home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 81.8 KB | 1,734 lines |
- S W E D I S H H A C K E R S A S S O C I A T I O N
-
- presents
-
- <---------------------------------------------------------------------------->
- Released Editor: Mr Big
- Annual Year Protocol #4
- 28-Feb-92 (c) 1992
- <---------------------------------------------------------------------------->
-
-
-
- ---------
- - Index -
- ---------
-
- Introduction.............................................
- Voice of the Editor......................................
- Voice of the Members in S.H.A............................
- Inside story at court - S.H.A. member stands trial.......
- New S.H.A. board.........................................
- Royal Institute Of Technology............................
- S.H.A. Member busted.....................................
- Operation Sundevil, by Knight Lightning (guest writer)...
- Cray II Attacked by S.H.A................................
- Milnet and Goverment computers attacked by S.H.A.........
- Guidelines for System Operators..........................
- FSF/MIT Closing down the shop............................
- Short World Wide news....................................
- Blue Boxing..............................................
- Carding today............................................
- S.H.A's rules and advices for other hackers..............
- Demoralized Youth, by Tormentor (guest writer)...........
- S.H.A. Official Summer Party 1991........................
- Prof of S.H.A. Hacking Activities........................
- S.H.A. Body Guards.......................................
- Investigation of S.H.A...................................
- Back Chat................................................
- Messages to System Operators.............................
- The Future...............................................
- Releases 1992............................................
- How to contact S.H.A.....................................
- Editors final note.......................................
- Disclaimer...............................................
-
-
-
- ----------------
- - Introduction -
- ----------------
-
- Welcome to another annual year report from the only true hacking group
- in Sweden today, The Swedish Hackers Association.
-
- In this public release we have not included any detailed information about
- any attacks made by members of S.H.A. since the Police and other goverment
- agencies will receive this file in one way or another. Sorry if this cause
- any trouble, but we have our reasons and we are not interested in busting
- invidual members in S.H.A. Thank YOU for your cooperation.
-
- All companys and goverment agencies are welcome to contact us for
- assistance and help with their computer security.
-
- The following persons have been involved in the creation of this 4th
- protocol, and to whom we are gratefull to. Thank you and keep up the
- good work.
-
- Mr Big - S.H.A.
- Lixom Bah - S.H.A.
- Phearless - S.H.A.
- The Chief - S.H.A.
- D.O.C. - S.H.A.
- Tormentor - Guest Writer, Demoralized Youth
- Knight Lightning - Guest Writer
-
- Note: No handles of members in S.H.A. are public and only those who are
- writers and editors have their handles published in this file,
- since they are already known to the public and the Swedish Police.
-
-
-
- -----------------------
- - Voice of the Editor -
- -----------------------
-
- Yet another year of interesting events has passed away. I can still remember
- how it was one year ago; chaos and disorder, could the 3rd protocol be
- released in time? and so on. Imagine, we have already released 4 annual year
- protocols. 4 years of full documented hacking activity in Sweden by the very
- best hackers ever existed in our country. Let it stay that way.
-
- Our protocols used to be released in January/February each year, but this
- time we have waited to release the material due to a trial against one of
- our members. (we don't want to support the prosecutor with more information,
- do we?). One of the main issues in this protocol will be the trial which was
- held the 8th of January 1992. That should be included in the 5th protocol,
- but we just couldn't wait ONE YEAR to publish it.
-
- Another thing that has happend during the year is the bust of a couple of
- SHA members. The "main" bust was at the 3rd of May 1991, when a small part
- of our group were visiting the Royal Institute of Technology.
- This resulted in some police searches at our houses one month later, and we
- were brought for interrogation.
-
- From a hacking point of view, 1991 has been a successful year of penetrated
- computers, long nights and a lot of new knowledge.
-
- The Swedish Police is currently investigating the organization S.H.A.
- (we have indications that points in that direction. More about this
- later) Because of that, we have to be very careful about what we write in
- this stupid file. We have even thought of cancel this release but has
- finally reached the decicion to continue, and take the consequences.
- We have written it so nothing can be held against anyone in SHA in court,
- (that's why you might find it a little bit odd.)
-
- This whole protocol wasn't written overnight at the end of 1991.
- We have been writing and re-writing it time after time during this year
- until we decided that THIS is what we want to release to the public.
-
- We will try to cover everything from real system hacking news to intervjues
- with some of the virus creators in Sweden.
-
- A major drawback for SHA was in the summer 1991 when the Swedish police
- raided one of our members place and confiscated his computer system which
- where hosting one of our bulletin boards we where running.
-
- Tragic but not a disaster.
-
-
- Atlast, I would like to say:
-
- - All events and people in this file are all fiction and creation of our
- fantasies and any matching with real people and events are only
- coinsident as any other story or fiction.
-
- But I'm sorry that I can't. All stuff are true and all events have taken
- place. Anyway, nothing in this file can be tied to any invidual members
- of S.H.A. and S.H.A. as an organization can not be blamed for actions taken
- by invidual members of S.H.A.
-
- This protocol are also distributed as a paper magazine in about 5000 copies.
- So if the goverment are trying to seize our equipment used for the
- production of this protocol, they are violating federal laws about press
- freedom and freedom of speech.
-
-
- So basically:
-
- - Goverment agencies, you are shit out of luck.
-
- We hope you will enjoy this protocol, and find it interesting.
-
- If you haven't read any of our previous protocols. (1989, 1990 and 1991)
- I suggest you try to get hold of some copies. The same goes for our other
- releases about Hacking, Phreaking and Carding.
-
-
-
-
- ----------------------------------
- - Voice of the members in S.H.A. -
- ----------------------------------
-
- Here have the members in S.H.A. their "freedom of speech". They can write
- anonymously or by their handles, it is up to them. But I guess they will
- write anonymously. Who can blame them? <grin>
- /Ed
-
-
- --> Written by a anonymous member who do not want to be busted
-
- Another year has passed with great hacking events. Many new computer systems
- and operating systems have been penetrated. One slight drawback has been the
- interest the police is giving S.H.A., but lucky as some people are,
- (read me), they are not near of knowing all the people in S.H.A. and has
- only those that are already known. Mouhaha, what suckers, they can't even
- put two and two together. Anyway, maybe the luck will change, but until then
- I will continue to make progress in the hacking field of experience.
- I have even discovered that VMS is a great OS and not as secured as Digital
- Equipment are trying to tell every one. And one neat feature with VMS is
- that many goverment and military computers are running under VMS since it
- is secured!! Mouhaha... they should know better. Anyway, I hope that you
- hackers out there also have had a very good year. See ya on IRC.
-
-
-
- --> Written by a anonymous member who do not want to be busted
-
- I would just like to say this to the persons who are currently involved
- in monitoring us and documenting our lives.
-
- - Fuck with us and we will fuck with all the computers we can find, and
- we will create total chaos and disorder.
-
- This is not a threat, would I make threats? no, I just make promisses.
- Anyway, I hope that you hackers out there reading this protocol will have
- a great year without interference from goverment agencies. FUCK THEM!
-
-
-
- --> Written by a anonymous member who do not want to be busted
-
- I can still remember those warm days in May when I spent most of my time
- on IRC, day and nights. I can remember the days in August as if it was
- yesterday. Breaking into system after system, and roaming around on the
- internet.
-
- NASA was an easy target and some of their computers were successfully
- penetrated and NASA Security began to scream.
-
- Security? What a joke! It almost seems that no one out there have learned
- enough to secure their system. I adore SunOS since new holes are found
- every day, mouhahaha. Many system operators are stupid and don't know how
- to handle a system to secure it. They do almost every mistake a system
- operator can do, from having accounts without password to standard accounts.
- Are only hackers reading DDN bulletins and CERT bug reports?
- Sometimes I wonder. Gee, I've even found systems that have security holes
- that was exploited back in 1986. Jesus! What are they thinking? Well, if
- they are that stupied, they have to face the consequences. BTW, try they
- following for testing the security: "rm /* -rf" If they have configured
- the system incorrectly a catastophy would be the result. <grin>
-
-
-
- --> Written by a anonymous member who do not want to be busted
-
- 1991 - The year that passed without notice
-
- A Personal View
-
- If you were to place 1991 in the scale of Hacking events, it must come last.
- Last year was one of the most dull years for me. I compare it with the year
- 1990, and find that the first months of 1991 were pretty good, and then
- everything went down the drain. No news, no new hackers, nothing interesting
- happened. Then we had the internal divergent opinions that led to one thing
- or another which you might already know. But still nothing new in the
- hacking field.
