home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 50.5 KB | 1,014 lines |
-
- ==Phrack Inc.==
-
- Volume Four, Issue Forty, File 2 of 14
-
- [-=:< Phrack Loopback >:=-]
-
- By Dispater & Mind Mage
-
- Phrack Loopback is a forum for you, the reader, to ask questions, air
- problems, and talk about what ever topic you would like to discuss. This is
- also the place Phrack Staff will make suggestions to you by reviewing various
- items of note; magazines, software, catalogs, hardware, etc.
-
- In this issue:
-
- Retirement of a Hacker : Jester Sluggo
- Truth Is Out Of Style : Dispater
- Tim Foley Virus : Guido Sanchez
- The Hacker Files (from DC Comics) : Newsbytes
- Sneakers (from Universal Pictures) : Press Release
- Pirates v. AT&T: Posters : Legacy Irreverent and Captain Picard
- Telco Trashing Yields Big Rewards : Anonymous
- Anonymous Mail On IBM VM Systems? : Apollo
- WWIV Link Hack : Mr. Bigg
- The Day Bell System Died : Anonymous
- The 1992 Consumer Electronics Show : Sarlo
-
- _______________________________________________________________________________
-
- x x x
- | | |
- +------------+
- | Retirement |
- | of a |
- | Hacker |
- +---+------------+---+
- | by Jester Sluggo |
- +-+--------------------+-+
- | Released: July 9, 1992 |
- +------------------------+
-
- I would like to begin by saying "Hello" to all readers of this file, but
- unfortunately it will be my last time. I've been a member of the "hacker
- underground" for over a decade and am one of the few extremely lucky hackers
- who has successfully hacked a great number of computer systems, phone systems,
- and other technologies, yet has never been caught. I wish to take this last
- opportunity to reflect on my experiences, and express many personal views,
- because although there are feelings of sadness, it is my pleasure to announce
- my formal retirement from this "underground" community.
-
- My decision to retire has been a carefully planned path which began several
- years ago. During the early 1980's, the innocence of hacking and exploring
- computer systems for my quest of knowledge was a great thrill. Every system
- was like an unexplored door which lead to unlimited opportunities; various
- computer systems, operating systems, languages, networks, software, and data.
-
- But it was in the later part of the 1980's when I began to realize that I had
- to focus my interests, knowledge and experience towards a legitimate career.
- It's nearly impossible to earn a living solely within the resources of the
- hacker underground, and the idea of abusing technology for monetary gain is
- against the (unwritten) code of hacker ethics. Also at this time, the
- innocence of exploring various systems was being replaced by the realities of
- ruining my entire future at such a young age if I was caught and convicted by
- the United States' legal system.
-
- The media and law-enforcement agencies have almost always been biased against
- hackers, and these are two powerful entities that influence society. Hackers
- have always been presented in a negative context, whereas their discoveries,
- efforts, creativeness, and hard work have been ignored except among fellow
- hackers. In a way, it's similar to how the U.S. government and corporations
- support research and development: A group of researchers discover, explore,
- refine, or exploit a certain technology over a period of many years, yet their
- efforts go unnoticed unless their research results in a product acceptable to
- society. The researcher's results are shared, respected, and challenged among
- the scientific community and journals long before they ever result in a product
- (if they ever result in a product). In the same way that researchers and
- scientists relentlessly pursue their interests, I pursued answers to my
- curiosities and interests.
-
- It is the groups that want to control the society (the legal system, and
- police) which have labeled "hackers" as notorious people. Hackers can use
- technology to access a variety of information which was previously accessible
- only to these groups, and these controllers are afraid of losing their
- advantages and control. Currently in US, the FBI is afraid of losing their
- ability to easily tap fiber optics so they're proposing to make it mandatory
- for central offices to make it easier for them. If people knew how common
- illegal wiretaps occur, they'd be upset at the abuse of power. Police are
- making illegal search and seizures, and district attorneys are filing
- outrageous affidavits to protect their control of power and access to
- information.
-
- It was in the middle to late 1980's when the legal system and law enforcement
- agencies increased efforts to severely penalize hackers, when the risk of
- getting caught began to outweigh the excitement of discovering. It is
- unbelievably difficult to carry the burden of a "serious" criminal record
- throughout one's life when you're 20 years old (or for that matter 16 years
- old), as well as the eternal monetary debt which comes with these consequences.
- In the 1970's, the founders of Apple computer were caught selling Blue Boxes
- while they were in college and got off with a minimal fine. With todays laws,
- the potential jail time, monetary damages, and lawyer fees, the system would
- have wasted and banned the brilliance of Steve Wozniak and Steve Jobs. Apple
- Computer (and microcomputers) might not have been born (IBM would have loved
- that).
-
- Technology has changed faster than the legal system and society can adapt, so
- for now, unapproved exploring of these technologies has been declared a serious
- offense. Society trusts the legal systems' judgement, but even in 1992 law-
- makers are just barely beginning to understand technology: "Is software
- patentable (do not confuse with copyrightable), and to what degree?", "What
- privacy and freedom of speech should we have with electronic mail and
- communications?" Don't let unqualified law makers make decisions about
- technology-related issues that will affect you, without them knowing what you
- have to say.
-
- So it was in the late 1980's when I began preparing for my retirement. I
- outlined a set of goals and a plan to achieve them. Unfortunately this plan
- required several years to fulfill, but I knew it was the right time of my life
- to begin this ambitious plan. The goals I wanted to achieve were:
-
- 1) Pass the knowledge I've gained onto others.
- 2) Keep the "hacker" movement active.
