home *** CD-ROM | disk | FTP | other *** search
-
- #######################################
- # #
- # #
- # ======== =\ = ====== #
- # == = \ = = #
- # == = \ = ====== #
- # == = \ = = #
- # == = \= ====== #
- # #
- # #
- # <Tolmes News Service> #
- # ''''''''''''''''''''' #
- # #
- # #
- # > Written by Dr. Hugo P. Tolmes < #
- # #
- # #
- #######################################
-
-
- Issue Number: 11
- Release Date: November 19, 1987
-
-
-
- This issue will continue from where it left off in issue #10. Issue #10
- detailed the bust of Shadow Hawk. This issue will now continue with more
- details and explanations of Shadow Hawk's bust.
-
-
-
- This issue is a continuation of the explanations in issue #10. All of the
- quoted material in this section of issue #11 comes from the article printed in
- issue #10. What follows the quoted material from the article is an
- explanation of that part of the article.
-
-
- ======================================
-
-
- "a computer break-in at the Bell Labs computer in Naperville was discovered
- and a record of the intruder's telephone number was spotted"-
-
- The computer system at Bell Labs in Naperville, Illinois obviously has
- CLID (Calling Line Identification) on the line and it made a record of
- Shadow Hawk's call.
- The Bell Labs area at Naperville is a three-building complex near
- Naperville and Warrenville Roads. According to a later article in the
- Chicago Tribune (the same newspaper that wrote the story of Shadow Hawk's
- bust), "Research into this technology of routing is essentially what Bell
- Laboratories in Naperville is all about."
-
-
- ======================================
-
-
- "Illinois Bell then began using a device known as a dial number recorder
- to log all calls made from the telephone number"-
-
- The DNR (Dialed Number Recorder) was placed on Shadow Hawk's line after
- his break-in at the Bell Labs computer was detected.
-
-
- ======================================
-
-
- The computers that the article listed as trying to break into or having
- broken into are as follows:
-
-
- - Bell Laboratories Facility in Naperville, Illinois
-
- - NATO Maintenance and Supply Headquarters in Burlington, N.C.
-
- - Robins Air Force Base in Georgia
-
- - Washington Post Newspaper (attempted)
-
- - A hospital in South Bend, Indiana (attempted)
-
- - various attempts at computers in Columbus, Ohio; Rye, N.Y.; and Pipe
- Creek, Texas
-
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
-
- This bust was not Shadow Hawk's first. In August of 1986, Shadow Hawk was
- busted for hacking into an RSTS/E system. His house was raided and they
- confiscated disks and printouts. Here is the post where he describes his
- bust. The post comes from Pirate-80 at (304) 744-2253.
-
-
-
-
-
-
- Msg#:28639 *[Communications]*
- 08/11/86 20:21:49 (Read 33 Times)
- From: SHADOW HAWK 1
- To: ALL
- Subj: ALL SORTS OF THINGS
-
- Well, you guys are not going to believe this... I got BUSTED... Yep. I dont
- recall whether or not I posted them here, but thn
- the 312-454 exchange... They didn't seem to like myself and others playing
- around in their system... Well, to make a long story short, they really didnt
- get any useful information out of myself (other than printouts of all my scans,
- and a dump of a few messages from a local board... nothing serious) Anyway, 2
- days later my modem fried, and now I'm using an INMAC 1200 I picked up for $40
- at a hamfest (but it doesnt work right, shit.) Well anyway, heres some shit:
- See if you guys can hack this unix, I cant do any major hacking for a while--
- (the cops have some deal with illinois bell now where they can check on all the
- #'s I call... gay)
- 930-XXXX-XXXX,XXXX-XXXX,XXXX-XXXX,XXXX-XXXX,XXXX-XXXX,XXXX-XXXX,XXXX-XXXX,XXXX-
- XXXX,XXXX-XXXX are all this one unix... I cant hack it at all, its gay. Heres
- a ROLM CBX: 930-XXXX, and an HP-x000: 930-XXXX... this responded with "ESS -
- HIT RETURN TO LOGIN" after I typed a shitload of ctrl-chars, but I cant get it
- to do that anymore--930-XXXX... AC-SAT 11.06 - DB 11.05 - AL 87A will be
- printed if you call 930-XXXX... heres a unix I could get into: 930-XXXX-XXXX,
- login root login top login oldsh login backup no password for any of
- them. On all xcept backup, check out the file RSTSHELL... interesting... also
- README... try 930-XXXX for a weird experience 310-XXXX is another stubborn unix
- 310-XXXX login guest (those were all (312) area, sorry!!!) 201-265-XXXX login
- sys 914-945-XXXX login Uback password idontcare thats the gay uucp login,
- see what you can do with it... I would have more, but, what the fuck, I'M
- BUSTED. Oh yeah, the peoples who's rsts's I ravaged arent gonnapress harges.
