| ==Phrack Inc.== | |
| Volume Three, Issue 27, File 12 of 12 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN P h r a c k W o r l d N e w s PWN | |
| PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN | |
| PWN Issue XXVII/Part 3 PWN | |
| PWN PWN | |
| PWN June 20, 1989 PWN | |
| PWN PWN | |
| PWN Created, Written, and Edited PWN | |
| PWN by Knight Lightning PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| One of Cliff Stoll's "Wily Hackers" Is Dead (Suicide?) June 5, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| According to West German publications, the "Wily Hacker" Karl Koch, of | |
| Hannover, West Germany, died Friday, June 3, probably by suicide. His body was | |
| found burnt (with gasoline) to death, in a forest near Celle (a West German | |
| town near Hannover where he committed his hacks, as had been observed by German | |
| Post). | |
| Koch was one of the 2 hackers who confessed their role in the KGB hack to the | |
| public prosecutors, therewith bringing the case to public attention. As German | |
| newspapers report, he probably suffered from a psychic disease: He thought he | |
| was permanently observed by alien beings named Illimunates' which tried to kill | |
| him. Probably, he had internalized the role of "Captain Hagbard" (his | |
| pseudonym in the hacking scene), taken from a U.S. book, who (like him) | |
| suffered from supervision by the Illuminates. Police officials evidently think | |
| that Koch committed suicide (though it is believed, that there are "some | |
| circumstances" which may also support other theories; no precise information | |
| about such moments are reported). | |
| According to German police experts, Karl Koch's role in the KGB case as in | |
| daily life can properly be understood when reading this unknown book. | |
| Information Provided by Klaus Brunnstein | |
| (University of Hamburg) | |
| [Illuminates... KGB... whatever... -KL] | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Illuminatus! June 14, 1989 | |
| ~~~~~~~~~~~~ | |
| The book in question is believed to be "Illuminatus!" by Harold Shea and Robert | |
| Anton Wilson. The book is a spoof on conspiracy theories, and suggests that | |
| many and probably all human institutions are just fronts for a small group of | |
| "enlightened ones," who are themselves a front for the Time dwarves from | |
| Reticuli Zeta, or perhaps Atlantean Adepts, remnants of Crowley's Golden Dawn, | |
| or even more likely the Lloigor of H.P. Lovecraft's Cthulhu Mythos. A leading | |
| character in this book is named Hagbard Celine. | |
| "Illuminatus!" is a fun read if you like psychedelia and paranoia. It also | |
| seems to have influenced a lot of subsequent work, most notably Adams' | |
| "Hitchhiker's Guide to the Galaxy." It is easy to see how an unbalanced mind, | |
| taking it literally, could be completely absorbed. In fact "Illuminatus!" | |
| seems as if it was written with the intent of just this sort of programming, | |
| referring to it as "Operation Mindfuck." | |
| This is probably not a real danger for the vast majority of sane adults, but it | |
| may, tragically, have been the case here. Or perhaps, no disrespect intended, | |
| Koch may in the course of various hacks really have discovered too much about | |
| the Illuminati. After all, they are supposed to be the secret power behind the | |
| KGB :-) | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| For more information on Clifford Stoll and the Wily Hackers of West Germany, | |
| please see: | |
| "Who Is Clifford Stoll?" (No Date) Phrack World News issue XXII/Part 1 | |
| "A Message From Clifford Stoll" (1/10/89) Phrack World News issue XXIII/Part 2 | |
| And the following articles all found in Phrack World News issue XXV/Part 2: | |
| "German Hackers Break Into Los Alamos and NASA" (3/2/89) | |
| "Computer Espionage: Three 'Wily Hackers' Arrested" (3/2/89) | |
| "Computer Spy Ring Sold Top Secrets To Russia" (3/3/89) | |
| "KGB Computer Break-Ins Alleged In West Germany" (3/3/89) | |
| "News From The KGB/Wily Hackers" (3/7/89) | |
| _______________________________________________________________________________ | |
| Sex Put On Probation By Mystery Hacker June 13, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Ft. Lauderdale News and Sun-Sentinel | |
| "Yes, you sound very sexy, but I really need a probation officer." | |