- 3) Prepare myself to be legitimately successful so that I can help to
- influence society's views about technology as a member of the
- society.
-
- Due to the increasing danger of getting caught, and to become successful, I
- was forced to hide from the mainstream hacker community and make my actions and
- efforts unknown. The first two goals were closely related and took slightly
- longer to complete than my original plan. However, they were a much greater
- financial sacrifice than I ever imagined. The third goal will probably require
- the rest of my lifetime, but it's a challenge I accept.
-
- To complete goals 1 and 2, I've spent the last 5 years preparing a "tomb" of
- information and knowledge used within the hacker community. Not all of the
- information is complete, but neither is the seed that grows to become a tree.
- Anyone with a telephone can guess ("hack" according to the media and law
- enforcement) 4-digit passwords to telephone calling cards or PBX out-dial
- lines, but I wanted "real" hackers. I talked and met with 100's of hackers
- world-wide to find the right individuals who can responsibly learn and append
- to this "tomb" -- people who have the desire, respect, effort and ability to
- encourage new generations of hackers. This group has been selected and
- trained, and I feel they are some of the best prospects. Their international
- mixing should give them an almost unlimited number of opportunities, and some
- protection. I wish them the best of all luck in their endless journey of
- learning and knowledge.
-
- To become legitimately successful meant getting a respectable job. Obviously,
- with my interests, I knew it would have to be in the high technology
- industries. Unfortunately, getting a job interview or a job offer with these
- companies is difficult because the Human Resources departments always shun the
- hiring of hackers. This is ironic, because many of the engineers and
- programmers within these companies are made of ex-hackers, or people who share
- a similar intense interest in technology. Also, since some of best experiences
- of a hacker are discovered non-legitimately they can't be presented on a
- resume.
-
- My first step towards completing this goal was instinctive; to keep my
- excitement and enjoyment focused intensely on technology. This may sound
- strange, but many hackers know friends who "burn out" on hacking or working
- in the high-tech companies, and I didn't want to 'burn out' at 20 years of age,
- so I had to slow down my hacking activity.
-
- The next step was getting a college education, which I've completed. College
- is not the answer to everything... in fact it's not the answer to anything,
- however, college is an experience I wish everyone could experience -- it's a
- unique experience. A college degree will not guarantee a job, but it might get
- you past the Human Resources department. If you have the chance to attend
- college, don't miss this chance. I realize employers prefer experienced
- workers over inexperienced "fresh" college graduates, but if you have a focused
- interest on a certain technology, then you will find a way to keep updating
- yourself while suffering through college. And like me, you will find the
- college degree combined with the results of your focused efforts will open the
- best job opportunities to you. Be focused and patient... it worked for me!
-
- I am currently working on the inside of a technology-related company, enjoying
- the work I do for a living. In fact, sometimes I think to myself, "Wow, I get
- paid for doing this!?" It's a thrill to be doing what I do, yet I must work
- hard, and continue working hard to achieve the highest position I am able to
- reach to make the most of my abilities. In doing this, I hope someday to give
- something back to the non-hacking society which may show them that hackers are
- constructive to society, thus, changing their negative view which has labeled
- hackers synonymous to "criminals." I would like to see mature, legitimately-
- successful hackers, form an interest group to help cultivate the energy of the
- younger hackers.
-
- Although I am retiring from the community, I can never retire the curiosity and
- intense interest I have about technology. Instead, I now focus these aspects
- legitimately into my daily work and will continue to do so. I've immensely
- enjoyed my involvement in the hacking community and will always treasure it. I
- also hope to eventually persuade people to accept hackers and to not persecute
- them. This last goal is the most ambitious goal, but I feel it's the most
- important goal, because those groups that control society are wasting a group
- of young and talented individuals who could be inventors of future
- technologies. Now, I will formally say "goodbye" to my friends in the hacking
- community... but not for the last time.
-
- Persevere,
-
- Jester Sluggo
- _______________________________________________________________________________
-
- "Truth Is Out Of Style"
-
- An Investigative Report Into Computer Security Corruption
-
- by Dispater
-
- It seems that these days the anti-virus industry/community has brainwashed the
- public into thinking that any use of a modem will put you in contact with an
- unfathomable array of dangers. It sounds like something your mom said, when
- she didn't want you to stay out after dark doesn't it?
-
- As it turns out the anti-virus community has all the moral fiber of television
- evangelists. As they preach on about the horrors of accessing information
- (without purchasing one of their products), they are engaging in the activity
- that they claim should be made a federal offense, in Congress. That is the
- "distribution of computer viruses. Not only have they been involved in this
- type of activity since they industry began, but now there is a self proclaimed
- "elite" [smirk] group of so-called professionals within the industry that wish
- to keep a monopoly on the virus trade, by ruining the reputation and lives of
- independent researchers. So in a way, we now have a "virus cartel" within the
- computer security industry.
-
-
- The Little Black Book of Computer Viruses
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- The Little Black Book of Computer Viruses is a printed text that has been
- around for a few years, but is finally making waves with people who think
- Prodigy and CompuServe are the best networks ever invented. Anyway, this book
- contains printed out versions of viruses. Gee, viruses are SO difficult for
- people to get their hands on aren't they? Well, one of the information
- dinosaurs got his name in print for condemning such immorality.
-
- "Professional virus fighters such as Alan Solomon at S&S
- International are madder than angry hornets over the publication.
- They are encouraging anti-black book campaigns that include
- PICKETING THE AUTHOR'S HOUSE, boycotting shops that sell the book,
- petitioning Congress, and even bringing in lawyers."
