| ==Phrack Inc.== | |
| Volume Two, Issue 21, File 3 of 11 | |
| <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> | |
| <> <> | |
| <> Shadows Of A Future Past <> | |
| <> ~~~~~~~~~~~~~~~~~~~~~~~~ <> | |
| <> Part One Of The Vicious Circle Trilogy <> | |
| <> <> | |
| <> A New Indepth Look At A Re-Occurring Problem <> | |
| <> by Knight Lightning <> | |
| <> <> | |
| <> August 6, 1988 <> | |
| <> <> | |
| <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> | |
| The Problem? | |
| ~~~~~~~~~~~~ | |
| The fate of the entire modem community for the most part is based on the | |
| foundation of computer bulletin boards. These realms of information exchange | |
| have become centers of learning and trading various information for thousands | |
| of hackers across the United States and even the world. | |
| However, today's security consultants and law enforcement agencies are smarter | |
| than ever too and they know where to strike in order to do the most damage. | |
| The concept of creating a bulletin board for the purpose of catching hackers | |
| was unheard of until The Phoenix Phortress Incident of 1986. The creation of | |
| this bulletin board system enabled Sergeant Dan Pasquale of the Fremont Police | |
| Department the ability to penetrate the sacred barrier between the phreak/hack | |
| community and the rest of the world. | |
| This file will attempt to show the extent of this problem within the community | |
| and hopefully will lead readers to discover ways of protecting themselves from | |
| the many "venus fly traps" they are likely to encounter. Articles presented in | |
| this file are specially edited reprints from past issues of Phrack World News. | |
| The Evidence - The unseen truths reside in the shadows of our past and future. | |
| ~~~~~~~~~~~~ | |
| The following is an excerpt from Phrack World News Issue III; | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Phoenix Phortress Stings 7 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| On March 5, 1986, the following seven phreaks were arrested in what has come to | |
| be known as the first computer crime "sting" operation. | |
| Captain Hacker \ Doctor Bob \ Lasertech \ The Adventurer | |
| The Highwayman \ The Punisher \ The Warden | |
| Many of them or other members of Phoenix Phortress belonged to these groups: | |
| High Mountain Hackers \ Kaos Inc. \ Shadow Brotherhood \ The Nihilist Order | |
| Of the seven, three were 15 years old; two were 16; one was 17; and one, 19. | |
| Their charges include: | |
| Several misdemeanors | |
| Trafficking in stolen long distance service codes | |
| Trafficking in stolen credit card numbers | |
| Possession of stolen property | |
| Possession of dangerous weapons (a martial arts weapon) | |
| Charging mail-order merchandise to stolen credit card numbers | |
| Selling stolen property | |
| Charging calls internationally to telephone service numbers | |
| Other phreak boards mentioned include: | |
| Bank Vault (Mainly for credit card numbers and tips on credit card scams) | |
| Phreakers Phortress (Mainly of course for phreak codes and other information) | |
| After serving search warrants early Wednesday morning on the seven Fremont | |
| residences where the young men lived with their parents, police confiscated at | |
| least $12,000 worth of equipment such as computers, modems, monitors, floppy | |
| disks, and manuals, which contained information ranging from how to make a | |
| bomb, to the access codes for the Merrill Lynch and Dean Witter Financial | |
| Services Firm's corporate computers. | |
| The sysop of Phoenix Phortress was The Revenger, who was supposedly Wally | |
| Richards, a 25 year-old Hayward man who "phreaked back east a little" in New | |
| Jersey. He took the phone number under the name of Al Davis. However he was | |
| really Sgt. Daniel Pasquale of the Fremont Police Department. | |
| When he introduced his board to other computer users, he called it the "newest, | |
| coolest, phreak board in town." | |
| Pasquale said he got the idea for the sting operation after a 16-year old | |
| arrested last summer for possession of stolen property "rolled them over | |
| (narced) He told us all about their operation." | |
| Pasquale used a police department Apple //e computer and equipment, with access | |
