle of the Kentucky based TAP Magazine has shown | |
| an almost uncaring attitude about The Renegade Chemist's statements about TAP | |
| Magazine. He says that he does not "really mind if these people put out a | |
| magazine. Honestly I just want to help the community and the more magazines | |
| and information, the better." | |
| The really big news about the Kentucky based TAP Magazine came Saturday, April | |
| 22, 1989. Apparently, because of problems with local banks and the Internal | |
| Revenue Service, TAP Magazine is now FREE! | |
| The only catch is that if you want it, you have to send them a self-addressed | |
| stamped envelope to get each issue or "you can send cash, but only enough to | |
| pay for postage, 25 cents should cover it." Do not send any kinds of checks | |
| and/or money orders. Anyone who did will be receiving their checks back or | |
| at least those checks will not be cashed. The TAP Magazine staff will be | |
| taking care of the printing costs out of their own pocket. | |
| So for the FREE TAP Magazine, send a self-addressed stamped envelope to: | |
| P.O. Box 20264 | |
| Louisville, KY 40220 | |
| Issue 93 is due for the end of April 1989, but Aristotle also wanted me to let | |
| everyone know that he will be attending SummerCon '89 and bringing with him | |
| plenty of issues of all the TAPs that he, Olorin The White, and Predat0r have | |
| published. | |
| As I have not seen TRC's TAP, I make no judgements. Instead, get a copy of | |
| both TAPs FREE and compare them yourself. The market will decide which TAP | |
| will continue. | |
| Information Provided by | |
| Aristotle and The Renegade Chemist | |
| _______________________________________________________________________________ | |
| Computer Group Wary Of Security Agency April 11, 1989 | |
| %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% | |
| Taken from the San Francisco Chronicle | |
| A public interest group said yesterday that the National Security Agency, the | |
| nation's biggest intelligence agency, could exert excessive control over a | |
| program to strengthen the security of computer systems throughout the federal | |
| government. | |
| The group, Computer Professionals for Social Responsibility -- based in Palo | |
| Alto -- urged key members of Congress to focus "particularly close scrutiny" on | |
| the agency's role in helping to implement legislation aimed at safeguarding | |
| sensitive but unclassified information in federal computers. | |
| "There is a constant risk that the federal agencies, under the guise of | |
| enhancing computer security, may find their programs -- to the extent that they | |
| rely upon computer systems -- increasingly under the supervision of the largest | |
| and most secretive intelligence organization in the country," it said. | |
| _______________________________________________________________________________ | |
| Verifying Social Security Numbers April 11, 1989 | |
| %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% | |
| Taken From The New York Times | |
| Dorcas R. Hardy, Commisssioner of the Social Security Administration, told a | |
| Congressional committee that the agency had verified millions of SSN's for | |
| private credit companies. | |
| TRW, the nation's largest credit reporting company, recently proposed paying | |
| the Social Security Administration $1,000,000 to have 140 million numbers | |
| verified. | |
| Phil Gambino, an agency spokesman, reported last month that the agency had | |
| verified social security numbers only at the request of beneficiaries or | |
| employers and had never verified more than 25 numbers at a time. He said such | |
| disclosures were required under the Freedom of Information Act. | |
| At the hearing yesterday, Dorcas R. Hardy, denied any other verifications at | |
| first. However, she later admitted that in the early 1980s, 3,000,000 social | |
| security numbers were verified for CitiCorp and that last year 151,000 numbers | |
| were verified for TRW. Ms. Hardy said that the 151,000 numbers were just part | |
| of a "test run." | |
| Senator David Pryor, a democrat from Arkansas and chairman of the Special | |
| Committee on Aging, said that previous commissioners; the Congressional | |
| Research Service of the Library of Congress, and Donald A. Gonya, chief counsel | |
| for Social Security have all decided that such verification is illegal. | |
| _______________________________________________________________________________ | |
| PWN Quicknotes | |
| 1. Prank Virus Warning Message (March 28, 1989) -- An individual placed a time | |
| bomb message on a government service system in the San Francisco Bay Area | |
| saying, "WARNING! A computer virus has infected the system!" The | |
| individual is learning that such a prank is considered almost as funny as | |
| saying that you have a bomb in your carry-on luggage as you board a plane. | |
| -- Bruce Baker, Information Security Program, SRI International | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 2. Hackers' Dictionary In Japanese? (March 30, 1989) -- What is this you ask? | |
| This amusing compilation was put together a decade or so ago by artificial | |
| intelligence (AI) graduate students at Stanford, MIT, and Carnegie-Mellon | |
| and recorded the then-current vernacular of their shared cultures. They | |
| did it for fun, but it somehow ended up getting published. | |
| The Hackers' Dictionary contains more than a few puns, jokes, and other | |