-
- I'm not sure what I'm supposed to write in this, the 4th S.H.A. Protocol,
- but I'll try to make it somewhat filled with different opinions, views or
- whatever I can come up with. Because it hasn't been a very productive year
- for me in the hacking scene, I don't have very much to write about.
-
- I feel there's enough textfiles about hacking and phreaking today, and too
- many "new" groups who copy old material and release it as new. The old and
- known groups, like Phrack and NIA are good enough for me. Also, these "new"
- groups seem to be semi-eLiTe groups (recognized by the 'z's and the "k00l"
- and "warez" words mixed with the old "new" material.)
-
- No, let's support the old and known groups, and tell these "new" ones to
- stick to their warezz trading unless they're NOT eLiTe d00dzz, if so,
- support them! Well, that's about if from me. Not very interesting, I know,
- but it's what I could come up with today. I know this 4th protocol will be
- great, and I greet everyone working with/for it.
-
-
-
- --> Written by a anonymous member who do not want to be busted
-
- As said in the introduction and by the editor, this year has been a
- successful one with new experience and new knowledge. Some tragic events
- took place in the summer of 1991 when some SHA members were busted in
- Stockholm, Sweden. The police is still investigating the organization
- S.H.A., and therefore we have decided to exclude details which might be
- held against us in court. After an eventually trial, all information will
- be released. We promise. We have kept detailed log-books, date by date, so
- there will be a hell of a release after an eventually trial. We have also
- thought of writing a book, but that's just one of our 1000 projects...
-
- New computer security systems has been a real challenge, and every system
- has its weaknesses. The only way of getting a secure system is to chop the
- Ethernet cable, but who wants to do that? They have to live with unsecure
- systems as long as the S.H.A. is alive on the nets..
-
- The newspapers have gone mad, and write everything except the truth about
- hacking (read SHA). What they need is a lesson of professional journalism.
- Just lucky they haven't recieved the police report yet. (where they state
- that we, SHA, have broken into NASA). If the newspapers starts to write
- about that, I bet they will missunderstand it and say that we were about to
- start the World War III with help of weather satellites and so on...
- (which isn't THAT far from the truth :-))
-
- I feel that I have to throw some dirt at the Swedish Police Department.
- Three of the most incompetent investigators when it's about computer fraud
- are currently investigating and interrogating innocent citizens (read SHA).
- A big fuck should go to S.K. who writes police reports from his fantasy.
- If you listen to the tape and write what we say at the interrogations, and
- stop writing fantasy stories in the reports, you wouldn't have a chance to
- convince the prosecutor that you 'needed' search warrants to raid our
- places. FUCK YOU.
-
- The last report from you that I read was a big nasty bestseller.
- When I crosschecked it with the interrogated person, it showed up to be
- 50% fiction and creations from your mind. But I guess you are not alone
- to be so rotten in the Swedish Police Department.
-
- (I guess I will regret this at the next interrogation, but it's worth it.)
-
- Enough with bullshit from me, I'll leave the rest of this protocol to you.
-
-
-
- --> Written by a anonymous member who do not want to be busted
-
- Hello again folks. Another year has passed, and there's been happening a
- shit load of things I tell you. What we see now, officially, is computer
- systems are getting harder and harder to penetrate... that's true, but is
- it impossible now?? Hahaha... I wouldn't think so if I were you.
- I would like to compare the new security routines like this; a burglar is
- loose in a town, but he only breaks in to yellow houses. And what does the
- police do to stop him? The smartest way? (i.e. try to catch the criminal)?
- no... they paint all the houses in the town in some other color than
- yellow... with known results, the burglar chooses houses with another color,
- and this goes on and on...
- I find it Quite funny to watch system managers "improve" their systems...
- and you're still on it... After the so-called improvements. Some system
- managers try so hard, that you almost feel pity for them when it really
- hasn't improved their security, after several attempts.
-
- Ok, let's stop it here and see what types of system managers there are out
- there on those nets...
-
-
- * "The Toughie"
- Hehe, this is a real baddie. He'll do anything to kick you off the system.
- It's been cases when he has kicked out the wrong users.. (how we laughed!)
- And other times when he kicks you off and off, but you always manage to
- come back. You can't "trust" this guy, he'll feed you to the lions as soon
- as he gets your ass booked. You'll probably face 3 extra years in jail if
- this person is the attorney in your trial.
-
- * "The Blind Man"
- This is the, without doubts, the most common system manager. You can use
- all the computers on his whole net without him noticing... and matching
- passwords in 20 background jobs? No problem, just execute them and logout!
- Login again, and have your 20 result files served to you on a silver
- plate. And the poor bastard will never know they even existed.
-
- * "The Smartass"
- He can easily be mistaken for "The Blind Man", but you can try to find it
- out by uploading some real scary-ass files about you're going to ruin
- their whole fucking network, and keep it in you own directory, only
- readable for your user. If you're kicked off the system short after that,
- it wasn't "The Blind Man", it was this guy. But don't fool yourself...
- even if you have a detailed file on how you're going to d-d-destroy their
- system, and you still don't get kicked out... He might take the chance of
- risking to restore the system, just to have your ass where he wants it.
- (In court...)
-
- * "Mr Panic"
- Hey, this guy is quite familiar too. He's the one who tells the media,
- the military, the local computer squad, the cops.. everything he can think
- of, just as soon as he detects you. He don't risk ANYTHING... He's
- possessed with the manic thought that HE let a 11 year old HACKER into HIS
- system!! (his safe, safe, hypersafe system!)
- Nooo.. it will never happen!! HAHA... Poor man...
- The "Mr Panic" reaction is also usual when the system authorities is a
- quite big group of people... they usually come to the conclusion that
- WE WANT A CLEAN SYSTEM! haha... well they can give it a try atleast.
- This "Mr Panic" person seem to be quite rare in the other countries than
- Sweden, but There he/they are very common.
-
- Ok, now you should have a quite bright picture of what kind of system
- managers you might find out there... A very rare, almost diseased kind of
- system manager is though "Mr Nice Guy"... The only sysmgr you can trust
- really. What happens when he discovers you on his system is that he watches
- you for a while, and when he notice you're a "nice" kind hacker (well you
- are nice, aren't you?!! :) ). He'll either try to talk to you or just email
- you if that doesn't succeed. He will not try to get your ass in jail, just
- know what you were up to on his system. If you get him to "like" you (if
- now a sysmgr can like a hacker) you might even be given an account, to use
- for "friendly" activity (i.e. no matching jobs, only programming/storage for
- example...). But the chance that you will find a sysmgr like this is about
- 1 to 2000 I'd guess...
-
- No goddamn it... read this fourth protocol from us in S.H.A. Special
- greetings to S. K.; you're a nice guy deep inside, we know it, just try to
- show it Once atleast.
-
- Signing off in early 1992,
-
- Anonymous user
-
-
- --> Written by a anonymous member who do not want to be busted
-
- Yeah! Another year! Another hacking season! What can I say? It has been
- a great year for all of us (almost anyway). So, what have happend under
- 1991? Well, alot of things that will be covered in this file, but for me
- personally, I just have had some problems with the Telecom who thinks that
- I ought to pay them $10.000 for phonecalls. Well, I think they can forgett
- that. Which (normal?) person would call for that amount under a period of
- three months? Well, I hope it get to court and then they will loose since
- they judge will see how impossible it is, I mean, I would have to be
- connected many hours every day to the States to reach that amount. Well, I
- don't complain since I havn't been busted yet, but who knows. Ohh.. just
- one more thing.. Greetings to all hackers and specially those in S.H.A.
- Have fun and take it easy. It is a dangerous world we are living in.
-
-
-
- ---------------------------
- - Inside story from Court -
- ---------------------------
-
- One of our members have stand trial in a carding case. This guy was BRUTALY
- busted in October 1990 when he was about to lay his hands on computer
- equipment worth over $50000. The police raided the place, cuffed him and
- threw him into a car and drove straight into the Police HQ in Stockholm,
- where he spent 46 hours in an isolated cell. He wasn't even allowed to make
- any phonecalls. That's brutal. (and probably against the law).
-
- While he was doing nothing in his cell, the police searched his house twice.
- Imagine his room before and after a search by the Federal Police. Right.
- Not a single thing was left. Everything was taken as 'evidence' in one way
- or another. After several interrogations with both the Federal Police and
- the Swedish Special Branch (Sweden's Secret Service) he was released.
-
- He was busted the 23rd of October 1990, and was released from federal
- custody the 25th of October 1990. Over a year has gone, without really
- knowing IF, or WHEN the trial would be held. Jail or not?
- It's trial of your mental health.
