| ==Phrack Inc.== | |
| Volume Three, Issue Thirty-Three, File 13 of 13 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN Phrack World News PWN | |
| PWN PWN | |
| PWN Issue XXXIII / Part Three PWN | |
| PWN PWN | |
| PWN Compiled by Dispater PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Pentagon Welcomes Hackers! September 9, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| >From USA Today | |
| The FBI is investigating an Israeli teen's claim that he broke into a | |
| Pentagon computer during the gulf war. An Israeli newspaper Sunday identified | |
| the hacker as Deri Shraibman, 18. He was arrested in Jerusalem Friday but | |
| released without being charged. Yedhiot Ahronot said Shraibman read secret | |
| information on the Patriot missle -- used for the first time in the war to | |
| destroy Iraq's Scud missles in midflight. | |
| "Nowhere did it say 'no entry allowed'," Shraibman was quoted as telli | |
| police. "It just said 'Welcome.'" The Pentagon's response: It takes | |
| "computer security very seriously," spokesman Air Force Capt. Sam Grizzle said | |
| Sunday. Analysts say it isn't the first time military computers have been | |
| entered. "No system of safeguards exists ... that is 100% secure," says Alan | |
| Sabrosky, professor at Rhodes College in Memphis. | |
| _______________________________________________________________________________ | |
| Telesphere Sued By Creditors; Forced Into Bankruptcy | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Compiled from Telecom Digest (comp.dcom.telecom) | |
| On Monday, August 19, Telesphere Communications, Inc. was sued by a group | |
| of ten creditors who claim the company best known for its 900 service isn't | |
| paying its bills. The group of creditors, all information providers using 900 | |
| lines provided through Telesphere claim they are owed two million dollars in | |
| total for services rendered through their party lines, sports reports, | |
| horoscopes, sexual conversation lines and other services. They claim | |
| Telesphere has not paid them their commissions due for several months. The | |
| group of creditors filed in U.S. Bankruptcy Court in Maryland asking that an | |
| Involuntary Chapter 7 bankruptcy (meaning, liquidation of the company and | |
| distribution of all assets to creditors) be started against Telesphere. | |
| The company said it will fight the effort by creditors to force it into | |
| bankruptcy. A spokesperson also said the company has already settled with more | |
| than 50 percent of its information providers who are owed money. Telesphere | |
| admitted it had a serious cash flow problem, but said this was due to the large | |
| number of uncollectible bills the local telephone companies are charging back | |
| to them. When end-users of 900 services do not pay the local telco, the telco | |
| in turn does not pay the 900 carrier -- in this case Telesphere -- and the | |
| information provider is charged for the call from a reserve each is required to | |
| maintain. | |
| But the information providers dispute the extent of the uncollectible | |
| charges. They claim Telesphere has never adequately documented the charges | |
| placed against them (the information providers) month after month. In at least | |
| one instance, an information provider filed suit against an end-user for | |
| non-payment only to find out through deposition that the user HAD paid his | |
| local telco, and the local telco HAD in turn paid Telesphere. The information | |
| providers allege in their action against the company that Telesphere was in | |
| fact paid for many items charged to them as uncollectible, "and apparently are | |
| using the money to finance other aspects of their operation at the expense of | |
| one segment of their creditors; namely the information providers..." | |
| Telesphere denied these allegations. | |
| Formerly based here in the Chicago area (in Oak Brook, IL), Telesphere is | |
| now based in Rockville, MD. | |
| ______________________________________________________________________________ | |
| Theft of Telephone Service From Corporations Is Surging August 28, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Edmund L. Andrews (New York Times) | |
| "It is by far the largest segment of communications fraud," said Rami | |
| Abuhamdeh, an independent consultant and until recently executive director of | |
| the Communications Fraud Control Association in McLean, Va. "You have all | |
| this equipment just waiting to answer your calls, and it is being run by people | |
| who are not in the business of securing telecommunications." | |
