mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
386 lines
21 KiB
Text
386 lines
21 KiB
Text
![]() |
==Phrack Inc.==
|
||
|
|
||
|
Volume Two, Issue Eleven, Phile #11 of 12
|
||
|
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
PWN PWN
|
||
|
PWN *>=-{ Phrack World News }-=<* PWN
|
||
|
PWN PWN
|
||
|
PWN Issue X PWN
|
||
|
PWN PWN
|
||
|
PWN Written, Compiled, and Edited PWN
|
||
|
PWN by Knight Lightning PWN
|
||
|
PWN PWN
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
|
||
|
Scan Man Revisited January 19, 1987
|
||
|
------------------
|
||
|
The following is a reprint from TeleComputist Newsletter Issue Two;
|
||
|
|
||
|
SCAN MAN - FED OR PHREAK? (The Other Side)
|
||
|
|
||
|
TeleComputist is printing the statement Scan Man has made to us
|
||
|
[TeleComputist] in rebuttal to Phrack World News, whom previously printed an
|
||
|
article concerning Scan Man in Phrack Issue VIII. Those of you who have seen
|
||
|
or read the article in Phrack VIII know that it basically covered information
|
||
|
and an intercepted memo alleging Scan Man of going after hackers and turning
|
||
|
in codes off his BBS (P-80 Systems, Charleston, West Virginia 304/744-2253) as
|
||
|
a TMC employee. Please note that this statement should be read with the
|
||
|
article concerning Scan Man in Phrack Issue VIII to get the full
|
||
|
understanding.
|
||
|
|
||
|
Scan Man started off his statement claiming not to work for TMC, but
|
||
|
instead for a New York branch office of Telecom Management (a Miami based
|
||
|
firm). He was flown in from Charleston, West Virginia to New York every week
|
||
|
for a four to five day duration. Once in New York, Telecom Management made
|
||
|
available a leased executive apartment where Scan Man stayed as he worked.
|
||
|
His position in Telecom Management was that of a systems analyst, "...and that
|
||
|
was it!" Scan Man stated. Scan Man also stated that he had never made it a
|
||
|
secret that he was working in New York and had even left messages on his BBS
|
||
|
saying this.
|
||
|
|
||
|
He also went on to say that he had no part in the arrest of Shawn [of
|
||
|
Phreaker's Quest] (previously known as Captain Caveman) by TMC in Las Vegas.
|
||
|
Scan Man claimed to have no ties with TMC in Las Vegas and that they would not
|
||
|
even know him. Scan Man then went on to say that Shawn had never replied to
|
||
|
previous messages Scan man had left asking for TMC codes. Scan Man also said
|
||
|
that the messages about TMC were in no way related to him. He claimed to have
|
||
|
no ties to TMC, which is a franchised operation which makes even TMC unrelated
|
||
|
except by name.
|
||
|
|
||
|
Scan Man stated that he called Pauline Frazier and asked her about the
|
||
|
inquiry by Sally Ride [:::Space Cadet] who acted as an insider to obtain the
|
||
|
information in Phrack VIII. He said that Pauline said nothing to the imposter
|
||
|
(Sally Ride) and merely directed him to a TMC employee named Kevin Griffo.
|
||
|
Scan Man then went on to say that the same day Sally Ride called Pauline
|
||
|
Frazier was the same day he received his notice. And to that Scan Man made
|
||
|
the comment, "If I find out this is so heads will roll!"
|
||
|
|
||
|
After that comment, Scan Man came up with arguments of his own, starting
|
||
|
off with the dates printed in Phrack VIII. He claimed that the dates were off
|
||
|
and backed this up by saying Ben Graves had been fired six months previously
|
||
|
to the conversation with Sally Ride. Scan Man then went on to ask why it had
|
||
|
taken Sally Ride so long to come forward with his information. Scan Man made
|
||
|
one last comment, "It's a fucking shame that there is a social structure in
|
||
|
the phreak world!" Meaning Sally Ride merely presented his information to
|
||
|
give himself a boost socially in the phreak world.
|
||
|
|
||
|
This is how it ended. We would like to say that TeleComputist printed the
|
||
|
statement by Scan Man to offer both sides of the story. We make no judgements
|
||
|
here and take no sides.
|
||
|
|
||
|
Reprinted with permission from TeleComputist Newsletter Issue 2
|
||
|
|
||
|
Copyright (C) 1986 by J. Thomas. All Rights Reserved
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
Ok, that was Scan Man's side to the story, now that he had a few months to
|
||
|
come up with one. Lets do a critical breakdown;
|
||
|
|
||
|
-*- "He was flown in from Charleston, West Virginia to New York every week for
|
||
|
a four to five day duration."
