home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 50.8 KB | 1,281 lines |
- ==Phrack Magazine==
-
- Volume Six, Issue Forty-Seven, File 2 of 22
-
- *****************************************************************************
-
- Phrack Loopback
-
- -----------------------------------------------------------------------------
-
- G'Day,
-
- You dont know who i am, and i appreciated that but i hope your read my little
- note here and take it into consideration.
-
- Ive been into the Australian Hacking Scene (if there is such a thing :-)
- for only about 2years, but recenlty opened a h/p bbs here in Australia.
- What i am writing and asking is if it is possilbe to place kinda an add of
- some description in the next issue of phrack, something to the lines of:-
-
- H/P bbs recently opened in Australia - JeSteRs BBS +61-7-ASK-AROUND
-
- If your looking for some form of donation $$ just let me know, if your
- wondering is his guy a fed or something, mail DATA KING and speak to him, he
- was one of the bbs first users and as you know he has written in the Int
- Scene for the last too issues, but wont be in Issue #47 or i would have asked
- him to place the advertisment in this report.
-
- Regards, Jesta
-
- [Cool! Nice to see there's BBSs still popping up overseas. It would be
- nice if I had the number...hell, I'd even call... but oh well,
- I suppose I (and all the Phrack readers) will just have to "ASK-AROUND"]
-
- -----------------------------------------------------------------------------
-
- Hi Erikb,
-
- Last week you said you'd accept a bbs ad .. well here it is.
- If you'd publish it in phrack i'd be most grateful!
-
- A Gnu BBS!
- 1000's h/p Related texts
- Phrack, CoTNo, B0W, cDc, NiA, CuD, Risks,Sphear,SCAM!,NeuroCactus
- Conferences covering Unix/VMS/System Security/Phreaking
- And absolutely no mention of "The Information Super Highway" anywhere!
- +617-855-2923
-
- tnx,
- badbird
-
- [I said I'd print the ad...and now I have.]
-
- -----------------------------------------------------------------------------
-
- ATTN: ALL COMPUTER WHIZ KIDZ..... I DESPARATELY NEED YOUR HELP!!!
-
-
- Retired R.C.M.P officer formerly involved with priority levels of
- electronic surveillance has informed me that my residential telephone
- appears to have been compromised at a point other than inside or
- immediately outside my residence.
-
- After an intensive evaluation of the premises his conclusion was that
- remote manipulation of the telephone company switch where my circuit
- could be victim was the problem.
-
- The main focus of this exercise is to show how one can infiltrate a
- telephone company's network; remotely manipulate the company's switch;
- process long distance calling;make it appear that the calls originated
- from a particular site and then "fooling" the company's billing
- mechanisms to invoice that particular location.
-
- Is this physically possible? Bell Canada categorically denies this
- possibility. I need proof! How is it done?
- Please advise as soon as possible.
-
- I'd sincerely appreciate any help, advise and/or information anyone out
- there can offer in this particular situation.
-
- Please leave a way to get in touch! If you prefer to remain unknown,
- thanks a million, and rest assured that I WILL RESPECT and PROTECT you
- anonimity.
-
- Regards,
-
- John P. Marinelli jmarinel@freenet.niagara.com
-
- [My take on this is that with relative ease, someone could establish
- call forwarding on a line, make it active to some remote location, and
- call the original number numerous times, causing the owner of the
- hacked line to be billed for all the calls to the forwarded location.
-
- If anyone knows how to do this, STEP BY STEP on a DMS-100, please,
- contact Mr. Marinelli to help him out with his court case. I don't
- know a whole lot about NT equipment, so I don't know the
- specifics of how this may have happened, only the generalities.
-
- Wouldn't it be nice to have the Underground "HELP" someone out
- for a change?]
-
- -----------------------------------------------------------------------------
-
- y0, Black Flag here... heres the info you told me to mail you about the
- GRaP/H (Gainesville Regional Association of Phreakers and Hackers) meetingz
-
- Gainesville, FL
- 1st + 3rd Saturday of the month, 4pm - ???
- meet in The Loop on 13th Street
- Black Flag will be casually carrying a 2600
- look around, you'll see him.
-
- [Well, looks like the Florida Hackers have a new place to congregate.
- And so do the Florida FBI Field Offices. :) ]
-
- -----------------------------------------------------------------------------
-
- I was wondering where I could find any virus authoring tools for the PC,
- Unix, or VMS.
-
-
- [You can find Nowhere Man's Virus Creation ToolKit on BBSs around the
- globe. Have you looked??? I've never heard of UNIX or VMS virus tools.
- Do you know something I don't? Do you know how a virus works? ]
-
-
- -----------------------------------------------------------------------------
-
- Chris, found something you might like. Here's an ad from the latest
- PHOENIX SYSTEMS catalog:
-
- THE CALLER ID BLOCKER FIRST TIME AVAILABLE IN THE U.S.
-
- By April, 1995 all telephone companies must deliver callers name and
- telephone number to the caller ID system. The law prohibits any telephone
- company from offering customers an option to permanently disable their line
- from the ID system.
-
- This means that even if you have an unlisted number, everyone you call will
- now have your telephone number and name. Big brother is now one watching,
- now he has your name and number. No more anonymous calls to the IRS, city
- hall, real estate agents, car dealers, health department or anyone. Many
- business professionals use their home telephone to return calls. Do you
- want your patients and clients to have access to your home telephone number?
-
- We are proud to bring you the unique ANONYMOUS 100. It installs on any
- telephone in seconds and completely KILLS THE EFFECTS OF "CALLER ID"! Yes,
- you can have your privacy back. The ANONYMOUS 100 is FCC approved and
- carries a one year guarantee.
-
- #1276...............................................................$69.95
-
- Is it just me, or is this a load of bullshit? Didn't CA and TX both pass
- laws to make CLID illegal in those states? I know that before MA would
- allow it in the state, they told the telco that line blocking had to be
- offered free (and it is, on per/call and permanent basis). Did the feds
- pass this new law while I was sleeping, or is this company just playing on
- paranoia (not the first time) and trying to make a buck?