| things that are hard to translate such as "moby," as in "moby memory", or | |
| "fubar" and its regional variants "foo bar" and "foo baz." | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 3. AT&T's Air Force -- AT&T has an air force that patrols its cable routes, | |
| some routes 24 hours a day, 365 days a year. The AT&T air force includes | |
| helicopters and fixed-wing aircraft. For some areas, AT&T uses infantry | |
| and armored cars. AT&T's Sue Fleming says, "We hope NOT to find any | |
| activity. We don't want to 'catch' people. But if we do spot a digging | |
| crew, the usual procedure is for the pilot to radio the location back to a | |
| ground crew, who check it out. On occasion, they drop notes -- or even | |
| land -- but that depends on where the site is. In some areas -- like New | |
| Jersey -- unauthorized landings bring heavy penalties." | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 4. Terrorist Threat? -- Scientific advisors to the government told a Senate | |
| panel that telecommunications networks are tempting targets for terrorist | |
| activity. The experts said that advances in technology -- like fiber | |
| optics, which concentrates equipment and data -- and the fragmentation of | |
| the telecom industry after divestiture are reasons for the increased risk. | |
| Certainly the Hinsdale, Illinois CO fire and the recent severing of a fiber | |
| backbone in New Jersey have shown us all how vulnerable our country's | |
| telecom network is. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 5. FCC Rules On AOS -- The FCC has ruled on a complaint filed this summer by | |
| two consumer groups against five Alternative Operator Services (AOS) | |
| companies. The FCC found the complaint valid and has ordered the AOS | |
| companies to stop certain practices immediately. | |
| The ruling states that callers must be told when their calls are being | |
| handled by an AOS, operators must provide callers with rate information and | |
| hotel or payphone owners cannot block calls to other long distance | |
| carriers. (Callers who don't take any special action when making a call | |
| will still be routed to the pre-subscribed carrier.) | |
| The FCC has also ordered the companies to eliminate "splashing" whenever | |
| technically feasible. Splashing is transferring a call to a distant | |
| carrier point-of-presence and charging the caller for the call from that | |
| point. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 6. Cool New Service -- CompuServe (the world's biggest computer bulletin | |
| board) users can now dial in and search and find articles from a bunch of | |
| different technical trade magazines. The database was put together by an | |
| outfit called Information Access Company. It currently contains full-text | |
| articles for 50 publications and paraphrased abstracts for 75 more. Most | |
| coverage begins with the January 1987 issues. | |
| You can search the publications by magazine name, author, key word, key | |
| phrase, etc., then pull up the abstracts of the article of interest and, if | |
| needed and when available, get the full text of the article. And it's easy | |
| to use. | |
| Charge for the service is $24 per hour, $1 for each abstract, and $1.50 for | |
| each full-text article accessed. CompuServe charges $12.50 per hour for | |
| connect time. Both per hour charges are pro-rated, and, with the databases | |
| being so easy to use, you'll rarely be on the board for more than 10-15 | |
| minutes, so those costs will drop. | |
| CompuServe 800-848-8199 | |
| Information Access 800-227-8431 | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 7. ISDN Calling Number Identification Services (April 7, 1989) -- Bellcore | |
| Technical Reference TR-TSY-000860, "ISDN Calling Number Identification | |
| Services" can be purchased for $46 from: | |
| Bellcore | |
| Customer Service | |
| 60 New England Ave | |
| Piscataway, NJ 08854-4196 | |
| (201) 699-5800 | |
| This Technical Reference contains Bellcore's view of generic requirements | |
| for support of ISDN Calling Number Identification (I-CNIS). The I-CNIS | |
| feature extends the concepts of Calling Number Delivery and Calling Number | |
| Delivery Blocking to ISDN lines. I-CNIS also allows the customer to | |
| specify which Directory Number (DN) should be used for each outgoing call | |
| and provides network screening to ensure that the specified DN is valid. | |
| I-CNIS handles calling number processing for both circuit-mode and | |
| packet-mode ISDN calls and provides four component features: Number | |
| Provision, Number Screening, Number Privacy, and Number Delivery. Material | |
| on Privacy Change by the calling party and Privacy Override by the called | |
| party is also included. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 8. Founder of TAP Magazine, Abbie Hoffman, born in 1936, passed away on April | |
| 12, 1989. He was found dead in his apartment in New Hope, PA. He was | |
| fully dressed under the bedcovers. An autopsy was inconclusive. An | |
| article about him appears in the April 24, 1989 issue of Time Magazine, | |
| "A Flower in a Clenched Fist," page 23. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 9. Bill Landreth aka The Cracker, author of Out Of The Inner Circle, has | |
| reappeared. Supposedly, he is now working as a bookbinder in Orange | |
| County, California and living with the sysop of a bulletin board called the | |
