home *** CD-ROM | disk | FTP | other *** search
-
- *******************************************************
- * PHILE 5: HACKERS IN THE NEWS *
- *******************************************************
-
- Here are some news stories that have come to us from various
- sources. Some don't have the dates or papers, so if you send
- anything in the future, be sure to but the actual source
- including page numbers. A couple are a few years old, but we
- judge them important enough to repeat. We suspect that some of
- the providers of this stuff snatched them and didn't include the
- names of people who did the work of transcribing, so thanks to
- whoever originally uploaded them so others could share.
-
- +++++++++++++++++++++++++++++++++++++++++++++
- SOURCE: Chicago Tribune, July 27, 1989 (p. I-12)
- (from -=*JEDI*=-)
- ++++++++++++++++++++++++++++++++++++++++++++++
-
- ****************************************************
- * U.S. Indicts Cornel Graduate Student in Computer *
- * Virus Case *
- *****************************************************
-
-
-
- WASHINGTON (AP)--A Cornell Univesity graduate student was
- indicted Wednesday on a felony charge stemming from creation of a
- computer "virus" that paralyzed as many as 6,000 computers last
- fall.
-
- Robert Tappan Morris, 24, who has been suspended from the
- University for one year, was indicted by a federal grand jury in
- Syracuse, N.Y., on a single count of accessing without
- authorization at least four university and military computers.
-
- The computer-crime indictment charged that the virus, which
- spread acros a nationwide network of computers, prevented the
- authorized use of those computers by universities and military
- bases.
-
- The Justice Department said in a statement released in
- Washington that Morris was the first person to be charged under a
- provision of the Computer Fraud and Abuse Act of 1986 that
- outlaws unauthorized access to computers by hackers. The
- provision also makes it illegal to gain entry to a computer to
- damage or destroy files.
-
- The indictment comes after months of deliberations within the
- Justice Department over whether to charge Morris with a felony or
- a misdemeanor.
-
- Morris, of Arnold, Md., could face a five-year sentence and a
- $240000 fine if convicted of the charge.
-
- The law also provides for restitution of victims of a computer
- crime, but prosecutors did not specify how much damage was caused
- by the Nov. 2, 1988, incident that virtually shut down a
- military-university computer network used to transmit
- nonclassified data.
-
- An industry group estimated that as much as $96 million worth
- of damage was caused by the virus to 6,200 computers.
-
- But a Cornell University commission, which criticized Morris'
- actions as "reckless and impetuous," called this estimate
- "grossly exaggerated" and "self-serving."
-
- Officials said the virus did not erase any files of
- electronically stored data.
-
- The electronic program Morris allegedly used is called a virus
- because it spreads from computer to computer like a disease,
- blocking access to data contained in the machines.
-
- Defense attorney Thomas A. Gu idoboni (sic), said Morris "accepts
- this event as a step toward the final resolution of this matter."
- Morris "looks forward to his eventual vindication and his return
- to a normal life," Guidoboni said.
-
- As many as 6,000 university and military computers on the
- nationwise ARPANET network were infected by the virus that the
- Cornell University commission concluded was created by Morris.
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- <Source unknown: A chicago paper in August>
-
-
- A 17-year-old Michigan boy has been charged with posting
- stolen long-distance phone codes on a bulletin board system
- operated in his home. Brent G. Patrick, alias (handle) "Shadow
- Stalker" online, was arraigned this week on one count of
- stealing or retaining a financial transaction device without
- consent. Patrick was released on $2,500 bond, pending an Aug.
- 11 hearing. The youth faces a maximum of four years in prison
- and a $2,000 fine if convicted. His BBS "Wizard Circle" has
- been closed.
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- COMPUTERIST HELD WITHOUT BAIL
-
- (Dec. 16)
-
- A 25-year-old Californian who is described by a prosecutor as
- "very, very dangerous" and someone who "needs to be kept away
- from computers" has been ordered held without bail on charges he
- illegally accessed systems at England's Leeds University and
- Digital Equipment Corp.
