mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
275 lines
15 KiB
Text
275 lines
15 KiB
Text
![]() |
==Phrack Inc.==
|
||
|
|
||
|
Volume Two, Issue 23, File 11 of 12
|
||
|
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
PWN PWN
|
||
|
PWN P h r a c k W o r l d N e w s PWN
|
||
|
PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN
|
||
|
PWN Issue XXIII/Part 1 PWN
|
||
|
PWN PWN
|
||
|
PWN Created, Written, and Edited PWN
|
||
|
PWN by Knight Lightning PWN
|
||
|
PWN PWN
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
|
||
|
|
||
|
Back To The Present
|
||
|
~~~~~~~~~~~~~~~~~~~
|
||
|
Welcome to Phrack World News Issue XXIII. This issue features stories on
|
||
|
the Chaos Computer Club, more news about the infamous Kevin Mitnick, and
|
||
|
details about an Australian-American hackers ring that has been shut down.
|
||
|
|
||
|
I also wanted to add a big "thanks" to those of you who did send in news
|
||
|
stories and information. Your help is greatly appreciated.
|
||
|
|
||
|
:Knight Lightning
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Armed With A Keyboard And Considered Dangerous December 28, 1988
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
A follow-up story to the Kevin Mitnick case in the December 24, 1988 edition of
|
||
|
the Los Angeles Times says the federal magistrate refused to release Mitnick on
|
||
|
bail December 23, 1988;
|
||
|
|
||
|
"after prosecutors revealed new evidence that Mitnick penetrated a
|
||
|
National Security Agency computer and may have planted a false story
|
||
|
on a financial news wire...."
|
||
|
|
||
|
Investigators believe that Mitnick may have been the instigator of a false
|
||
|
report released by a news service in April that Security Pacific National Bank
|
||
|
lost $400 million in the first quarter of 1988. The report, which was released
|
||
|
to the NY Stock Exchange and other wire services, was distributed four days
|
||
|
after Mitnick had been turned down for a job at Security Pacific [after the
|
||
|
bank learned he had lied on a job application about his past criminal record].
|
||
|
The false information could have caused huge losses for the bank had it reached
|
||
|
investors, but the hoax was uncovered before that could happen.
|
||
|
|
||
|
The prosecutor said Mitnick also penetrated a NSA computer and obtained
|
||
|
telephone billing data for the agency and several of its employees.
|
||
|
|
||
|
[In refusing bail, the magistrate said,] "I don't think there's any conditions
|
||
|
the court could set up based upon which the court would be convinced that the
|
||
|
defendant would be anything other than a danger to the community.... It sounds
|
||
|
like the defendant could commit major crimes no matter where he is."
|
||
|
|
||
|
Mitnick's attorney said prosecutors have no evidence for the new accusations.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Dark Side Hacker Seen As Electronic Terrorist January 8, 1989
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
By John Johnson Los Angeles Times
|
||
|
|
||
|
"Computer an 'Umbilical Cord to His Soul"
|
||
|
|
||
|
When a friend turned him in and Mitnick asked why, the friend replied, "Because
|
||
|
you're a menace to society." Mitnick is described as 25, an overweight,
|
||
|
bespectacled computer junkie known as a "dark side" hacker for his willingness
|
||
|
to use the computer as a weapon. His high school computer hobby turned into a
|
||
|
lasting obsession.
|
||
|
|
||
|
He allegedly used computers at schools and businesses to break into Defense
|
||
|
Department computer systems, sabotage business computers, and electronically
|
||
|
harass anyone -- including a probation officer and FBI agents -- who got in his
|
||
|
way.
|
||
|
|
||
|
He also learned how to disrupt telephone company operations and disconnected
|
||
|
the phones of Hollywood celebrities such as Kristy McNichol, authorities said.
