| ==Phrack Inc.== | |
| Volume Four, Issue Thirty-Eight, File 13 of 15 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN Phrack World News PWN | |
| PWN PWN | |
| PWN Issue XXXVIII / Part One of Three PWN | |
| PWN PWN | |
| PWN Compiled by Dispater & Friends PWN | |
| PWN PWN | |
| PWN Special Thanks to Datastream Cowboy PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Warning: Multiplexor/The Prisoner Tells All April 10, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| On approximately April 3, 1992, Multiplexor (a/k/a The Prisoner) illegally used | |
| credit card information obtained from CBI/Equifax to purchase an airline ticket | |
| to San Diego, California from his home in Long Island, New York. Upon his | |
| arrival, MP was met by several agents of the Federal Bureau of Investigation. | |
| After his apprehension, MP was taken first to a computer store where agents | |
| allegedly picked up a computer from the store manager who is a friend of either | |
| one of the agents or a federal prosecutor involved in the case. | |
| At the taxpayer's expense, Multiplexor was put up for at least a week at a | |
| Mariott Hotel in San Diego while he told all that he ever knew about anyone to | |
| the FBI. It is believed that "Kludge," sysop of the San Diego based BBS | |
| Scantronics has been implicated, although reportedly his board does not contain | |
| ANY illegal information or other contraband. | |
| It is widely known that card credit abusing scum like Multiplexor are | |
| inherently criminal and will probably exaggerate, embellish and otherwise lie | |
| about other people in order to escape prosecution themselves. If you have ever | |
| come into contact with Multiplexor -- beware. He may be speaking about you. | |
| Incidentally, Multiplexor had this year submitted a poorly written and ill- | |
| conceived article to Phrack about voice mail hacking. His article was denied | |
| publication. | |
| And now this is the final result... | |
| Nationwide Web of Criminal Hackers Charged April 20, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Barbara E. McMullen & John F. McMullen (Newsbytes) | |
| San Diego -- According to a San Diego Union-Tribune report, San Diego police | |
| have uncovered "an electronic web of young computer hackers who use high-tech | |
| methods to make fraudulent credit card charges and carry out other activities." | |
| The Friday, April 17th story by Bruce V. Bigelow and Dwight C. Daniels quotes | |
| San Diego police detective Dennis Sadler as saying that this informal | |
| underground network has been trading information "to further their political | |
| careers." He said that the hackers know how to break computer security codes, | |
| create credit card accounts, and make fraudulent credit card purchases. Sadler | |
| estimated that as many as 1,000 hard-core hackers across the United States have | |
| shared this data although he said that it's unclear how many have actually used | |
| the information to commit crimes. | |
| Sadler added that he estimated that illegal charges to credit cards could total | |
| millions of dollars. | |
| While the police department did not release details to support the allegations, | |
| saying that the investigation is continuing, Sadler did say that cooperation | |
| >from an "out-of-state hacker," picked up in San Diego, provided important | |
| information to the police and the FBI. Although police would not release the | |
| identity of this individual or his present whereabouts, information gathered | |
| by Newsbytes from sources within the hacker community identifies the so-called | |
| hacker as "Multiplexer", a resident of Long Island, NY, who, according to | |
| sources, arrived in San Diego on a airline flight with passage obtained by | |
| means of a fraudulent credit card purchase. The San Diego police, apparently | |
| aware of his arrival, allegedly met him at the airport and took him into | |
| custody. The same sources say that, following his cooperation, Multiplexer was | |
| allowed to return to his Long Island home. | |
| The Union-Tribune article linked the San Diego investigation to recent federal | |
| search and seizures in the New York, Philadelphia and Seattle areas. Subjects | |
| of those searches have denied to Newsbytes any knowledge of Multiplexer, | |
| illegal credit card usage or other illegal activities alleged in the Union- | |
| Tribune story. Additionally, law enforcement officials familiar with on-going | |
| investigations have been unwilling to comment, citing possible future | |
| involvement with the San Diego case. | |
| The article also compared the present investigation to Operation Sun-Devil, a | |
| federal investigation into similar activities that resulted in a massive search | |
| and seizure operation in May 1990. Although individuals have been sentenced in | |
| Arizona and California on Sun Devil related charges, civil liberties groups, | |
| such as the Computer Professionals for Social Responsibility, have been | |
| critical about the low number of criminal convictions resulting from such a | |
| large operation. | |