| "Pig Sty." -- Dark Sorcerer (April 19, 1989) | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 10. Hacker/Phreaker Gets "Stiff" Penalty (Green Bay, Wisconsin) -- David | |
| Kelsey, aka Stagehand, plead guilty to two counts of class "E" felonies | |
| and received a 90 day jail term. Once he has completed his jail term, he | |
| will serve three years probation and an unknown amount of community | |
| service hours. | |
| In addition to these penalties, Stagehand must also pay restitution of | |
| $511.00 to Schneider Communications of Green Bay, Wisconsin. Stagehand | |
| was given all his computer equipment back as part of the plea bargain -- | |
| minus any materials considered to be "ill gotten" gains. | |
| _______________________________________________________________________________ | |
| ! *** | |
| 1:30:22 p.m. ARE YOU STILL THERE ? | |
| ! *** | |
| 1:35:22 p.m. RESPOND OR BE LOGGED OFF | |
| ! | |
| y | |
| supervisors who said the taps were for the police. They were told that many of | |
| the taps were for the FBI. | |
| Another radio amateur, Vincent Clark/KB4MIT, a technician for South-Central | |
| Bell from 1972 to 1981, said he placed illegal wiretaps similar to those done | |
| by Bob Draise on orders from his supervisors -- and on request from local | |
| policemen in Louisville, Kentucky. | |
| When asked how he got started in the illegal wiretap business, Bob said that a | |
| friend called and asked him to come down to meet with the Cincinnati police. An | |
| intelligence sergeant asked Bob about wiretapping some Black Muslims. He also | |
| told Bob that Cincinnati Bell security had approved the wiretap -- and that it | |
| was for the FBI. The sergeant pointed to his Masonic ring which Bob also wore | |
| -- in other words, he was telling the truth under the Masonic oath -- something | |
| that Bob put a lot of stock in. | |
| Most of the people first wiretapped were drug or criminal related. Later on, | |
| however, it go out of hand -- and the FBI wanted taps on prominent citizens. | |
| "We started doing people who had money. How this information was used, I | |
| couldn't tell you." | |
| The January 29th "Newsday" said Draise had told investigators that among the | |
| taps he rigged from 1972 to 1979 were several on lines used by Wren Business | |
| Communications, a Bell competitor. It seems that when Wren had arranged an | |
| appointment with a potential customer, they found that Bell had just been there | |
| without being called. Wren's president is a ham radio operator, David | |
| Stoner/K8LMB. | |
| When spoken with, Dave Stoner said the following; | |
| "As far as I am concerned, the initial focus for all of this began | |
| with the FBI. The FBI apparently set up a structure throughout the | |
| United States using apparently the security chiefs of the different | |
| Bell companies. They say that there have been other cases in the | |
| United States like ours in Cincinnati but they have been localized | |
| without the realization of an overall pattern being implicated." | |
| "The things that ties this all together is if you go way back in | |
| history to the Hoover period at the FBI, he apparently got together | |
| with the AT&T security people. There is an organization that I | |
| guess exists to this day with regular meetings of the security | |
| people of the different Bell companies. This meant that the FBI | |
| would be able to target a group of 20 or 30 people that represented | |
| the security points for all of the Bell and AT&T connections in the | |
| United States. I believe the key to all of this goes back to Hoover. | |
| The FBI worked through that group who then created the activity at | |
| the local level as a result of central planning." | |
| "I believe that in spite of the fact that many people have indicated | |
| that this is an early 70's problem -- that there is no disruption to | |
| that work to this day. I am pretty much convinced that it is | |
| continuing. It looks like a large surveillance effort that | |
| Cincinnati was just a part of." | |
| "The federal prosecutor Kathleen Brinkman is in a no-win situation. | |
| If she successfully prosecutes this case she is going to bring | |
| trouble down upon her own Justice Department. She can't | |
| successfully prosecute the case." | |
| About $200 million in lawsuits have already been filed against Cincinnati Bell | |
| and the Police Department. Several members of the police department have taken | |
| the Fifth Amendment before the grand jury rather than answer questions about | |
| their roles in the wiretapping scheme. | |
| Bob Draise/WB8QCF has filed a suit against Cincinnati Bell for $78 for | |
| malicious prosecution and slander in response to a suit filed by Cincinnati | |
| Bell against Bob for defamation. Right after they filed the suit, several | |
| policemen came forward and admitted to doing illegal wiretaps with them. The | |
| Cincinnati police said they stopped this is 1974 -- although another policeman | |
| reportedly said they actually stopped the wiretapping in 1986. | |
| Now the CBS-TV program "60 Minutes" is interested in the Cincinnati goings-on | |
| and has sent in a team of investigative reporters. Ed Bradley from "60 | |
| Minutes" has already interviewed Bob Draise/WB8QCF and it is expected that | |
| sometime during this month (April) April, we will see a "60 Minutes" report on | |
| spying by the FBI. We also understand that CNN, Ted Turner's Cable News | |