-
- Kevin David Mitnick of Panorama City, Calif., is a convicted
- computer cracker who now is named in two new criminal fraud
- complaints in federal court in Los Angeles.
-
- US Magistrate Venetta Tassopulos granted the no-bail order late
- yesterday after Assistant US Attorney Leon Weidman, acknowledging
- it was unusual to seek detention in such cracking cases, said
- that since 1982 Mitnick also had illegally accessed systems at
- the L.A. police department, TRW Corp. and Pacific Telephone.
-
- "He could call up and get access to the whole world," Weidman
- said.
-
- Catherine Gewertz of United Press International quoted Weidman
- as saying Mitnick had served six months in juvenile hall for
- stealing computer manuals from a Pacific Telephone office in the
- San Fernando Valley and using a pay phone to destroy $200,000
- worth of data in the files of a northern California company.
-
- Later Mitnick also was convicted on charges he penetrated TRW's
- system and altered credit information on several people,
- including his probation officer.
-
- Weidman said Mitnick also used a ruse to obtain the name of the
- police detective investigating him for cracking when he was a
- student at Pierce College. Weidman said Mitnick telephoned the
- dean at 3 a.m., identified himself as a campus security guard,
- reported a computer burglary in process and asked for the name of
- the detective investigating past break-ins.
-
- In other episodes, Mitnick allegedly accessed police computers
- and impersonated police officers and judges to gain information.
-
- The latest complaints against Mitnick charge he:
-
- -:- Used a computer in suburban Calabasas, Calif., to access
- the Leeds University system in England.
-
- -:- Altered long-distance phone costs incurred by that activity
- in order to cover his tracks.
-
- -:- Stole proprietary Digital Equipment software valued at more
- than $1 million and designed to protect its data. Mitnick
- allegedly stored the stolen data in a University of
- Southern California computer.
-
-
-
-
- MITNICK MAY BE 1ST TRIED UNDER NEW FEDERAL COMPUTER CRIME LAW
-
- (Dec. 17) That 25-year-old California computerist being held
- without bail on fraud charges may be the first person in the
- nation to be prosecuted under a federal law against accessing
- an interstate computer network for criminal purposes.
-
- As reported yesterday (GO OLT-28), a federal magistrate decided
- on the unusual step of detaining Kevin David Mitnick of Panorama
- City, Calif., without bail after Assistant US Attorney Leon
- Weidman called Mitnick a "very, very dangerous" person who "needs
- to be kept away from computers."
-
- Mitnick, who was convicted of computer fraud as a teen-ager, now
- faces charges of causing $4 million in damage to a Digital
- Equipment Corp. computer, stealin university computers in Los
- Angeles and England. If convicted, he could receive up to 20
- years in prison and a $500,000 fine.
-
- The Associated Press reports that the FBI, the district
- attorney's office and the police just now are beginning to figure
- out Mitnick and his alleged high-tech escapades. Says Detective
- James K. Black, head of the L.A. police computer crime unit,
- "He's several levels above what you would characterize as a
- computer hacker. He started out with a real driving curiosity for
- computers that went beyond personal computers. ... He grew with
- the technology."
-
- At 17 Mitnick served six months in a youth facility after being
- convicted of cracking Pacific Bell's computer to alter telephone
- bills, penetrate other computers and steal $200,000 worth of data
- from a corporation.
-
- ****************************
- ****************************
-
- TWO TEENS ACCUSED OF CRACKING PHONES -- WHILE IN THE JAILHOUSE
-
- (Dec. 1) Two teen-agers in jail in San Jose, Calif., on
- computer cracking charges hav lost their jailhouse phone
- privileges. That's because authorities say the boys used a jail
- phone to make illegal collect calls.
-
- Police told United Press International they believe the two --
- Jonathan Yaantis, 18, and Michael Torrell, 19, both believed to
- be from Skagit County, Wash. -- made as many as three illegal
- calls from the county jail.