- goodie. Don't worry, youre safe, (_>Sh1<_)
-
- P.s. anyone know the # for INMAC? oh yeah, one more thing, at the hamfest
- where I got the modem, i got a diverter for $10... pulse... oh well, it sucks.
-
-
-
-
-
-
-
- As you might have noticed, Shadow Hawk remarked how the police had some
- sorta deal "with illinois bell now where they can check on all the #'s I call"
- which might refer to an earlier DNR that was placed on his line all the way
- back in June of 1986. Of course, this isn't the same DNR (Dialed Number
- Recorder) that was on his line (which is apparent in the article).
- The numbers listed in the post have been edited out and replaced with
- x's. The "xxxx" is actually the suffix (x-ed out).
- The people whose system Shadow Hawk hacked into did not press charges
- and nothing really ever happened because of this bust.
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
-
- As a result of all the publicity on Phreak Klass, it issued a disclaimer
- before logging on. The following disclaimer was posted after the news on
- Shadow Hawk's bust was printed by the news media:
-
-
-
-
-
-
- DISCLAIMER: THIS BBS IS A PRIVATE SYSTEM. ANY UNAUTHORIZED ACCESS ATTEMPTS
- CONSTITUTE A VIOLATION OF THE 1986 FED COMPUTER CRIME LAW AND ARE PUNISHABLE
- BY BOTH CIVIL AND CRIMINAL REMEDIES.
-
- THE INFORMATION MADE AVAILABLE ON THIS BBS IS FOR INFORMATIONAL AND EDUCATIONAL
- USES ONLY. WNSIBLE FOR ANY MISUSE OF SAID CONTAINED INFORMATION.
- ANY WILLFUL MISUSE OR CRIMINAL ACTS ARE THE RESPONSIBILITY SOLELY OF THE USER
- AND WE ASSUME NO LIABILITY FOR ANY ACTIONS OF THE USER. ALL INFORMATION
- CONTAINED HEREIN THIS COMPUTER BULLETIN-BOARD SYSTEM IS COPYRIGHTED
- AND PROTECTED BY THE LAWS OF THE UNITED STATES. ANY UNAUTHORIZED ACQUISITION,
- COPYING, DUPLICATING, DISTRIBUTION, REPRODUCTION, DISPLAY, IMAGE,
- DIPICITION, STORAGE IN ANY MEDIUM, IN VIDEO, AUDIO, ELECTRONIC, OR PAPER
- CONSTITUTES A VIOLATION OF BOTH CRIMINAL AND CIVIL COPYRIGHT
- INFRINGEMENT LAWS AND WILL SUBJECT THE UNAUTHORIZED USER TO BOTH CIVIL AND
- CRIMINAL PENALTIES, PUNISHABLE BY LAW.
-
- WITH USE OF SYSTEM PASSWORD YOU HEREBY AGREE TO THE TERMS OF THIS CONTRACT AND
- SHALL BE HELD LIABLE FOR ANY MISUSE OF SAID CONTAINED INFORMATION AND WILL
- EXPOSE YOU TO BOTH CIVIL AND CRIMINAL PENALTIES UNDER THE LAW.
-
- ANY UNAUTHORIZED OR MISUSE OF VALID LOGON AND PASSWORDS CONSTITUTES BOTH
- CIVIL AND CRIMINAL VIOLATIONS AND ARE PUNISHABLE UNDER LAW.
-
- @1987 PHREAK KLASS 2600 BBS
-
- PK2600 AND PHREAK KLASS 2600 ARE COPYRIGHT OF RICH LEVENSON (SYSOP)
-
- DO YOU FULLY AGREE TO THE TERMS STATED ABOVE [Y/N]: Y
-
- LOGIN: EDUCATE
-
- ENTER PASSWORD [OR 'NEW']: -------
-
-
-
-
-
- Although this might slightly deter any security agents from calling, the
- bulletin board is still very public and will allow new users. Please feel free
- to call. Phreak Klass is meant to be a place for people to learn more about
- the world of phreaking and hacking. If you want to learn, call Phreak Klass.
-
-
- (806) 799-0016
-
-
- LOGIN: EDUCATE
-
-
-
- Now this issue will continue with another article cocerning Shadow Hawk's
- bust.
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
-
- CHICAGO (AP)- Federal investigators are wading through piles of printouts
- to assess damage caused by "Shadow Hawk," a teen-age computer buff who
- used AT&T systems to tap into NATO and Air Force telephone networks, a
- prosecutor said Thursday.