-
- Eric
-
- [Well Eric, it looks to me that this is a nifty little box that waits for
- voltage drop and immediately dials *67 before giving you a dialtone.
- Woo Woo! $69.95! It certainly is worth that to me to not have to dial
- 3 digits before I make a call. All that wear and tear ruins the
- fingers for typing. PFFFT....
-
- About Caller-ID, well, it's legal just about every place I know of.
- I'm sure there are a feel hold-outs, but offering per-line blocking for
- individuals worried about privacy satisfied most Public Utility
- Commissions. In fact, I think April 1 was the date that all Interconnects
- were supposed to be upgraded to support the transfer of CLID information
- over long distance calls. I don't think this has been turned on everywhere,
- but the software is supposed to be in place.
-
- *67. Don't dial from home without it.]
-
- -----------------------------------------------------------------------------
-
- This message serves a multifold purpose:
-
- (these response/comments are in referance to Phrack Issue 46 - Sept 20 1994)
-
- A)
-
- A question was brought up concerning a Moterola Flip Phone and the user
- inability to gain access to the programing documentation. I happen to
- own (legally) a Motorola Flip Phone that I will assume to be the same and
- I was not given the documentation either, though I have not tried asking
- for it. I will call Motorola and ask for *my* rightful copy and foreward
- my results (if I gain access) to phrack for proper distribution amoung
- appropriate channels. If I do not gain access, I would appriciate to
- hear from anyone who has (this should not be limited to simply the M.
- Flip Phone, I have interests in all areas).
-
- B)
-
- Later in that issue (Sept 20, 1994) a list of university and colege
- dialups were provided... I live in the 218/701 (right on the border) and
- have a collection of them for addition to the list if you (or anyone
- else) should so desire. I would post them now, but I have limited time
- and have to dig to find them. I also have some numbers that some readers
- may find of interest.
-
- C)
-
- My living in the 218/701 is the main reason for my writting. I used to
- live 612 and knew a lot of people in the area, but now I am stuck here in
- a little shit town (pop. 7000) where the cloest thing to a computer is
- made by John Deere. I need to find someone in the 218 or 701 to work
- with or meet... if you know anyone...??? The closest BBS is long
- distance and even then it's crap... I would like to start my own, but who
- the fuck would call? Who the fuck would I invite? My old H/P friends in
- 612 would, but I don't need the heat as they would all go through 950's
- or some other method... I think you understand.
-
- any help would be greatly appreciated By the way I could also use some
- 218/701 ANAC or CN/A... any help here?
-
- Aesop
-
- [In order:
-
- a) Good luck with Moto. You'll need it.
- b) Yes, I really still need your university dialups. Issue 48 will
- have a much more complete list (I hope!)
- c) If anyone knows any bbs'es in those area codes, please send
- them in so I can pass along the info.
-
- Other) For CNA information, just call your business office. They ALWAYS
- help. Especially if you mention that CNA didn't have a current
- record. :) ]
-
- -----------------------------------------------------------------------------
-
- To whom it may concern at phrack, I would like to subscribe to Phrack. I
- didn't use PGP because :-
-
- i. I never had any real need to
- ii. I came across the document below while dinking around with gopher. I
- would pretty much guess phrack knows about it already. If you do know about
- it, could you tell me another way to ensure my mail privacy?
-
- Thank you.
-
- Xombi.
-
- ---------------------BEGIN E-MAIL DOCUMENT---------------------
-
- This section is from the document '/email-lists/Funny'.
-
- A lot of people think that PGP encryption is unbreakable and that the
- NSA/FBI/CIA/MJ12 cannot read their mail. This is wrong, and it can be a
- deadly mistake. In Idaho, a left-wing activist by the name of Craig Steingold
- was arrested _one day_ before he and others wee to stage a protest at
- government buildings; the police had a copy of a message sent by Steingold
- to another activist, a message which had been encrypted with PGP and sent
- through E-mail.
-
- Since version 2.1, PGP ("Pretty Good Privacy") has been rigged to
- allow the NSA to easily break encoded messages. Early in 1992, the author,
- Paul Zimmerman, was arrested by Government agents. He was told that he
- would be set up for trafficking narcotics unless he complied. The Government
- agency's demands were simple: He was to put a virtually undetectable
- trapdoor, designed by the NSA, into all future releases of PGP, and to
- tell no-one.
-
- After reading this, you may think of using an earlier version of
- PGP. However, any version found on an FTP site or bulletin board has been
- doctored. Only use copies acquired before 1992, and do NOT use a recent
- compiler to compile them. Virtually ALL popular compilers have been
- modified to insert the trapdoor (consisting of a few trivial changes) into
- any version of PGP prior to 2.1. Members of the boards of Novell, Microsoft,
- Borland, AT&T and other companies were persuaded into giving the order for
- the modification (each ot these companies' boards contains at least one
- Trilateral Commission member or Bilderberg Committee attendant).
-
- It took the agency more to modify GNU C, but eventually they did it.
- The Free Software Foundation was threatened with "an IRS investigation",
- in other words, with being forced out of business, unless they complied. The
- result is that all versions of GCC on the FTP sites and all versions above
- 2.2.3, contain code to modify PGP and insert the trapdoor. Recompiling GCC
- with itself will not help; the code is inserted by the compiler into
- itself. Recompiling with another compiler may help, as long as the compiler
- is older than from 1992.
-
-
- [Well, uh, gee, I think the fact that this document came from
- /email-lists/Funny speaks for itself. I'm satisfied with PGP
- for security, but then again, I don't have a lot of information that
- I'm so petrified that I need to keep it encrypted, or that I send
- out in email that I don't care if anyone sees.
-
- To put aside some of your fears, I personally feel that PGP is ok.
- If the trilateral commission wants your info, they will beat it out
- of you with sticks, with the help of several multi-jurisdictional
- task-forces for Federal law enforcement, while you are under the influence
- of incredibly terrifying and long-lasting hallucinogenic drugs.
