| ==Phrack Magazine== | |
| Volume Seven, Issue Forty-Eight, File 18 of 18 | |
| PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN | |
| PWN PWN | |
| PWN Phrack World News PWN | |
| PWN PWN | |
| PWN Compiled by Datastream Cowboy PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Security Software Thwarts Hackers July 23, 1996 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| (PRNewswire) | |
| World Star Holdings, Ltd. announced today that there have been approximately | |
| 5,000 unsuccessful attempts to break its proprietary VPAGE Internet security | |
| system. In order to further demonstrate the functionality of its technology, | |
| they Company has unveiled a new addition to the World Star Internet security | |
| challenge: "The World Star Cyberhospital." | |
| The company recently launched an online contest offering more than $50,000 in | |
| cash and prizes to the first person to break its security. | |
| [ THESE CHALLENGES ARE UNADULTERATED BULLSHIT. Phrack suggests you test | |
| something other than the fake, non-production demo contest system. How | |
| well does their software hold up in a real business environment? | |
| (in other words: THEIRS!?!!@$) | |
| World Star Holdings (NET-WORLDSTAR-MB-CA) | |
| 165 Garry Street | |
| Winnipeg, Manitoba R3C 1G7 | |
| CA | |
| Netname: WORLDSTAR-MB-CA | |
| Netnumber: 205.200.247.0 ] | |
| ----------------------------------------------------------------------------- | |
| Your Cellular Phone Number May Be Up For Grabs August 21, 1996 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Mimi Whitefield (Miami Herald) | |
| Electronic bandits have snatched cellular phone numbers from the airwaves and | |
| cloned phones used by the Miami office of the Secret Service. | |
| BellSouth Florida president Joe Lacher's phone has been cloned; Spero Canton, | |
| spokesman for BellSouth, has been a victim three times over. | |
| "The bums never sleep. They're everywhere," complained Bill Oberlink, | |
| regional president for AT&T Wireless Services. | |
| But the good news is that law enforcement agencies and cellular companies | |
| themselves are fighting back with a new arsenal of tools, technology and laws | |
| that make it easier to detect and prosecute cellular bandits. | |
| ----------------------------------------------------------------------------- | |
| Miami Fraud Squad Pursues Cellular Bandits August 12, 1996 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Audra D.S. Burch (Miami Herald) | |
| How's this for capitalism gone awry: Metro-Dade police nabbed a cellular | |
| bandit who was selling a $150 package deal -- $75 each for a stolen phone | |
| and number -- along with a 30-day guarantee on unlimited illegal air time. | |
| In a sting operation, police took him on the cut-rate offer. | |
| Thanks to the work of a special Metro-Dade Police Economic Crimes Bureau, the | |
| entrepreneurial cloner got a prison sentence. | |
| ----------------------------------------------------------------------------- | |
| Newer Technology Aids Fight Against Cellular Fraud August 21, 1996 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Mimi Whitefield (Miami Herald) | |
| New technology is on the side of cellular companies fighting telecom criminals | |
| who can rack up thousands of dollars in illegal charges before a consumer even | |
| knows he's been hit. | |
| New Jersey-based Bellcore, for example, has developed NetMavin software, | |
| which can detect fraudulent or unusual calling patterns within half an hour. | |
| "This is really going to screw the cloners up," said Roseanna DeMaria, an | |
| AT&T Wireless executive. | |
| ----------------------------------------------------------------------------- | |
| SPA Files Copyright Suit July 28, 1996 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~ | |
| (Reuters News) | |
| The Software Publishers Association said Sunday it filed a civil copyright | |
| infringement lawsuit against a Seattle man for illegal distribution of | |
| software on the Internet. | |
| The suit, which was filed July 23 in the U.S. District Court in Seattle, | |
| alleges that Max Butler illegally uploaded copyrighted software to a file | |
| transfer protocol site for distribution across the Internet, the trade | |
| association said. | |
| "This action is a warning to Internet users who believe they can infringe | |
| software copyrights without fear of exposure or penalty," said Sandra | |
| Sellers, Software Publisher's vice president of intellectual property | |
| education and enforcement. | |
| ----------------------------------------------------------------------------- | |
| The L0pht August, 1996 | |
| ~~~~~~~~~ | |
| by Steve G. Steinberg (Wired) p. 40 | |
| What do a group of hackers do when the equipment they've accumulated over | |
| years of dumpster diving no longer fits in their apartments? They get | |
| a l0pht. Since 1993, a core group of seven Boston-based hackers have rented | |
| a loft space for hacking, trading information about cellular phones security, | |
| and building things like a wireless Internet service using discarded | |
| microwave equipment. | |
| Now that all of them have day jobs in the industry, why do they keep at it? | |
| "For the girls and the text files, of course," says Mudge. | |
