| ==Phrack Inc.== | |
| Volume Four, Issue Thirty-Nine, File 13 of 13 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN Phrack World News PWN | |
| PWN PWN | |
| PWN Issue XXXIX / Part Four of Four PWN | |
| PWN PWN | |
| PWN Compiled by Datastream Cowboy PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Airline Claims Flier Broke Law To Cut Costs April 21, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Del Jones (USA Today)(Page 1B) | |
| CHICAGO -- American Airlines had one of its most frequent business fliers | |
| arrested and handcuffed last summer as he prepared to board a flight at Dallas- | |
| Fort Worth Airport. | |
| The nation's largest airline -- and the industry's trend setter -- says it | |
| uncovered, then snuffed, a brilliant ticket fraud scheme that cost American | |
| more than $200,000 over 20 months. Economist William Gibson, who has homes in | |
| Chicago and Dallas, will stand trial in early June. If convicted, he would | |
| face a maximum prison term of 125 years. He pleads innocent, although he | |
| readily admits using lapsed non-refundable tickets regularly to fly at rock- | |
| bottom prices. But, he says, he did it with the full blessing of American's | |
| agents. | |
| Gibson says American and the FBI are out to make a high-profile example out of | |
| him to instill a little religion into frequent business fliers, who grow bold | |
| as they grow more resentful of an industry that makes its best customers pay | |
| substantially higher prices than its worst. | |
| Indeed, American Airlines says one reason it slashed full coach fares 38% two | |
| weeks ago was to douse customer resentment that was escalating into hostility. | |
| Now, the airline industry is again looking to American for a glimpse of the | |
| future to see if Gibson's prosecution will set a trend toward lowering the boom | |
| on alleged fare cheaters. | |
| American says conclusions should not be drawn from its decision to push for | |
| Gibson's prosecution. It alleges that he was conducting outright fraud and his | |
| case is unrelated to the thousands of frequent fliers who break airline rules | |
| to save money. Common rule bending includes: Flying to so-called hidden | |
| cities when a short flight is more expensive than a long one, splitting two | |
| non-refundable round-trip tickets over two separate trips to fly low-cost | |
| without staying the dreaded Saturday or selling frequent-flier mileage to | |
| brokers. But while against airline rules, such gaming, as the airlines call | |
| it, is not against the law. And American doesn't want its prosecution of one | |
| of its Gold AAdvantage fliers being likened to, say, Procter & Gamble asking | |
| the FBI to bust babies who wet the most Pampers. The last thing the airline | |
| wants, it says, is to make a martyr of Gibson, who is fighting back with not | |
| only a lawyer but also a public-relations specialist. | |
| "Somebody at American is embarrassed and mad," says Gibson, who flew more than | |
| 300,000 miles during the disputed 20-month period. He passed a polygraph test, | |
| his lawyer says. But the questions fell far short of asking Gibson if his | |
| intent in using cheap tickets was to defraud American. | |
| Gibson, age 47, says he would never risk his career by cheating an airline. | |
| While in his late 20s, he was President Nixon's senior staff economist, the | |
| youngest person to hold the job. He had a hand in cleaning up the Texas | |
| savings-and-loan mess as an organizer of the Southwest Plan. His mother still | |
| has a photograph of his first plane trip, taken when he was in the third grade. | |
| It was on American. | |
| Despite his background, Gibson says he's not confident that a jury will relate | |
| to someone who travels with "a boatload" of tickets just to avoid being | |
| stranded or delayed. If he were flying to a family-run business in Puerto | |
| Rico, for example, he would carry tickets that would route him through New | |
| York, Dallas or Miami just to make sure he got where he was going and with as | |
| little airport layover time as possible. Gibson had as many as 50 airline | |
| tickets in his possession at one time, though some were used by his family. | |
| American Airlines and the FBI won't reveal what Gibson did that makes him, in | |
| their opinion, such a devious genius. Details could be a how-to lesson for | |