| DELRAY BEACH, Fla. -- Callers trying to dial a probation office in Delray | |
| Beach, Fla on Monday, June 12, heard a smorgasbord of sex talk from a panting | |
| woman named Tina instead. | |
| Southern Bell telephone officials said a computer hacker reprogrammed their | |
| equipment over the weekend, routing overflow calls intended for the local | |
| probation office to a New York-based phone sex line. | |
| "People are calling the Department of Corrections and getting some kind of sex | |
| palace," said Thomas Salgluff, a spokesman for the Palm Beach County probation | |
| office. | |
| Southern Bell officials said it was the first time their switching equipment has | |
| been reprogrammed by an outside computer intruder. Southern Bell provides | |
| local telephone service in Florida, Georgia, North Carolina, and South | |
| Carolina. | |
| "We're very alarmed," said Southern Bell spokesman Buck Passmore. He said such | |
| a feat would require someone with considerable computer knowledge. | |
| The implications of such a computer breach are considerable. Intercepting | |
| corporate communications, uncovering unlisted phone numbers, and tampering with | |
| billing information are all plausible consequences of computer security | |
| breaches at the the phone company. | |
| Hackers have invaded Southern Bell in the past, but they have never | |
| reprogrammed a telephone link, Passmore said. | |
| Security technicians from Southern Bell and AT&T are trying to trace the source | |
| of the computer breach, Passmore said. | |
| _______________________________________________________________________________ | |
| Hacking For A Competitive Edge May 12, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Taken from the Los Angeles Times | |
| Two former Tampa, FLA TV news managers have been charged with illegally tapping | |
| into phone lines and computers at another station to gain a news edge over | |
| their competitors. Former new director Terry Cole and assistant news director | |
| Michael Shapiro at WTSP-TV have been charged with 17 counts of computer hacking | |
| and conspiracy in the theft of information from WTVT-TV through computer phone | |
| lines, authorities said. Their arraignment was set for May 19. | |
| If convicted, each could face a maximum prison sentence of 85 years. The two | |
| were fired from WTSP when the station learned of the alleged thefts. The | |
| break-ins began in November, 1988, but were not noticed until January 12, 1989, | |
| when WTVT's morning news producer noticed that files were missing, authorities | |
| said. | |
| Computer experts determined that an intruder had rifled the files. Authorities | |
| said Shapiro knew WTVT's security system thoroughly because he had helped set | |
| it up while working there as an assignment manager before being hired away from | |
| WTVT in October. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| TV News Executives Fired After Hacking Charges From Rival | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Tampa, Fla. -- A Florida television station fired two news executives in the | |
| wake of reports that one of them allegedly penetrated a rival station's | |
| computer system and stole sensitive information. | |
| WTSP-TV (Channel 10), an ABC affiliate in St. Petersburg, announced that it had | |
| fired Assistant News Director Michael Shapiro and News Director Terry Cole. | |
| Shapiro was arrested on February 7th on felony charges for allegedly breaking | |
| into a computer system at WTVT-TV (Channel 13) on at least six occasions in | |
| January. He was once employed by WTVT as an assistant manager and was | |
| responsible for administering the station's computer systems. | |
| Law enforcement officials seized from Shapiro's home a personal computer, 200 | |
| floppy disks and an operating manual and user guide for software used at the | |
| rival station. | |
| He has been charged with 14 felony counts under Florida Statute 815, which | |
| covers computer-related crimes. Each count carries a maximum sentence sentence | |
| of 15 years and a $10,000 fine. | |
| Vince Barresi, WSTP's vice-president and general manager, refused to comment on | |
| the two firings. However, in a prepared statement, he said that he told | |
| viewers during an 11 PM newscast last Tuesday that the station acted to "avoid | |
| any questions about the objective way we do our business in keeping the public | |
