home *** CD-ROM | disk | FTP | other *** search
-
-
- ==Phrack Inc.==
-
- Volume Three, Issue 27, File 11 of 12
-
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
- PWN PWN
- PWN P h r a c k W o r l d N e w s PWN
- PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN
- PWN Issue XXVII/Part 2 PWN
- PWN PWN
- PWN June 20, 1989 PWN
- PWN PWN
- PWN Created, Written, and Edited PWN
- PWN by Knight Lightning PWN
- PWN PWN
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
-
-
- Robert T. Morris Suspended From Cornell May 25, 1989
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Taken from the New York Times
-
- Cornell University has suspended the graduate student identified by school
- officials as the author of "the Internet worm."
-
- In a May 16th letter to Robert Tappan Moris, age 23, the dean of the Cornell
- University Graduate School said a university panel had found him guilty of
- violating the school's Code of Academic Integrity.
-
- He will be suspended until the beginning of the fall semester of 1990, and then
- could reapply.
-
- No criminal charges have been filed against Morris. A federal grand jury this
- year forwarded its recommendations to the Justice Department, which has not
- taken any action.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Justice Department Wary in Computer Case May 28, 1989
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- by Matthew Spina (Syracuse Herald-American)
-
- "Is Washington Fearful Of Losing A Landmark Trial?"
-
- Some computer experts theorize that the Justice Department, afraid of bungling
- what could become a landmark computer case, still doesn't know how to treat the
- Cornell student whose computer worm slithered nationwide in November, 1988.
-
- A further concern in Washington: A trial in the case might embarrass the
- Department of Defense if its scientists are asked to detail how their computers
- were among the thousands crippled by the worm.
-
- For several months, the decision on how to charge 23-year-old Robert T. Morris,
- Jr. had been before Mark Richard, a deputy assistant attorney general. Within
- the last few weeks, Richard made a decision that now is being reviewed by an
- assistant attorney general, according to a computer professional who has been
- talking with the Justice Department.
-
- "I thought we would have heard something from Washington by now," said Andrew
- Baxtoer, the assistant U.S. attorney who in November and December presented the
- case to a grand jury in Syracuse.
-
- The grand jury's report was sent on the the Justice Department, which refuses
- to comment publicly on the matter because Morris has not been indicted.
-
- "Within the next two weeks I assume that a decision will be made," said one
- official.
-
- "If they decide to begin an expensive trial, they have to make sure they win so
- as not to damage future attempts to prosecute under that law," said Eugene H.
- Spafford, an assistant professor at Purdue University whose analysis of the
- worm has helped federal investigators. "If they decide not to prosecute, and
- the total thing that happens is he gets suspended (from Cornell), I will be
- outraged."
-
- So far, Cornell has taken the only disciplinary measure against Morris,
- suspending him for the 1989-90 academic year. But the graduate student left
- the computer science department early in November, the day after the worm
- spread out of a computer in Upson Hall.
-
- Morris, a computer science graduate student, has been called the author of a
- rogue computer program, called a worm, that was spread from a Cornell
- University computer. The program was designed to reproduce and infect any
- computer linked to the Internet, a network shared by colleges, research centers
- and military institutions.
-
- However, experts say an error caused the program to replicate out of control,
- sending thousands of copies into thousands of computers.
-
- If Morris is to be charged with a felony, prosecutors would then have to show
- he intended to destroy or extract information.
-
- Proving that would be difficult since the program neither destroyed nor removed
- information from any computer.
-
- To convict Morris on most lesser charges, prosecutors would have to show he
- intended to harm computers.
-
- Prosecutors also could use a misdemeanor charge requiring them to prove only
- that Morris gained access to a federal government computer. The worm did reach
- computers at the Army Ballistics Research Laboratory and NASA's Langley
- Research Center, among others.
-
- Some computer experts wonder, though, if Defense Department officials will be
- reluctant to testify publicly about how their computers were penetrated -- even
- those computers holding non-classified information. In February, at a computer
- convention in San Diego, Defense Department computer experts detailed some
- security improvements made to the network since November, but then refused to
- release copies of their presentation to people at the seminar.
