| ==Phrack Magazine== | |
| Volume Six, Issue Forty-Seven, File 22 of 22 | |
| PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN | |
| PWN PWN | |
| PWN Phrack World News PWN | |
| PWN PWN | |
| PWN Compiled by Datastream Cowboy PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| 3 Residents Investigated In Theft Of Phone Card Numbers Oct 10, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Russ Britt (Los Angeles Daily News) | |
| Three Los Angeles residents have come under investigation in connection with | |
| the theft of 100,000 telephone calling card numbers used to make $50 million | |
| worth of long distance calls, officials said. | |
| The Secret Service searched the suspects' residences over the past two weeks | |
| and found computer disks containing calling card codes, said Jim Bauer, | |
| special agent-in-charge of he Los Angeles office. | |
| Ivy J. Lay, an MCI switch engineer based in Charlotte, N.C., was arrested | |
| last week in North Carolina on suspicion of devising computer software to hold | |
| calling card numbers from carriers that route calls through MCI's equipment, | |
| the Secret Service said. | |
| Lay is suspected of supplying thousands cards of calling codes to accomplices | |
| in Los Angeles for $3 to $5 a number, Bauer said. The accomplices are | |
| suspected of reselling the numbers to dealers in various cites, who then sold | |
| them to buyers in Europe, Bauer said. | |
| European participants would purchase the numbers to make calls to the United | |
| States to pirate computer software via electronic bulletin boards. | |
| ------------------------------------------------------------------------------- | |
| Revealed: how hacker penetrated the heart of British intelligence Nov 24, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Tim Kelsey (The Independent) p. 1 | |
| [ In typical British style, The Independent boasts 3 FULL pages on the | |
| story of how a "hacker" broke into British Telecom's databases and pulled | |
| information regarding sensitive numbers for the Royal Family and | |
| MI 5 & 6. | |
| Reportedly, information was sent anonymously to a reporter named Steve | |
| Fleming over the Internet by a "hacker" who got a job as a temp at BT | |
| and used their computers to gather the information. (I heard that Fleming | |
| later admitted that "he" was actually the supposed "hacker.") | |
| This is news? This is like saying, "Employees at Microsoft gained access to | |
| proprietary Microsoft source code," or "CAD Engineers at Ford gained | |
| access to super-secret Mustang designs." Get real. ] | |
| ------------------------------------------------------------------------------- | |
| Telecom admits security failings Nov 29, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Tim Kelsey (The Independent) p. 1 | |
| [ In typical British style, senior officials at BT attempted to save face | |
| by stating that sensitive information such as the file of Royal Family | |
| and Intelligence services phone numbers and addresses (currently floating | |
| around the Internet) was safe from prying eyes, but could indeed be accessed | |
| by BT employees. Uh, yeah. ] | |
| ------------------------------------------------------------------------------- | |
| Phreak Out! Dec 1994 | |
| ~~~~~~~~~~~ | |
| by Steve Gold (Internet and Comms Today) p. 44 | |
| [ A valiant attempt by England's Internet & Comms Today (my favorite | |
| Internet-related magazine--by far) to cover the Hack/Phreak scene | |
| in the UK, with a few tidbits about us here in the states. Not | |
| 100% accurate, but hell, it beats the living shit out of anything | |
| ever printed by any US mainstream mag. ] | |
| ------------------------------------------------------------------------------- | |
| Hack To The Future Dec 1994 | |
| ~~~~~~~~~~~~~~~~~~ | |
| by Emily Benedek (Details) p. 52 | |
| Hacking Vegas Jan 1995 | |
| ~~~~~~~~~~~~~ | |
| by Damien Thorn (Nuts & Volts) p. 99 | |
| [ A review of HOPE, and a review of DefCon. One from a techie magazine whose | |
| other articles included: Build a Telephone Bug, Telephone Inside Wiring | |
| Maintenance, Boat GPS on Land and Sea and Killer Serial Communications; | |
| the other from a magazine that usually smells more fragrant than Vogue, and | |
| whose other articles included: The Madonna Complex, Brother From Another | |
| Planet, Confessions of a Cyber-Lesbian and various fashion pictorials. | |
| One written by someone who has been in the hack scene since OSUNY ran on an | |
| Ohio-Scientific and the other written by a silly girlie who flitted around | |
| HOPE taking pictures of everyone with a polaroid. You get the idea. ] | |
| ------------------------------------------------------------------------------- | |
| Hackers Take Revenge on the Author of New Book on Cyberspace Wars Dec 5, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Jared Sandberg (The Wall Street Journal) p. B5 | |