| codes and information provided by eight corporations, including Wells Fargo | |
| Bank, Sprint, and MCI. | |
| Pasquale said he received more than 2,500 calls from about 130 regular users | |
| around the country. The police started to make their first case three days | |
| after the board went up. | |
| "We had taken the unlisted phone number under the name Al Davis," Pasquale | |
| said. "In six days, these kids had the name on the bulletin board. I would | |
| have needed a search warrant to get that information." | |
| The arrests were made after five months of investigation by Dan Pasquale. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| The Phoenix Phortress incident only led to the arrest of seven hackers. | |
| However, at the same time it enabled the law enforcement agencies to gather | |
| information about over one hundred other hackers, systems being discussed, | |
| anything transmitted in electronic mail on the bulletin board, and most likely | |
| gave them information about hundreds of other hackers, bulletin boards, and so | |
| forth. | |
| The following is an excerpt from Phrack World News Issue VII; | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Maxfield Strikes Again August 20, 1986 | |
| ~~~~~~~~~~~~~~~~~~~~~~ | |
| Many of you probably remember a system known as "THE BOARD" in the Detroit 313 | |
| NPA. The number was 313-592-4143 and the newuser password was | |
| "HEL-N555,ELITE,3" (then return). It was kind of unique because it was run off | |
| of an HP2000 computer. | |
| On August 20, 1986 the following messages began to appear on THE BOARD; | |
| - - - - - - - - - - - - - - - - - - - - | |
| Welcome to MIKE WENDLAND'S I-TEAM sting board! | |
| (Computer Services Provided By BOARDSCAN) | |
| 66 Megabytes Strong | |
| 300/1200 baud - 24 hours. | |
| Three (3) lines = no busy signals! | |
| Rotary hunting on 313-534-0400. | |
| Board: General Information & BBS's | |
| Message: 41 | |
| Title: YOU'VE BEEN HAD!!! | |
| To: ALL | |
| From: HIGH TECH | |
| Posted: 8/20/86 @ 12.08 hours | |
| Greetings: | |
| You are now on THE BOARD, a "sting" BBS operated by MIKE WENDLAND of the | |
| WDIV-TV I-Team. The purpose? To demonstrate and document the extent of | |
| criminal and potentially illegal hacking and telephone fraud activity by the | |
| so-called "hacking community." | |
| Thanks for your cooperation. In the past month and a half, we've received all | |
| sorts of information from you implicating many of you to credit card fraud, | |
| telephone billing fraud, vandalism, and possible break-ins to government or | |
| public safety computers. And the beauty of this is we have your posts, your | |
| E-Mail and--- most importantly ---your REAL names and addresses. | |
| What are we going to do with it? Stay tuned to News 4. I plan a special | |
| series of reports about our experiences with THE BOARD, which saw users check | |
| in from coast-to-coast and Canada, users ranging in age from 12 to 48. For our | |
| regular users, I have been known as High Tech, among other ID's. John Maxfield | |
| of Boardscan served as our consultant and provided the HP2000 that this "sting" | |
| ran on. Through call forwarding and other conveniences made possible by | |
| telephone technology, the BBS operated remotely here in the Detroit area. | |
| When will our reports be ready? In a few weeks. We now will be contacting | |
| many of you directly, talking with law enforcement and security agents from | |
| credit card companies and the telephone services. | |
| It should be a hell of a series. Thanks for your help. And don't bother | |
| trying any harassment. Remember, we've got YOUR real names. | |
| Mike Wendland | |
| The I-team | |
| WDIV, Detroit, MI. | |
| Board: General Information & BBS's | |
| Message: 42 | |
| Title: BOARDSCAN | |
| To: ALL | |
| From: THE REAPER | |
| This is John Maxfield of Boardscan. Welcome! Please address all letter bombs | |
| to Mike Wendland at WDIV-TV Detroit. This board was his idea. | |
| The Reaper (a.k.a. Cable Pair) | |
| ------------------------------------------------------------------------------- | |
| John Maxfield was in general extremely proud of his efforts with THE BOARD and | |
| he said that a lot of the people he voice verified should have known it was | |
| him. According to John Maxfield, the only reason this sting board was put up | |