-
- UPI says the calls were made to a phone "bridge," or illegal
- conference-call network used by phone "phreakers," and billed to
- an unauthorized number in Virginia.
-
- "The first of the calls was made just two days after they were
- arrested," sa
-
- Yaantis and Michael Torrell were arrested Nov. 2 by a San Jose
- police office who spotted them at a phone booth near a
- convenience store. He said they were operating a laptop computer
- attached by wires with alligator clips to the phon wires. Police
- said insulation had been stripped from the phone wires to allow
- the connection.
-
- Allegedly, one or both of the boys subsequently made calls from
- the jail to the cracker network on Nov. 6 and 7, Flory said. He
- added, "Their telephone privileges were cut off because we didn't
- want to be accessories, since they a
-
- The wire service says the pair is charged with several
- felonies, including damaging the phone company's line, theft and
- illegal use of phone card charge numbers and possession of a
- device to avoid phone charges.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- THE MAXFIELD STING
-
- Presented by The Sensei -- Syndicate Investivations
- Authors among the Private Sector BBS
- 201-366-4431
-
- Aug. 31 1986
- ============================================================================
-
- Intro: The Syndicate Investigation is a Subformation of The Syndicate
- Syndicate Investigation gathers certain world events rather than Bell only
- information.
-
- ============================================================================
-
- The File:
-
-
- Here is a dump from THE BOARD, a sting BBS run by John Maxfield and sponsored
- by WDIV-TV in Detriot. After reading a message posted by Bill from RNOC I got
- worried about a BBS I was on in 313. This is what I got when I went on one las
- time.................
- Good afternoon, Sally Ride.
-
-
- Welcome to MIKE WENDLAND'S I-TEAM sting board!
- (computer services provided by BOARDSCAN)
- 66 Megabytes strong.
-
- 300/1200 baud - 24 hours.
-
- Three (3) lines = no busy signals!
- Rotary hunting on 313-534-0400.
-
-
-
- Board: General Information & BBS's
- Message: 41
- Title: YOU'VE BEEN HAD!
- To: ALL
- From: HI TECH
- Posted: 8/20/86 12.08 hours
-
- Greetings:
- You are now on THE BOARD, a sting"
- "sting" BBS operated by MIKE WENDLAND of the
- WDIV-TV I-Team. The purpose? To demonstrate and document the extent of
- criminal and potentially illegal hacking and telephone fraud activity by
- the so-called "hacking community."
- Thanks for your cooperation. In the past month and a half, we've
- received all sorts of information from you implicating many of you
- to credit card fraud, telephone billing fraud, vandalism and possible
- break-ins to government or public safety computers. And the beauty of
- this is we have your posts, your E-Mail and--- most importantly--- your
- REAL names and addresses.
- What are we going to do with it? Stay tuned to News 4. I plan a special
- series of reports about our experiences with THE BOARD, which saw users
- check in from coast-to-coast and Canada, users ranging in age from 12 to 48.
- For our regular users, I have been known as High Tech, among other ID's.
- John Maxfield of Boardscan served as our consultant and provided the
- <CR> = more, any key = quit. >
-
- HP2000 that this "sting" ran on. Through call forwarding and other
- conveniences made possible by telephone technology, the BBS operated
- remotely.
- here in the Detroit area.
- When will our reports be ready? In a few weeks. We now will be contacting
- many of you directly, talking with law enforcement and security agents from
- credit card companies and the telephone services.
- It should be a hell of a series. Thanks for your help.
- And don't bother trying any harassment. Remember, we've got YOUR real
- names....
-
- Mike Wendland
- The I-team
- WDIV, Detroit, MI.
-
- <CR> = more, any key = quit. >
-
-
- Board: General Information & BBS's
- Message: 42
- Title: BOARDSCAN
- To: ALL
- From: T.R.
