home *** CD-ROM | disk | FTP | other *** search
- ==Phrack Inc.==
-
- Volume Four, Issue Thirty-Nine, File 11 of 13
-
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
- PWN PWN
- PWN Phrack World News PWN
- PWN PWN
- PWN Issue XXXIX / Part Two of Four PWN
- PWN PWN
- PWN Compiled by Datastream Cowboy PWN
- PWN PWN
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
-
-
- The Charge Of The Carders May 26, 1992
- DDDDDDDDDDDDDDDDDDDDDDDDD
- By Joshua Quittner (<New York> Newsday)(Page 45)
-
- Computer criminals are after your credit-card numbers --
- to steal with, sell and swap.
-
- THE KID, from Springfield Gardens, Queens, was a carder, of course.
-
- He was doing what carders do: trying to talk a salesman into overnight-
- expressing him a $4,000 computer system -- and using a stolen credit-card
- number for payment.
-
- The salesman was playing right along on the phone; he had also notified a co-
- worker to alert the New York State Police, said William Murphy, a customer
- service manager at Creative Computers, who described the event as it was
- unfolding on a recent Tuesday morning. Murphy said that on a typical day, as
- many as a dozen times, carders would call and try to buy everything from modems
- to whole computer systems.
-
- Murphy said that these days, the security people at Creative Computers are able
- to stop virtually all of them, either by not delivering the goods, or by
- delivering them UPS -- that's United Police Service.
-
- He sighed: "It's amazing that they even try."
-
- But try they do. And at other places, they're successful. Where once hacking
- into a credit bureau was a kind of rite of passage for computer intruders, who
- generally did little more than look up credit histories on people like Mike
- Dukakis, now computer criminals are mining national credit bureaus and mail-
- order houses, coming away with credit-card numbers to sell, swap or use for
- mail-order purchases.
-
- Underground electronic bulletin board systems help spread not only the
- passwords, but the techniques used to tap into different systems. In
- San Diego on April 30, for instance, police raided a bulletin board called
- Scantronics, which offered among other things, step-by-step manuals on how to
- hack into Equifax Credit Information Services and TRW Information Services, the
- largest credit bureaus in the nation, the San Diego Tribune reported.
-
- "The potential for fraud is enormous, it's almost limitless," said Joel Lisker,
- Mastercard International's vice president of security and risk management, who
- noted that computer intruders accessed "thousands" of credit-card account
- numbers in another recent case.
-
- MASTERCARD is putting together a task force of its bank members to address the
- problem, and is considering inviting hackers in to learn what they can do to
- tighten up computer access to credit bureaus, he said.
-
- Mastercard estimates it lost $57 million to counterfeit scams last year; Lisker
- said it is impossible to say how much carders contributed. But based on the
- volume of arrests lately, he figures carding has become a big problem.
-
- "It's kind of like a farmer that sees a rat," Lisker said. "If he sees one, he
- knows he has several. And if he sees several he knows he has a major
- infestation. This is a major infestation."
-
- "It's clearly something we should be concerned about," agreed Scott Charney,
- chief of the U.S. Justice Department's new Computer Crime Unit. Charney said
- that roughly 20 percent of the unit's current caseload involves credit-card
- fraud, a number that, if nothing else, colors the notion that all hackers are
- misunderstood kids, innocently exploring the world of computer networks.
-
- "Whether such noble hackers exist, the fact of the matter is we're seeing
- people out there whose motives are not that pure," he said.
-
- On May 11, New York State Police arrested three teenagers in Springfield
- Gardens when one of them went to pick up what he hoped was an Amiga 3000
- computer system from Creative Computers, at a local UPS depot.
-
- "What he wanted was a computer, monitor and modem. What he got was arrested,"
- said John Kearey, a state police investigator who frequently handles computer
- and telecommunications crimes. Police posed as UPS personnel and arrested the
- youth, who led them to his accomplices.
