| ==Phrack Magazine== | |
| Volume Five, Issue Forty-Five, File 28 of 28 | |
| PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN | |
| PWN PWN | |
| PWN Phrack World News PWN | |
| PWN PWN | |
| PWN Compiled by Datastream Cowboy PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Paramount's Hack Attack March 3, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~ | |
| Reuter News Wire | |
| Though the minds of Paramount execs have surely been n potential whackings, | |
| computer hacking was the chief focus of execs Bob Jaffe and John Goldwyn | |
| last week. | |
| The execs got Par to pay a low six-figure fee against mid-six figures to | |
| Johnathan Littman for the rights to make a movie from his Sept. 12 LA Times | |
| Magazine article "The Last Hacker," and major names are lining up to be | |
| involved. | |
| It's the story of Kevin Lee Poulsen, a skilled computer hacker who was so | |
| inventive he once disabled the phone system of KIIS_FM so he could be the | |
| 102nd caller and win the $50,000 Porsche giveaway. | |
| Poulsen was caught and has been in jail for the last three years, facing | |
| more than 100 years in prison. | |
| It was a vicious tug of war between Touchstone, which was trying to purchase | |
| it for "City Slickers" director Ron Underwood. | |
| Littman, meanwhile, has remained tight with the underground community of | |
| hackers as he researches his book. | |
| That takes its tool. Among other things, the mischief meisters have already | |
| changed his voice mail greeting to render an obscene proposal. | |
| ------------------------------------------------------------------------------ | |
| Hacker Attempts To Chase Cupid Away February 10, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| UPI News Sources | |
| Two bachelors who rented a billboard to find the perfect mate said Thursday | |
| they had fallen victim to a computer hacker who sabotaged their voice mail | |
| message and made it X-rated. | |
| Steeg Anderson said the original recording that informed callers | |
| how they may get hold of the men was changed to a "perverted" sexually | |
| suggestive message. | |
| "We are getting calls from all over the country," he said. "So we were | |
| shocked when we heard the message. We don't want people to get the wrong | |
| idea." | |
| "It's rare, but we've seen this kind of thing before," said Sandy Hale, a | |
| Pac Bell spokeswoman. "There is a security procedure that can prevent this | |
| from happening, but many people simply don't use it." | |
| ------------------------------------------------------------------------------ | |
| Wire Pirates March 1994 | |
| ~~~~~~~~~~~~ | |
| by Paul Wallich (Scientific American) (Page 90) | |
| Consumers and entrepreneurs crowd onto the information highway, where | |
| electronic bandits and other hazards await them. | |
| [Scientific American's latest articles about the perils of Cyberspace. | |
| Sound bytes galore from Dorothy Denning, Peter Neumann, Donn Parker, | |
| Mark Abene, Gene Spafford and others. Much better than their last attempt | |
| to cover such a thing back in 1991.] | |
| ------------------------------------------------------------------------------ | |
| AT&T Warns Businesses December 8, 1993 | |
| ~~~~~~~~~~~~~~~~~~~~~ | |
| Business Wire Sources | |
| AT&T urges businesses to guard against increased risk of toll-fraud attempts | |
| by hackers, or toll-call thieves, during the upcoming holiday season. | |
| Last year nationwide toll-fraud attempts increased by about 50 percent during | |
| the Christmas week. Hackers "break into" PBXs or voice-mail systems, obtain | |
| passwords or access to outside lines, and then sell or use the information to | |
| make illegal international phone calls. | |
| Toll fraud cost American businesses more than $2 billion in 1993. "Hackers | |
| count on being able to steal calls undetected while businesses are closed | |
| during a long holiday weekend," says Larry Watt, director of AT&T's Toll | |
| Fraud Prevention Center. "Tis the season to be wary." | |
| AT&T is the industry leader in helping companies to prevent toll fraud. | |
| Businesses that want more information on preventative measures can request | |
| AT&T's free booklet, "Tips on Safeguarding Your Company's Telecom Network," | |
| by calling 1-800-NET-SAFE. | |
| ------------------------------------------------------------------------------ | |
| Sadomasochists Meet Cyberpunks At An L.A. Party June 14, 1993 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Jessica Seigel (Chicago Tribune) | |
| Sadomasochists meet the cyberpunks. Leather meet hypernormalcy. Body | |
| piercing meet network surfing (communicating by computer). It was a night | |
| for mingling among the subcultures to share their different approaches to | |
| messing with mind and body. | |
| The recent party at the S&M club "Club Fuck" was organized by "Boing Boing," | |
| a zine that focuses on the kinetic, futuristic world of the new frontier | |
| known as cyberspace. This place doesn't exist in a physical location, but | |
| anyone can visit from their home computer by hooking into vast electronic | |
| networks. | |
| A blindfolded man dressed in a jock strap and high heeled boots stood on | |
| stage while helpers pinned flashing Christmas lights to his flesh with thin | |
| needles. Then a man with deer antlers tied to his forehead whipped him. | |
| The crowd of mostly twentysomethings who came to the club because of the | |
| cyber theme observed with stony expressions. Chris Gardner, 24, an | |
| architecture student who studied virtual reality in school, covered his | |
| eyes with his hand. | |
| No one, really was "fitting in." The sadomasochists looked curiously at the | |