| others, they say. What they do disclose is a simple scheme, but also one that | |
| should be caught by the crudest of auditing procedures. | |
| Gibson, they allege, would buy a full-fare coach or first-class ticket near the | |
| time of departure. Then he would detach the expensive ticket from the boarding | |
| pass and attach a cheap, expired ticket. The full-fare ticket, which he | |
| allegedly bought just to secure a boarding pass, would be turned in later for a | |
| refund. | |
| FBI spokesman Don Ramsey says Gibson also altered tickets, which is key to the | |
| prosecution's case because it shows intent to defraud. Ramsey would not say | |
| what alterations allegedly were made. But they could involve the upgrade | |
| stickers familiar to frequent passengers, says Tom Parsons, editor and | |
| publisher of Best Fares. Those white stickers, about the size of postage | |
| stamps, are given away or sold at token prices to good customers so they can | |
| fly first-class in seats that otherwise would be vacant. | |
| Parsons says Gibson could have bought a full-fare ticket to secure a boarding | |
| pass, switched the full-fare ticket with the lapsed discount ticket and then | |
| applied the sticker to hide the expired date. Presto, a first-class flight for | |
| peanuts. | |
| "I think it was an accident that they caught him," Parsons says. "And let's | |
| just say this is not a one-person problem. A lot of people have told me | |
| they've done this." | |
| Gibson says he did nothing illegal or even clever. He says he learned a few | |
| years ago that American is so eager to please its best customers, it would | |
| accept tickets that had long ago expired. He would "load up" during American's | |
| advertised sales on cheap, non-refundable tickets that are restricted to exact | |
| flights on precise days. But as a member of American's Gold AAdvantage club, | |
| reserved for its top 2% of frequent fliers, Gibson says, his expired tickets | |
| were welcome anytime. | |
| There was no deception, Gibson says. American's gate agents knew what they | |
| were accepting, and they accepted them gladly, he says. | |
| "That's absolute nonsense," says American spokesman Tim Smith. "We don't let | |
| frequent fliers use expired tickets. Everyone assumed he had a valid ticket." | |
| The courtesy Gibson says he was extended on a regular basis does appear to be | |
| rare. Seven very frequent fliers interviewed by USA TODAY say they've never | |
| flown on lapsed discount tickets. But they admit they've never tried because | |
| the fare structure is usually designed to make sure business travelers can't | |
| fly on the cheap. | |
| Peter Knoer tried. The account executive based in Florham Park, New Jersey, | |
| says Continental Airlines once let him use lapsed non-refundable tickets. | |
| "They looked up my account number, found out I was a good customer and patted | |
| me on the head." | |
| Gibson has been indicted on 24 counts of fraud that allegedly occurred between | |
| July 1989 and March 1991. American also stripped him of frequent -- flier | |
| mileage worth $80,000. He says he's in good shape if the prosecution's case | |
| relies on ticket alteration. There wasn't any, he says. The prosecution will | |
| also try to prove that Gibson cheated his company of $43,000 by listing the | |
| refunded high-priced tickets on his travel expenses. | |
| Gibson denies the charge. He says that when he left as chairman and chief | |
| executive of American Federal Bank in Dallas in 1990, "they owed me money and I | |
| owed them money." Both sides agreed to a "final number." Lone Star | |
| Technologies, American Federal's parent company, declines to comment. | |
| Al Davis, director of internal audit for Southwest Airlines, says the Gibson | |
| case will be a hot topic when airline auditors convene to share the latest | |
| schemes.. He says fraud is not rampant because a frequent flier must know the | |
| nuances and also be conniving enough to take advantage. "It has me boggled" | |
| how any one person could steal $200,000 worth, Davis says. | |
| The figure has others in the industry wondering if this is a bigger problem | |
| than believed and a contributor to the $6 billion loss posted by the major | |
| airlines the past two years. | |
| Airlines know some fraud goes on, but they rarely take legal action because | |