-
- Don't worry.]
-
-
- -----------------------------------------------------------------------------
-
- Here is a BBS Ad for your next issue:
-
- BBS Name: The King's Domain
- Sysop: Ex-Nihilo
- Speeds: 1200-14,400
- BBS Type: Remote Access 2.02+
- Phone #: 208-466-1679
-
- THe BBS has a good selction of "Hood" files... (hacking/phreaking/anarchy)
- journals such as cDc, Phrack, ATI and more... also a good selection of
- BBS files which include Doors and Utilities... primarily RA accessories,
- but not exclusively... supports rip graphics and is online 24 hrs a day
-
- [Yet another ad! Is this the rebirth of BBS-dom?]
-
- -----------------------------------------------------------------------------
-
- [Editor's Note: I got a letter asking me about how to credit card
- merchandise. I replied that I didn't agree with carding, and that
- if the reader really wanted something, he/she should get a job and buy it.
- This is the response I got.]
-
-
- What the fuck? All I wanted was a fucking decent reply. Get a job, huh?
- You know, I thought if you were to talk to one of these supposed
- "computer hackers" you could get some usefull information. Get a job, that
- rich coming from someone like you.
-
- When there's something you want...take it...without using your money.
-
- Maybe sometime I'll be able to takl to a hacker not some fucking
- hypocritical computer geek
-
-
- [Editor's Note: I replied to this letter by stating that carding had nothing
- to do with hacking, that it was out and out stealing, and although
- we had published articles about it in Phrack, I wasn't going to help anyone
- do it, and that he/she should try to contact the authors of various
- carding articles directly. This is the response that got.]
-
- Come on now "Chris", you can do better than that, can't you?
- Stealing? Who's the thief here, eh? See, when I wake up in the morning,
- I don't have to worry about secret service, police, or any sort
- of military shit being in my apartment. I don't get busted for doing stupid
- things like stealing phone calls off fucking 900 numbers. I think I
- know exactly why you don't card anything - because you're too fucking stupid
- or don't even have the balls to do it. Fuck, you'd expect someone like
- yourself to have different views about being a thief. Well, I guess it
- takes a certain kind of person to hack into shit like you, but why this
- person would start flame wars and otherwise just be a total fuckup, I don't
- know. Or, maybe it's just the singular person I'm talking too, yeah, that's
- probably i...there probably are other, BETTER, hackers who aren't as
- fucking arrogant as you.
-
- Well, have fun with your hands and PLAYGIRL's, you fucking little punk-ass
- faggot.
-
- And tell your mother that I won't let this affect our relationship.
-
- Punk
-
- aj276@freenet3.carleton.ca
-
- [This is the future of the computer underground??]
-
- -----------------------------------------------------------------------------
-
-
- BBS AD:
-
- System is called CyberSphincter (playing off of the current word trend of
- cyber). The number is 717-788-7435. The NUP is 0-DAY-WAR3Z!!!
- Modem speeds of 14.4 and lower, with no ANSI. Sysop is Ha Ha Ha.
-
- It's running renegade (we know it can be hacked and I've done it already),
- but we seem to believe in honor among thieves, so try to control yourself on
- that.
-
- -=strata=-
-
- [ANOTHER AD!]
-
- -----------------------------------------------------------------------------
-
- Hey Erik B...
-
- I'm the remote sysop at the Digital Fallou BBS in 516. Just recently,
- we've been getting a rash of ld callers. A day or two ago, a guy with
- the handle "Digi-Hacker" applied. His application looked good, execpt that
- he stated his alter handle was "Eric Bloodaxe" and that he was the editor
- of Phrack. Now, any lame ass could just "say" that, and we don't want any
- liars on board. :) So we decided to go right to you thru email. Did you
- apply? If so, cool. If this isn't you, that guy is gonna most assuredly
- be deleted..
-
- [Well, I hate to say it, but I don't have time to do much of anything
- anymore. I certainly don't call bbses with any regularity. I
- do have accounts on SECTEC and UPT, but that's it. I may call some
- in the future, but for the most part I don't have any time. If someone
- calls up a bulletin board and applies as "Erik Bloodaxe" it isn't me.
- (Anyone saying they are Eric Bloodaxe MOST CERTAINLY isn't me. :) )
-
- Anyone running BBSes may want to take note of this, so they don't get
- swindled into giving "elite" access to some pretender. You can
- always email phrack@well.com and ask me if I have applied to your
- bbs. ]
-
- -----------------------------------------------------------------------------
-
- Chris,
-
- I know you don't know me, but I figured you of all people could help me,
- and give me an answer quickly.
-
- I just got my phone bill, and on the last page is a page from some
- company calling themselves Long Distance Billing Co., Inc. It has
- one call "Billed on behalf of Northstar Communication" It is a call from
- somewhere in FL, for 13 minutes, costing 51.87. I called LD Inc, and they
- said the call was a collect call made from Northstar Comm, and that
- my only recourse was to write a letter to Northstar. Needless to say, I
- did not accept the collect call, I don't know anyone in 813. I called
- NYNEX, and they said I should write to Northstar and LD INC, but didn't
- seem to know anything about either company. They guy I talked to said it
- was real strange that LD INC didn't give me a number to call at
- Northstar, since most of this type of thing is handled by phone. I'm
- beginning to wonder exactly how relieable this LD INC company is, who
- Northstar is, and most of all who called and how the hell the call was
- supposedly accepted by my phone. This is all the info I know:
-
- BILLED ON BEHALF OF NORTHSTAR COMMUNICATION
-
- 1. SEP 18 923PM COL CLEARWATER FL 813-524-5111 NC 13:00 51.87
-
- --From my phone bill
-
- Northstar Communication
- 3665 East Bay Drive
- Suite 204-192
- Largo, FL 34641
-
- --From LD INC
-
- Long Distance Billing Co., Inc.
-
- 1-800-748-4309
-
- --From NYNE phone bill.