|
||
|
|
||
|
So determined was Mitnick, according to friends, that when he suspected his
|
||
|
home phone was being monitored, he carried his hand-held keyboard to a pay
|
||
|
phone in front of a 7-Eleven store, where he hooked it up and continued to
|
||
|
break into computers around the country. "He's an electronic terrorist, said
|
||
|
[the friend who turned him in], "He can ruin someone's life just using his
|
||
|
fingers."
|
||
|
|
||
|
Over the last month, three federal court judges have refused at separate
|
||
|
hearings to set bail for Mitnick, contending there would be no way to protect
|
||
|
society from him if he were freed. Mitnick's lack of conscience, authorities
|
||
|
say, makes him even more dangerous than hackers such as Robert Morris Jr., who
|
||
|
is suspected of infecting computer systems around the country with a "virus"
|
||
|
that interfered with their operations.
|
||
|
|
||
|
Mitnick's family and attorney accuse federal prosecutors of blowing the case
|
||
|
out of proportion, either out of fear or misunderstanding of the technology.
|
||
|
|
||
|
The story details his "phone phreak" background, and his use of high school
|
||
|
computers to gain access to school district files on remote computers, where he
|
||
|
didn't alter grades, but "caused enough trouble" for administrators and
|
||
|
teachers to watch him closely. He used the name "Condor," after a Robert
|
||
|
Redford movie character who outwits the government. The final digits of his
|
||
|
unlisted home phone were 007, reportedly billed to the name "James Bond."
|
||
|
|
||
|
[He and a friend] broke into a North American Air Defense Command computer in
|
||
|
Colorado Springs in 1979. [The friend] said they did not interfere with any
|
||
|
defense operation. "We just got in, looked around, and got out."
|
||
|
|
||
|
What made Mitnick "the best" said a fellow hacker and friend, was his ability
|
||
|
to talk people into giving him privileged information. He would call an
|
||
|
official with a company he wanted to penetrate and say he was in the
|
||
|
maintenance department and needed a computer password. He was so convincing,
|
||
|
they gave him the necessary names or numbers.
|
||
|
|
||
|
He believed he was too clever to be caught. He had penetrated the DEC network
|
||
|
in Massachusetts so effectively that he could read the personal electronic mail
|
||
|
of security people working on the case of the mysterious hacker and discover
|
||
|
just how close they were getting to him. But caught he was, again and again.
|
||
|
|
||
|
Mitnick's motive for a decade of hacking? Not money, apparently... Friends
|
||
|
said he did it all simply for the challenge. [His one-time probation officer
|
||
|
says,] "He has a very vindictive streak. A whole bunch of people were
|
||
|
harassed. They call me all the time." His mastery of the computer was his
|
||
|
"source of self-esteem," said a friend.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Computer Chaos Congress 88 Report January 3, 1989
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
Observing Chaos Communication Congress 1988, Hamburg
|
||
|
|
||
|
"From Threat To Alternative Networks"
|
||
|
|
||
|
On 28-30 December, 1988, Computer Chaos Club (CCC) held its 5th annual "Chaos
|
||
|
Communication Congress" at Hamburg/FRG (West Germany). As in previous years,
|
||
|
300 people (mainly aged 16-36, 90% male, with some visitors from Austria and
|
||
|
The Netherlands) gathered, carefully observed from newsmedia (German stations,
|
||
|
printmedia, press agencies, but also from UK's BBC, and being observed by
|
||
|
Business Week's Katie Hafner, who gathered material for a book on hackers,
|
||
|
planned by John Markoff and herself).
|
||
|
|
||
|
In the chaotic (though creative) congress "organization," two different tracks
|
||
|
were visible:
|
||
|
|
||
|
-- Technical presentations on networks (UUCP, GEONET, FIDONet, and CCCs
|
||
|
emerging "open networks" BTXnet and "Zerberus"), and on a PC-DES encryption
|
||
|
developed by a leading CCC member (who had escaped the French police's
|
||
|
arrest by travelling to SECURICOM by railway while police waited at the
|
||
|
airport);
|
||
|
|
||
|
-- Socio-political discussions about "sociology of hackers," "free flow of
|
||
|
information" as well as reports about recent events, dominated by the arrest
|
||
|
of Steffen Wernery in Paris in Spring 88 when being invited to speak on
|
||
|
SECURICOM.