-
- It took the swedish police 1 year and 2 months to clear the mess up, and
- our member was fully cooperating with them. The magic date was set to the
- 8th of January 1992. The trial. He was prosecuted for:
-
- Felony creditcard fraud, $100.000
- Forgery.
- Illegal possesion of guns.
-
- Sitting inside that courtroom with 2 attorneys, an idiot as prosecutor,
- and a couple of lawyers wasn't as fun as he thought it would be.
- What's worse then a non understanding prosecutor that just want to nail
- you as hard as he can, and can't realize the facts. But he was a straight
- businessman. The attorneys and he made a deal, and the SHA member got away
- with a 2 year conditional sentence, and a $600 fine.
-
- We in S.H.A. has released a detailed textfile about the bust. Get a copy
- if you want to read more about it. It's VERY detailed. It even includes what
- he had for breakfast in his cell..
-
-
-
- --------------------
- - New S.H.A. board -
- --------------------
-
- A new S.H.A. board has opened in Sweden with the name Project Athena at
- number +46-8-LEGEND (Sorry: No phonenumbers listed in public version.)
-
- Inquires about the new board can be addressed to us through our mail
- address listed later in this file under "How to contact S.H.A.". Be sure to
- include a return address and board number where we can reach you or your
- voice number.
-
- Government agencies are also welcome to request access to our boards
- worldwide, and will receive access after complete checking from our side.
-
-
- Our current Headsites and distribution sites are as follow:
-
- Project Athena S.H.A. World Headsite (+46) ########
- Interpol II S.H.A. World Headsite (+46) NEW-NUMBER
-
- (No phonenumbers are published in the public edition)
-
- Note: Interpol II has changed phonenumber due to much publicity
- from the police and the Special Branch.
-
-
-
- ---------------------------------
- - Royal Institute Of Technology -
- ---------------------------------
-
- One quiet evening in early May 1991, some persons were sitting peacefully in
- a terminal-room at the Royal Institute of Technology. Suddenly the door was
- kicked in and 8 cops and 2 system operators rushed in. Charges for
- trespassing and illegal attempts/access to a computer system was pressed
- against them.
-
- The police is still investigating this case, and therefor we can't give
- you any nasty details about what happend and why they were charged.
- But a story that have circulated in some major newspapers in sweden is:
-
- "A night in May, 5 hackers were busted when they physically visited a
- terminal room at the Royal Institute of Technology (Numerical Analysis
- Department). The youngsters were not students of the University, but they
- used the terminals to enter other computer systems/networks all around
- the globe."
-
- That is the OFFICIAL story that circulates in the press, and does not
- neccecary mean that it is really what happend. All of the arrested persons
- denies that they did any illegal that evening in the room.
-
- A more detailed report about what happend will be released after an
- eventually trial.
-
-
-
- -------------------------
- - S.H.A. Member busted -
- -------------------------
-
- I suddenly woke up one morning by the noise of my doorbell. Riing, Riing.
- Who the fuck can it be 09:00 AM? I didn't expect anyone. I tripped on my
- toes towards the door. Riiing, Riing. I looked out through the "door eye".
- Outside my door were three men standing. NO friends of mine. I don't think
- they wanted to sell a vacuum cleaner to me. Almost panic. What were THEY
- doing here? Where they cops? Had they traced my phonecall last night or
- WHAT? I didn't have the time to think about that now. Act fast, or they
- will probably kick my door in.
-
- I got dressed very quickly. Then I threw some clothes in a bag and grabbed
- my laptop computer on the way to the balcony. I closed the balcony door and
- tied it hard with a piece of rope to keep it closed, while I was away. Then
- I looked down. Jesus, would I still be alive if I jumped? Well, just one
- way to find out. I quickly threw the bag out and then I took the laptop on
- my back and jumped. I landed on my knees over my laptop. Any broken bones?
- No. Great! Got up and ran away.
-
- Later that evening I decided to go back home. First I had to hide the laptop
- if the police still would be there, so I had a friend to look after it. When
- I got home, I had prepaired myself to find my apartment upside down. Raided
- by some idiots from the police. I opened the door, and what did I see?
- None had been inside it since I left it. Strange. (well, not really, we are
- dealing with the SWEDISH police..). Well, so far, so good. I fell asleep.
- It had been a hard and exciting day.
-
- 08.00 AM, next morning:
-
- Riing. Riing. The doorbell. SHIT! Rushed up from the bed and looked out
- through the "door eye" just to find my three friends from yesterday standing
- there again. Well, I quickly got dressed. Should I escape, or should I let
- them examine the apartment? They would do it sooner or later anyway. I can't
- hide forever. This time I was prepared. After a couple of second I decided
- to open the door.
-
- The three men outside showed me their Police ID's and one of them asked me;
- "Do you mind if we come in and speak with you". What could I say?
- "Ok, let's sit down and talk in my living room. Can I take a shower first?".
- Sure they said. So I went into my bedroom and switched my computer off.
- Then I went into the bathroom to take a shower and clean myself up.
-
- When I got back, they where in my bedroom and had turned my computer on.
- Just to be greeted with;
-
- SECURITY SYSTEM
-
- Please login:
-
- HA! If they managed to hack THAT, I would recommend them for the Nobel Prize
- of password guessing. Ofcourse they asked me to login. "Sure, can you look
- away while I enter the password?", I said. "No", they said, so I stepped
- back and told them "Well, login yourself then...". They looked puzzled.
- "Why not tell us the password? You can easily change it later.". Did they
- think I was born yesterday? If I told them the password, what would keep
- them from taking my computer and have full access to it? So, I just
- repeated myself and told them to login. They got angry and switched off the
- system, and started to tear the equipment apart. SUCKERS! They didn't know
- how to handle this kind of stuff. "Carefully!!" I said (delicate equipment).
- They didn't listen. I even offered me to carry the stuff to the car. They
- just told me to stay away. They brought me for interrogation that morning.
-
- After I had spent some hours at the swedish police HQ, a guy come and asked;
- "Have you changed your mind? Would you like to login to the computer now?"
- "Nope. I won't. I think you were very rude some hours ago".
-
- Apparently they hadn't managed to force the security system. This was good
- news. I called an attorney which showed up and the whole thing was over
- after some minutes.
-
- I was 'released' at lunchtime. Time to make some important calls to avoid a
- dissaster. (Well, it was a kind of a disaster already, but the damage could
- be limited)
-
-
- Ed's note:
- Later on, we have found out that the University is a real chicken. One
- month after the five hackers were busted at the Royal Institute of
- Technology, they installed Kerberos (security package) on their Unix
- machines. The day after that, they let the police bust this person. I
- guess the university think they have secure machines at the moment, and
- we'll let 'em think so for a while, until we have decided what to do with
- their network. Wipe it or not. (S.H.A. opinium and not nessecary mine)
- / Ed
-
-
- Conclusion:
- At this moment, we reccomend everyone to install atleast some kind of
- security system. S.H.A. is currently developing new software that will
- guaranteed keep the cops out of your computer system.
-
-
-
- --------------------------------------------
- - Operation Sun-Devil, by Knight Lightning -
- --------------------------------------------
-
- On May 7-8, 1990, the United States Secret Service executed its response to
- an investigation that had been two years in the making. It was Operation
- Sun-Devil and it was designed to take out computer hackers and
- telecommunications hobbyists across the United States, whether by raided
- them directly or scaring them by raiding others. The Secret Service claimed
- that they were going after criminals, and perhaps they were. Now almost two
- years later, there have been very few criminal indictments brought, despite
- the raids of 27 homes in 13 cities:
-
- Chicago, IL
- Cincinnati, OH
- Detroit, MI
- Los Angeles, CA
- Miami, FL
- Newark, NJ
- New York City, NY
- Phoenix, AZ
- Pittsburgh,.PA
- Plano, TX
- Richmond, VA
- San Diego, CA
- San Jose, CA
-
- There were a few prosecutions of Sun-Devil defendants made in the State of
- Arizona by state officials and there was a prosecution in Pittsburgh, also
- by state officials. The first United States government conviction took
- place this past week in San Diego, CA. The offense -- possession of 15 or
- more calling card numbers, a violation of United States Code, Title 18,
- Section 1029.
-
- A few months ago, a civil liberties group here in the United States called
- Computer Professionals for Social Responsibility (CPSR) filed a request with
- the government for information about Operation Sun-Devil under the Freedom
- of Information Act (FOIA). The government's response has raised new
- questions about the scope and conduct of the Sun Devil investigation.