- Posted: 8/20/86 12.54 hours
-
- This is John Maxfield of Boardscan. Welcome! Please address all letter
- bombs to Mike Wendland at WDIV-TV Detroit. This board was his idea.
-
- The Reaper (a.k.a. Cable Pair)
-
- <CR> = more, any key = quit. >
-
-
- Board: General Information & BBS's
- Message: 43
- Title: BOARDSCAN
- To: ALL
- From: A.M.
- Posted: 8/20/86 13.30 hours
-
- Hey guys, he really had us for awhile, for any of you who posted illegal shit,
- I just cant wait to see his little news article...cable pair, you have some so
- If youve noticed, just *about* everything on the subboards is *legal*!!!so fuc
- You wanna get nasty? Well go ahead, call my house! threaten me! haahaha so wha
- bbs?
- freedom of speech...you lose...
- ax murderer
-
-
- Well if that isn't enough to fry your cakes I don't know what is. A final word
- of caution to everyone. DON'T GIVE OUT YOUR REAL VOICE NUMBER TO ANYONE, EVEN
- IF IT'S TO GET ACCESS TO THE BEST BBS IN THE WORLD!!!!
-
-
- -------------------
-
-
-
- We all should have realized something was up when the instructions were
- 'HEL-5555.elite,3' as what hacker has enough access to an HP-3000 to run a BB
- on it?!? I even tried to get on,but like somebody said,when I called,I got no
- data,just a carrier.On all BBSs except this one,I use a pseudonym like
- 'Aloysius Smethley',or 'Waldo Snerd'!
- No BBS has a good reason to have your REAL name & address.Your # maybe,but
- they can always go to CN/A...
-
- Actually,I can't wait until it hits the fan-I want to hear about the thousands
- of amoral whiz kids with VIC-20s,running around,stealing millions,defrauding
- the innocent,and probably even giving-secrets-to-the-Russians!!
-
- /End of File//
-
- ============================================================================
-
- Private Sector
- Official 2600 Magazine Bulliten Board
- 201-366-4431
- 20 Megs / 24 Hrs a Day / 300-1200 Bps
-
- Fed's win a around this time, but. . . .they could at least
- get their terms straight.
-
-
- COMPUTER HACKER, 18,
- GETS PRISON FOR FRAUD
- (From Chicago Tribune, Feb 15, p. II-1)
-
- An 18-year old computer hacker from the (Chicago) North
- Side, convicted in the first tiral arising from the federal
- Computer Fraud and Abuse Act of 1986, was sentenced Tuesday to 9
- months in a federal juvenile prison in South Dakota and fined
- $10,000.
- U.S. District Court Judge Paul Plunket also sentenced the
- defendent, Herbert D. Zinn Jr., of 611 N. Artesian Ave., to
- 2 1/2 years of probation.
- Zinn was convicted Jan. 23 of breaking into AT&T and U.S.
- government computers in three states, illegally copying more than
- $1.2 million worth of coputer software, and of illegally
- publishing computer passwords on computer bulletin boards in
- Chicago and Texas.
- Computer bulletin boards are lists of public messes that any
- computer operator can read or add to by dialing a phone numer and
- plugging in his computer.
- "It is the government's view that what the defendant did is
- the result of contacts with people in these pirate bulletin
- boards," said Asasistant U.S. Atty. William J. Cook at the
- sentencing hearing.
- Cook labeled hackers who break into computers and share
- private information with computer bulletin boards as "nothing
- more than high-tech street gangs."
- Evidence was presented that federal agents executing search
- warrants in September on Zinn's home recovered 52 copyrighted AT&T
- computer programs that had been stolen from Bell Laboratory
- computers in Naperville and in Warren, N.J., as well as from U.S.
- government computers in Burlington, N.C.