| _______________________________________________________________________________ | |
| Sun-Devil Becomes New Steve Jackson Game March 25, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Steve Jackson | |
| It couldn't have been more than a week after the initial raid when people | |
| started saying, "Hey, why don't you make a game out of it?" The joke wore thin | |
| quickly, as I heard it over and over and over during the next year. Then I | |
| realized that I was in serious danger of losing my sense of humor over this... | |
| and that actually, it would be possible to do a pretty good game about hacking. | |
| So I did. | |
| In 1990, the Secret Service raided Steve Jackson Games when a "hacker hunt" | |
| went out of control. Loss of our computers and unfinished game manuscripts | |
| almost put this company out of business. | |
| It's been two years. We're back on our feet. And ever since the raid, fans | |
| have been asking, "When are you going to make a game out of it?" | |
| Okay. We give up. Here it is. | |
| The game has enough fanciful and pure science-fiction elements that it's not | |
| going to tutor anyone in the arcane skills. Neither is it going to teach the | |
| sysadmin any protective tricks more sophisticated than "don't leave the root | |
| set to default." But it is, I think, a good simulation of the *social* | |
| environment of High Hackerdom. You want to outdo your rivals -- but at the | |
| same time, if you don't share knowledge with them, you'll never get anywhere. | |
| And too many wannabes on the same system can mess it up for everybody, so when | |
| you help somebody, you ask them to try it out *somewhere else* . . . and | |
| occasionally a hacker finds himself doing the sysadmin's housecleaning, just to | |
| preserve his own playground against later intruders. I like the way it plays. | |
| In HACKER, players compete to invade the most computer systems. The more | |
| systems you crack, the more you learn, and the easier the next target is. You | |
| can find back doors and secret phone lines, and even crash the systems your | |
| rivals are using. But be careful. There's a Secret Service Raid with your | |
| name on it if you make too many enemies. | |
| Designed by Steve Jackson, the game is based on the award-winning ILLUMINATI. | |
| To win at HACKER requires guile and diplomacy. You must trade favors with your | |
| fellow hackers -- and get more than you give away. But jealous rivals will try | |
| to bust you. Three busts and you're out of the game. More than one player can | |
| win, but shared victories are not easy! | |
| HACKER is for 3-6 players. Playing time is under an hour for the short game | |
| and about 2 hours for the regular game. Components include a rule book, 110 | |
| cards, marker chips, 6 console units, system upgrades, Bust markers, and Net | |
| Ninja marker, two dice and a Ziplock bag. | |
| Hacker began shipping March 30, and has a suggested retail price of $19.95. | |
| _______________________________________________________________________________ | |
| "Peter The Great " Had An Overbyte January 10, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Kay Kusumoto (The Seattle Times)(Page B1) | |
| "Teenage Hacker Ring Bigger Than Thought" | |
| Bellevue, Washington -- Imagine you're a 17-year-old computer whiz who has | |
| figured out how to get into the phone-company computer to make long-distance | |
| calls for free. | |
| Imagine finding at the tip of your fingers step-by-step instructions on how to | |
| obtain credit-card numbers. | |
| And imagine once more the name you use to log on to a computer system isn't | |
| really your own, but actually a tag, or moniker -- like, say, that of a Russian | |
| czar. | |
| Bellevue police say that's the name an Issaquah teenager used when sending | |
| messages to fellow hackers all over the country. | |
| They first arrested "Peter the Great" a month ago for investigation of | |
| attempted theft in using an unauthorized credit-card number to try to purchase | |
| a $4,000 computer from a store in Bellevue. | |
| But now police, who are still investigating and have not yet filed charges, | |
| believe they're on to something much larger than first suspected. They say | |
| they are looking for one or two additional youths involved with the 17-year-old | |
| in a large computer-hacking ring that uses other people's credit-card numbers | |
| to purchase computers and software. | |
| In the youth's car, police say, they found another $4,000 computer obtained | |
| earlier that day from a Seattle computer store. They also claim to have found | |
| documents suggesting the youth had used credit information illegally. | |
| Police Lt. Bill Ferguson of Bellevue's white-collar crime unit said detectives | |
| don't know how many people are involved in the scam or how long it has been | |
| going on. And police may never know the dollar loss from businesses and | |
| individuals, he said. | |
| "You can guess as high as you want," Ferguson said. "He had connections clear | |
| across the country." | |
| After the youth was arrested, police say, he admitted to being a hacker and | |
