| ==Phrack Magazine== | |
| Volume Four, Issue Forty-Four, File 27 of 27 | |
| PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN | |
| PWN PWN | |
| PWN Phrack World News PWN | |
| PWN PWN | |
| PWN Compiled by Datastream Cowboy PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Feds Pull The Plug On Phiber Optik November 4, 1993 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Joshua Quitner (Newsday) (Page 57) | |
| The biggest case of computer intrusion in US history drew to a close yesterday | |
| when a young Elmhurst, Queens, man was sentenced to a year and a day in jail | |
| for his part in an electronic gang that, for years, roamed the nation's | |
| largest telephone and data networks. | |
| Mark Abene, 21, renowned in the digital underground as Phiber Optik, was the | |
| last of five young New York City men to plead guilty in federal court to one | |
| felony count of conspiracy for being in a hacker group known as MOD. | |
| Abene apologized for his deeds yesterday. "I'm just sorry they were | |
| misconstrued as malicious in any way," he said in Manhattan's federal | |
| district court. | |
| Prosecutors claimed that the young men rumbled on computer networks, | |
| disconnecting other hackers' phone service and posting embarrassing | |
| information culled from confidential credit networks like TRW on | |
| underground bulletin boards. They also used their power skills to get | |
| telephone numbers or credit reports for celebrities, including Julia | |
| Roberts, John Gotti, Geraldo Rivera, Christina Applegate and Mad Magazine | |
| founder William Gaines. | |
| John Lee, 22, a co-defendant is now serving a one year sentence in a | |
| "shock incarceration" boot camp in Lewisburg, PA. Lee and Julio Fernandez, | |
| 18, were the only gang members who made money from the two years of | |
| break-ins. | |
| In addition to Lee and Fernandez, Paul Stira, 23, of Cambria Heights, | |
| Queens, and Elias Ladopoulos, 24, of Jamaica, Queens, are serving six-month | |
| sentences in federal prisons in Pennsylvania. Fernandez has been cooperating | |
| with authorities and is not expected to be jailed. | |
| ------------------------------------------------------------------------------- | |
| Computer Caper Is Unpluged | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~ October 1, 1993 | |
| by Tim Bryant (St. Louis Dispatch) (Page A1) | |
| Investigators said 18-year-old computer hacker Paul J. Gray of Creve Coeur, | |
| MO, was arrested on a state charge of tampering with computer data, a | |
| misdemeanor. The college freshman reportedly used his home computer to | |
| spy electronically on files of a federal appeals court and charge | |
| long-distance telephone calls to Mercantile Bank | |
| ------------------------------------------------------------------------------- | |
| Teen Hacker Admits Having Illegal Credit Information June 17, 1993 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by James McClear (Detroit News) (Page B7) | |
| Ander Monson, 18, of Houghton, MI, whose electronic misadventures uploaded | |
| him into the high-tech world of computer fraud, pleaded guilty in Oakland | |
| County Probate Court to illegal possession of credit card information. | |
| ------------------------------------------------------------------------------- | |
| In The Jungle Of MUD September 13, 1993 | |
| ~~~~~~~~~~~~~~~~~~~~ | |
| by Ellen Germain (Time) (Page 61) | |
| Virtual worlds you can hook into--and get hooked on--are the latest | |
| rage on the computer networks. | |
| [Ah, yes, Virtual Reality as perceived through the minds of the computer | |
| illiterate. But wait, it's electronic crack! Keep an eye out for your | |
| children!] | |
| ------------------------------------------------------------------------------- | |
| NCIC Abuse - Is Legislation The Answer October, 1993 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Brian Miller | |
| Confidential information is being illegally released from the National | |
| Crime Information Center network. But abuse of the system is difficult | |
| to detect, and those caught are seldom punished. | |
| A former law enforcement officer tracked town his ex-girlfriend with | |
| information from an FBI-run law enforcement information system. Then | |
| he killed her. | |
| A terminal operator in Pennsylvania used the same system to conduct | |
