| ==Phrack Inc.== | |
| Volume Three, Issue Thirty-one, Phile #8 or 10 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN Phrack World News PWN | |
| PWN Issue XXXI, Part One PWN | |
| PWN Compiled by Phreak_Accident PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Operation "Sun-Devil" | |
| ===================== | |
| May 9th and 10th brought on two day thats would be marked in every hackers | |
| history book. The reason we assume these days will be important to many, is | |
| that maybe it's time we opened are eyes and saw the witch hunt currently in | |
| progress. | |
| In less than 48 hours, 150 Secret Service men and other law officials | |
| served 30 search warrents in 14 cities around the nation (This thing was hudge). | |
| Operation "Sun-Devil" (As the Attorney General in Phoenix called it), was | |
| a success on their part. "The investigation though is not over, and there are | |
| more warrents to be executed.", said Jim Folwer of L.A's Secret Service. | |
| Any details of the investigation are not being given out at this time. | |
| The Asst. Attorney General of Pheonix told Phrack Inc. that there were other | |
| problems involving the investigation and that it was an ongoing investigation | |
| for the last TWO years. | |
| It is my understanding that Gail Thackeray and the Secret Service are not, | |
| taking this lightly. She told Phrack inc. that they are not distinquishing | |
| pirates, hackers, or phreakers. Basically, it's any kid with a modem that calls | |
| a BBS with an alias. Yes, we are the witches, and we are being | |
| hunted. | |
| The following are Two news releases obtianed via fax through the U.S. | |
| Secret Service for Phrack Inc. | |
| N E W S R E L E A S E | |
| FOR IMMEDIATE RELEASE CONTACT: Gail Thackeray | |
| ------------------------ Assitant Attorney General | |
| May 9, 1990 @ 11:00 A.M. (602) 542-4266 | |
| Attorney General Bob Corbin announced today that in | |
| connection with an eighteen-month joint investigation into | |
| computer crime conducted with the United States Secret | |
| Service and the United States Attorney's office, the Arizona | |
| Attorney General's office has executed seven search warrants | |
| in which computers, electronic bulletin boards, telephone | |
| test equipment and records have been seized. | |
| The Organized Crime and Racketeering Division | |
| investigation involved complaints by Arizona and out of state | |
| victims of substantial financial losses resulting from credit | |
| card fraud and theft of long distance telephone and data | |
| communications services, and by victims of attacks on | |
| computer systems operated by government agencies, private | |
| corporations, telephone companies, financial institutions, | |
| credit bureaus, and a hospital. | |
| The Arizona Attorney General's office received | |
| information and technical assistance from the Glendale, | |
| Arizona Police Department's Computer Crime Unit, and from | |
| many private sector sources, including Bellcore (Bell | |
| Communications Research), American Express, Communications | |
| carriers U.S. Sprint, AT&T, MCI, Com Systems, MidAmerican | |
| Communications, LDL Communications, and Shared Use Network. | |
| Without the cooperation of these companies and of numerous | |
| federal, state and local law enforcement agencies around the | |
| country, this investigation would have been impossible. | |
| The privacy of our citizens and the health of our | |
| economy depend upon secure, reliable computer systems. | |
| Computer fraud and attempts to compromise senstitive public | |
| and private computer systems will not be tolerated. | |
| Individuals who commit these offenses in Arizona can expect | |
| to be prosecuted. | |
| .end. | |
| P R E S S R E L E A S E | |
| FOR IMMEDIATE RELEASE Contact: Wendy Harnagel | |
| Wednesday, May 9, 1990 United States Attorney's Office | |
| ---------------------- (602) 379-3011 | |
| PHOENIX -- Stephen M. McNamee, United States Attorney | |
| District of Arizona, Robert K. Corbin, Attorney General for | |
| the State of Arizona, and Henry R. Potosky, Acting Special | |
| Agent in Charge of the United States Secret Service Office in | |
| Phoenix, today announced that approximately twenty-seven | |
| search warrants were executed on Monday and Tuesday, May 7 | |
| and 8, 1990, in various cities across the nation by 150 | |
| Secret Service agents along with state and local law | |
