| ==Phrack Inc.== | |
| Volume Four, Issue Forty-One, File 13 of 13 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN Phrack World News PWN | |
| PWN PWN | |
| PWN Issue 41 / Part 3 of 3 PWN | |
| PWN PWN | |
| PWN Compiled by Datastream Cowboy PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Boy, 15, Arrested After 911 Paralyzed By Computer Hacker October 7, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Caroline Mallan (The Toronto Star)(Page A22) | |
| A 15-year-old boy has been arrested after a hacker pulling computer pranks | |
| paralyzed Metro's emergency 911 service. | |
| Police with Metro's major crime unit investigated the origin of countless calls | |
| placed to the 911 service from mid-July through last month. | |
| The calls were routed to emergency services in the Etobicoke area, said | |
| Detective Willie Johnston, who led the investigation. | |
| Phony medical emergency calls were reported and police, fire and ambulance | |
| crews were dispatched on false alarms. On one occasion, the computer hacker | |
| managed to tie up the entire 911 service in Metro -- making it unavailable for | |
| true emergencies. | |
| Police were not sure last night how long the system was shut down for but | |
| Johnston said the period was considerable. | |
| Staff Sergeant Mike Sale warned hackers that phony calls can be traced. | |
| "A criminal abuse of the 911 emergency system will result in a criminal | |
| investigation and will result in an arrest," Sale said, adding police had only | |
| been investigating this hacker for a few weeks before they came up with a | |
| suspect. | |
| Bell Canada investigators helped police to trace the origin of the calls and | |
| officers yesterday arrested a teen while he was in his Grade 11 class at a | |
| North York high school. | |
| Two computers were seized from the boy's home and will be sent to Ottawa to be | |
| analyzed. | |
| Johnston said police are concerned that other hackers may also be able to halt | |
| the 911 service, since the computer technology used was fairly basic, although | |
| the process of rerouting the calls from a home to the Etobicoke emergency lines | |
| was very complex. | |
| The calls went via computer modem through two separate phone systems in major | |
| U.S. cities before being sent back to Canada, Johnston explained. | |
| The suspect, who cannot be named under the Young Offenders Act, is charged with | |
| theft of telecommunications, 24 counts of mischief and 10 counts of conveying | |
| false messages. | |
| He was released from custody and will appear in North York youth court November | |
| 6, police said. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Police Say They've Got Hackers' Number October 8, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by John Deverell (The Toronto Star)(Page A8) | |
| Hackers, take note. Metro police and Ma Bell are going to get you. | |
| A young North York computer freak accused of launching 10 false medical alerts | |
| to 911 this summer may have learned -- the hard way -- that his telephone | |
| tricks weren't beating the pros. | |
| Police arrived with a search warrant at the home of the 15-year-old, arrested | |
| him and carted away his computer. | |
| He's charged with 10 counts of conveying false messages, 24 counts of mischief, | |
| and theft of telecommunications. | |
| Inspector Bill Holdridge, of 911 emergency services, said the false alarms in | |
| July and August never posed any technical problem to his switchboard but | |
| resulted in wild goose chases for the police, fire and ambulance services. | |
| "Those resources weren't available for real alarms, which could have been a | |
| serious problem," Holdridge said. | |
| The 911 service, quartered at 590 Jarvis Street, gets about 7,000 calls a day, | |
| of which 30% warrant some kind of emergency response. | |
| Normally, a computerized tracing system takes only seconds to provide the | |
| address and number of the telephone from which a call originates -- unless the | |
| point of origin has been somehow disguised. | |
| Apparently the 911 prankster got into the telephone system illegally and routed | |
| his calls through several U.S. networks before bringing them back to Toronto. | |
| Detective Willie Johnston said the boy's parents were stunned when police | |
| arrived. "They really didn't have a clue what was going on," said Johnston. | |
| The false emergencies reported were nowhere near the accused boy's home. | |
| "Without condoning it, you could understand it if he were sitting around the | |
| corner watching the flashing lights," said Johnston. "But they were miles | |
| away. It defies logic." | |
| Neither Johnston nor Holdridge would explain how they and Bell security finally | |
| traced the false alarms. "That might just make other hackers try to figure out | |
| another way," Holdridge said. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Hackers Targeted 911 Systems, Police Say October 10, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Taken from United Press International | |
| Authorities expect to make more arrests after penetrating a loose network of | |
| computer hackers called the "Legion of Doom" they say tapped into corporate | |
| phone lines to call 911 systems nationwide with the intent of disrupting | |
| emergency services. | |
| Prosecutors from Virginia, New Jersey and Maryland -- in conjunction with | |