- -- ComputerWorld, June 29, 1992, page 4 (emphasis added)
-
- Well isn't it interesting to note that while Mr. Solomon is encouraging
- personal and economic harassment of Mr. Ludwig, his close friend and business
- associate, Sarah Gordon is doing the dirty work for him.
-
-
- The Con
- ~~~~~~~
- The National Computer Security Association's 1st Annual Conference on Viruses
- took place in Washington, D.C. this past June. Alan Solomon and Sarah Gordon
- were there in full force. Gordon has often been referred to as being Solomon's
- sidekick and nowhere did she live up to this distinctive title more than at
- this conference.
-
- At the conference, Gordon purchased not one, but two copies of Ludwig's book
- and then immediately ran to the conference organizer to make a dramatic scene
- over how immoral it was for Mr. Ludwig to be selling such a thing. As it turns
- out this is not the first time Sarah Gordon has engaged in such hypocritical
- behavior.
-
- Another interesting thing to note at the conference is the fact that one
- evening, Knight Lightning and a couple of others noticed some people sitting
- around a room and walked in out of curiosity to what was going on. As it
- turned out what was going on was a "midnight meeting" of sorts. KL and friends
- were asked to leave because "it was not appropriate that <they> be here." Why
- wasn't it appropriate? It's because what these people were doing was
- discussing the ways they were going to "take down bulletin boards" and damage
- people's career's who distribute viruses.
-
- Sometime after this conference, I learned about their plan to use "the media to
- ruin these sysops. For example, to use influence with the media to call
- attention to this type of activity." These people even went so far as to
- compile a list of BBSes that they wish to "take down."
-
- The Hit List
- ~~~~~~~~~~~~
- Phrack received anonymous mail containing the BBS "hit list" that the self-
- proclaimed "elite" group of modem vigilantes put together to target first.
- Upon our receipt of this list, Phrack staff members contacted the sysops of
- these boards and as a result, many of the numbers have since been changed.
-
- +1-206-481-2728 The Festering Pit of Vile Excretions
- [This phone number belongs to a construction company
- called Custom Building Co.]
- +1-213-274-1333 West Coast Technologies (Tymnet 311021300023)
- +1-213-274-2222 DII
- +1-213-PRI-VATE\
- )BBS-A-Holic
- +1-ITS-PRI-VATE/
- +1-301-PRI-VATE\
- )Digital Underground
- +1-301-913-5915/
- +1-301-948-7761 Cornerstone III
- [ ]
- +1-305-669-1347 The Penthouse
- +1-516-466-4620\
- )Hamburger Heaven: this was down for
- +1-517-PRI-VATE/ software problems, was titled Sentinel's Gate
- +1-602-491-0703 The Final Frontier
- +1-708-541-1069 Pirate's Guild
- +1-717-367-3501 Night Eyes
- +1-818-831-3189 Pirate's Cove
- +1-901-756-4756 Silicon Central
- +1-916-729-2112 The Welfare Department
- [This is an insurance companies phone number]
- +1-213-274-1333 West Coast Technologies (Tymnet 311021300023)
- +1-213-274-aaaa DII
- +1-313-LIM-ITED Canterbury Woods
- +1-409-372-5511 The Crowbar Hotel
- +1-514-PRI-VATE\
- )The Sacred Reich
- +1-514-975-9362/
- +1-516-328-0847 The Grave of the Lost
- +1-516-541-6324 Realm of Heroes
- +1-708-459-7267 Hell Pit
- +1-713-464-9013 South of Heaven
- +1-818-831-3189 Pirate's Cove
- +1-819-PRI-VATE Brain Damage
-
- It is unclear as to whom is directly responsible for the organization of this
- group or who is responsible for creating and distributing the list, however
- there were representatives from CERT, ISPNews, and several other well known
- individuals who are self-proclaimed security experts as well as a slew of
- nobodies who wish to make a name for themselves.
-
-
- The Hell Pit BBS
- ~~~~~~~~~~~~~~~~
- The Hell Pit is a BBS system in Chicago and operated by a sysop named Kato.
- Kato has a legitimate curiosity (as if a curiosity needs to be validated) about
- the inner-workings of viruses. I shall let him relate his experience:
-
- "I have been running The Hell Pit BBS for the past 3 years. It's gone
- through many phases in that time, but the most recent has been my affection
- for computer viruses. I became interested in viruses about one and a half
- years ago and I set up a virus file base on my system. At first I had a
- mere 5 or 6 viruses that I had collected from a system in the area. My
- collection has grown to about 700 IBM computer viruses."
-
- "It seems to be their objective to shut down my bulletin board system and
- therefore eliminate my virus database. Considering these anti-virus
- personnel claim to be interested in aspects of computer security, I find
- their tactics highly questionable. There was recently a NCSA anti-virus
- conference. I learned from sources that one of the people attending the
- conference [Sarah Gordon] had committed certain acts on my BBS. This person
- claimed to have called up, uploaded 3 fake viruses, gained access to my
- virus database and then downloaded several viruses. This is their proof
- that I do not adequately control virus access on my system. The anti-virus
- personnel do not allow me to defend myself."
-
- "Anti-virus personnel themselves have committed the same mistakes as I did,
- probably much more often. There is no set of rules that determines what
- makes someone an anti-virus authority. Certain people that seem to fit the
- mold are allowed to exchange viruses with anti-virus personnel. What are
- the criteria for these people? Is there any? It has been my experience
- that if you get involved with the right circles, you are considered an anti-
- virus authority. However, there are many places in the anti-virus community
- for viruses to leak out. For one thing, you can never be certain who you
- are dealing with. Just because someone is smart and claims to hold an anti-
- virus attitude is no guarantee that that person isn't an "in the closet"
- virus writer.
