home *** CD-ROM | disk | FTP | other *** search
- ==Phrack Inc.==
-
- Volume Three, Issue Thirty-four, Phile #11 of 11
-
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
- PWN PWN
- PWN Phrack World News PWN
- PWN PWN
- PWN Issue XXXIV, Part Two PWN
- PWN PWN
- PWN Compiled by Dispater PWN
- PWN PWN
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
-
- Mind Rape or Media Rape?
- ~~~~~~~~~~~~~~~~~~~~~~~~
- Special Thanks: Night Ranger
-
- Thursday September 26, 1991 was no ordinary day for Mind Rape, a young Arizona
- State college student. When he finally made it home that day, he found his home
- had been raided by the feds. 'They took EVERYTHING! Including my Metallica
- tape!' he told me. After talking to him for quite a while I learned a lot, not
- just about his bust but about hacking in general. He instructed me not to say
- anything specifically on the advice of his lawyer and the EFF, but he did want
- me to let the real reason he was busted be known - His electronic newsletter
- entitled NSA (for National Security Anarchists). Mind Rape has some very
- important views on hacking that the government doesn't want others to hear.
- Some of these views were contained in his newest and soon to be released
- newsletter NSA issue number five, which was confiscated of course. He was also
- working on a book about hacker's philosophy, which was taken too. He has not
- yet been charged but in the eyes of the media he is already been tried and
- found guilty. It is unfortunate the general public gets its information from
- news reports like the following because, as you can see, they can be quite
- misleading. Hopefully once Mind Rape gets everything straight he will continue
- to write his book, after all it is his constitutional right to do so, and I
- think it be quite informative to both the hackers of the nineties and the
- outside world.
-
- The following is a transcript of a news report covering his story...
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Male Announcer: That student is Donald _____ of Phoenix. Officials of
- LDL Long Distance believe he's one of around 20 hackers who've been ripping off
- their company for fun and profit. In tonight's Night Team Report we'll see how
- this kind of thievery adds up. The nation's telephone companies loose more
- than a billion dollars a year to hackers. Mark Nighten (sp?) a security
- director for LDL Long Distance. Last month he was poring through records like
- these which convinced him to believe that someone was making hundreds of
- computer generated phone calls to his company's 1-800 access line trying to get
- customer's calling card codes. He went to the Phoenix Police. They got a
- search warrant and traced the calls to a house near 18th Drive near Union
- Hills. Police went there last month and came away with a computer, software
- and a list of phone codes, all belonging to 19 year old Donald _____ an ASU
- student. With nighten suspects _____ is just one of 20 hacker on his network
- who can make thousands of dollars worth of calls which would wind up on other
- people's phone bills.
-
- Mark: You can see the magnitude of this. Off of one authorization code
- you could have 10, maybe 150 other people...
-
- Male Announcer: Lemme ask ya...How bad are you getting ripped off here?
-
- Mark: We've had to have somebody on this 24 hours a day. We've been
- getting killed.
-
- Male Announcer: Hackers often sell the codes they steal to other students.
- So that hundreds of students and Arizona State University and University of
- Arizona also could be ripping of the company. Students at Arizona State
- University told me today that they have not herd of LDL's troubles, but they
- confirmed that stolen phone codes do have a way of getting around.
-
- I iz a College Student: Someone hears...ya know...about the interest and
- someone else knows somebody...ya know...and they tell you and you talk to
- them and...ya know...it's not overly expensive or anything like that.
-
- Male Announcer: Dr. Dan Kneer of Arizona State University's School
- of Business is a nationally recognized expert on computer crime. [who?] He
- contends that hacking is mushrooming.
-
- Dr. Dan: The problem that I see is that these people philosophically
- don't see this as a crime. For most of them this is an intellectual challenge.
-
- Male Announcer: That challenge led Dutch students to break into a United
- States Army Computer during operation desert storm. And as this Japanese
- documentary shows, it led hackers in a New York City to use payphones to commit
- big time rip-offs. Now it's important to point out that Donald ______, that
- Arizona State University student, has not yet been charged with any crime and
- if he is charged he is innocent until proven guilty.
-
- Female announcer: What is the penalty for hacking?
-
- Male Announcer: Just for getting into a system when you're not supposed to
- can be up to a year and a half in prison. But if there is criminal intent to
- steal, to rip-off that system, the penalty can be as high as 10 years in jail
- and a $150,000.00 fine.