-
- Kearey said the teens said they got the stolen credit-card number from a
- "hacker who they met on a bridge, they couldn't remember his name" -- an
- interesting coincidence because the account number was for a next-door neighbor
- of one of the youths. Police suspect that the teens, who claimed to belong to
- a small hacking group called the MOB (for Men of Business) either hacked into a
- credit bureau for the number, got someone else to do it, or went the low-tech
- route -- "dumpster diving" for used carbon copies of credit receipts.
-
- Indeed, most credit-card fraud has nothing to do with computer abusers.
- Boiler-room operations, in which fast-talking con men get cardholders to
- divulge their account numbers and expiration dates in exchange for the promise
- of greatly discounted vacations or other too-good-to-be-true deals, are far and
- away the most common scams, said Gregory Holmes, a spokesman for Visa.
-
- But carders have an advantage over traditional credit-card cheats: By using
- their PCs to invade credit bureaus, they can find credit-card numbers for
- virtually anyone. This is useful to carders who pick specific credit-card
- numbers based on location -- a neighbor is out of town for a week, which means
- all you have to do is get his account number, stake out his porch and sign for
- the package when the mail comes. Another advantage is address and ZIP code
- verifications, once a routine way of double-checking a card's validity, are no
- longer useful because carders can get that information from an account record.
-
- "It's tough," Holmes said. "Where it becomes a major problem is following the
- activity of actually getting the credit-card number; it's sent out on the black
- market to a vast group of people" generally over bulletin boards. From there,
- a large number of purchases can be racked up in a short period of time, well
- before the cardholder is aware of the situation. While the cardholder is not
- liable, the victims usually are businesses like Creative Computers, or the
- credit-card company.
-
- Murphy said his company used to get burned, although he would not divulge the
- extent of its losses. "It happened until we got wise enough to their ways," he
- said.
-
- Now, with arrangements among various law enforcement agencies, telephone
- companies and mail carriers, as well as a combination of call-tracing routines
- and other verification methods, carders "rarely" succeed, he said. Also, a
- dozen employees work on credit-card verification now, he said. "I feel sorry
- for the companies that don't have the resources to devote departments to filter
- these out. They're the ones that are getting hit hard."
-
- In New York, federal, state and local police have been actively investigating
- carder cases. Computers were seized and search warrants served on a number of
- locations in December, as part of an ongoing federal investigation into
- carding. City police arrested two youths in Queens in April after attempting
- to card a $1,500 computer system from Creative Computers. They were arrested
- when they tried to accept delivery.
-
- "It's a legitimate way to make money. I know people who say they do it,"
- claimed a 16-year-old Long Island hacker who uses the name JJ Flash.
-
- While he says he eschews carding in favor of more traditional, non-malicious
- hacking, JJ Flash said using a computer to break into a credit bureau is as
- easy as following a recipe. He gave a keystroke-by-keystroke description of
- how it's done, a fairly simple routine that involved disguising the carder's
- calling location by looping through a series of packet networks and a Canadian
- bank's data network, before accessing the credit bureau computer. Once
- connected to the credit bureau computer, JJ Flash said a password was needed --
- no problem, if you know what underground bulletin boards to check.
-
- "It's really easy to do. I learned to do it in about thirty seconds. If you
- put enough time and energy into protecting yourself, you'll never get caught,"
- he said. For instance, an expert carder knows how to check his own phone line
- to see if the telephone company is monitoring it, he claimed. By changing the
- location of a delivery at the last minute, he said carders have evaded capture.
-
- J J FLASH said that while most carders buy computers and equipment for
- themselves, many buy televisions, videocassette recorders and other goods that
- are easy to sell. "You can usually line up a buyer before its done," he said.
- "If you have a $600 TV and you're selling it for $200, you will find a buyer."
-
- He said that while TRW has tightened up security during the past year, Equifax
- was still an easy target.
-
- But John Ford, an Equifax spokesman, said he believes that hackers greatly
- exaggerate their exploits. He said that in the recent San Diego case, only 12
- records were accessed. "It seems to me the notion that anybody who has a PC
- and a modem can sit down and break in to a system is patently untrue," he said.