| investigators from two telephone companies -- traced some of the hackers and | |
| closed in on three homes in two states. | |
| A 23-year-old Newark, New Jersey man was arrested early on October 9th. He | |
| faces several charges, including fraud. Other arrests are expected in two | |
| Maryland locations. | |
| The suspect, known by several aliases and identified by authorities only as | |
| Maverick, told investigators the group's intent was "to attempt to penetrate | |
| the 911 computer systems and infect them with viruses to cause havoc," said | |
| Captain James Bourque of the Chesterfield County police in Virginia. | |
| The probe is just beginning, according to Bourque. "Quite honestly, I think | |
| it's only the tip of the iceberg," he said. | |
| The hackers first penetrate the phone lines of large companies or pay phones, | |
| then use those connections to call 911 lines, Bourque said. The hackers | |
| usually make conference calls to other 911 services in other cities, tying up | |
| communications in several locations simultaneously. | |
| "One time we were linked up with Toronto and Los Angeles jurisdictions," | |
| Bourque said. "And none of us could disconnect." | |
| Sometimes as many five hackers would be on the line and would make false calls | |
| for help. Communications officers, unable to stop the calls, would have to | |
| listen, then try to persuade the officers in other locales "that the call | |
| wasn't real," Bourque said. | |
| "Obviously, there's a real potential for disastrous consequences," he said. | |
| One phone bill charged to a company in Minnesota indicated the scope of the | |
| problem. The company discovered in a 30-day period that it had been charged | |
| with more than $100,000 in phone calls generated by the hackers, according to | |
| Bourque. | |
| "I'm sure there are a multitude of other jurisdictions across the country | |
| having the same problems," Bourque said. | |
| People identifying themselves as members of the "Legion of Doom" -- which also | |
| is the name of a pro wresting team -- have called a Richmond, Virginia | |
| television station and ABC in New York in an attempt to get publicity, Bourque | |
| said. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| More On 911 "Legion Of Doom" Hacking Case October 20, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Barbara E. McMullen & John F. McMullen (Newsbytes) | |
| NEW YORK CITY -- In a discussion with Newsbytes, Sgt. Kurt Leonard of the | |
| Chesterfield County, Virginia Police Department has disclosed further | |
| information concerning the on-going investigation of alleged 911 disruption | |
| throughout the eastern seaboard of the United States by individuals purporting | |
| to be members of the hacker group "The Legion of Doom" (LOD). | |
| Leonard identified the individual arrested in Newark, New Jersey, previously | |
| referred to only as "Maverick," as Scott Maverick, 23. Maverick has been | |
| charged with terroristic threats, obstruction of a government function, and | |
| illegal access to a computer. He is presently out on bail. | |
| Leonard said that David Pluchino, 22, was charged to the same counts as | |
| Maverick and an additional count of the possession of burglary tools. Leonard | |
| said that Pluchino, the subject of a 1990 Secret Service "search and seizure" | |
| action under the still on-going "Operation SunDevil" investigation," possessed | |
| information linking him with members of the Legion of Doom. | |
| The Legion of Doom connection has become the subject of controversy within the | |
| online community. Although Maverick has been quoted as saying that he is a | |
| member of the group and that the group's intent was "to attempt to penetrate | |
| the 911 computer systems and inflect them with viruses to cause havoc," members | |
| of the group have disavowed any connection with those arrested. | |
| "Lex Luthor," one of the original members of the group, told Newsbytes when the | |
| initial report of the arrests became public: "As far as I am concerned the LOD | |
| has been dead for a couple of years, never to be revived. Maverick was never | |
| in LOD. There have been 2 lists of members (one in Phrack and another in the | |
| LOD tj) and those lists are the final word on membership." | |
| He added, "We obviously cannot prevent copy-cats from saying they are in LOD. | |
| When there was an LOD, our goals were to explore and leave systems as we found | |
| them. The goals were to expose security flaws so they could be fixed before | |
| REAL criminals and vandals such as this Maverick character could do damage. If | |
| this Maverick character did indeed disrupt E911 service he should be not only | |
| be charged with computer trespassing but also attempted murder. 911 is serious | |
| business." | |
| Lex Luthor's comments, made before the names of the arrested were released, | |
| were echoed by Chris Goggans, aka "Erik Bloodaxe," and Mark Abene, aka "Phiber | |
| Optik," both ex-LOD members, and by Craig Neidorf who chronicled the membership | |
| of LOD in his electronic publication "Phrack." | |
| When the names of the arrested became public, Newsbytes again contacted Lex | |
| Luthor to see if the names were familiar. Luthor replied: "Can't add anything, | |
| I never heard of them." | |
| Phiber Optik, a New York resident, told Newsbytes that he remembered Pluchino | |