| Network, is also working up a "Bugging of America" expose. | |
| _______________________________________________________________________________ | |
| Crackdown On Hackers Urged April 9, 1989 | |
| %%%%%%%%%%%%%%%%%%%%%%%%%% | |
| Taken From the Chicago Tribune (Section 7, Page 12b) | |
| "Make Punishment Fit The Crime," computer leaders say. | |
| DALLAS (AP) -- The legal system has failed to respond adequately to the threat | |
| that hackers pose to the computer networks crucial to corporate America, a | |
| computer expert says. | |
| Many computer hackers "are given slaps on the wrist," Mark Leary, a senior | |
| analyst with International Data Corp., said at a roundtable discussion last | |
| week. | |
| "The justice system has to step up...to the fact that these people are | |
| malicious and are criminals and are robbing banks just as much as if they | |
| walked up with a shotgun," he said. | |
| Other panelists complained that hackers, because of their ability to break into | |
| computer systems, even are given jobs, sometimes a security consultants. | |
| The experts spoke at a roundtable sponsored by Network World magazine, a | |
| publication for computer network users and managers. | |
| Computer networks have become crucial to business, from transferring and | |
| compiling information to overseeing and running manufacturing processes. | |
| The public also is increasingly exposed to networks through such devices as | |
| automatic teller machines at banks, airline reservation systems and computers | |
| that store billing information. | |
| Companies became more willing to spend money on computer security after last | |
| year's celebrated invasion of a nationwide network by a virus allegedly | |
| unleased by a graduate student [Robert Tappen Morris], the experts said. | |
| "The incident caused us to reassess the priorities with which we look at | |
| certain threats," said Dennis Steinaur, manager of the computer security | |
| management group of the National Institute of Standards and Technology. | |
| But computer security isn't only a matter of guarding against unauthorized | |
| entry, said Max Hopper, senior vice president for information systems as | |
| American Airlines. | |
| Hopper said American has built a "a Cheyenne mountain-type" installation for | |
| its computer systems to guard against a variety of problems, including | |
| electrical failure and natural disaster. Referring to the Defense Department's | |
| underground nerve center in a Colorado mountain, he said American's precautions | |
| even include a three-day supply of food. | |
| "We've done everything we can, we think, to protect the total environment," | |
| Hopper said. | |
| Hopper and Steinaur said that despite the high-tech image of computer | |
| terrorism, it remains an administrative problem that should be approached as a | |
| routine management issue. | |
| But the experts agreed that the greatest danger to computer networks does not | |
| come from outside hackers. Instead, they said, the biggest threat is from | |
| disgruntled employees or others whose original access to systems was | |
| legitimate. | |
| Though employee screening is useful, Steinaur said, it is more important to | |
| build into computer systems ways to track unauthorized use and to publicize | |
| that hacking can be traced. | |
| Steinaur said growing computer literacy, plus the activities of some | |
| non-malicious hackers, help security managers in some respects. | |
| Expanded knowledge "forces us as security managers not be dependent on | |
| ignorance," Steinaur said. | |
| "Security needs to be a part of the system, rather than a 'nuisance addition,'" | |
| Steinaur said, "and we probably have not done a very good job of making | |
| management realize that security is an integral part of the system." | |
| IDC's Leary said the organization surveys of Fortune 1000 companies | |
| surprisingly found a significant number of companies were doing little to | |
| protect their systems. | |
| The discussion, the first of three planned by Network World, was held because | |
| computer sabotage "is a real problem that people aren't aware of," said editor | |
| John Gallant. Many business people sophisticated networks." | |
| It also is a problem that many industry vendors are reluctant to address, he | |
| said, because it raises questions about a company's reliability. | |
| Typed For PWN by Hatchet Molly | |
| _______________________________________________________________________________ | |
| Ex-Worker Charged In Virus Case -- Databases Were Alleged Target Apr 12, 1989 | |
| %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% | |
| by Jane M. Von Bergen (Philadelphia Inquirer) | |
| A former employee was charged yesterday with infecting his company's computer | |
| database in what is believed to be the first computer-virus arrest in the | |
| Philadelphia area. | |
| "We believe he was doing this as an act of revenge," said Camden County | |
| Assistant Prosecutor Norman Muhlbaier said yesterday, commenting on a motive | |
| for the employee who allegedly installed a program to erase databases at his | |
| former company, Datacomp Corp. in Voorhees, New Jersey. | |
| Chris Young, 21, of the 2000 block of Liberty Street, Trenton, was charged in | |
| Camden County with one count of computer theft by altering a database. | |
| Superior Court Judge E. Stevenson Fluharty released Young on his promise to pay | |
| $10,000 if he failed to appear in court. If convicted, Young faces a 10-year | |