| using his parents' home computer and telephone to call boards. | |
| An elaborate type of e-mail -- the bulletin boards offer the user a electronic | |
| messaging -- system, one may gain access to a "pirate" bulletin directory of | |
| "how to" articles on ways of cracking computer systems containing everything | |
| >from credit records and phone accounts to files in the University of | |
| Washington's chemistry department. | |
| Once the youth decided which articles he wanted most, he would copy them onto | |
| his own disk, said Ferguson. Now police are poring over hundreds of disks, | |
| confiscated from his parents' house, to see just how much information he had. | |
| The parents knew nothing of what was going on, police say. Ferguson said | |
| police also seized a copy of a New York-based magazine called 2600, aimed at | |
| hackers. Like the bulletin boards, the magazine provides readers with a | |
| variety of "how to" articles. | |
| The teenager, who was released to his parents' custody the day of his December | |
| 3 arrest, told police the magazine taught him how to use a device that can | |
| imitate the sound of coins dropping into a pay phone. With that, he could dial | |
| outside computers for free. | |
| Police confiscated the device. | |
| "Hackers are difficult to trace because they don't leave their name on | |
| anything," Ferguson said, adding that a federal investigation may follow | |
| because detectives found copies of government documents on the youth's disks. | |
| "This kid (copied) hundreds of pages of articles, left messages and shared | |
| (computer) information with other hackers," said Ferguson. | |
| "What's common about the hacker community is that they like to brag about their | |
| accomplishments -- cracking computer systems. They'll tell each other so | |
| others can do it." | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Hotel Credit Doesn't Compute January 22, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Stephen Clutter and Kay Kusumoto (The Seattle Times)(Page D1) | |
| "Kirkland Police Suspect Hacker" | |
| Kirkland, Washington -- Police are investigating yet another potential computer | |
| hacking case, this one at the Woodmark Hotel in Kirkland. | |
| Someone, according to hotel officials, got into the Woodmark's computer system | |
| and gave themselves a $500 credit for a hotel room earlier this month. | |
| Police say a 19-year-old Bellevue man is the main suspect in the case, although | |
| no arrests have been made. | |
| The incident surfaces at the same time as Bellevue police press their | |
| investigation into their suspicions that a 17-year-old Issaquah youth, using | |
| the computer name "Peter the Great," got access to credit-card numbers to | |
| purchase computers and software. That suspect was arrested but is free pending | |
| charges. | |
| "The deeper we get into Peter's files, the more we're finding," Bellevue police | |
| Lt. Bill Ferguson said. | |
| After arresting the youth last month on suspicion of trying to use an | |
| unauthorized credit-card number to purchase a $4,000 computer from a Bellevue | |
| store, police confiscated hundreds of computer disks and have been searching | |
| the electronic files for evidence. | |
| "We've been printing one file out for three hours now -- and it's still | |
| printing," Ferguson said yesterday. | |
| The file, Ferguson estimated, contains at least 10,000 names of individuals, | |
| with credit-card numbers and expiration dates, addresses, phone numbers and | |
| Social-Security numbers. | |
| Detectives will meet with the Bellevue city prosecutor later this week to | |
| discuss charges. | |
| In the Kirkland incident, the 19-year-old Bellevue man stayed in the hotel the | |
| night of January 11, according to Kirkland Detective Sgt. Bill O'Brien. | |
| The man apparently made the reservation by phone a few days earlier and was | |
| given a confirmation number. When he went to check into the hotel on January | |
| 11, the receptionist found that a $500 credit had been made to his room | |
| account, O'Brien said. | |
| Woodmark officials, fearing they had a hacker problem, contacted Bellevue | |
| police last week after reading news accounts of the arrest of "Peter the | |
| Great." | |
| "The hotel said they had read the story, and discovered what appeared to be a | |
| break-in to their computer system," said Ferguson. "They wanted to know if | |
| maybe it was related to our "Peter the Great" case." | |
| Police don't know, Ferguson said -- and that's one of the things under | |
| investigation. | |
| The main suspect in the Woodmark case had worked at the hotel for five days in | |
| 1990, police say, and may have had access to the hotel's computer access code. | |
| Hotel officials suspected they had a hacker on their hands because phone | |
| records indicate that the $500 credit was made via a telephone modem and not by | |
| a keyboard at the hotel, Ferguson said. The problem was discovered after an | |
| audit showed the $500 was never paid to the hotel. | |
| So what happened during the free night at the Woodmark? | |