-
- "At anti-virus conferences such as the NCSA anti-virus conference, guests
- were exchanging viruses like they were baseball cards. That isn't what I
- would consider controlling access."
-
- "They do help a lot of people with computer troubles. However, to criticize
- me for not properly controlling access to my collection of viruses is being
- hypocritical."
-
- "If anyone would like to call my system to check things out, feel free. I
- have a lot more to offer than just computer viruses. I have a good number
- of text files and some pretty active message bases. The Hell Pit BBS -
- (708)459-7267" - Kato
-
-
- Conclusions
- ~~~~~~~~~~~
- It seems there is a move afoot in the anti-virus community to rid the world of
- bulletin board systems that disseminate viruses openly and freely. The anti-
- virus professionals believe that they must "defend the world" from this type of
- activity. Even though during a recent conference in Washington, D.C., it was
- disclosed that an anti-virus researcher recently uploaded three (3) viruses
- onto a virus BBS (Hell Pit). Why was this done? To "expose the fact that the
- sysop was not as careful as he claims to be." The person that did this was
- then able to download viruses which was against the policy the sysop claimed
- was in place (of course this statement is based upon the integrity of the anti-
- virus community and their integrity is obviously suspect).
-
- So, the anti-virus community set-up this sysop and made an example of him in a
- national conference without allowing him the opportunity to defend himself. In
- fact, the sysop may still be totally unaware that this event has even occurred,
- until now that is.
-
- These anti-virus researchers were openly exchanging copies of viruses for
- "research purposes only." It seems okay for them to disseminate viruses in the
- name of research because of their self-proclaimed importance in the anti-virus
- community, but others that threaten their elite (NOT!) status are subject to be
- framed and have examples made of them.
-
-
- Do As I Say, Not As I Do
- ~~~~~~~~~~~~~~~~~~~~~~~~
- This type of activity raises a very interesting question. Who gives private
- sector computer security employees or consultants carte blanche to conduct this
- type of activity? Especially when they have the gall to turn around and label
- hackers as criminals for doing the exact same thing. The answer is not who,
- but what; money and ego. Perhaps the most frightening aspect of this whole
- situation is that the true battle being fought here is not over viruses and
- bulletin board systems, but instead the free dissemination of information. For
- a group of individuals so immersed in this world, there is a profound ignorance
- of the concepts of First Amendment rights.
-
- Phrack Magazine is ready to stand tall and vigorously keep a close watch and
- defend against any incursion of these rights. We've been around a long time,
- we know where the bodies are buried, our legion of followers and readers have
- their eyes and ears open all across the country. Those of you in the security
- industry be warned because every time you slip up, we will be there to expose
- you.
-
- Dispater
- _______________________________________________________________________________
-
- Tim Foley Virus
- ~~~~~~~~~~~~~~~
- By Guido Sanchez
-
- Right after I moved from 512 to 708, I had the misfortune to realize that Steve
- Jackson Games, a company whose games I readily buy and play, had a BBS up in my
- home town called the Illuminati BBS. This was my misfortune as I could have
- called it locally in Texas, but now instead had to spend my phone bill on it
- from Illinois.
-
- A good year after the Secret Service assault of Steve Jackson Games, after most
- of the "evidence" was returned with nifty little green stickers on it, a text
- file was put up on the BBS called FOLEY.TXT, a simple copy of the lawsuit that
- Steve Jackson Games had filed against the government, also known as
- JACKSUIT.TXT, distributed by the EFF I believe.
-
- [Editor's Note: We have been unable to confirm that EFF ever released a file
- called JACKSUIT.TXT, however details of the EFF's
- participation in the Steve Jackson Games lawsuit can be found
- in EFFector Online 1.04.]
-
- It was called FOLEY.TXT obviously because of Timothy Foley, a big-shot
- government guy [actually an agent for the U.S. Secret Service] who is one of
- the defendants in the case. I downloaded the file, and zipped it into a file
- called, surprisingly enough, FOLEY.ZIP.
-
- Within the next week, I was gleefully spreading information as usual, and
- uploaded the FOLEY.ZIP file along with a batch of viral files to a local BBS
- with a beginning virus base. The theory here is to spread viruses about,
- accessible to all so that wonderful little Anti-Viral programmers cannot
- succeed.
-
- Unfortunately, the FOLEY.ZIP file was put into the viral file base, and before
- I could warn the sysop to move it into the appropriate file base, about 8 lame
- warezwolves had downloaded it and by the end of the week it was widely spread
- around the 708 NPA.
-
- The moral of this story? None really, it's just an amusing vignette of what
- can happen when people become involved in the intense bartering of information
- that takes place via modem, and can get ridiculed if they're not sure of their
- commodity. That's all this huge business is, everyone is a courier. Whether
- they're pirated files, adult files, sound files, viruses, or text files; 90% of
- the time they're just downloaded from one 1.2 gig board and uploaded to the
- next one for more credits to download more files, etc.
-
- It's a great big cycle, just like life. So, to risk sounding cliche, my rally
- to all is this: "Slow down! Sit back and pick the roses, eat them, digest them,
- and eventually <hopefully> excrete them!" Mr. Warhol, my fifteen minutes are
- up. The soapbox is now free.
- _______________________________________________________________________________
-
- The Hacker Files June 22, 1992
- ~~~~~~~~~~~~~~~~
- By Barbara E. McMullen & John F. McMullen (Newsbytes)
-
- NEW YORK -- DC Comics has announced the introduction of a new twelve-issue
- series, "The Hacker Files." DC spokesperson Martha Thomases said that the
- first issue will ship on June 23rd.