| as a person that ran a computer "chat" system called "Interchat" based in New | |
| Jersey. "They never were LOD members and Pluchino was not known as a computer | |
| hacker. It sounds as though they were LOD wanabees who are now, by going to | |
| jail, going to get the attention they desire," he said. | |
| A law enforcement official, familiar with the SunDevil investigation of | |
| Pluchino, agreed with Phiber, saying, "There was no indication of any | |
| connection with the Legion of Doom." The official, speaking under the | |
| condition of anonymity, also told Newsbytes that the SunDevil investigation of | |
| Pluchino is still proceeding and, as such, no comment can be made. | |
| Leonard also told Newsbytes that the investigation has been a joint effort of | |
| New Jersey, Maryland, and Virginia police departments and said that, in | |
| conjunction with the October 9th 2:00 AM arrests of Pluchino and Maverick, a | |
| simultaneous "search and seizure" operation was carried out at the Hanover, | |
| Maryland home of Zohar Shif, aka "Zeke," a 23 year-old who had also been the | |
| subject of a SunDevil search and seizure. | |
| Leonard also said that, in addition to computers taken from Pluchino, material | |
| was found "establishing a link to the Legion of Doom." Told of the comments by | |
| LOD members that the group did not exist anymore, Leonard said "While the | |
| original members may have gone on to other things, these people say they are | |
| the LOD and some of them have direct connection to LOD members and have LOD | |
| materials." | |
| Asked by Newsbytes to comment on Leonard's comments, Phiber Optik said "The | |
| material he's referring to is probably text files that have been floating | |
| around BBS's for years, Just because someone has downloaded the files certainly | |
| doesn't mean that they are or ever were connected with LOD." | |
| _______________________________________________________________________________ | |
| Complaints On Toll Fraud Aired at FCC En Banc Hearing October 13, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Art Brodsky (Communications Daily)(Page 1) | |
| Customers of PBX manufacturers told the Federal Communications Commission (FCC) | |
| they shouldn't be liable for toll fraud losses incurred because vendors never | |
| told them of capabilities of their equipment that left companies open to | |
| electronic theft. Their case was buttressed by one of country's leading toll- | |
| fraud investigators, who told day-long en banc hearing that customers shouldn't | |
| have to pay if they're victimized. Donald Delaney of the New York State Police | |
| said toll fraud "is the only crime I know where the victims are held liable." | |
| Toll fraud losses have been estimated to run into billions of dollars. | |
| Commission's look at toll fraud came in context of what FCC can do to prevent | |
| or lessen problem. Comr. Marshall said Commission's job would be to apportion | |
| liability between vendors and customers. Comr. Duggan, who has been leader on | |
| issue at Commission, said toll fraud was "hidden degenerative disease on the | |
| body of business." He focused on insurance solution to problem, along with | |
| sharing of liability. There are cases pending at FCC filed by AT&T customers | |
| that deal with sharing of liability, and whether common carriers are protected | |
| by tariffs from paying customers for losses. Witnesses told Commission it was | |
| hard to find any law enforcement agency interested in problem, from local | |
| police to FBI, in addition to difficulties with vendors. U.S. Secret Service | |
| has statutory responsibility over toll fraud, said attorney William Cook, who | |
| testified in afternoon session. There was general agreement that more customer | |
| education was needed to prevent fraud, policy endorsed by Northern Telecom, | |
| which has active customer education program. | |
| AT&T came in for particular criticism in morning session as users said company | |
| was insensitive to toll fraud problems. Thomas Mara, executive vice-president | |
| Leucadia National Corp., whose company suffered $300,000 in toll fraud, said he | |
| "had a hell of a time getting anybody at AT&T to pay attention" to problems his | |
| company was encountering. Mara said his company saw level of 800 calls rise to | |
| 10,448 from 100. He said AT&T was supposed to notify users if there was any | |
| "dramatic increase in volume, yet we were not notified of a thousandfold | |
| increase in 800 number usage nor were we informed of an increase from a few | |
| hours a month in international calls to thousands of hours by AT&T, only after | |
| receiving our bills." Investigation found that 800 number connecting Rolm | |
| switch to company's voice mail was hackers' entry method, Mara said. | |
| Clearly angry with AT&T, Mara said he has "a feeling they use it as a profit | |
| center." Lawrence Gessini, telecommunications director for Agway Corp. of | |
| Syracuse, agreed, saying: "Toll fraud should not become a rationale for higher | |
| profits for carriers." He told FCC that new programs introduced by long | |
| distance carriers won't solve problem because of constraints, limitations and | |
| expense. | |
| Speaking for International Communications Association (ICA) user group, Gessini | |
| said problems occur because new technologies allow more types of fraud and | |
