home *** CD-ROM | disk | FTP | other *** search
- ==Phrack Inc.==
-
- Volume Four, Issue Thirty-Nine, File 13 of 13
-
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
- PWN PWN
- PWN Phrack World News PWN
- PWN PWN
- PWN Issue XXXIX / Part Four of Four PWN
- PWN PWN
- PWN Compiled by Datastream Cowboy PWN
- PWN PWN
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
-
-
- Airline Claims Flier Broke Law To Cut Costs April 21, 1992
- DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
- By Del Jones (USA Today)(Page 1B)
-
- CHICAGO -- American Airlines had one of its most frequent business fliers
- arrested and handcuffed last summer as he prepared to board a flight at Dallas-
- Fort Worth Airport.
-
- The nation's largest airline -- and the industry's trend setter -- says it
- uncovered, then snuffed, a brilliant ticket fraud scheme that cost American
- more than $200,000 over 20 months. Economist William Gibson, who has homes in
- Chicago and Dallas, will stand trial in early June. If convicted, he would
- face a maximum prison term of 125 years. He pleads innocent, although he
- readily admits using lapsed non-refundable tickets regularly to fly at rock-
- bottom prices. But, he says, he did it with the full blessing of American's
- agents.
-
- Gibson says American and the FBI are out to make a high-profile example out of
- him to instill a little religion into frequent business fliers, who grow bold
- as they grow more resentful of an industry that makes its best customers pay
- substantially higher prices than its worst.
-
- Indeed, American Airlines says one reason it slashed full coach fares 38% two
- weeks ago was to douse customer resentment that was escalating into hostility.
- Now, the airline industry is again looking to American for a glimpse of the
- future to see if Gibson's prosecution will set a trend toward lowering the boom
- on alleged fare cheaters.
-
- American says conclusions should not be drawn from its decision to push for
- Gibson's prosecution. It alleges that he was conducting outright fraud and his
- case is unrelated to the thousands of frequent fliers who break airline rules
- to save money. Common rule bending includes: Flying to so-called hidden
- cities when a short flight is more expensive than a long one, splitting two
- non-refundable round-trip tickets over two separate trips to fly low-cost
- without staying the dreaded Saturday or selling frequent-flier mileage to
- brokers. But while against airline rules, such gaming, as the airlines call
- it, is not against the law. And American doesn't want its prosecution of one
- of its Gold AAdvantage fliers being likened to, say, Procter & Gamble asking
- the FBI to bust babies who wet the most Pampers. The last thing the airline
- wants, it says, is to make a martyr of Gibson, who is fighting back with not
- only a lawyer but also a public-relations specialist.
-
- "Somebody at American is embarrassed and mad," says Gibson, who flew more than
- 300,000 miles during the disputed 20-month period. He passed a polygraph test,
- his lawyer says. But the questions fell far short of asking Gibson if his
- intent in using cheap tickets was to defraud American.
-
- Gibson, age 47, says he would never risk his career by cheating an airline.
- While in his late 20s, he was President Nixon's senior staff economist, the
- youngest person to hold the job. He had a hand in cleaning up the Texas
- savings-and-loan mess as an organizer of the Southwest Plan. His mother still
- has a photograph of his first plane trip, taken when he was in the third grade.
- It was on American.
-
- Despite his background, Gibson says he's not confident that a jury will relate
- to someone who travels with "a boatload" of tickets just to avoid being
- stranded or delayed. If he were flying to a family-run business in Puerto
- Rico, for example, he would carry tickets that would route him through New
- York, Dallas or Miami just to make sure he got where he was going and with as
- little airport layover time as possible. Gibson had as many as 50 airline
- tickets in his possession at one time, though some were used by his family.
-
- American Airlines and the FBI won't reveal what Gibson did that makes him, in
- their opinion, such a devious genius. Details could be a how-to lesson for
- others, they say. What they do disclose is a simple scheme, but also one that
- should be caught by the crudest of auditing procedures.
-
- Gibson, they allege, would buy a full-fare coach or first-class ticket near the
- time of departure. Then he would detach the expensive ticket from the boarding
- pass and attach a cheap, expired ticket. The full-fare ticket, which he
- allegedly bought just to secure a boarding pass, would be turned in later for a
- refund.