-
- If you can think of anything I can do, I;d be really greatful. I don't
- have $50 to throw away on a call I never got, and I don't have the
- resources you do to try and figure out who the hell these people are.
-
- [It looks to me like you got fucked by someone in Florida using a COCOT
- payphone. It's kind of odd that NYNEX couldn't help you more...but anyway,
- I wouldn't pay it.
-
- What I suspect happened was that somsone used one of those handy COCOT
- services where the operators are incredibly stupid and allow calls
- to be accepted when the "calling party" says "YES" to allow a 3rd party or
- collect call, rather than the party being called. This happened to me at
- my previous work extension by New Yorkers using the ENCORE service (even
- though all our lines were listed to refuse 3rd party and collect calls.)]
-
- -----------------------------------------------------------------------------
-
- I've been having some trouble with the law, so all my notes are stashed at
- a friend's casa at the moment. Can you recommend a good lawyer to defend me
- for allegedly hacking some government computers? I've got a good crim def
- guy working with me right now assisting me guring questioning from Special
- Agents, but I will need someone that has experience if I get indicted.
-
- [If you are facing computer crime charges, you are definately in
- a world of hurt. There are very few computer crime-savvy lawyers
- practicing in the World. The only thing I can suggest is that
- you call EFF, CPSR or EPIC and ask them if they know of any
- lawyers in your area that they can refer you to. None of these
- groups will help you directly, except under EXTREME circumstances, and
- only if you have been falsely accused, or have had rights violated.
- If you are guilty, and the cops have any evidence, you are going to be
- convicted.
-
- Remember Baretta? "If you can't do the time, then don't do the crime."]
-
-
- -----------------------------------------------------------------------------
-
- Dear Chris,
-
- You probably don't remember me, but we corresponded about 3 years
- ago as part of my PhD research. I was at Edinburgh University
- at the time and am not at UMIST in Manchester (British equivalent of MIT).
-
- The reson I'm writing is that I was awarded my PhD last March, and for one
- reason and another I've been sidetracked into a completely different field
- of research - the British National Health Service and the various ways
- computers are being used in it.
-
- I tried getting a publisher interested in the thesis, but with little luck.
- I also sent it to Jim and Gordon at CuD on disk for them to stick it on
- archive, but they had problems with the formatting of it and don't seem to
- have got round to archiving i.
-
- If you're interested I'd be quite happy to send a couple of disks to you
- and you can spread it around as you want. It just seems a shame for the people
- on the net not to get a look at it. It's dressed up in airy-fairy sociological
- language - but there's still lots in it that I think would be of interest to
- people on the net. I saw your interview in CuD, and I agree with you about
- most of the books written on the CU. Mine has its faults but it's got less
- biographical data and more issue-oriented stuff.
-
- Anyway, get in touch and let me know if I can find a good home for my magnum
- opus.
-
- Take care and a belated thanks for all the time you spent in helping me with
- the PhD.
-
- Best Wishes,
-
- Paul Taylor
- School of Management
- UMIST
-
- [Paul:
-
- Congrats on your PHD, and continued success at UMIST!
- I'm putting your thesis up on the Phrack WWW page so that more
- people can get a look at it!
-
- Thanks for sending it!]
-
- -----------------------------------------------------------------------------
-
- I read your article on hacking the French among other foreign governments.
- Sounds pretty fun, just for kicks the other night I did a search of all the
- computers I could get at in China. One of them was a national power grid
- computer. Sounds like it could be fun to play with huh? The "They Might Kill
- Us" part will tend to turn some people off, but not me.
-
- [WOW! A National Power Grid Computer! In China! Gee. How many times
- have you seen Sneakers? Take the tape out of your VCR, slowly run
- a rare-earth magnet over it and set it on fire.
-
- On the other hand, if you were at least partally serious about the
- hacking for America, keep your eyes open.]
-
-
- -----------------------------------------------------------------------------
-
- Erikb,
-
- Regarding your article in Phrack 46, we here in Columbus would
- just like to say that everything except for the Krack Baby's phone number,
- which long since went down, and the Free Net template, is total and utter
- bullshit. The Columbus 2600 meetings were NOT started by Fungal Mutoid, he
- is just responsible for a much larger turnout since about September (94), and
- whoever wrote that has obviously not been to a Columbus meeting recently.
- The Columbus 2600's have been here for quite a while, but bacause the H/P
- scene consists of 15 people AT THE MOST, many of which haven't the time to
- attend, the turnout is almost always low. I believe the most that have ever
- shown up to a meeting is 10, which dwindled to 8 or so before the
- meeting was officially half-over. Nobody knows who wrote the article which
- you printed, although no one has been able to contact Fungal Mutoid to ask him.
- Just thought we'd clear a few things up, and to those that don't give two
- flying shits, we're sorry to have to bring this into a E-mag as great as
- this.
-
- Sincerely,
-
- H.P. Hovercraft and
- the Columbus H/P Gang
-
- [Thanks for the letter. Like I always say, I can only report and print what
- I'm told or what is sent to me. I don't live anywhere but Austin, TX, so
- I don't know the intimacies of other areas. Thanks for sending in your
- comments though!]
-
- -----------------------------------------------------------------------------
-
- Haiku
-
- Operator hi
- who is it that sets my phone
- on redial and tone
-
- gives me rest in times
- great stress lays its head on my
- leads me into joy
-
- cosmos and mizar
- give evidence and homage
- to your greatness, why
-
- logon/password
- on your very first try shall
- succeed, as always
-
- oh, A T and T
- while great, holds non to the great
- power that NYNEX
-
- gives access to in
- glee, awaitnig, cautiously,
- for signs of entry
-
- illicitly thus
- strives to maintain control of
- the ESS switch,
-
- not comprehending
- that control is simply gained
- by a single call
-
- to some stupid yet
- revered operator who
- believes you in charge
-
- gives out system pass
- with some small feat of trick'ry
- PAD to PAD, too, works
-
- sounding of the baud
- with modem and coupler
- connection is made
-
- who is to question
- the incidence of this fault
- or acknowledge it
-
- security's words
- false threats followed by arrest
- on illegal grounds
-
- hackers, phreakers grieve
- free the unjustly accused
- give them freedom to
-
- ROAM with cellular
- phones place to place with no charge
- test the system's worth
-
- find holes, detect bugs
- run systems by remote, yea,
- to explore, to seek,
-
- to find a network
- of free bits and bytes unharmed--
- innocently seen.