| "They partied and made various phone calls, including nine to the University of | |
| Washington," O'Brien said. | |
| The calls to the university went to an answering machine at the Medical Center, | |
| police say, and there is no indication the men were able to hack their way into | |
| the university's computer system. | |
| They were up to something, though, and police want to know what. "We're going | |
| to start with the (19-year-old Bellevue) kid, and start from there," O'Brien | |
| said. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Hacker Charged With Fraud February 14, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Kay Kusumoto (The Seattle Times)(Page F3) | |
| "Teen Computer Whiz May Be Part Of A Ring" | |
| "Peter the Great" played courier for "Nighthawk." | |
| He was supposed to pick up a couple computers purchased with an unauthorized | |
| credit-card number from a computer store in Bellevue, Washington last December. | |
| He never finished the transaction. A suspicious clerk called police and | |
| "Peter" was arrested for attempted theft. | |
| But that was only the beginning. | |
| The Issaquah teenager who went by the computer name "Peter the Great" was | |
| charged yesterday in King County Juvenile Court with attempted theft, | |
| possession of stolen property, telephone fraud and computer trespass.. | |
| The arrest of the 17-year-old computer whiz led Bellevue police on an | |
| investigation into the underground world of computer hacking. | |
| Police are still investigating the case and say they believe it involves | |
| members of a large computer-hacking ring who use other people's credit-card | |
| numbers to purchase computers and software. | |
| Court documents allege the youth was after two $1,800 computers on December 3, | |
| 1991, the day he walked into a Bellevue computer store to pick up an order for | |
| an unknown associate who went by the hacker moniker "Nighthawk." | |
| The computers had been ordered with a credit-card number given over the phone | |
| by a man identifying himself as Manuel Villareal. The caller told the clerk | |
| that another man named Bill Mayer would pick up the order later in the day. | |
| But a store clerk became suspicious when the youth, who said he was Bill Mayer, | |
| "appeared very nervous" while he was inside the store, court papers state. | |
| When the youth couldn't provide enough identification to complete the | |
| transaction, the clerk told him to have Villareal come into the store and sign | |
| for the computers himself. | |
| After the youth left, the clerk called police, and "Peter" was arrested later | |
| that day. | |
| A search of his car revealed a torn up VISA card, several computer disks, two | |
| more computers, a receipt from a computer store in Seattle and several pieces | |
| of paper with credit-card numbers on them, court papers state. | |
| The youth also had in his possession a red box, a device that simulates the | |
| sound of coins dropping into a pay phone. | |
| After his arrest, the youth told police that "Nighthawk" had telephoned the | |
| computer store and used Villareal's name and credit-card number to make the | |
| purchase in Bellevue. | |
| The teen admitted to illegally using another credit-card number to order a | |
| computer from a store in Seattle. The computer was picked up later by another | |
| unknown associate. | |
| The youth also told police that another associate had hacked his way into the | |
| computer system of a mail-order house and circulated a list of 14,000 credit | |
| card numbers through a computer bulletin board. | |
| _______________________________________________________________________________ | |
| Computer Hackers Nabbed January 29, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Michael Rotem (The Jerusalem Post) | |
| Four computer hackers were arrested and their equipment seized in raids by | |
| police and Bezek security officers on four homes in the center and north of the | |
| country. They were released on bail yesterday after questioning. | |
| The four, two minors and two adults, are suspected of purloining passwords and | |
| then breaking the entry codes of international computer services and toll-free | |
| international telephone switchboards, stealing thousands of dollars worth of | |
| services. | |
| The arrests were made possible after National Fraud Squad officers joined | |
| Bezek's efforts to discover the source of tampering with foreign computer | |
| services. | |
| A Bezek source told The Jerusalem Post that all four suspects had used personal | |
| computers and inexpensive modems. After fraudulently obtaining several | |
| confidential passwords necessary to enter Isranet -- Israel's national computer | |
| network -- the four reportedly linked up to foreign public data banks by | |
| breaking their entrance codes. | |
| This resulted in enormous bills being sent to the password owners, who had no | |
| idea their personal secret access codes had been stolen. | |
| The four are also suspected of illegally obtaining secret personal credit | |