| In his forthcoming book writer Joshua Quittner chronicles the bizarre but | |
| true tale of a Hatfield-and-McCoys feud in the nether world of computer | |
| hackers. | |
| Now the hackers have extracted revenge for Mr. Quittner's attention, taking | |
| control of his phone line and voice mail and bombarding his on-line account | |
| with thousands of messages. | |
| "I don't believe I've ever been hacked to this degree," says Mr. Quittner, | |
| whose book, written with wife Michelle Slatalla, was excerpted in the | |
| latest issue of Wired magazine, apparently prompting the attack. | |
| "People in MOD and LOD are very unhappy about the story," Mr. Quittner says. | |
| "That is what I believe prompted the whole thing." | |
| ------------------------------------------------------------------------------- | |
| Terror On The Internet Dec 1994 | |
| ~~~~~~~~~~~~~~~~~~~~~~ | |
| By Philip Elmer-Dewitt (Time) | |
| Thanksgiving weekend was quiet in the Long Island, New York, home of Michelle | |
| Slatalla and Josh Quittner. Too quiet. | |
| "We'd been hacked," says Quittner, who writes about computers, and | |
| hackers, for the newspaper Newsday, and will start writing for TIME in | |
| January. Not only had someone jammed his Internet mailbox with thousands of | |
| unwanted pieces of E-mail, finally shutting down his Internet access | |
| altogether, but the couple's telephone had been reprogrammed to forward | |
| incoming calls to an out-of-state number, where friends and relatives heard | |
| a recorded greeting laced with obscenities. "What's really strange," says | |
| Quittner, "is that nobody who phoned, including my editor and my | |
| mother, thought anything of it. They just left their messages and hung up." | |
| It gets stranger. In order to send Quittner that mail bomb, the electronic | |
| equivalent of dumping a truckload of garbage on a neighbor's front lawn, | |
| someone, operating by remote control, had broken into computers at IBM, | |
| Sprint and a small Internet service provider called the Pipeline, seized | |
| command of the machines at the supervisory, or "root", level, and | |
| installed a program that fired off E-mail messages every few seconds. | |
| Adding intrigue to insult, the message turned out to be a manifesto that | |
| railed against "capitalist pig" corporations and accused those companies | |
| of turning the Internet into an "overflowing cesspool of greed." It was | |
| signed by something called the Internet Liberation Front, and it ended like | |
| this: "Just a friendly warning corporate America; we have already stolen | |
| your proprietary source code. We have already pillaged your million dollar | |
| research data. And if you would like to avoid financial ruin, get the | |
| ((expletive deleted)) out of Dodge. Happy Thanksgiving Day turkeys." | |
| It read like an Internet nightmare come true, a poison arrow designed to | |
| strike fear in the heart of all the corporate information managers who had | |
| hooked their companies up to the information superhighway only to discover | |
| that they may have opened the gate to trespassers. Is the I.L.F. for real? | |
| Is there really a terrorist group intent on bringing the world's largest | |
| computer network to its knees? | |
| That's what is so odd about the so-called Internet Liberation Front. While | |
| it claims to hate the "big boys" of the telecommunications industry and | |
| their dread firewalls, the group's targets include a pair of journalists and | |
| a small, regional Internet provider. "It doesn't make any sense to me," | |
| says Gene Spafford, a computer-security expert at Purdue University. | |
| "I'm more inclined to think it's a grudge against Josh Quittner." | |
| That is probably what it was. Quittner and Slatalla had just finished a book | |
| about the rivalry between a gang of computer hackers called the Masters | |
| of Deception and their archenemies, the Legion of Doom, an excerpt of | |
| which appears in the current issue of Wired magazine. And as it turns out, | |
| Wired was mail-bombed the same day Quittner was, with some 3,000 copies | |
| of the same nasty message from the I.L.F. Speculation on the Net at week's | |
| end was that the attacks may have been the work of the Masters of Deception, | |
| some of whom have actually served prison time for vandalizing the computers | |
| and telephone systems of people who offend them. | |
| ------------------------------------------------------------------------------- | |
| The Phreak Show Feb 5, 1995 | |
| ~~~~~~~~~~~~~~~ | |
| By G. Pascal Zachary (Mercury News) | |
| "Masters of Deception" provides an important account of this hidden hacker | |
| world. Though often invoked by the mass media, the arcana of hacking have | |
| rarely been so deftly described as in this fast-paced book. Comprised of | |