-
- The documents disclosed to CPSR reveal that the Secret Service monitored
- communications sent across the Internet. The materials released through the
- FOIA include copies of many electronic newsletters, digests, and Usenet
- groups including:
-
- comp.org.eff.talk
- comp.sys.att
- Computer Underground Digest (alt.society.cu-digest)
- Effector Online
- Legion of Doom Technical Journals
- Phrack Newsletter
- Telecom Digest (comp.dcom.telecom)
-
- Currently, there is no clear policy for the monitoring of network
- communications by law enforcement agents. A 1982 memorandum prepared for
- the FBI by the Department of Justice indicated that the FBI would consider
- monitoring on a case by case basis. That document was released as a result
- of a separate CPSR lawsuit against the FBI.
-
- Additionally, CPSR has found papers that show Bell Labs in New Jersey passed
- copies of Telecom Digest to the Secret Service.
-
- The material (approximately 2500 pages) also suggests that the Secret
- Service's seizure of computer bulletin boards and other systems during
- Operation Sun Devil may have violated the Electronic Communications Privacy
- Act of 1986 and the Privacy Protection Act of 1980.
-
- Two sets of logs from a computer bulletin board in Virginia show that the
- Secret Service obtained messages in the Spring of 1989 by use of the system
- administrator's account. It is unclear how the Secret Service obtained
- system administrator access. It is possible that the Secret Service
- accessed this system without authorization. The more likely explanation is
- that the agency obtained the cooperation of the system administrator.
- Another possibility is that this may have been a bulletin board set up by
- the Secret Service for a sting operation. Such a bulletin board was
- established for an undercover investigation involving pedophiles.
-
- The documents we received also include references to the video taping of
- SummerCon, a computer hackers conference that took place in St. Louis in
- 1988. The Secret Service employed an informant who posed as a hacker to
- attend the conference and placed hidden cameras to tape the participants.
- The documents also show that the Secret Service established a computer
- database to keep track of suspected computer hackers. This database
- contains records of names, aliases, addresses, phone numbers, known
- associates, a list of activities, and various articles associated with each
- individual.
-
- CPSR is continuing its efforts to obtain government documentation concerning
- computer crime investigations conducted by the Secret Service.
- These efforts include the litigation of several FOIA lawsuits and attempts
- to locate individuals targeted by federal agencies in the course of such
- investigations.
-
-
-
-
- ------------------------------
- - Cray II Attacked by S.H.A. -
- ------------------------------
-
- In February 1991 the S.H.A. gained access to a Cray II connected to a
- NASA network through a major security flaw.
-
- - Since we hacked a rather closed network, there were no problems to gain
- access to the supercomputers. We found some interesting info on the Crays,
- (well, rather it's front-ends) but we had most benefits of its processor
- speed. Some weeks later they discovered the hack, and closed down the
- shop. The supercomputer was re-hacked in Novermber/December 1991, and at
- this time we have installed backdoors for future use.
-
- Unfortunately as with all of this information, we can't give you any
- details. If we did that, it would be used against us in court. But if
- you thinks it's interesting, take contact with us at Project Athena, or
- at any other board. You can even find us at IRC. (which is monitored to
- the limit..)
-
-
-
- ------------------------------------------------------
- - Milnet and Government computers attacked by S.H.A. -
- ------------------------------------------------------
-
- Many computers on the DDN (milnet) have been visited by members from S.H.A.
-
- No details about the attacks made by members of S.H.A. are discussed in
- the public version of this 4th Annual Protocol.
-
- - Among the computers that where successfully penetrated, we can mention
- one computer belonging to US Navy in Italy. Since the lack of security
- we could easily gain root access to a Laboratory computer with
- research material and other US Military stuff. The computer where also
- trusted to other computers, so we could easily go further from there.
- Even since the system lacked some real security it where no "fire wall"
- as we first thought when we struck the computer.
-
-
- S.H.A. also gained access to an Aerospace research network with a dozen
- of trusted computers connected. Also connected to the research network was
- three supercomputers in the CRAY series.
-
- - We got almost 90% of all accounts on this network. It almost seemed to
- be public stuff, even if they did some research for US Air Force. It where
- no classified research, as far as we could tell.
-
-
- One of the worst security vulnerabilities I have ever seen in my whole
- hacker career was found at a US Navy Network. We could easily, without any
- trouble, gain access to several dozens of US Navy military computers
- stationed at places such as Norfolk, San Diego, Jacksonville, Washington,
- Pensacola, Cherry Point, Alameda, Pearl Harbor, Italy, Japan, Spain,
- Phillipines, Guam. Rather interesting information was found on these
- computers.
-
- A VAX/VMS network at the Argonne National Laboratory isn't more secure then
- my refridgerator. SYSTEM access could be hacked within seconds.
-
- The same goes for the Defence Logistic Agency in the US. Shame on you.
-
-
- Totaly eightyfour US Goverment computers on eleven networks where
- successfully penetrated by members of S.H.A. and root access where gained
- to a dozen of them in the year of 1991.
-
-
-
- -----------------------------------
- - Guidelines for System Operators -
- -----------------------------------
-
- It was after I came in contact with a system operator at Uppsala University,
- that I got totaly hysteric. How stupid could one get?
-
- Let's take it from the beginning..
- We, a couple of hackers, used the university's machines. The operators
- didn't even notice us when we were active. One night we contacted the
- operator that was currently logged in, and told him what we were up to.
- He didn't like our existens, and tried to threw us out. Ofcourse he didn't
- manage that. (Even due to the fact that they deactivated nearly every damn
- account at the Computer Science Department). A week later, one of the places
- we routed our Internet traffic through was disconnected from the network.
- Tragic but not a disaster.
-
- Why do we tell you this bullshit? Well. First of all. WE DON'T like this
- system operator's attitude. Instead of asking us how we got into their net,
- (and will always do), he threw us out, as if we where some kind of morons
- that would destroy everything we touched.
-
- THIS is the problem out there. System Operators trying to throw out the
- hackers and starts sceaming after the FBI as soon they see any mysterious
- activity in the log files. He MUST have realised that we would be back after
- some minutes.. but why did he do that?
-
- You better ask him yourself: bjorn@oslo.docs.uu.se
-
-
- Some guidelines for system operators:
-
- - Do not scream after the police when you have discovered a hacker in
- your system. (unless you see him destroy information)
- Most hackers are friendly creatures which will move to another system
- when you have noticed them that YOU know what they are up to.
- If the hackers won't move from the system, threats don't lead anywhere.
- (most hackers are able to wipe your whole network if he whished to, and
- will do if you starts to threathen him with the FBI and so on.)
- Insted we suggest you make a deal with them. Offer them a legal account
- on the system. In return you want them to fix all security bugs etc.
- and leave a report to you.
-
- The FSF project at MIT is an excellent example. They had guest accounts
- on their machines, and was overloaded with hackers from all over the
- world. A lot of hackers, including S.H.A. had root access on their
- machines. Did they go down? Nope. why?
- If you can get root access on a machine, you often has experience, and
- realises that damaging the system won't do any good. It's just a waste
- of time. Almost everything will be re-installed with backups etc.
- MIT was aware of the high percent hackers on their machines, but didn't
- want to argue. Maybe they realise what the whole thing is about.
-
-
- - Don't play the role as god. You will ALWAYS be an easy target.
-
-
-
- ---------------------------------
- - FSF/MIT Closing down the shop -
- ---------------------------------
-
- One day in April 1991 the Massachusetts Institute of Technology got visited
- by some guys from the FBI. The guest accounts at the FSF machines had been
- used for over a year to break into computers worldwide, and especially
- systems linked to the MILNet (DDN). Another day in the same month, same
- year, the guest accounts at the FSF machines had been removed. The official
- explanation was that the drives were the guest accounts were stored had
- crashed.
-
- The year before, in 1990, a letter was sent between the system operators:
-
- -----------------------------------------------------------------------------
- From: tower@ai.mit.edu (Leonard H. Tower Jr.)
- Date: Thu, 30 Aug 90 18:06:26 EDT
- To: rms, gjs, hal, bob
- Subject: MIT is getting concerned about crackers on the FSF machines
-
-
- (I'll leave it to one of you to decide what to tell our programmers
- and employees about all this. I see no reason to start a lot of
- not very productive discussion on fsf-hq.)
-
- Jeff Schiller (bob: Jeff works for MIT's Network group and is well
- connected) just called me to discuss the crackers on the FSF machines
- using the password-less guest account and the rms/rms account.
-
- He and Jim Bruce (bob: he's ~VP for computing at MIT) are having a
- meeting with the FBI at 6pm today. The FBI is involved because the
- crackers are `attacking' MILnet hosts.