| background searches for her drug dealing boyfriend to see if his customers | |
| were undercover agents. | |
| It is hard to trace abuse to a single user because many agencies don't | |
| require personal access codes which would keep track of who made specific | |
| inquiries on the system and when they occurred. The General Accounting | |
| Office polled all the states and found that 17 don't require a personal | |
| code to access the NCIC. Most of these had an identifier only for the | |
| terminal or agency accessing the system. | |
| And if someone is caught abusing the system, they are seldom charged with | |
| a crime. The GAO found that the most common penalty was a reprimand, with | |
| some suspensions and firings. Of the 56 cases of abuse found by the GAO, | |
| only seven people were prosecuted. | |
| The FBI cannot force the states to adopt certain security measures | |
| because compliance with the guidelines is voluntary. The reason for this is | |
| that the guts of the NCIC come from the states, and the FBI simply | |
| maintains the network. | |
| "The main thing that can be done today is to enforce the law, and create | |
| stronger penalties for abusing the system," said Marc Rotenbertg of | |
| Computer Professionals for Social Responsibility, an advocacy group | |
| based in Palo Alto, California. | |
| ------------------------------------------------------------------------------- | |
| Live Wires September 6, 1993 | |
| ~~~~~~~~~~ | |
| by Barbara Kantrowitz et.al. (Time) (Page 63) | |
| & | |
| Technoid Circus | |
| ~~~~~~~~~~~~~~~ | |
| by Rex Weiner (Spin) (Page 72) September, 1993 | |
| [K-K00l cYbUR P|_|n|< aRt1Cl3zzzz | |
| Jump On The Cyber Bandwagon! | |
| More Journalists ride that old info highway straight to HELL!] | |
| ** BUT WAIT! A "Cyber" article we can all dig! ** | |
| Speciale Cyber Settembre, 1993 | |
| ~~~~~~~~~~~~~~ | |
| di Sergio Stingo (King) (P. 131) | |
| Il cyberpunk: tutti ne parlano, ma pochi sanno cosa sia veramente. Libri | |
| elettronici? Scenari inquietanti del futuro prossimo venturo? Conferenze | |
| telematiche? Nuovi tipi di abbigliamento usa-e-getta? La piu' grande | |
| rivoluzione democratica dei nostri anni? Una rivoluzione strisciante e | |
| silenziosa? Ia nostro stingo, sempre curioso del <<nuovo>>, S'e' messo | |
| a girare l'italia per iundagare il fenomeno. E' stato come scoperchiare | |
| una pentola in ebollizione. Piu' incontrava <<cyber>> e piu' scopriva che | |
| c'era da scoprire. Dal teorico della <<brain machine>>, che sperimenta | |
| l'oggetto misterioso tra discoteche e universita', alla prima galleria | |
| dove sono esposte opere di hacker art. Dalle riviste-bandiera del cyber, | |
| come <<decoder>>, alle band che stanno inventando una nuova musica. Per non | |
| parlare del sesso, che grazie alla tecnologia cerca di ampliare la | |
| gamma delle sensazioni possibili. Insomma, il viaggio oltre i confini di | |
| questo mondo e' stato talmente ricco e avventuroso, che abbiamo dovuto | |
| suddividere il reportage in due puntate. In questo numero presentiamo | |
| la prima. E, come si dice tra cybernauti, buona navigazione. | |
| [I don't know what that says, but its in another language, so it has to | |
| be cooler than the American CyberCrap] | |
| ------------------------------------------------------------------------------- | |
| Security Products Abound, But Is Toll Fraud Too Tough? August 30, 1993 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Dan O'Shea (Telephony) (Page 7) | |
| Telecommunications toll fraud is an increasingly popular crime that | |
| collectively costs its victims billions of dollars each year. Although | |
| carriers have responded with a wave of security products and services, | |
| the problem might be much bigger than was once thought. | |
| Some carriers claim that industry wide toll fraud losses amount to between | |
| $2 billion and $5 billion a year, but the true figure is closer to $8 billion, | |
| according to Bernie Milligan, president of CTF Specialists Inc., | |
| a consulting group that studies toll fraud and markets security services to | |
| large corporate telecommunications users. [ed: remember HoHo Con? Yes...THAT | |
| Bernie] | |
| Toll fraud involving calls coming into AT&T's 800 network dropped 75% since | |
| the introduction of NetProtect, while Sprint estimates a 95% decrease from | |