-
- who doesn't know that
- Bell or Sprint or MCI
- would never approve--
-
- believe in 'puter crime,
- toll fraud, "access devices,"
- free calls to Denmark
-
- Information is
- power is imperative
- proprietary
-
- please, spare me the grief
- accusations being thrown
- of phone co. crashes
-
- are fiction unleashed
- to the ignorant public
- eye to make blame, fear
-
- all phr/ackers, but all
- have had their days and faded
- into the past, why
-
- must ignorant block
- the free flow of knowledge found
- angry sysops abound
-
- secret service rais
- hoisting games, computers, phones
- never to be re-
-
- turned hackers, phreakers
- working for government, spies,
- lies, deception, all
-
- to walk free while friends
- spend years in jail for simply
- battling for some change
-
- knowledge is NOT free
- equipment costing milliions,
- simply cannot pay
-
- the cost for systems
- of signal switching; no on e
- wants to harm, just try
-
- to use our knowledge
- in a constructive way and
- look around for things
-
- which further know-how
- of packet switching, ANI,
- proctor tests and tones
-
- which make little sense
- and why is it there, what are
- all the test lines for?
-
- central office trash
- provides some clues, while phone calls
- get angry response
-
- to inquiries re:
- loops and lack of barriers,
- COCOT carriers
-
- who overcharge cause
- frustraton, must be helped
- end overbilling
-
- unfairness is only
- people not understanding
- nor comprehending
-
- that what we do is
- NOT always fraud, vengeance or
- deceitful reasons
-
- bu for love of the
- systems, curiosity's
- overwhealming need
-
- to be met and to
- feel accomplished, proud, to
- do and know something
-
- WELL crackers abound
- pirates do multiply, spread
- wavez of warez cross coasts
-
- and foreign countries
- virus creators seeking
- escape, growth, freedom
-
- not for destruction
- but for change, to press limits
- to find that which makes
-
- us whole, complete, and
- accomplished at crossing
- the barriers that
-
- bound conventional
- people in dead-end jobs with
- little self-esteem.
-
- hacking, phreaking, it
- is an art form, and a quest
- for endless reaches
-
- to seek, to explore, to
- realize and accomplish, to
- take chances and live
-
- not for rules and laws
- but for what things should be but
- will not come to pass.
-
-
- --kyra
-
- [Uh oh, we're getting pretty literary here. I can see it now:
-
- Phrack Magazine. For the Sensitive Hack/Phreak.
-
- Interesing poem tho...]
-
-
- -----------------------------------------------------------------------------
-
- Dear Editor of Phrack Magazine;
- Ok Erik (mr. editor), there is also a poem that I have written for Wei.
-
- "Thinking of Ding Wei"
- (C) 1994, 1995 Oliver Richman.
-
- Come here, let me tell you something,
- How I hide my love for Wei Ding:
- By forgetting all my thinking!
-
- When in my mind Wei's heart I see..
- I want to tell her "wo ai ni",
- So her and I will always be.
-
- Her mind is pure, like pretty Jade..
- She makes me want to give her aid.
- I know that her love will not fade.
-
- My patience tries to move the sea.
- But can I deny you and me?
- I want our hearts to set us free.
-
- I really love you, dear Ding Wei,
- I think about you every day.
- Tell me, what more can I say?
-
- [What's this? Another Poem? A tribute of Love for some chick named Wei?
- Holy Lord. We need to get some codes or credit cards or something in here
- to offset this burst of "Heartfelt Emotive Print." ]
-
- -----------------------------------------------------------------------------
-
- the other day upon the stair
- i met a man who wasn't there
- he wasn't there again today
- i think he's from the CIA
-
-
- [NOW THIS IS MY KIND OF POETRY! SHORT, SIMPLE, AND FUNNY.
- WHATEVER HAPPENED TO BENNETT CERF???]
-
- -----------------------------------------------------------------------------
-
- As a former AOLite and definite wannabe, and having d/l the log of
- the Rushkoff/Sirius hypechat, I could tell from the beginning that it
- would be just as you reviewed _Cyberia_ as being. Every other word
- Rushkoff used was Cyberia or Cyberians. As lueless and vulnerable to hype
- as I was, I couldn't help but stand back and listen to all the shit with a
- grin. In the same not, I ran into David Brin on AOL as well, and managed
- to get a correspondence goig with him. He was on discussing all the
- research he did on the "Net" and about the papers he was delivering, and,
- most importantly (of course), his upcoming BOOK about the Internet and
- privacy. At the time, still under the glossy spell of Wired (which I still
- find interesting) and the hype, I was eager to offer him an interview
- proposal, which I would have published in Wired if at all possible.
-
- Dr. Brin knew less than *I* did about the Internet. I can sum up most of
- these people's vocabularies in one word: "BLAH." They may as well
- reiterate that syllable ad infinitum--it amounts to the same thing.
-
- [WOW!
-
- Hey Cyber-guy, thanks for the super-cyber email. As we cruise along this
- InfoBanh, exiting in Cyberia, it takes a diligent cyberian like you
- to keep things in check!
-
- Sorry bout that. I was overcome with a minor brain malfunction that
- reduced my IQ to that of Douglas Rushkoff. Doesn't it all make you want
- to puke?
-
- I heard that yesterday on the soap opera "Loving" some character was hacking
- into food companies to steal recipes. A month or so back, on "All My
- Children" (The only soap I watch...but I'm embarrassed to say I watch it
- religiously), Charlie & Cecily were dorking around on the Internet, and
- sent each other email after reading notes they each left on alt.personals.
