home *** CD-ROM | disk | FTP | other *** search
-
- #######################################
- # #
- # #
- # ======== =\ = ====== #
- # == = \ = = #
- # == = \ = ====== #
- # == = \ = = #
- # == = \= ====== #
- # #
- # #
- # <Tolmes News Service> #
- # ''''''''''''''''''''' #
- # #
- # #
- # > Written by Dr. Hugo P. Tolmes < #
- # #
- # #
- #######################################
-
-
- Issue Number: 02
- Release Date: November 19, 1987
-
-
- Welcome to the first REAL issue. Real meaning that it contains articles. With
- nothing further, this issue now goes to the articles.
-
-
- Issue #2 Index:
-
- 1) They sure can talk in Raleigh
-
- 2) Teaching Computer Ethics in the Schools
-
- 3) Cash-Machine Magician
-
- 4) Cheaper Electronics Makes it a Snap to Snoop
-
- 5) Los Alamos Nuclear Facility Security Boost
-
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
-
- TITLE: "They sure can talk in Raleigh"
- FROM: The Chicago Tribune (Tempo Section)
- DATE: July 21, 1987 (Wednesday)
-
-
- "What is that?" Kathy Riedy asked her husband, John, as he entered the
- family home in Raleigh, N.C., the other day with a box under his arm.
- "It's the phone bill," he said, and before she had a chance to let that
- register, he opened the box. Inside was one long-distance phone bill from
- Sprint- all 729 pages of it, all 3 pounds, 13.5 ounces of it- for
- $24,129.99. The Riedys' Sprint bill usually runs about $5 a month. But in
- June, according to the statement, he had been on the long-distance line for
- 10,731 minutes, or 72 days and 51 minutes. Examining the statement in
- detail, Riedy discovered that most of the calls had been made over a
- three-day period, June 15-17. Not even as teenagers, so far as they could
- recall, had either of the Riedys spent 72 days on the phone in a month, let
- alone three days. Riedy had been ready for something like this. He received a notice that his calling card would be
- revoked because of excessive use. Evidently phone companies get
- suspicious when a single residential customer suddenly runs up a monthly
- bill in five figures.
- Puzzled by the notice, Riedy tried several times to call Sprint, he
- said, but the lines were always busy. "We had some fun with it," says Kathy
- Riedy. "Our 22-year-old son is here for the summer. So we asked him if he would
- look at the phone bill and tell us which calls were his. Then we handed
- him the box." The bills showed that Riedy had made $3.27 worth of
- long-distance calls from Raleigh in June. The rest were dialed in
- Minneapolis, Indianapolis and Chicago, about 1,500 of them all together, including calls to
- California, New York, Colorado and Texas. "We were never worried," says
- Kathy Riedy. "It's easy to prove you didn't make $24,000 worth of calls,"
- she explained, "but imagine the trouble we would have had if the bill
- had been for $200."
-
- ---- Clarence Petersen ----
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- NOTA (Notes On the Article):
-
- T of code abuse. There are some important
- details that should be remembered:
-
-
- "received a notice that his calling card would be revoked because of
- excessive use"- The LDC computer detected excessive use of the code.
-
-
- "phone companies get suspicious when a single residential customer suddenly
- runs up a monthly bill in five figures"- This is the main reason why
- LD Companies (LDC's) cancel codes.
-
-
- "dialed in Minneapolis, Indianapolis and Chicago, about 1,500 of them all
- together, including calls to California, New York, Colorado and
- Texas"- This makes it very likely that the code was hacked out and then passed
- to different phreak bulletin boards. That would be a logical reason why the
- calls were placed from different states.
-
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
-
- TITLE: "Teaching Computer Ethics in the Schools"
- FROM: Education Digest
- DATE: February 1987
-
-
- Changing the Attitudes of "Hackers" by William Weintraub
-
-
- Several outstanding problems with computer use must be addressed by any
- responsible school district: copyright violations, unauthorized entry into
- computers and phone fraud. John Rogers, a security agent for Bell Atlantic,
- says, "75 % of computer phone fraud is committed by people under 25....the
- rest is often committed by adults using the children as vehicles for the
- crime."
- Schools that teach computer literacy and don't teach the
- ethical/legal use of computers are doing a disservice to their students.
- The FBI has taken a serious approach to computer crime, many agents focusing on
- nothing but this type of fraud. FBI Special Agent Larry Hurst says,
- "Teaching kids about computers without teaching the ethical use and rules is
- like giving a child a car and not teaching him the rules of the road."
- One of the reasons schools have been slow to react to this type of crime is
- that it usually involves students who ordinarily do not get into troulbe and
- who justify their acts by saying, "I really didn't hurt anyone." As Rogers
- states, "Many of the people involved are not the kind who would ever
- consider stealing from anyone in a physical manner." They are often of
- above-average intelligence, considered trustworthy, and just trying to "beat
- the system." However it isn't a victimless crime. In 1984, in New York
- City alone, $70 million in phone and computer fraud occurred. This charge is
- passed right on to the customer. After a NEWSWEEK reporter wrote an article on
- people who invade computer systems without authorization some of these
- so-called "hackers" invaded a national credit history computer and destroyed
- the financial history of the writer of the article. They charged thousands of
- dollars to his account numbers, shut off his utilities, and sent him death
- threats from across the nation. Computer fraud is not a victimless
- crime.
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- NOTA:
-
- Here are some thing that will help clear up this article:
-
- "a NEWSWEEK reporter wrote an article on people who invade computeorization"- The person they are talking about is Richard "Revenge
- of Hackers" Sandza.