| enforcement officials. The warrants were issued as a part of | |
| Operation Sundevil, which was a two year investigation into | |
| alleged illegal computer hacking activities. | |
| The United States Secret Service, in cooperation with | |
| the United States Attorney's Office, and the Attorney General | |
| for the State of Arizona, established an operation utilizing | |
| sophisticated investigative techniques, targeting computer | |
| hackers who were alleged to have trafficked in and abuse | |
| stolen credit card numbers, unauthorized long distance | |
| dialing codes, and who conduct unauthorized access and damage | |
| to computers. While the total amount of losses cannot be | |
| calculated at this time, it is estimated that the losses may | |
| run into the millions of dollars. For example, the | |
| unauthorized accessing of long distance telephone credit | |
| cards have resulted in uncollectible charges. The same is | |
| true of the use of stolen credit card numbers. Individuals | |
| are able to utilize the charge accounts to purchase items for | |
| which no payment is made. | |
| Federal search warrants were executed in the following | |
| cities: | |
| Chicago, IL | |
| Cincinatti, OH | |
| Detroit, MI | |
| Los Angeles, CA | |
| Miami, FL | |
| Newark, NJ | |
| New York, NY | |
| Phoenix, AZ | |
| Pittsburgh, PA | |
| Plano, TX | |
| Richmond, VA | |
| San Diego, CA | |
| San Jose, CA | |
| Unlawful computer hacking imperils the health and | |
| welfare of individuals, corporations and government agencies | |
| in the United States who rely on computers and telephones to | |
| communicate. | |
| Technical and expert assistance was provided to the | |
| United States Secret Service by telecommunication companies | |
| including Pac Bel, AT&T, Bellcore, Bell South, MCI, U.S. | |
| Sprint, Mid-American, Southwestern Bell, NYNEX, U.S. West, | |
| and by the many corporate victims. All are to be commended | |
| for their efforts for their efforts in researching intrusions | |
| and documenting losses. | |
| McNamee and Corbin expressed concern that the improper | |
| and alleged illegal use of computers may become the White | |
| Collar crime of the 1990's. McNamee and Corbin reiterated | |
| that the state and federal government will vigorously pursue | |
| criminal violations of statutes under their jurisdiction. | |
| Three individuals were arrested yesterday in other | |
| jurisdictions on collateral or independent state charges. | |
| The investigations surrounding the activities of Operation | |
| Sundevil are continuing. | |
| The investigations are being conducted by agents of the | |
| United States Secret Service and Assistant United States | |
| Attoryney Tim Holtzen, District of Arizona, and Assistant | |
| Arizona Attorney General Gail Thackery. | |
| .end. | |
| _______________________________________________________________________________ | |
| Virus mania | |
| =========== | |
| Robert T. Morris started it all. Who cares, it's over and done with. | |
| Never the less, it's being dragged out in every national paper. It's old news | |
| so we won't cover it here, but we will tell you about something the Army has up | |
| its sleeve. | |
| Army is Looking for a Few Good Viruses | |
| By Rory J. O'conner | |
| Knight-Ridder Newspapers | |
| ______________________________________ | |
| The U.S. Army is looking for help to develop the seeds of a new-age germ | |
| warfare: It wants business to help it turn computer "viruses" into military | |
| weapons. | |
| Experts predict the viruses, if sucessfully developed, could be used to | |
| wreak havoc on the increasing number of computers in the battlefield. The | |
| destructive computer programs which have increasingly damaged commercial and | |
| research computer systems in the past four years, could be used to disrupt | |
| military communications and feed misleading data to enemy commanders. | |
| The viruses could aslo be used to alter the programming of crucial | |
| communications satellites serving combat units, the experts said. | |
| The Army is soliciting bids from small businesses to determine the | |
| feasibility of using computer viruses in warefare. And it is willing to pay up | |
| to $550,000 to a company that comes up with a plan for creating the programs - | |
| and figures out how to use military radio systems to introduce them into enemy | |
| computers. | |