|
||
|
|
||
|
Gee, wouldn't that get awfully expensive? Every week...and "made
|
||
|
available a leased executive apartment..." He must have been quite an
|
||
|
asset to "Telecom Management" for them to spend such large amounts on him.
|
||
|
Kinda interesting that he lived in Charleston, West Virginia (where
|
||
|
surprisingly enough there is a branch of TMC) and flew to New York every
|
||
|
week.
|
||
|
|
||
|
-*- "Scan Man claimed to have no ties with TMC in Las Vegas..." Ok, I'll buy
|
||
|
that. Notice how he didn't say that he had no ties with TMC in
|
||
|
Charleston. Furthermore if he had no ties with TMC in Charleston why
|
||
|
would they have his name in their company records? Why would all those
|
||
|
employees know him or dislike him for that matter?
|
||
|
|
||
|
-*- "Scan Man then went on to say that the same day Sally Ride called Pauline
|
||
|
Frazier was the day he received his notice." Well now, how can there be a
|
||
|
connection between the two events at all when Scan Man works for Telecom
|
||
|
Management and has "no ties with TMC" and claimed "not to work for TMC"?
|
||
|
If TMC and Telecom Management are truly independent of each other then
|
||
|
nothing Sally Ride said to Pauline Frazier could have affected him in ANY
|
||
|
way. That is unless he did work for TMC in the first place.
|
||
|
|
||
|
-*- "...and back this up by saying that Ben Graves had been fired six months
|
||
|
previously to the conversation with Sally Ride." Well first of all, PWN
|
||
|
did not give a date as to when Ben Graves was fired from TMC. Second of
|
||
|
all and more important, how does Scan Man know so much about TMC when he
|
||
|
works for "Telecom Management" and has "...no ties with TMC..."?
|
||
|
|
||
|
The rest of his statements were highly debatable and he showed no proof as to
|
||
|
their validity. As for why Sally Ride waited so long to come forward, well he
|
||
|
didn't wait that long at all, he came forward to myself in late May/early June
|
||
|
of 1986. My decision was to do nothing because there wasn't enough proof.
|
||
|
After three months of research we had enough proof and the article was
|
||
|
released.
|
||
|
|
||
|
With this attempt to cover up the truth, Scan Man has only given more
|
||
|
ammunition to the idea that he isn't what he claims to be.
|
||
|
|
||
|
Special Thanks to TeleComputist Newsletter
|
||
|
______________________________________________________________________________
|
||
|
|
||
|
The Cracker Cracks Up? December 21, 1986
|
||
|
----------------------
|
||
|
"Computer 'Cracker' Is Missing -- Is He Dead Or Is He Alive"
|
||
|
|
||
|
By Tom Gorman of The Los Angeles Times
|
||
|
|
||
|
ESCONDIDO, Calif. -- Early one morning in late September, computer hacker Bill
|
||
|
Landreth pushed himself away from his IBM-PC computer -- its screen glowing
|
||
|
with an uncompleted sentence -- and walked out the front door of a friend's
|
||
|
home here.
|
||
|
|
||
|
He has not been seen or heard from since.
|
||
|
|
||
|
The authorities want him because he is the "Cracker", convicted in 1984 of
|
||
|
breaking into some of the most secure computer systems in the United States,
|
||
|
including GTE Telemail's electronic mail network, where he peeped at NASA
|
||
|
Department of Defense computer correspondence.
|
||
|
|
||
|
He was placed on three years' probation. Now his probation officer is
|
||
|
wondering where he is.
|
||
|
|
||
|
His literary agent wants him because he is Bill Landreth the author, who
|
||
|
already has cashed in on the successful publication of one book on computer
|
||
|
hacking and who is overdue with the manuscript of a second computer book.
|
||
|
|
||
|
The Institute of Internal Auditors wants him because he is Bill Landreth the
|
||
|
public speaker who was going to tell the group in a few months how to make
|
||
|
their computer systems safer from people like him.
|
||
|
|
||
|
Susan and Gulliver Fourmyle want him because he is the eldest of their eight
|
||
|
children. They have not seen him since May 1985, when they moved away from
|
||
|
Poway in northern San Diego county, first to Alaska then to Maui where they
|
||
|
now live.