-
- The series, created by science fiction author Lewis Shiner, deals with the
- adventures of "super-hacker" Jack Marshall who, prior to the events chronicled
- in the series, unjustly lost his job at Digitronix and now operates as a free-
- lance consultant.
-
- The first story line, covering the first four issues of the series, deals with
- Marshall's attempt to uncover those responsible for jamming ARPANET (Network of
- Advanced Research Projects Agency) and causing NORAD's Space Surveillance
- Center inside Cheyenne Mountain, Wyoming to malfunction, bringing the United
- States to the brink of nuclear war.
-
- In the course of his investigation, Marshall, AKA "Hacker," is assisted by a
- number of members of the hacker community -- "Master Blaster," "Sue Denim," and
- "Spider" (Master Blaster, whose real name is Mikey is a student at New York
- City's Bronx High School of Science).
-
- Fiction comes close to reality when it appears that the person responsible for
- the virus that caused the damage is Roger P. Sylvester, a student at Columbia
- University and the son of a high ranking official at the National Security
- Agency (NSA); on November 2, 1988 Robert T. Morris, Jr., a Cornell student and
- son of NSA's chief computer scientist, caused the crippling of the Internet
- through his release of the "Internet Worm."
-
- Shiner told Newsbytes, "The similarity of the characters was, of course done
- intentionally -- you might even note the somewhat subtle connection of the
- names: 'Sylvester The Cat' and 'Morris The Cat.' I did it partially to show
- those somewhat knowledgeable about computers that the plot was not made out of
- whole cloth but was the result of a good deal of research."
-
- Shiner continued, "When reading comics, I look for information density and I
- tried to make the Hacker Files rich in that regard. I'm hoping to attract some
- computer-literate young people to comics -- comics were one of the earliest
- forms of expression to make great use of computers and I hope, with the Hacker
- Files, to involve more computer types in the medium."
-
- Shiner also told Newsbytes that his experience as a programmer with a small
- Dallas software firm provided him with an ongoing interest in computer and
- communications technology. He added, "The firm was sold to EDS (Electronic
- Data Services), Ross Perot's firm, and, with long hair and jeans, I didn't fit
- into the EDS mold so I left and concentrated on writing."
- _______________________________________________________________________________
-
- "Sneakers" by Universal Pictures June 24, 1992
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Taken from PR Newswire
-
- Follow A Team of High-Tech Security Experts
- Into The Complex World of Computer Crime
-
- "I was trying to break into Protovision. I wanted to get the programs for
- their new games." -- David Lightman (Matthew Broderick, "WarGames").
-
- "The world isn't run by weapons anymore, or energy or money. It's run by
- little ones and zeros. Little bits of data. It's all just electrons." --
- Cosmo (Ben Kingsley, "Sneakers").
-
- In 1984, screenwriters Walter F. Parkes and Lawrence Lasker received an Academy
- Award nomination for their script which followed the adventures of a young high
- school hacker (Matthew Broderick) whose computer made contact with the
- mainframe computers at North American Air Defense Command (NORAD).
-
- A critical and box office success, "WarGames" was the first major motion
- picture to explore the emerging worlds of computer games, hacking, crashing and
- data piracy. It soon found a legion of fans who had also discovered the vast
- frontiers available through their personal computer.
-
- Eight years later, Parkes and Lasker along with writer-director Phil Alden
- Robinson ("Field of Dreams") have collaborated on "Sneakers," a Universal
- Pictures release which follows a team of high-tech security experts into the
- complex world of computer crime. The caper film, directed by Robinson, stars
- Robert Redford, Dan Aykroyd, Ben Kingsley, River Phoenix, Sidney Poitier, David
- Strathairn, James Earl Jones, and Mary McDonnell.
-
- Parkes and Lasker first heard the term "sneakers" at a computer convention in
- 1981 as a nickname for IBM's kid programmers. Months later, they met the
- editor of a small computer magazine who had a very different definition of the
- word. "Sneakers," their source explained, is a term that is synonymous with
- "black hatters" and "tiger teams," or individuals who are hired to break into
- places in order to test the security of the installation.
-
- Teaming up with Robinson, the trio wrote the basic outline of a story about a
- team of sneakers whose questionable pasts had brought them together. Robinson
- then embarked on some extensive research, but what had begun as basic fact-
- finding about computer outlaws soon evolved into clandestine meetings with
- underground hackers, FBI men, cryptologists, wire tappers, professional
- penetrators and an endless stream of cyberpunks who were the pioneers in system
- break-ins.
-
- The "Sneakers" research led to meetings with numerous characters, ranging from
- the notorious Captain Crunch (John Draper) to renowned mathematician Leonard
- Adelman, called the father of public-key encryption. Using computer
- encryption as a plot device, the writers were able to concoct an intricate
- "what if" story which explored the possibility of a "black box" that could
- potentially crack the code of any electronic information in the world.
-
- "'Sneakers' has to do with a new age... the information age," said Redford.
- "It's quite possible that a war in the future will be a war of information.
- Whoever has it, wins."
-
- Coming to theaters this September.
- _______________________________________________________________________________
-
- Pirates v. AT&T: Posters
- ~~~~~~~~~~~~~~~~~~~~~~~~
- Special thanks to Legacy Irreverent and Captain Picard
-
- On May 24 1992, two lone pirates, Legacy (of CyberPunk System) and Captain
- Picard (of Holodeck) had finally had enough of AT&T. Together, they traveled
- to the AT&T Maintenance Facility (just west of Goddard, Kansas) and claimed the
- property in the name of pirates and hackers everywhere.