| [ HELL YES!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! ] | |
| ----------------------------------------------------------------------------- | |
| Cracking Down on the Outlaws of Cyberspace July 2, 1996 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by M.J. Zuckerman (USA Today) p. 4B | |
| What's it take to be America's top cybercop? | |
| "I was a hockey referee, so I'm used to being beaten up," suggests Jim | |
| Christy, who is among those most often mentioned for the title. And he's | |
| been at it for only a decade. | |
| Today, with the weighty title of Chief of Computer Crime Investigations | |
| and Information Warfare, he is one of 68 computer investigators in the | |
| Air Force Office of Special Investigations (OSI). | |
| Christy, a Baltimore native, stumbled into the computer field. After | |
| drawing No. 35 in the draft lottery during the Vietnam War, he joined the | |
| Air Force rather than waiting to be drafted. He spent the next four years | |
| as a computer key punch operator, followed by 13 years as a civilian working | |
| computers at the Pentagon. | |
| When he moved to OSI, Christy largely ceased his hands-on involvement with | |
| computers and systems. | |
| Since last fall, Christy has been on temporary assignment to the Senate | |
| Permanent Subcommittee on Investigations, helping them examine security | |
| in cyberspace. | |
| "I like working up on Capitol Hill, because you can make a difference," | |
| Christy says. | |
| ----------------------------------------------------------------------------- | |
| Hackers Penetrate Justice Department Home Page August 18, 1996 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| (AP News Wire) | |
| Internet hackers infiltrated the Justice Department's home page | |
| yesterday, altering the official web site to include swasticas, | |
| obscene pictures and lots of criticism of the Communications Decency Act. | |
| The official web site, which was turned off by government technicians | |
| when it was discovered, was changed to read "United States Department of | |
| Injustice," next to a red, black and white flag bearing a swastika. | |
| The page included color pictures of George Washington, Adolf Hitler, and a | |
| topless Jennifer Aniston. | |
| [ A link to a copy of the page is it http://www.fc.net/phrack/doj ] | |
| ----------------------------------------------------------------------------- | |
| Employment Prospect Grim for Hacker August 19, 1996 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| (AP News wire) | |
| Employment prospects are grim for Kevin Lee Poulsen, a computer whiz | |
| imprisoned five years for his cyberspace havoc. | |
| The 30-year-old hacker has been barred from getting near a computer for the | |
| next three years and he now fears selling cowboy boots at a Western store | |
| will be his only opportunity to make some money. | |
| "It's the only place where I've been greeted with a positive attitude," he | |
| said during an interview last week. "I can't get a job that I am qualified | |
| for, basically." | |
| On September 3, he goes to federal court in hopes of having some of the | |
| computer restrictions relaxed. | |
| ----------------------------------------------------------------------------- | |
| School Hires Student To Hack Into Computers August 22, 1996 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| (The Sun Herald) | |
| Students at Palisades Park's high school needed their transcripts to | |
| send off to colleges. But they were in the computer and no one who knew | |
| the password could be reached. So the school hired a 16-year-old hacker | |
| to break in. | |
| Superintendent George Fasciano was forced to explain to the School | |
| Board on Monday the $875 bill for the services of Matthew Fielder. | |
| ----------------------------------------------------------------------------- | |
| Feds aim low on hacker crackdown June 21, 1996 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Lewis Z. Koch (Upside Online News) | |
| Nineteen-year-old Christopher Schanot of St. Louis, Mo. has been | |
| languishing in a Federal jail since March 25, 1996, charged with four | |
| counts of computer hacking. He is not allowed to post bond, because | |
| Federal authorities contend he is "a computer genius intent on | |
| infiltrating computer systems of some of the largest companies and | |
| entities in the country," and because a jailhouse snitch claims Schanot | |
| bragged he would run away if he were released. He has never been charged | |
| with a crime or arrested before. | |
| Schanot's problems began after he ran away from home on May 30, 1995, | |
| taking some of his disks, a hard drive and personal items. According to a | |
| knowledgeable source close to Schanot, Chris felt his parents, especially | |
| his father Michael, didn't understand or respect him. | |
| Less rocky, it seems, was his relationship with Netta Gilboa, a | |
| 38-year-old woman living near Philadelphia. Gilboa is editor-in-chief and | |
| publisher of _Gray Areas_, a slick, text-heavy, irregular magazine that | |
| explores the "grey areas" of "alternative lifestyles and deviant | |
| subcultures." | |
| ----------------------------------------------------------------------------- | |