|
||
|
|
||
|
His friends want him because he is crazy Bill Landreth, IQ 163, who has pulled
|
||
|
stunts like this before and "disappeared" into the night air -- but never for
|
||
|
more than a couple of weeks and surely not for 3 months. They are worried.
|
||
|
|
||
|
Some people think Landreth, 21, has committed suicide. There is clear
|
||
|
evidence that he considered it -- most notably in a rambling eight-page
|
||
|
discourse that Landreth wrote during the summer.
|
||
|
|
||
|
The letter, typed into his computer, then printed out and left in his room for
|
||
|
someone to discover, touched on the evolution of mankind, prospects for man's
|
||
|
immortality and the defeat of the aging process, nuclear war, communism versus
|
||
|
capitalism, society's greed, the purpose of life, computers becoming more
|
||
|
creative than man and finally -- suicide.
|
||
|
|
||
|
The last page reads:
|
||
|
|
||
|
"As I am writing this as of the moment, I am obviously not dead. I do,
|
||
|
however, plan on being dead before any other humans read this. The idea is
|
||
|
that I will commit suicide sometime around my 22nd birthday..."
|
||
|
|
||
|
The note explained:
|
||
|
|
||
|
"I was bored in school, bored traveling around the country, bored getting
|
||
|
raided by the FBI, bored in prison, bored writing books, bored being bored. I
|
||
|
will probably be bored dead, but this is my risk to take."
|
||
|
|
||
|
But then the note said:
|
||
|
|
||
|
"Since writing the above, my plans have changed slightly.... But the point is,
|
||
|
that I am going to take the money I have left in the bank (my liquid assets)
|
||
|
and make a final attempt at making life worthy. It will be a short attempt,
|
||
|
and I do suspect that if it works out that none of my current friends will
|
||
|
know me then. If it doesn't work out, the news of my death will probably get
|
||
|
around. (I won't try to hide it.)"
|
||
|
|
||
|
Landreth's birthday is December 26 and his best friend is not counting on
|
||
|
seeing him again.
|
||
|
|
||
|
"We used to joke about what you could learn about life, especially since if
|
||
|
you don't believe in a God, then there's not much point to life," said Tom
|
||
|
Anderson, 16, a senior at San Pasqual High School in Escondido, about 30 miles
|
||
|
north of San Diego. Anderson also has been convicted of computer hacking and
|
||
|
placed on probation.
|
||
|
|
||
|
Anderson was the last person to see Landreth. It was around September 25 --
|
||
|
he does not remember exactly. Landreth had spent a week living in Anderson's
|
||
|
home so the two could share Landreth's computer. Anderson's IBM-PC had been
|
||
|
confiscated by authorities, and he wanted to complete his own book.
|
||
|
|
||
|
Anderson said he and Landreth were also working on a proposal for a movie
|
||
|
about their exploits.
|
||
|
|
||
|
"He started to write the proposal for it on the computer, and I went to take a
|
||
|
shower," Anderson said. "When I came out, he was gone. The proposal was in
|
||
|
mid-sentence. And I haven't seen him since."
|
||
|
|
||
|
Apparently Landreth took only his house key, a passport, and the clothes on
|
||
|
his back.
|
||
|
|
||
|
Anderson said he initially was not concerned about Landreth's absence. After
|
||
|
all this was the same Landreth who, during the summer, took off for Mexico
|
||
|
without telling anyone -- including friends he had seen just the night before
|
||
|
-- of his departure.
|
||
|
|
||
|
But concern grew by October 1, when Landreth failed to keep a speaking
|
||
|
engagement with a group of auditors in Ohio, for which he would have received
|
||
|
$1,000 plus expenses. Landreth may have kept a messy room and poor financial
|
||
|
records, but he was reliable enough to keep a speaking engagement, said his
|
||
|
friends and literary agent, Bill Gladstone, noting that Landreth's second
|
||
|
manuscript was due in August and had not yet been delivered.
|
||
|
|
||
|
But, the manuscript never came and Landreth has not reappeared.
|
||
|
|
||
|
Steve Burnap, another close friend, said that during the summer Landreth had
|
||
|
grown lackadaisical toward life. "He just didn't seem to care much about
|
||
|
anything anymore."
|
||
|
Typed for PWN by Druidic Death
|
||
|
From The Dallas Times Herald
|
||
|
______________________________________________________________________________
|
||
|
|
||
|
Beware The Hacker Tracker December, 1986
|
||
|
-------------------------
|
||
|
By Lamont Wood of Texas Computer Market Magazines
|
||
|
|
||
|
If you want to live like a spy in your own country, you don't have to join the
|
||
|
CIA or the M15 or the KGB. You can track hackers, like John Maxfield of
|
||
|
Detroit.
