home *** CD-ROM | disk | FTP | other *** search
-
- ==Phrack Magazine==
-
- Volume Four, Issue Forty-Four, File 27 of 27
-
- PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN
- PWN PWN
- PWN Phrack World News PWN
- PWN PWN
- PWN Compiled by Datastream Cowboy PWN
- PWN PWN
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
-
-
- Feds Pull The Plug On Phiber Optik November 4, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Joshua Quitner (Newsday) (Page 57)
-
- The biggest case of computer intrusion in US history drew to a close yesterday
- when a young Elmhurst, Queens, man was sentenced to a year and a day in jail
- for his part in an electronic gang that, for years, roamed the nation's
- largest telephone and data networks.
-
- Mark Abene, 21, renowned in the digital underground as Phiber Optik, was the
- last of five young New York City men to plead guilty in federal court to one
- felony count of conspiracy for being in a hacker group known as MOD.
-
- Abene apologized for his deeds yesterday. "I'm just sorry they were
- misconstrued as malicious in any way," he said in Manhattan's federal
- district court.
-
- Prosecutors claimed that the young men rumbled on computer networks,
- disconnecting other hackers' phone service and posting embarrassing
- information culled from confidential credit networks like TRW on
- underground bulletin boards. They also used their power skills to get
- telephone numbers or credit reports for celebrities, including Julia
- Roberts, John Gotti, Geraldo Rivera, Christina Applegate and Mad Magazine
- founder William Gaines.
-
- John Lee, 22, a co-defendant is now serving a one year sentence in a
- "shock incarceration" boot camp in Lewisburg, PA. Lee and Julio Fernandez,
- 18, were the only gang members who made money from the two years of
- break-ins.
-
- In addition to Lee and Fernandez, Paul Stira, 23, of Cambria Heights,
- Queens, and Elias Ladopoulos, 24, of Jamaica, Queens, are serving six-month
- sentences in federal prisons in Pennsylvania. Fernandez has been cooperating
- with authorities and is not expected to be jailed.
-
- -------------------------------------------------------------------------------
-
- Computer Caper Is Unpluged
- ~~~~~~~~~~~~~~~~~~~~~~~~~~ October 1, 1993
- by Tim Bryant (St. Louis Dispatch) (Page A1)
-
- Investigators said 18-year-old computer hacker Paul J. Gray of Creve Coeur,
- MO, was arrested on a state charge of tampering with computer data, a
- misdemeanor. The college freshman reportedly used his home computer to
- spy electronically on files of a federal appeals court and charge
- long-distance telephone calls to Mercantile Bank
-
- -------------------------------------------------------------------------------
-
- Teen Hacker Admits Having Illegal Credit Information June 17, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by James McClear (Detroit News) (Page B7)
-
- Ander Monson, 18, of Houghton, MI, whose electronic misadventures uploaded
- him into the high-tech world of computer fraud, pleaded guilty in Oakland
- County Probate Court to illegal possession of credit card information.
-
- -------------------------------------------------------------------------------
-
- In The Jungle Of MUD September 13, 1993
- ~~~~~~~~~~~~~~~~~~~~
- by Ellen Germain (Time) (Page 61)
-
- Virtual worlds you can hook into--and get hooked on--are the latest
- rage on the computer networks.
-
- [Ah, yes, Virtual Reality as perceived through the minds of the computer
- illiterate. But wait, it's electronic crack! Keep an eye out for your
- children!]
-
- -------------------------------------------------------------------------------
-
- NCIC Abuse - Is Legislation The Answer October, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Brian Miller
-
- Confidential information is being illegally released from the National
- Crime Information Center network. But abuse of the system is difficult
- to detect, and those caught are seldom punished.
-
- A former law enforcement officer tracked town his ex-girlfriend with
- information from an FBI-run law enforcement information system. Then
- he killed her.
-
- A terminal operator in Pennsylvania used the same system to conduct
- background searches for her drug dealing boyfriend to see if his customers
- were undercover agents.
-
- It is hard to trace abuse to a single user because many agencies don't
- require personal access codes which would keep track of who made specific
- inquiries on the system and when they occurred. The General Accounting
- Office polled all the states and found that 17 don't require a personal
- code to access the NCIC. Most of these had an identifier only for the
- terminal or agency accessing the system.
-
- And if someone is caught abusing the system, they are seldom charged with
- a crime. The GAO found that the most common penalty was a reprimand, with
- some suspensions and firings. Of the 56 cases of abuse found by the GAO,
- only seven people were prosecuted.
-
- The FBI cannot force the states to adopt certain security measures
- because compliance with the guidelines is voluntary. The reason for this is
- that the guts of the NCIC come from the states, and the FBI simply
- maintains the network.