-
- I told jis that that's really MILNET's problem, and they might
- consider finally turning the mailbridges on for real.
-
- I told jis that most of the guest users were using the FSF machines
- for useful activities and not cracking.
-
- I advised jis that FSF was monitoring the activity and reasoning with
- crackers as FSF found them. (Not having talked with rms or cutter
- lately, I don't know how successful that's been. But it appears there
- are still more crackers needing conversion.)
-
- He was sympathetic to rms' feeling about guest accounts and letting
- FSF use it machines as it wishes, but was also concerned about MIT
- position and response on this.
-
- He mentioned that disconnecting FSF from the Internet was not yet
- being considered. (Translation of jis-speak: `MIT' might have to
- disconnect FSF to solve this problem).
-
- He mentioned that the FBI wanted to monitor the incoming calls to
- terminus, but that wasn't feasible with the way that MIT connected
- with NE Telephone. He also mentioned that this interface could be
- changed to make such monitoring possible.
-
- I suggested he talk further with rms and gjs about it.
-
- I'm available for consultation or a board meeting. Call home ###-####
- and work ###-####, my schedule is weird.
-
- Providing access to randoms is peripheral to FSF's goals. I'm not
- sure how much time and effort we should expend on this. Perhaps we
- should provide a guest machine that doesn't allow outgoing network
- service with the exception of mail and ftp (not trivial to do).
-
- -len
- -----------------------------------------------------------------------------
-
-
- The FBI was already involved in this affair in August 1990, and the result
- was that MIT had to throw out all guests from the FSF machines and blamed
- the action on "the drives has crashed".
-
- Crashed? Hardly.. Some months later, in the fall 1991 we could read about
- some dutch hackers that had hacked several military installations including
- some Pentagon systems. I know there were alot of dutch hackers at the FSF-
- machines. Take a look at this article:
-
-
- "(IDG NEWS) Dutch hackers broke into Pentagons computer system at atleast
- 34 occations during April and May this year (1991). At some occations the
- dutch hackers changed and copied data, related to military operations in
- the Gulf War. This was confirmed by Jack Brock at the General Accounting
- Office (GAO) during a hering in the senate last week. (sometime in the fall
- 1991). The dutch hackers managed to get access to some sensitive information
- concerning troop movements, technical data about certain weaponsystems,
- according to what the GAO chief stated under the hering. The hackers broke
- into Pentagons computer system via the international INTERNET network."
-
-
- Was it because FSFs machines had been used to hack Pentagon that FBI closed
- them down? MIT & FBI had alot of hackers under control on those machines.
- Closing down the guest machines resulted in that hackers routed their
- traffic thru other systems. And FBI lost control of them.
-
-
-
- -------------------------
- - Short World Wide news -
- -------------------------
-
- Worldwide news. Where to start? We could mention the little bastard
- in Israel who claims he has hacked the Pentagon. True or not?
- Pentagon hasn't confirmed it, but we believe he has done it.
- The Israelian newspaper Yedhiot Ahronot told the world that this guy
- had hacked pentagon and some US Army hosts in the US. He had been able
- to read top secret information about the Patriot missile during the war,
- It's not sure if the 18 year old student will be prosecuted.
-
-
- Two israelian professors has released a Cryptanalysis of the Full 16-round
- DES. Very interesting reading. Now NSA can flush themselves down the toilet.
- The document is referred as Technical Report #708 at Technion in Israel.
-
-
- Two dutch hackers has been busted. (THAT's something. The law in the
- Netherlands does not forbid hacking. You can only be prosecuted if you have
- destroyed anything in the system you have hacked.). These guys were
- prosecuted because they tried to cover their tracks by modify the
- systemlogs. If they hadn't messed up with the logs, they hadn't been busted.
- (That's from what I've heard)
-
-
- Some hackers in the United Kingdom (UK) has been busted. The english police
- had recorded all DATA and VOICE traffic from/to the hacker's residence. All
- material will be used as evidence in a trial. Tough luck..
- More info on this comming up during the year in releases from the S.H.A.
-
-
-
-
- ---------------
- - Blue Boxing -
- ---------------
-
- Blue Boxing has finaly reached Sweden this summer. It all started with
- a Blue Boxing program for the Amiga where released, that gave every computer
- geek the oppertunity to Blue Box. There are even losers who dosen't have
- a modem, that are Blue Boxing to other countries through toll-free numbers
- and back to Sweden for free long distance calls. They don't even know how
- Blue Boxing works, or why?
-
- Hopefully, the Swedish Telecom will start to investigate these frauds,
- and it will result in a new dimension in computer busts... and the geeks
- will regret their stupidity when they get billed for all their calls and
- when the SWAT team kicks down their door.
-
- That is what we wish, but we thinks that the Swedish Telecom dosen't bother
- since they are not loosing money on this, since their customers have to
- pay for the calls. But if to many customers complain, maybe, the Swedish
- Telecom might get intrerested in busting these clowns. And all this might
- result in that the police dosen't have the time to investigate our little
- $100.000 credit card fraud and our so called illegal entering into computer
- systems world wide.
-
-
- Just a little note:
-
- Since Blue Boxing have been around in the States for about two decades,
- I suggest that you don't think that the Swedish Telco are geeks...
- Since they are in cooperation with AT&T and other phonecompanies
- worldwide, they should know to put two and two together about this shit.
-
- And we all know what the Swedish Telco feels about losing THEIR money,
- don't we?
-
-
-
- -----------------
- - Carding today -
- -----------------
-
- Where is carding today? Is it still easy to card in Sweden? Well, let me
- say this; When the first real carding case in Sweden, May 1990, where
- discovered and a group of young computer geeks where busted, the press
- started to write about the case and told every one how they could do it.
- The press even told every one how you could get creditcards, and a S.H.A.
- board was pointed out to be one of the main sources for illegal information.
- The computer geeks also said that they got their information from a S.H.A.
- board in the interrogation with the police. The press stated how bad
- security the creditcard companys had and how easy it was to order on
- someones elses creditcard. Both VISA and Mastercard went public to the press
- and hold a communication and said that they would have changed their
- routines within two years so it would be impossible to order on peoples
- creditcards. They would change their routines for how new creditcards where
- calculated and no carbon copies would be included in the billing notes.
- A year ago they hadn't changed their routines and one of our members got
- busted for carding for about $100.000. Today, nothing have changed and
- computer clowns are still carding from USA and Europe. VISA and MasterCard
- are loosing big money on this. We have many possitive indications of how
- big the business for carding is here in Sweden and someone have mentioned
- that computer geeks are carding for about $100.000 to $1.000.000.
- And that the telecom companys are loosing something between $1.000.000 to
- $10.000.000 every year on computer geeks who are using calling cards or
- on phreaking. And this for Sweden only!
-
-
-
-
- ------------------------------------------------
- - S.H.A's rules and advices for other hackers -
- ------------------------------------------------
-
- This is what we think you out there should follow when breaking every
- computer related law your country may or may not have...
-
- - Never confirm or deny anything. It is up to others to prove that
- you've done something.
-
- - Never destroy or change information on systems that you have access
- to. It gives you a bad reputation.
-
- - Do not confirm names of members in your group nor the number of them,
- since you shouldn't help the police in any way at all.
-
- - Do not spread accounts to people outside your own group, and keep
- such things within your group only.
-
- - Do not install backdoors on systems you have secured, and don't abuse
- systems, like using them for illegal access to other computers.
-
- Now... back to reality. The S.H.A. does not have a policy really, concerning
- how we should be doing things, nor forbid our members to do anything they
- feel like. The group S.H.A. is really formed to keep up the information flow
- in a higher tempo than usual in our business, and of course, you feel safer
- when you got some people you can trust, ask, or supply with information.
- So, there are no rules for S.H.A., we do as we like. I.e. :
-
- - Never crash systems
- [Exception: Unless the operator running it threw the cops on you, if so,
- fuck it up as much as possible]
-
- - Never trade accounts
- [Exception: Unless you're getting more for your account than the other
- part is.
- [Exception2: There are always exceptions]]
-
- - Never go to the press
- [Exception: Unless you'll make loads of $$$ on the deal]
-
- - Don't sell your "stolen" information
- [Exception: Unless you're payed well, and will stay alive after the
- next money/information exchange.
- [Exception2: No risk no fun]]
-
- - Obey given rules
- [Exception: If they suck, make your own rules]
-
- Call it computer anarchy, we call it computer freedom. The rules follow a
- single red line; If you get treated nice, be nice back. If they fuck you,
- put a bullet in their head.