| was to show "What is currently happening in the phreak/hack community." He | |
| said no legal action will be taken at all, and besides, its fattened his | |
| "dossiers" on a lot of people! | |
| [The news stories for WDIV-TV 4 appeared in Phrack World News Issue IX.] | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Now, this is a classic example of people not learning from other people's | |
| mistakes. At some point in time prior to this incident, the number for THE | |
| BOARD was posted, it was given a lot of hype and eventually it drew in hackers | |
| to THE BOARD like flies to a spider web from which the unsuspecting users never | |
| broke free. | |
| That is the point I am trying to make -- today's phreak/hacker must learn to be | |
| more security conscious. What makes anyone think that they can trust someone | |
| just because they are running a bulletin board? This blind faith is what will | |
| be the downfall of many a hacker until they wise up and start paying attention | |
| to what they are doing. Safety first; the stakes in this game are a lot higher | |
| than no television after school for a week because once a hacker's phone number | |
| falls into the wrong hands, the law enforcement community or organizations like | |
| the Communications Fraud Control Association (CFCA) can find out everything | |
| about you. I know because I have seen their files and their hacker data base | |
| is so incredibly large and accurate...its unbelievable. | |
| The following is an excerpt from Phrack World News Issue XIV; | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Metalland South: Phreak BBS or MetaliFEDS Inc.? June 2, 1987 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Metalland South BBS, at 404-327-2327, was once a fairly well known bulletin | |
| board, where many respected members of the hack/phreak community resided. It | |
| was originally operated by two guys from Metal Communications, Inc., but it | |
| wasn't an MCI club board. The sysop was Iron Man and the co-sysop was Black | |
| Lord. Recently, it has come to the writer's attention, that MLS has come under | |
| new management, new policies, and possibly a new idea; Sting. | |
| Somewhere around September-October 1986, Iron Man removed all of the hack/ | |
| phreak related subboards as well as all G-philes from the system. He was | |
| apparently worried about getting busted. The last time this reporter spoke | |
| with him, Iron Man said he intended to put the hack/phreak subs back up. Then, | |
| not long after this conversation, the number was changed (The original number | |
| was 404-576-5166). | |
| A person using the alias of The Caretaker was made co-sysop and Iron Man would | |
| not reply to feedback. Everything was handled by The Caretaker [TC from now | |
| on]. TC did not allow any hack/phreak subs, but said he would put them up if | |
| the users would follow STRICT validation procedures. | |
| Strict validation on MLS includes: | |
| ^*^ Your Real Name | |
| ^*^ Your Address | |
| ^*^ Your Voice Phone Number | |
| ^*^ A Self-Addressed Envelope (in which he will send back with your account | |
| number and password.) | |
| It is obvious to see the ramifications here. A board or sysop gets busted and | |
| then makes a deal to turn over the board to some company or agency. To make | |
| sure that they get who they want, you have to give them all this info, and the | |
| only you can get a password is to let them mail it to you, thus guaranteeing | |
| that if something illegal is posted under that account, you are responsible, no | |
| ifs, ands, or buts. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| There was more information that went on to prove that Metalland South was | |
| indeed some kind of a trap or sting board and the whole aura of mystery | |
| surrounding this system made it not worth calling. | |
| Do not EVER give a sysop your address so he can send you your password. There | |
| is no need for such information as it can only hurt you severely and would not | |
| benefit the sysop in any way that would leave you unharmed. | |
| One other item concerning bulletin boards comes from PWN Issue V where mention | |
| of yet another hacker sting board named The Tunnel was discovered in Texas. | |
| And lets not forget about TMC's P-80, sysoped by Scan Man, that was responsible | |