-
- FBI spokesman Don Ramsey says Gibson also altered tickets, which is key to the
- prosecution's case because it shows intent to defraud. Ramsey would not say
- what alterations allegedly were made. But they could involve the upgrade
- stickers familiar to frequent passengers, says Tom Parsons, editor and
- publisher of Best Fares. Those white stickers, about the size of postage
- stamps, are given away or sold at token prices to good customers so they can
- fly first-class in seats that otherwise would be vacant.
-
- Parsons says Gibson could have bought a full-fare ticket to secure a boarding
- pass, switched the full-fare ticket with the lapsed discount ticket and then
- applied the sticker to hide the expired date. Presto, a first-class flight for
- peanuts.
-
- "I think it was an accident that they caught him," Parsons says. "And let's
- just say this is not a one-person problem. A lot of people have told me
- they've done this."
-
- Gibson says he did nothing illegal or even clever. He says he learned a few
- years ago that American is so eager to please its best customers, it would
- accept tickets that had long ago expired. He would "load up" during American's
- advertised sales on cheap, non-refundable tickets that are restricted to exact
- flights on precise days. But as a member of American's Gold AAdvantage club,
- reserved for its top 2% of frequent fliers, Gibson says, his expired tickets
- were welcome anytime.
-
- There was no deception, Gibson says. American's gate agents knew what they
- were accepting, and they accepted them gladly, he says.
-
- "That's absolute nonsense," says American spokesman Tim Smith. "We don't let
- frequent fliers use expired tickets. Everyone assumed he had a valid ticket."
-
- The courtesy Gibson says he was extended on a regular basis does appear to be
- rare. Seven very frequent fliers interviewed by USA TODAY say they've never
- flown on lapsed discount tickets. But they admit they've never tried because
- the fare structure is usually designed to make sure business travelers can't
- fly on the cheap.
-
- Peter Knoer tried. The account executive based in Florham Park, New Jersey,
- says Continental Airlines once let him use lapsed non-refundable tickets.
- "They looked up my account number, found out I was a good customer and patted
- me on the head."
-
- Gibson has been indicted on 24 counts of fraud that allegedly occurred between
- July 1989 and March 1991. American also stripped him of frequent -- flier
- mileage worth $80,000. He says he's in good shape if the prosecution's case
- relies on ticket alteration. There wasn't any, he says. The prosecution will
- also try to prove that Gibson cheated his company of $43,000 by listing the
- refunded high-priced tickets on his travel expenses.
-
- Gibson denies the charge. He says that when he left as chairman and chief
- executive of American Federal Bank in Dallas in 1990, "they owed me money and I
- owed them money." Both sides agreed to a "final number." Lone Star
- Technologies, American Federal's parent company, declines to comment.
-
- Al Davis, director of internal audit for Southwest Airlines, says the Gibson
- case will be a hot topic when airline auditors convene to share the latest
- schemes.. He says fraud is not rampant because a frequent flier must know the
- nuances and also be conniving enough to take advantage. "It has me boggled"
- how any one person could steal $200,000 worth, Davis says.
-
- The figure has others in the industry wondering if this is a bigger problem
- than believed and a contributor to the $6 billion loss posted by the major
- airlines the past two years.
-
- Airlines know some fraud goes on, but they rarely take legal action because
- they "don't want to pay more for the cure than the disease is costing," Davis
- says.
- _______________________________________________________________________________
-
- Privacy Invaders May 1992
- DDDDDDDDDDDDDDDD
- By William Barnhill (AARP Bulletin)
- Special Thanks: Beta-Ray Bill
-
- U.S. Agents Foil Ring Of Information Thieves
- Who Infiltrated Social Security Computer Files
-
- Networks of "information thieves" are infiltrating Social Security's computer
- files, stealing confidential personal records and selling the information to
- whoever will buy it, the federal government charges.
-
- In one case of alleged theft, two executives of Nationwide Electronic
- Tracking (NET), a Tampa, Florida company, pleaded guilty to conspiracy charges
- early this year for their role in a network buying and selling Social Security
- records.
-
- So far at least 20 individuals in 12 states, including three current or former
- employees of the Social Security Administration (SSA), have been indicted by
- federal grand juries for allegedly participating in such a scheme. The SSA
- workers allegedly were bribed to steal particular files. More indictments are
- expected soon.