-
- The world is coming to an end.]
-
- -----------------------------------------------------------------------------
-
- Yo erikb:
-
- yo dewd. eye am so paranoid, my t33th are rattling.
- what dewd eye dew?
- yew are the god of the internet.
- how dew eye stop the paranoia?
- please print answer in next phrack.
- thanx.
- m0fo
-
- [Your Acid will wear off in a few hours. Don't worry. Enjoy it.
- The CIA does.
-
- If it doesn't go away in a few days, there are some nice men in
- white lab coats who will be glad to help you out.
-
- How do you stop the paranoia? Your answer: Thorazine!]
-
- -----------------------------------------------------------------------------
-
- This is Nemo Kowalski speaking (aka Paolo Bevilacqua).
- I just discovered Phrack at the young age of 31. ;-)
- Well, I like it a lot, at least like I enjoyed doing real
- things here in Europe, alone and with DTE222, years ago.
- I'm going to write something about the first anti-hacker operation
- in Italy, "Hacker Hunter," in which, incidentally, I got busted.
- Do you think your some of the old stories from altger and Itapac
- can be of interest to your readers?
-
- To Robert Clark:
-
- I read "My Bust" and I liked it. I'm not a native english speaker,
- but I think it was well-written, plus principally, I felt a pleasant
- "reader sharing writer's experiences" sensation that can separate a good
- reading from pure BS. This is expecially true since I've been busted here
- in Italy, and I've learned that things are more similar around the
- western world than I would have thought.
-
- The only thing I can't share is your Seattle experience. Maybe the dichotomy
- good druge/bad drugs has a different meaning for you?
-
- Respect,
-
- Nemo
-
- [Nemo:
-
- Please write as much or as little as you like about the busts in
- Italy! We have an article this issue about Italy, but any further
- insights into your experiences, esspecially regarding how busts
- are carried out in other countries would be greatly appreciated by
- our readers!
-
- I look forward to reading whatever you can put together!]
-
- -----------------------------------------------------------------------------
-
- Chris,
-
- As a relative neophyte to hacking, one of the problems I come up with a
- lot is identifying systems I locate scanning. So, I was wondering if Phrack,
- or any other zine, had ever published a concise guide to clues to
- help identify unknown systems. If so, could you please let me know what
- mag, and what issue.
-
- One last thing, are there any internet sites with info of interest to hackers?
- I know about eff.org and freeside.com and a few others, but nothing really
- intriguing...any suggestions?
-
- [You will find a good start to identifying strange systems, and in
- locating sites of interest to hackers in the #Hack FAQ we've printed
- in this issue. ]
-
- -----------------------------------------------------------------------------
-
- For Phrack news, Darkman was busted in Winnipeg City, Canada, for various
- reasons, but since I knew him personally I wanted to add my two cents.
- For the record, he was busted for warez and porn as well as hacking into the
- UoManitoba, and I heard his wife left him because he spent too much time
- pirating on IRC. He was about 38. He could read fluently in Russign, and
- I remember one night we discovered some secret KGB documents from the 50's,
- real science fiction thriller stuff, and he read it to me.
-
- Akalabeth
-
- [It's a drag that your friend was busted, and knowing the Canadian
- government, the porn part was probably pretty minor shit in a worldly
- sense.
-
- I'm kinda intrugued by the "KGB Documents" you found. Uh, were these on
- the net? Did you have a cyrillic character set loaded? How did you
- read these documents? Were they on paper?
-
- SEND THEM TO PHRACK! :) ]
-
- -----------------------------------------------------------------------------
-
- Top 10 Reasons Why I Should Get My Subscription FREE:
-
- (1) I'm a programmer/Analyst for an electric utility company in Texas
- (ahh, come on - I'm a fellow Texan!)
-
- (2) I've read Phrack for years (loyalty scores points - right?)
-
- (3) I've been involved with compuers since GOD created the PC
- (I began in late 70's-early 80's).
-
- (4) I'm *not* a narc (shh, don't tell anybody.)
-
- (5) I *may* have a record (but if I do, it's for minor kind of stuff -
- I'm basically a nice guy).
-
- (6) I don't like the telephone company (you have to admit they're amusing
- though.)
-
- (7) I know how to get around on the 'net (can't you tell - I have an AOL
- account <g>.)
-
- (8) I'm a good source of info regarding all types of mainframe and PC
- programming.
-
- (9) PLEASE....
-
- (10) I'll quit writing dumb letters and trying to be funny.
-
- [David Letterman is in the background throwing up as I'm typing
-
- Don't quit your day job...but I'll send you Phrack anyway. :) ]
-
- -----------------------------------------------------------------------------
-
- Hey Chris,
-
- I just read your thing in Phrack abou the US being attacked by our so
- called "allies" and I agree with you 110%! I do believe that we should start
- some sort of CyberArmy to fight back. I don't think that our government
- would mind, unless we crashed an economy that they were involved with or
- something, but hell, they fuck with us, let's fuck with them. And you were
- saying about phone costs, isn't it possible to just telnet or something over
- there? And why stop at fighting back against our information agressors, why
- not fight back against other countries that our government is too chickenshit
- to fight against? Cuba comes to mind. Well, I hope you reply or something, I
- really like Phrack, I try to get it whenever I can manage, but I don't
- have an internet address where I can get files. Keep up the good work.
-
- [Yet another volunteer for the US Cyber Corp! By God, I'll have
- an army yet. :) ]
-
- -----------------------------------------------------------------------------
-
-
- ==Phrack Magazine==
-
- Volume Six, Issue Forty-Seven, File 2a of 23
-
- *****************************************************************************
-
- Phrack Editorial
-
- What you are about to read is pure speculation on my part. Do not take
- this to be 100% fact, since most of it is hypothesis. But it sure will
- make you think twice. "Ever get the feeling you're being cheated?"
-
- -----------------------------------------------------------------------------
-
- So...Mitnick was busted.