- "We don't have any evidence that suggests this is a frequent daily occurrence."
-
- Regardless, Ford said his company is taking additional steps to minimize the
- risk of intrusion. "If one is successful in breaking into the system, then we
- are instituting some procedures that would render the information that the
- hacker receives virtually useless."
-
- Also, by frequently altering customers' passwords, truncating account
- information so that entire credit-card numbers were not displayed, and possibly
- encrypting other information, the system will become more secure.
-
- "We take very seriously our responsibility to be the stewards of consumer
- information," Ford said.
-
- But others say that the credit bureaus aren't doing enough. Craig Neidorf,
- publisher of Phrack, an underground electronic publication "geared to computer
- and telecommunications enthusiasts," said that hacking into credit bureaus has
- been going on, and has been easy to do "as long as I've been around." Neidorf
- said that although he doesn't do it, associates tell him that hacking into
- credit bureau's is "child's play" -- something the credit bureaus have been
- careless about.
-
- "For them not to take some basic security steps to my mind makes them
- negligent," Neidorf said. "Sure you can go ahead and have the kids arrested
- and yell at them, but why isn't Equifax or any of the other credit bureaus not
- stopping the crime from happening in the first place? It's obvious to me that
- whatever they're doing probably isn't enough."
-
- A Recent History Of Carding
-
- September 6, 1991: An 18-year-old American emigre, living in Israel, was
- arrested there for entering military, bank and credit bureau computers. Police
- said he distributed credit-card numbers to hackers in Canada and the United
- States who used them to make unknown amounts of cash withdrawals.
-
- January 13, 1992: Four university students in San Luis Obispo, California,
- were arrested after charging $250,000 in merchandise to Mastercard and Visa
- accounts. The computer intruders got access to some 1,600 credit-card
- accounts, and used the numbers to buy, among other things: Four pairs of $130
- sneakers; a $3,500 stereo; two gas barbecues and a $3,000 day at Disneyland.
-
- February 13, 1992: Two teenagers were arrested when one of them went to pick
- up two computer systems in Bellevue, Wash., using stolen credit-card numbers.
- One told police that another associate had hacked into the computer system of a
- mail-order house and circulated a list of 14,000 credit-card numbers through a
- bulletin board.
-
- April 17, 1992: Acting on a tip from San Diego police, two teenagers in Ohio
- were arrested in connection with an investigation into a nationwide computer
- hacking scheme involving credit-card fraud. Police allege "as many as a
- thousand hackers" have been sharing information for four years on how to use
- their computers to tap into credit bureau databases. Equifax, a credit bureau
- that was penetrated, admits that a dozen records were accessed.
-
- April 22, 1992: Two Queens teens were arrested for carding computer equipment.
- _______________________________________________________________________________
-
- Invading Your Privacy May 24, 1992
- DDDDDDDDDDDDDDDDDDDDD
- By Rob Johnson (The Atlanta Journal and Constitution)(Page A9)
-
- Some do it for fun, others have more criminal intent. Regardless, computer
- users have a range of techniques and weaponry when breaking into files.
- "Rooting" forbidden files is hog heaven for hackers
-
- Within an instant, he was in.
-
- Voodoo Child, a 20-year-old college student with a stylish haircut and a well-
- worn computer, had been cruising a massive researchers' network called Internet
- when he stumbled upon a member account he hadn't explored for a while.
-
- The institution performed "Star Wars" research, he later found out, but that
- didn't interest him. "I don't know or care anything about physics," he said
- recently. "I just wanted to get root."
-
- And "getting root," hackers say, means accessing the very soul of a computer
- system.
-
- Working through the network, he started a program within the research
- institute's computers, hoping to interrupt it at the right moment. "I figured
- I just had a second," he said, gesturing with fingers arched above an imaginary
- keyboard. Suddenly he pounced on the phantom keys. "And it worked."