| for the apprehension of Shawn of Phreakers Quest (also known as Capt. Caveman). | |
| However, do not fool yourself into believing that bulletin boards are the only | |
| places you are likely to run into trouble. Regular systems that you like to | |
| work with may be just as dangerous if you are not careful. Druidic Death and | |
| Celtic Phrost found this out the hard way on the Unix system at MIT as they | |
| nearly succumbed to the power of progressive entrapment which would have doomed | |
| them both. | |
| The following is an excerpt from Phrack World News Issue XI; | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| MIT Unix: Victim or Aggressor? January 23 - February 2, 1987 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Was the MIT system an innocent victim of hacker oppression or simply another | |
| trap to capture unsuspecting hackers in the act? | |
| It all started like this... | |
| [Some posts have been slightly edited to be relevant to the topic] | |
| ------------------------------------------------------------------------------ | |
| MIT | |
| Name: Druidic Death | |
| Date: 12:49 am Mon Jan 20, 1986 | |
| Lately I've been messing around on MIT's VAX in there Physics Department. | |
| Recently some one else got on there and did some damage to files. However MIT | |
| told me that they'll still trust us to call them. The number is: | |
| 617-253-XXXX | |
| We have to agree to the following or we will be kicked off, they will create a | |
| "hacker" account for us. | |
| <1> Use only GUEST, RODNEY, and GAMES. No other accounts until the hacker one | |
| is made. There are no passwords on these accounts. | |
| <2> Make sure we log off properly. Control-D. This is a UNIX system. | |
| <3> Not to call between 9 AM and 5 PM Eastern Standard Time. This is to avoid | |
| tying up the system. | |
| <4> Leave mail to GEORGE only with UNIX questions (or C). And leave our | |
| handles so he'll know who we are. | |
| ------------------------------------------------------------------------------ | |
| Unix | |
| Name: Celtic Phrost | |
| Date: 4:16 pm Mon Jan 20, 1986 | |
| Thanks Death for the MIT computer, I've been working on getting into them for | |
| weeks. Here's another you can play around with: | |
| 617/258-XXXX login:GUEST | |
| Or use a WHO command at the logon to see other accounts, it has been a long | |
| time since I played with that system, so I am unsure if the GUEST account still | |
| works, but if you use the WHO command you should see the GUEST account needed | |
| for applying for your own account. | |
| -Phrost | |
| ------------------------------------------------------------------------------ | |
| Unix | |
| Name: Celtic Phrost | |
| Date: 5:35 pm Mon Jan 20, 1986 | |
| Ok, sorry, but I just remembered the application account, its: OPEN | |
| Gawd, I am glad I got that off my chest! | |
| -(A relieved)Celtic Phrost. | |
| Also on that MIT computer Death listed, some other default accounts are: | |
| LONG MIKE GREG NEIL DAN | |
| Get the rest yourself, and please people, LEAVE THEM UNPASSWORDED! | |
| ------------------------------------------------------------------------------ | |
| MIT | |
| Name: Druidic Death 12 | |
| Date: 1:16 am Fri Jan 23, 1987 | |
| MIT is pretty cool. If you haven't called yet, try it out. Just PLEASE make | |
| sure you follow the little rules they asked us about! If someone doesn't do | |
| something right the sysop leaves the gripe mail to me. Check out my directory | |
| under the guest account just type "cd Dru". Read the first file. | |
| ------------------------------------------------------------------------------ | |
| MIT | |
| Name: Ctrl C | |
| Date: 12:56 pm Sat Jan 24, 1987 | |
| MIT Un-Passworded Unix Accounts: 617-253-XXXX | |
| ALEX BILL GAMES DAVE GUEST DAN GREG MIKE LONG NEIL TOM TED | |
| BRIAN RODNEY VRET GENTILE ROCKY SPIKE KEVIN KRIS TIM | |
| And PLEASE don't change the Passwords.... | |
| -=>Ctrl C<=- | |
| ------------------------------------------------------------------------------ | |
| MIT Again | |
| Name: Druidic Death | |
| Date: 1:00 pm Wed Jan 28, 1987 | |
| Ok people, MIT is pissed, someone hasn't been keeping the bargain and they | |
| aren't too thrilled about it. There were only three things they asked us to | |
| do, and they were reasonable too. All they wanted was for us to not compromise | |