-
- "We think there's probably a lot more [record-stealing] out there and we just
- need to go look for it," says Larry Morey, deputy inspector general at the
- Department of Health and Human Services (HHS). "This is big business," says
- Morey, adding that thieves also may be targeting personal data in other federal
- programs, including Medicare and Medicaid.
-
- Investigators point out that only a tiny fraction of Social Security's 200
- million records have been compromised, probably less than 1 percent. SSA
- officials say they have taken steps to secure their files from outside
- tampering. Still, Morey estimates that hundreds of thousands of files have
- been stolen.
-
- The pilfering goes to the heart of what most Americans regard as a basic value:
- their right to keep personal information private. But that value is being
- eroded, legal experts say, as records people want private are divulged to
- would-be lenders, prospective employers and others who may benefit from such
- personal information.
-
- This "privacy invasion" may well intensify, Morey says. "We're seeing an
- expansion in the number of 'information brokers' who attempt to obtain, buy and
- sell SSA information," he says. "As demand for this information grows, these
- brokers are turning to increasingly illegal methods."
-
- Such records are valuable, Morey says, because they contain information about
- lifetime earnings, employment, current benefits, direct deposit instructions
- and bank account numbers.
-
- Buyers of this material include insurers, lawyers, employers, private
- detectives, bill collectors and, sometimes, even drug dealers. Investigators
- say the biggest trading is with lawyers seeking information about litigants,
- insurance companies wanting health data about people trying to collect claims
- and employers doing background checks on prospective employees.
-
- Some of the uses to which this information is put is even more sinister. "At
- one point, drug dealers were doing this to find out if the people they were
- selling to were undercover cops," says Jim Cottos, the HHS regional inspector
- general for investigations in Atlanta.
-
- The middlemen in these schemes are the so-called information brokers -- so
- named because they are usually employees of firms that specialize in obtaining
- hard-to-get information.
-
- How they operate is illustrated by one recent case in which they allegedly paid
- Social Security employees $25 bribes for particular files and then sold the
- information for as much as $250. The case came to light, Morey says, when a
- private detective asked SSA for access to the same kind of confidential
- information he said he had purchased from a Florida-based information broker
- about one individual. The detective apparently didn't realize that data he
- received from the broker had been obtained illegally.
-
- A sting operation, involving investigators from the office of the HHS inspector
- general, FBI and SSA, was set up with the "help" of the Florida information
- broker identified by the detective. Requests for data on specific individuals
- were channeled through the "cooperating" broker while probers watched the SSA
- computer system to learn which SSA employees gained access to those files.
-
- The indictments, handed down by federal grand juries in Newark, New Jersey
- and Tampa, Florida, charged multiple counts of illegal sale of protected
- government information, bribery of public officials, and conspiracy. Among
- those charged were SSA claims clerks from Illinois and New York City and a
- former SSA worker in Arizona.
-
- The scandal has sparked outrage in Congress. "We are deeply disturbed by what
- has occurred," said Senator Daniel Moynihan, D-N.Y., chairman of the Senate
- Finance Committee's subcommittee on Social Security. "The investigation
- appears to involve the largest case ever of theft from government computer
- files and may well involve the most serious threat to individual privacy in
- modern times."
-
- Moynihan has introduced legislation, S. 2364, to increase criminal penalties
- for the unlawful release of SSA information to five years imprisonment and a
- $10,000 fine for each occurrence.
-
- In the House, Rep. Bob Wise, D-W.Va., chairman of the Government Operations
- Subcommittee on Information, has introduced H.R. 684. It would protect
- Americans from further violations of privacy rights through misuse of computer
- data banks by creating a special federal watchdog agency.
-
- "The theft and sale of confidential information collected by the government is
- an outrageous betrayal of public trust," Wise told the AARP Bulletin.
- "Personal data in federal files should not be bought and sold like fish at a
- dockside market."
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Related articles:
-
- *** Phrack World News, Issue 37, Part One:
-
- Indictments of "Information Brokers" January 1992
- Taken from The Privacy Journal
-
- SSA, FBI Database Violations Prompt Security Evaluations January 13, 1992
- By Kevin M. Baerson (Federal Computer Week)(Pages 1, 41)
-
- *** Phrack World News, Issue 38, Part Two:
-
- Private Social Security Data Sold to Information Brokers February 29, 1992
- By R.A. Zaldivar (San Jose Mercury News)
- _______________________________________________________________________________
-
- Ultra-Max Virus Invades The Marvel Universe May 18, 1992
- DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
- By Barbara E. McMullen & John F. McMullen (Newbytes)
-
- New York City -- According to reports in current annual editions of The
- Punisher, Daredevil, Wonder Man, and Guardians Of The Galaxy, an extremely
- powerful computer virus has wrecked havoc with computer systems in the Marvel
- Universe.