| because "old tariff concepts" that limit common carrier liability "distort | |
| market incentives." Vendors, he said, are "generally lackadaisical and are | |
| slow to correct even known problems in their hardware, firmware and software," | |
| and give low priority to complaints. ICA advocated 5 principles including FCC | |
| inquiry into fraud, creation of advisory committee and willingness of | |
| Commission to protect users. | |
| Geoffrey Williams, industry consultant and telecommunications manager for | |
| IOMEGA Corp., said AT&T has been "most notable" for asking for restitution, | |
| while Sprint and MCI are more lenient. MCI doesn't charge users for first | |
| hacking incident, he said, but after that users are on their own. | |
| AT&T defended itself in afternoon session, when International Collections Dist. | |
| Manager Peter Coulter rejected users' accusations, saying company had increased | |
| customer education program "dramatically" since last year. He insisted that | |
| AT&T is "very concerned" by toll fraud: "Contrary to what some people want to | |
| believe, no long distance carrier is making a profit off toll fraud." He said | |
| AT&T had 6,000 customers attend equipment security seminars in 1991, but that | |
| number had been exceeded in first 6 months of 1992. He said results of | |
| increased education program were "only preliminary" but his group was receiving | |
| "a lot more accommodations" than complaints from customers. | |
| Coulter, while never admitting that company should shoulder any financial | |
| liability, admitted that "things are different now" as to how AT&T approaches | |
| toll fraud problem. He said that within AT&T it used to be hardware division | |
| vs. service division. "The hardware guys said it was a service problem, the | |
| service guys said it was the hardware's fault," Coulter said. But now both | |
| divisions are "working together on the problem . . . we're talking to each | |
| other." | |
| Delaney of N.Y. state police gave the FCC a picture of the toll fraud situation | |
| dominated by as few as 15 practitioners, most of whom gain illegal entry to | |
| telephone systems simply by dialing numbers for hours on end. Those so-called | |
| "finger hackers," rather than computer hackers, are responsible for 90% of | |
| fraud, he said, telling Commission that equipment vendors should be held | |
| accountable for fraud. Most fraudulent calls go to Pakistan, Colombia and | |
| Dominican Republic, he said. | |
| Delaney pointed out practical objection to further vendor education problem, | |
| telling commissioners that for vendor to engage in education would also be to | |
| admit there could be problem with equipment security, something sales people | |
| don't want to do. He said some customers had been sold systems and didn't know | |
| they had capability for remote access -- means used by hackers to gain entry. | |
| _______________________________________________________________________________ | |
| Hanging Up On Hackers October 12, 1992 | |
| ~~~~~~~~~~~~~~~~~~~~~ | |
| by Miriam Leuchter (Crain's New York Business)(Page 21) | |
| "Thieves tap phone systems, but business cuts the line." | |
| Ron Hanley suspected a technical glitch when his company's telephone bill | |
| listed an unusually large number of calls lasting four seconds to its 800- | |
| number from New York City. But the executive at Dataproducts New England in | |
| Wallingford, Connecticut didn't lose sleep over the problem -- until he got a | |
| call two months later from the security department at American Telephone & | |
| Telegraph Co. | |
| Dataproducts had been hacked. Two days after that, Mr. Hanley got a bill | |
| confirming the bad news: In one 24-hour period, street-corner phone users in | |
| New York had made some 2,000 calls to the Caribbean on the company's line, | |
| ringing up about $50,000 in tolls. | |
| Dataproducts is not alone. Estimates of the cost of telecommunications fraud | |
| in the United States each year run from $1 billion to as much as $9 billion. | |
| According to John J. Haugh, editor of Toll Fraud and Telabuse and chairman of a | |
| Portland, Oregon consulting firm, losses reached $4 billion in 1991 and are | |
| expected to climb 30% in 1992. | |
| Some 35,000 businesses and other users -- such as foundations and government | |
| agencies -- will be hit this year. In the first six months, Mr. Haugh says, | |
| more than 900 New York City companies were victims of telephone-related fraud. | |
| "If you have a PBX system or calling cards or voice mail, you are vulnerable, | |
| exceedingly vulnerable," says Peggy Snyder, executive director of the | |
| Communications Fraud Control Association, a national information clearinghouse | |
| based in Washington. "As technology gets more user-friendly, the opportunity | |
| to commit a crime is much greater." | |
| Armed with computers, modems and sometimes automatic dialers or random-number | |
| generating software, high-technology thieves can use your telephone system as | |
| if it is their own -- without having to pay the tolls. The series of very | |
| short calls Mr. Hanley spotted on one phone bill should have tipped off his | |
| 800-number service provider -- which he had alerted when he spotted the pattern | |
| -- that hackers were trying to break into his system. | |
| Who are these hackers -- a term used to describe someone who uses a telephone | |