| prison term and a $100,000 fine. Young could not be reached for comment. | |
| "No damage was done," Muhlbaier said, because the company discovered the virus | |
| before it could cause harm. Had the virus gone into effect, it could have | |
| damaged databases worth several hundred thousand dollars, Muhlbaier said. | |
| Datacomp Corp., in the Echelon Mall, is involved in telephone marketing. The | |
| company, which has between 30 and 35 employees, had a contract with a major | |
| telephone company to verify the contents of its white pages and try to sell | |
| bold-faced or other special listings in the white pages, a Datacomp company | |
| spokeswoman said. The database Young is accused of trying to destroy is the | |
| list of names from the phone company, she said. | |
| Muhlbaier said that the day Young resigned from the company, October 7, 1988 he | |
| used fictitious passwords to obtain entry into the company computer, | |
| programming the virus to begin its destruction December 7, 1988 -- Pearl Harbor | |
| Day. Young, who had worked for the company on and off for two years -- most | |
| recently as a supervisor -- was disgruntled because he had received some | |
| unfavorable job-performance reviews, the prosecutor said. | |
| Eventually, operators at the company picked up glitches in the computer system. | |
| A programmer, called in to straighten out the mess, noticed that the program | |
| had been altered and discovered the data-destroying virus, Muhlbaier said. | |
| "What Mr. Young did not know was that the computer system has a lot of security | |
| features so they could track it back to a particular date, time and terminal," | |
| Muhlbaier said. "We were able to ... prove that he was at that terminal." | |
| Young's virus, Muhlbaier said, is the type known as a "time bomb" because it is | |
| programmed to go off at a specific time. In this case, the database would have | |
| been sickened the first time someone switched on a computer December 7, he said | |
| Norma Kraus, a vice president of Datacomp's parent company, Volt Information | |
| Sciences Inc, said yesterday that the company's potential loss included not | |
| only the databases, but also the time it took to find and cure the virus. "All | |
| the work has to stop," causing delivery backups on contracts, she said. "We're | |
| just fortunate that we have employees who can determine what's wrong and then | |
| have the interest to do something. In this case, the employee didn't stop at | |
| fixing the system, but continued on to determine what the problem was." The | |
| Volt company, based in New York, does $500 million worth of business a year | |
| with such services as telephone marketing, data processing and technical | |
| support. It also arranges temporary workers, particularly in the | |
| data-processing field, and installs telecommunication services, Kraus said. | |
| _______________________________________________________________________________ | |
| Mexico's Phone System Going Private? April 17, 1989 | |
| %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% | |
| By Oryan QUEST (Special Hispanic Corespondent) | |
| The Mexico Telephone Company, aka Telefonos de Mexico, aka Telmex, is likely to | |
| go private in the next year or two. The Mexican government is giving serious | |
| consideration to selling its controlling interest in that nation's | |
| communications network, despite very stiff opposition from the local unions | |
| which would prefer to see the existing bureaucracy stay in place. | |
| The proposed sale, which is part of a move to upgrade the phone system there -- | |
| and it *does* need upgrading -- by allowing more private investment, is part of | |
| a growing trend in Mexico to privatize heretofore nationalized industries. | |
| The Mexico Telephone Company has spent more than a year planning a $14 billion, | |
| five-year restructuring plan which will probably give AT&T and the Bell | |
| regional holding companies a role in the improvements. | |
| One plan being discussed by the Mexican government is a complete break-up of | |
| Telmex, similar to the court-ordered divestiture of AT&T a few years ago. | |
| Under this plan, there would be one central long distance company in Mexico, | |
| with the government retaining control of it, but privately owned regional firms | |
| providing local and auxiliary services. | |
| Representatives of the Mexican government have talked on more than one | |
| occasion with some folks at Southwestern Bell about making a formal proposal. | |
| Likewise, Pacific Bell has been making some overtures to the Mexicans. It will | |
| be interesting to see what develops. | |
| About two years ago, Teleconnect Magazine, in a humorous article on the | |
| divestiture, presented a bogus map of the territories assigned to each BOC, | |
| with Texas, New Mexico and Arizona grouped under an entity called "Taco Bell." | |
| Any phone company which takes over the Mexican system will be an improvement | |
| over the current operation, which has been slowly deteriorating for several | |
| years. | |
| PS: I *Demand* To Be Let Back On MSP! | |
| _______________________________________________________________________________ | |
| ==Phrack Inc.== | |
| Volume Three, Issue 26, File 11 of 11 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN P h r a c k W o r l d N e w s PWN | |
| PWN %%%%%%%%%%% %%%%%%%%% %%%%%%% PWN | |
| PWN Issue XXVI/Part 3 PWN | |