-
- _______________________________________________________________________________
-
- Computer Hacker Gets Probation September 26, 1991
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Special Thanks: Flaming Carrot (Pittsburgh Post-Gazette)
-
- A Mt. Lebanon woman who was able to make thousands of free long-distance
- telephone calls by breaking into voice mail boxes with a touch tone telephone
- has been placed on 10 years probation. Last Friday, Common Pleas Judge Robert
- E. Dauer ordered Andrea Gerulis, 20, of Castle Shannon Boulevard to make
- restitution of $4,300 to Magee Womens Hospital and $2,516 to Pittsburgh
- Cellular Telephone Co.
-
- Gerulis, a Mt. Lebanon High School graduate, was a computer hacker who
- entered telephone computer systems illegally so that she could make telephone
- calls without paying for the service. Mt. Lebanon police Detective John L.
- Michalec posed as a computer hacker and spent nine months investigating her
- activities, which were done by dialing codes on a touch-tone telephone.
-
- After a non-jury trial in May, Dauer convicted her of two counts of theft
- of services and two counts of unlawful use of computers. Assistant District
- Attorney Thaddeus A. Dutkowski recommended probation because he didn't want
- Gerulis to go to jail, where she could teach inmates how to commit crimes with
- a telephone. If she were incarcerated, she would have the largest classroom
- environment she could hope for, Dutkowski said.
-
- Dauer agreed that inmates already know too much about committing crimes
- with telephones. Gerulis told Dauer that she was sorry for what she did, that
- when she started, she was doing it for fun. She was also ordered to continue
- psychological counseling.
- _______________________________________________________________________________
-
- More Archaic Government Regulations Proposed
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Special Thanks: Stainless Steal Provider (New York Times)
-
- The federal government said Thursday that it would introduce a standard
- for authenticating electronic data later this summer, but the announcement
- prompted an angry reaction from one of the leading private providers of software
- that protects computer data.
-
- The company, RSA Data Security Inc. of Redwood City, Calif., said the
- government had failed to address fears about the possibility of a secret "trap
- door," which would permit intelligence and law-enforcement agencies to look at
- private data.
-
- The issue of providing special mechanisms to permit government access to
- private information has caused a growing public debate recently.
-
- Earlier this year an anti-terrorism bill introduced in Congress called on
- the computer and telecommunication industries to permit federal agencies to
- look at private data. But the statement was later dropped from the bill after
- extensive public opposition.
-
- Government officials said that it would be possible for technical experts
- to examine the standard when it is released this summer and they could decide
- for themselves whether there were any shortcomings in the design of the
- standard.
-
- "It will be openly published and people can inspect it to their heart's
- content," said James H. Burrows, head of the computer systems laboratory at the
- National Institute of Standards and Technology.
-
- He added that the new standard was not intended to encrypt computer data,
- and that the government would continue to rely on an earlier technology known
- as the Data Encryption Standard to actually hide information from potential
- electronic eavesdroppers.
-
- Burrows said there was a project under way to develop a successor to that
- standard, but that it was years away from completion.
- ______________________________________________________________________________
-
- Computer Whiz Accused Of Illegal Access and Mischief September 25, 1991
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Peter G. Chronis (The Denver Post Page 1 "NASA vs. Hobbyist")
-
- An Aurora computer hobbyist who allegedly used a personal computer and his
- home phone to penetrate NASA computers hacked off Uncle Sam enough to be
- indicted on seven federal counts yesterday. Richard G. Wittman, 24, the
- alleged "hacker," was accused of two felonies, including gaining unauthorized
- access to NASA computers to alter, damage, or destroy information, and five
- misdemeanor counts of interfering with the government's operation of the
- computers. Wittman allegedly got into the NASA system on March 7, June 11,
- June 19, June 28, July 25, July 30, and Aug. 2, 1.
-
- Bob Pence, FBI chief in Denver, said Wittman used a personal computer in
- his home and gained access to the NASA systems over telephone lines. The
- investigation, which took more than a year, concluded that Wittman accessed the
- NASA computer system and agency computers at the Marshall Space flight Center in
- Huntsville, Alabama, and the Goddard Space Flight Center in Greenbelt,
- Maryland.
-
- The NASA computers are linked to a system called Telenet, which allows
- qualified people to access government data bases. A user name and password
- are required to reach the NASA computers. Federal sources declined to reveal
- more information because the complex case involves "sensitive material."
-
- Wittman, a high-school graduate, apparently hadn't worked in the computer
- industry and held a series of odd jobs. The felony counts against him each
- carry a possible five-year prison term and $250,000 fine.
-
- Security Increases
- ~~~~~~~~~~~~~~~~~~
- Special Thanks: Stainless Steal Provider (New York Times)
-
- The foundation was started by Richard Stallman, who was awarded a MacArthur
- Foundation fellowship in 1. While mainstream software companies
- have prohibited users from freely copying their programs, Stallman, who is
- widely respected for developing computer languages and software editing tools,
- has argued that information is not the same as other commodities and should be
- shared without cost.