-
- They hoisted the Jolly Roger skull and crossbones high on the AT&T flagpole,
- where it stayed for two days until it was taken down by security.
-
- This event was photographed and videotaped by EGATOBAS Productions, to preserve
- this landmark in history. And now you can witness the event. For a limited
- time they are offering full color posters and t-shirts of the Jolly Roger
- Pirate flag flying high over AT&T, with the AT&T logo in plain view, with the
- caption; "WE CAME, WE SAW, WE CONQUERED."
-
- Prices: 11" x 17" Full Color poster........................... $ 7.00 US
- 20" x 30" Full Color poster $20.00 US
- T-shirts $20.00 US
-
- If you are interested in purchasing, simply send check or money order for the
- amount, plus $1.00 US for postage and handling to:
-
- CyberPunk System
- P.O. Box 771027
- Wichita, KS 67277-1072
-
- Be sure to specify size on T-shirt.
-
- A GIF of this is also available from CyberPunk System, 1:291/19, 23:316/0,
- 72:708/316, 69:2316/0. FREQ magicname PIRATE
- _______________________________________________________________________________
-
- Telco Trashing Yields Big Rewards July 20, 1992
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Anonymous
-
- A few days ago, I was faced with a decision about what to do that fine evening:
- Try and make amends with my girlfriend or go dumpster diving down at the Bell
- Central Office. Well I guess I am a true lamer since I opted for the telco,
- but my choice did not go unrewarded as I found a nice little treasure.
-
- The building is a old 1940's brick place with almost no security whatsoever,
- not even a guard on Sunday nights. So, it was no problem to jump the barbed
- wire fence that surrounded the truck lot where the dumpster was located. After
- rooting around through the dumpster for something worth my while, I came across
- a medium sized box that apparently had been used by one of the employees for
- moving since written on the were the words "pots and pans, kitchen."
-
- Naturally intrigued by this strange box in a telco dumpster, I opened it and
- found quite a surprise! There, staring up at me, was a binder with a label
- stuck on it that read "Phrack 23." Inside I found the entire collection of
- Phrack 1-39, Informatik 1-4, and LOD/H Technical Journals 1 and 2 (apparently
- they were too cheap to print out the rest). They were poorly printed on a
- laser printer (or well printed on a ink jet), but they were much better than
- the cheesy job I had done printing out mine. :-)
-
- Apparently someone at the telco is a phreaker that infiltrated the ranks of
- South Central Bell or they have been reading up on the latest and greatest in
- the phreaker/hacker community.
-
- Perhaps not as valuable as a list of COSMOS passwords or dialups, but still it
- was quite a find.
- _______________________________________________________________________________
-
- Anonymous Mail On IBM VM Systems?
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Date: Tue, 28 Apr 92 14:54:58 EST
- From: Apollo
- Subject: Anonymous Mail
- To: Phrack Staff
-
- Dear Phrack Staff,
- I was reading a past Phrack issue and noticed that you can send anonymous
- mail from a UNIX system. I know that there is a way to send it from a VM
- system. However, the people at my node don't want anonymous mail sent, so they
- do not tell us how it's done. Can someone PLEASE tell me how I can send
- anonymous mail via a VM system?
-
- -- Apollo --
-
- From: Mind Mage
- Subject: Anonymous Mail
- To: Apollo
-
- I assume that you know you can telnet to any VM system on the Internet and send
- anonymous mail using port 25 and a commands that are very similar to that of
- the UNIX SMTP.
-
- If you want to send it from your particular system, you can try telneting to
- port 25 of your own machine and doing it from there.
-
- Mind Mage
- _______________________________________________________________________________
-
- WWIV Link Hack
- ~~~~~~~~~~~~~~
- By Mr. Bigg (Rebel-*-Jedi)
-
- Not that many people care but here is a nice little trick I happened to come
- across and feel like sharing.
-
- Hack for WWIV Systems Using Multi-Net v1.0 Mod
- Usually used for LinkNet
-
- Main Login: @-!NETWORK!-@
- Link Login: 1 (or whoever is sysop)
- //edit config.dat
- find system password in file
- abort editing
- //dos
- enter system password
-
-
- Viola, access to Dos :)
-
- Lamely enough there is no password. Check for users when using this mod.
- _______________________________________________________________________________
-
- The Day Bell System Died
- ~~~~~~~~~~~~~~~~~~~~~~~~
- Sung to the tune of American Pie (with apologies to Don McLean)
-
- Long, long, time ago,
- I can still remember,
- When the local calls were "free".
- And I knew if I paid my bill,
- And never wished them any ill,
- That the phone company would let me be...
-
- But Uncle Sam said he knew better,
- Split 'em up, for all and ever!
- We'll foster competition:
- It's good capital-ism!
-
- I can't remember if I cried,
- When my phone bill first tripled in size.
- But something touched me deep inside,
- The day... Bell System... died.
-
- And we were singing...
-
- Bye, bye, Ma Bell, why did you die?
- We get static from Sprint and echo from MCI,
- "Our local calls have us in hock!" we all cry.
- Oh Ma Bell why did you have to die?
- Ma Bell why did you have to die?
-
- Is your office Step by Step,
- Or have you gotten some Crossbar yet?
- Everybody used to ask...
- Oh, is TSPS coming soon?
- IDDD will be a boon!
- And, I hope to get a Touch-Tone phone, real soon...
-
- The color phones are really neat,
- And direct dialing can't be beat!
- My area code is "low":
- The prestige way to go!
-
- Oh, they just raised phone booths to a dime!
- Well, I suppose it's about time.
- I remember how the payphones chimed,
- The day... Bell System... died.
-
- And we were singing...