| last year (since the introduction of their fraud detection service). Average | |
| losses across the industry have plummeted from $120,000 per incident to | |
| $45,000. | |
| Despite the offensive against telecom fraud, the problem persists and is | |
| becoming more frequent, and new technologies will only represent potential | |
| new adventures for hackers, CFT's Milligan said. Hacker activity is growing | |
| at an annual rate of 35%. Some 65% to 80% of toll fraud involves | |
| international calling, and fraud occurs on a much wider scale than just | |
| inbound 800 calls, Milligan said. So, while losses of this type of fraud | |
| drop, collective fraud losses are increasing by 25% each year. Customers | |
| are still liable financially in toll fraud cases, and the carriers continue | |
| to get paid. | |
| ------------------------------------------------------------------------------- | |
| Misfit Millionaires December, 1993 | |
| ~~~~~~~~~~~~~~~~~~~ | |
| by Steve Fishman (Details) (Page 158) | |
| [Author profiles several of the early Microsoft programmers, namely | |
| Richard Brodie, Jabe Blumenthal, Kevin DeGraaf, Neil Konzen and Doug | |
| Klunder] | |
| ------------------------------------------------------------------------------- | |
| Intercourse With Lisa Palac 1993 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Melissa Plotsky (Axcess) (Page 62) | |
| & | |
| Turned On By Technology In The World Of Cybersex August 30, 1993 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Marco R. della Cava (USA Today) (Page 4D) | |
| [An interview and an overview dealing with online nastiness. Lisa Palac | |
| editor of Future Sex and producer of Cyborgasm talks about all kinds of | |
| stuff. As a regular peruser of Future Sex (for the articles of course) | |
| I can't help but wonder why we haven't seen HER naked yet. Email | |
| her at futursex@well.sf.ca.us and demand some gifs.] | |
| ------------------------------------------------------------------------------- | |
| Don't Try This At Home | |
| ~~~~~~~~~~~~~~~~~~~~~~ August, 1993 | |
| (Compute) (Page 62) | |
| Welcome to desktop forgery. | |
| Susan Morton, senior forensic document examiner with the US Postal Service | |
| in San Francisco, has seen gangs travelling the country packing computers, | |
| scanners, and laser printers. Arriving in town, their first move is to rob | |
| a mailbox to acquire some checks that were mailed to, say, a local utility | |
| company. They will copy the account and routing code off some citizen's | |
| check and decide what branch bank that person probably uses. Then they forge | |
| a large corporate or government check to that person, using information from | |
| other checks they found in the mail. Packing a forged ID, a gang member | |
| will then go to a branch across town where presumably nobody knows the | |
| citizen and deposit part of that forged check. The check may be for $5000, | |
| of which the forger takes $2000 as cash, smiles and leaves. | |
| One check forging gang was chased across Texas for about six months in the | |
| late 1980s, recalls Robert Ansley, corporate security manager for Dell | |
| Computer in Austin, Texas, then with the Austin police department. Armed | |
| with a stolen Macintosh and an ID maker stolen from a highway patrol | |
| substation, they passed more than $100,000 in bogus checks in Austin alone. | |
| Sources say other gangs have used laser printers to forge security ID | |
| badges to get into office buildings and steal the computers, nodding at the | |
| friendly security guard at the front desk while trudging out with their | |
| arms full. | |
| "We have been urging corporations to move forward with EDI (Electronic | |
| Data Interchange) for more and more of their business transactions and | |
| avoid paper, since it will become so vulnerable," says Donn Parker, | |
| computer crime expert with SRI International in Menlo Park, California. | |
| In 1991, the Secret Service busted 66 traditional counterfeiting operations, | |
| while seizing 52 office machines that had been used for counterfeiting | |
| ------------------------------------------------------------------------------- | |
| Subduing Software Pirates October, 1993 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Suzanne Weisband and Seymour Goodman (Technology Review) (Page 30) | |