| informed." | |
| Cole, who hired Shapiro last September, has not been charged by Florida law | |
| enforcement officials. He was fired, according to one source, because as | |
| director of the news room operations, he is held ultimately for the actions of | |
| news staffers. Shapiro and Cole were unavailable for comment. | |
| [Another story that discussed this case was "Television Editor Charged In Raid | |
| On Rival's Files" (February 8, 1989). It appeared in Phrack World News Issue | |
| XXIV/Part 2. -KL] | |
| _______________________________________________________________________________ | |
| National Crime Information Center Leads To Repeat False Arrest May 14, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by James Rainey (Los Angeles Times) | |
| Mix ups with the databases at the NCIC have caused Roberto Perales Hernandez to | |
| be jailed twice in the last three years as a suspect in a 1985 Chicago | |
| residential burglary. The authorities confused him with another Roberto | |
| Hernandez due to a single entry in the FBI's National Crime Information Center | |
| computer. | |
| The two Roberto Hernandezes are the same height, about the same weight, have | |
| brown hair, brown eyes, tattoos on their left arms, share the same birthday, | |
| and report Social Security numbers which differ by only one digit! | |
| The falsely imprisoned man has filed suit charging the Hawthorne, California | |
| Police Department, Los Angeles County, and the state of California with false | |
| imprisonment, infliction of emotional distress, and civil rights violations | |
| stemming from the most recent arrest last year. | |
| He had previously received a $7,000 settlement from the county for holding him | |
| 12 days in 1986 before realizing he was the wrong man. In the latest incident, | |
| he was held for seven days then freed with no explanation. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Another False Incarceration May 18, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| In his testimony on May 18, 1989 to the Subcommittee on Civil and | |
| Constitutional Rights of the Committee on the Judiciary of the U.S. House of | |
| Representatives, relating to the National Crime Information Center, David D. | |
| Redell cited another case of false incarceration concerning Roberto Perales | |
| Hernandez as well as various cases noted earlier -- such as that of Terry Dean | |
| Rogan [see below]: | |
| "Only last week, a case in California demonstrated the potential | |
| benefit of easy access to stored images. Joseph O. Robertson had | |
| been arrested, extradited, charged, and sent to a state mental | |
| facility for 17 months. During that entire time, mug shots and | |
| fingerprints were already on file showing clearly that he was the | |
| wrong man, but no one had taken the trouble to check them." | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| These articles show clear examples of the damage and problems caused by this | |
| "super" database. People like William Bayse (Federal Bureau of Investigation's | |
| Director For Technical Services) and William Sessions (Director of the FBI) | |
| either fail to realize this or perhaps they just do not care (as long as | |
| something similar does not happen to them). | |
| For those of you who are interested in looking into this further, the first | |
| article about this NCIC database was; "'Big Brotherish' Data Base Assailed," | |
| (November 21, 1988). It appeared in Phrack World News Issue XXII/Part 3. | |
| Another incident similar to the cases mentioned above concerned Richard | |
| Lawrence Sklar, a political science professor at the University of California | |
| at Los Angeles. He was mistaken by the computer for a fugitive wanted in a | |
| real estate scam in Arizona. Before the FBI figured out that they had the | |
| incorrect person, Sklar, age 58, spent two days being strip searched, herded | |
| from one holding pen to another, and handcuffed to gang members and other | |
| violent offenders. For more details on this case and the case concerning Terry | |
| Dean Rogan, please refer to "FBI National Crime Information Center Data Bank," | |
| (February 13, 1989) which appeared in Phrack World News Issue XXIV/Part 2 (as | |
| well as the Washington Post). | |
| _______________________________________________________________________________ | |
