| ==Phrack Inc.== | |
| Volume Three, Issue Thirty-four, File #11 of 11 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN Phrack World News PWN | |
| PWN PWN | |
| PWN Issue XXXIV, Part Two PWN | |
| PWN PWN | |
| PWN Compiled by Dispater PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Mind Rape or Media Rape? | |
| ~~~~~~~~~~~~~~~~~~~~~~~ | |
| Special Thanks: Night Ranger | |
| Thursday September 26, 1991 was no ordinary day for Mind Rape, a young Arizona | |
| State college student. When he finally made it home that day, he found his home | |
| had been raided by the feds. 'They took EVERYTHING! Including my Metallica | |
| tape!' he told me. After talking to him for quite a while I learned a lot, not | |
| just about his bust but about hacking in general. He instructed me not to say | |
| anything specifically on the advice of his lawyer and the EFF, but he did want | |
| me to let the real reason he was busted be known - His electronic newsletter | |
| entitled NSA (for National Security Anarchists). Mind Rape has some very | |
| important views on hacking that the government doesn't want others to hear. | |
| Some of these views were contained in his newest and soon to be released | |
| newsletter NSA issue number five, which was confiscated of course. He was also | |
| working on a book about hacker's philosophy, which was taken too. He has not | |
| yet been charged but in the eyes of the media he is already been tried and | |
| found guilty. It is unfortunate the general public gets its information from | |
| news reports like the following because, as you can see, they can be quite | |
| misleading. Hopefully once Mind Rape gets everything straight he will continue | |
| to write his book, after all it is his constitutional right to do so, and I | |
| think it be quite informative to both the hackers of the nineties and the | |
| outside world. | |
| The following is a transcript of a news report covering his story... | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Male Announcer: That student is Donald _____ of Phoenix. Officials of | |
| LDL Long Distance believe he's one of around 20 hackers who've been ripping off | |
| their company for fun and profit. In tonight's Night Team Report we'll see how | |
| this kind of thievery adds up. The nation's telephone companies loose more | |
| than a billion dollars a year to hackers. Mark Nighten (sp?) a security | |
| director for LDL Long Distance. Last month he was poring through records like | |
| these which convinced him to believe that someone was making hundreds of | |
| computer generated phone calls to his company's 1-800 access line trying to get | |
| customer's calling card codes. He went to the Phoenix Police. They got a | |
| search warrant and traced the calls to a house near 18th Drive near Union | |
| Hills. Police went there last month and came away with a computer, software | |
| and a list of phone codes, all belonging to 19 year old Donald _____ an ASU | |
| student. With nighten suspects _____ is just one of 20 hacker on his network | |
| who can make thousands of dollars worth of calls which would wind up on other | |
| people's phone bills. | |
| Mark: You can see the magnitude of this. Off of one authorization code | |
| you could have 10, maybe 150 other people... | |
| Male Announcer: Lemme ask ya...How bad are you getting ripped off here? | |
| Mark: We've had to have somebody on this 24 hours a day. We've been | |
| getting killed. | |
| Male Announcer: Hackers often sell the codes they steal to other students. | |
| So that hundreds of students and Arizona State University and University of | |
| Arizona also could be ripping of the company. Students at Arizona State | |
| University told me today that they have not herd of LDL's troubles, but they | |
| confirmed that stolen phone codes do have a way of getting around. | |
| I iz a College Student: Someone hears...ya know...about the interest and | |
| someone else knows somebody...ya know...and they tell you and you talk to | |
| them and...ya know...it's not overly expensive or anything like that. | |
| Male Announcer: Dr. Dan Kneer of Arizona State University's School | |
| of Business is a nationally recognized expert on computer crime. [who?] He | |
| contends that hacking is mushrooming. | |
| Dr. Dan: The problem that I see is that these people philosophically | |
| don't see this as a crime. For most of them this is an intellectual challenge. | |
| Male Announcer: That challenge led Dutch students to break into a United | |
| States Army Computer during operation desert storm. And as this Japanese | |
| documentary shows, it led hackers in a New York City to use payphones to commit | |
| big time rip-offs. Now it's important to point out that Donald ______, that | |
| Arizona State University student, has not yet been charged with any crime and | |
| if he is charged he is innocent until proven guilty. | |
| Female announcer: What is the penalty for hacking? | |
| Male Announcer: Just for getting into a system when you're not supposed to | |
| can be up to a year and a half in prison. But if there is criminal intent to | |
| steal, to rip-off that system, the penalty can be as high as 10 years in jail | |
| and a $150,000.00 fine. | |
| _______________________________________________________________________________ | |
| Computer Hacker Gets Probation September 26, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Special Thanks: Flaming Carrot (Pittsburgh Post-Gazette) | |
| A Mt. Lebanon woman who was able to make thousands of free long-distance | |
| telephone calls by breaking into voice mail boxes with a touch tone telephone | |
| has been placed on 10 years probation. Last Friday, Common Pleas Judge Robert | |