-
-
-
-
- -----------------------------------
- - Demoralized Youth, by Tormentor -
- -----------------------------------
-
- Tormentor, an young anarchist causing chaos and disorder with short program
- routines. One of his first viruses, called Tormentor -d, was one of the most
- debated ones in the fall 1991. I've got no idea how many computers his
- viruses has infected and crashed. I have no guess of how much the value of
- the crashed programs is. I just know one thing - he's a pain in the ass for
- most of the people, so therefor we have asked him to write for this 4th
- protocol. We have asked him to write about the current virus scenario in
- Sweden and about the future and about his projects.
- /Ed
-
-
-
-
- Demoralized Youth, by Tormentor
-
- This the story about the virus-spreading in Sweden.
- The virus spreading in Sweden have been very rare, not to say the virus
- writing! There where only ONE virus written in Sweden untill the end of 1991
- and that was a Boot-sector-virus which isn't too hard to make. But this has
- not kept some moral-chake-spreading people to call themselves
- 'Virus-Researches' and building up a echo-net and start a company called
- Virus-Help-Center. This was rather strange to me since I've never heard
- about someone who had been 'attacked' by a virus. (NOW I have heard of a
- couple..) Before the end of 1991, no Swedish BBS had to be afraid of beeing
- infected by virus. Then in November, something happend..
-
- Now to the story...
-
- I can just tell the story from my point of view, and if someone out there in
- Sweden may think:'Well wasn't I a part in this?', contact me for appologize.
-
- Well it started in late August 1991. I was looking for virus on almost all
- boards (I even asked for it on Vir_NET). Then - WOAH!
- I had received mail from another guy on a Elite-board! And he had virus..
- It was the guy that would change his handle a number of times in the future,
- but now he calls himself HiTMAN, and here is what the letter was saying:
-
- 'Hey, Yez, I have a couple of virus... maybe wanna exchange?'
-
- My hands was sweating, I had meet a sympathizer! We made contact and
- exchanged virus (before that I just had the 1701-virus) and it was then all
- started. In the same week, I made contact with WiPER, also a Great
- sympathizer. And after some week of debugging and testing, he contact me
- again. Now he had found some 13-years old kid that was leeching virus from
- Bulgaria, And this kid was a real virus-collector! We got about a hundred
- virus from him and Puh!
- This was too much. After that, WiPER started a virus-area on his board, and
- the ball was rolling...
-
- Then, a couple of weeks later, I started to write virus. But since I was
- quite new on this, I didn't start from scratch. No, I modified an old virus
- called 'Murphy'. When I got the first version ready, I was starting to
- spread it like a maniac all over Gothenburgs PD-BBSes.
-
- Now afterwards, I regret some misstakes I did:
-
- * It was just Scan that didn't found it.
- * It was some bugs in it ( the dates where garbled )
- * AND IT DIDN'T CONTAIN ANY DESTRUCTIVE MECHANISM!!!!
-
- I fixed it and started to spread it again. Some weeks later, HiTMAN called
- me up and gave me some clips from fido_net. And the geeks where talking
- about my virus!! This was not expected, and when I read it, I thougt:
- 'Gee, fun!' And we started to spread it like hell. And the following weeks
- was a fight: They posted a scan-strain, I changed the virus to avoid that
- strain and so on.
-
- But after they released their 5th killer for The Tormentor-virus (as they
- called it) I got tired (or in fact: There was to much scanstrains
- circulating!) So I let the virus retire with, according to Virus Help
- Center, 400 reported infections. (and X number of HD-Nukes?) Now I study
- other viruses, and tries to write own from scratch. But it's hard, specially
- when there are so much good techniques already used (Dark Avenger is one of
- the lead-inventors!)
-
- The virusboards.
-
- Yes, what's the scene in Sweden for the moment? Well, WiPERS virusboard is
- down, but a couple of other is started. WiPER was the first, but I have
- heard about a S.H.A site that had a virusarea before him. (but not public!)
- Then I think iNNER CiRCLE was next to start a board, and after that
- 'The Smell of Fear' and 'The Home of The Pirates' started virus-conferances.
- But even if there is a couple of virusboards in Sweden, the activity is not
- so huge, or, we are just too few that working on it. So I hope that will
- change, it's a scary thought that we are so few destructive minds in Sweden.
- We also have contacts with several other VirBoards abroad in Bulgaria,
- Finland, England and USA to name a few. We also have contact with virus
- writers abroad (Like Charlie in Norway). And if you wanna join us, contact
- any virboard in Sweden.
-
- The Future.
-
- Well for the moment I have many projects on. I've working on an own virus
- that puts the virus-code in the middle of files (thanx DAv for the tip!) and
- I'm working very hard to make Self-mutating virus. And WiPER and HiTMAN is
- also working on own viruses (and who knows if there are other maniacs
- working on virus in Sweden?). Now we (at least I) thinks about starting a
- Virus-Network that connects all virus-writers and distributers.
- Think about it: Every time one releases a virus, the whole world will be
- attacked with it the same night. (That is the dream I'm dreaming every
- night!) Well, I also think we will have some problems in the future, like
- new laws against virus (probably only for spreading, and that will be hard
- to prove!), better security on public-bbs (like phone tracing etc.) and
- Hardwareprotection.
- I also thinks that the virus writing will increase and maybe be as big as
- the demo writing... (but that is just a wish from my sick mind!)
- Then I think the viruses will be a lot more destructive, for example:
-
- * Making small changes in data (like switching numbers)
- * Calling expensive numbers while no-activity.
- * Monitoring the system and saving the changes and keyboard-strokes.
- * Maybe even Call up the author and transfer Data from the victim!
-
- Also, in the future I think we are going to see the death of SCAN-programs,
- not just for the increasing Scan-time, but since the Self-mutating viruses
- has come to stay and they need algorithms to find them. The CRC-programs is
- always a good solution, but since you have to power the system down to use
- it, I don't think all will accept it.. But it's the only solution!
- Well I feel quite proud when I think that we are responsible for the all the
- time-wasting and uncomfortable procedures all lamers have to do, to avoid
- virus (and sometimes it's not enough!).
-
- So contact us, and join the Demoralized Youth!
-
- Remember: It's not illegal to make virus, and who the hell can prove that
- you knew that THAT file had virus?!?!?!?
-
- Epilogue.
- ---------
- Well, just after I finnished this text, we tried to reach Mikael Larsson on
- Swedish Virus Help Center for a comment, but unfortunatly he wasn't home,
- so I had to talk with his 'not-so-smart-in-fact-very-stupid' brother.
- Since he also works at the AntiVirus company I thought he had something to
- say about the future.. I was wrong!
- But he seemed quite interrested in buying unknown viruses, the only problem
- was that he rather bought them from Bulgaria since the people in Bulgaria
- were so poor... (damn humanist!)
- I feel really sorry for those AV-guys, they working full-time to stop the
- virus writing and spreading, but if they would succeed (just a thought!),
- they would lose their jobs! But we have two Anti-virus companys in Sweden,
- maybe the other company is more patriotic and will buy viruses from me...?
-
- Anyhow, now I must go on with my viruses. It has been requested a new
- mutation of Pogue that Scanv86 doesn't recognize. And maybe I work on the
- Trojan called Scanv87, just to be released in 2 weeks...
-
- So that's all from me for the moment, and remember:
-
- SCAN /D = DISASTER!
-
- /TORMENTOR
-
- Demoralized Youth, Sweden
-
-
-
- -------------------------------------
- - S.H.A. Official Summer Party 1991 -
- -------------------------------------
-
- A summer day in July we had a S.H.A. Barbecue party for two days.
- Almost 80% of all members in S.H.A. where present. The party where held at a
- secret address. The place where choosen with care, since we didn't want any
- "non S.H.A." people to show up and cause any trouble.
-
-
- A point of view from a S.H.A. member:
-
- It was sunny and hot as hell, about 35 degrees Celsius. Not a bloody cloud
- in the sky. And as a precaution to not pass out during my trip I decided
- to put on my shorts, Levis' was out of the question.
-
- Great... first I had stand in line for fucking half an hour to get a
- train ticket, just because the ticket bitch was talking on the phone...
-
- I guess, I don't have to mention that the place was NOT air conditioned,
- nor doors or windows were open... Biggest sauna I've ever seen I tell you.
- Finally arriving to the Central Station some hours later, I got picked
- up in a private limousine. (Ehrm.. let's pretend it was a limousine)
- The truth is that some members came to pick me up...
-
- We drove to the secret place where the party where held, and a lot of other
- persons were waiting...