| PWN PWN | |
| PWN April 25, 1989 PWN | |
| PWN PWN | |
| PWN Created, Written, and Edited PWN | |
| PWN by Knight Lightning PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Galactic Hacker Party March 30, 1989 | |
| %%%%%%%%%%%%%%%%%%%%% | |
| GALACTIC HACKER PARTY | |
| August 2-4, 1989 | |
| PARADISO, AMSTERDAM, HOLLAND | |
| During the summer of 1989, the world as we know it will go into overload. An | |
| interstellar particle stream of hackers, phone phreaks, radioactivists and | |
| assorted technological subversives will be fusing their energies into a media | |
| melt-down as the global village plugs into Amsterdam for three electrifying | |
| days of information interchange and electronic capers. | |
| Aided by the advanced communications technology to which they are accustomed, | |
| the hacker forces will discuss strategies, play games, and generally have a | |
| good time. Free access to permanently open on-line facilities will enable them | |
| to keep in touch with home base -- wherever that is. | |
| Those who rightly fear the threat of information tyranny and want to learn what | |
| they can do about it are urgently invited to interface in Amsterdam in August. | |
| There will be much to learn from people who know. Celebrity guests with | |
| something to say will be present in body or electronic spirit. | |
| The Force must be nurtured. If you are refused transport because your laptop | |
| looks like a bomb, cut off behind enemy lines, or unable to attend for any | |
| other reason, then join us on the networks. Other hacker groups are requested | |
| to organize similar gatherings to coincide with ours. We can provide low-cost | |
| international communications links during the conference. | |
| [ Despite the wishes of those planning the "Galactic Hacker ] | |
| [ Party," there will be NO change in plans for SummerCon '89! ] | |
| For further information, take up contact as soon as possible with: | |
| HACK-TIC PARADISO | |
| P.O. box 22953 Weteringschans 6-8 | |
| 1100 DL Amsterdam 1017 SG Amsterdam | |
| The Netherlands The Netherlands | |
| tel: +31 20 6001480 tel: +31 20 264521 / +31 20 237348 | |
| _______________________________________________________________________________ | |
| Subversive Bulletin Boards March 26, 1989 | |
| %%%%%%%%%%%%%%%%%%%%%%%%%% | |
| An article in a newspaper from the United Kingdom had an article relating to a | |
| computer bulletin board being run by a 14-year-old boy in Wilmslow, Cheshire, | |
| England. It contained information relating to such things as making plastic | |
| explosives. | |
| Anti-terrorist detectives are said to be investigating for possible breaches of | |
| the Obscene Publications Act. Apparently reporters were able to easily gain | |
| access to this bulletin board and peruse articles on such subjects as credit | |
| card fraud, making various types of explosives, street fighting techniques and | |
| dodging police radar traps. | |
| One article was obviously aimed at children and described how to make a bomb | |
| suitable for use on "the car of a teacher you do not like at school," which | |
| would destroy the tire of a car when it was started. | |
| The boy's parents did not seem to think that their son was doing anything | |
| wrong, preferring him to be working with his computer rather than roaming the | |
| streets. | |
| A London computer consultant, Noel Bradford, is quoted as having seen the | |
| bulletin board and found messages discussing "how to crack British Telecom, how | |
| to get money out of people and how to defraud credit card companies. Credit | |
| card numbers are given, along with PIN numbers, names, addresses and other | |
| details." | |
| _______________________________________________________________________________ | |
| Tale Of TWO TAP Magazines! April 24, 1989 | |
| %%%%%%%%%%%%%%%%%%%%%%%%%% | |
| It seemed inevitable that the battle for the rights to TAP would come into | |
| play, but many wonder why it has taken so long. | |
| The Renegade Chemist, long time member of Phortune 500 and one of its "Board Of | |
| Directors," has been talking about re-starting TAP Magazine for at least two | |
| years... nothing ever happened with it until now. TRC claims that the TAP | |
| Magazine crew in Kentucky is just a fraud and that he is putting on the "REAL | |
| McCoy." | |
| For a free issue of The Renegade Chemist's TAP Magazine, send a self-addressed | |
| stamped envelope to: | |
| Data Security Consultants, Inc. | |
| TAP Magazine | |
| P.O. Box 271 | |
| South Windam, CT 06266-0271 | |
| Now on the other hand, Aristotle of the Kentucky based TAP Magazine has shown | |
| an almost uncaring attitude about The Renegade Chemist's statements about TAP | |
| Magazine. He says that he does not "really mind if these people put out a | |
| magazine. Honestly I just want to help the community and the more magazines | |
| and information, the better." | |
| The really big news about the Kentucky based TAP Magazine came Saturday, April | |
| 22, 1989. Apparently, because of problems with local banks and the Internal | |
| Revenue Service, TAP Magazine is now FREE! | |
| The only catch is that if you want it, you have to send them a self-addressed | |
| stamped envelope to get each issue or "you can send cash, but only enough to | |
| pay for postage, 25 cents should cover it." Do not send any kinds of checks | |
| and/or money orders. Anyone who did will be receiving their checks back or | |