| E. Dauer ordered Andrea Gerulis, 20, of Castle Shannon Boulevard to make | |
| restitution of $4,300 to Magee Womens Hospital and $2,516 to Pittsburgh | |
| Cellular Telephone Co. | |
| Gerulis, a Mt. Lebanon High School graduate, was a computer hacker who | |
| entered telephone computer systems illegally so that she could make telephone | |
| calls without paying for the service. Mt. Lebanon police Detective John L. | |
| Michalec posed as a computer hacker and spent nine months investigating her | |
| activities, which were done by dialing codes on a touch-tone telephone. | |
| After a non-jury trial in May, Dauer convicted her of two counts of theft | |
| of services and two counts of unlawful use of computers. Assistant District | |
| Attorney Thaddeus A. Dutkowski recommended probation because he didn't want | |
| Gerulis to go to jail, where she could teach inmates how to commit crimes with | |
| a telephone. If she were incarcerated, she would have the largest classroom | |
| environment she could hope for, Dutkowski said. | |
| Dauer agreed that inmates already know too much about committing crimes | |
| with telephones. Gerulis told Dauer that she was sorry for what she did, that | |
| when she started, she was doing it for fun. She was also ordered to continue | |
| psychological counseling. | |
| _______________________________________________________________________________ | |
| More Archaic Government Regulations Proposed | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Special Thanks: Stainless Steal Provider (New York Times) | |
| The federal government said Thursday that it would introduce a standard | |
| for authenticating electronic data later this summer, but the announcement | |
| prompted an angry reaction from one of the leading private providers of software | |
| that protects computer data. | |
| The company, RSA Data Security Inc. of Redwood City, Calif., said the | |
| government had failed to address fears about the possibility of a secret "trap | |
| door," which would permit intelligence and law-enforcement agencies to look at | |
| private data. | |
| The issue of providing special mechanisms to permit government access to | |
| private information has caused a growing public debate recently. | |
| Earlier this year an anti-terrorism bill introduced in Congress called on | |
| the computer and telecommunication industries to permit federal agencies to | |
| look at private data. But the statement was later dropped from the bill after | |
| extensive public opposition. | |
| Government officials said that it would be possible for technical experts | |
| to examine the standard when it is released this summer and they could decide | |
| for themselves whether there were any shortcomings in the design of the | |
| standard. | |
| "It will be openly published and people can inspect it to their heart's | |
| content," said James H. Burrows, head of the computer systems laboratory at the | |
| National Institute of Standards and Technology. | |
| He added that the new standard was not intended to encrypt computer data, | |
| and that the government would continue to rely on an earlier technology known | |
| as the Data Encryption Standard to actually hide information from potential | |
| electronic eavesdroppers. | |
| Burrows said there was a project under way to develop a successor to that | |
| standard, but that it was years away from completion. | |
| ______________________________________________________________________________ | |
| Computer Whiz Accused Of Illegal Access and Mischief September 25, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Peter G. Chronis (The Denver Post Page 1 "NASA vs. Hobbyist") | |
| An Aurora computer hobbyist who allegedly used a personal computer and his | |
| home phone to penetrate NASA computers hacked off Uncle Sam enough to be | |
| indicted on seven federal counts yesterday. Richard G. Wittman, 24, the | |
| alleged "hacker," was accused of two felonies, including gaining unauthorized | |
| access to NASA computers to alter, damage, or destroy information, and five | |
| misdemeanor counts of interfering with the government's operation of the | |
| computers. Wittman allegedly got into the NASA system on March 7, June 11, | |
| June 19, June 28, July 25, July 30, and Aug. 2, 1. | |
| Bob Pence, FBI chief in Denver, said Wittman used a personal computer in | |
| his home and gained access to the NASA systems over telephone lines. The | |
| investigation, which took more than a year, concluded that Wittman accessed the | |
| NASA computer system and agency computers at the Marshall Space flight Center in | |
| Huntsville, Alabama, and the Goddard Space Flight Center in Greenbelt, | |
| Maryland. | |
| The NASA computers are linked to a system called Telenet, which allows | |
| qualified people to access government data bases. A user name and password | |
| are required to reach the NASA computers. Federal sources declined to reveal | |
| more information because the complex case involves "sensitive material." | |
| Wittman, a high-school graduate, apparently hadn't worked in the computer | |
| industry and held a series of odd jobs. The felony counts against him each | |
| carry a possible five-year prison term and $250,000 fine. | |
| _______________________________________________________________________________ | |
| Security Increases | |
| ~~~~~~~~~~~~~~~~~ | |
| Special Thanks: Stainless Steal Provider (New York Times) | |
| The foundation was started by Richard Stallman, who was awarded a MacArthur | |
| Foundation fellowship in 1. While mainstream software companies | |
| have prohibited users from freely copying their programs, Stallman, who is | |