| TRW and Social Security Administration May 12, 1989 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| The credit bureau of TRW has been working with the Social Security | |
| Administration to verify its database of 140 million names and Social Security | |
| numbers. In order to cover the cost, TRW is paying the Social Security | |
| Administration $1 million, while Social Security Administration will provide a | |
| matching $1 million. | |
| Since the Social Security Administration is asking for a budget increase for | |
| their computer and telecommunications systems, several legislators are outraged | |
| by the fact they they are spending $1 million for this non-government project. | |
| Claiming that the project is "as far away from the mission of the Social | |
| Security Administration as anything I have ever come across," Senator David | |
| Pryor (D-Ark) questioned the competence and credibility of Social Security | |
| Administration Commissioner Dorcas R. Hardy and asked for an investigation by | |
| the HHS inspector general. | |
| In addition, several lawmakers such as Dale Bumpers (D-Ark) believe the project | |
| to be a violation of civil liberties. Said Bumpers, "I don't like any public | |
| institution releasing an individual's private information." The American Law | |
| Division of the Congressional Research Service has already concluded that the | |
| project is a violation of the Privacy Act of 1974. | |
| [A related article, "Verifying Social Security Numbers," (April 11, 1989) | |
| appeared in Phrack World News Issue XXVI/Part 3 (as well as the New York Times | |
| on the same date). -KL] | |
| _______________________________________________________________________________ | |
| Phrack World News XXVII Quicknotes | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| 1. The current name assigned to the new network being created by the merger | |
| of BITNET and CSNET is ONENET. | |
| ------------------------------------------------------------------------------- | |
| 2. NPA 903 Assigned to NE Texas (May 10, 1989) -- It was just announced that | |
| those portions of 214 outside Dallas will be changed to 903 in the Fall of | |
| 1990. | |
| With 708 assigned to Chicago, 903 assigned to Texas, and 908 assigned to | |
| New Jersey, only 909 and 917 remain to be assigned before the format | |
| changes. | |
| ------------------------------------------------------------------------------- | |
| 3. Details On New Area Code 510 (June 6, 1989) -- The press release from | |
| Pacific Bell, quoted in the San Francisco Chronicle, gives the phase-in | |
| dates for the new NPA 510. | |
| Inception is scheduled for October 7, 1991, with a four-month grace period | |
| when NPA 415 will still work for the affected numbers. Final cutover is | |
| scheduled for January 27, 1992. | |
| NPA 510 will encompass Alameda and Contra Costa counties, which currently | |
| have 842,388 customers out of the current 2,005,687 customers in NPA 415. | |
| ------------------------------------------------------------------------------- | |
| 4. New Jersey Area Code To Be Split (April 27, 1989) -- The split is not | |
| supposed to occur until 1991. The new NPA will be 908 and it will basically | |
| cover the southern "half" of the current 201 area. The affected counties | |
| will be Warren, Hunterdon, Middlesex, Union, Monmouth and Ocean, and the | |
| southwest corner of Morris). Counties remaining in 201 will be Sussex, | |
| Passaic, Bergen, Essex, Hudson, and the majority of Morris. | |
| New Jersey Bell will also start requiring area codes on calls into New York | |
| and Pennsylvania that have been considered part of New Jersey local calling | |
| areas. This will apparently take effect October 2 and free up about 25 | |
| exchanges. Information from the Asbury Park Press. | |
| [This last line somewhat contradicts the first line as far as the | |
| dates are concerned. More information as we get it. -- KL.] | |
| ------------------------------------------------------------------------------- | |
| 5. New Area Codes For London (April 27, 1989) -- British Telecom has announced | |
| that the area code for London is to be changed on May 6th, 1990, due to the | |
| increased number of lines needed in the capital. | |
| The existing code is 01-, and the new codes to be introduced are 071- for | |
| the centre of the city and 081- for the suburbs. A list was published in | |