-
- "The main thing that can be done today is to enforce the law, and create
- stronger penalties for abusing the system," said Marc Rotenbertg of
- Computer Professionals for Social Responsibility, an advocacy group
- based in Palo Alto, California.
-
- -------------------------------------------------------------------------------
-
- Live Wires September 6, 1993
- ~~~~~~~~~~
- by Barbara Kantrowitz et.al. (Time) (Page 63)
- &
- Technoid Circus
- ~~~~~~~~~~~~~~~
- by Rex Weiner (Spin) (Page 72) September, 1993
-
- [K-K00l cYbUR P|_|n|< aRt1Cl3zzzz
-
- Jump On The Cyber Bandwagon!
-
- More Journalists ride that old info highway straight to HELL!]
-
-
- ** BUT WAIT! A "Cyber" article we can all dig! **
-
- Speciale Cyber Settembre, 1993
- ~~~~~~~~~~~~~~
- di Sergio Stingo (King) (P. 131)
-
- Il cyberpunk: tutti ne parlano, ma pochi sanno cosa sia veramente. Libri
- elettronici? Scenari inquietanti del futuro prossimo venturo? Conferenze
- telematiche? Nuovi tipi di abbigliamento usa-e-getta? La piu' grande
- rivoluzione democratica dei nostri anni? Una rivoluzione strisciante e
- silenziosa? Ia nostro stingo, sempre curioso del <<nuovo>>, S'e' messo
- a girare l'italia per iundagare il fenomeno. E' stato come scoperchiare
- una pentola in ebollizione. Piu' incontrava <<cyber>> e piu' scopriva che
- c'era da scoprire. Dal teorico della <<brain machine>>, che sperimenta
- l'oggetto misterioso tra discoteche e universita', alla prima galleria
- dove sono esposte opere di hacker art. Dalle riviste-bandiera del cyber,
- come <<decoder>>, alle band che stanno inventando una nuova musica. Per non
- parlare del sesso, che grazie alla tecnologia cerca di ampliare la
- gamma delle sensazioni possibili. Insomma, il viaggio oltre i confini di
- questo mondo e' stato talmente ricco e avventuroso, che abbiamo dovuto
- suddividere il reportage in due puntate. In questo numero presentiamo
- la prima. E, come si dice tra cybernauti, buona navigazione.
-
- [I don't know what that says, but its in another language, so it has to
- be cooler than the American CyberCrap]
-
- -------------------------------------------------------------------------------
-
- Security Products Abound, But Is Toll Fraud Too Tough? August 30, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Dan O'Shea (Telephony) (Page 7)
-
- Telecommunications toll fraud is an increasingly popular crime that
- collectively costs its victims billions of dollars each year. Although
- carriers have responded with a wave of security products and services,
- the problem might be much bigger than was once thought.
-
- Some carriers claim that industry wide toll fraud losses amount to between
- $2 billion and $5 billion a year, but the true figure is closer to $8 billion,
- according to Bernie Milligan, president of CTF Specialists Inc.,
- a consulting group that studies toll fraud and markets security services to
- large corporate telecommunications users. [ed: remember HoHo Con? Yes...THAT
- Bernie]
-
- Toll fraud involving calls coming into AT&T's 800 network dropped 75% since
- the introduction of NetProtect, while Sprint estimates a 95% decrease from
- last year (since the introduction of their fraud detection service). Average
- losses across the industry have plummeted from $120,000 per incident to
- $45,000.
-
- Despite the offensive against telecom fraud, the problem persists and is
- becoming more frequent, and new technologies will only represent potential
- new adventures for hackers, CFT's Milligan said. Hacker activity is growing
- at an annual rate of 35%. Some 65% to 80% of toll fraud involves
- international calling, and fraud occurs on a much wider scale than just
- inbound 800 calls, Milligan said. So, while losses of this type of fraud
- drop, collective fraud losses are increasing by 25% each year. Customers
- are still liable financially in toll fraud cases, and the carriers continue
- to get paid.
-
- -------------------------------------------------------------------------------
-
- Misfit Millionaires December, 1993
- ~~~~~~~~~~~~~~~~~~~
- by Steve Fishman (Details) (Page 158)
-
- [Author profiles several of the early Microsoft programmers, namely
- Richard Brodie, Jabe Blumenthal, Kevin DeGraaf, Neil Konzen and Doug
- Klunder]
-
- -------------------------------------------------------------------------------
-
- Intercourse With Lisa Palac 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Melissa Plotsky (Axcess) (Page 62)
- &
- Turned On By Technology In The World Of Cybersex August 30, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Marco R. della Cava (USA Today) (Page 4D)
-
- [An interview and an overview dealing with online nastiness. Lisa Palac
- editor of Future Sex and producer of Cyborgasm talks about all kinds of
- stuff. As a regular peruser of Future Sex (for the articles of course)
- I can't help but wonder why we haven't seen HER naked yet. Email
- her at futursex@well.sf.ca.us and demand some gifs.]