- AT&T said the program had an estimated value of $1 million,
- according to the secret service.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- ---------------------------------------------
- SOURCE: Chicago Tribune, June 21, 1989 (p. II-4)
- (from -=*JEDI*=-)
- ----------------------------------------------
-
- ****************************************************
- * WOMAN INDICTED AS COMPUTER HACKER MASTERMIND *
- * (by John Camper) *
- *****************************************************
-
-
- A federal grand jury indicated Chicago woman Tuesday for
- allegedly masterminding a nationwide ring of computer hackers
- that stole more than $1.6 million of telephone and computer
- service from various companies.
-
- The indictment charges that Leslie Lynne Doucette, 35, of
- 6748 N. Ashland Ave, and 152 associates shared hundreds of stolen
- credit card numbers by breaking into corporate "voicemail"
- systems and turning them into computer bulletin boards.
-
- Voicemail is a computerized telephone answering machine.
- After a caller dials the machine's number he punches more numbers
- on his telephone to place messages in particular voicemail boxes
- or retrieve messages already there.
-
- The indictment charges that the hacker ring obtained more than
- $9,531.65 of merchandise and $1,453 in Western Union money orders
- by charging them to stolen bank credit card numbers.
-
- It says the group used stolen computer passwords to obtain
- $38,200 of voicemail servaice and stolen telephone credit card
- numbers to run up more than $286,362 of telephone service.
-
- But the biggest haul, more than $1,291,362, according to the
- indictment, represented telephone service that was stolen through
- the use of private branch exchange (BPX) "extender codes."
-
- A PBX system provides internl telephone service within a
- company. If a PBX system is equipped with an extender, a person
- can call the PBX system, punch in a code, and dial long distance
- at the expense of the company that owns the system.
-
- The only corporate victims of the alleged fraud named in the
- indictment are August Financial Corp. of Long Beach Calif., and
- A-1 Beeper Service of Mobile, Ala.
-
- Doucette has been held without bond in the Metropolitan
- Correctional Center since May 24, when she was arested on a raid
- on her apartment that netted 168 telephone credit card numbers
- and 39 extender codes, federal authorities said. The indictment
- does not name any members of the alleged ring, but authorities
- said the investigation is continuing.
-
- U.S. Atty. Anton R. Valukas said the indictment is the
- nation's first involving abuse of voicemail.
-
- "The proliferation of computer assisted telecommunications
- and the increasing reliance on this equipment by American and
- international business create a potential for serious harm," he
- said.
-
- Authorities said they discovered the scheme last December
- after a Rolling Meadows real estate broker reported that hackers
- had invaded his company' voicemail system and changed passwords.
-
- Authorities said they traced the calls into the Rolling
- Meadows voicemail system to telephones in private homes in
- Chicago, Columbus, Ohio, and suburban Detroit, Atlanta and
- Boston.
-
- Checks on those phones led them to voicemail systems in
- companies around the country, they said.
-
- >--------=====END=====--------<
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- <Source: NEWSWEEK -- date unknown>
-
- As you are travelling the dark and misty swamp you come across
- what appears to be a small cave. You light a torch and enter.
- You have walked several hundred feet when you stumble into a
- bright blue portal. . . With a sudden burst of light and a
- loud explosion you are swept into . . . DRAGONFIRE . . .
- Press Any Key if You Dare."
-
- You have programmed your personal computer to dial into
- Dragonfire, a computer bulletin board in Gainesville, Texas. But
- before you get any information, Dragonfire demands your name,
- home city and phone number. So, for tonight's tour of the
- electronic wilderness you become Montana Wildhack of San
- Francisco.
-
- Dragonfire, Sherwood Forest (sic), Forbidden Zone, Blottoland,
- Plovernet, The Vault, Shadowland, PHBI and scores of other
- computer bulletin boards are hangouts of a new generation of
- vandals. These precocious teenagers use their electronic skills
- to play hide-and-seek with computer and telephone security
- forces. Many computer bulletin boards are perfectly legitimate:
- they resemble electronic versions of the familiar cork boards in
- supermarkets and school corridors, listing services and providing
- information someone out there is bound to find useful. But this
- is a walk on the wild side, a trip into the world of underground
- bulletin boards dedicated to encouraging -- and making --
- mischief.