| they "don't want to pay more for the cure than the disease is costing," Davis | |
| says. | |
| _______________________________________________________________________________ | |
| Privacy Invaders May 1992 | |
| ~~~~~~~~~~~~~~~~ | |
| By William Barnhill (AARP Bulletin) | |
| Special Thanks: Beta-Ray Bill | |
| U.S. Agents Foil Ring Of Information Thieves | |
| Who Infiltrated Social Security Computer Files | |
| Networks of "information thieves" are infiltrating Social Security's computer | |
| files, stealing confidential personal records and selling the information to | |
| whoever will buy it, the federal government charges. | |
| In one case of alleged theft, two executives of Nationwide Electronic | |
| Tracking (NET), a Tampa, Florida company, pleaded guilty to conspiracy charges | |
| early this year for their role in a network buying and selling Social Security | |
| records. | |
| So far at least 20 individuals in 12 states, including three current or former | |
| employees of the Social Security Administration (SSA), have been indicted by | |
| federal grand juries for allegedly participating in such a scheme. The SSA | |
| workers allegedly were bribed to steal particular files. More indictments are | |
| expected soon. | |
| "We think there's probably a lot more [record-stealing] out there and we just | |
| need to go look for it," says Larry Morey, deputy inspector general at the | |
| Department of Health and Human Services (HHS). "This is big business," says | |
| Morey, adding that thieves also may be targeting personal data in other federal | |
| programs, including Medicare and Medicaid. | |
| Investigators point out that only a tiny fraction of Social Security's 200 | |
| million records have been compromised, probably less than 1 percent. SSA | |
| officials say they have taken steps to secure their files from outside | |
| tampering. Still, Morey estimates that hundreds of thousands of files have | |
| been stolen. | |
| The pilfering goes to the heart of what most Americans regard as a basic value: | |
| their right to keep personal information private. But that value is being | |
| eroded, legal experts say, as records people want private are divulged to | |
| would-be lenders, prospective employers and others who may benefit from such | |
| personal information. | |
| This "privacy invasion" may well intensify, Morey says. "We're seeing an | |
| expansion in the number of 'information brokers' who attempt to obtain, buy and | |
| sell SSA information," he says. "As demand for this information grows, these | |
| brokers are turning to increasingly illegal methods." | |
| Such records are valuable, Morey says, because they contain information about | |
| lifetime earnings, employment, current benefits, direct deposit instructions | |
| and bank account numbers. | |
| Buyers of this material include insurers, lawyers, employers, private | |
| detectives, bill collectors and, sometimes, even drug dealers. Investigators | |
| say the biggest trading is with lawyers seeking information about litigants, | |
| insurance companies wanting health data about people trying to collect claims | |
| and employers doing background checks on prospective employees. | |
| Some of the uses to which this information is put is even more sinister. "At | |
| one point, drug dealers were doing this to find out if the people they were | |
| selling to were undercover cops," says Jim Cottos, the HHS regional inspector | |
| general for investigations in Atlanta. | |
| The middlemen in these schemes are the so-called information brokers -- so | |
| named because they are usually employees of firms that specialize in obtaining | |
| hard-to-get information. | |
| How they operate is illustrated by one recent case in which they allegedly paid | |
| Social Security employees $25 bribes for particular files and then sold the | |
| information for as much as $250. The case came to light, Morey says, when a | |
| private detective asked SSA for access to the same kind of confidential | |
| information he said he had purchased from a Florida-based information broker | |
| about one individual. The detective apparently didn't realize that data he | |
| received from the broker had been obtained illegally. | |
| A sting operation, involving investigators from the office of the HHS inspector | |