| the security much more than we had already, logoff properly, not leave any | |
| processes going, and call only during non-business hours, and we would be able | |
| to use the GUEST accounts as much as we like. | |
| Someone got real nice and added themselves to the "daemon" group which is | |
| superusers only, the name was "celtic". Gee, I wonder who that could have | |
| been? I'm not pissed at anyone, but I'd like to keep on using MIT's computers, | |
| and they'd love for us to be on, but they're getting paranoid. Whoever is | |
| calling besides me, be cool ok? They even gave me a voice phone to chat with | |
| their sysops with. How often do you see this happen? | |
| A little perturbed but not pissed... | |
| DRU' | |
| ------------------------------------------------------------------------------ | |
| Tsk, Celtic. | |
| Name: Evil Jay | |
| Date: 9:39 am Thu Jan 29, 1987 | |
| Well, personally I don't know why anyone would want to be a superuser on the | |
| system in question. Once you've been on once, there is really nothing that | |
| interesting to look at...but anyway. | |
| -EJ | |
| ------------------------------------------------------------------------------ | |
| In trouble again... | |
| Name: Celtic Phrost | |
| Date: 2:35 pm Fri Jan 30, 1987 | |
| ...I was framed!! I did not add myself to any "daemon" group on any MIT UNIX. | |
| I did call once, and I must admit I did hang up without logging off, but this | |
| was due to a faulty program that would NOT allow me to break out of it, no | |
| matter what I tried. I am sure that I didn't cause any damage by that. | |
| -Phrost | |
| ------------------------------------------------------------------------------ | |
| Major Problems | |
| Name: Druidic Death | |
| Date: 12:20 pm Sat Jan 31, 1987 | |
| OK, major stuff going down. Some unidentified individual logged into the | |
| Physics Dept's PDP11/34 at 617-253-XXXX and was drastically violating the | |
| "agreement" we had reached. I was the one that made the "deal" with them. And | |
| they even gave me a voice line to talk to them with. | |
| Well, one day I called the other Physics computer, the office AT and discovered | |
| that someone created an account in the superuser DAEMON group called "celtic". | |
| Well, I was contacted by Brian through a chat and he told me to call him. Then | |
| he proceeded to nicely inform me that "due to unauthorized abuse of the system, | |
| the deal is off". | |
| He was cool about it and said he wished he didn't have to do that. Then I | |
| called George, the guy that made the deal and he said that someone who said he | |
| was "Celtic Phrost" went on to the system and deleted nearly a year's worth of | |
| artificial intelligence data from the nuclear fission research base. | |
| Needless to say I was shocked. I said that he can't believe that it was one of | |
| us, that as far as I knew everyone was keeping the deal. Then he (quite pissed | |
| off) said that he wanted all of our names so he can report us to the FBI. He | |
| called us fags, and all sorts of stuff, he was VERY!! [underline twice] PISSED! | |
| I don't blame him. Actually I'm not blaming Celtic Phrost, it very easily | |
| could have been a frame up. | |
| But another thing is George thinks that Celtic Phrost and Druidic Death are one | |
| and the same, in other words, he thinks that *I* stabbed him in the back. | |
| Basically he just doesn't understand the way the hacker community operates. | |
| Well, the deal is off, they plan to prosecute whoever they can catch. Since | |
| George is my best friend's brother I have not only lost a friend, but I'm | |
| likely to see some legal problems soon. Also, I can forget about doing my | |
| graduate work at MIT. Whoever did this damage to them, I hope you're happy. | |
| You really messed things up real nice for a lot of people. | |
| Celtic, I don't have any reason to believe you messed with them. I also have | |
| no reason to think you didn't. I'm not making an accusation against you, but | |
| WHOEVER did this, deserves to be shot as far as I'm concerned. Until this data | |
| was lost, they were on the verge of harnessing a laser-lithium produced form of | |
| nuclear fission that would have been more efficient than using the standard | |