-
- Lots of Coke (Not the one you sniff), chips and food have been bought
- earlier and we started to fix some drinks with big icecubes. We had to
- wait for the sun to settle down, so we could step outside and fix the food.
- Meanwhile we eat chips so that we didn't starve.
-
- Later we sat down and hacked for some hour or two. Mostly we went through
- all our hacks we had done so far that year.
-
- In the middle of the night we wanted some heavy action, so we went out and
- lit a big bomb in the neighbourhood. We almost got blown into pieces...
- (Lixom' wanted to throw the bomb into a neighbour's livingroom. But we
- didn't want to ruin the great party, or wanted to spent the rest of the
- night in federal custody).
-
- Later in the night we watched some movies (yeah even porno) until 5 am in
- the morning then we started to hack again and document some of the party.
-
-
-
- THE S.H.A. BQ TIPS (or: Survive your own cooking)
-
- You'll need:
- * A BQ device
- * One piece of animal flesh per person
- * Lotsa BQ spices, and BQ oil
-
- First you must put some nice pieces of wooden coal into the BQ device,
- pour lightning-fluid all over it, wait some seconds, and then set
- fire to it (taking cover is optional). Soon you'll have the best glowing
- coal you've ever seen in your grill.
-
- Now, just take the steak, and flatten it with something. Perhaps with
- the back of a knife or just your fist.
-
- Then put on all spices, and the oil (lots of oil...) and you,
- remember; spice and oil _both_ sides of the steak.
-
- When the meat now is on the edge from brown, turning black, take a
- knife and cut through it, if it's bloody or too red, let it stay in
- the grill for some more minutes.
-
- Now, if the steak seems good enough to eat, eat it. Serve with
- cremated fries, "potatoe sallad" and not to forget, a Tomatoe.
-
- Now drink Coke with ice cubes swimming around in your glass.
- AND! most important; Eat outdoors!! Why? There's no mosquitos in the
- house.
-
-
-
- -------------------------------------
- - Prof of S.H.A. Hacking Activities -
- -------------------------------------
-
-
- Maybe you think we are just making the whole thing up?
- We will give you some examples of our activities:
-
-
- This /etc/motd was found on a NASA computer we hacked in August 1991.
- Unfortunately they discovered our little breakin' and tightend security, but
- we re-hacked the computer and could read the following;
-
-
- COMPUTER SECURITY WARNING NOTICE
- WARNING WARNING WARNING
- *****************************************************************************
- THIS COMPUTER IS OPERATED BY/FOR THE U.S. GOVERNMENT. UNAUTHORIZED ACCESS TO
- AND/OR USE OF THIS COMPUTER SYSTEM IS A VIOLATION OF LAW AND PUNISHABLE UNDER
- THE PROVISIONS OF 18 USC 1029, 18 USC 1030, AND OTHER APPLICABLE STATUTES.
- *****************************************************************************
- WARNING WARNING WARNING
-
- =============================================================================
- Security Reminder: DO NOT LEAVE A TERMINAL LOGGED INTO A COMPUTER UNATTENDED!
- =============================================================================
-
- =============================================================================
- Hacker Attack: NASA Security reported that a Swedish Hacker
- gained access to XXXXX on 8/2. We assume all TAB passwd files
- have been compromised and are taking appropriate steps.
- =============================================================================
- A number of hackers are still attempting to penetrate
- various LaRC computers. We are taking appropriate steps.
- Report any suspicious activity to sysop.
- =============================================================================
-
- So if you don't believe us. Call NASA Security and ask what happend at
- NASA Langley Research Center at the 2nd of August 1991.
- (By the way. Ask them what happend in March at the AMES/NAS supercomputer
- network.. one of their CRAYs had some mysterious jobs running, hehe)
-
- The Pentagon has also been successfully penetrated, but we have decided
- NOT to release any information about what we have done there yet. We are
- not finished with the system. Hopefully you can read more about it, in
- a release in June 1992. (If not Pentagon confirms it before, or the
- newspapers starts to write about it..)
-
-
-
-
- ----------------------
- - S.H.A. Body Guards -
- ----------------------
-
- It was an ordinary summerday in July 1991. I was driving home from work as
- I always do. I parked my car just outside the stairway leading to my
- apartment at the 1st floor. I carried up some computer equipment to my flat,
- left it there, and went back to my car to park it propertly.
- When I reached the car, I suddenly saw two men comming out from MY stairway.
- THEY behaved strange. Well, I jumped into the car, and drove 30 metres along
- the street to my parking-lot. I turned right, parked it, and went out from
- the car. Now, the two men who was sitting in their car by this time, turned
- their heads and stared at me as if I was some kind of alien. huh. I didn't
- like this situation.
-
- They seemed to be surprised that I had parked my car and was walking towards
- my apartment again. I grabbed a pen and a piece of paper and took a note of
- their licence plate. Might become useful sometime. (which turned out to be
- right). I was totaly puzzled. 2 men comming out from MY stairway. I hadn't
- seen these guys before (age 35-40). I hadn't even heard them comming from
- the stairs above. No door slammed - NOTHING. Where they waiting for me
- there? Got even more puzzled.
-
- Some days later I had dinner with some other members of the S.H.A. at our
- usual restaurant in Stockholm. We discussed what had happend and we came to
- the conclusion that 'they' maybe wanted to catch up a tail when leaving the
- flat. But why? Why did they want to follow me? Or had they been inside by
- apartment when I arrived?
-
- The evening went on as usual, lots of beer and laughs. But at the end
- of that night, we decided to check the licence number with the public car
- register where all cars are registered. Said and done. We called;
-
- Ring. Ring.
-
- - Welcome to the car register, our business hours are.. bla .. bla..
-
- Damn. An answering machine. The police. Doesn't the police have some
- terminals connected to the car register 24h/day? Ofcourse. We called a local
- police station.
-
- Ring. Ring.
-
- - Solna Police Station, answered a male voice
- - Hello. I wonder if you could check a car licence number for me...
- - Sure. What's the number?
- - NWW 007
- - Hold on. He started to tap on his keyboard, and after a while he said:
- "A Ford Scorpio?"
- - Yeah. A red one. (I guess he was just checking some details..)
- - Why do you want to check this car?, he said.
-
- Uhh. Why does he ask that? They never ask such questions. Better make up a
- lie, fast!.
-
- - Uhm.. I can't move my car since the owner of that car has parked it
- infront of me. Did it sound believable? Hardly..
-
- - Ok, he laughed. It's a civil car registrered to the Swedish Police Dept.
-
- OUCH! A police car outside my apartment. 2 police men in my stairway.
- Does not sound good at all. Jesus. We almost paniced that night.
- Standing inside that phoneboot that evening getting this information was
- horrible. They could bust us any second now.
-
- We rushed into the car and drove away. In a bag we had several printouts
- from some hacks, large passwordlist to NASA computers, a NOT-TO-BE-RELEASED
- version of this 4th protocol etc. None of us could bring this stuff back
- to our flats. Just one way to solve the problem;
-
- We drove up on the interstate, pulled down the windows and began to tear
- the papers into pieces and threw them out of the window. If the cops managed
- to get this puzzle together, then I would turn my self in and confess.
- I guess we were extremly paranoid that evening..
-
-
- At the 4th of January 1992 we had one of our regular SHA dinners at "our"
- restaurant in Stockholm. We discussed our latest hacks and so on.
-
- I guess we were under surveillance that evening..
- ...some strange things happend.
-
- After we had finished our little neat dinner we moved to the car, and
- drove into Stockholm City were we did nothing. What we didn't knew at
- that time was that a car was following us. We discovered it by pure luck.
- We took a note of the licence plate, and stopped at the nearest phonebooth.
-
- One of us jumped out, rushed to the phone and dialed a local police station.
-
- Ring, Ring.
-
- - Vallingby Police Station, a female voice answered.
- - Hello. I want to check a car licence number.
- - Ok. What's the number?
- - It's MSR 769
-
- She starts to tap on the keyboard, and suddenly she says:
-
- - A 87'?
- - Uhh. I don't really know. It's a blue Ford Sierra.
- - Ahh. Could you hold on for a second.
- - Sure.
-
- She put me on hold.. I waited 30 seconds. I waited one minute. I waited
- 1 and 1/2 minute. I waited 2 minutes. Then I threw the phone and started
- running like hell towards the car.
-
- - SHIT! I shouted. Get out of this place. NOW!!
-
- It was like an action movie :-). Shit. Why did she put me on hold?
- She had all the information on her terminal when she asked me if it was
- a 87' model. Huh. Scary.