| precocious New York City high schoolers, the all-male "Masters of Deception" | |
| (MOD) gang are the digital equivalent of the 1950s motorcyclists who roar | |
| into an unsuspecting town and upset things for reasons they can't even explain. | |
| At times funny and touching and other times pathetic and disturbing, the | |
| portrait of MOD never quite reaches a crescendo. The authors, journalists | |
| Michelle Slatalla of Newsday and Joshua Quittner of Time, fail to convey | |
| the inner lives of the MOD. The tale, though narrated in the MOD's | |
| inarticulate, super-cynical lingo and packed with their computer stunts, | |
| doesn't convey a sense of what makes these talented oddballs tick. | |
| Too often the authors fawn all over their heroes. In "Masters of Deception," | |
| every hacker is a carefree genius, benign and childlike, seeking only to | |
| cavort happily in an electronic Garden of Eden, where there are no trespassing | |
| prohibitions and where no one buys or sells information. | |
| Come on. Phiber and phriends are neither criminals nor martyrs. The issue of | |
| rights and responsibilities in cyberspace is a lot more complicated than | |
| that. Rules and creativity can co-exist; so can freedom and privacy. If | |
| that's so hard to accept, a full 25 years after the birth of the | |
| Internet, maybe it's time to finally get rid of the image of the hacker | |
| as noble savage. It just gets in the way. | |
| ------------------------------------------------------------------------------- | |
| Hacking Out A Living Dec 8, 1994 | |
| ~~~~~~~~~~~~~~~~~~~~ | |
| by Danny Bradbury (Computing) p. 30 | |
| There's nothing like getting it from the horse's mouth, and that's exactly | |
| what IT business users, anxious about security, did when they went to a recent | |
| conference given by ex-hacker, Chris Goggans. | |
| [ Yeah, so it's a blatant-plug for me. I'm the editor. I can do that. | |
| (This was from one of the seminars I put on in Europe) ] | |
| ------------------------------------------------------------------------------- | |
| Policing Cyberspace Jan 23, 1995 | |
| ~~~~~~~~~~~~~~~~~~~ | |
| by Vic Sussman (US News & World Report) p. 54 | |
| [ Yet another of the ever-growing articles about high-tech cops. Yes, those | |
| dashing upholder of law and order, who bravely put their very lives | |
| on the line to keep America free from teenagers using your calling card. | |
| Not that I wouldn't have much respect for our High-Tech-Crimefighters, if | |
| you could ever show me one. Every High-Tech Crime Unit I've ever seen | |
| didn't have any high-tech skills at all...they just investigated low-tech | |
| crimes involving high-tech items (ie. theft of computers, chips, etc.) | |
| Not that this isn't big crime, its just not high tech. Would they | |
| investigate the theft of my Nientendo? If these self-styled cyber-cops | |
| were faced with a real problem, such as the theft of CAD files or illegal | |
| wire-transfers, they'd just move out of the way and let the Feds handle | |
| it. Let's not kid ourselves. ] | |
| ------------------------------------------------------------------------------- | |
| Hacker Homecoming Jan 23, 1995 | |
| ~~~~~~~~~~~~~~~~~ | |
| by Joshua Quitter (Newsweek) p. 61 | |
| The Return of the Guru Jan 23, 1995 | |
| ~~~~~~~~~~~~~~~~~~~~~~ | |
| by Jennifer Tanaka and Adam Rogers (Time) p. 8 | |
| [ Two articles about Mark "Phiber Optik" Abene's homecoming party. | |
| Amazing. Just a few years earlier, Comsec was (I think) the first | |
| group of hackers to make Time & Newsweek on the same date. | |
| Now, all someone has to do is get out of jail and they score a similar | |
| coup. Fluff stories to fill unsold ad space. ] | |
| ------------------------------------------------------------------------------- | |
| Data Network Is Found Open To New Threat Jan 23, 1995 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by John Markoff (New York Times) p. A1 | |
| A Federal computer security agency has discovered that unknown intruders | |
| have developed a new way to break into computer systems, and the agency | |
| plans on Monday to advise users how to guard against the problem. | |
| The first known attack using the new technique took place on Dec. 25 | |
| against the computer of a well-known computer security expert at the | |
| San Deigo Supercomputer Center. An unknown individual or group took | |
| over his computer for more then a day and electronically stole a large | |
| number of security programs he had developed. | |
| The flaw, which has been known as a theoretical possibility to computer | |
| experts for more than a decade, but has never been demonstrated before, | |
| is creating alarm among security experts now because of the series of | |
| break-ins and attacks in recent weeks. | |
| The weakness, which was previously reported in technical papers by | |