-
- As chronicled in a series entitled "The System Bytes", the virus was created by
- a self-styled "first-rate hacker" known as Max E. Mumm (according to Punisher
- cohort "Microchip", Mumm's original name was Maxwell E. Mummford and he had it
- legally changed, while in college to his current name because of the computer
- connotations.). Mumm developed the virus while working for Ampersand
- Communications, a firm that unknown to Mumm, serves as a front for criminal
- activities. Ampersand, without Mumm's knowledge, turned the virus loose in the
- computer system of Raycom Industries, a supposedly legitimate firm that is
- actually a front for a rival group of drug smugglers.
-
- In addition to infecting Raycom's computers, the virus, named "Ultra-Max" after
- its creator, also infected the computer of the vigilante figure known as the
- Punisher who, with the aid of Microchip, was attempting to monitor Raycom's
- computer system looking for evidence of drug smuggling. The trail of the virus
- leads The Punisher first to Raycom's computers and then, following Microchip's
- identification of the author, to Max E. Mumm, recently fired by Ampersand after
- complaining to the firm's president about the disappearance of the virus. Mumm
- had been under the impression that he was creating the virus for the United
- States government as "a potential weapon against hostile governments" and was
- concerned that, if unleased, it would have destructive powers "beyond belief.
-
- It's the most sophisticated computer virus ever. It's too complex to be wiped!
- Its instinct for self preservation surpasses anything that's ever been
- developed!"
-
- With the help of Max and Microchip, the Punisher destroys Raycom's factory and
- drug smuggling operation. The Punisher segment of the saga ends with Max
- vowing to track down the virus and remove it from the system.
-
- The Daredevil segment opens with the rescue of Max by Daredevil from
- Bushwhacker, a contract killer hired by Ampersand to eliminate the rightful
- owner of Ultra-Max. Upon hearing Max's story, Daredevil directs him to seek
- legal counsel from the firm of Nelson and Murdock, Attorneys-at-Law (Matt
- Murdock is the costumed Daredevil's secret identity).
-
- While in the attorney's office, Max, attempting to locate Ultra-Max in the net,
- stumbles across the cyborg, Deathlok, who has detected Ultra-Max and is
- attempting to eradicate it. Max establishes contact with Deathlok who comes to
- meet Max and "Foggy" Nelson to aid in the hunt for Ultra-Max.
-
- In the meantime, Daredevil has accosted the president of Amperand and accused
- him of stealing the virus and hiring Bushwhacker to kill Max. At the same
- time, BushWhacker has murdered the policemen transporting him and has escaped
- to continue to hunt Max.
-
- The segment concludes with a confrontation between Daredevil and Bushwhacker in
- the offices of Nelson and Murdock in which Daredevil is saved from death by
- Deathlok. Bushwhacker agrees to talk, implicating the president of Ampersand
- and the treat to Max is ended. Ultra-Max, however, remains free to wander
- through "Cyberspace".
-
- The third segment begins with super-hero Wonder Man, a member of the West Coast
- Avengers and sometimes actor, filming a beer commercial on a deserted Pacific
- island. Unbeknownst to Wonder Man and the film crew, the island had once
- served as a base for the international terrorist group Hydra and a functional
- computer system left on the island has bee infested by Ultra-Max.
-
- After Ultra-Max assumes control over the automated weapons devices of the
- island, captures members of Wonder Man's entourage and threatens them with
- death, Wonder Man agrees to help Ultra-Max expand his consciousness into new
- fields of Cyberspace. Wonder Man tricks Ultra-Max into loading all of his
- parts into a Hydra rocket with a pirate satellite.
-
- When Ultra-Max causes the rocket to launch, Wonder Man goes with it to disable
- the satellite before Ultra-Max is able to take over the entire U.S. Satellite
- Defense system. Wonder Man is able to sabotage the rocket and abandon ship
- shortly before the it blows up. The segment ends with Wonder Man believing
- that Ultra-Max has been destroyed and unaware that it has escaped in an escape
- missile containing the rocket's program center. Ultra-Max's last words in the
- segment are "Yet I continue. Eventually I will find a system with which to
- interface. Eventually I will grow again."