| numbers used by phone customers to call abroad. The suspects reportedly made | |
| numerous telephone conversations abroad worth thousands of shekels. | |
| A police spokesman said cooperation between Bezek's security department and the | |
| police National Fraud Squad will continue, in order to "fight these felonies | |
| that cause great financial damage." Bezek spokesman Zacharia Mizrotzki said | |
| the company is considering changing the secret personal passwords of network | |
| users on a frequent basis. | |
| _______________________________________________________________________________ | |
| Hackers Get Free Credit February 24, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Doug Bartholomew (Information Week)(Page 15) | |
| Banks and retail firms aren't the only ones peeking at consumers' credit | |
| reports. Equifax Inc., one of the nation's three major credit bureaus admitted | |
| that some youthful computer hackers in Ohio had penetrated its system, | |
| accessing consumers' credit files. And if it wasn't for a teenager's tip, they | |
| would still be at it. | |
| "We do not know how the hackers obtained the access codes, but we do know the | |
| confidentiality requirements for membership numbers and security pass-codes | |
| were breached," says a spokesman at Equifax. The company, which had revenue of | |
| $1.1 billion in 1991, possesses a database of some 170 million credit files. | |
| A customer number and access code must have been given to the teenagers, or | |
| stolen by them, adds the spokesman, who says Equifax "plans to increase the | |
| difficulty of accessing the system." Theft of computer access codes is a | |
| federal crime. | |
| Virtually No Protection | |
| Critics of the credit agencies say such breaches are common. "There is | |
| virtually no protection for those systems," says a spokesman for the Computer | |
| Professionals for Social Responsibility, a Washington association. "If some | |
| car salesman leaves the information sitting on his desk, someone could just | |
| pick up the codes." | |
| As of last week, Dayton police had made no arrests. But they searched the | |
| homes of two young men, age 18 and 15, confiscating half a dozen PCs and | |
| numerous floppy disks. | |
| The two are thought by police to be part of a group of up to 50 hackers | |
| believed to be behind the systems break-in. The group is also under | |
| investigation for allegedly making $82,000 worth of illegal phone calls using | |
| an 800 number provided to business customers of LDDS Communications Inc., a | |
| long-distance service in Jackson, Mississippi. LDDS was forced to disconnect | |
| the 800 number on November 15, 1991. | |
| _______________________________________________________________________________ | |
| Two Cornell Students Charged In Virus Attacks February 26, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Grant Buckler (Newsbytes) | |
| Also see Phrack 37, File 11 -- Phrack World News | |
| Ithaca, New York -- Charges have been laid against two Cornell University | |
| students accused of planting a virus that locked up Apple Macintosh computers | |
| at Cornell, at Stanford University in California, and in Japan. | |
| David S. Blumenthal and Mark Andrew Pilgrim, both aged 19, were charged in | |
| Ithaca City Court with one count each of second-degree computer tampering, a | |
| Class A misdemeanor. The investigation is continuing and additional charges | |
| are likely to be laid, said Cornell University spokeswoman Linda Grace-Kobas. | |
| Both students spent the night in jail before being released on bail February | |
| 25, Grace-Kobas added. | |
| The MBDFA virus apparently was launched February 14 in three Macintosh computer | |
| games: Obnoxious Tetris, Tetriscycle, and Ten Tile Puzzle. Apparently, a | |
| computer at Cornell was used to upload the virus to the SUMEX-AIM computer | |
| archive at Stanford University and an archive in Osaka, Japan. | |
| MBDFA is a worm, a type of computer virus that distributes itself in multiple | |
| copies within a system or into connected systems. MBDFA modifies systems | |
| software and applications programs and sometimes results in computer crashes, | |
| university officials reported. | |
| Reports of the MBDFA virus have been received from across the United States and | |
| >from around the world, including the United Kingdom, a statement from the | |
| university said. | |
| _______________________________________________________________________________ | |
| Judge Orders Hacker To Stay Away From Computers March 17, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Jim Mallory (Newsbytes) | |
| DENVER, COLORADO -- A computer hacker who pleaded guilty to breaking into space | |
| agency computer systems was ordered to undergo mental health treatment and not | |
| use computers without permission from his probation officer. | |
| The 24 year-old man, a resident of suburban Lakewood, was sentenced to three | |
| years probation in what is said to be one of only five prosecutions under the | |
| federal computer hacker law. | |
| The man pleaded guilty last year to one count of breaking into a National | |