-
- There certainly are some really odd things regarding the whole mess,
- especially with regards to the "investigating" being done by
- a certain heretofore unheralded "security" professional and
- a certain reporter.
-
- One of the first oddities was the way the Mitnick saga suddenly
- reappeared in the popular media. In February, and seemingly out of
- nowhere, the ever diligent John Markoff entered the scene with the
- a groundbreaking story. (Of course this is meant to be sarcastic as
- hell.) Markoff's story dealt with a near miss by federal authorities
- trying to apprehend Mr. Mitnick in Seattle about 5 months prior.
-
- Now, if nothing else happened in the whole Mitnick saga, I never would
- have given this a second thought, but in light of what followed,
- it really does seem odd. Why would someone write about a subject that
- is extremely dated of no current newsworthiness? "Our top story tonight:
- Generalissimo Francisco Franco is still dead."
-
- To be fair, I guess Markoff has had a hard on for Mitnick for ages.
- Word always was that Mitnick didn't really like the treatment he got
- in Markoff's book "Cyberpunk" and had been kinda screwing with him for
- several years. (Gee, self-proclaimed techie-journalist writes something
- untrue about computer hackers and gets harassed...who would have thought.)
- So it really isn't that odd that Markoff would be trying to stay abreast
- of Mitnick-related info, but it certainly is odd that he would wait
- months and months after the fact to write something up.
-
- But wait, a scant month and a half later, Mitnick gets busted! Not
- just busted, but tracked down and caught through the efforts of a
- computer security dude who had been hacked by Mitnick. Breaking the
- story was none other than our faithful cyber-newshawk, John Markoff.
-
- "Tsutomo Shimomura, born to an American mother and a Japanese father,
- thus becan life as he was destined to live it...going in several
- directions at once. A brilliant neurosurgeon, this restless young man
- grew quickly dissatisfied with a life devoted solely to medicine.
- He roamed the planet studying martial arts and particle physics,
- colelcting around him a most eccentric group of friends, those
- hard-rocking scientists The Hong Kong Cavaliers.
-
- "And now, with his astounding jet car ready for a bold assault on the
- dimension barrier, Tsutomo faces the greatest challenge of his turbulent
- life...
-
- "...while high above Earth, an alien spacecraft keeps a nervous watch on
- Team Shimomura's every move..."
-
- Wait a minute...that's Buckaroo Banzai. But the similarities are almost
- eerie. Security dude by day, hacker tracker by night, ski patrol
- rescue guy, links to the NSA! WOWOW! What an incredible guy! What an
- amazing story!
-
- But wait! Let's take a closer look at all of this bullshit, before it
- becomes so thick all we can see is tinted brown.
-
- Shimomura was supposedly hacked on Christmas Eve by Kevin Mitnick, which
- set him off on a tirade to track down the guy who hacked his system.
- Supposedly numerous IP tools were taken as well as "millions of dollars
- worth of cellular source code."
-
- First off, Shimomura's TAP is available via ftp. Modified versions of this
- have been floating around for a while. I suppose it's safe to assume that
- perhaps Tsutomo had modified it himself with further modifications (perhaps
- even some of the IP/localhost spoofs that the X-consortium guys were
- playing with, or maybe other tricks like denial of service and source-routing
- tricks...I don't really know, I don't have any such thing authored by
- Shimomura.)
-
- Secondly, what is all this cellular source code? And why did Shimomura have
- it? Could it be that this is really just some kind of smokescreen to make
- it seem like Mitnick did something bad? For those of you who don't know,
- Tsutomo is friends with Mark Lottor (yes, the OKI experimenter, and CTEK
- manufacturer.). They have been friends for some time, but I don't know
- how long. Lottor used to be roommates with, lo and behold, Kevin Poulsen!
- Yes, that Kevin Poulsen...the guy who before Mitnick was the "computer
- criminal de jour." Poulsen and Mitnick were no strangers.
-
- It wouldn't be too much of a stretch of the imagination to think that
- those files were really ROM dumps from phones that Lottor had given
- Shimomura. It also wouldn't be too much of a stretch to imagine that
- Mitnick knew Tsutomo, and decided to go poke around, pissing off
- Tsutomo who knew that he'd been violated by SOMEONE HE ACTUALLY KNEW!
- (It sure does piss me off much more to get fucked over by someone I know
- rather than a complete stranger.)
-
- Woah. If any of that is true, what strange bedfellows we have. But wait,
- it gets better...
-
- Enter John Markoff. Markoff and Tsutomo have obviously known each other for
- a while. I don't know where they met...but I know they were together
- at Defcon, maybe at Hope, and probably at the Tahoe Hacker's conference
- a few years back. (I'd have to go back and look over the group
- photos to be certain.)
-
- Markoff already has a stake in the Mitnick story, since it was his book,
- "Cyberpunk" that really gave ol' Kevin some coverage. Now, if Markoff knew
- that Mitnick had hacked Tsutomo (from Tsutomo's own mouth), then certainly
- any journalist worth his salt would see possibilities. Gee, what a great
- concept! A colorful computer security guy tracks down one of the world's
- most wanted hackers! What a great story! Remember that Stoll Guy?
-
- But in order to get the book publishers really hot, it would take some more
- press to rejuvinate interest in the Mitnick story. So the first story,
- months after the fact, is printed.
-
- Meanwhile, Tsutomo is supposedly tracking down Mitnick.
-
- How does one track down a hacker? The legal (and really annoyingly hard way)
- is to work with other system administrators and establish a trail via
- tcp connects and eventually back to a dialup, then work with phone companies
- to establish a trap and trace (which usually takes two or three calls) and
- then working with local police to get a warrant. Somehow Tsutomo seemingly
- managed to avoid all this hassle and get a lot done by himself. How?
- Well, the Air Force OSI managed to track down the British Datastream Cowboy
- by hacking into the systems he was hacking into the Air Force from. This is
- the easy way. Hmmm.