| or computer to obtain unauthorized access to other computers? Many are | |
| teenagers or young adults out to demonstrate their computer skills and make | |
| some mischief. Five young New Yorkers are awaiting trial in federal court on | |
| unauthorized access and interception of electronic communications charges in | |
| one widely publicized telephone fraud case. | |
| A much smaller proportion are more serious criminals: drug dealers, money | |
| launderers and the like, who don't want their calls traced. In one case, Ms. | |
| Snyder cites a prostitution ring that employed unused voice mail extensions at | |
| one company to leave and receive messages from clients. | |
| Many hackers have connections to call-sell operators who set up shop at phone | |
| booths, primarily in poorer immigrant neighborhoods in cities from New York to | |
| Los Angeles. For a flat fee -- the going rate is $10, according to one source | |
| -- callers can phone anywhere in the world and talk as long as they want. The | |
| hawker at the phone booth pockets the cash and someone else pays the bill. | |
| Perhaps 15 to 20 so-called finger hackers (who crack authorization codes by | |
| hand dialing) distribute information to call-sell operators at thousands of | |
| locations in New York. According to Don Delaney, a senior investigator for the | |
| New York State Police, the bulk of such calls from phone booths in the city go | |
| to the Dominican Republic, Pakistan and Colombia. | |
| Hackers may use more than technical skill to gain the access they want. | |
| Sometimes they practice "social engineering" -- talking a company's employees | |
| into divulging information about the telephone system. Or they manage a | |
| credible imitation of an employee, pretending to be an employee. | |
| In one of the latest schemes, a fraudulent caller gets into a company's system | |
| and asks the switchboard operator to connect him with an outside operator. The | |
| switchboard assumes the caller is an employee who wants to make a personal call | |
| on his own calling card. | |
| Instead, he uses a stolen or hacked calling card number. The fraud goes | |
| undetected until the card's owner reports the unauthorized use to his long- | |
| distance carrier. If the cardholder refuses to pay the charges, the phone | |
| company traces the calls to the business from which they were placed. Because | |
| it looks as if the call came from the company, it is often held liable for the | |
| charge. | |
| In another new twist, a hacker gains access to an unused voice mail extension | |
| at a company, or takes over someone's line at night or while the regular user | |
| is on vacation. He changes the recorded announcement to say, "Operator, this | |
| number will accept all collect and third-party calls." Then the hacker -- or | |
| anyone else -- can telephone anywhere in the world and bill the charges to that | |
| extension. | |
| Sometimes the fraud is much more organized and sophisticated, however. Robert | |
| Rasor, special agent in charge of the financial crime division of the U.S. | |
| Secret Service, gives an example of a three-way calling scheme in which hackers | |
| tap into a phone system in the United States and set up a separate network that | |
| allows people in other countries to call each other directly. "The | |
| Palestinians are one of the more prominent groups" running these sorts of | |
| fraud, he says. | |
| But no matter who the end user is, businesses like Dataproducts end up footing | |
| the bill. Personal users are generally not held liable for the unauthorized | |
| use of their calling card numbers. Under current regulation, a business is | |
| responsible for all calls that go through its equipment, whether or not those | |
| calls originated at the company. | |
| This hard fact rankles Mr. Hanley. "It's totally frustrating and almost | |
| unbelievable that you're responsible for this bill. It's really frightening | |
| for any company." | |
| Dataproducts's liability was relatively small compared with the $168,000 | |
| average Mr. Haugh calculated in a study he made last year. It could have been | |
| worse yet. | |
| "The largest case I've ever seen in the metropolitan region was a company that | |
| lost almost $1 million within 30 days," says Alan Brill, managing director of | |
| the New York corporate security firm Kroll Associates Inc. | |
| "It was a double whammy, because even though their long-distance carrier saw a | |
| suspicious pattern of calls and blocked access to those area codes, the company | |
| didn't know its PBX system would automatically switch to another carrier if | |
| calls couldn't go through," Mr. Brill says. "So the company got a bill for | |
| $300,000 from its primary carrier and a $600,000 bill from the secondary | |
| carrier." | |
| Both AT&T and Sprint Corp. offer service plans that limit liability to $25,000 | |
| per fraud episode for their business customers. Mr. Brill advises companies to | |
| evaluate the cost-effectiveness of these plans in great detail, because in | |
| order to be eligible for coverage companies must take certain steps to minimize | |
| their risk. "If you reduce your risk significantly, you may not need the | |
| coverage," he says. | |
| The plans require customers to respond to a problem in as little as two hours | |
| after notification of unauthorized calls. Doing so will stem your losses in | |