| AT&T researchers, was detailed in a talk given by Tsutomo Shimomura, | |
| a computer security expert at the San Deigo Supercomputer Center, at a | |
| California computer security seminar sponsored by researchers at the | |
| University of California at Davis two weeks ago. | |
| Mr. Shimomura's computer was taken over by an unknown attacker who then | |
| copied documents and programs to computers at the University of Rochester | |
| where they were illegally hidden on school computers. | |
| ------------------------------------------------------------------------------- | |
| A Most-Wanted Cyberthief Is Caught In His Own Web Feb 16, 1995 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by John Markoff (New York Times) p. A1 | |
| After a search of more than two years, a team of FBI agents early this | |
| morning captured a 31-year-old computer expert accused of a long crime | |
| spree that includes the theft of thousands of data files and at least | |
| 20,000 credit card numbers from computer systems around the nation. | |
| Federal officials say Mr. Mitnick's confidence in his hacking skills may | |
| have been his undoing. On Christmas Day, he broke into the home computer | |
| of a computer security expert, Tsutomo Shimomura, a researcher at the | |
| federally financed San Deigo Supercomputer Center. | |
| Mr. Shimomura then made a crusade of tracking down the intruder, an obsession | |
| that led to today's arrest. | |
| It was Mr. Shimomura, working from a monitoring post in San Jose, California, | |
| who determined last Saturday that Mr. Mitnick was operating through a computer | |
| modem connected to a cellular telephone somewhere near Raleigh, N.C. | |
| "He was a challenge for law enforcement, but in the end he was caught by his | |
| own obsession," said Kathleen Cunningham, a deputy marshal for the United | |
| States Marshals Service who has pursued Mr. Mitnick for several years. | |
| ------------------------------------------------------------------------------- | |
| Computer Users Beware: Hackers Are Everywhere | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Michelle V. Rafter (Reuters News Sources) | |
| System Operators Regroup In Wake Of Hacker Arrest | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Elizabeth Weise (AP News Sources) | |
| Computer Hacker Seen As No Slacker | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Paul Hefner (New York Times) | |
| Kevin Mitnick's Digital Obsession | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Josh Quittner (Time) | |
| A Superhacker Meets His Match | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Katie Hafner (Newsweek) | |
| Cracks In The Net | |
| ~~~~~~~~~~~~~~~~~ | |
| by Josh Quittner (Time) | |
| Undetected Theft Of Credit-Card Data Raises Concern About Online Security | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Jared Sandberg (The Wall Street Journal) | |
| [Just a sampling of the scores of Mitnick articles that inundated the | |
| news media within hours of his arrest in North Carolina. JUMP ON THE | |
| MITNICK BANDWAGON! GET THEM COLUMN INCHES! WOO WOO!] | |
| ------------------------------------------------------------------------------- | |
| Hollywood Gets Into Cyberspace With Geek Movies | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Therese Poletti (Reuters News Sources) | |
| With dramatic tales like the capture last week of a shadowy computer hacker | |
| wanted around the world, Hollywood studios are scrambling to cash in on | |
| the growing interest in cyberspace. | |
| "They are all looking at computer-related movies because computers are | |
| hot," said Bishop Kheen, a Paul Kagan analyst. "They are all reviewing | |
| scripts or have budgets for them. "We are going to see a rash of these | |
| kinds of movies." | |
| Experts say it remains to be seen what kind of box office draw can be | |
| expected from techie movies such as one that might be based on the hunt for | |
| Mitnick. But the recent surge of interest in the Internet, the high-profile | |
| criminal cases, and romanticized images of hackers may fuel their popularity. | |
| "I think it's a limited market, although given the media's insatiable | |
| appetite for Internet hype, these movies might do well," said Kevin | |
| Benjamin, analyst with Robertson Stephens. | |
| TriStar Pictures and Columbia Pictures, both divisions of Sony Corp., are | |
| developing movies based on technology or computer crime, executives said. | |
| TriStar is working on a movie called "Johnny Mnemonic," based on a science | |
| fiction story by William Gibson, about a futuristic high-tech "data courier" | |
| with confidential information stored in a memory chip implanted in his head. | |
| Sony also has plans for a CD-ROM game tied to the movie, also called | |
| "Johnny Mnemonic," developed by Sony Imagesoft, a division of Sony | |
| Electronic Publishing. | |