-
- The phone number for these boards are as closely guarded as a
- psychiatrist's home telephone number. Some numbers are posted on
- underground boards; others are exchanged over the telephone. A
- friendly hacker provided Dragonfire's number. Hook up and you
- see a broad choice of topics offered. For Phone Phreaks -- who
- delight in stealing service from AT&T and other phone networks .
- Phreakenstein's Lair is a potpourri of phone numbers, access
- codes and technical information. For computer hackers -- who
- dial into other people's computers -- Ranger's Lodge is
- chock-full of phone numbers and passwords for government,
- university and corporate computers. Moving through Dragonfire's
- offerings, you can only marvel at how conversant these teen-agers
- are with the technical esoterica of today's electronic age.
- Obviously they have spent a great deal of time studying
- computers, though their grammar and spelling indicate they
- haven't been diligent in other subjects. You are constantly
- reminded of how young they are.
-
- "Well it's that time of year again. School is back in session so
- let's get those high school computer phone numbers rolling in.
- Time to get straight A's, have perfect attendance (except when
- you've been up all night hacking school passwords), and messing
- up you worst teacher's paycheck."
-
- Forbidden Zone, in Detroit, is offering ammunition for hacker
- civil war --tips on crashing the most popular bulletin-board
- software. There also are plans for building black, red and blue
- boxes to mimic operator tones and get free phone service. And he
- re are the details for "the safest and best way to make and use
- nitroglycerine," compliments of Doctor Hex, who says he got it
- "from my chemistry teacher."
-
- Flip through the "pages." You have to wonder if this information
- is accurate. Can this really be the phone number and password
- for Taco Bell's computer? Do these kids really have the dial-up
- numbers for dozens of university computers? The temptation is
- too much. You sign off and have your computer dial the number
- for the Yale computer. Bingo -- the words Yale University appear
- on your screen. You enter the password. A menu appears. You
- hang up in a sweat. You are now a hacker.
-
- Punch in another number and your modem zips off the touch tones.
- Here comes the tedious side of all of this. Bulletin boards are
- popular. No vacancy in Bates Motel (named for Anthony Perkin's
- creepy motel in the movie "Psycho"); the line is busy. So are
- 221 B. Baker Street, PHBI, Shadowland and The Vault, Caesar's
- Palace rings and connects. This is different breed of board.
- Caesar's Palace is a combination Phreak board and computer store
- in Miami. This is the place to learn ways to mess up a
- department store's anti-shoplifting system, or make free calls on
- telephones with locks on the dial. Pure capitalism accompanies
- such anarchy, Caesar's Palace is offering good deals on disc
- drives, software, computers and all sorts of hardware. Orders
- are placed through electronic mail messages.
-
- 'Tele-Trial': Bored by Caesar's Palace, you enter the number for
- Blottoland, the board operated by one of the nation's most
- notorious computer phreaks -- King Blotto. This one has been
- busy all night, but it's now pretty late in Cleveland. The phone
- rings and you connect. To get past the blank screen, type the
- secondary password "S-L-I-M-E." King Blotto obliges, listing his
- rules: he must have your real name, phone number, address,
- occupation and interests. He will call and disclose the primary
- password, "if you belong on this board." If admitted, do not
- reveal the phone number or the secondary password, lest you face
- "tele-trial," the King warns as he dismisses you by hanging up.
- You expected heavy security, but this teenager's security is, as
- they say, awesome. Computers at the Defense Department and
- hundreds of businesses let you know when you've reached them.
- Here you need a password just to find out what system answered
- the phone. Then King Blotto asks questions -- and hangs up.
- Professional computer-security experts could learn something from
- this kid. He knows that ever since the 414 computer hackers were
- arrested in August 1982, law-enforcement officers have been
- searching for leads on computer bulletin boards.