-
- -------------------------------------------------------------------------------
-
- Don't Try This At Home
- ~~~~~~~~~~~~~~~~~~~~~~ August, 1993
- (Compute) (Page 62)
-
- Welcome to desktop forgery.
-
- Susan Morton, senior forensic document examiner with the US Postal Service
- in San Francisco, has seen gangs travelling the country packing computers,
- scanners, and laser printers. Arriving in town, their first move is to rob
- a mailbox to acquire some checks that were mailed to, say, a local utility
- company. They will copy the account and routing code off some citizen's
- check and decide what branch bank that person probably uses. Then they forge
- a large corporate or government check to that person, using information from
- other checks they found in the mail. Packing a forged ID, a gang member
- will then go to a branch across town where presumably nobody knows the
- citizen and deposit part of that forged check. The check may be for $5000,
- of which the forger takes $2000 as cash, smiles and leaves.
-
- One check forging gang was chased across Texas for about six months in the
- late 1980s, recalls Robert Ansley, corporate security manager for Dell
- Computer in Austin, Texas, then with the Austin police department. Armed
- with a stolen Macintosh and an ID maker stolen from a highway patrol
- substation, they passed more than $100,000 in bogus checks in Austin alone.
-
- Sources say other gangs have used laser printers to forge security ID
- badges to get into office buildings and steal the computers, nodding at the
- friendly security guard at the front desk while trudging out with their
- arms full.
-
- "We have been urging corporations to move forward with EDI (Electronic
- Data Interchange) for more and more of their business transactions and
- avoid paper, since it will become so vulnerable," says Donn Parker,
- computer crime expert with SRI International in Menlo Park, California.
-
- In 1991, the Secret Service busted 66 traditional counterfeiting operations,
- while seizing 52 office machines that had been used for counterfeiting
-
- -------------------------------------------------------------------------------
-
- Subduing Software Pirates October, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~
- by Suzanne Weisband and Seymour Goodman (Technology Review) (Page 30)
-
- [The software manufacturers claim they lose between 9 and 12 billion
- annually. Thank GOD for the SPA and the BSA. Like they are go to
- Singapore or Hong Kong with guns and get the REAL culprits. Noooo.
- Let's raid BBSes and businesses.
-
- Their people at COMDEX told me they really weren't interested in
- taking my money to help me combat Phrack Piracy. I think we all know
- where THEIR interests lie.]
-
- -------------------------------------------------------------------------------
-
- Mindvox: Urban Attitude Online November, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Charles Platt (Wired) (Page 56)
-
- [Another of those cute Mindvox RULES articles. "Fancher looked too neat,
- clean, and classy to be a hacker, but he enjoyed the cut-and-thrust of
- online jousting as much as anyone." But wait, there's a little
- name dropping too: Wil Wheaton, Kurt Larson, Billy Idol, THE LEGION OF DOOM!
-
- Don't get me wrong, I love Vox. And I really like the author of this story's
- last book "The Silicon Man," I just get kinda edgy about stuff in Wired.
-
- Favorite quote: "Unix is arcane," says Bruce, "and it's weird, and most
- users don't want to deal with it." I know I don't. Not.]
- -------------------------------------------------------------------------------
-
- Intel To Protect Chips October 22, 1993
- ~~~~~~~~~~~~~~~~~~~~~~
- (Newswire Sources)
-
- One of the nation's largest manufacturers of computer chips said Friday it
- will start to put serial numbers on its products in an effort to stem the
- rising tide of robberies. Intel Corp. said it was taking its actions
- after a flurry of armed takeover robberies at warehouses in California's
- Silicon Valley over the last six months.
-
- What the robbers are after is microprocessors -- the brains that power
- personal computers. Among their favorite targets has been Intel's 486
- microprocessor.
-
- Julius Finkelstein, head of Santa Clara's High Tech Crime Task Force,
- called chip robberies "the gang crime of the 1990s." "They are just
- as valuable as cocaine," he said. "But they are easier to get rid of
- and if you are caught the penalties aren't as severe."
-
- The gangs, Finkelstein said, are Asian, well organized and very
- knowledgable about computer components. They generally drive up to a
- warehouse door as if coming for a shipment, but once inside pull out
- their weapons and force the employees to the floor.
-
- Last month, a takeover robbery at the Wylie Laboratories Electronic
- Marketing Group in Santa Clara netted thieves an estimated $1 million in
- chips. Finkelstein said that robbery took only about 15 minutes.
-
- -------------------------------------------------------------------------------
-
- Chip Robberies Continue November 5, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~
- (Newswire Sources)
-
- Authorities said a gang of Vietnamese-speaking bandits staged a violent
- takeover robbery of a San Jose computer parts company Thursday, wounding
- one man and escaping with an undisclosed amount of electronic equipment.