-
- The FBI -- which enforces the Computer Fraud and Abuse Act of 1986 -- and some
- people in the computer industry are pushing for a vigorous prosecution to
- display a strong case against computer hacking. Others in the industry,
- including some of Morris' friends from Harvard University and Cornell, urge
- leniency because he was trying to demonstrate security flaws with computers.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Other articles about Robert Tappan Morris, Jr. and the Internet Worm are;
-
- "Computer Network Disrupted By 'Virus'" (11/03/88) PWN XXII/Part 2
- "Virus Attack" (11/06/88) PWN XXII/Part 2
- "The Computer Jam: How It Came About" (11/08/88) PWN XXII/Part 2
- "US Is Moving To Restrict {...} Virus" (11/11/88) PWN XXII/Part 2 *
- "FBI Studies Possible Charges In Virus" (11/12/88) PWN XXII/Part 2
- "Big Guns Take Aim At Virus" (11/21/88) PWN XXII/Part 3
- "Congressman Plan Hearings On Virus" (11/27/88) PWN XXII/Part 3
- "Pentagon Severs Military {...} Virus" (11/30/88) PWN XXII/Part 3 *
- "Networks Of Computers At Risk From Invaders" (12/03/88) PWN XXII/Part 4 *
- "Computer Virus Eradication Act of 1988" (12/05/88) PWN XXII/Part 4 *
- "Breaking Into Computers {...}, Pure and Simple" (12/04/88) PWN XXIV/Part 1 *
- "Cornell Panel Concludes Morris {...} Virus" (04/06/89) PWN XXVI/Part 1
-
- * - Indicates that the article was not directly related to Robert Morris, but
- did discuss him as well as the Internet Worm incident.
- _______________________________________________________________________________
-
- SouthernNet's Anti-Hacker Psychological Con Game April 1989
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- WARNING! Your call is being intercepted!
-
- Error: Setting may not be changed by callers.
-
-
- Welcome to: S o u t h e r n N e t I n c.
-
-
- You have reached the SouthernNet Fraud Department, the authorization code you
- are attempting to use is not valid. Hacking and illegal use of codes are
- violations of state and federal laws.
-
- We are currently conducting an investigaion for code abuse in your area and we
- are coordinating the investigation with law enforcement authorities. Persons
- identified hacking or abusing codes will be prosecuted to the full extent of
- the law.
-
- I'll see you soon,
-
- Hacker Tracker
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Hold for additional information:
-
- Hacker Tracker is unavailable right now; however, you may avoid possible arrest
- and/or prosecution by calling Hacker Tracker in person.
-
- You may contact Mr. Tracker between the hours of 9:00 AM and 5:00 PM Eastern
- Standard Time, Monday - Friday, simply by dialing the access number you have
- just used and code number 101010 or 011010 if the access you have used
- requires a seven digit code. Just hold the line for 10 seconds and your call
- will automatically be routed to Mr. Tracker at no charge to you.
-
- This is *NOT* a trick and it will be the intention of SouthernNet Inc. to
- settle this matter without involving law enforcement authorities if you
- cooperate with our fraud department 100%.
-
- It will certainly be to your advantage to contact Mr. Tracker as this will
- reflect your own decision to assist and avoid prosecution by our company!!!
-
- I'll be expecting your call.
-
- Hacker Tracker
-
- Hold a sec... Engaging Auto Page for Hacker Tracker...
-
- 50 seconds till disconnect
- 40 seconds till disconnect
- 30 seconds till disconnect
- 20 seconds till disconnect
- 10 seconds till disconnect
- 5 seconds till disconnect
-
- NO CARRIER
-
-
- [Do you think anyone believed this and actually called "Hacker Tracker?" -KL]
- _______________________________________________________________________________
-
- What's Happening: Computer Security Up June 4, 1989
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Taken from Gannett Westchester Newspapers
-
- [Comments in brackets from Delta-Master]
-
- High-tech companies are spending 64% more [than they previously spent] on
- computer security, according to a recent survey conducted by the National
- Center for Computer Crime Data in Los Angeles. The group surveyed 3,500 law
- enforcement agencies and computer security experts about computer crime. The
- prosecution rate is also up -- 6.4% in 1988 from only 2.4% during 1987.
-
- Contrary to popular image, computer hackers aren't always young boys. The
- study found that 32% of those arrested for computer crimes were female, while
- only 14% were under 21. The study said 45% of hackers were 25 to 30 years old.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Comments from Delta-Master
- ~~~~~~~~~~~~~~~~~~~~~~~~~~
- I do not know about you people, but the public's confusion about hackers starts
- to bother me when they make errors. Seriously, I know of only a few hackers
- over the age of 21. The fact that the newspapers also equate the thug-like
- computer criminals with the mastermind-criminal type hacker (you guys) is also
- pretty annoying, wouldn't you agree? One key phrase you must note: "32% OF
- THOSE ARRESTED." Oh well, such are the mistakes of newspapers.
- _______________________________________________________________________________
-
- Public Service Commission Bans Operator Companies April 24, 1989
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By Jerri Stroud (St. Louis Post-Dispatch)
-
- The Missouri Public Service Commission voted 4-1 last week to ban providers of
- so-called alternative operator services in Missouri because allowing the
- companies to operate is "not in the public interest."