| hydrogen. Well, back to the drawing board now. | |
| I realize that it's hard to believe that they would have data like this on this | |
| system. But they were quite stupid in many other areas too. Leaving the | |
| superuser account with no password?? Think about it. | |
| It's also possible that they were exaggerating. But regardless, damage seems | |
| to have been done. | |
| ------------------------------------------------------------------------------ | |
| MIT | |
| Name: Phreakenstein | |
| Date: 1:31 am Sun Feb 01, 1987 | |
| Heck! I dunno, but whoever it was, I think, should let himself (the s00per | |
| K-rad elyte d00d he is) be known. | |
| I wasn't on MIT, but it was pretty dumb of MIT to even let Hackers on. I | |
| wouldn't really worry though, they did let you on, and all you have to prove is | |
| that you had no reason to do it. | |
| ----Phreak | |
| ------------------------------------------------------------------------------ | |
| I wonder... | |
| Name: Ax Murderer 15 | |
| Date: 6:43 pm Sun Feb 01, 1987 | |
| I highly doubt that is was someone on this system. Since this is an elite | |
| board, I think all the users are pretty decent and know right and wrong things | |
| to do. Could be that one of the users on this system called another system and | |
| gave it out!?? | |
| Ax Murderer | |
| ------------------------------------------------------------------------------ | |
| It was stupid | |
| Name: Druidic Death 12 | |
| Date: 9:21 pm Sun Feb 01, 1987 | |
| It seems to me, or, what I gathered, they felt that there were going to be | |
| hackers on the system to begin with and that this way they could keep | |
| themselves basically safe. | |
| I doubt that it was Celtic Phrost, I don't think he'd be an asshole like that. | |
| But I can't say. When I posted, I was pretty pissed about the whole deal. I've | |
| calmed down now. Psychic Warlord said something to me voice the other day that | |
| made me stop and think. What if this was a set up right from the start? I | |
| mean, MIT won't give me specifics on just what supposedly happened, Celtic | |
| Phrost denies everything, and the biggest part of it is what George said to me. | |
| "We can forgive you for what you did to us if you'll promise to go straight and | |
| never do this again and just tell us who all of your friends are that are on | |
| the system". | |
| I didn't pay much attention to that remark at first, now I'm beginning to | |
| wonder... | |
| I, of course, didn't narc on anyone. (Who do I know??? hehe) | |
| DRU' | |
| ------------------------------------------------------------------------------ | |
| Comments... | |
| Name: Delta-Master | |
| Date: 7:15 am Mon Feb 02, 1987 | |
| It wouldn't surprise me if it was some kind of setup, it's been done before. | |
| Delta-Master | |
| [All posts in this article were taken from ShadowSpawn.] | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| The Solution | |
| ~~~~~~~~~~~~ | |
| What more is there to say? It definitely looks like there was a setup involved | |
| and it probably was not the first time and probably will not be the last time | |
| either. So how can you protect yourself? | |
| As far as the bulletin boards go. There is an unwritten rule somewhere that | |
| basically says that to be a good sysop, you first have to be a good user. If | |
| the sysop of some mystery board is not someone you have seen around for a long | |
| time, then I would not call. However, even if it is someone who has been | |
| around, references from someone you feel you can trust is a necessity. It all | |
| boils down to the reliability of the information and the persons involved. | |
| When dealing with systems like the MIT Unix, remember, if its too good to be | |
| true then most likely there will be something that you are not being told. | |
| Who in their right mind is going to give free accounts to an important system | |
| with delicate information to a group of hackers? Its crazy. | |
| This file will hopefully serve as an informative fresh look at an old game. To | |
| me, even if the time I spent putting this article together helps out or saves | |
| only one phreak/hacker, I feel my job has been done successfully. | |
| :Knight Lightning | |
| "The Future Is Forever" | |
| The Phoenix Project | |
| =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= | |