| Mitsubishi International Corp. reported losing $430,000 last summer, | |
| mostly from calls to Egypt and Pakistan. Procter & Gamble Co. lost $300,000 in | |
| l988. The New York City Human Resources Administration lost $529,000 in l987. | |
| And the Secret Service, which investigates such telephone crime, says it is now | |
| receiving three to four formal complaints every week, and is adding more | |
| telephone specialists. | |
| In its only ruling on the issue thus far, the Federal Communications | |
| Commission decided in May that the long-distance carrier was entitled to | |
| collect the bill for illegal calls from the company that was victimized. In | |
| the closely watched Mitsubishi case filed in June, the company sued AT&T for | |
| $10 million in the U.S. District Court in Manhattan, arguing that not only had | |
| it made the equipment through which outsiders entered Mitsubishi's phone | |
| system, but that AT&T, the maker of the switching equipment, had also been paid | |
| to maintain the equipment. | |
| For smaller companies, with fewer resources than Mitsubishi, the problems | |
| can be financially overwhelming. For example, WRL Group, a small software | |
| development company in Arlington, Va., found itself charged for 5,470 calls | |
| it did not make this spring after it installed a toll-free 800 telephone | |
| number and a voice mail recording system machine to receive incoming calls. | |
| Within three weeks, the intruders had run up a bill of $106,776 to US | |
| Sprint, a United Telecommunications unit. | |
| In the past, long-distance carriers bore most of the cost, since the | |
| thefts were attributed to weaknesses in their networks. But now, the phone | |
| companies are arguing that the customers should be liable for the cost of | |
| the calls, because they failed to take proper security precautions on their | |
| equipment. | |
| Consumertronics, a mail order company in Alamogordo, N.M., sells brochures | |
| for $29 that describe the general principles of voice mail hacking and | |
| the particular weaknesses of different models. Included in the brochure is a | |
| list of 800 numbers along with the kind of voice mail systems to which they are | |
| connected. "It's for educational purposes," said the company's owner, John | |
| Williams, adding that he accepts Mastercard and Visa. Similar insights can be | |
| obtained from "2600 Magazine", a quarterly publication devoted to telephone | |
| hacking that is published in Middle Island, N.Y. | |
| ______________________________________________________________________________ | |
| Proctor & Gamble August 22, 1991 | |
| ~~~~~~~~~~~~~~~~ | |
| Compiled from Telecom Digest | |
| On 8-12-91, the "Wall Street Journal" published a front page story on an | |
| investigation by Cincinnati police of phone records following a request by | |
| Procter & Gamble Co. to determine who might have furnished inside information | |
| to the "Wall Street Journal". The information, ostensibly published between | |
| March 1st and June 10th, 1991, prompted P&G to seek action under Ohio's Trade | |
| Secrets Law. In respect to a possible violation of this law, a Grand Jury | |
| issued a subpoena for records of certain phone calls placed to the Pittsburgh | |
| offices of the "Wall Street Journal" from the Cincinnati area, and to the | |
| residence of a "Wall Street Journal" reporter. By way of context, the | |
| Pittsburgh offices of the "Wall Street Journal" allegedly were of interest in | |
| that Journal reporter Alecia Swasy was principally responsible for covering | |
| Procter & Gamble, and worked out of the Pittsburgh office. | |
| On 8-13-91, CompuServe subscriber Ryck Bird Lent related the Journal story | |
| to other members of CompuServe's TELECOM.ISSUES SIG. He issued the following | |
| query: | |
| "Presumably, the records only show that calls were placed between | |
| two numbers, there's no content available for inspection. But | |
| what if CB had voice mail services? And what if the phone number | |
| investigations lead to online service gateways (MCI MAil, CIS), | |
| are those also subject to subpoena?" | |
| At the time of Mr. Lent's post, it was known that the "Wall Street | |
| Journal" had alleged a large amount of phone company records had been provided | |
| by Cincinnati Bell to local police. An exact figure did not appear in Lent's | |
| comments. Thus, I can't be certain if the Journal published any such specific | |
| data on 8-12-91 until I see the article in question. | |
| On 8-14-91, the Journal published further details on the police | |
| investigation into possible violation of the Ohio Trade Secrets Law. The | |