| Columbia Pictures has a movie in development called "The Net," starring | |
| Sandra Bullock, who played opposite Reeves in "Speed." Bullock plays a | |
| reclusive systems analyst who accidentally taps into a classified program and | |
| becomes involved in a murder plot. Sony Imagesoft has not yet decided whether | |
| it will develop a CD-ROM game version of "The Net." | |
| MGM/United Artists is said to be working on a movie called "Hackers," | |
| about a group of young computer buffs framed for a crime and trying to | |
| protect their innocence. An MGM/UA spokeswoman did not return calls seeking | |
| comment. | |
| Disney is also said to be working on a movie called f2f, (face to face), about | |
| a serial killer who tracks his victims on an online service. Disney also did | |
| not return calls. | |
| Bruce Fancher, once a member of the Legion of Doom hacker gang, worked as a | |
| consultant for "Hackers." He said, much to his dismay, hackers are becoming | |
| more popular and increasingly seen as romantic rebels against society. | |
| "I've never met one that had political motivation. That is really something | |
| projected on them by the mainstream media," Fancher said. | |
| ------------------------------------------------------------------------------- | |
| Film, Multimedia Project In The Works On Hacker Kevin Mitnick Mar 8, 1995 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Greg Evans (Variety) | |
| Miramax Films will produce a film and a multimedia project based on the | |
| hunt for accused cyber felon Kevin Mitnick, the computer criminal who | |
| captured the attention of the New York Times, the FBI and Hollywood. | |
| Less than a month after Mitnick's capture made the front page of Feb. 16's | |
| Times, Miramax has purchased the worldwide film and interactive rights to | |
| the hacker's tale. | |
| Rights were bought for an undisclosed amount from computer security expert | |
| Tsutomu Shimomura, who led the two-year pursuit of Mitnick, and reporter | |
| John Markoff, who penned the Times' article. | |
| Markoff will turn his article into a book, which will be developed into a | |
| script. "Catching Kevin: The Pursuit and Capture of America's Most Wanted | |
| Computer Criminal" will be published later this year by Miramax's sister | |
| company, Hyperion Books (both companies are owned by the Walt Disney Co.). | |
| Miramax also plans to work with Shimomura to develop an interactive | |
| project, most likely a CD-ROM, based on "Catching Kevin," according to | |
| Scott Greenstein, Miramax's senior VP of motion pictures, music, new media | |
| and publishing. He represented Miramax in the deal. | |
| No director has been attached to the film project yet, although the company | |
| is expected to make "Kevin" a high priority. | |
| The story attracted considerable studio attention. In a statement, Shimomura | |
| said he went with Miramax "based on their track record." | |
| Shimomura and Markoff were repped by literary and software agent John Brockman | |
| and Creative Artists Agency's Dan Adler and Sally Willcox. | |
| ------------------------------------------------------------------------------- | |
| Hack-Happy Hollywood Mar 1995 | |
| ~~~~~~~~~~~~~~~~~~~~ | |
| (AP News Sources) | |
| Not since the heyday of Freddy Krueger and Jason Voorhees has hacking been | |
| so in demand in Hollywood. | |
| Only this time, it's computer hackers, and the market is becoming glutted | |
| with projects. In fact, many studio buyers were reluctant to go after the | |
| screen rights to the story of computer expert Tsutomu Shimomura, who tracked | |
| down the notorious cyber-felon Kevin Mitnick. | |
| The rights were linked to a New York Times article by John Markoff, who's | |
| turning the story into a book. | |
| But Miramax wasn't daunted by any competing projects, and snapped up the | |
| rights. | |
| "We're talking about a ton of projects that all face the same dilemma: How | |
| many compelling ways can you shoot a person typing on a computer terminal?" | |
| said one buyer, who felt the swarm of projects in development could face | |
| meltdown if the first few films malfunction. | |
| The first test will come late summer when United Artists opens "Hackers," | |
| the Iain Softley-directed actioner about a gang of eggheads whose hacking | |
| makes them prime suspects in a criminal conspiracy. | |
| Columbia is currently in production on "The Net," with Sandra Bullock as | |
| an agoraphobic computer expert who's placed in danger when she stumbles onto | |
| secret files. | |
| Touchstone has "The Last Hacker," which is closest in spirit to the Miramax | |
| project. It's the story of hackmeister Kevin Lee Poulson, who faces a hundred | |
| years in prison for national security breaches and was so skilled he disabled | |
| the phones of KIIS-FM to be the 102nd (and Porsche-winning) caller. He was | |