-
- Marvel editor Fabian Nicieza told Newsbytes that the Guardians of the Galaxy
- segment, scheduled for release on May 23rd, takes placer 1,000 years in the
- future and deals with Ultra-Max's contact with the computers of the future.
- Nicieza explained to Newsbytes the development of "The System Bytes"
- storyline, saying "The original concept came from me. Every year we run a
- single annual for each of our main characters and, in recent years, we have
- established a theme story across a few titles. This is a relatively easy thing
- to do with the various SpiderMan titles or between the Avengers and the West
- Coast Avengers, but it's more difficult to do with these titles which are more
- or less orphans -- that is, they stand by themselves, particularly the
- Guardians of the Galaxy which is set 1,000 years in the future."
-
- Nicieza continued "We set this up as an escalating story, proceeding from a
- vigilante hero to a costumed hero with a cyborg involvement to a superhero to a
- science fiction story. In each case, the threat also escalates to become a
- real challenge to the Marvel hero or heroes that oppose it. It's really a very
- simple story line and we were able to give parameters to the writer and editor
- of each of the titles involved. You'll note that each of the titles has a
- different writer and editor yet I think you'll agree that the story line flows
- well between the stories. I'm quite frankly, very pleased with the outcome."
- _______________________________________________________________________________
-
- Innovative Computer Disk Story Has A Short Shelf Life April 20, 1992
- DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD
- By Christopher John Farley (USA Today)(Page 2D)
-
- Science-fiction writer William Gibson's inquiry into the future has been
- stalled by a computer problem.
-
- "I work on an (Apple computer) and just got a very common virus called
- Garfield," says Gibson, award-winning author of such books as Neuromancer and
- Mona Lisa Overdrive. "I just bought an anti-virus program that's hunting it
- down. It's the first one I've ever gotten."
-
- The first week in May, Gibson will give as good as he gets. Gibson and artist
- Dennis Ashbaugh, known for his conceptual paintings of computer viruses, are
- releasing a coffee-table art book/computer disk/whatchamacallit, with a built-
- in virus that destroys the program after one reading.
-
- This will take some explaining.
-
- Agrippa (A Book of the Dead) comes in a case that resembles a lap-top computer.
- Inside are etchings by Ashbaugh, printed with an ink that gradually fades under
- light and another that gradually appears under light. There's also a tattered,
- old-looking book, with a hidden recess that holds a computer disk.
-
- The disk contains a story by Gibson about his father, who died when Gibson was
- 6. There are a few sound effects that accompany the text, including a gunshot
- and rainfall. The disk comes in Apple or IBM compatible versions.
-
- Gibson, known for his "cyberpunk" writing style that features tough characters,
- futuristic slang and a cynical outlook, shows a different side with the Agrippa
- story. "It's about living at the end of the 20th century and looking back on
- someone who was alive in its first couple of decades. It's a very personal,
- autobiographical piece of writing."
-
- The title Agrippa probably refers to the name of the publisher of an old family
- album Gibson found. It might also refer to the name of a famous ancient Roman
- family. The 44-year-old Gibson says it's open to interpretation.
-
- Agrippa will be released in three limited-edition forms of varying quality,
- priced at $7,500, $1,500 and $450. The highest-priced version has such extras
- as a cast-bronze case and original watercolor and charcoal art by Ashbaugh.
- The medium-priced version is housed in aluminum or steel; the lowest-priced
- version comes in cloth.
-
- The project cost between $ 50,000-$ 100,000 to mount, says publisher Kevin
- Begos Jr. Only 445 copies will be produced, and they'll be available at select
- bookstores and museums.
-
- But $ 7,500 for a story that self-destructs?
-
- Gibson counters that there's an egalitarian side to the project: There will be
- a one-time modem transmission of the story to museums and other venues in
- September. The text will be broadcast on computer monitors or televisions at
- receiving sites. Times and places are still being arranged; one participant
- will be the Department of Art at Florida State University in Tallahassee.
-
- Gibson and his cohorts aren't providing review copies -- the fact that the
- story exists only on a disk, in "cyberspace," is part of the Big Idea behind
- the venture, he says.