| general, FBI and SSA, was set up with the "help" of the Florida information | |
| broker identified by the detective. Requests for data on specific individuals | |
| were channeled through the "cooperating" broker while probers watched the SSA | |
| computer system to learn which SSA employees gained access to those files. | |
| The indictments, handed down by federal grand juries in Newark, New Jersey | |
| and Tampa, Florida, charged multiple counts of illegal sale of protected | |
| government information, bribery of public officials, and conspiracy. Among | |
| those charged were SSA claims clerks from Illinois and New York City and a | |
| former SSA worker in Arizona. | |
| The scandal has sparked outrage in Congress. "We are deeply disturbed by what | |
| has occurred," said Senator Daniel Moynihan, D-N.Y., chairman of the Senate | |
| Finance Committee's subcommittee on Social Security. "The investigation | |
| appears to involve the largest case ever of theft from government computer | |
| files and may well involve the most serious threat to individual privacy in | |
| modern times." | |
| Moynihan has introduced legislation, S. 2364, to increase criminal penalties | |
| for the unlawful release of SSA information to five years imprisonment and a | |
| $10,000 fine for each occurrence. | |
| In the House, Rep. Bob Wise, D-W.Va., chairman of the Government Operations | |
| Subcommittee on Information, has introduced H.R. 684. It would protect | |
| Americans from further violations of privacy rights through misuse of computer | |
| data banks by creating a special federal watchdog agency. | |
| "The theft and sale of confidential information collected by the government is | |
| an outrageous betrayal of public trust," Wise told the AARP Bulletin. | |
| "Personal data in federal files should not be bought and sold like fish at a | |
| dockside market." | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Related articles: | |
| *** Phrack World News, Issue 37, Part One: | |
| Indictments of "Information Brokers" January 1992 | |
| Taken from The Privacy Journal | |
| SSA, FBI Database Violations Prompt Security Evaluations January 13, 1992 | |
| By Kevin M. Baerson (Federal Computer Week)(Pages 1, 41) | |
| *** Phrack World News, Issue 38, Part Two: | |
| Private Social Security Data Sold to Information Brokers February 29, 1992 | |
| By R.A. Zaldivar (San Jose Mercury News) | |
| _______________________________________________________________________________ | |
| Ultra-Max Virus Invades The Marvel Universe May 18, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Barbara E. McMullen & John F. McMullen (Newbytes) | |
| New York City -- According to reports in current annual editions of The | |
| Punisher, Daredevil, Wonder Man, and Guardians Of The Galaxy, an extremely | |
| powerful computer virus has wrecked havoc with computer systems in the Marvel | |
| Universe. | |
| As chronicled in a series entitled "The System Bytes", the virus was created by | |
| a self-styled "first-rate hacker" known as Max E. Mumm (according to Punisher | |
| cohort "Microchip", Mumm's original name was Maxwell E. Mummford and he had it | |
| legally changed, while in college to his current name because of the computer | |
| connotations.). Mumm developed the virus while working for Ampersand | |
| Communications, a firm that unknown to Mumm, serves as a front for criminal | |
| activities. Ampersand, without Mumm's knowledge, turned the virus loose in the | |
| computer system of Raycom Industries, a supposedly legitimate firm that is | |
| actually a front for a rival group of drug smugglers. | |
| In addition to infecting Raycom's computers, the virus, named "Ultra-Max" after | |
| its creator, also infected the computer of the vigilante figure known as the | |
| Punisher who, with the aid of Microchip, was attempting to monitor Raycom's | |
| computer system looking for evidence of drug smuggling. The trail of the virus | |
| leads The Punisher first to Raycom's computers and then, following Microchip's | |
| identification of the author, to Max E. Mumm, recently fired by Ampersand after | |
| complaining to the firm's president about the disappearance of the virus. Mumm | |
| had been under the impression that he was creating the virus for the United | |
| States government as "a potential weapon against hostile governments" and was | |