| Journal then asserted that a Grand Jury subpoena was issued and used by the | |
| Cincinnati Police to order Cincinnati Bell to turn over phone records spanning | |
| a 15-week period of time, covering 40 million calls placed from the 655 and 257 | |
| prefixes in the 513 area code. The subpoena was issued, according to the "Wall | |
| Street Journal", only four working days after a June 10th, 1991 article on | |
| problems in P&G's food and beverage markets. | |
| Wednesday [8-14-91], the Associated Press reported that P&G expected no | |
| charges to be filed under the police investigation into possible violations of | |
| the Ohio Trade Secrets Law. P&G spokesperson Terry Loftus was quoted to say: | |
| "It did not produce any results and is in fact winding down". Lotus went on to | |
| explain that the company happened to "conduct an internal investigation which | |
| turned up nothing. That was our first step. After we completed that internal | |
| investigation, we decided to turn it over to the Cincinnati Police Department". | |
| Attempts to contact Gary Armstrong, the principal police officer in charge | |
| of the P&G investigation, by the Associated Press prior to 8-14-91 were | |
| unsuccessful. No one else in the Cincinnati Police Department would provide | |
| comment to AP. | |
| On 8-15-91, the Associated Press provided a summary of what appeared in | |
| the 8-14-91 edition of the "Wall Street Journal" on the P&G investigation. In | |
| addition to AP's summary of the 8-14-91 Journal article, AP also quoted another | |
| P&G spokesperson -- Sydney McHugh. Ms. McHugh more or less repeated Loftus' | |
| 8-13-91 statement with the following comments: "We advised the local Cincinnati | |
| Police Department of the matter because we thought it was possible that a crime | |
| had been committed in violation of Ohio law. They decided to conduct an | |
| independent investigation." | |
| Subsequent to the 8-14-91 article in the Journal, AP had once again | |
| attempted to reach Officer Gary Armstrong with no success. Prosecutor Arthur | |
| M. Ney has an unpublished home phone number and was therefore unavailable for | |
| comment on Wednesday evening [08-14-91], according to AP. | |
| In the past few weeks, much has appeared in the press concerning | |
| allegations that P&G, a local grand jury, and/or Cincinnati Police have found a | |
| "novel" way to circumvent the First Amendment to the U.S. Constitution. In its | |
| 8-15-91 summary of the 8-14-91 Journal article, AP quoted Cincinnati attorney | |
| Robert Newman -- specializing in First Amendment issues -- as asserting: | |
| "There's no reason for the subpoena to be this broad. It's cause for alarm". | |
| Newman also offered the notion that: "P&G doesn't have to intrude in the lives | |
| of P&G employees, let alone everyone else". | |
| The same AP story references Cincinnati's American Civil Liberties | |
| Union Regional Coordinator, Jim Rogers, similarly commenting that: "The | |
| subpoena is invasive for anyone in the 513 area code. If I called "The Wall | |
| Street Journal", what possible interest should P&G have in that?" | |
| In a later 8-18-91 AP story, Cleveland attorney David Marburger was quoted | |
| as observing that "what is troublesome is I just wonder if a small business in | |
| Cincinnati had the same problem, would law enforcement step in and help them | |
| out?" Marburger also added, "it's a surprise to me," referring to the nature | |
| of the police investigation. | |
| In response, Police Commander of Criminal Investigations, Heydon Thompson, | |
| told the Cincinnati Business Courier "Procter & Gamble is a newsmaker, but | |
| that's not the reason we are conducting this investigation." P&G spokesperson | |
| Terry Loftus responded to the notion P&G had over-reacted by pointing out: "We | |
| feel we're doing what we must do, and that's protect the shareholders. And | |
| when we believe a crime has been committed, to turn that information over to | |
| the police." | |
| Meanwhile, the {Cincinnati Post} published an editorial this past | |
| weekend -- describing the P&G request for a police investigation as "kind of | |
| like when the biggest guy in a pick-up basketball game cries foul because | |
| someone barely touches him." Finally, AP referenced what it termed "coziness" | |
| between the city of Cincinnati and P&G in its 8-18-91 piece. In order to | |
| support this notion of coziness, Cincinnati Mayor David Mann was quoted to say: | |
| "The tradition here, on anything in terms of civic or charitable initiative, is | |