| [The software manufacturers claim they lose between 9 and 12 billion | |
| annually. Thank GOD for the SPA and the BSA. Like they are go to | |
| Singapore or Hong Kong with guns and get the REAL culprits. Noooo. | |
| Let's raid BBSes and businesses. | |
| Their people at COMDEX told me they really weren't interested in | |
| taking my money to help me combat Phrack Piracy. I think we all know | |
| where THEIR interests lie.] | |
| ------------------------------------------------------------------------------- | |
| Mindvox: Urban Attitude Online November, 1993 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Charles Platt (Wired) (Page 56) | |
| [Another of those cute Mindvox RULES articles. "Fancher looked too neat, | |
| clean, and classy to be a hacker, but he enjoyed the cut-and-thrust of | |
| online jousting as much as anyone." But wait, there's a little | |
| name dropping too: Wil Wheaton, Kurt Larson, Billy Idol, THE LEGION OF DOOM! | |
| Don't get me wrong, I love Vox. And I really like the author of this story's | |
| last book "The Silicon Man," I just get kinda edgy about stuff in Wired. | |
| Favorite quote: "Unix is arcane," says Bruce, "and it's weird, and most | |
| users don't want to deal with it." I know I don't. Not.] | |
| ------------------------------------------------------------------------------- | |
| Intel To Protect Chips October 22, 1993 | |
| ~~~~~~~~~~~~~~~~~~~~~~ | |
| (Newswire Sources) | |
| One of the nation's largest manufacturers of computer chips said Friday it | |
| will start to put serial numbers on its products in an effort to stem the | |
| rising tide of robberies. Intel Corp. said it was taking its actions | |
| after a flurry of armed takeover robberies at warehouses in California's | |
| Silicon Valley over the last six months. | |
| What the robbers are after is microprocessors -- the brains that power | |
| personal computers. Among their favorite targets has been Intel's 486 | |
| microprocessor. | |
| Julius Finkelstein, head of Santa Clara's High Tech Crime Task Force, | |
| called chip robberies "the gang crime of the 1990s." "They are just | |
| as valuable as cocaine," he said. "But they are easier to get rid of | |
| and if you are caught the penalties aren't as severe." | |
| The gangs, Finkelstein said, are Asian, well organized and very | |
| knowledgable about computer components. They generally drive up to a | |
| warehouse door as if coming for a shipment, but once inside pull out | |
| their weapons and force the employees to the floor. | |
| Last month, a takeover robbery at the Wylie Laboratories Electronic | |
| Marketing Group in Santa Clara netted thieves an estimated $1 million in | |
| chips. Finkelstein said that robbery took only about 15 minutes. | |
| ------------------------------------------------------------------------------- | |
| Chip Robberies Continue November 5, 1993 | |
| ~~~~~~~~~~~~~~~~~~~~~~~ | |
| (Newswire Sources) | |
| Authorities said a gang of Vietnamese-speaking bandits staged a violent | |
| takeover robbery of a San Jose computer parts company Thursday, wounding | |
| one man and escaping with an undisclosed amount of electronic equipment. | |
| Lt. Rob Davis said the robbery began at 1:01 a.m. when as many as | |
| five gunmen forced their way into the Top Line Electronics Co., a | |
| computer board manufacturer. The bandits rounded up the employees and | |
| beat them in an attempt to find where the computer parts were stored. | |
| One employee was shot in the hip as he tried to escape. Davis said | |
| the man was treated at a local hospital and was listed in stable | |
| condition. | |
| ------------------------------------------------------------------------------- | |
| Hacker Revelled In Spotlight, Court Told August 23, 1993 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| (The Age) | |
| A hacker who broke into a computer at NASA in the United States, | |
| and contemplated sending it a message not to launch a space shuttle, was | |
| delighted with the effect he was having, the County Court was told yesterday. | |
| The prosecutor, Mr Richard Maidment, said that in a three-way | |
| conversation between Nahshon Even-Chaim, David John Woodcock | |
| and another computer hacker, Woodcock discussed sending a message | |
| to a computer at NASA to stop the launch of a space shuttle, after | |