| also accused of disabling the phones of "Unsolved Mysteries" when he was | |
| profiled. | |
| Simpson/Bruckheimer is developing "f2f," about a serial killer who surfs | |
| the Internet for victims. | |
| Numerous other projects are in various stages of development, including | |
| MGM's "The Undressing of Sophie Dean" and the Bregman/Baer project | |
| "Phreaking," about a pair of hackers framed for a series of homicidal | |
| computer stunts by a psychotic hacker. | |
| ------------------------------------------------------------------------------- | |
| A Devil Of A Problem Mar 21, 1995 | |
| ~~~~~~~~~~~~~~~~~~~~ | |
| by David Bank (Knight-Ridder) | |
| Satan is coming to the Internet and might create havoc for computer networks | |
| around the world. | |
| The devilish software, due for release April 5, probes for hidden flaws | |
| in computer networks that make them vulnerable to intruders. The tool could | |
| be used by mischievous pranksters or serious espionage agents to attack and | |
| penetrate the computer networks of large corporations, small businesses or even | |
| military and government installations. | |
| None of the potential problems has swayed the authors of the program, Dan | |
| Farmer, the "network security czar" of Silicon Graphics Inc. in Mountain | |
| View, California, and Wietse Venema, his Dutch collaborator. | |
| "Unfortunately, this is going to cause some serious damage to some people," | |
| said Farmer, who demonstrated the software this month in his San Francisco | |
| apartment. "I'm certainly advocating responsible use, but I'm not so | |
| naive to think it won't be abused." | |
| "It's an extremely dangerous tool," said Donn Parker, a veteran computer | |
| security consultant with SRI International in Menlo Park, California. "I | |
| think we're on the verge of seeing the Internet completely wrecked in a sea | |
| of information anarchy." | |
| Parker advocates destroying every copy of Satan. "It shouldn't even be | |
| around on researcher's disks," he said. | |
| ------------------------------------------------------------------------------- | |
| Satan Claims Its First Victim Apr 7, 1995 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Dwight Silverman (Houston Chronicle) | |
| The cold hand of Satan knocked on the electronic door of Phoenix Data Systems | |
| Wednesday night, forcing the Clear Lake-based Internet access provider to | |
| temporarily shut down some computers. | |
| "These guys can come in and literally take control, get super-user status on | |
| our systems," said Bill Holbert, Phoenix's owner. "This is not your | |
| average piece of shareware." | |
| The attack began about 9 p.m. Wednesday, he said. Technicians watched for a | |
| while and then turned off the machines at Phoenix that provide "shell" | |
| accounts, which allow direct access to a computer's operating system. | |
| The system was back up Thursday afternoon after some security modifications, | |
| he said. | |
| "It actually taught us a few things," Holbert said. "I've begun to believe | |
| that no computer network is secure." | |
| ------------------------------------------------------------------------------- | |
| Fraud-free Phones Feb 13, 1995 | |
| ~~~~~~~~~~~~~~~~~ | |
| by Kirk Ladendorf (Austin American Statesman) p. D1 | |
| Texas Instruments' Austin-based Telecom Systems business came up with an | |
| answer to cellular crime: a voice-authorization service. | |
| The technology, which TI showed off at the Wireless '95 Convention & | |
| Exposition in New Orleans this month, was adapted from a service devised | |
| for long-distance telephone companies, including Sprint. | |
| TI says its voice-recognition systems can verify the identity of cellular | |
| phone users by reading and comparing their "voice prints," the unique sound | |
| patterns made by their speech. | |
| The TI software uses a statistical technique called Hidden Markov Modeling | |
| that determines the best option within a range of choices as it interprets a | |
| voice sample. | |
| If the verification is too strict, the system will reject bona fide users | |
| when their voice patterns vary too much from the computer's comparison sample. | |
| If the standard is too lenient, it might approve other users whose voice | |
| patterns are similar to that of the authentic user. | |
| The system is not foolproof, TI officials said, but beating it requires far | |
| more time, effort, expense and electronics know-how than most cellular | |
| pirates are willing to invest. | |
| ------------------------------------------------------------------------------- | |
| Nynex Recommends Cellular Phone Customers Use A Password Feb 9, 1995 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Aaron Zitner (The Boston Globe) | |
| Nynex Corp. is asking cellular telephone customers to dial an extra four | |
| digits with each phone call in an attempt to foil thieves who steal an | |