-
- Bye, bye, Ma Bell, why did you die?
- We get static from Sprint and echo from MCI,
- "Our local calls have us in hock!" we all cry.
- Oh Ma Bell why did you have to die?
- Ma Bell why did you have to die?
-
- Back then we were all at one rate,
- Phone installs didn't cause debate,
- About who'd put which wire where...
- Installers came right out to you,
- No "phone stores" with their ballyhoo,
- And 411 was free, seemed very fair!
-
- But FCC wanted it seems,
- To let others skim long-distance creams,
- No matter 'bout the locals,
- They're mostly all just yokels!
-
- And so one day it came to pass,
- That the great Bell System did collapse,
- In rubble now, we all do mass,
- The day... Bell System... died.
-
- So bye, bye, Ma Bell, why did you die?
- We get static from Sprint and echo from MCI,
- "Our local calls have us in hock!" we all cry.
- Oh Ma Bell why did you have to die?
- Ma Bell why did you have to die?
-
- I drove on out to Murray Hill,
- To see Bell Labs, some time to kill,
- But the sign there said the Labs were gone.
- I went back to my old CO,
- Where I'd had my phone lines, years ago,
- But it was empty, dark, and ever so forlorn...
-
- No relays pulsed,
- No data crooned,
- No MF tones did play their tunes,
- There wasn't a word spoken,
- All carrier paths were broken...
-
- And so that's how it all occurred,
- Microwave horns just nests for birds,
- Everything became so absurd,
- The day... Bell System... died.
-
- So bye, bye, Ma Bell, why did you die?
- We get static from Sprint and echo from MCI,
- "Our local calls have us in hock!" we all cry.
- Oh Ma Bell why did you have to die?
- Ma Bell why did you have to die?
-
- We were singing:
-
- Bye, bye, Ma Bell, why did you die?
- We get static from Sprint and echo from MCI,
- "Our local calls have us in hock!" we all cry.
- Oh Ma Bell why did you have to die?
- _______________________________________________________________________________
-
- The 1992 Consumer Electronics Show
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By Sarlo
-
- The Consumer Electronic Show is the annual event held in Chicago, Illinois,
- that gives a sneak peek at the electronic products to come to market, as well
- as products that are currently on the market.
-
- The show is usually closed to the public. This year however, for a MEASLY $10
- fee, the common shmoe can waltz his ignorant ass right up to the door, get a
- green stamp on his hand, and walk up to several displays, oohing and ahhhing,
- and gape like landed fish at the wonderous booths set up by various
- participating companies such as AT&T, most major bell companies, IBM, Prodigy,
- dozens of cellular manufacturers, Nintendo, Sega, and more software producers
- than I really have the patience to list.
-
- I take a taxi to the McCormick center, a convention haven, and enter through
- the underground entrance. I walk down the nondescript hallway, noting that for
- a center that is supposed to be housing the latest in the future technology,
- nothing was that awe-inspiring. Expecting a lame show with shoddy video
- graphics, I purchased my ticket, got my hand stamped and entered the doors.
-
- Into an enormous room, filling my senses with an array of Lights and Sound.
- You could almost smell the silicon as I made my way down the aisle displaying
- the giant Phillips Digital Compact Cassettes screen. Not being a huge fan of
- stereo equipment, I head over to the Sharp Electronics Display. It was a turn
- in the right direction, as it brought me face to face with one of the clearest
- and, per the name, sharpest video displays I have seen in my life. Their LCD
- big-screen televisions, displaying a aquarium scene. Even close up, distortion
- of the images were at a minimum. Along the north wall, a smaller, gutted
- version of the LCD display was shown, giving electronics buffs a firsthand look
- at the inner workings of the viewscreens. Turning a corner, I came face to
- face with their dual-projection wallscreen television. Instead of ghost images
- and a fuzzy, indistinct picture, I found that it may have very well be the
- highest quality video projection system I have ever come in contact with.
-
- Cellular Mania
- ~~~~~~~~~~~~~~
- The highlight of the Cellular Phone section was the Motorola Cordless/Cellular
- display area with a large sign showing the spokesperson for Motorola, the eye-
- catching slogan above him:
-
- "Cordless Phone Eavesdroppers Are Everywhere."
-
- Immediately catching my interest, I wandered over to check out the smaller
- print:
-
- "But with my Motorola Secure Clear (tm) Cordless Phone, my private
- conversations stay private."
-
- Secure Clear, as the literature explains it, is an exclusive technology that
- assures you that no eavesdroppers will be able to use another cordless phone,
- scanner or baby monitor to listen to your cordless conversations.
-
- As most of us know, security codes and multi-channels don't always prevent
- eavesdropping. With the latest technology these days, security codes, one of
- 65,000 possible codes that are randomly assigned every time you set the handset
- into the base, keeps someone from using your phone base as an outgoing
- phoneline.
-
- Using the Auto Channel Scan (ACS), the Secure Clear Cordless Phones
- automatically skip any channels that register noise or interference. Three
- guesses what Sarlo is getting himself for Christmas.
-
- For more information on this or any other Motorola product, call their Consumer
- Products Division at (800)331-6456.
-
- On other notes, Technophone had a wide variety of cellular accessories,
- including a Desk stand, spare batteries, an in-car charger, a new life of
- antennae, QuickCharge AC chargers, and a hands-free unit for safe operation in
- a car.
-
- Omni Cellular had one of their Model "A" V833k Portable Hand-Helds open for a
- demonstration, giving a static-free conversation with one of the salesmen.
- Many of the features of this phone were:
-
- o 90 Minutes of Talk Time
- o 10 hours of Stand-by Time.