- Secret Service agents who raided the North Side home of the 17-year-old
- "hacker" confiscated three computers and software stolen through telephone
- company systems, said William J. Cook, an assistant U.S. attorney. He would
- not speculate on any motive for the teen-ager, who used "Shadow Hawk" as a
- code name, but said some hackers like to see how far they can go with their
- machines.
- A decision on whether to charge the teen-ager will be made after the
- stolen materials are analyzed, Cook said. Agents have been working
- full-time since the Sept. 4 raid printing out "the enormous quantity of
- material stored in his computers," he said.
- National security was not seriously jeopardized by the theft of material
- from an AT&T computer at NATO Maintenance and Supply Headquarters in
- Burlington, N.C., Cook said. But he declined to comment on the nature of
- information taken from Robins Air Force Base in Georgia.
- AT&T put the value of its stolen software, some of which is not yet on
- the market, at more than $1 million, Cook said. The teenager also is
- suspected of revealing vices over a computer network in
- Texas that is used as a kind of bulletin board for hackers, he said.
- The network, called "Phreak Class-2600," exists only "to educate
- computer enthusiasts ... to penetrate industrial and government sector
- computer systems," said Cook. Authorities said they were led to the teen-ager
- partly through messages he left on the Texas network, bragging of having
- gained access to the AT&T computer files. Kathryn Clark, a spokeswoman for AT&T,
- said the company's security systems were triggered by Shadow Hawk's computer
- break-ins. There was no physical break-in, Cook said. The computer
- programs and other information were obtained by tapping into systems by
- telephone, using another computer. Shadow Hawk penetrated AT&T computers
- by disguising his own computer as a telephone company computer, he
- said.
- "Once entering the system, he would have his computer talk to the
- phone company computers and cause the computer at some remote spot to
- transfer files to ... Bell Labs in Naperville," a Chicago suburb, Cook said.
- Then the youth would transfer the information in the Bell computer into his
- own computer, said the prosecutor. An analysis of long-distance calls made
- from the youth's telephone indicates he also tried to enter computers at the
- accounts-payable department of The Washington Post and and other
- businesses, the prosecutor said.
- A 17-year-old is considered a juvenile, Cook said, and if investigators
- believe charges are warranted, the Justice Department would be petitioned for
- permission or the case could be turned over to local officials for
- prosecution under state law.
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
- NOTA:
-
- This article just explains some more on the bust of Shadow Hawk. The newspaper
- put in the details on how Shadow Hawk received the files for the average
- reader who would not know of such things. The article gave a little more info
- on the raid on Shadow Hawk's house. As stated the the article, the SS (Secret
- Service) confiscated three computers along with disks and printed material.
- It is likely to assume that they confiscated disks containing hack/phreak
- information and the stolen software. Shadow Hawk was known to have hundreds
- of K worth of unixes. They most likely also obtained his passwords to all
- boards and other such materials. Any further updates on Shadow Hawk's bust
- will be noted in later issues of TNS.
-
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
-
- TITLE: US Sprint Sues "Ring" of Hackers for $20 Million
- FROM: Los Angeles Times
- DATE:
-
-
- US Sprint said Friday that it has filed three lawsuits seeking more than
- $20 Million for losses from a multistate ring of commputer hackers who
- allegedly stole long-distance telephone service using illegally obtained
- authorization codes.
-
- The complaints, filed Thursday in U. S. courts in Los Angeles, Seattle and
- Kansas City, Mor., are evidence of yet more woes plaguing the fast-growing
- long-distance telephone company.
-
- Kaprint, a joint venture of GTE Corp. and United
- Telecommunications Inc., has been plagued by thousands of customer-billing
- problems that contributed to a $76-million loss in its second quarter and the
- departure of the firm's president.
-
- Sprint spokesman Syd Courson said the alleged ring used computer equipment
- to identify Sprint long-distance authorization codes, the numbers that
- customers dial in some circumstances use the long distance system.
-
- $20 MILLION IN CALLS
-
- Once the ring obtained the codes, Courson said, it placed more than $20
- million worth of long-distance calls on the sprint network, with the calls
- billed to the parties actuallly assigned the codes. Some of the stolen codes
- were sold to business users through elaborate marketing programs, he said.
-
- Defendants named in the lawsuits include: Gyan P. Syal and Karlheinz
- Mueller of Los Angeles area; Paul Lindahl, Ralph Purdy III and Kenneth J.
- Sheridan, all of the San Fransisco area, and Frederick M. Deneffe III and
- Burton Leroy Andrews of Portland, Ore., area, Sprint said.
-
- The defendants allegedly conducted business under varrious company names,
- including United Systems, California Discalland Hello America, the suit
- charged. Criminal charges previously were filed against some of the defendants
- by federal authorities, Sprint said.
-
-
-
- $$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
-
-
-
-
-
-
-