| estimated $1.3 million in cellular phone services nationwide each day. | |
| Nynex Mobile Communications Co., has been "strongly recommending" since | |
| November that all new customers adopt a four-digit personal identification | |
| number, or PIN. This week, the company began asking all its customers to use | |
| a PIN. | |
| The Cellular Telecommunications Industry Association estimates that "phone | |
| thieves" made $482 million in fraudulent calls last year, equal to 3.7 | |
| percent of the industry's total billings. Thieves can make calls and bill | |
| them to other people by obtaining the regular 10-digit number assigned to a | |
| person's cellular phone, as well as a longer electronic serial number that is | |
| unique to each phone. | |
| Thieves can snatch those numbers from the air using a specialized scanner, | |
| said James Gerace, a spokesman for Nynex Mobile Communications. Even when no | |
| calls are being made, cellular phones broadcast the two numbers every 30 | |
| seconds or so to notify the cellular system in case of incoming calls, he said. | |
| When customers adopt a PIN, their phone cannot be billed for fraudulent calls | |
| unless the thieves also know the PIN, Gerace said. He said the phone broadcasts | |
| the PIN at a different frequency than the phone's electronic serial number, | |
| making it hard for thieves to steal both numbers with a scanner. | |
| Gerace also noted that customers who become victims of fraud despite | |
| using a PIN can merely choose a new number. Victims who do not use a PIN | |
| must change their phone number, which requires a visit to a cellular phone | |
| store to have the phone reprogrammed, he said. | |
| [ Uh, wait a second. Would you use touch-tone to enter this PIN? Woah. | |
| Now that's secure. I've been decoding touch-tone by ear since 1986. | |
| What a solution! Way to go NYNEX! ] | |
| ------------------------------------------------------------------------------- | |
| Kemper National Insurance Offers PBX Fraud Feb 3, 1995 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| (Knight-Ridder News Sources) | |
| Kemper National Insurance Cos. now offers inland marine insurance | |
| coverage to protect Private Branch Exchange (PBX) systems against toll fraud. | |
| "Traditional business equipment policies companies buy to protect their PBX | |
| telephone systems do not cover fraud," a Kemper spokesman said. | |
| The Kemper policy covers both the equipment and the calls made illegally | |
| through the equipment. | |
| The coverage is for the PBX equipment, loss of business income from missed | |
| orders while the PBX system is down, and coverage against calls run up on | |
| an insured's phone systems. The toll fraud coverage is an option to the PBX | |
| package. | |
| ------------------------------------------------------------------------------- | |
| New Jersey Teen To Pay $25,000 To Microsoft, Novell Feb 6, 1995 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| The Wall Street Journal | |
| Microsoft Corp. and Novell Inc. reached a court-approved settlement with | |
| a New Jersey teenager they accused of operating a computer bulletin board | |
| that illegally distributed free copies of their copyrighted software programs. | |
| Equipped with a court order, employees of the two companies and federal | |
| marshals raided the young man's house in August, seizing his computer | |
| equipment and shutting down an operation called the Deadbeat Bulletin Board. | |
| Under the settlement announced Friday, the teenager agreed to pay $25,000 to | |
| the companies and forfeit the seized computer equipment. In return, the | |
| companies agreed to drop a copyright infringement lawsuit brought against | |
| him in federal court in New Jersey, and keep his identity a secret. | |
| Redmond-based Microsoft and Novell, Provo, Utah, opted to take action against | |
| the New Jersey man under civil copyright infringement laws rather than pursue | |
| a criminal case. The teenager had been charging a fee to users of the Deadbeat | |
| Bulletin Board, which was one reason the companies sought a cash payment, a | |
| Novell spokesperson said. The two software producers previously settled a | |
| similar case in Minneapolis, when they also seized the operator's equipment | |
| and obtained an undisclosed cash payment. | |
| "About 50 groups are out there engaging in piracy and hacking," said Edward | |
| Morin, manager of Novell's antipiracy program. He said they operate with | |
| monikers such as Dream Team and Pirates With Attitude. | |
| ------------------------------------------------------------------------------- | |
| Software Piracy Still A Big Problem In China Mar 6, 1995 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Jeffrey Parker (Reuters News Sources) | |
| Sales of pirated software have reached a fever pitch in Beijing in the week | |