| Aeronautics and Space Administration (NASA) computer, after NASA and the | |
| Federal Bureau of Investigation agents tracked him down in 1990. Prosecutors | |
| said the man had spent four years trying to get into computer systems, | |
| including those of some banks. | |
| Prosecutors said the man had gained access to a Defense Department computer | |
| through the NASA system, but declined to give any details of that case. The | |
| indictment did not explain what had occurred. | |
| In the plea bargain agreement, the man admitted he gained access to NASA's | |
| computers "by exploiting a malfunction in a public access NASA computer | |
| bulletin board service." | |
| The man was described as an unemployed loner who had spent most of his time | |
| using a computer at home. The prosecutor was quoted as saying the man needed | |
| counselling "on a social level and for personal hygiene." | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Hacker Journeys Through NASA's Secret World March 24, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Scripps Howard (Montreal Gazette)(Page A5) | |
| "It became more like a game. How many systems can you break into?" | |
| While tripping through NASA's most sensitive computer files, Ricky Wittman | |
| suddenly realized he was in trouble. Big trouble. | |
| He had been scanning the e-mail, electronic messages sent between two | |
| scientists at one of NASA's space centers. They were talking about the | |
| computer hacker who had broken into the system. They were talking about | |
| Wittman. | |
| Curiosity collapsed into panic. | |
| "Logoff now!" 24-year-old Wittman remembers thinking as he sat alone in his | |
| apartment, staring at his computer screen, in May 1990. "Hang up the phone. | |
| Leave the house." | |
| By then it was too late. The National Aeronautics and Space Administration's | |
| computer detectives were on the trail. After 400 hours of backtracking phone | |
| records, they found the Sandpiper Apartments in Westminster, Colorado. | |
| And they found the inconspicuous third-floor apartment where Wittman -- using | |
| an outdated IBM XT computer -- perpetrated the most massive hacking incident in | |
| the history of NASA. | |
| Last week a federal judge sentenced Wittman to three years' probation and | |
| ordered him to undergo psychiatric counselling. | |
| But perhaps the most punishing aspect to Wittman was the judge's order that he | |
| not use computers without permission from a probation officer. | |
| "That's going to be the toughest part," Wittman said. "I've become so | |
| dependent on computers. I get the news and weather from a computer." | |
| In his first interview since a federal grand jury indicted him in September, | |
| Wittman expressed regret for what he had done. | |
| But he remained oddly nonchalant about having overcome the security safeguards | |
| designed by NASA's best computer minds. | |
| "I'll level with you. I still think they're bozos," Wittman said. "If they had | |
| done a halfway competent job, this wouldn't have happened." | |
| Prosecutors didn't buy Wittman's argument. | |
| "No software security system is foolproof," wrote assistant U.S. attorney | |
| Gregory Graf. "If a thief picks the lock on the door of your home, is the | |
| homeowner responsible because he didn't have a pick-proof lock on the front | |
| door?" | |
| Breaking into the system was just that easy, Wittman said, so much so that it | |
| took him a while to realize what he had done. | |
| He had been fooling around inside a public-access NASA computer bulletin-board | |
| service in 1986, looking for information on the space-shuttle program. He | |
| started toying with a malfunction. | |
| "The software went blooey and dumped me inside," Wittman said. "At first, I | |
| didn't know what happened. I pressed the help key. I realized after a while | |
| that I was inside." | |
| Somehow, Wittman -- then 18 -- had found a way to break out of the bulletin | |
| board's menu-driven system and into a restricted-access area full of personal | |
| files. | |
| Once past the initial gate, it didn't take Wittman long to find the file of a | |
| security manager. Wittman picked up a password for another system, and the | |
| romp began. | |
| "Then I started looking around, and it became more like a game," he recalled. | |
| "How many systems can you break into?" | |
| By the federal government's count, Wittman eventually hacked his way into 115 | |
| user files on 68 computer systems linked by the Space Physics Analysis Network. | |
| His access extended as far as the European Southern Observatory in Munich, | |
| Germany. | |
| Given the chance, Wittman could have gone even farther, prosecutors contend. In | |
| an interview with the FBI, Wittman told agents he accidently had come across | |
| the "log on" screen for the U.S. controller of the currency. Wittman said he | |
| didn't try to crack that password. | |
| "The controller of the currency is a little out of my league," he said. | |
| _______________________________________________________________________________ | |