| at least those checks will not be cashed. The TAP Magazine staff will be | |
| taking care of the printing costs out of their own pocket. | |
| So for the FREE TAP Magazine, send a self-addressed stamped envelope to: | |
| P.O. Box 20264 | |
| Louisville, KY 40220 | |
| Issue 93 is due for the end of April 1989, but Aristotle also wanted me to let | |
| everyone know that he will be attending SummerCon '89 and bringing with him | |
| plenty of issues of all the TAPs that he, Olorin The White, and Predat0r have | |
| published. | |
| As I have not seen TRC's TAP, I make no judgements. Instead, get a copy of | |
| both TAPs FREE and compare them yourself. The market will decide which TAP | |
| will continue. | |
| Information Provided by | |
| Aristotle and The Renegade Chemist | |
| _______________________________________________________________________________ | |
| Computer Group Wary Of Security Agency April 11, 1989 | |
| %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% | |
| Taken from the San Francisco Chronicle | |
| A public interest group said yesterday that the National Security Agency, the | |
| nation's biggest intelligence agency, could exert excessive control over a | |
| program to strengthen the security of computer systems throughout the federal | |
| government. | |
| The group, Computer Professionals for Social Responsibility -- based in Palo | |
| Alto -- urged key members of Congress to focus "particularly close scrutiny" on | |
| the agency's role in helping to implement legislation aimed at safeguarding | |
| sensitive but unclassified information in federal computers. | |
| "There is a constant risk that the federal agencies, under the guise of | |
| enhancing computer security, may find their programs -- to the extent that they | |
| rely upon computer systems -- increasingly under the supervision of the largest | |
| and most secretive intelligence organization in the country," it said. | |
| _______________________________________________________________________________ | |
| Verifying Social Security Numbers April 11, 1989 | |
| %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% | |
| Taken From The New York Times | |
| Dorcas R. Hardy, Commisssioner of the Social Security Administration, told a | |
| Congressional committee that the agency had verified millions of SSN's for | |
| private credit companies. | |
| TRW, the nation's largest credit reporting company, recently proposed paying | |
| the Social Security Administration $1,000,000 to have 140 million numbers | |
| verified. | |
| Phil Gambino, an agency spokesman, reported last month that the agency had | |
| verified social security numbers only at the request of beneficiaries or | |
| employers and had never verified more than 25 numbers at a time. He said such | |
| disclosures were required under the Freedom of Information Act. | |
| At the hearing yesterday, Dorcas R. Hardy, denied any other verifications at | |
| first. However, she later admitted that in the early 1980s, 3,000,000 social | |
| security numbers were verified for CitiCorp and that last year 151,000 numbers | |
| were verified for TRW. Ms. Hardy said that the 151,000 numbers were just part | |
| of a "test run." | |
| Senator David Pryor, a democrat from Arkansas and chairman of the Special | |
| Committee on Aging, said that previous commissioners; the Congressional | |
| Research Service of the Library of Congress, and Donald A. Gonya, chief counsel | |
| for Social Security have all decided that such verification is illegal. | |
| _______________________________________________________________________________ | |
| PWN Quicknotes | |
| 1. Prank Virus Warning Message (March 28, 1989) -- An individual placed a time | |
| bomb message on a government service system in the San Francisco Bay Area | |
| saying, "WARNING! A computer virus has infected the system!" The | |
| individual is learning that such a prank is considered almost as funny as | |
| saying that you have a bomb in your carry-on luggage as you board a plane. | |
| -- Bruce Baker, Information Security Program, SRI International | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 2. Hackers' Dictionary In Japanese? (March 30, 1989) -- What is this you ask? | |
| This amusing compilation was put together a decade or so ago by artificial | |
| intelligence (AI) graduate students at Stanford, MIT, and Carnegie-Mellon | |
| and recorded the then-current vernacular of their shared cultures. They | |
| did it for fun, but it somehow ended up getting published. | |
| The Hackers' Dictionary contains more than a few puns, jokes, and other | |
| things that are hard to translate such as "moby," as in "moby memory", or | |
| "fubar" and its regional variants "foo bar" and "foo baz." | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 3. AT&T's Air Force -- AT&T has an air force that patrols its cable routes, | |
| some routes 24 hours a day, 365 days a year. The AT&T air force includes | |
| helicopters and fixed-wing aircraft. For some areas, AT&T uses infantry | |
| and armored cars. AT&T's Sue Fleming says, "We hope NOT to find any | |
| activity. We don't want to 'catch' people. But if we do spot a digging | |
| crew, the usual procedure is for the pilot to radio the location back to a | |
| ground crew, who check it out. On occasion, they drop notes -- or even | |
| land -- but that depends on where the site is. In some areas -- like New | |