| widely respected for developing computer languages and software editing tools, | |
| has argued that information is not the same as other commodities and should be | |
| shared without cost. | |
| His password has been widely known among network users because he has | |
| refused to keep it secret. He is bitter about the changes that have | |
| accompanied the coming of age of computer networks. | |
| Last month, after security was increased at the foundation and many users | |
| were stripped of their guest privileges, Stallman said he considered giving up | |
| his quest. | |
| In the end, he decided that the cause of creating free software was too | |
| important to abandon, but he said he feels like a pariah. "Since I won't agree | |
| to have a real password, I will only be able to log in on the 'inside' | |
| machines," | |
| he wrote in an electronic message in response to a reporter's query. | |
| "I still feel partly ashamed of participating in this. I've been forced to | |
| choose between two principles, both of which are so important to me that I | |
| won't accept the loss of either of them." | |
| Idealists like Stallman and Ted Nelson, the author of the cult classic | |
| "Computer Lib," hoped that the computer revolution wouldn't be like the | |
| industrial revolution. This time the wealth -- information -- would be free to | |
| everyone and instant communication would break down the barriers between rich | |
| and poor and remake mankind. | |
| Marvin Minsky, a computer science professor at MIT, said that for 15 | |
| years, beginning in 1963, researchers at the school lived in a paradise, | |
| sharing computers and networks before a system of password protection was | |
| installed. Now that has changed. "It's sad," he said. | |
| "But Richard Stallman is living in a dream world. He has this view that | |
| his idea of computer ethics will prevail. But it's not going to happen this | |
| year or next." | |
| Instead of finding community on computer networks, many users are now | |
| confronted with virus invasions and information theft, leading to the same | |
| sense of alienation and fear felt by residents of large cities. | |
| "At first I thought this was Marshall McLuhan's global village coming to | |
| reality," said Neil Harris, a manager at General Electric Information Services | |
| Co., which sets up computer conferences and sells information to about 200,000 | |
| members around the world. | |
| "But it's not that at all. It's a lot of people connecting in hundreds of | |
| small communities based around highly specific interests." | |
| Steven Levy, who has written about the early days of computing at MIT, said | |
| that the demise of the Free Software Foundation's open door policy was | |
| inevitable. | |
| "When you pass the plate around in church you don't expect people to steal | |
| from it," he said. "But sooner or later everyone knows that the plate is | |
| unguarded, and there are always people who don't care about the church. The | |
| question is how far do you go to protect it? Do you lock the church or do you | |
| send an armed guard around with the plate?" | |
| ______________________________________________________________________________ | |
| PWN Quicknotes | |
| ~~~~~~~~~~~~~ | |
| 1. On June 12, 1991, Sirhackalot's equipment was confiscated by the Southern | |
| Bell and the FBI without any charges being filed. Neither the FBI nor | |
| Southern Bell bothered to explain why they were in his home and taking his | |
| personal possessions. Again neither party could tell Sirhackalot what he | |
| supposedly did to bring both agency's to his doorstep. Also busted were | |
| Mr.Doo and The Imortal Phreak. [Special Thanks: The Marauder (404)] | |
| _______________________________________________________________________________ | |
| 2. Bill Cook is no longer an assistant United States Attorney in Chicago. It | |
| is unknown how he left his position. Basic questions go unanswered. Did | |
| he quit or was fired? If he was fired, we'd like to know exactly why. | |
| _______________________________________________________________________________ | |
| 3. Wanted: Targets of Operation Sun Devil | |
| Computer Professionals for Social Responsibility (CPSR) is pursuing a | |
| lawsuit against the Secret Service seeking the release of information | |
| concerning Operation Sun Devil. In recently filed court papers, the | |
| agency claims that the information cannot be disclosed because, among | |
| other reasons, disclosure would violate the privacy of those individuals | |
| who are the targets of the investigation. This argument can be overcome | |
| if CPSR obtains signed releases from those individuals. CPSR is | |
| requesting the cooperation of anyone who was the subject of a Sun Devil | |
| raid on or about May 7, 1. We are prepared to enter into an attorney- | |
| client relationship with individuals responding to this request, so that | |
| confidentiality will be assured. | |
| Please respond ASAP to: | |
| David Sobel | |
| CPSR Legal Counsel | |
| (202) 544-9240 | |
| dsobel@washofc.cpsr.org | |
| _______________________________________________________________________________ | |
| 4. Recently Microsoft discovered it was the victim of trespassing. A | |
| security guard noticed two people playing volleyball on the premises and | |
| knew that they did not work for Microsoft. The officer approached the | |
| volleyball players and asked them to leave. The trespassers left. Later | |
| someone asked the security guard how he knew that the people playing | |
| volleyball were not Microsoft employees. He replied, "They had tans." | |
| [Special Thanks: Psychotic Surfer] | |
| _______________________________________________________________________________ | |