-
- We drove some blocks away and stopped at another phonebooth. I jumped out
- and dialed another police station..
-
- Ring. Ring.
-
- - Solna Police Station, a male voice answered
- - I want to check a car licence number, NOW! I shouted. I was excited.
- - Ok. Take it easy. What's number?
- - It's MSR 769.
-
- He tapped for some seconds on his keyboard.. and finally he asks:
-
- - A Ford Sierra?
- - Yepp. A blue one.
- - It's registered to the Swedish Police Department
- - Thanks..
-
- Hung up and rushed to the car. Hysteria among the other members..
-
- Huh. The first station I called didn't want to tell me it was a policecar.
- Why did she put me on hold? I guess they were tracing the call, and wanted
- to catch me standing in the phonebooth. But it isn't illegal to check a car
- licence plate... unless they have something to hide or fear.
-
-
-
- What's the conclusion of all this?
-
- a) We have a fanclub
- b) We have a couple of body guards protecting us 24h / day.
- c) The Swedish Police are really idiots following after us.
-
-
-
- ---------------------------
- - Investigation of S.H.A. -
- ---------------------------
-
- The Police are currently investigating S.H.A. and our activities.
-
- We have very strong indications that some of us are under surveillance
- 24 hours/day. They are also monitoring our calls, both voice and data.
-
- As a anonymous source said (well connected in the law enforcment);
-
- - The Swedish police computer crime division are currently fully engaged
- in tracking down a hacker group in Stockholm, Sweden.
-
- And we have notice strange behaviour around our houses, with suspicious
- cars and od behaviour of certain people.
-
- We have also strong indications that our houses have been searched when
- we have been away from home. And also some of our accounts on hacker boards
- have been used by other people without our knowledge.
-
- We might be paranoid, but all events taken together proves that we are not!
-
-
-
- -------------
- - Back Chat -
- -------------
-
- Rumours. What's life without them? A LOT BETTER!
-
- Anyway, here are some rumours we have picked up.
-
- Some months ago a rumor was floating around in the 'elite' world that some
- Swedish 'elite-d00dz' had been busted for BlueBoxing here in Sweden.
- As always with these kind of roumors, you should take 'em with a spoon of
- salt. Sad but true - nothing serious has happend. (These damn 'elite-d00dz'
- thinks they are phreakers. *sigh*) (Oct 1991)
-
- Some youngsters in Lulea, Sweden got busted for carding for about $10.000.
- These guys quited carding when the S.H.A. member got busted. 6 months later
- the police knocked at their doors and searched their houses. This resulted
- in a few prosecutions.
-
- A couple of students from Linkoping, Sweden got charged for using a X25
- NUI belonged to the Linkoping University Library. The university started an
- investigation when they received their phonebill, which where $10.000 higher
- than normaly. And the next one where even worse, $20.000 higher than normaly.
- After they had found that some students where using their X25 accounts they
- filed a complaint to the police.
-
- A swedish sucker at the Virus Help Center has started to scream for the
- police as soon he sees a new virus in Sweden. For example, he is trying to
- nail Tormentor, one of our guest writers which is the author of the
- Tormentor -d virus. Rumors says he has tracked down a swedish virus
- programmer/spreader and called the police. (Nov/Dec 1991)
-
- Rumors says a smaller disaster will occur when some members of S.H.A. goes
- to trial for charges concerning illegal accessing a computer system.
-
- Rumors says the FBI snatched the drives at FSF/MIT, and that they did NOT
- crash as the official explanation was. (April 1991)
-
- Rumors says Timewasters (hackergroup from Holland) penetrated a couple of
- pentagon computers and installed several backdoors. (Jack Brock at the GAO
- has confirmed that dutch hackers have broken into Pentagon computers.)
-
-
-
- --------------------------------
- - Messages to System Operators -
- --------------------------------
-
- To mention some swedish hacking acitivity, here goes some messages to
- system operators of each system, which they will understand:
-
-
- "Now is the question, Who is Marc Lundgren?" Gottcha SICS
- "I'll be back - be sure of that" Gottcha Bjorn Knutson, UU
- "What happend with ASEAs VAX machines? :-)" Gottcha ASEA Brown Boweri
- "Please send us 'last | grep peace'" Gottcha Dimension AB
- "Found our trojans?" Gottcha S-E-Bank
- "We don't know how far they have come" Gottcha SMHI
- "Nice phonebill, eh?" Gottcha OPIAB
- "Afraid of calling the police?" Gottcha DATEMA
- "Got any complaints from the DDN (milnet)?" Gottcha KTH/NADA
- "Don't say we didn't warn you." Gottcha FOA
-
-
-
-
- --------------
- - The Future -
- --------------
-
- We hope that the Swedish police will realize that no one will gain in
- the investigation of S.H.A. and only a catastrophy will occur.
- They should use their resources for better cases, i.e. finding people
- who commits murder or are raping young girls.
-
- So to those guys involved in tracking us down, we would like to say:
-
- - Up yours! Prove that we done anything illegal or stay off our back!
-
- Anyway, we are not looking to far ahead in the future since we have too
- many variables that can change. We just plan for the next week, but we
- hope that 1992 will be a great year for all of you hackers out there in
- the whole wide world.
-
-
-
- -----------------
- - Releases 1992 -
- -----------------
-
- We plan to release the following under 1992 and hopefully many more stuff,
- even if we can not guarantee that we do release all the stuff.
-
- - S.H.A. Annual Year Report '92.
-
- - A complete Internet hacker/scanner program.
-
- - A neat Unix program that will totaly hide you from system managers.
-
- - Sourcecode for several unix backdoors.
-
- - Security System for your personal computer.
-
- - Textfile "VMS to Internet Encyclopedia"
- (Follow up to the Unix to Internet Encyclopedia).
-
- - Textfile "How to card and get caught" by Lixom Bah
- Everything from how to card, to what happend me when I got busted, and
- the consequences for you, and your whole life.
-
-
-
- -------------------------
- - How to contact S.H.A. -
- -------------------------
-
- This was all for this time. Hopefully the S.H.A. will still be alive in
- February 1993 so we can release our 5th protocol. But don't count on that,
- the Swedish Police is giving us a very hard time here..
-
- We are interested in join venture with other good H/P groups so that more
- proffessional articles and files can be released to a wider public.
-
- If you feel that you want to contribute to our protocols in one way or
- another, you can contact us at the following addresses and phonenumbers.
- If you feel that you want to give us critic, don't hesitate to contact us..
-
- If you want to be included in our mailing list, please state so and you will
- automaticly receive all our releases.
-
-
- Internet : sha@darkside.com
- FidoNet : 2:201/610 username sha
- V.M.B. : +46-8-730 24 02 Box #9999
-
-
- Note: Federal goverments are also welcome to contact us for assistance.
- We have nothing to hide from goverment agencies.
-
- The above addresses are untraceable, so don't even bother...
-
-
-
- ----------------------
- - Editors final note -
- ----------------------
-
- Another year have passed and a new one is on it's way. I hope the new
- year will be another good year for all of the hackers out there.
-
- I will end this 4th protocol with some wellknown words;
-
- BE PARANOID - YOU ARE DOING SOMETHING ILLEGAL!
-
-
- I would like to thank all those people who have helped us creating this
- fourth protocol which I hope you have enjoyed, and special thanks goes to:
-
- Tormentor for "Demoralized Youth"
- Knight Lightning for "Operation Sundevil"
-
-
- I would also like to thank all those other guys in S.H.A. that has not
- been mentioned but have contributed to this file. Thanks!
-
- And to all you hackers out there... thank you for reading this file!
-
- I would also like to thank the Swedish Police for their
- interests in S.H.A. and for reading most of our files,
- We need more dedicated fans like them. Thank YOU!
-
-
-
- --------------
- - Disclaimer -
- --------------
-
- The material in this document is NOT ment to encourage hacking, cracking
- or illegal entering to computer systems. The Swedish Hackers
- Association can NOT be blamed for any abuse caused by it.
- The Swedish Hackers Association is formed only
- to inform the public what hackers and hacking
- really mean, and to report all hacking
- news and events to the readers.
-
- <---------------------------------------------------------------------------->
- ALL MATERIAL IN THIS DOCUMENT ARE COPYRIGHTED (c) 1992 BY S.H.A.
- USE OF THIS DOCUMENT WITHOUT S.H.A. PERMISSION IS STRICTLY PROHIBITED
- UNDERGROUND BOARDS ACCEPTED BY S.H.A. ARE ALLOWED TO USE ALL S.H.A. FILES
- <---------------------------------------------------------------------------->
-
-
-
-
-
-
-