- o and a sturdy design built right here in the USA.
-
- Other features included Auto-Power Shutoff, Electronic Lock, 50 number memory,
- and signal strength indicator.
-
-
- East Building Hipster Hi-Jinx
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Growing bored, I headed over to the map. Searching it, I found, almost
- literally, my green light. On their illuminated map display, the green section
- of the map beamed out to me.
-
- "Computers"
-
- Hauling ass to the door, stopping for a quick inspection of my bags by the
- security guard, I strolled over to the east building (purchasing a way-keen
- CES-92 T-Shirt along the way), I burst into the building with a renewed vigor.
-
- Right smack-dab in the front of the entrance there is the awful stench of men
- in business suits and cheap computer services. Right away, I knew I had found
- the Prodigy display.
-
- With free trials and the salesmen prodding the consumers to subscribe to their
- system, I decided to take a look.
-
- "Where else can you get such a great service, allowing you access to such a
- wide variety of things such as an online message service, up-to-date news, an
- online encyclopedia, and thousands of interesting users, people just like
- yourselves?" The Online-Conman peddled his wares to the unsuspecting
- consumers, not only misinforming them as to think that Prodigy is a useful
- service at all, but to actually have the gall to shove a PS/1 in their faces
- and tell them it's a quality computer.
-
- "Umm... what about any Public Access Unix Site with an Internet or Usenet
- feed," I asked. The clod then got on his high-horse and addressed me.
-
- "Perhaps. But most Public Unix's, or bulletin boards, for that matter don't
- have high-quality graphics to accompany the information." The man had
- definitely done his homework. But apparently IBM and Sears soaped the man's
- brains out thoroughly enough to the point where he actually bought the bull
- that they were forcing down peoples throats.
-
- "Yea," I said. "But most public access sites don't waste a quarter of your
- screen space with worthless advertisements. I wasn't aware that pretty
- pictures made the news or messages any more informative, either. But I might
- also point out that they don't charge you a extra amount of money for every
- message over the 30th one, read your mail or censor your public posts, or, many
- times, even charge you a fee at all, other than possibly an optional
- subscription fee, around $50 a YEAR at most, nor do they have small datafiles
- that collects information from the fat table from the subscribers." As I was
- speaking, the salesman was trying to interrupt me, finally succeeding at this
- point.
-
- "Well, I can see you have a lot of questions," the salesman evades rather well.
- "So I'm sure this gentleman over here will be glad to answer any of your
- questions, while I can take this lady's question...Yes?"
-
- I was approached by another salesman who asked me what questions I needed
- answered. I said none, seeing as I didn't have much interest in his system
- anyhow, and that I was just seeing how good the Prodigy salespeople worked
- under pressure. He said he would be glad to answer any questions I had, but if
- I were only there to harass people, to please take it elsewhere.
-
- Then it was off to the various other setups. Magazines were on display and
- free for the taking here, including Mobile Office, Various Nintendo/Game System
- magazines, and Audio Equipment. Walking down one of the back isles, I heard a
- bit of conversation that caught my ears.
-
- Star Trek Straight To Your Home
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- "Computer. Recognize Picard, Jean-Luc. Kitchen Lights ON, Turn ON the VCR and
- hit RECORD. Close the Curtains, and turn on the Extasy Channel. Prepare to
- record "Chicks with Dicks."
- - Jean Luc Picard
- Stardate 1992.4, 2:45 A.M.
-
- Such a Scenario is something you would think you could find only on Star Trek,
- right? Wrong. With the Mastervoice, the "Ultimate in Home Automation", the
- mastervoice is much like your own personal butler, telling the correct time,
- activating and operating any device in your household, and even with it's own
- alarm system. All of this, at the command of your voice.
-
- Mastervoice can be designed to be used by up to four people, can be trained in
- any language. It distinguishes who is speaking, obeys the commands, but also
- speaks back to you -- in a HUMAN sounding voice. Male or Female. You can add
- or delete voices from it's recognition systems, you can also create new
- response words as well.
-
- Featuring control over lights, stereo, TV, coffee maker, heating and cooling
- systems. It also has a Household Noise Override that allows you to have stupid
- children racing around your home in an obnoxious manner without disturbing the
- unit.
-
- Plus, it is also a speakerphone/telephone with stored numbers. At the sound of
- your voice, it will dial or answer incoming calls and allow you to carry on a
- conversation without ever having to touch the system. It also interfaces with
- your PC for memory storage or control operations.
-
- Built in infrared sensor and intrusion detection systems are another highlight
- of this demonstration. As it recognizes up to four voices, you can assign a
- password for each voice, being anything from "I am home" to
- "Supercalafragilisticexpialidoshes". If all fails, it can call the police for
- you. Nutty as all hell.
-
- Mastervoice operates thru carrier current modules. This model, as one of the
- top of the line voice-recognition home-use systems, it is up there in the
- $4,000 plus range, but seeing all the stuff it does, it's well worth the price.
-
- Skipping the Game Module Section (Nintendo/Sega/TurboGraphix/etc) entirely, I
- ran into an interesting palmtop known as the Psion Series 3, and their new
- interlink software. Windows Compatable, the palmtop not only has communication
- software for a link between your PC and Palmtop, but also will support standard
- Hayes and Hayes compatible modems. Sporting a qwerty style keyboard and a
- romcard port, 128k and a 40 column screen, the Series 3 may be limited, but
- provides an acceptable amount of access to other online services. Though for
- now, a Windows based software package is only available, at the time of this
- writing, there will be DOS and UNIX compatible packages available to the public
- in 5 to 6 months.
- _______________________________________________________________________________
-
-
-