-
- "Do you have any ties to or connections with any law enforcement
- agency or any agency which would inform such a law enforcement
- agency of this bulletin board?"
-
- Such is the welcoming message from Plovernet, a Florida board
- known for its great hacker/phreak files. There amid a string of
- valid VISA and MasterCard numbers are dozens of computer phone
- numbers and passwords. Here you also learn what Blotto means by
- tele-trial. "As some of you may or may not know, a session of
- the conference court was held and the Wizard was found guilty of
- some miscellaneous charges, and sentenced to four months without
- bulletin boards." If Wizard calls, system operators like King
- Blotto disconnect him. Paging through bulletin boards is a test
- of your patience. Each board has different commands. Few are
- easy to follow, leaving you to hunt and peck your way around. So
- far you haven't had the nerve to type "C," which summons the
- system operator for a live, computer-to-computer conversation.
- The time, however, however has come for you to ask a few
- questions of the "sysop." You dial a computer in Boston. It
- answers and you begin working your way throughout the menus. You
- scan a handful of dial- up numbers, including one for Arpanet,
- the Defense Department's research computer. Bravely tap C and in
- seconds the screen blanks and your cursor dances across the
- screen.
-
- Hello . . . What kind of computer do you have?
-
- Contact. The sysop is here. You exchange amenities and get
- "talking." How much hacking does he do? Not much, too busy. Is
- he afraid of being busted, having his computer confiscated like
- the Los Angeles man facing criminal changes because his computer
- bulletin board contained a stolen telephone-credit-card number?
- "Hmmmm . . . No," he replies. Finally, he asks the dreaded
- question: "How old are you?" "How old are YOU," you reply,
- stalling. "15," he types. Once you confess and he knows you're
- old enough to be his father, the conversation gets very serious.
- You fear each new question; he probably thinks you're a cop. But
- all he wants to know is your choice for president. The chat
- continues, until he asks, "What time is it there?" Just past
- midnight, you reply. Expletive. "it's 3:08 here," Sysop types.
- "I must be going to sleep. I've got school tomorrow." The cursor
- dances "*********** Thank you for Calling." The screen goes
- blank.
-
- Epilog:
-
- A few weeks after this reporter submitted this article to
- Newsweek, he found that his credit had been altered, his drivers'
- licence revoked, and EVEN HIS Social Security records changed!
- Just in case you all might like to construe this as a
- 'Victimless' crime. The next time a computer fouls up your
- billing on some matter, and COSTS YOU, think about it!
-
-
-
-
- This the follow-up to the previous article concerning the
- Newsweek reporter. It spells out SOME of the REAL dangers to ALL
- of us, due to this type of activity!
-
-
- The REVENGE of the Hackers
-
-
- In the mischievous fraternity of computer hackers, few things are
- prized more than the veil of secrecy. As NEWSWEEK San Francisco
- correspondent Richard Sandza found out after writing a story on
- the electronic unnerving. Also severe.... Sandza's report:
-
- "Conference!" someone yelled as I put the phone to my ear. Then
- came a mind-piercing "beep," and suddenly my kitchen seemed full
- of hyperactive 15-year-olds. "You the guy who wrote the article
- in NEWSWEEK?" someone shouted from the depths of static, and
- giggles. "We're going disconnect your phone," one shrieked.
- "We're going to blow up your house," called another. I hung up.
-
- Some irate readers write letters to the editor. A few call their
- lawyers. Hackers, however, use the computer and the telephone,
- and for more than simple comment. Within days, computer
- "bulletin boards" around the country were lit up with attacks on
- NEWSWEEK's "Montana Wildhack" (a name I took from a Kurt Vonnegut
- character), questioning everything from my manhood to my prose
- style. "Until we get real good revenge," said one message from
- Unknown Warrior, "I would like to suggest that everyone with an
- auto-l modem call Montana Butthack then hang up when he answers."