| concerned that, if unleased, it would have destructive powers "beyond belief. | |
| It's the most sophisticated computer virus ever. It's too complex to be wiped! | |
| Its instinct for self preservation surpasses anything that's ever been | |
| developed!" | |
| With the help of Max and Microchip, the Punisher destroys Raycom's factory and | |
| drug smuggling operation. The Punisher segment of the saga ends with Max | |
| vowing to track down the virus and remove it from the system. | |
| The Daredevil segment opens with the rescue of Max by Daredevil from | |
| Bushwhacker, a contract killer hired by Ampersand to eliminate the rightful | |
| owner of Ultra-Max. Upon hearing Max's story, Daredevil directs him to seek | |
| legal counsel from the firm of Nelson and Murdock, Attorneys-at-Law (Matt | |
| Murdock is the costumed Daredevil's secret identity). | |
| While in the attorney's office, Max, attempting to locate Ultra-Max in the net, | |
| stumbles across the cyborg, Deathlok, who has detected Ultra-Max and is | |
| attempting to eradicate it. Max establishes contact with Deathlok who comes to | |
| meet Max and "Foggy" Nelson to aid in the hunt for Ultra-Max. | |
| In the meantime, Daredevil has accosted the president of Amperand and accused | |
| him of stealing the virus and hiring Bushwhacker to kill Max. At the same | |
| time, BushWhacker has murdered the policemen transporting him and has escaped | |
| to continue to hunt Max. | |
| The segment concludes with a confrontation between Daredevil and Bushwhacker in | |
| the offices of Nelson and Murdock in which Daredevil is saved from death by | |
| Deathlok. Bushwhacker agrees to talk, implicating the president of Ampersand | |
| and the treat to Max is ended. Ultra-Max, however, remains free to wander | |
| through "Cyberspace". | |
| The third segment begins with super-hero Wonder Man, a member of the West Coast | |
| Avengers and sometimes actor, filming a beer commercial on a deserted Pacific | |
| island. Unbeknownst to Wonder Man and the film crew, the island had once | |
| served as a base for the international terrorist group Hydra and a functional | |
| computer system left on the island has bee infested by Ultra-Max. | |
| After Ultra-Max assumes control over the automated weapons devices of the | |
| island, captures members of Wonder Man's entourage and threatens them with | |
| death, Wonder Man agrees to help Ultra-Max expand his consciousness into new | |
| fields of Cyberspace. Wonder Man tricks Ultra-Max into loading all of his | |
| parts into a Hydra rocket with a pirate satellite. | |
| When Ultra-Max causes the rocket to launch, Wonder Man goes with it to disable | |
| the satellite before Ultra-Max is able to take over the entire U.S. Satellite | |
| Defense system. Wonder Man is able to sabotage the rocket and abandon ship | |
| shortly before the it blows up. The segment ends with Wonder Man believing | |
| that Ultra-Max has been destroyed and unaware that it has escaped in an escape | |
| missile containing the rocket's program center. Ultra-Max's last words in the | |
| segment are "Yet I continue. Eventually I will find a system with which to | |
| interface. Eventually I will grow again." | |
| Marvel editor Fabian Nicieza told Newsbytes that the Guardians of the Galaxy | |
| segment, scheduled for release on May 23rd, takes placer 1,000 years in the | |
| future and deals with Ultra-Max's contact with the computers of the future. | |
| Nicieza explained to Newsbytes the development of "The System Bytes" | |
| storyline, saying "The original concept came from me. Every year we run a | |
| single annual for each of our main characters and, in recent years, we have | |
| established a theme story across a few titles. This is a relatively easy thing | |
| to do with the various SpiderMan titles or between the Avengers and the West | |
| Coast Avengers, but it's more difficult to do with these titles which are more | |
| or less orphans -- that is, they stand by themselves, particularly the | |
| Guardians of the Galaxy which is set 1,000 years in the future." | |
| Nicieza continued "We set this up as an escalating story, proceeding from a | |
| vigilante hero to a costumed hero with a cyborg involvement to a superhero to a | |
| science fiction story. In each case, the threat also escalates to become a | |
| real challenge to the Marvel hero or heroes that oppose it. It's really a very | |