| any event. "You also have to think about how you're staffed," adds Mr. Brill. | |
| "Can you act that fast?" | |
| _______________________________________________________________________________ | |
| PWN Quicknotes | |
| ~~~~~~~~~~~~~~ | |
| 1. HACKER PARTY BUSTED (by Robert Burg, Gannett, 11/3/92) -- "PumpCon Popped!" | |
| -- WHITE PLAINS, New York -- Police say a Halloween party they broke up | |
| Sunday (11/1/92) was more than just a rowdy party - it also was a computer | |
| hacker party. | |
| Three men were charged with unauthorized use of a computer and attempting | |
| computer trespass. A fourth man was arrested on an outstanding warrant | |
| involving violating probation on a charge of computer fraud in Arizona, | |
| Greenburgh Detective Lt. Cornelius Sullivan said. | |
| Security officers at the Westchester Marriott contacted police after | |
| noticing an unusual number of people entering and leaving one room. Police | |
| said that when they arrived, there were 21 people inside and computers | |
| hooked up to telephone lines. Police said they also found telephone credit | |
| cards that did not belong to any of the people present. | |
| The three charged with unauthorized use of a computer and attempted | |
| computer trespass were Randy Sigman, 40, of Newington, Connecticut; Ronald | |
| G. Pinz, 21, of Wallingford, Connecticut and Byron Woodard, 18, of | |
| Woonsocket, Rhode Island. | |
| They were being held at the Westchester County Jail in Valhalla pending | |
| arraignment. | |
| The man charged on the warrant, Jason Brittain, 22, of Tucson, Arizona, was | |
| being held without bail pending arraignment. | |
| The Westchester County District Attorney frauds division seized the | |
| computer hardware, software, and other electrical equipment. | |
| Sullivan said the party-goers heard about the party through computer | |
| bulletin boards. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 2. COMPUTER ACCESS ARRESTS IN NEW YORK (Barbara E. McMullen & John F. | |
| McMullen, Newsbytes, 11/3/92) -- GREENBURGH, NEW YORK -- The Greenburgh, | |
| New York Police Department has announced the arrest of three individuals, | |
| Randy P. Sigman, 40; Ronald G. Pinz, Jr, 21; and Byron J. Woodard, 18 for | |
| the alleged crimes of Unauthorized Use Of A Computer and Attempted Computer | |
| Trespass, both misdemeanors. Also arrested was Jason A. Brittain, 22 in | |
| satisfaction of a State of Arizona Fugitive From Justice warrant. | |
| The arrests took place in the midst of an "OctoberCon" or "PumpCon" party | |
| billed as a "hacker get-together" at the Marriott Courtyard Hotel in | |
| Greenburgh. The arrests were made at approximately 4:00 AM on Sunday | |
| morning, November 1st. The three defendants arrested for computer crimes | |
| were granted $1,000 bail and will be arraigned on Friday, November 6th. | |
| Newsbytes sources said that the get together, which had attracted up to | |
| sixty people, had dwindled to approximately twenty-five when, at 10:00 | |
| Saturday night, the police, in response to noise complaints arrived and | |
| allegedly found computers in use accessing systems over telephone lines. | |
| The police held the twenty-five for questioning and called in Westchester | |
| County Assistant District Attorney Kenneth Citarella, a prosecutor versed | |
| in computer crime, for assistance. During the questioning period, the | |
| information on Brittain as a fugitive from Arizona was obtained and at 4:00 | |
| the three alleged criminal trespassers and Brittain were charged. | |
| Both Lt. DeCarlo of the Greenburgh police and Citarella told Newsbytes | |
| that the investigation is continuing and that no further information is | |
| available at this time. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 3. U.S. PRISON SENTENCE FOR COMPUTER HACKER (New York Law Journal, 10/15/92, | |
| Page 7) -- A Brooklyn man was sentenced yesterday to eight months in prison | |
| for buying passwords from a computer hacker group known as the "masters of | |
| deception" [MOD] for resale to others seeking access to confidential credit | |
| reports. | |
| Morton Rosenfeld, 21, received the sentence in federal court in Manhattan | |
| after pleading guilty in June to obtaining the unauthorized access devices | |
| to computer data bases operated by TRW Information Services and other | |
| credit reporting companies. | |
| The sentence, imposed by Southern District Judge Shirley Wohl Kram, is | |
| believed to be among few prison terms levied for computer-related offenses. | |
| Meanwhile, charges are pending against Mr. Rosenfeld's alleged source: the | |
| five members of the masters of deception, young men in their teens and | |
| 20's. The five were accused in July of breaking into computer systems run | |
| by credit reporting services, telephone companies and educational | |
| institutions. | |
| For more information about the indictment and case against MOD, see ALL the | |
| articles in PWN 40-2. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 4. 2ND ONLINE LEGAL GUIDE RELEASED (by Barbara E. McMullen & John F. McMullen, | |
| Newsbytes, 10/13/92) -- NEW YORK CITY -- PC Information Group has announced | |
| the release of SysLaw, Second Edition: The Legal Guide for Online Service | |
| Providers by attorneys Lance Rose and Jonathan Wallace. | |
| According to the company, "Syslaw provides BBS sysops, network moderators | |