|
||
|
|
||
|
CCC speakers reported about their work to install "free networks." In Germany,
|
||
|
most of the networks are organized in the form of a "Verein" (an association
|
||
|
with legal status, which guarantees tax-free operation): Such networks are
|
||
|
access-restricted to their members. The different German science and
|
||
|
University networks (and their bridges to international networks) usually
|
||
|
restrict access to scientists. Different CCC subgroups are establishing
|
||
|
"alternative networks," such as "EcoNet" for communication of ecological data
|
||
|
and information, planned to be available, free of cost, to broader social,
|
||
|
ecological, peace and political groups and individuals.
|
||
|
|
||
|
Apart from traditional technologies (such as GEONET and FIDONet), the German
|
||
|
Post Office's Bildschirmtext (Btx) will be used as a cheap communications
|
||
|
medium; while CCCs first hack was, years ago, to attack the "insecure
|
||
|
Btx-system" (in the so-called "HASPA coup" where they misused the Btx password
|
||
|
of the Hamburg savings bank to repeatedly invoke CCC's Btx information at a
|
||
|
total prize of 135.000 DM, then about 50.000$), they today begin to use this
|
||
|
cheap though very limited medium while more powerful communications media are
|
||
|
available. Today, the emerging ISDN technology is verbally attacked by hackers
|
||
|
because of the excessive accumulation of personal data; from here, hacks may be
|
||
|
attempted when ISDN becomes regionally available in 1989/90.
|
||
|
|
||
|
Several speakers, educated Informaticians with grades from West German
|
||
|
Informatics departments, professionally work in Software production and in
|
||
|
selling hardware/software to economy and state agencies. Among them, several
|
||
|
professional UNIX and UUCP users have begun to organize CCC's future UUCP
|
||
|
version. Up to now, only few CCC members use (and know about) UNIX systems,
|
||
|
but their number may grow within the near future according to CCC's
|
||
|
"marketing." One speaker told the audience, "that you can remotely start
|
||
|
programs in UUCP." After some learning phase, the broadened availability of
|
||
|
UNIX in the hacker scene may produce new threats.
|
||
|
|
||
|
The other track of the Congress discussed themes like "sociology of hackers"
|
||
|
where a group of politology students from Berlin's Free University analyzed
|
||
|
whether hackers belong to the "new social movements" (e.g. groups on peace,
|
||
|
nuclear energy, feminist themes). They found that, apart from much public
|
||
|
exaggeration (it is not true that hackers can invade *any* computer), hackers
|
||
|
are rather "unpolitical" since they are preferably interested in technology.
|
||
|
|
||
|
A major topic was "free access to/flow of information." Under the title
|
||
|
"freedom of information act," speakers suggested a national legislation which
|
||
|
guarantees individual and group rights to inspect files and registers of public
|
||
|
interest; the discussion lacked sufficient basic knowledge, e.g. of the
|
||
|
respective US legislation and corresponding international discussions in Legal
|
||
|
Informatics.
|
||
|
|
||
|
Summarizing the Congress and accompanying discussions, active CCC members try
|
||
|
hard to demonstrate that they have *no criminal goals* and ambitions (they
|
||
|
devoted a significant amount of energy to several press conferences, TV
|
||
|
discussions etc). The conference was dominated by young computer professionals
|
||
|
and students from the PC scene, partially with good technological knowledge of
|
||
|
hardware, software and networks; while some people seem to have good technical
|
||
|
insights in VAXsystems, knowledge of large systems seems to be minimal. To some
|
||
|
extent, the young professionals wish to behave as the :good old-fashioned
|
||
|
hackers": without criminal energy, doing interesting work of good professional
|
||
|
quality in networks and other new areas.