| since U.S. and Chinese officials defused a trade war with a broad accord to | |
| crush such intellectual property violations. | |
| In the teeming "hacker markets" of the Zhongguancun computer district near | |
| Beijing University, there were few signs of any clampdown Monday, the sixth | |
| day of a "special enforcement period" mandated by the Feb. 26 Sino-U.S. pact. | |
| "The police came and posted a sign at the door saying software piracy is | |
| illegal," said a man selling compact disk readers at bustling Zhongguancun | |
| Electronics World. | |
| "But look around you. There's obviously a lot of profit in piracy," he said. | |
| A score of the market's nearly 200 stalls openly sell compact disks loaded | |
| with illegal copies of market-leading desktop software titles, mostly the | |
| works of U.S. firms. | |
| Cloudy Sky Software Data Exchange Center offers a "super value" CD-ROM for | |
| 188 yuan ($22) that brims with 650 megabytes of software from Microsoft, | |
| Lotus and other U.S. giants whose retail value is about $20,000, nearly | |
| 1,000 times higher. | |
| ------------------------------------------------------------------------------- | |
| Internet Story Causes Trouble Feb 7, 1995 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| (AP News Sources) | |
| The University of Michigan has refused to reinstate a sophomore suspended | |
| last week after he published on the Internet a graphic rape and torture | |
| fantasy about a fellow student. | |
| The student's attorney told The Detroit News on Monday that the | |
| university is waiting until after a formal hearing to decide if the | |
| 20-year-old student is a danger to the community. A closed hearing | |
| before a university administrator is scheduled for Thursday. | |
| "Our position is that this is a pure speech matter," said Ann | |
| Arbor attorney David Cahill. "He doesn't know the girl and has | |
| never approached her. He is not dangerous. ... He just went off | |
| half-cocked." | |
| The Jan. 9 story was titled with the female student's last name | |
| and detailed her torture, rape and murder while gagged and tied to | |
| a chair. | |
| The student also may face federal charges, said FBI Special | |
| Agent Gregory Stejskal in Ann Arbor. Congress recently added | |
| computer trafficking to anti-pornography laws. | |
| The student was suspended Thursday by a special emergency order | |
| from university President James J. Duderstadt. His identification | |
| card was seized and he was evicted from his university residence | |
| without a hearing. | |
| University spokeswoman Lisa Baker declined to comment. | |
| ------------------------------------------------------------------------------- | |
| Snuff Porn On The Net Feb 12, 1995 | |
| ~~~~~~~~~~~~~~~~~~~~~ | |
| by Philip Elmer-Dewitt (Time) | |
| Jake Baker doesn't look like the kind of guy who would tie a woman by her | |
| hair to a ceiling fan. The slight (5 ft. 6 in., 125 lbs.), quiet, bespectacled | |
| sophomore at the University of Michigan is described by classmates as gentle, | |
| conscientious and introverted. | |
| But Baker has been doing a little creative writing lately, and his words have | |
| landed him in the middle of the latest Internet set-to, one that pits a | |
| writer's First Amendment guarantees of free speech against a reader's right | |
| to privacy. Now Baker is facing expulsion and a possible sentence of five | |
| years on federal charges of sending threats over state lines. | |
| It started in early December, when Baker composed three sexual fantasies and | |
| posted them on alt.sex.stories, a newsgroup on the Usenet computer network | |
| that is distributed via the Internet. Even by the standards of alt.sex.stories, | |
| which is infamous for explicit depictions of all sorts of sex acts, Baker's | |
| material is strong stuff. Women (and young girls) in his stories are | |
| kidnapped, sodomized, mutilated and left to die by men who exhibit no remorse. | |
| Baker even seemed to take pleasure in the behavior of his protagonists and | |
| the suffering of their victims. | |
| The story that got Baker in trouble featured, in addition to the ceiling fan, | |
| acts performed with superglue, a steel-wire whisk, a metal clamp, a spreader | |
| bar, a hot curling iron and, finally, a match. Ordinarily, the story might | |
| never have drawn attention outside the voyeuristic world of Usenet sex groups, | |
| but Baker gave his fictional victim the name of a real female student in one | |
| of his classes. | |
| Democratic Senator James Exon of Nebraska introduced legislation earlier | |
| this month calling for two-year prison terms for anyone who sends, or | |
| knowingly makes available, obscene material over an electronic medium. | |
| "I want to keep the information superhighway from resembling a red-light | |
| district," Exon says. | |