-
- Alternative operator services companies contract with hotels, motels colleges,
- hospitals, airports, restaurants and other facilities to provide operator
- assistance to customers using pay telephones or house phones. Consumer groups
- have complained about price-gouging by the companies nationwide.
-
- Mark Wheatley, a lawyer for the Office of Public Council, praised the
- commission's decision.
-
- The Office of Public Council has received numerous complaints about excessive
- rates and surcharges by alternative operator services companies, said Wheatley.
- Some alternative operator services companies also have accepted other
- companies' credit cards without authorization from the companies issuing the
- cards, he said.
-
- "We feel that it's an extremely important decision by the commission." said
- Wheatley. But he said he expects the companies affected by the ruling to
- appeal.
-
- Lawyers for the alternative operator services companies could not be reached
- for comment.
-
- In it's ruling, the commission said many consumers aren't aware of the rates
- charged by the alternative operator services companies until they receive "a
- bill for operator services at prices higher than those to which he is
- accustomed." Consumer groups say the rates often are twice or three times the
- rates charged by better-known long-distance companies.
-
- Even if an operator service company identifies itself when a consumer makes a
- call, the commission said many consumers don't understand the significance of
- the identification.
-
- "If the end user is not educated as to the intricacies of using an alternative
- operator services provider, he does not truly have a meaningful choice..." the
- commission said.
-
- The ruling only affects intrastate calls handled by alternative operator
- services companies, but it may effectively prevent the companies from providing
- interstate service as well.
-
- The commission specifically denied tariff requests from International
- Telecharge Inc. and American Operator Services Inc. The commission also
- directed three other companies -- Teleconnect Inc., Dial US, and Dial USA -- to
- file new tariffs consistent with the ruling.
-
- The ruling allows companies to operate who provide operator services in
- connection with their business -- long-distance carriers and local telephone
- companies, for example. But the commission also placed limits on these
- companies.
-
- Under the ruling, operator services companies must:
-
- * Identify themselves to the caller as well as to the party being billed
- by the call (in the case of a collect or third-party call).
-
- * Quote rates to the caller or billed party on request, without charge.
-
- * Use calling card verification procedures acceptable to the companies
- issuing the cards.
-
- * Post in a prominent position the company's name, detailed complaint
- procedures and instruction on how to reach the local telephone company
- operator and other long-distance carriers.
-
- * Transfer emergency traffic to the local telephone company or American
- Telephone & Telegraph Co. until the alternative services provider can
- show that it can handle emergency calls adequately.
- _______________________________________________________________________________
-
- Fax Attack May 13, 1989
- ~~~~~~~~~~
- Taken from The Ann Arbor News
-
- "Governor's Attempt To Ban Unsolicited Advertisements Backfires!"
-
- HARTFORD, Conn - The great fax attack of 1989 -- an all-out lobbying campaign
- against a bill banning unsolicited facsimile advertising -- may have backfired
- when the governor's fax machine was jammed for hours with unwanted messages.
-
- Starting Thursday, May 11, and continuing Friday, May 12, Governor William A.
- O'Neill's fax machine has been beeping constantly, spitting out unwanted
- messages from angry businesses that advertise by fax.
-
- The businesses oppose a bill now awaiting O'Neill's signature that would
- prohibit them from marketing their products by fax without first obtaining the
- permission of the recipient. Violators would face a $200 fine.
-
- Starting Thursday morning, dozens of Connecticut businesses faxed to O'Neill's
- office a form letter arguing against the fax ban. The stream of fax messages
- was so constant (40 came in before 10 AM) that the governor's office turned off
- the fax machine Thursday (May 11).
-
- O'Neill's press secretary, Jon. L. Sandberg, said the governor still hasn't
- decided whether he will sign the bill. But aides to the governor said the
- persistent lobbying campaign proved how annoying unwanted messages can be. The
- inconvenience was compounded because the governor's office was unable to use
- its fax machine to receive information about spring flooding around the state.
- _______________________________________________________________________________
-
- NYNEX Announces Info-Look Gateway April 28, 1989
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Introducing a new service for accessing information and more... all through
- your personal computer!
-
- Starting in May 1989, New York Telephone's INFO-LOOK (tm) Gateway Service can
- be your link to accessing a variety of information, products and services.
-
- The INFO-LOOK Gateway simplifies on-line computer access to a variety of
- information providers. When you call the Gateway phone number through your
- modem, you'll be able to scan a menu of information services.
-
- The types of information services you may choose from include: Entertainment,
- business, health, food, news, weather, sports, travel, government, educational
- and reference information. The services, some interactive, are provided by
- independent companies.