-
- Lt. Rob Davis said the robbery began at 1:01 a.m. when as many as
- five gunmen forced their way into the Top Line Electronics Co., a
- computer board manufacturer. The bandits rounded up the employees and
- beat them in an attempt to find where the computer parts were stored.
-
- One employee was shot in the hip as he tried to escape. Davis said
- the man was treated at a local hospital and was listed in stable
- condition.
-
- -------------------------------------------------------------------------------
-
- Hacker Revelled In Spotlight, Court Told August 23, 1993
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- (The Age)
-
- A hacker who broke into a computer at NASA in the United States,
- and contemplated sending it a message not to launch a space shuttle, was
- delighted with the effect he was having, the County Court was told yesterday.
-
- The prosecutor, Mr Richard Maidment, said that in a three-way
- conversation between Nahshon Even-Chaim, David John Woodcock
- and another computer hacker, Woodcock discussed sending a message
- to a computer at NASA to stop the launch of a space shuttle, after
- Woodcock talked about the shuttle Challenger, which blew up several
- years before, and said "I have got to do something about NASA."
-
- Even-Chaim, 22, formerly of Narong Road, Caulfield, yesterday
- pleaded guilty to 15 charges relating to unauthorized obtaining,
- altering, inserting, and erasing of data stored in a computer, and
- the interfering and obstruction of the lawful use of a computer.
-
- Woodcock, 25, formerly of Ashleigh Avenue, Frankston, pleaded
- guilty to two counts of being knowingly concerned in the obtaining
- of unauthorized access by Even-Chaim to data stored in a computer.
-
- The court was told that a co-offender, Richard Martin Jones
- was earlier sentenced to six months jail, but was released on a $500,
- six-month good behavior bond.
-
- The court was told that Even-Chaim obtained free use of telephone
- lines for many hours to connect his home computer to other systems
- in the United States.
-
- Mr. Maidment said that Even-Chaim, Woodcock, and Jones, who
- collectively called themselves "The Realm", were arrested in April 1990
- by the Australia Federal Police after an investigation that began with
- information received from the United States Secret Service.
-
- -------------------------------------------------------------------------------
-
- The Last Hacker September 26, 1993
- ~~~~~~~~~~~~~~~
- by Jonathan Littman (LA Times)
-
- [This is the bet article I've seen yet about Kevin Poulsen. Please go
- find it and read it. It covers Poulsen from beginning to end. All the
- crazy stunts, the life on the run, the show down with the feds. Everything.
- Here is a small excerpt.]
-
- KIIS-Fm called it a "Win a Porsche by Friday": eight Porsches - about
- $400,000 worth of steel, leather and status - given away, one a week. You could
- hardly live or work in Los Angeles without being caught up in the frenzy. It
- seems that the gleaming, candy-red convertibles were plastered on nearly every
- billboard and bus in town. Listeners were glued to KIIS, hoping to make the
- 102nd call after Dees spun the third song in the magical series.
-
- Housewives, businessmen, students and contest freaks jammed the lines with
- their car phones and auto-dialers. They all had hopes, but one 24-year-old high
- school dropout had a plan. America's most wanted hacker and his associates
- sat by their computers and waited. On the morning of June 1, 1990 KIIS played
- 'Escapade,' 'Love Shack; and then, yes, "Kiss." "We blew out the phone lines,"
- every line was ringing says Karen Tobin, the stations promotional director. "We
- picked up the calls and counted."
-
- The hacker was counting too. At the precise moment Price's "Kiss" hit the air
- he seized control of the station's 25 phone liens, blocking out all calls but
- his own. Then the man, who identified himself as Michael B. Peters, calmly
- dialed the 102nd call and won a Porsche 944 S2.
-
- It was child's play. Especially for Kevin Lee Poulsen. Computer hacking had
- once seemed an innocent obsession to Poulsen, a native of Pasadena, but now it
- was his life, and it had taken him over the line. This October, Poulsen will
- face the first of two trials, one in San Jose and another in Los Angeles, that
- federal prosecutors say are critical to the government. Because of the
- seriousness of his alleged breaches of national security, they intend to use the
- case as an example to the hacker underground.
-
- As a teen-ager, Poulsen had burrowed deep into the giant switching networks
- of Pacific Bell, exploring and exploiting nearly every element of its powerful
- computers, from the common systems responsible for creating, changing and
- maintaining phone service to the shadow systems that guard the secrets of
- national security, according to accusations in a federal indictment. The U.S.
- attorney in San Jose says that Poulsen had wiretapped the intimate phone calls
- of a Hollywood starlet, allegedly conspired to steal classified military orders,
- and reportedly uncovered unpublished telephone numbers for the Soviet Consulate
- in San Francisco.
-
- -------------------------------------------------------------------------------
-
-