home *** CD-ROM | disk | FTP | other *** search
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Three, File 27 of 27
-
- PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN
- PWN PWN
- PWN Phrack World News PWN
- PWN PWN
- PWN Compiled by Datastream Cowboy PWN
- PWN PWN
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
-
-
- New Yorker Admits Cracking July 3, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~
- (From AP Newswire Sources)
-
- Twenty-one-year-old Mark Abene of New York, known as "Phiber Optik" in
- the underground computing community, has pleaded guilty to charges he
- participated in a group that broke into computers used by phone companies
- and credit reporting services.
-
- The Reuter News Service says Abene was the last of the five young men
- indicted in the huge 1991 computer break-in scheme to admit committing the
- crimes. The group called itself "MOD," an acronym used for "Masters of
- Disaster" and "Masters of Deception."
-
- Abene pleaded guilty to one count of conspiracy and one count of
- unlawful access to computers. He faces a possible maximum prison term of
- 10 years and fine of $500,000.
-
- -----------------------------------------------------------------------------
-
- China Executes Computer Intruder April 26, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- (From AP Newswire Sources)
-
- A man accused of invading a computer and embezzling some
- $192,000 has been executed in China.
-
- Shi Biao, an accountant at the Agricultural Bank of China's Jilin
- branch, was accused of forging deposit slips from Aug. 1 to
- Nov. 18, 1991.
-
- The crime was the first case of bank embezzlement via
- computer in China. Authorities became aware of the plot
- when Shi and his alleged accomplice, Yu Lixin, tried to wire
- part of the money to Shenzhen in southern China.
-
- -----------------------------------------------------------------------------
-
- Teen Takes the A Train --- Literally May 13, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- (From AP Newswire sources)
-
- A 16 year old 10th grader successfully conveyed passengers on a NYC 10 car
- subway train for 2.5 hours until he went around a curve too quickly and
- could not reset the emergency brakes. Keron Thomas dressed as a NY subway
- train engineer impersonated Regoberto Sabio, a REAL subway motorman, while he
- was on vacation and even obtained Sabio's "pass number".
-
- Thomas was a Subway enthusiast who hung around train stations and areas
- where subway motormen and other subway workers hang out. A NYC subway
- spokesman was quoted as saying "Buffs like to watch...pretty soon they
- figure out how" [to run the train]. "This guy really knew what he was doing".
-
- Thomas was charged with criminal trespassing, criminal impersonation, and
- reckless endangerment.
-
- -----------------------------------------------------------------------------
-
- Banks React To Scheme That Used Phony ATM May 13, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- (From AP Newswire Sources)
-
- At least three people are believed to be involved in an ATM scam that is
- thought to have netted roughly $ 60,000. The fraud was perpetrated by
- obtaining a real ATM machine (theorized to have been stolen from a warehouse)
- and placing it in a Connecticut shopping mall.
-
- When people attempted to use the machine, they received a message that the
- machine wasn't working correctly and gave back the card. Little did they
- know that their bank account number and PIN code was recorded. The fake
- machine was in place for about 2 weeks. It was removed and the thieves
- began making withdrawals.
-
- The Secret Service thinks the scammers recorded anywhere from 2000 to 3000
- account numbers/pin codes but did not get a chance to counterfeit
- and withdraw money except from a few hundred accounts before it
- became too dangerous to continue
-
- -----------------------------------------------------------------------------
-
- Hacker Gets Jail Time June 5, 1993
- ~~~~~~~~~~~~~~~~~~~~~
- (Newsday) (Page 13)
-
- A Brooklyn College film student, who was part of a group that allegedly broke
- into computer systems operated by major telephone companies, was sentenced
- yesterday to 1 year and 1 day in prison.
-
- John Lee, 21, of Bedford Stuyvesant, also was sentenced to 200 hours of
- community service, which Manhattan Federal District Court Judge Richard Owen
- recommended he spend teaching others to use computers. Lee had pled guilty
- December 3, 1992, to a conspiracy charge involving computer tampering, fraud
- and illegal wiretapping.