| Woodcock talked about the shuttle Challenger, which blew up several | |
| years before, and said "I have got to do something about NASA." | |
| Even-Chaim, 22, formerly of Narong Road, Caulfield, yesterday | |
| pleaded guilty to 15 charges relating to unauthorized obtaining, | |
| altering, inserting, and erasing of data stored in a computer, and | |
| the interfering and obstruction of the lawful use of a computer. | |
| Woodcock, 25, formerly of Ashleigh Avenue, Frankston, pleaded | |
| guilty to two counts of being knowingly concerned in the obtaining | |
| of unauthorized access by Even-Chaim to data stored in a computer. | |
| The court was told that a co-offender, Richard Martin Jones | |
| was earlier sentenced to six months jail, but was released on a $500, | |
| six-month good behavior bond. | |
| The court was told that Even-Chaim obtained free use of telephone | |
| lines for many hours to connect his home computer to other systems | |
| in the United States. | |
| Mr. Maidment said that Even-Chaim, Woodcock, and Jones, who | |
| collectively called themselves "The Realm", were arrested in April 1990 | |
| by the Australia Federal Police after an investigation that began with | |
| information received from the United States Secret Service. | |
| ------------------------------------------------------------------------------- | |
| The Last Hacker September 26, 1993 | |
| ~~~~~~~~~~~~~~~ | |
| by Jonathan Littman (LA Times) | |
| [This is the bet article I've seen yet about Kevin Poulsen. Please go | |
| find it and read it. It covers Poulsen from beginning to end. All the | |
| crazy stunts, the life on the run, the show down with the feds. Everything. | |
| Here is a small excerpt.] | |
| KIIS-Fm called it a "Win a Porsche by Friday": eight Porsches - about | |
| $400,000 worth of steel, leather and status - given away, one a week. You could | |
| hardly live or work in Los Angeles without being caught up in the frenzy. It | |
| seems that the gleaming, candy-red convertibles were plastered on nearly every | |
| billboard and bus in town. Listeners were glued to KIIS, hoping to make the | |
| 102nd call after Dees spun the third song in the magical series. | |
| Housewives, businessmen, students and contest freaks jammed the lines with | |
| their car phones and auto-dialers. They all had hopes, but one 24-year-old high | |
| school dropout had a plan. America's most wanted hacker and his associates | |
| sat by their computers and waited. On the morning of June 1, 1990 KIIS played | |
| 'Escapade,' 'Love Shack; and then, yes, "Kiss." "We blew out the phone lines," | |
| every line was ringing says Karen Tobin, the stations promotional director. "We | |
| picked up the calls and counted." | |
| The hacker was counting too. At the precise moment Price's "Kiss" hit the air | |
| he seized control of the station's 25 phone liens, blocking out all calls but | |
| his own. Then the man, who identified himself as Michael B. Peters, calmly | |
| dialed the 102nd call and won a Porsche 944 S2. | |
| It was child's play. Especially for Kevin Lee Poulsen. Computer hacking had | |
| once seemed an innocent obsession to Poulsen, a native of Pasadena, but now it | |
| was his life, and it had taken him over the line. This October, Poulsen will | |
| face the first of two trials, one in San Jose and another in Los Angeles, that | |
| federal prosecutors say are critical to the government. Because of the | |
| seriousness of his alleged breaches of national security, they intend to use the | |
| case as an example to the hacker underground. | |
| As a teen-ager, Poulsen had burrowed deep into the giant switching networks | |
| of Pacific Bell, exploring and exploiting nearly every element of its powerful | |
| computers, from the common systems responsible for creating, changing and | |
| maintaining phone service to the shadow systems that guard the secrets of | |
| national security, according to accusations in a federal indictment. The U.S. | |
| attorney in San Jose says that Poulsen had wiretapped the intimate phone calls | |
| of a Hollywood starlet, allegedly conspired to steal classified military orders, | |
| and reportedly uncovered unpublished telephone numbers for the Soviet Consulate | |
| in San Francisco. | |
| ------------------------------------------------------------------------------- | |