| City of London Surrenders To Cyber Gangs June 2, 1996 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| (Times of London) | |
| City of London financial institutions have paid huge sums to international | |
| gangs of sophisticated "cyber terrorists" who have amassed up to 400 million | |
| pounds worldwide by threatening to wipe out computer systems. | |
| A Sunday Times Insight investigation has established that British and | |
| American agencies are examining more than 40 "attacks" on financial | |
| institutions in London and New York since 1993. | |
| Victims have paid up to 13 million pounds a time after the blackmailers | |
| demonstrated their ability to bring trading to a halt using advanced | |
| "information warfare" techniques learnt from the military. | |
| According to the American National Security Agency (NSA), they have | |
| penetrated computer systems using "logic bombs" (coded devices that can | |
| be remotely detonated), electromagnetic pulses and "high emission radio | |
| frequency guns," which blow a devastating electronic "wind" through a | |
| computer system. | |
| The gangs are believed to have gained expertise in information warfare | |
| techniques from the American military, which is developing "weapons" | |
| that can disable or destroy computer hardware. Some are also known to | |
| have infiltrated banks simply by placing saboteurs on their payroll as | |
| temporary staff. | |
| ----------------------------------------------------------------------------- | |
| Credit Fraud on AOL | |
| ~~~~~~~~~~~~~~~~~~~ | |
| (AP Newswire) | |
| Two boys posed as billing representatives for an online service and stole | |
| at least 15 credit card numbers, and used those numbers to buy $15,000 | |
| worth of merchandise, from computer equipment to cymbals, police said. | |
| The two 16-year-olds were charged with 39 counts of possession of | |
| stolen property, theft and attempted fraud. They were released to the | |
| custody of their parents pending a Family Court hearing. | |
| Police believe the boys obtained a program designed by computer | |
| hackers to flimflam customers of America Online. It sends a message to | |
| users saying they will be cut off if they don't type in their name, | |
| credit card account number and computer service password. | |
| ----------------------------------------------------------------------------- | |
| FBI Survey Reveals Growth of Cybercrime May 6, 1996 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Rory J. O'Connor (San Jose Mercury News) | |
| Intruders are breaking into the nation's computer systems at an | |
| increasing rate and often with more nefarious motives than in the | |
| past, according to a survey co-sponsored by the FBI and a private | |
| group of computer security professionals. | |
| "What this shows is that the ante has been upped in cyberspace," said | |
| Richard Power, senior analyst of the Computer Security Institute in | |
| San Francisco, which conducted the survey. "As all manner of commerce | |
| moves into cyberspace, all manner of crime is moving there as well. | |
| It's no longer just vandalism." | |
| More than 40 percent of the 428 corporate, university and government | |
| sites that responded to the FBI survey reported at least one | |
| unauthorized use of their computers within the last 12 months, with | |
| some institutions reporting as many as 1,000 attacks in the period. | |
| It also appears that there's more computer crime for hire occurring, | |
| Power said, exploiting mainly older hackers who have graduated to | |
| making money off the skill they once used simply to establish bragging | |
| rights with their peers. He suggested that some of the hiring is being | |
| done by intelligence services of various governments, although he | |
| offered no proof. | |
| ----------------------------------------------------------------------------- | |
| University hacker to be hunted on the Internet April 27, 1996 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By Robert Uhlig (London Daily Telegraph) | |
| Computer experts at Cambridge University are using the Internet to hunt | |
| for a hacker who breached their security systems to access some of the | |
| world's most sensitive research information. | |
| The authorities had no indication that the hacker deleted or altered | |
| files, "although there was the potential for that", he said. Files | |
| belonging to world-renowned research scientists may have been viewed or | |
| copied, giving the hacker an insight into commercially and academically | |
| sensitive material. | |
| The hacker used a so-called sniffer program, which sat silently within the | |
| computer system for four weeks, monitoring its activities. This could | |
| allow the hacker to compile a list of all passwords to give him unhindered | |
| access to every computer on the university's network. "There was the | |
| potential to access any material on any computer anywhere on the | |
| university's network - ranging from electronic-mail to confidential | |
| research data," said Mr Stibbs. | |
| ----------------------------------------------------------------------------- | |