|
||
|
|
||
|
Maxfield is a computer security consultant running a business called
|
||
|
BoardScan, which tracks hackers for business clients. He gets occasional
|
||
|
death threats and taunting calls from his prey, among whom he is known as the
|
||
|
"hacker tracker," and answers the phone warily.
|
||
|
|
||
|
And although he has received no personal harassment, William Tener, head of
|
||
|
data security for the information services division of TRW, Inc., has found it
|
||
|
necessary to call in experts in artificial intelligence from the aerospace
|
||
|
industry in an effort to protect his company's computer files. TRW is a juicy
|
||
|
target for hackers because the firm stores personal credit information on
|
||
|
about 130 million Americans and 11 million businesses -- data many people
|
||
|
would love to get hold of.
|
||
|
|
||
|
Maxfield estimates that the hacker problem has increased by a factor of 10 in
|
||
|
the last four years, and now seems to be doubling every year. "Nearly every
|
||
|
system can be penetrated by a 14-year old with $200 worth of equipment," he
|
||
|
complains. "I have found kids as young as nine years old involved in hacking.
|
||
|
If such young children can do it, think of what an adult can do."
|
||
|
|
||
|
Tener estimates that there are as many as 5,000 private computer bulletin
|
||
|
boards in the country, and that as many as 2,000 are hacker boards. The rest
|
||
|
are as for uses as varied as club news, customer relations, or just as a hobby.
|
||
|
Of the 2,000 about two dozen are used by "elite" hackers, and some have
|
||
|
security features as good as anything used by the pentagon, says Maxfield.
|
||
|
|
||
|
The number of hackers themselves defies estimation, if only because the users
|
||
|
of the boards overlap. They also pass along information from board to board.
|
||
|
Maxfield says he has seen access codes posted on an east coast bulletin board
|
||
|
that appeared on a west coast board less than an hour later, having passed
|
||
|
through about ten boards in the meantime. And within hours of the posting of
|
||
|
a new number anywhere, hundreds of hackers will try it.
|
||
|
|
||
|
"Nowadays, every twerp with a Commodore 64 and a modem can do it, all for the
|
||
|
ego trip of being the nexus for forbidden knowledge," sighs a man in New York
|
||
|
City, known either as "Richard Cheshire" or "Chesire Catalyst" -- neither is
|
||
|
his real name. Cheshire was one of the earliest computer hackers, from the
|
||
|
days when the Telex network was the main target, and was the editor of TAP, a
|
||
|
newsletter for hackers and phone "phreaks". Oddly enough, TAP itself was an
|
||
|
early victim of the hacker upsurge. "The hacker kids had their bulletin
|
||
|
boards and didn't need TAP -- we were technologically obsolete," he recalls.
|
||
|
|
||
|
So who are these hackers and what are they doing? Tener says most of the ones
|
||
|
he has encountered have been 14 to 18 year old boys, with good computer
|
||
|
systems, often bright, middle class, and good students. They often have a
|
||
|
reputation for being loners, if only because they spend hours by themselves at
|
||
|
a terminal, but he's found out-going hacker athletes.
|
||
|
|
||
|
But Maxfield is disturbed by the sight of more adults and criminals getting
|
||
|
involved. Most of what the hackers do involves "theft of services" -- free
|
||
|
access to Compuserve, The Source, or other on-line services or corporate
|
||
|
systems. But, increasingly, the hackers are getting more and more into credit
|
||
|
card fraud.
|
||
|
|
||
|
Maxfield and Cheshire describe the same process -- the hackers go through
|
||
|
trash bins outside businesses whose computer they want to break into looking
|
||
|
for manuals or anything that might have access codes on it. They may find it,
|
||
|
but they also often find carbon copies of credit card sales slips, from which
|
||
|
they can read credit card numbers. They use these numbers to order
|
||
|
merchandise -- usually computer hardware -- over the phone and have it
|
||
|
delivered to an empty house in their neighborhood, or to a house where nobody
|
||
|
is home during the day. Then all they have to do is be there when the delivery
|
||
|
truck arrives.
|
||
|
|
||
|
"We've only been seeing this in the last year," Maxfield complains. "But now
|
||
|
we find adults running gangs of kids who steal card numbers for them. The
|
||
|
adults resell the merchandise and give the kids a percentage of the money."