| you get P&G on board and everybody else lines up." As one who lived near | |
| Cincinnati for eight years, I recall Procter & Gamble's relationship with | |
| Cincinnati as rather cozy indeed. | |
| _______________________________________________________________________________ | |
| Hacker Charged in Australia August 13; 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| The Associated Press reports from Melbourne that Nahshon Even-Chaim, a | |
| 20-year old computer science student, is being charged in Melbourne's | |
| Magistrates' Court on charges of gaining unauthorized access to one of CSIRO's | |
| (Australia's government research institute) computers, and 47 counts of | |
| misusing Australia's Telecom phone system for unauthorized access to computers | |
| at various US institutions, including universities, NASA, Lawrence Livermore | |
| Labs, and Execucom Systems Corp. of Austin, Texas, where it is alleged he | |
| destroyed important files, including the only inventory of the company's | |
| assets. The prosecution says that the police recorded phone conversations in | |
| which Even-Chaim described some of his activities. No plea has been entered | |
| yet in the ongoing pre-trial proceedings. | |
| _______________________________________________________________________________ | |
| Dial-a-Pope Catching on in the U.S. August 17, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| >From the Toronto Star | |
| The Vatican is reaching out to the world, but it looks as if Canada won't | |
| be heeding the call. In the U.S., if you dial a 900 number, you can get a | |
| daily spiritual pick-me-up from Pope John Paul II. The multilingual, Vatican | |
| -authorized service, affectionately known as Dial-a-Pope, is officially titled | |
| "Christian Messaging From the Vatican." A spokesman from Bell Canada says | |
| there is no such number in this country. But Des Burge, director of | |
| communications for the Archdiocese of Toronto, says he thinks the service, for | |
| which U.S. callers pay a fee, is a good way to help people feel more connected | |
| to the Pope. (Toronto Star) | |
| ______________________________________________________________________________ | |
| PWN Quicknotes | |
| ~~~~~~~~~~~~~~ | |
| 1. Agent Steal is sitting in a Texas jail awaiting trial for various crimes | |
| including credit card fraud and grand theft auto. | |
| _______________________________________________________________________________ | |
| 2. Blue Adept is under investigation for allegedly breaking into several | |
| computer systems including Georgia Tech and NASA. | |
| _______________________________________________________________________________ | |
| 3. Control C had his fingerprints, photographs, and a writing sample | |
| subpoenaed by a Federal Grandy Jury after Michigan Bell employees, | |
| and convicted members of the Legion of Doom (specifically The Leftist | |
| and the Urvile) gave testimony. | |
| Control C was formerly an employee of Michigan Bell in their security | |
| department until January 1990, when he was fired about the same time | |
| as the raids took place on Knight Lightning, Phiber Optic, and several | |
| others. Control C has not been charged with a crime, but the status | |
| of the case remains uncertain. | |
| _______________________________________________________________________________ | |
| 4. Gail Thackeray, a special deputy attorney in Maricopa County in Arizona, | |
| has been appointed vice president at Gatekeeper Telecommunications Systems, | |
| Inc., a start-up in Dallas. Thackeray was one of the law enforcers working | |
| on Operation Sun-Devil, the much publicized state and federal crackdown on | |
| computer crime. Gatekeeper has developed a device that it claims is a | |
| foolproof defense against computer hackers. Thackeray said her leaving | |
| will have little impact on the investigation, but one law enforcer who | |
| asked not to be identified, said it is a sure sign the investigation in on | |
| the skids. (ComputerWorld, June 24, 1991, page 126) | |
| _______________________________________________________________________________ | |
| 5. Tales Of The Silicon Woodsman -- Larry Welz, the notorious 1960s | |
| underground cartoonist, has gone cyberpunk. He recently devoted an entire | |
| issue of his new "Cherry" comice to the adventures of a hacker who gets | |
| swallowed by her computer and hacks her way through to the Land of Woz. | |
| (ComputerWorld, July 1, 1991, page 82) | |
| _______________________________________________________________________________ | |
| 6. The Free Software Foundation (FSF), founded on the philosophy of free | |