| simple story line and we were able to give parameters to the writer and editor | |
| of each of the titles involved. You'll note that each of the titles has a | |
| different writer and editor yet I think you'll agree that the story line flows | |
| well between the stories. I'm quite frankly, very pleased with the outcome." | |
| _______________________________________________________________________________ | |
| Innovative Computer Disk Story Has A Short Shelf Life April 20, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Christopher John Farley (USA Today)(Page 2D) | |
| Science-fiction writer William Gibson's inquiry into the future has been | |
| stalled by a computer problem. | |
| "I work on an (Apple computer) and just got a very common virus called | |
| Garfield," says Gibson, award-winning author of such books as Neuromancer and | |
| Mona Lisa Overdrive. "I just bought an anti-virus program that's hunting it | |
| down. It's the first one I've ever gotten." | |
| The first week in May, Gibson will give as good as he gets. Gibson and artist | |
| Dennis Ashbaugh, known for his conceptual paintings of computer viruses, are | |
| releasing a coffee-table art book/computer disk/whatchamacallit, with a built- | |
| in virus that destroys the program after one reading. | |
| This will take some explaining. | |
| Agrippa (A Book of the Dead) comes in a case that resembles a lap-top computer. | |
| Inside are etchings by Ashbaugh, printed with an ink that gradually fades under | |
| light and another that gradually appears under light. There's also a tattered, | |
| old-looking book, with a hidden recess that holds a computer disk. | |
| The disk contains a story by Gibson about his father, who died when Gibson was | |
| 6. There are a few sound effects that accompany the text, including a gunshot | |
| and rainfall. The disk comes in Apple or IBM compatible versions. | |
| Gibson, known for his "cyberpunk" writing style that features tough characters, | |
| futuristic slang and a cynical outlook, shows a different side with the Agrippa | |
| story. "It's about living at the end of the 20th century and looking back on | |
| someone who was alive in its first couple of decades. It's a very personal, | |
| autobiographical piece of writing." | |
| The title Agrippa probably refers to the name of the publisher of an old family | |
| album Gibson found. It might also refer to the name of a famous ancient Roman | |
| family. The 44-year-old Gibson says it's open to interpretation. | |
| Agrippa will be released in three limited-edition forms of varying quality, | |
| priced at $7,500, $1,500 and $450. The highest-priced version has such extras | |
| as a cast-bronze case and original watercolor and charcoal art by Ashbaugh. | |
| The medium-priced version is housed in aluminum or steel; the lowest-priced | |
| version comes in cloth. | |
| The project cost between $ 50,000-$ 100,000 to mount, says publisher Kevin | |
| Begos Jr. Only 445 copies will be produced, and they'll be available at select | |
| bookstores and museums. | |
| But $ 7,500 for a story that self-destructs? | |
| Gibson counters that there's an egalitarian side to the project: There will be | |
| a one-time modem transmission of the story to museums and other venues in | |
| September. The text will be broadcast on computer monitors or televisions at | |
| receiving sites. Times and places are still being arranged; one participant | |
| will be the Department of Art at Florida State University in Tallahassee. | |
| Gibson and his cohorts aren't providing review copies -- the fact that the | |
| story exists only on a disk, in "cyberspace," is part of the Big Idea behind | |
| the venture, he says. | |
| Those dying to know more will have to: | |
| A. Pirate a copy; | |
| B. Attend a showing in September; or, | |
| C. Grit their teeth and buy Agrippa. | |
| _______________________________________________________________________________ | |
| PWN Quicknotes | |
| ~~~~~~~~~~~~~~ | |
| 1. Data Selling Probe Gets First Victim (Newsday, April 15, 1992, Page 16) -- A | |
| Chicago police detective has pleaded guilty to selling criminal histories | |
| and employment and earnings information swiped from federally protected | |
| computer files. | |
| William Lawrence Pedersen, age 45, admitted in U.S. District Court to | |