-
- He soon convinced the computer he was a system operator, and he built himself a
- back door to Internet: He had private access to exotic supercomputers and
- operating systems around the world.
-
- Before long, though, the Atlanta-area hacker was caught, foiled by an MCI
- investigator following his exploits over the long-distance phone lines.
- National security experts sweated over a possible breach of top-secret
- research; the investigation is continuing.
-
- And Voodoo Child lost his computer to law enforcement.
-
- "I was spending so much time on the computer, I failed out of college," he
- said. "I would hack all night in my room, go to bed and get up at 4 in the
- afternoon and start all over."
-
- In college, he and a friend were once discovered by campus police dumpster-
- diving behind the university computer building, searching for any scraps of
- paper that might divulge an account number or a password that might help them
- crack a computer.
-
- Now he's sweating it out while waiting for federal agents to review his case.
- "I'm cooperating fully," he said. "I don't want to go to prison. I'll do
- whatever they want me to."
-
- In the meantime, he's back in college and has taken up some art projects he'd
- abandoned for the thrill of computer hacking.
-
- The free-form days of computer hacking have definitely soured a bit -- even for
- those who haven't been caught by the law.
-
- "It's a lot more vicious," Voodoo Child said as a friend nodded in agreement.
- "Card kids" -- young hackers who ferret out strangers' credit card numbers and
- calling card accounts -- are wrecking the loose communal ethic that defined
- hacking's earlier, friendlier days.
-
- And other computer network users, he said, are terrified of the tactics of
- sophisticated hackers who routinely attack other computer users' intelligence,
- reputation and data.
-
- "I used to run a BBS [electronic bulletin board system] for people who wanted
- to learn about hacking," Voodoo Child said. "But I never posted anything
- illegal. It was just for people who had questions, who wanted to do it
- properly."
-
- Doing it properly, several Atlanta-area hackers say, means exploring the gaps
- in computer networks and corporate systems. They say it's an intellectual
- exercise -- and an outright thrill -- to sneak into someone else's computer.
-
- During a recent interview, Voodoo Child and a friend with a valid Internet
- account dialed up the giant network, where some of their counterparts were
- waiting for a reporter to ask them some questions.
-
- "Did you get that information on the Atlanta Constitution reporter you were
- asking about?" a faceless stranger asked.
-
- A startled reporter saw his credit report and credit card numbers flashed
- across the screen. Voodoo Child offered up the keyboard -- an introduction of
- sorts to a mysterious, intimidating accomplice from deep inside the digital
- otherworld. "Go ahead," he said. "Ask him anything you want."
- _______________________________________________________________________________
-
- KV4FZ: Guilty Of Telephone Toll Fraud May 15, 1992
- DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
- By John Rice (rice@ttd.teradyne.com) in TELECOM Digest V12 #412
-
- St. Croix ham operator, Herbert L. "Herb" Schoenbohm, KV4FZ, has been found
- guilty in federal court of knowingly defrauding a Virgin Islands long-distance
- telephone service reseller. He was convicted April 24th of possessing and
- using up to fifteen unauthorized telephone access devices in interstate and
- foreign commerce nearly five years ago.
-
- The stolen long distance telephone access codes belonged to the Caribbean
- Automated Long Lines Service, Inc. (CALLS) of St. Thomas, U.S. Virgin Islands.
- Schoenbohm was found to have made more than $1,000 in unauthorized telephone
- calls -- although the prosecution said he was responsible for far more.
-
- According to the Virgin Islands Daily News, Schoenbohm, who is also the St.
- Croix Police Chief of Communications, showed no emotion when he was pronounced
- guilty of the charges by a 12 member jury in U.S District Court in
- Christiansted. The case was heard by visiting District Judge Anne Thompson.
-
- Neither Schoenbohm or his defense attorney, Julio Brady, would comment on the
- verdict. The jury deliberated about seven hours. The sentencing, which has
- been set for June 26, 1992, will be handled by another visiting judge not
- familiar with the case.