-
- I know with a good degree of certainty that Markoff's and Tsutomo's little
- escapades pissed off a great many people within law enforcement, but I don't
- know exactly why. If they WERE bumbling around stepping on FBI toes
- during the course of their litle hunt, certainly the FBI would have
- threatened them with some kind of obstruction of justice sentence if they
- didn't stop. Did they?
-
- Well before any of this had begun, Mitnick had been hacking other places
- too. Guess what? He happened to hack CSCNS, where a certain ex-hacker, Scott
- Chasin, runs the security side of things. I remember well over a year ago
- talking to Chasin about a hacker who had breeched CNS. Discussing his
- methods, we thought it must be Grok, back from the netherworld, since he
- was so skilled. The hacker also made claims of being wireless to avoid
- being traced. (This also fit into the Grok modus operandi...so we just
- assumed it was indeed Grok and left it at that.) Chasin told the hacker
- to get off of CNS, and that he could have an account on crimelab.com, if
- he would only use it for mail/irc/whatever, but with no hacking, and on
- the agreement that he would leave CSCNS alone.
-
- The agreement was made, but went sour after only a few weeks when the mystery
- hacker began going after CSCNS again. The Colorado Springs FBI was called
- in to open an investigation. This was ages ago, but of course, field agencies
- rarely talk.
-
- Back in the present, Tsutomo goes to help out at the Well, where
- a certain admin (pei) was having problems with intruders. This is the
- same pei who a few months earlier told Winn Schwartau "The Well has no
- security!" Which Winn reported in his newsletter. (This of course came after
- Winn's account on the Well was reactvated by an anonymous person who
- posted several messages about Markoff and signed them "km." DUH!)
-
- So somehow, Tsutomo gets trace information leading back to a cell site in
- North Carolina. How does a private citizen get this kind of information?
- Don't ask me! My guess is that the feds said, give us what you know,
- help us out a bit and don't get in our way. In return, one can surmise
- that Tsutomo (and Markoff) got to glean more info about the investigation
- by talking with the feds.
-
- So, Mitnick gets busted, and Tsutomo got to ride around in a car with
- a Signal Strength Meter and help triangulate Mitnick's cellular activity
- to his apartment. Woo woo!
-
- After all is said and done, Tsutomo has single handedly captured Mitnick,
- John Markoff breaks the story on the FRONT PAGE of the New York Times, and
- every other computer reporter in America continually quotes and
- paraphrases Markoff's story and research as "God's Own Truth."
-
- Mitnick, on the other hand, gets blamed for:
-
- 1) hacking Tsutomo
- 2) hacking the Well
- 3) hacking Netcom to get credit cards
- 4) hacking CSCNS
- 5) hacking Janet Reno's Cell Phone
- 6) hacking motorola
- 7) conversing with foreign nationals
- etc..
-
- Let's look at some these charges:
-
- 1) Mitnick was not the first (or only) to hack Tsutomo. The San Deigo
- Supercomputer Center is a target for a lot of people. It's a major
- Internet center, and there are all kinds of goodies there, and the
- people who work there are smart guys with nice toys. Sorry, but
- Mitnick is the scapegoat here.
-
- 2) Mitnick was not the first, last, or most recent to hack The Well.
- Like Pei said, "The Well Has No Security." I know this first hand,
- since I have an account there. I don't raise a stink about it,
- because I pay by check, and my email is boring.
-
- 3) Mitnick was not the person who got the Netcom credit card file.
- That file floated around for quite some time. He might have had
- a copy of it, but so do countless others. Sorry. Wrong again.
-
- 4) Mitnick was in CNS. He was not the only one. Thanks for playing.
-
- 5) The thought that Mitnick could reprogram a MTSO to reboot upon
- recognizing a ESN/MIN pair belonging to one specific individual
- would require that he had hacked the manufacturer of the MTSO, and
- gotten source code, then hacked the cellular carrier and gotten
- a full database of ESN/MIN information. Both of these things have
- been done by others, and Mitnick certainly could have done them too,
- but I doubt he would have gone to that much trouble to call attention
- to his actions.
-
- 6) Motorola, like EVERY other big-time computer industry giant has been
- hacked by countless people.
-
- 7) Mitnick reportedly had dealings with foreign nationals, especially
- one "Israeli" that set the CIA up in arms. Well, sure, if you get on
- IRC and hang out, you are probably going to talk to people from other
- countries. If you hang out on #hack and know your stuff, you will probably
- end up trading info with someone. But, playing devil's advocate,
- perhaps the person you might be talking to really isn't a 22 year old
- Israeli student. Maybe he really is a 40 year old Mossad Katsa working
- in their computer center. Was Mitnick Jewish? Would he do "whatever
- it takes to help the plight of Jews worldwide?" Could he have been
- approached to become one of the scores of sayanim worldwide? Sure.
- But probably not. He'd be too hard to call on for the favors when they
- would be needed by Mossad agents. So, I have some doubts about this.
-
- Less than a month after the whole bust went down, Markoff and Tsutomo
- signed with Miramax Films to produce a film and multimedia project
- based on their hunt for Mitnick. The deal reportedly went for
- $750,000. That is a fuckload of money. Markoff also gets to do a book,
- which in turn will become the screenplay for the movie. (Tsutomo
- commented that he went with Miramax "based on their track record."
- Whatever the fuck that means.)
-
- Less than a month and they are signed.
-
- Looks to me like our duo planned for all this.
-
- "Hey Tsutomo, you know, if you went after this joker, I could write a book
- about your exploits! We stand to make a pretty penny. It would be
- bigger than the Cuckoo's egg!"
-
- "You know John, that's a damn good idea. Let me see what I can find.
- Call your agent now, and let's get the ball rolling."
-
- "I'll call him right now, but first let me write this little story to
- recapture the interest of the public in the whole Mitnick saga. Once that
- runs, they publishers are sure to bite."
-
- Meanwhile Mitnick becomes the fall guy for the world's ills, and
- two guys methodically formulate a plot to get rich. It worked!
-
- Way to go, guys.
-
-
-
-