-
- His password has been widely known among network users because he has
- refused to keep it secret. He is bitter about the changes that have
- accompanied the coming of age of computer networks.
-
- Last month, after security was increased at the foundation and many users
- were stripped of their guest privileges, Stallman said he considered giving up
- his quest.
-
- In the end, he decided that the cause of creating free software was too
- important to abandon, but he said he feels like a pariah. "Since I won't agree
- to have a real password, I will only be able to log in on the 'inside' machine
- s,"
- he wrote in an electronic message in response to a reporter's query.
-
- "I still feel partly ashamed of participating in this. I've been forced to
- choose between two principles, both of which are so important to me that I
- won't accept the loss of either of them."
-
- Idealists like Stallman and Ted Nelson, the author of the cult classic
- "Computer Lib," hoped that the computer revolution wouldn't be like the
- industrial revolution. This time the wealth -- information -- would be free to
- everyone and instant communication would break down the barriers between rich
- and poor and remake mankind.
-
- Marvin Minsky, a computer science professor at MIT, said that for 15
- years, beginning in 1963, researchers at the school lived in a paradise,
- sharing computers and networks before a system of password protection was
- installed. Now that has changed. "It's sad," he said.
-
- "But Richard Stallman is living in a dream world. He has this view that
- his idea of computer ethics will prevail. But it's not going to happen this
- year or next."
-
- Instead of finding community on computer networks, many users are now
- confronted with virus invasions and information theft, leading to the same
- sense of alienation and fear felt by residents of large cities.
-
- "At first I thought this was Marshall McLuhan's global village coming to
- reality," said Neil Harris, a manager at General Electric Information Services
- Co., which sets up computer conferences and sells information to about 200,000
- members around the world.
-
- "But it's not that at all. It's a lot of people connecting in hundreds of
- small communities based around highly specific interests."
-
- Steven Levy, who has written about the early days of computing at MIT, said
- that the demise of the Free Software Foundation's open door policy was
- inevitable.
-
- "When you pass the plate around in church you don't expect people to steal
- from it," he said. "But sooner or later everyone knows that the plate is
- unguarded, and there are always people who don't care about the church. The
- question is how far do you go to protect it? Do you lock the church or do you
- send an armed guard around with the plate?"
- ______________________________________________________________________________
-
- PWN Quicknotes
- ~~~~~~~~~~~~~~
- 1. On June 12, 1991, Sirhackalot's equipment was confiscated by the Southern
- Bell and the FBI without any charges being filed. Neither the FBI nor
- Southern Bell bothered to explain why they were in his home and taking his
- personal possessions. Again neither party could tell Sirhackalot what he
- supposedly did to bring both agency's to his doorstep. Also busted were
- Mr.Doo and The Imortal Phreak. [Special Thanks: The Marauder (404)]
- _______________________________________________________________________________
-
- 2. Bill Cook is no longer an assistant United States Attorney in Chicago. It
- is unknown how he left his position. Basic questions go unanswered. Did
- he quit or was fired? If he was fired, we'd like to know exactly why.
- _______________________________________________________________________________
-
- 3. Wanted: Targets of Operation Sun Devil
-
- Computer Professionals for Social Responsibility (CPSR) is pursuing a
- lawsuit against the Secret Service seeking the release of information
- concerning Operation Sun Devil. In recently filed court papers, the
- agency claims that the information cannot be disclosed because, among
- other reasons, disclosure would violate the privacy of those individuals
- who are the targets of the investigation. This argument can be overcome
- if CPSR obtains signed releases from those individuals. CPSR is
- requesting the cooperation of anyone who was the subject of a Sun Devil
- raid on or about May 7, 1. We are prepared to enter into an attorney-
- client relationship with individuals responding to this request, so that
- confidentiality will be assured.
-
- Please respond ASAP to:
-
- David Sobel
- CPSR Legal Counsel
- (202) 544-9240
- dsobel@washofc.cpsr.org
- _______________________________________________________________________________
-
- 4. Recently Microsoft discovered it was the victim of trespassing. A
- security guard noticed two people playing volleyball on the premises and
- knew that they did not work for Microsoft. The officer approached the
- volleyball players and asked them to leave. The trespassers left. Later
- someone asked the security guard how he knew that the people playing
- volleyball were not Microsoft employees. He replied, "They had tans."
- [Special Thanks: Psychotic Surfer]
- _______________________________________________________________________________
-