-
- _______________________________________________________________________________
-
- Hacker Gets Prison Term For Phone Computer Tampering June 4, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Gail Appleson (The Reuter Business Report)
-
- NEW YORK -- A computer hacker known as "Corrupt" who was part of a group that
- broke into computer systems operated by major telephone companies was
- sentenced Friday to one year and one day in prison.
-
- The defendant, John Lee, 21, of New York had pleaded guilty December 3, 1992
- to a conspiracy charge involving computer tampering, fraud and illegal
- wiretapping.
-
- The indictment alleges the defendants broke into computer switching systems
- operated by Southwestern Bell, New York Telephone, Pacific Bell, U.S. West
- and Martin Marietta Electronics Information and Missile Group.
-
- Southwestern Bell allegedly lost $370,000 because of the crimes.
-
- The defendants also allegedly tampered with systems owned by the nation's
- largest credit reporting companies including TRW, Trans Union and Information
- America. They allegedly obtained 176 TRW credit reports on various
- individuals.
-
- The indictment alleged the group broke into the computers "to enhance their
- image and prestige among other computer hackers and to harass and intimidate
- rival hackers and other people they did not like."
- _______________________________________________________________________________
-
- Professional Computer Hackers First To Land In Jail Under New Law June 4, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Nicholas Hills (The Vancouver Sunds)(Page A11)
-
- LONDON -- In Brussels, they were celebrated as the two young men who broke the
- gaudy secrets of EC president Jacques Delors' expense accounts.
-
- In Sweden, they were known as the Eight-Legged Groove Machine, bringing down
- part of the country's telephone network, forcing a highly publicized apology
- from a government minister who said the chaos was all due to a 'technical
- fault'.
-
- They also broke into various European defense ministry networks, academic
- systems at Hull University and the financial records of the leading London
- bankers, S.G. Warburg.
-
- No, these weren't two happy-go-lucky burglars; but rather, professional
- computer hackers, aged 24 and 22, who made legal as well as technological
- history by being the first offenders of this new trade to be jailed for their
- crimes under new British law.
-
- Neil Woods and Karl Strickland have gone to prison for six months each for
- penetrating computer systems in 15 different countries. The ease with which
- they conducted this exercise, and their attitude that they were simply engaging
- in "intellectual joyriding," has confirmed the worst fears of legal and
- technological experts that computer hacking in Europe, at least, has become a
- virtually uncontrollable virus.
-
- The case became a cause celebre because of what had happened months before in
- another courtroom where a teenage computer addict who had hacked into the White
- House system, the EC, and even the Tokyo Zoo -- using a $400 birthday present
- from his mother -- had walked free because a jury accepted, basically, that a
- computer had taken over his mind.
-
- The case of 19-year-old Paul Bedworth, who began hacking at the age of 14, and
- is now studying "artificial intelligence" at Edinburgh University, provides an
- insight into why hackers have turned the new computer world into an equivalent
- state of delirium tremens.
-
- Bedworth and two young friends caused thousands of dollars worth of damage to
- computer systems in Britain and abroad. They were charged with criminal
- conspiracy under the Computer Misuse Act of 1990.
-
- Bedworth never did deny computer hacking at his trial, and did not give
- evidence in his defense. He simply said through his lawyer that there could
- not have been any criminal intent because of his "pathological obsession" with
- computers.
-
- A jury of eight men and three women unanimously acquitted him.
-
- Until the passage of the Computer Misuse Act in 1990, hacking was legal in
- Britain. Bedworth may have been found not guilty, but his activities were so
- widespread that the authorities' investigation involved eight different British
- police forces, and others from as far afield as Finland and Singapore. It
- produced so much evidence - mostly on disk - that if it had been printed out on
- ordinary laser printer paper, it is estimated that the material would have
- reached a height of 42 meters.
-
- The police were devastated by the verdict, but are now feeling somewhat better
- after the conviction of Woods and Strickland.