|
||
|
|
||
|
It's best to steal the card number of someone rich and famous, but since
|
||
|
that's usually not possible it's a good idea to be able to check the victim's
|
||
|
credit, because the merchant will check before approving a large credit card
|
||
|
sale. And that's what makes TRW such a big target -- TRW has the credit
|
||
|
files. And the files often contain the number of any other credit cards the
|
||
|
victim owns, Maxfield notes.
|
||
|
|
||
|
The parents of the hackers, meanwhile, usually have no idea what their boy is
|
||
|
up to -- he's in his room playing, so what could be wrong? Tener recalls a
|
||
|
case where the parents complained to the boy about the high phone bill one
|
||
|
month. And the next month the bill was back to normal. And so the parents
|
||
|
were happy. But the boy had been billing the calls to a stolen telephone
|
||
|
company credit card.
|
||
|
|
||
|
"When it happens the boy is caught and taken to jail, you usually see that the
|
||
|
parents are disgruntled at the authorities -- they still think that Johnny was
|
||
|
just playing in his bedroom. Until, of course, they see the cost of Johnny's
|
||
|
play time, which can run $50,000 to $100,000. But outside the cost, I have
|
||
|
never yet seen a parent who was really concerned that somebody's privacy has
|
||
|
been invaded -- they just think Johnny's really smart," Tener says.
|
||
|
|
||
|
TRW will usually move against hackers when they see a TRW file or access
|
||
|
information on a bulletin board. Tener says they usually demand payment for
|
||
|
their investigation costs, which average about $15,000.
|
||
|
|
||
|
Tales of the damage hackers have caused often get exaggerated. Tener tells of
|
||
|
highly publicized cases of hackers who, when caught, bragged about breaking
|
||
|
into TRW, when no break-ins had occurred. But Maxfield tells of two 14-year
|
||
|
old hackers who were both breaking into and using the same corporate system.
|
||
|
They had an argument and set out to erase each other's files, and in the
|
||
|
process erased other files that cost about a million dollars to replace.
|
||
|
Being juveniles, they got off free.
|
||
|
|
||
|
After being caught, Tener says most hackers find some other hobby. Some,
|
||
|
after turning 18, are hired by the firms they previously raided. Tener says
|
||
|
it rare to see repeat offenders, but Maxfield tells of one 14-year-old repeat
|
||
|
offender who was first caught at age 13.
|
||
|
|
||
|
Maxfield and Tener both make efforts to follow the bulletin boards, and
|
||
|
Maxfield even has a network of double agents and spies within the hacker
|
||
|
community. Tener uses artificial intelligence software to examine the day's
|
||
|
traffic to look for suspicious patterns. TRW gets about 40,000 inquiries an
|
||
|
hour and has about 25,000 subscribers. But that does not address the
|
||
|
underlying problem.
|
||
|
|
||
|
"The real problem is that these systems are not well protected, and some can't
|
||
|
be protected at all," Maxfield says.
|
||
|
|
||
|
Cheshire agrees. "A lot of companies have no idea what these kids can do to
|
||
|
them," he says. "If they would make access even a little difficult the kids
|
||
|
will go on to some other system." As for what else can be done, he notes that
|
||
|
at MIT the first thing computer students are taught is how to crash the
|
||
|
system. Consequently, nobody bothers to do it.
|
||
|
|
||
|
But the thing that annoys old-timer Cheshire (and Maxfield as well) is that
|
||
|
the whole hacker-intruder-vandal-thief phenomenon goes against the ideology of
|
||
|
the original hackers, who wanted to explore systems, not vandalize them.
|
||
|
Cheshire defines the original "hacker ethic" as the belief that information is
|
||
|
a value-free resource that should be shared. In practice, it means users
|
||
|
should add items to files, not destroy them, or add features to programs,
|
||
|
rather than pirate them.
|
||
|
|
||
|
"These kids want to make a name for themselves, and they think that they need
|
||
|
to do something dirty to do that. But they do it just as well by doing
|
||
|
something clever, such as leaving a software bug report on a system," he
|
||
|
notes.
|
||
|
|
||
|
Meanwhile, Maxfield says we are probably stuck with the problem at least until
|
||
|
the phone systems converts to digital technology, which should strip hackers
|
||
|
of anonymity by making their calls easy to trace.
|
||
|
|
||
|
Until someone figures out how to hack digital phone networks, of course. -TCM
|
||
|
|
||
|
Typed for PWN by Druidic Death
|
||
|
______________________________________________________________________________
|