| Georgia Teenage Hacker Arrested March 19, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Jim Mallory (Newsbytes) | |
| LAWRENCEVILLE, GEORGIA -- A Georgia teenager has been arrested on charging of | |
| illegally accessing data files of several companies in a attempt to inject a | |
| computer virus into the systems. | |
| The alleged computer hacker, who was originally charged with the illegal access | |
| charges two weeks ago, was re-arrested on felony charges at his high school | |
| this week on the additional charges of attempting to infect the computer | |
| systems. | |
| The 18-year old boy allegedly broke into computers of BellSouth, General | |
| Electric Company, IBM, WXIA-TV in Atlanta, and two Gwinnett County agencies, | |
| who were not identified. | |
| The boy's 53-year-old mother was also arrested, charged with attempting to | |
| hinder her son's arrest by trying to have evidence against him destroyed. | |
| Computer users' awareness of computer viruses was heightened recently over the | |
| so-called Michelangelo virus, which some computer security experts thought | |
| might strike tens of thousands of computers, destroying data stored on the | |
| system's hard disk. Perhaps due to the massive publicity Michelangelo | |
| received, only a few hundred PCs in the US were struck. | |
| Hackers access computers through telephone lines. Passwords are sometimes | |
| obtained from underground bulletin boards, are guessed, or can be obtained | |
| through special software programs that try thousands of combinations, hoping to | |
| hit the right one. | |
| A recent Newsbytes story reported the conviction of a Denver area resident, who | |
| was sentenced to three years probation and ordered not to use computers without | |
| permission after attempting to break into a NASA (National Aeronautics and | |
| Space Administration) computer. | |
| Officials and victims are usually reluctant to give details of computer break- | |
| ins for fear of giving other would-be hackers ideas. | |
| _______________________________________________________________________________ | |
| Hacker Surveillance Software March 21, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Susan Watts, Technology Correspondent for The Independent (Page 6) | |
| "Hacker 'Profiles' May Curb Computer Frauds" | |
| The Federal Bureau of Investigation is dealing with computer hackers as it | |
| would rapists and murderers -- by building "profiles" of their actions. | |
| Its computer researchers have discovered that, in the same way that other | |
| offenders often favour the same weapons, materials or times of day to | |
| perpetrate their crimes, hackers prefer to use trusted routines to enter | |
| computer systems, and follow familiar paths once inside. These patterns can | |
| prove a rich source of information for detectives. | |
| The FBI is developing a modified version of detection software from SRI | |
| International -- an American technology research organization. Teresa Lunt, a | |
| senior computer scientist at SRI, said hackers would think twice about breaking | |
| into systems if they knew computer security specialists were building a profile | |
| of them. At the very least, they would have to constantly change their hacking | |
| methods. Ms. Lunt, who is seeking partners in Britain to help develop a | |
| commercial version of the software, believes hackers share with psychotic | |
| criminals a desire to leave their hallmark. | |
| "Every hacker goes through a process peculiar to themselves that is almost a | |
| signature to their work," she said. "The FBI has printed out long lists of the | |
| commands hackers use when they break in. Hackers are surprisingly consistent | |
| in the commands and options they use. They will often go through the same | |
| routines. Once they are in they will have a quick look around the network to | |
| see who else is logged on, then they might try to find a list of passwords." | |
| SRI's software, the development of which is sponsored by the US Defense | |
| Department, is "intelligent" -- it sits on a network of computers and watches | |
| how it is used. The software employs statistical analysis to determine what | |
| constitutes normal usage of the network, and sets off a warning if an | |
| individual or the network behaves abnormally. | |
| A more sophisticated version of the program can adapt itself daily to | |
| accommodate deviations in the "normal" behavior of people on the network. It | |
| might, for example, keep track of the number of temporary files created, or how | |
| often people collect data from an outside source or send out information. | |
| The program could even spot quirks in behavior that companies were not | |
| expecting to find. | |
| The idea is that organizations that rely on sensitive information, such as | |
| banks or government departments, will be able to spot anomalies via their | |
| computers. They might pick up money being laundered through accounts, if a | |
| small company or individual carries out an unusually large transaction. | |
| _______________________________________________________________________________ | |