| very-average-looking cyber fans, who openly gawked back at the black | |
| leather, nudity and body piercing. | |
| Sharing subcultures can be so much fun. | |
| ------------------------------------------------------------------------------ | |
| Intruder Alert On Internet February 4, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| AP News Sources | |
| Intruders have broken into the giant Internet computer network and users are | |
| being advised to protect themselves by changing their passwords. | |
| The breaks-ins may jeopardize the work of tens of thousands of computer | |
| users, warned the Computer Emergency Response Team, based at Carnegie | |
| Mellon University in Pittsburgh. | |
| "Intruders have already captured access information for tens of | |
| thousands of systems across the Internet," said an emergency response | |
| team sent out on the network late Thursday. | |
| Passwords were obtained by the intruders using a "Trojan horse | |
| program," so called because it can enter the main computer for some | |
| legitimate purpose, but with coding that lets it remain after that | |
| purpose is accomplished. | |
| The program then records the first 128 keystrokes when someone else | |
| connects to the Internet, and the illegal user later dials in and | |
| receives that information. The first keystrokes of a user generally | |
| contain such information as name and password of the user. Once they | |
| know that the intruders can then sign on as the person whose password | |
| they have stolen, read that person's files and change them if they | |
| wish. | |
| ------------------------------------------------------------------------------ | |
| Harding Email Compromised by Journalists February 27, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by C.W. Nevius (SF Chronicle) | |
| In another example of the media circus that has dogged Tonya Harding, | |
| a number of American journalists have apparently obtained the secret computer | |
| code numbers that would allow them to read Harding's personal electronic mail | |
| at the Winter Olympics. | |
| No reporters have admitted reading Harding's electronic mail, but the | |
| apparent access to private communications has caused concern among those | |
| covering the Games. | |
| The Olympic computer system is one of the most popular communications devices | |
| at the Games. Any member of the Olympic family -- media, athlete or Olympic | |
| official -- can message anyone else from any of several hundred | |
| computer terminals all over the Olympic venues. | |
| The flaw in the system is that it is not especially difficult to | |
| break the personal code. Every accredited member of the Olympic family is | |
| given an identification number. It is written on both the front and back | |
| of the credential everyone wears at the Games. Anyone who has a face-to-face | |
| meeting with an athlete would be able to pick up the accreditation number, | |
| if the person knew where to look. | |
| Each person is also given a "Secret" password to access the communication | |
| system. At the outset, the password was comprised of the digits corresponding | |
| to that person's birth date. Although Olympic officials advised everyone | |
| to choose their own password, Harding apparently never got around to doing | |
| so. | |
| Harding's initial password would have been 1112, because her birthday | |
| is the 11th of December. | |
| Although none of the writers at the Olympics has admitted reading Harding's | |
| personal electronic mail, it would be difficult, if not impossible, to | |
| determine if anyone did any actual snooping. There are no records kept | |
| of who signs on to the computer from any particular terminal. | |
| ------------------------------------------------------------------------------ | |
| Reality Check January 1994 | |
| ~~~~~~~~~~~~~ | |
| by Doug Fine (Spin) (Page 62) | |
| I ask accused hacker Kevin Lee Poulsen if, as he approaches three years in | |
| jail without trial, he has any regrets about his computer-related activities. | |
| Without missing a beat, and breaking a media silence that began with his | |
| first arrest in 1988, he answers: "I regret shopping at Hughes Supermarket. | |
| I'm thinking of organizing a high-tech boycott." | |
| Poulsen is referring to the site of his 1991 bust in Van Nuys, California. | |
| There, between the aisles of foodstuffs, two zealous bag-boys -- their resolve | |
| boosted by a recent episode of Unsolved Mysteries that featured the alleged | |
| criminal -- jumped the 25-year-old, wrestled him to the ground, and handed | |
| the suspect over to the security agents waiting outside. | |
| Poulsen still kicks himself for returning to Hughes a second time that | |
| spring evening. According to court documents, a former hacker crony of | |
| Poulsen's, threatened with his own prison sentence, had tipped off the | |
| FBI that Poulsen might be stopping by. | |
| What, I ask him, had he needed so badly that he felt compelled to return | |
| to a supermarket at midnight? | |
| "Do you even have to ask?" he says. "Condoms, of course." | |
| [A very different Kevin Poulsen story. Get it and read it.] | |
| ------------------------------------------------------------------------------ | |
| Key Evidence in Computer Case Disallowed January 4, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Los Angeles Staff Writers (Los Angeles Times) (Page B3) | |
| U.S. District Judge Ronald Whyte in San Jose said computer tapes found | |
| in a storage locker rented by Kevin Lee Poulsen should not have been | |
| examined by prosecutors without a search warrant and cannot be used as | |
| evidence. | |