- Since then the hackers of America have called my home at least
- 2000 times. My harshest critics communicate on Dragonfire, a
- Gainesville, Texas, bulletin board where I am on teletrial, a
- video-lynching in which a computer user with grievance dials the
- board and presses charges against the offending party. Other
- hackers -- including the defendant --post concurrences or
- rebuttals. Despite the mealtime interruptions, all this was at
- most a minor nuisance; some was amusing, even fun.
-
- FRAUD: The fun stopped with a call from a man who identified
- himself only as Joe. "I'm calling to warn you," he said. When I
- barked back, he said, "Wait, I'm on your side. Someone has
- broken into TRW and obtained a list of all your credit-card
- numbers, your home address, social-security number and wife's
- name and is posting it on bulletin boards around the country." He
- named the charge cards in my wallet.
-
- Credit-card numbers are a very hot commodity among some hackers.
- To get one from a computer system and post it is the hacker
- equivalent of making the team. After hearing from Joe I visited
- the local office of the TRW credit bureau and got a copy of my
- credit record. Sure enough, it showed a Nov. 13 inquiry by the
- Lenox (Mass.) Savings Bank, an institution with no reason
- whatever to ask about me. Clearly some hacker had used Lenox's
- password to the TRW computers to get to my files (the bank has
- since changed the password).
-
- It wasn't long before I found out what was being done with my
- credit-card numbers, thanks to another friendly hacker who tipped
- me to Pirate 80, a bulletin board in Charleston, W.Va., where I
- found this: "I'm sure you guys have heard about Richard Stza or
- Montana Wildhack. He's the guy who wrote the obscene story about
- phreaking in NewsWeek Well, my friend did a credit card check on
- TRW . . . try this number, it' a VISA . . . Please nail
- this guy bad . . . Captain Quieg.
-
- Captain Quieg may himself be nailed. He has violated the Credit
- Card Fraud Act of 1984 signed by President Reagan on Oct. 12.
- The law provides a $10,000 fine and up to a 15-year prison term
- for "trafficking" in illegally obtained credit-card account
- numbers. He "friend" has committed a felony violation of the
- California computer-crime law. TRW spokeswoman Delia Fernandex
- said that TRW would "be more than happy to prosecute" both of
- them.
-
- TRW has good reason for concern. Its computers contain the
- credit histories of 120 million people. Last year TRW sold 50
- million credit reports on their customers. But these highly
- confidential personal records are so poorly guarded that
- computerized teenagers can ransack the files and depart
- undetected. TRW passwords -- unlike many others -- often print
- out when entered by TRW's customers. Hackers then look for
- discarded printouts. A good source: the trash of banks and
- automobile dealerships, which routinely do credit checks.
- "Everybody hacks TRW," says Cleveland hacker King Blotto, whose
- bulletin board has security system the Pentagon would envy.
- "It's the easiest." For her her part, Fernandez insists that TRW
- "does everything it can to keep the system secure
-
- In my case, however, that was not enough. My credit limits would
- hardly support big-time fraud, but victimization takes many
- forms. Another hacker said it was likely that merchandise would
- be ordered in my name and shipped to me -- just to harass me. I
- used to use credit-card numbers against someone I didn't like,"
- the hacker said. "I'd call Sears and have a dozen toilets
- shipped to his house."
-
- Meanwhile, back on Dragonfire, my teletrial was going strong.
- The charges, as pressed my Unknown Warrior, include "endangering
- all phreaks and hacks." The judge in this case is a hacker with
- the apt name of Ax Murderer. Possible sentences range from exile
- from the entire planet" to "kill the dude." King Blotto has taken
- up my defense, using hacker power to make his first pleading: he
- dialed up Dragonfire, broke into its operating system and
- "crashed" the bulletin board, destroying all of its messages
- naming me. The board is back up now, with a retrial in full
- swing. But then, exile from the electronic underground looks
- better all the time.
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
-