-
- Schoenbohm, who is Vice Chairman of the V.I. Republican Committee, has been
- released pending sentencing although his bail was increased from $5,000 to
- $25,000. While he could receive a maximum of ten years on each count,
- Assistant U.S. Attorney Alphonse Andrews said Schoenbohm probably will spend no
- more than eight months in prison since all three counts are similar and will be
- merged.
-
- Much of the evidence on the four day trial involved people who received
- unauthorized telephone calls from KV4FZ during a 1987 period recorded by the
- CALLS computer. Since the incident took place more than five years ago, many
- could not pinpoint the exact date of the telephone calls.
-
- The prosecution produced 20 witnesses from various U.S locations, including
- agents from the Secret Service, the U.S. Marshals Service, Treasury Department
- and Federal Communications Commission. In addition ham operators testified for
- the prosecution.
-
- Schoenbohm was portrayed as a criminal who had defrauded calls out of hundreds
- of thousands of dollars. Schoenbohm admitted using the service as a paying
- customer, said it did not work and that he terminated the service and never
- used it again. He feels that there was much political pressure to get him
- tried and convicted since he had been writing unfavorably articles about
- Representative DeLugo, a non-voting delegate to Congress from the Virgin
- Islands, including his writing of 106 bad checks during the recent rubbergate
- scandal.
-
- Most, but not all the ham operators in attendance were totally opposed to
- KV4FZ. Bob Sherrin, W4ASX from Miami attended the trial as a defense character
- witness. Sherrin told us that he felt the conviction would be overturned on
- appeal and that Schoenbohm got a raw deal. "They actually only proved that he
- made $50 in unauthorized calls but the jury was made to believe it was $1,000."
-
- Schoenbohm's attorney asked for a continuance due to newly discovered evidence,
- but that was denied. There also is a question as to whether the jury could
- even understand the technology involved. "Even his own lawyer couldn't
- understand it, and prepared an inept case," Sherrin said. "I think he was
- railroaded. They were out to get him. There were a lot of ham net members
- there and they were all anti-Herb Schoenbohm. The only people that appeared
- normal and neutral were the FCC. The trial probably cost them a million
- dollars. All his enemies joined to bring home this verdict."
-
- Schoenbohm had been suspended with pay from the police department job since
- being indicted by the St. Croix grand jury. His status will be changed to
- suspension without pay if there is an appeal. Termination will be automatic if
- the conviction is upheld. Schoenbohm's wife was recently laid off from her job
- at Pan Am when the airline closed down. Financially, it could be very
- difficult for KV4FZ to organize an appeal with no money coming in.
-
- The day after the KV4FZ conviction, Schoenbohm who is the Republican Committee
- vice chairman was strangely named at a territorial convention as one of eight
- delegates to attend the GOP national convention in Houston this August. He was
- nominated at the caucus even though his felony conviction was known to
- everyone. Schoenbohm had even withdrawn his name from consideration since he
- was now a convicted felon.
-
- The Virgin Island Daily News later reported that Schoenbohm will not be
- attending the GOP national convention. "Schoenbohm said he came to the
- conclusion that my remaining energies must be spent in putting my life back
- together and doing what I can to restore my reputation. I also felt that any
- publicity in association with my selection may be used by critics against the
- positive efforts of the Virgin Islands delegation."
-
- Schoenbohm has been very controversial and vocal on the ham bands. Some ham
- operators now want his amateur radio license pulled -- and have made certain
- that the Commission is very much aware of his conviction.
- _______________________________________________________________________________
-
- AT&T Launches Program To Combat Long-Distance Theft May 13, 1992
- DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
- By Virginia Randall (United Press International/UPI)
-
- Citing the mushrooming cost of long-distance telephone fraud, American
- Telephone & Telegraph Co. announced plans to combat theft of long-distance
- telephone services from customers.
-
- AT&T's program, dubbed NetProtect, is an array of software, consulting,
- customer education and monitoring services for businesses. One program limits
- customer liability to the first $25,000 of theft, while another ends customer
- liability entirely under certain circumstances.