| software and unrestricted access to computers has pulled some of its | |
| computers off the Internet after malicious hackers <MOD> repeatedly deleted | |
| the group's files. The FSF also closed the open accounts on the system to | |
| shut out the hackers who were using the system to ricochet into computers | |
| all over the Internet following several complaints from other Internet | |
| users. Richard Stallman, FSF director and noted old-time hacker, refused | |
| to go along with his employees -- although he did not overturn the decision | |
| -- and without password access has been regulated to using a stand-alone | |
| machine without telecom links to the outside world. | |
| (ComputerWorld, July 15, 1991, page 82) | |
| _______________________________________________________________________________ | |
| 7. The heads of some Apple Macintosh user groups have received a letter from | |
| the FBI seeking their assistance in a child-kidnapping case. The FBI is | |
| querying the user group leaders to see if one of their members fits the | |
| description of a woman who is involved in a custody dispute. It's unclear | |
| why the FBI believes the fugitive is a Macintosh user. | |
| (ComputerWorld, July 29, 1991, page 90) | |
| _______________________________________________________________________________ | |
| 8. Computer viruses that attack IBM PCs and compatibles are nearing a | |
| milestone of sorts. Within the next few months, the list of viruses will | |
| top 1,000 according to Klaus Brunnstein, a noted German computer virus | |
| expert. He has published a list of known malicious software for MS-DOS | |
| systems that includes 979 viruses and 19 trojans. In all, there are 998 | |
| pieces of "malware," Brunnstein said. | |
| (ComputerWorld, July 29, 1991, page 90) | |
| _______________________________________________________________________________ | |
| 9. High Noon on the Electronic Frontier -- This fall the Supreme Court of the | |
| United States may rule on the appealed conviction from U.S. v. Robert | |
| Tappan Morris. You might remember that Morris is the ex-Cornell student | |
| who accidentially shut down the Internet with a worm program. Morris is | |
| also featured in the book "Cyberpunk" by Katie Hafner and John Markoff. | |
| _______________________________________________________________________________ | |
| 10. FBI's Computerized Criminal Histories -- There are still "major gaps in | |
| automation and record completness" in FBI and state criminal records | |
| systems, the Congressional Office of Technology has reported in a study on | |
| "Automated Record Checks of Firearm Purchasers: Issues and Options." In | |
| the report, OTA estimates that a system for complete and accurate "instant" | |
| name checks of state and federal criminal history records when a person | |
| buys a firearm would take several years and cost $200-$300 million. The | |
| FBI is still receiving dispositions (conviction, dismissal, not guilty, | |
| etc.) on only half of the 17,000 arrest records it enters into its system | |
| each day. Thus, "about half the arrests in the FBI's criminal history | |
| files ("Interstate Ident-ification Index" -- or "Triple I") are missing | |
| dispositions. The FBI finds it difficult to get these dispositions." The | |
| OTA said that Virginia has the closest thing to an instant records chck for | |
| gun purchasers. For every 100 purchasers, 94 are approved within 90 | |
| seconds, but of the six who are disapproved, four or five prove to be based | |
| on bad information (a mix-up in names, a felony arrest that did not result | |
| in conviction, or a misdemeanor conviction that is not disqualifying for | |
| gun ownership) (62 pages, $3 from OTA, Washington, D.C. 20510-8025, | |
| 202/224-9241, or U.S. Government Printing Office, Stock No.052-003-01247-2, | |
| Washington, D.C. 20402-9325, 202/783-3238). | |
| (Privacy Journal, August 1991, page 3) | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Founded in 1974, Privacy Journal is an independent monthly on privacy in the | |
| computer age. It reports in legislation, legal trends, new technology, and | |
| public attitudes affecting the confidentiality of information and the | |
| individual's right to privacy. | |
| Subscriptions are $98 per year ($125 overseas) and there are special | |
| discount rates for students and others. Telephone and mail orders accepted, | |
| credit cards accepted. | |
| Privacy Journal | |
| P.O. Box 28577 | |
| Providence, Rhode Island 02908 | |
| (401)274-7861 | |
| _______________________________________________________________________________ | |