| Agents' Codes Exposed on Web March 16, 1996 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| By: Robert E. Kessler (Newsday) | |
| In an attempt to help (Ed) Cummings, and discredit the Secret Service, a Long | |
| Island-based hacker magazine last week launched a page on the World Wide | |
| Web publishing lists of Secret Service radio frequencies, photographs of | |
| agents, and codenames used by the agency for officials and buildings. | |
| Last year, Cummings, a 35-year-old native of Reading, Pa., pleaded | |
| guilty to federal charges in Philadelphia of possessing telecommunications | |
| equipment with intent to defraud and served a seven-month prison sentence. | |
| As a result of that conviction, last week Cummings was sentenced by a | |
| judge in Easton, Pa., north of Philadelphia, to serve a six- to 24-month | |
| sentence for violating probation after pleading no contest to a 1994 charge | |
| of tampering with evidence in another telephone hacking case. | |
| "Painting this guy as some white knight or someone who is standing up | |
| for free speech is wrong," said Kun. "He's engaged in fraud." | |
| Cummings' attorney, Kenneth Trujillo, could not be reached for comment. | |
| ----------------------------------------------------------------------------- | |
| Judge Denies Bond to Accused Hacker April 6, 1996 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Tim Bryant (St. Louis Post Dispatch) | |
| After another prisoner said accused computer hacker Christopher Schanot was | |
| planning a quick escape from his parents' home near High Ridge, a federal | |
| magistrate decided Friday to keep Schanot in jail. | |
| "He said he would wait a couple of days and take off," testified the | |
| prisoner, Gerald Esposito. | |
| Schanot's lawyer, federal public defender Norm London, told Davis that | |
| the alleged conversation between the young man and Esposito never happened. | |
| London, pointing out that Esposito has convictions for sexual assault, | |
| said the older prisoner had "made overtures" to jail officials about moving | |
| Schanot into Esposito's housing area. | |
| ----------------------------------------------------------------------------- | |
| Hacked Off! Government, Firms Fight Computer Intruders April 7, 1996 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Colleen Bradford (St. Louis Post Dispatch) | |
| Every day, hundreds of people in front of personal computers try to sneak | |
| into corporate and government computer networks. Sometimes they just look | |
| around, sometimes they destroy data and sometimes they steal personal and | |
| classified information. | |
| Two weeks ago, law enforcement officials charged an Argentine, 21, with | |
| using the Internet to illegally break into computer networks at Department | |
| of Defense installations, the NASA, Los Alamos National Laboratory and | |
| several universities. The Justice Department is now seeking Julio Cesar | |
| Ardita, who accessed confidential research files on aircraft design, radar | |
| technology and satellite engineering. | |
| And Chris Schanot, 19, from High Ridge, was in court in St. Louis last | |
| week on charges of hacking. Schanot, who fled to Pennsylvania from St. | |
| Louis after graduating from Vianney High School last May, is accused in a | |
| five-count indictment of breaking into the computers of Southwestern Bell, | |
| Bell Communications Research, Sprint and SRI International, a research and | |
| development contractor with government contracts. His trial is set for June | |
| 10. | |
| Schanot, like other hackers, likely became addicted to the feeling of | |
| power that cracking into a private computer network brings, said St. Louis | |
| County Police Sgt. Thomas Lasater, who has been investigating computer | |
| crime for seven years. | |
| "Normally these young hackers do not use the computers for financial | |
| gain," Lasater said. "It's just a challenge for them to see what they can | |
| conquer." | |
| ----------------------------------------------------------------------------- | |
| Mike and Terry's Dreadful Adventure | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Elizabeth Weise (AP Newswire) | |
| Terry Ewing was late. His plane left in an hour and he was cutting it close. | |
| But he couldn't tear himself away from his computer and the hole he'd hacked | |
| into the security network of Tower Records. | |
| He kept poking around, looking for something interesting to take to the | |
| hackers' convention he was going to. Finally, five minutes before the | |
| airport shuttle beeped in front of his apartment, he downloaded a file | |
| containing 1,700 credit card numbers. | |
| "We didn't expect anyone was watching," he said seven months later - | |
| through an inch of Plexiglas at the Sacramento County Jail. | |
| Ewing had had second thoughts about taking the Tower Records file with | |
| him on July 31, so he left it on his hard drive while he and Kim hit | |
| DefCon, the biggest of the West Coast hacker gatherings, for a weekend of | |
| bragging, hanging out and messing around. | |
| "We never guessed they were onto us. Their security was so weak it | |
| really blew," the 20-year-old Kim says by phone from the sixth floor of | |
| the same jail that held his friend. He is facing an 18-month sentence. | |