-
- "invaded a national credit history computer and destroyed the financial
- history of the writer of the article"- This refers to someone on Pirate-80
- getting into TRW and posting Richard Sandza's credit-card numbers.
-
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
-
- TITLE: "Cash-Machine Magician"
- FROM: US News & World Report
- DATE: Unknown
-
-
- Automated bank-teller machines can be maddening devices, but there is one
- thing they supposedly do will: protect customers' accounts. Not always
- apparently. Police are looking hard for Robert Post, 35, a Polish-born
- electronics expert and former ATM repairman who brags that he is something of
- a magician. According to the secret service, Post last year managed to make
- some $86,000 disappear from cash machines-all from other people's bank
- accounts. Post allegedly worked his legerdemain with blank white plastic
- cards and a small magnetic encoding machine that he bought for $1,800. By
- peering over customers' shoulders and retrieving their discarded banking
- receipts, he obtained the personal ID and bank account numbers need to
- activate the computerized tellers.
- Using the encoding machine, he embellished his plastic with strips of
- magnetic tap bearing digital codes almost identical to those on the
- defrauded customers' cards. Eventually,
- though, a recurring flaw in Post's codes was picked up by the bank's
- computer. Post skipped out on a $25,000 bail in Manhattan. He is still
- at large.
-
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- NOTA:
-
- I found this article very interesting. The most important piece was the part
- about the magnetic encoding machine. ATM fraud is definitely the crime of
- the future. The magnetic encoding machine most likely encoded the cards
- with the customers' PIN.
-
-
- "a recurring flaw in Post's codes was picked up by the computer"- Was
- something really wrong with his method or did the customers just report the
- things that were wrong with their accounts?
-
-
- After making $86,000 from ATM's, I don't think that Mr. Post will be
- turning himself in.
-
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
-
- TITLE: "Cheaper Electronics Makes it a Snap to Snoop"
- FROM: US News & World Report (Business Section)
- DATE: May 18, 1987
-
-
- In the old-tech days, a wiretap had to be hooked up directly to the phone
- line, leaving a physical trace of tampering. Newer devices are impossible
- to detect. Take long-distance phone calls. At least part of their trip
- usually takes place over micro wave-relay links, pairs of dish-shaped
- antennas on hilltops about 30 miles apart. Anyone in the path of these kind
- of microwave beams with the right kind of radio receiver can pick up calls
- loud and clear. To find frequencies serving two particluar phones and
- eavesdropper might have accomplices place a brief call between those phones
- and send a distintive tracer signal over the line. A microcomputer could
- then channels and switch on a recorder when it detected
- the the dialing code. International calls, which are often beamed up by
- satellites, can be intercepted with a satellite dish anywhere within hundreds
- of miles of a ground station.
- To protect its own secrets, the US government uses only buried telephone
- lines and fiber-optic cables for most of its most sensitive communications.
- Scramblers and other devices encrypt all classified telephone calls, telexed
- messages and computer data sent over phone lines. And, under a program
- code-named TEMPEST, computer equipment used for classified work is tightly
- shielded to prevent electronic leaks.
- Until recently, bulk and expense restricted sophisticated scramblers to
- government agencies that use classified information. Their file-cabinet size
- and $60,000-plus price tag had put them out of the reach of paper-clip
- manufactureres worried mostly about keeping the wraps on next month's
- production figures. Microchip technology has now cut the costs to
- about $20,000, however, and at lease one manufacturer E-Systems- a Dallas-
- based defense contractor- is beginning to promote the equipment for sale to
- private companies.
- TEMPEST equipment, required for defense contractors who handle
- classified data, is being adopted by others as well. Chase Manhattan, the
- third-largest bank in the US, is planning to include electronic
- shielding in new office construction. Encrypting computer data sent over
- telephone lines has been more widely accepted by industry, especially banks,
- though most bank managers refuse to believe that something dire can
- happen to them. "They say, 'A spy would have to pick out that one little wire
- that has our stuff on it,'" says Bob Meadows, former assistant director for
- security and risk management at American Bankers Association. That's
- one reason why most ATM's, and many electronic funds transfers, are still
- unencryped. In addition, confustion has arisen over a uniform coding standard,
- needed so that everyone speaks the same encrypted language. The federal
- government has been trying to introduce a new, more secure standard to replace
- one already adopted by many banks. The banks have balked at the new code
- because of classification restrictions that forbid its use outside of the US.
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- NOTA:
-
- This article explained many different types of telecommunications security.
- Operation TEMPEST was mentioned and so was other news on government security.
- One of the main things that was emphasized was the picking up of radio
- waves to monitor both calls and transmissions from computer equipment.
- Only certain portions of the article were typed up (the interesting parts.)
-
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
-
- TITLE: Los Alamos Nuclear Facility Security Boost
- FROM: -------
- DATE: September 7, 1987
-
-
-
- LAB UPGRADES RADIO SECURITY
-
- Concerned about illegal interception of computer-emitted radio signals, the US
- Departmened security systems at the Los Alamos
- National Laboratory. An article by the lab's security division says recently
- security personnel at the lab went outdoors and used radios to detect
- computer information leaks, finding that computer and communication systems
- data inside could be detected by spy radios in a nearby parking lot.
- DOE spokesman Dave Jackson told The Associated Press, "We had our own
- people go out there with sophisticated equipment to detect this."
- First to call attention to the problem was an article published in PanorAma, a
- monthly for employees of Pan Am World Services, which has about 1,600
- employees at the lab.
-
- --Charles Bowen
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- NOTA:
-
- This is just a report on more security at military installations because of
- Operation TEMPEST.
-
-
-
-
-
-
-
-
-
-
-