-
- The INFO-LOOK Gateway is easy to use -- even if you're relatively new to using
- a PC.
-
- What you'll need to use the INFO-LOOK Gateway
-
- 1. Virtually any type of personal computer.
-
- 2. A modem (300, 1200, or 2400 Baud), and communications software. This
- enables your computer to communicate with other computers via the telephone
- system.
-
- 3. A New York Telephone Calling Card. If you need a New York Telephone
- Calling Card, (it's FREE), call your service representative whose number
- appears on page one of your New York Telephone bill.
-
- Charges for using the INFO-LOOK Gateway
-
- There are ** no ** Gateway enrollment fees and ** no ** monthly subscription
- charges. In most cases, you will be charged (New York people only):
-
- o A local call to reach the INFO-LOOK Gateway.
-
- o While you're browsing the Gateway directory of services, or moving between
- services, you pay $.05 a minute.
-
- o Once you connect to a service, the charge is determined by the Service
- Provider. Some services have a per-minute usage charge. Some services are
- free. The charges for each service are listed in the Gateway menu.
-
- You'll find most charges itemized on your monthly New York Telephone bill.
- Some Service Providers may decide to bill you separately and directly for use
- of their services.
-
- Call for more information:
-
- To get your free INFO-LOOK Gateway information booklet call (toll- free)
- 1-800-338-2720, Ext. 20, any day from 9 a.m. to 11 p.m.
-
- Note: New York Telephone does not provide or control the services offered
- through the INFO-LOOK Gateway Service. They are provided by independent
- companies, which are responsible for the content, character, and quality
- of their services.
-
- The predictions run $5 billion now and another $5-10 billion by 1991.
-
- [INFO-LOOK is already operating in Bell South and Bell Atlantic.]
- _______________________________________________________________________________
-
- Pacific Bell Plans Access To Computers June 9, 1989
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Taken from Santa Cruz Sentinel (Section B)
-
- SAN FRANCISCO (AP) -- Pacific Bell said Thursday it hopes to compete with the
- popularity of television by offering people easy access to computerized
- libraries, bulletin boards and the use of electronic mail.
-
- PacBell's California On-line -- which will be available to anybody with a
- personal computer, telephone and calling card -- will be among the first in the
- nation to use a graphic-based system that simplifies procedures so only a
- rudimentary familiarity with computers is needed.
-
- "It's going to offer our customers a supplement to their current leisure
- activities... and among other things we've seen (in trials) a lot of people
- who got away from the TV," said Roger P. Conrad, director of Videotex Gateway
- Services.
-
- "We feel this is a more productive way for people to spend their lives and we
- think a lot of users are going to agree," he added. Users will pay
- "info-entrepreneurs" fees based on the time they use various services and will
- be billed on their monthly telephone statements. Unlike some on-line
- information services, users do not have to subscribe ahead of time.
-
- Conrad said the types of services are limited only by vendors' imaginations.
- PacBell will make money by selling telecommunication line use to the companies.
- _______________________________________________________________________________
-
- Bulletin Boards Of Argentina June 5, 1989
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Country Code = 54 (Argentina)
- City Code = 1 (Buenos Aires)
-
- This list might be slightly incorrect due to the passage of time. The last
- update was on December 23, 1986.
-
- Name Hours Of Operation ======= Number=
- ----
- Beta 23:00 - 6:30 802-0288
- C-Mania 21:00 - 7:00 362-8843
- CBM 16:00 - 12:00 90-4988
- Century 21 24 hours 632-7070
- Cerebruss 24 hours 47-2717
- Cerebruss Information ? 48-8300
- 48-9886
- Databank ? 44-9760
- Drean Conection ? 953-2523
- Los Pinos 13:00 - 19:00 21-0375
- Magenta ? 392-0124
- Magenta ? 392-0016
- Maxes 23:00 - 7:00 542-2695
- Mendieta 22:00 - 8:00 654-6999
- Pirates Cove 24:00 - 6:00 783-5023
- Sanctuary 24:00 - 3:00 641-4608
- Soft-work 22:30 - 9:00 88-2065
- TCConection 19:00 - 12:00 22-4197
- The Connection 24 Hours 82-5780
- The Hacker 23:00 - 7:00 748-2005
- Tiger ? 784-2226
- XCASA ? 611-8136
- BBS-IOM 24 Hours 804-3602
-
- Note: The settings for all systems listed above are Even, 7, 1.
-
- Contributed by Noli
- _______________________________________________________________________________
-
- Downloaded From P-80 International Information Systems 304-744-2253 12yrs+
-