|
||
|
|
||
|
While former CCCongresses were devoted to threats like Viruses, *no explicit
|
||
|
discussion* was devoted *to emerging threats*, e.g. in ISDN or the broadening
|
||
|
use of UNIX, UUCP. The new track discussing political and social aspects of
|
||
|
computing follows former discussions about "hacker ethics." Here, the
|
||
|
superficial, unprofessional discussions of related themes show that the young
|
||
|
(mainly) males are basically children of a "screen era" (TV, PCs) and of an
|
||
|
education which concentrates on the visible "image," rather than understanding
|
||
|
what is behind it.
|
||
|
|
||
|
Special Thanks to Dr. Klaus Brunnstein, University of Hamburg
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
The Chaos Communication Congress 1988 in Hamburg
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
From Terra of The Chaos Computer Club
|
||
|
|
||
|
One of the basic statements of the Chaos Computer Club from Hamburg, in the
|
||
|
Federal Republic of Germany is the demand for "The new human right of free
|
||
|
exchange of data between all beings, without censorship, for all beings, and
|
||
|
for the moment at least world-wide."
|
||
|
|
||
|
Other statements include "data free NOW!" and "Free flow of information."
|
||
|
Indeed, these ideas are not new, not even in the computer community, but the
|
||
|
important thing is that the CCC is now in the process of turning some of the
|
||
|
old hacker dreams into reality. For example: they are now creating their own
|
||
|
networks, that exchange not only 'club' information, but everything that
|
||
|
interest those on the net. This includes genetical engineering and
|
||
|
environmental issues.
|
||
|
|
||
|
The Chaos Communication Congress that takes place every year in Hamburg is for
|
||
|
many hackers even more of a dream. Imagine being a hacker in some lonesome
|
||
|
outpost thinking you are the only one that is crazy enough to be smarter than
|
||
|
technology, and finding out there is a whole bunch of people that are just as,
|
||
|
or even more, crazy. This year is the fifth congress, and advertisement is not
|
||
|
needed: The 'family' knows exactly, because it's all in the networks.
|
||
|
|
||
|
The congress itself is split up over a number of rooms. There is a hack-room,
|
||
|
where the real hacking takes place. There is also a press room, where hackers
|
||
|
and journalists together try to bring the hacker message out to the rest of the
|
||
|
world. The archive contains all of the 'Chaos papers,' all press clippings,
|
||
|
interesting remarks and all issues of the "datenschleuder", the German Hacker
|
||
|
Magazine.
|
||
|
|
||
|
German 'data travelers' are also present. A 'data traveler' is someone that
|
||
|
uses the international data network for gaining access to all sorts of
|
||
|
computers all over the world. A famous story is that of a German hacker that
|
||
|
tries to reach a friend and finds his phone busy. He then calls his local
|
||
|
Datanet access number and goes through all of the computers that he knows his
|
||
|
friend is interested in at that moment. His friend, hanging around in some
|
||
|
computer in New York gets a message on his screen saying; "Ah here you are,
|
||
|
I've been looking around everywhere."
|
||
|
|
||
|
Back to this congress. On the first day the emphasis lies on the past. All
|
||
|
things that have happened to the CCC in the past year are being discussed. The
|
||
|
second day the emphasis lies on the future; and then ideas about the future of
|
||
|
the information society is the subject of discussion. CCC says "Information
|
||
|
society" is not equivalent to "Informed Society", and more attention should be
|
||
|
paid to public use of computer technology.
|
||
|
|
||
|
One of the main goals of the CCC is getting people to think about these issues;
|
||
|
so that it is no longer just computer maniacs that decide over the faith of the
|
||
|
world. "We don't know yet whether the computer is a gift or a timebomb, but
|
||
|
it IS going to change everyone's life very soon."
|
||
|
_______________________________________________________________________________
|