| A computer virus is a kind of program designed to disrupt normal operation | |
| of a computer system or damage data ont hat system by altering or destroying | |
| it. The rogue programs are most effective when introduced secretly into the | |
| computer system of an unsuspecting user and when their damage is subtle or | |
| hidden fromt he user for some time. | |
| Viruses are also self-duplicating and can spread undetected from an | |
| infected computer to other computer systems they contact. | |
| So far, more than 60 computer viruses have been identified, most of them | |
| attacking poorly guarded personal computers used by businesses, universities | |
| and inividuals. The Army's virus would have to be more sophisticated than | |
| those programs. | |
| But some detractors of the concept say the Army could wind up with the | |
| same problem it has with biological weapons: Creating destructive elements | |
| that might get loose and cause widespread damage to its own forces as well as | |
| civilians. | |
| "This stuff is very dangerous, and most people involved in creating | |
| viruses are not aware of the threat," said a Bay Area virus expert who asked ot | |
| to be named. "You can't spread anthrax around the world and not have it come | |
| back around to you. And the enemy is using the same kind of computers and | |
| software that we are." | |
| Many experts who are fighting the explosion in virus activity by amateur | |
| programmers are especially angry at government efforts to develop the programs | |
| for the military. Some say it is particulary troubling in light of the | |
| sentencing of Robert T. Morris Jr. (Ed -Ick), convicted in federal court of | |
| sending a similar program through a government sponsored network in 1988. | |
| "It bothers me that the government says in one breath (viruses) are bad | |
| and illegal and then asks for someone to develop them," said Glenn Tenney, a | |
| San Mateco, Calif., programmer and organizer of the annual Computer Hackers | |
| Conference. "If Morris had done the same thing for the Army, they'd have paid | |
| him hundreds of thousands to do it. But he did it on the wrong side and got | |
| punished." | |
| Computer experts say creating a virus to the Army's specifications is | |
| possible with current technology - although some of the Army's requirements | |
| could make developing it more difficult than creating an ordinary personal | |
| computer virus. | |
| First, military computer systems are usually designed with far more | |
| security features than commercial systems, making it much harder for a virus to | |
| enter the systems. Second, the Army is emphasizings the use of radio | |
| communication to inject the virus into enemy systems. Normally, computer | |
| viruses spread through the exchange of floppy disks that contain the rogue | |
| program or along wires connecting several computers. Using complex military | |
| radio signals instead would require expertise that mose programmers don't have. | |
| .end | |
| _______________________________________________________________________________ | |
| RIPCO May 8th, 1990 | |
| ----- ------------- | |
| Operation Sun-Devil claimed more than just a few "Codelords" around the | |
| states, it claimed one of the oldest and more popular boards. Nobody knows | |
| when or if RIPCO shall return. | |
| Reportedly, Dr. Ripco was charge on a hand-gun violation after his house | |
| was searched. Phrack inc. can't comment on this. | |
| The following is the exact transcript of the message left on RIPCO's | |
| answering maching after Operation Sun-Devil. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| This is 528-5020. | |
| As you are probably aware, on May 8, the Secret Service conducted a series | |
| of raids across the country. Early news reports indicate these raids | |
| involved people and computers that could be connected with credit card and | |
| long distance toll fraud. Although no arrests or charges were made, Ripco | |
| BBS was confiscated on that morning. It's involvement at this time is | |
| unknown. Since it is unlikely that the system will ever return, I'd just l | |
| say goodbye, and thanks for your support for the last six and a half years. | |
| It's been interesting, to say the least. | |
| Talk to ya later. | |
| {Dr. Ricpo} | |
| *** END OF VOICE MESSAGE *** | |
| _______________________________________________________________________________ | |