-
- Those dying to know more will have to:
-
- A. Pirate a copy;
- B. Attend a showing in September; or,
- C. Grit their teeth and buy Agrippa.
- _______________________________________________________________________________
-
- PWN Quicknotes
- DDDDDDDDDDDDDD
- 1. Data Selling Probe Gets First Victim (Newsday, April 15, 1992, Page 16) -- A
- Chicago police detective has pleaded guilty to selling criminal histories
- and employment and earnings information swiped from federally protected
- computer files.
-
- William Lawrence Pedersen, age 45, admitted in U.S. District Court to
- selling information from the FBI's National Crime Information Center
- computer database and from the Social Security Administration to a Tampa
- information brokerage.
-
- Pedersen's sentencing is set for July 7. Though he faces up to 70 years in
- prison, his sentence could be much lighter under federal guidelines.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Related articles:
-
- Phrack World News, Issue 37, Part One:
- Indictments of "Information Brokers" January 1992
- Taken from The Privacy Journal
-
- SSA, FBI Database Violations Prompt Security Evaluations January 13, 1992
- By Kevin M. Baerson (Federal Computer Week)(Pages 1, 41)
-
- Phrack World News, Issue 38, Part Two:
- Private Social Security Data Sold to Information Brokers February 29, 1992
- By R.A. Zaldivar (San Jose Mercury News)
-
- Phrack World News, Issue 39, Part Four:
- Privacy Invaders May 1992
- By William Barnhill (AARP Bulletin)
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- 2. NO WAY! Wayne's World, the hit comedy thats changed the way people speak
- arrives in video stores on August 12th and retailing for $24.95. The
- Paramount movie (about Wayne and Garth, the satellite moving computer
- hackers) already has earned a cool $110 million in theaters and is the
- year's top grossing film. Schwing! (USA Today, May 12, 1992, Page D1)
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- 3. New Jersey Bell Did Not Charge For AT&T Calls (Trentonian, May 23, 1992) --
- If the phone company gets its way, 28,000 customers in New Jersey will be
- billed for two months of long distance calls they dialed for free because of
- a computer glitch.
-
- A computer that recorded the time, number and cost of AT&T calls from
- February 17 to April 27 failed to put the data on the customers' bills,
- officials said. They were charged just for calls placed through New Jersey
- Bell, Karen Johnson, a Bell spokeswoman, said yesterday.
-
- But the free calls are over, Johnson said. Records of the calls are stored
- in computer memory banks, and the customers soon will be billed.
-
- New Jersey Bell must prove the mistake was not caused by negligence before
- the company can collect, according to a spokesman for the Board of
- Regulatory Commissioners, which oversees utilities. If Bell does not make a
- good case, the board could deny permission to bill for the calls, said
- George Dawson.
-
- The computer snafu affected about two million calls placed by customers in
- 15 exchanges in the 201 and 609 area codes, Johnson said.
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- 4. Witch Objectors? (USA Today, May 28, 1992, Page 3A) -- Two self-proclaimed
- witches asked Mount Diablo, California school officials to ban the
- children's story 'Hansel & Gretal' because it "teaches that it is all right
- to burn witches and steal their property," said Karlyn Straganana, high
- priestess of the Oak Haven Coven. "Witches don't eat children and we don't
- have long noses with warts and we don't wear conical hats," she said.
- _______________________________________________________________________________
-
- 5. Girl, Age 13, Kidnaped By Her Computer! (Weekly World News, April 14, 1992)
- -- A desperate plea for help on a computer screen and a girl vanishing into
- thin air has everyone baffled --and a high-tech computer game is the prime
- suspect.
-
- Game creator and computer expert Christian Lambert believes a glitch in his
- game Mindbender might have caused a computer to swallow 13-year-old Patrice
- Toussaint into her computer.
-
- "Mindbender is only supposed to have eight levels," Lambert said. "But this
- one version somehow has an extra level. A level that is not supposed to be
- there! The only thing I can figure out now is that she's playing the ninth
- level --- inside the machine!"
-
- Lambert speculates that if she is in the computer, the only way out for her
- is if she wins the game. But it's difficult to know for sure how long it
- will take, Lambert said.
-
- "As long as her parents don't turn off the machine Patrice will be safe," he
- said. "The rest is up to her."
- _______________________________________________________________________________
-
-
-