| and other online service providers with basic information on their rights | |
| and responsibilities, in a form that non-lawyers can easily understand." | |
| Subjects covered by the book include the First Amendment, copyrights and | |
| trademarks, the user agreement, negligence, privacy, criminal law, searches | |
| and seizures, viruses and adult materials. The company claims that SysLaw | |
| not only explains the laws, but that it gives detailed advice enabling | |
| system operators to create the desired balance of user services, freedom, | |
| and protection from risk on their systems." | |
| Co-author Lance Rose told Newsbytes: "In the four years since the | |
| publication of the first edition, the electronic community has become | |
| alerted to the first amendment dimensions of the on-line community." | |
| "The first amendment has profound implications to the on-line community | |
| both to liberate providers and users of on-line systems and to protect them | |
| from undue legal harassment. There has, in the last few years, been a lot | |
| of law enforcement activity effecting bulletin board systems, including the | |
| Steve Jackson and Craig Neidorf/Phrack cases," he said. | |
| Rose continued, "The new edition incorporates these new developments as | |
| well as containing new information concerning on-line property rights, user | |
| agreements, sysop liabilities, viruses and adult material contained on | |
| online systems." | |
| SysLaw is available from PC Information Group, 1126 East Broadway, Winona, | |
| MN 55987 (800-321-8285 or 507-452-2824) at a price of $34.95 plus $3.00 | |
| shipping and (if applicable) sales tax. | |
| Press Contact: Brian Blackledge, PC Information Group, 800-321-8285 | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 5. YET ANOTHER BOOK ABOUT THE COMPUTER UNDERGROUND (The Daily Telegraph, | |
| 12/14/92, Page 25) -- Approaching Zero: Data Crime and the Computer | |
| Underworld by Bryan Clough and Paul Mungo (Faber & Faber, L14.99) -- A look | |
| at the world of Fry Guy, Control C, Captain Zap and other hackers to blame | |
| for the viruses, logic bombs and Trojan horses in the world's personal | |
| computer networks. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 6. HONOR STUDENT NABBED IN COMPUTER FRAUD (The Washington Times, 11/9/92, Page | |
| A6) -- BROOKSVILLE, FLA.-- Three high school honor students have been | |
| accused of stealing tens of thousands of dollars worth of long-distance | |
| calls as computer hackers. | |
| Brian McGrogan, 16, and Edmund Padgett, 17, who were charged as adults, and | |
| a 15-year-old allegedly tapped private telephone systems and dialed into an | |
| international hacking network. One company's loss was $36,000. | |
| "These are very sharp, intelligent kids," Hernando County sheriff's Captain | |
| Richard Nugent said after the arrests. "It's a game to them. It's a | |
| sport." | |
| Some calls were made to computer bulletin boards in the United Kingdom, | |
| Germany and Canada, where a loose network of hackers allegedly shared | |
| information about how to obtain computer data and access information. | |
| Arrests in the case also were made in New York and Virginia, Captain Nugent | |
| said. | |
| The two older boys were booked on charges of organized fraud and violation | |
| of intellectual property. The third boy was released to his parents. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 7. A CORDLESS PHONE THAT CAN THWART EAVESDROPPERS (Business Week, 8/3/92) -- | |
| To industrial spies and other snoops, the millions of cordless phones in | |
| use are goldmines of information. Conversations can be plucked out of the | |
| air by means of a police type scanner, and with increasing ease. The | |
| latest no-cord technologies offers clearer sound and longer ranges -- up to | |
| half a mile. That's because the new phones broadcast signals at 900 MHz, | |
| or 20 times the frequency of current models. | |
| Cincinnati Microwave, Inc. (the radar detector people) figures executives | |
| and consumers will pay a small premium for cordless privacy. The company | |
| has developed a phone, to be marketed in October by its Escort division for | |
| about $300, that thwarts eavesdroppers with "spread spectrum" technology, | |
| which is similar to the encryption method that the military uses in secure | |
| radios. The signals between the handset and base unit are digitized, | |
| making them unintelligible to humans, and the transmission randomly hops | |
| among various frequencies within the 900 MHz spectrum. To keep the cost | |
| down to the range of other 900 MHz models, Cincinnati Microwave has | |
| developed special microchips that keep the handset and base in sync. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 8. NEW AREA CODE -- As of November 1, 1992, a new 210 area code is serving 152 | |
| communities in the San Antonio and Rio Grande Valley areas. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 9. FOR SALE: PHONE-PHREAKING TOOLS (Brigid McMenamin, Forbes, 8/3/92, Page 64) | |
| -- From his remote outpost in Alamogordo, New Mexico, John Williams makes a | |
| nice living telling hackers how to rip off phone and computer systems. | |
| Williams says he brings in about $200,000 a year publishing books on | |
| everything from credit card scams and cracking automated teller machines to | |