| the Evening Standard, showing which exchanges will fall in which area. | |
| ------------------------------------------------------------------------------- | |
| 6. Member Learns The Hard Way: American Express Is Watching (May 4, 1989) -- | |
| This article taken from the San Jose Mercury News describes how American | |
| Express called a member to voice their concern that he might not be able to | |
| pay his recent bill. American Express was able to access his checking | |
| account and find that he had less than what was owed to them. His card was | |
| temporarily "deactivated" after the member refused to give any financial | |
| information except that he would pay up the bill with cash when it came in. | |
| Apparently, the card application, in finer print, declares that "[American | |
| Express reserves] the right to access accounts to ascertain whether you are | |
| able to pay the balance." After some arguments with the company, the | |
| member comments that "I learned a lesson: My life is not as private as I | |
| thought." | |
| ------------------------------------------------------------------------------- | |
| 7. Southwestern Bell's QuickSource (April 24, 1989) -- Southwestern Bell | |
| Telephone Company is running a one year trial (March 1989 89 - March 1990) | |
| of two information services: QuickSource (audiotex) and Sourceline | |
| (videotext). The latter requires a terminal of some type, but the former | |
| only requires a touch-tone phone for access. The QuickSource number is | |
| 323-2000, but cannot be accessed via 1+713+; SWBTCo has blocked access to | |
| "the Houston metro area served by SWBTCo," according to the script the | |
| woman reads to you when ask for help (713-865-5777; not blocked). The help | |
| desk will send you a free QuickSource directory though. | |
| ------------------------------------------------------------------------------- | |
| 8. Telemail, MCI, AT&T Mail Interconnection (May 16, 1989) -- U.S. Sprint's | |
| subsidiary, Telenet has announced an interconnection agreement between | |
| Telemail, Telenet's electronic mail product, MCI Mail, and AT&T Mail. | |
| The new arrangement, scheduled to be in effect later this summer, will | |
| allow the 300,000 worldwide users of Telemail, the 100,000 users of MCI | |
| Mail and the 50,000 users of AT&T Mail to conveniently send email messages | |
| to each other. | |
| ------------------------------------------------------------------------------- | |
| 9. Illinois Bell Knocked Out For Four Hours! (May 18,1989) -- Service to over | |
| 40,000 Illinois Bell subscribers in the northwest suburbs of Chicago was | |
| disrupted for about four hours because of problems with the computer in the | |
| switching center. | |
| Phones were either dead or inoperative for incoming and outgoing calls | |
| between 9:30 a.m. and 1:40 p.m. because of a software glitch at the central | |
| office in Hoffman Estates, IL. Most of the disruption occurred in Hoffman | |
| Estates, Schaumburg, Arlington Heights, Hanover Park, and Streamwood, IL. | |
| The exact nature of the problem was not discussed by the Bell spokesman who | |
| reported that the outage had been corrected. Apparently the backup system | |
| which is supposed to kick in also failed. | |
| ------------------------------------------------------------------------------- | |
| 10. SRI Attacked By Kamikaze Squirrels (May 29, 1989) -- It seems that the Data | |
| Defense Network SRI's "no-single-point-of-failure" power system failed at | |
| the hands, or rather the paws, of a squirrel. The power was off for | |
| approximately 9 hours and they experienced no hardware problems. This was | |
| at least the third time that a squirrel has done SRI in. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 11. New York Telephone Freebies (June 10, 1989)(San Francisco Chronicle, p. 2.) | |
| -- 24 pay phones along the Long Island Expressway were in fact free phones | |
| because of a programming/database screw-up. They were being heavily used | |
| for long distance calls by those who had discovered the oversight, | |
| including many to Pakistan (Police found 15 Pakistani men using the phones | |
| when they went to investigate after a shooting). There were no estimates | |
| on the unrecovered cost of the phone calls. | |
| _______________________________________________________________________________ | |
| *** END *** | |