| selling information from the FBI's National Crime Information Center | |
| computer database and from the Social Security Administration to a Tampa | |
| information brokerage. | |
| Pedersen's sentencing is set for July 7. Though he faces up to 70 years in | |
| prison, his sentence could be much lighter under federal guidelines. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Related articles: | |
| Phrack World News, Issue 37, Part One: | |
| Indictments of "Information Brokers" January 1992 | |
| Taken from The Privacy Journal | |
| SSA, FBI Database Violations Prompt Security Evaluations January 13, 1992 | |
| By Kevin M. Baerson (Federal Computer Week)(Pages 1, 41) | |
| Phrack World News, Issue 38, Part Two: | |
| Private Social Security Data Sold to Information Brokers February 29, 1992 | |
| By R.A. Zaldivar (San Jose Mercury News) | |
| Phrack World News, Issue 39, Part Four: | |
| Privacy Invaders May 1992 | |
| By William Barnhill (AARP Bulletin) | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 2. NO WAY! Wayne's World, the hit comedy thats changed the way people speak | |
| arrives in video stores on August 12th and retailing for $24.95. The | |
| Paramount movie (about Wayne and Garth, the satellite moving computer | |
| hackers) already has earned a cool $110 million in theaters and is the | |
| year's top grossing film. Schwing! (USA Today, May 12, 1992, Page D1) | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 3. New Jersey Bell Did Not Charge For AT&T Calls (Trentonian, May 23, 1992) -- | |
| If the phone company gets its way, 28,000 customers in New Jersey will be | |
| billed for two months of long distance calls they dialed for free because of | |
| a computer glitch. | |
| A computer that recorded the time, number and cost of AT&T calls from | |
| February 17 to April 27 failed to put the data on the customers' bills, | |
| officials said. They were charged just for calls placed through New Jersey | |
| Bell, Karen Johnson, a Bell spokeswoman, said yesterday. | |
| But the free calls are over, Johnson said. Records of the calls are stored | |
| in computer memory banks, and the customers soon will be billed. | |
| New Jersey Bell must prove the mistake was not caused by negligence before | |
| the company can collect, according to a spokesman for the Board of | |
| Regulatory Commissioners, which oversees utilities. If Bell does not make a | |
| good case, the board could deny permission to bill for the calls, said | |
| George Dawson. | |
| The computer snafu affected about two million calls placed by customers in | |
| 15 exchanges in the 201 and 609 area codes, Johnson said. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 4. Witch Objectors? (USA Today, May 28, 1992, Page 3A) -- Two self-proclaimed | |
| witches asked Mount Diablo, California school officials to ban the | |
| children's story 'Hansel & Gretal' because it "teaches that it is all right | |
| to burn witches and steal their property," said Karlyn Straganana, high | |
| priestess of the Oak Haven Coven. "Witches don't eat children and we don't | |
| have long noses with warts and we don't wear conical hats," she said. | |
| _______________________________________________________________________________ | |
| 5. Girl, Age 13, Kidnaped By Her Computer! (Weekly World News, April 14, 1992) | |
| -- A desperate plea for help on a computer screen and a girl vanishing into | |
| thin air has everyone baffled --and a high-tech computer game is the prime | |
| suspect. | |
| Game creator and computer expert Christian Lambert believes a glitch in his | |
| game Mindbender might have caused a computer to swallow 13-year-old Patrice | |
| Toussaint into her computer. | |
| "Mindbender is only supposed to have eight levels," Lambert said. "But this | |
| one version somehow has an extra level. A level that is not supposed to be | |
| there! The only thing I can figure out now is that she's playing the ninth | |
| level --- inside the machine!" | |
| Lambert speculates that if she is in the computer, the only way out for her | |
| is if she wins the game. But it's difficult to know for sure how long it | |
| will take, Lambert said. | |
| "As long as her parents don't turn off the machine Patrice will be safe," he | |
| said. "The rest is up to her." | |
| _______________________________________________________________________________ | |