-
- The pair, using the nicknames of Pad and Gandalf, would spend up to six hours a
- day at their computers, boasting about "smashing" databases.
-
- -----------------------------------------------------------------------------
-
- Computers Turned My Boy Into A Robot March 18, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By Martin Phillips (Daily Mirror)(Page 1)
-
- Connie Bedworth said she was powerless to control the "monster" as he
- glued himself to the screen nearly 24 hours as day. "He didn't want
- to eat or sleep--he just couldn't bear to be away from it, " she said.
-
- A jury decided Paul Bedworth, now 19, was so "hooked" he could not stop
- himself hacking in to companies' systems -- allegedly costing them
- thousands of dollars.
-
- -----------------------------------------------------------------------------
-
- Hot For The Fingertips: An Internet Meeting Of Minds May 23, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Frank Bajak (Associated Press)
-
- NEW YORK -- Somewhere in the ether and silicon that unite two workstations 11
- floors above lower Broadway, denizens of the cyberpunk milieu are feverishly
- debating whether anyone in government can be trusted.
-
- This is the 12-by-20-foot bare-walled home of MindVox, today's recreation hall
- for the new lost generation's telecomputing crowd. You can enter by phone
- line or directly off Internet.
-
- Patrick Kroupa and Bruce Fancher are the proprietors, self-described former
- Legion of Doom telephone hackers who cut the cord with computing for a time
- after mid-1980s teen-age shenanigans.
-
- Kroupa is a towering 25-year-old high school dropout in a black leather jacket,
- with long hair gathered under a gray bandanna, three earrings and a hearty
- laugh.
-
- Fancher is 22 and more businesslike, but equally in love with this dream he
- left Tufts University for.
-
- They've invested more than $80,000 into Mindvox, which went fully operational
- in November and has more than 2,000 users, who pay $15 to $20 a month plus
- telephone charges.
-
- MindVox aspires to be a younger, harder-edged alternative to the WELL, a
- fertile 8-year-old watering hole for the mind in Sausalito, California, with
- more than 7,000 users, including scores of computer age luminaries.
-
- One popular feature is a round-table discussion on computer theft and security
- hosted by a U.S. Treasury agent. The latest hot topic is the ease of breaking
- into a new flavor of local access network.
-
- -----------------------------------------------------------------------------
-
- Hi Girlz, See You In Cyberspace May 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Margie (Sassy Magazine) (Page 79)
-
- [Margie hits the net via Mindvox. Along the way she discovers
- flame wars, sexism, and a noted lack of females online. This
- is her story. :) ]
-
- -----------------------------------------------------------------------------
-
- Hacker Accused of Rigging Radio Contests April 22, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By Don Clark (San Francisco Chronicle)
-
- A notorious hacker was charged yesterday with using computers to
- rig promotional contest at three Los Angeles radio stations, in
- a scheme that allegedly netted two Porsches, $20,000 in cash and
- at least two trips to Hawaii.
-
- Kevin Lee Poulsen, now awaiting trial on earlier federal charges,
- is accused of conspiring with two other hackers to seize control of
- incoming phone lines at the radio stations. By making sure that only
- their calls got through, the conspirators were assured of winning the
- contests, federal prosecutors said.
-
- A new 19-count federal indictment filed in Los Angeles charges
- that Poulsen also set up his own wire taps and hacked into computers
- owned by California Department of Motor Vehicles and Pacific Bell.
- Through the latter, he obtained information about the undercover
- businesses and wiretaps run by the FBI, the indictment states.
-
- Poulsen, 27, is accused of committing the crimes during 17
- months on the lam from earlier charges of telecommunications and
- computers fraud filed in San Jose. He was arrested in April 1991
- and is now in the federal Correctional Institution in Dublin. In
- December, prosecutors added an espionage charge against him for his
- alleged theft of a classified military document.
-
- The indictment announced yesterday adds additional charges of
- computer and mail fraud, money laundering, interception of wire
- communications and obstruction of justice.