-
- By law, companies are liable for the cost of calls made on their systems,
- authorized or not.
-
- Jerre Stead, president of AT&T's Business Communications unit, said, "The
- program not only offers financial relief to victims of long-distance fraud.
- It also gives our customers new products and services specifically designed to
- prevent and detect fraud."
-
- Long-distance calling fraud ranges from a few dollars to the hundreds of
- thousands of dollars for victims. The Communications Fraud Control
- Association, an industry group, estimates long-distance calling fraud costs
- more than $1 billion a year, said Peggy Snyder, an association spokeswoman.
-
- NetProtect Basic Service, offered free with long-distance and domestic 800
- service, consists of ongoing monitoring around the clock for unusual activity.
-
- The company will start this service this week.
-
- NetProtect Enhanced and Premium services offer more customized monitoring and
- limit customer liability to $25,000 per incident or none at all, depending on
- the program selected.
-
- Pricing and permission to provide the Enhanced and Premium services are
- dependent on Federal Communication Commission approval. AT&T expects to offer
- these programs beginning August 1.
-
- Other offerings are a $1,995 computer software package called "Hacker Tracker,"
- consulting services and the AT&T Fraud Intervention Service, a swat team of
- specialists who will detect and stop fraud while it is in progress.
-
- The company also will provide a Security Audit Service that will consult with
- customers on possible security risks. Pricing will be calculated on a case-by-
- case basis, depending on complexity.
-
- The least expensive option for customers is AT&T's Security Handbook and
- Training, a self-paced publication available for $65 which trains users on
- security features for AT&T's PBX, or private branch exchanges, and voice mail
- systems.
-
- Fraud occurs through PBX systems, which are used to direct the external
- telephone calls of a business.
-
- Company employees use access codes and passwords to gain entry to their PBX
- system. A typical use, the industry fraud group's Snyder said, would be a
- sales force on the road calling into their home offices for an open line to
- call other customers nationally or worldwide.
-
- These access codes can be stolen and used to send international calls through
- the company's network, billable to the company.
-
- Unauthorized access to PBXs occur when thieves use an automatic dialing feature
- in home computers to dial hundreds of combinations of phone numbers until they
- gain access to a company's PBX system.
-
- These thieves, also known as hackers, phone freaks or phrackers, then make
- their own calls through the PBX system or sell the number to a third party to
- make calls.
-
- Others use automatic dialing to break into PBX systems through voice mail
- systems because such systems have remote access features.
-
- Calls from cellular phones also are at risk if they are remotely accessed to a
- PBX. Electronic mail systems for intracompany calls are not affected because
- they don't require PBX systems.
-
- According to Bob Neresian of AT&T, most fraud involves long-distance calls to
- certain South American and Asian countries, especially Columbia and Pakistan.
-
- There is no profile of a typical company at risk for telephone fraud, said
- Snyder.
-
- "Any company of any size with long-distance service is at risk," she said.
- "Criminals don't care who the long distance provider is or how big the company
- they're stealing from is."
-
- She said the industry recognized the dimensions of telephone theft in 1985,
- when the Communications Fraud Control Association was formed in Washington D.C.
- The group consists of providers of long-distance service, operator services,
- private payphones, end-users of PBX systems, federal, state and local law
- enforcement agencies and prosecutors.
-
- Janice Langley, a spokeswoman for US Sprint Corp. in Kansas City, Mo., called AT
- &T's announcement similar to a program her company announced March 31.
-
- That service, SprintGuard Plus, is available to companies with a call volume
- of $30,000 a month. Sprint also offers basic monitoring program to customers
- without charge.
-
- "We don't have minimum billing requirements for any of these services or
- systems," responded AT&T's Neresian. "All the carriers have seen the problem
- and have been working on their own approaches," he said.
-
- Jim Collins, a spokesman for MCI Communications in Washington, said his company
- had been conducting phone fraud workshops free of charge for customers for four
- years.
- _______________________________________________________________________________
-
-