| Jersey -- unauthorized landings bring heavy penalties." | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 4. Terrorist Threat? -- Scientific advisors to the government told a Senate | |
| panel that telecommunications networks are tempting targets for terrorist | |
| activity. The experts said that advances in technology -- like fiber | |
| optics, which concentrates equipment and data -- and the fragmentation of | |
| the telecom industry after divestiture are reasons for the increased risk. | |
| Certainly the Hinsdale, Illinois CO fire and the recent severing of a fiber | |
| backbone in New Jersey have shown us all how vulnerable our country's | |
| telecom network is. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 5. FCC Rules On AOS -- The FCC has ruled on a complaint filed this summer by | |
| two consumer groups against five Alternative Operator Services (AOS) | |
| companies. The FCC found the complaint valid and has ordered the AOS | |
| companies to stop certain practices immediately. | |
| The ruling states that callers must be told when their calls are being | |
| handled by an AOS, operators must provide callers with rate information and | |
| hotel or payphone owners cannot block calls to other long distance | |
| carriers. (Callers who don't take any special action when making a call | |
| will still be routed to the pre-subscribed carrier.) | |
| The FCC has also ordered the companies to eliminate "splashing" whenever | |
| technically feasible. Splashing is transferring a call to a distant | |
| carrier point-of-presence and charging the caller for the call from that | |
| point. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 6. Cool New Service -- CompuServe (the world's biggest computer bulletin | |
| board) users can now dial in and search and find articles from a bunch of | |
| different technical trade magazines. The database was put together by an | |
| outfit called Information Access Company. It currently contains full-text | |
| articles for 50 publications and paraphrased abstracts for 75 more. Most | |
| coverage begins with the January 1987 issues. | |
| You can search the publications by magazine name, author, key word, key | |
| phrase, etc., then pull up the abstracts of the article of interest and, if | |
| needed and when available, get the full text of the article. And it's easy | |
| to use. | |
| Charge for the service is $24 per hour, $1 for each abstract, and $1.50 for | |
| each full-text article accessed. CompuServe charges $12.50 per hour for | |
| connect time. Both per hour charges are pro-rated, and, with the databases | |
| being so easy to use, you'll rarely be on the board for more than 10-15 | |
| minutes, so those costs will drop. | |
| CompuServe 800-848-8199 | |
| Information Access 800-227-8431 | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 7. ISDN Calling Number Identification Services (April 7, 1989) -- Bellcore | |
| Technical Reference TR-TSY-000860, "ISDN Calling Number Identification | |
| Services" can be purchased for $46 from: | |
| Bellcore | |
| Customer Service | |
| 60 New England Ave | |
| Piscataway, NJ 08854-4196 | |
| (201) 699-5800 | |
| This Technical Reference contains Bellcore's view of generic requirements | |
| for support of ISDN Calling Number Identification (I-CNIS). The I-CNIS | |
| feature extends the concepts of Calling Number Delivery and Calling Number | |
| Delivery Blocking to ISDN lines. I-CNIS also allows the customer to | |
| specify which Directory Number (DN) should be used for each outgoing call | |
| and provides network screening to ensure that the specified DN is valid. | |
| I-CNIS handles calling number processing for both circuit-mode and | |
| packet-mode ISDN calls and provides four component features: Number | |
| Provision, Number Screening, Number Privacy, and Number Delivery. Material | |
| on Privacy Change by the calling party and Privacy Override by the called | |
| party is also included. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 8. Founder of TAP Magazine, Abbie Hoffman, born in 1936, passed away on April | |
| 12, 1989. He was found dead in his apartment in New Hope, PA. He was | |
| fully dressed under the bedcovers. An autopsy was inconclusive. An | |
| article about him appears in the April 24, 1989 issue of Time Magazine, | |
| "A Flower in a Clenched Fist," page 23. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 9. Bill Landreth aka The Cracker, author of Out Of The Inner Circle, has | |
| reappeared. Supposedly, he is now working as a bookbinder in Orange | |
| County, California and living with the sysop of a bulletin board called the | |
| "Pig Sty." -- Dark Sorcerer (April 19, 1989) | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 10. Hacker/Phreaker Gets "Stiff" Penalty (Green Bay, Wisconsin) -- David | |
| Kelsey, aka Stagehand, plead guilty to two counts of class "E" felonies | |
| and received a 90 day jail term. Once he has completed his jail term, he | |
| will serve three years probation and an unknown amount of community | |
| service hours. | |
| In addition to these penalties, Stagehand must also pay restitution of | |
| $511.00 to Schneider Communications of Green Bay, Wisconsin. Stagehand | |
| was given all his computer equipment back as part of the plea bargain -- | |
| minus any materials considered to be "ill gotten" gains. | |
| _______________________________________________________________________________ | |
| ! *** | |
| 1:30:22 p.m. ARE YOU STILL THERE ? | |
| ! *** | |
| 1:35:22 p.m. RESPOND OR BE LOGGED OFF | |
| ! | |