-
- Ronald Mark Austin and Justin Tanner Peterson have pleaded guilty
- to conspiracy and violating computer crime laws and have agreed to
- help against Poulsen. Both are Los Angeles residents.
-
- Poulsen and Austin have made headlines together before. As
- teenagers in Los Angeles, the two computer prodigies allegedly broke
- into a Pentagon-organized computer network that links researchers and
- defense contractors around the country.
-
- -----------------------------------------------------------------------------
-
- SPA Tracks Software Pirates on Internet March 22, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By Shawn Willett (InfoWorld)(Page 12)
-
- The Software Publishers Association has begun investigating reports of
- widespread piracy on the Internet, a loose amalgam of thousands of computer
- networks.
-
- The Internet, which began as a Unix-oriented, university-based communi-
- cations network, now reaches into corporate and government sites in 110
- countries and is growing at a rapid pace.
-
- The software theft, according to Andrew Patrizio, an editor at the
- _Software Industry Bulletin_, has been found on certain channels, particularly
- the warez channel.
-
- "People are openly talking about pirating software; there seems to be no
- one there to monitor it", Patrizio said.
-
- A major problem with the Internet is that the "sites" from where the
- software is being illegally downloaded can physically be located in countries
- that do not have strong antipiracy laws, such as Italy or the former Soviet
- Union. The Internet also has no central administrator or system operator.
-
- "Policing the entire Internet would be a job", said Peter Beruk,
- litigation manager for the SPA, in Washington. "My feeling would be to target
- specific sections that are offering a lot of commercial software free for the
- download", he said.
-
- ---------------------------------------------------------------------------
-
- Socialite's Son Will Have To Pay $15,000 To
- Get His Impounded 1991 BMW Back March 23, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By John Makeig (Houston Chronicle)(Page 14A)
-
- Kenyon Shulman, son of Houston socialite Carolyn Farb will have to pay
- 15 thousand dollars to get back his 1991 BMW 325i after being impounded
- when Houston police found 400 doses of the drug ecstasy in its trunk.
-
- This is just the latest brush with authorities for Shulman who in 1988
- was raided by Harris County authorities for using his personal computer
- to crack AT&T codes to make free long distance calls.
-
- --------------------------------------------------------------------------
-
- Austin Man Gets 10 Years For Computer Theft, Sales May 6, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By Jim Phillips (Austin American Statesman)(Page B3)
-
- Jason Copson, who was arrested in July under his alias Scott Edward Berry,
- has been sentenced to 10 years on each of four charges of burglary and
- one count of assault. The charges will run concurrently. Copson still
- faces charges in Maryland and Virginia where he served a prison term and
- was serving probation for dealing in stolen goods. Police arrested Copson
- and Christopher Lamprecht on July 9 during a sting in which the men tried to
- sell computer chips stolen from Advanced Micro Devices.
-
- ---------------------------------------------------------------------------
- Treasury Told Computer Virus Secrets June 19, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By: Joel Garreau (Washington Post) (Page A01)
-
- For more than a year, computer virus programs that can wreak havoc with
- computer systems throughout the world were made available by a U.S. government
- agency to anyone with a home computer and a modem, officials acknowledged this
- week.
-
- At least 1,000 computer users called a Treasury Department telephone number,
- spokesmen said, and had access to the virus codes by tapping into the
- department's Automated Information System bulletin board before it was muzzled
- last month.
-
- The bulletin board, run by a security branch of the Bureau of Public Debt in
- Parkersburg, W.Va., is aimed at professionals whose job it is to combat such
- malicious destroyers of computer files as "The Internet Worm," "Satan's Little
- Helper" and "Dark Avenger's Mutation Engine." But nothing blocked anyone else
- from gaining access to the information.
-
- Before the practice was challenged by anonymous whistleblowers, the bulletin
- board offered "recompilable disassembled virus source code"-that is, programs
- manipulated to reveal their inner workings. The board also made available
- hundreds of "hackers' tools"-the cybernetic equivalent of safecracking aids.