| Whyte had ruled the tapes admissible last month but changed his mind, | |
| saying he had overlooked evidence that should have put a police officer | |
| on notice of Poulsen's privacy rights. | |
| In addition to illegal possession of classified government secrets, | |
| Poulsen faces 13 other charges, including eavesdroping on telephone | |
| conversations, and tapping into Pacific Bell's computer and an unclassified | |
| military computer network. He could be sentenced to 85 years in prison if | |
| convicted of all charges. | |
| His lawyer, Paul Meltzer of Santa Cruz, said the sole evidence of the | |
| espionage charge is contained on one of the storage locker tapes. Meltzer | |
| said a government analyst found that the tape contained a 1987 order, | |
| classified secret, concerning a military exercise. | |
| Poulsen, who lived in Menlo Park at the time of his arrest in the San | |
| Jose case, worked in the mid-1980s as a consultant testing Pentagon computer | |
| security. He was arrested in 1988 on some of the hacking charges, disappeared | |
| and was picked up in April, 1991, after a tip prompted by a television show. | |
| ------------------------------------------------------------------------------ | |
| Hacker to ask charges be dropped January 4, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| UPI News Sources | |
| An attorney for a former Silicon Valley computer expert accused of raiding | |
| confidential electronic government files said Tuesday he will ask to have | |
| charges dismissed now that a federal judge has thrown out the government's | |
| chief evidence. | |
| Attorney Peter Leeming said the government's case against Kevin L. | |
| Poulsen is in disarray following a ruling suppressing computer tapes and | |
| other evidence seized from a rented storage locker in 1988. | |
| ''We're ready to go to trial in the case, and actually we're looking | |
| forward to it,'' Leeming said. | |
| Poulsen is charged with espionage and other offenses stemming from his | |
| hacking into military and Pacific Bell telephone computers. The government | |
| alleges that Poulsen illegally obtained confidential military computer codes | |
| and confidential information on court-ordered wiretaps. | |
| ------------------------------------------------------------------------------ | |
| The Password is Loopholes March 1, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Joshua Quittner (Newsday) (Page 61) | |
| You'd think that Polytechnic University, in Brooklyn, one of the finer | |
| technical schools in the country, would know how to safeguard its | |
| computer system against hacker intrusions. And you'd think the same of | |
| New York University's Courant Institute, which hosts the mathematical | |
| and computer science departments. | |
| But a teenage Brooklyn hacker, who calls himself Iceman, and some | |
| of his friends say they invaded the schools Internet-connected | |
| computers and snatched the passwords of 103 students. | |
| Internet break-ins have been a national news story lately, with | |
| reports that unknown intruders have purloined more than 10,000 passwords | |
| in a burst of activity during recent months. The Federal Bureau of | |
| Investigation is investigating, since so many "federal-interest | |
| computers" are attached to the wide-open Internet and since it is a | |
| crime to possess and use other peoples' passwords. | |
| Experts now believe that a group of young hackers who call | |
| themselves The Posse are responsible for the break-ins, though who they | |
| are and what they're after is unclear. Some people believe the crew is | |
| merely collecting passwords for bragging rights, while others suspect | |
| more insidious motives. Their approach is more sophisticated, from a | |
| technical standpoint, than Iceman's. But the result is the same. | |
| Now Iceman, who's 18, has nothing to do with The Posse, never heard | |
| of it, in fact. He hangs with a group of budding New York City hackers | |
| who call themselves MPI. | |
| Iceman told me it was simple to steal 103 passwords on the | |
| universities systems since each password was a common word or name. | |
| What did Iceman and company do with the passwords? | |
| He said mostly, they enjoy reading other people's files and e-mail. | |
| "Every once in a while," he said, "you get something interesting." | |
| ------------------------------------------------------------------------------ | |
| A Rape In Cyberspace December 21, 1993 | |
| ~~~~~~~~~~~~~~~~~~~~ | |
| by Julian Dibbell (Village Voice) (Page 36) | |
| [<SNIFF> Some guy made my MUD character do bad things in a public | |
| area. And all the other MUDders could do was sit and watch! WAHHHHH. | |
| Get a fucking life, people. Wait, let me restate that; Get a | |
| FUCKING REAL LIFE!] | |
| ------------------------------------------------------------------------------ | |
| Hacking Goes Legit February 7, 1993 | |
| ~~~~~~~~~~~~~~~~~~ | |
| by Ann Steffora and Martin Cheek (Industry Week) (Page 43) | |
| Corporations ARE using "tiger teams" and less glamorous methods to check | |
| computer security. | |
| [Uh, yeah. Sure they are. Hey, is that an accountant in your dumpster? | |
| Better tuck in that tie dude. Don't forget your clipboard! | |
| I will put a computer security audit by me, or by anyone from the hacker | |
| community, against a computer security audit done by ANY of the following: | |
| Coopers & Lybrand, Deloitte & Touche, Arthur Andersen or Price Waterhouse. | |
| It's no contest. These people are NOT computer people. Period. | |
| Get the hell out of the computer business and go do my fucking taxes.] | |
| ------------------------------------------------------------------------------ | |