| electronic shoplifting, cellular phone phreaking and voice mailbox hacking, | |
| each costing $29 to $39, and each complete with precise instructions. He | |
| even sells Robofones, which save hackers from doing a lot of dialing while | |
| they steal access codes. | |
| Isn't what he does illegal? Perhaps it should be, but it isn't. Wrapping | |
| himself in the First Amendment, Williams is a member in good standing of | |
| the Alamogordo Chamber of Commerce and the New Mexico Better Business | |
| Bureau. He thumbs his nose at companies and authorities that would like to | |
| make him stop selling such secrets. "We don't promote fraud," he insists. | |
| "It's all sold for educational purposes only. If we didn't publish the | |
| information, it would still be out there." | |
| But last year Williams got a visit form the Secret Service, which was | |
| following up on a telephone fraud case in which one of his publications | |
| figured prominently. | |
| In Gainsville, Florida, in November 1990, two young men were locked up by | |
| police for hacking into voice-mail systems and then making calls to 900 | |
| numbers. One of the pair, known as the Shark, then 20, confessed to the | |
| crime, but said he was on assignment for Williams' Consumertronics | |
| publication. The culprits could have been given five years on the fraud | |
| charge alone. But the victim didn't want any publicity, so the state let | |
| them do 50 hours of community service instead. | |
| The Secret Service went to talk to Williams. Williams assured agent James | |
| Pollard that he'd never told the Shark to do anything illegal. | |
| Nevertheless, says Williams, the agent implied that Williams and members of | |
| his family who work for him might be prosecuted for publishing voice-mail | |
| access codes. | |
| In the end, no charges were filed against Williams, who admits he has a | |
| thing against big business, especially the phone companies. "For decades, | |
| they financed right-wing regimes in Latin America," he rants. | |
| It's a crazy world, that of the telephone toll fraudsters. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 10. NEW YORK STATE POLICE DECRIMINALIZE THE WORD "HACKER" (Barbara E. McMullen | |
| & John F. McMullen, Newsbytes, 10/21/92) -- ALBANY, NEW YORK -- Senior | |
| investigator Ron Stevens of the New York State Police Computer Unit has | |
| told Newsbytes that it will be the practice of his unit to avoid the use of | |
| the term "hacker" in describing those alleged to have committed computer | |
| crimes. | |
| Stevens told Newsbytes, "We use the term computer criminal to describe | |
| those who break the law using computers. While the lay person may have | |
| come to understand the meaning of hacker as a computer criminal, the term | |
| isn't accurate. The people in the early days of the computer industry | |
| considered themselves hackers and they made the computer what it is today. | |
| There are those today who consider themselves hackers and do not commit | |
| illegal acts." | |
| Stevens had made similar comments in a recent conversation with Albany BBS | |
| operator Marty Winter. Winter told Newsbytes, "'Hacker' is, unfortunately | |
| an example of the media taking what used to be an honorable term, and using | |
| it to describe an activity because they (the media) are too lazy or stupid | |
| to come up with something else. Who knows, maybe one day 'computer | |
| delinquent' WILL be used, but I sure ain't gonna hold my breath." | |
| Stevens, together with investigator Dick Lynch and senior investigator | |
| Donald Delaney, attended the March 1992 Computers, Freedom and Privacy | |
| Conference (CFP-2) in Washington, DC and met such industry figures as Glenn | |
| Tenney, congressional candidate and chairman of the WELL's annual "Hacker | |
| Conference"; Craig Neidorf, founding editor and publisher of Phrack; Steven | |
| Levy, author of "Hackers" and the recently published "Artificial Life"; | |
| Bruce Sterling, author of the recently published "The Hacker Crackdown"; | |
| Emmanuel Goldstein, editor and publisher of 2600: The Hacker Quarterly" and | |
| a number of well-known "hackers." | |
| Stevens said, "When I came home, I read as much of the literature about the | |
| subject that I could and came to the conclusion that a hacker is not | |
| necessarily a computer criminal." | |
| The use of the term "hacker" to describe those alleged to have committed | |
| computer crimes has long been an irritant to many in the online community. | |
| When the July 8th federal indictment of 5 New York City individuals | |
| contained the definition of computer hacker as "someone who uses a computer | |
| or a telephone to obtain unauthorized access to other computers," there was | |
| an outcry on such electronic conferencing system as the WELL (Whole Earth | |
| 'Lectronic Link). Many of the same people reacted quite favorably to the | |
| Stevens statement when it was posted on the WELL. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| 11. STEVE JACKSON GAMES TRIAL DATE SET -- Mike Godwin, General Counsel for the | |
| Electronic Frontier Foundation, announced on December 23rd that the case | |
| of Steve Jackson Games, et.al. v. The United States Secret Service et. al. | |
| will go to trial in Austin, Texas on Tuesday, January 19, 1993. | |
| _______________________________________________________________________________ | |