- They included "password cracker" software-various programs that generate huge
- volumes of letters and numbers until they find the combination that a computer
- is programmed to recognize as authorizing access to its contents-and "war
- dialers," which call a vast array of telephone numbers and record those hooked
- to a computer.
-
- The information was intended to educate computer security personnel,
- according to Treasury spokesmen. "Until you understand how penetration is done,
- you can't secure your system," said Kim Clancy, the bulletin board's operator.
-
- The explosion of computer bulletin boards-dial-up systems that allow users
- to trade any product that can be expressed in machine-readable zeros and
- ones-has also added to the ease of virus transmission, computer analysts say.
- "I am Bulgarian and my country is known as the home of many productive virus
- writers, but at least our government has never officially distributed viruses,"
- wrote Vesselin Vladimirov Bontchev of the Virus Test Center of the University
- of Hamburg, Germany.
-
- At first, the AIS bulletin board contained only routine security alert
- postings. But then operator Clancy "began to get underground hacker files and
- post them on her board," said Bruce Sterling, author of "The Hacker Crackdown:
- Law and Disorder on the Electronic Frontier." "She amassed a truly impressive
- collection of underground stuff. If you don't read it, you don't know what's
- going to hit you."
-
- Clancy, 30, who is a former Air Force bomb-squad member, is highly regarded
- in the computer security world. Sterling, one of the nation's foremost writers
- about the computer underground, called her "probably the best there is in the
- federal government who's not military or NSA (National Security Agency).
- Probably better than most CIA."
-
- Clancy, meanwhile, is staying in touch with the underground. In fact, this
- week, she said, she was "testing a product for some hackers." Before it goes
- into production, she will review it to find potential bugs. It is a new war
- dialer called "Tone-Loc." "It's an extremely good tool. Saves me a lot of
- trouble. It enables me to run a hack against my own phone system faster" to
- determine points of vulnerability.
-
- -----------------------------------------------------------------------------
-
- [AGENT STEAL -- WORKING WITH THE FEDS]
-
-
- IN THE UNITED STATES DISTRICT COURT
-
- FOR THE NORTHERN DISTRICT OF TEXAS
-
- DALLAS DIVISION
- -----------------------------------
-
- THE UNITED STATES OF AMERICA *
- *
- V. * CRIMINAL NO. 3-91-194-T
- * (FILED UNDER SEAL)
- JUSTIN TANNER PETERSEN (1) *
-
- JOINT MOTION TO SEAL
-
- COMES NOW the United States of America, by its United
-
- States Attorney, at the request of the defendant, and hereby
-
- requests that this Honorable Court seal the record in this case.
-
- In support thereof, the United States states the following:
-
- 1. The case is currently being transferred to the
-
- Middle District of California for plea and disposition pursuant
-
- to Federal Rule of Criminal Procedure 20;
-
- 2. The defendant is released on bond by the United
-
- States District Court for the Middle District of California;
-
- 3. The defendant, acting in an undercover capacity,
-
- currently is cooperating with the United States in the
-
- investigation of other persons in California; and
-
- 4. The United States believes that the disclosure of
-
- the file in this case could jeopardize the aforesaid
-
- investigation and possibly the life of the defendant.
-
- Consequently, the United States requests that this Honorable
-
- Court seal the record in this case.
-
- Respectfully submitted,
- MARVIN COLLINS
- United States Attorney
-
-
-
- LEONARD A. SENEROTE
- Assistant United States Attorney
- Texas State Bar No. 18024700
- 1100 Commerce Street, Room 16G28
- Dallas, Texas 75242-1699
- (214) 767-0951
-
- CERTIFICATE OF CONFERENCE
-
- The defendant joins in this motion.
-
-
-
- LEONARD A. SENEROTE
- Assistant United States Attorney
-
-
- [The entire file of information gathered from the courts regarding
- Agent Steal is available from Phrack for $5.00 + $2 postage]
- -------------------------------------------------------------------------
-