mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
236 lines
12 KiB
Text
236 lines
12 KiB
Text
![]() |
==Phrack Inc.==
|
||
|
Volume Three, Issue Thirty-one, Phile #8 or 10
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
PWN Phrack World News PWN
|
||
|
PWN Issue XXXI, Part One PWN
|
||
|
PWN Compiled by Phreak_Accident PWN
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
|
||
|
|
||
|
Operation "Sun-Devil"
|
||
|
=====================
|
||
|
May 9th and 10th brought on two day thats would be marked in every hackers
|
||
|
history book. The reason we assume these days will be important to many, is
|
||
|
that maybe it's time we opened are eyes and saw the witch hunt currently in
|
||
|
progress.
|
||
|
In less than 48 hours, 150 Secret Service men and other law officials
|
||
|
served 30 search warrents in 14 cities around the nation (This thing was hudge).
|
||
|
Operation "Sun-Devil" (As the Attorney General in Phoenix called it), was
|
||
|
a success on their part. "The investigation though is not over, and there are
|
||
|
more warrents to be executed.", said Jim Folwer of L.A's Secret Service.
|
||
|
Any details of the investigation are not being given out at this time.
|
||
|
The Asst. Attorney General of Pheonix told Phrack Inc. that there were other
|
||
|
problems involving the investigation and that it was an ongoing investigation
|
||
|
for the last TWO years.
|
||
|
It is my understanding that Gail Thackeray and the Secret Service are not,
|
||
|
taking this lightly. She told Phrack inc. that they are not distinquishing
|
||
|
pirates, hackers, or phreakers. Basically, it's any kid with a modem that calls
|
||
|
a BBS with an alias. Yes, we are the witches, and we are being
|
||
|
hunted.
|
||
|
The following are Two news releases obtianed via fax through the U.S.
|
||
|
Secret Service for Phrack Inc.
|
||
|
|
||
|
N E W S R E L E A S E
|
||
|
FOR IMMEDIATE RELEASE CONTACT: Gail Thackeray
|
||
|
------------------------ Assitant Attorney General
|
||
|
May 9, 1990 @ 11:00 A.M. (602) 542-4266
|
||
|
|
||
|
Attorney General Bob Corbin announced today that in
|
||
|
connection with an eighteen-month joint investigation into
|
||
|
computer crime conducted with the United States Secret
|
||
|
Service and the United States Attorney's office, the Arizona
|
||
|
Attorney General's office has executed seven search warrants
|
||
|
in which computers, electronic bulletin boards, telephone
|
||
|
test equipment and records have been seized.
|
||
|
The Organized Crime and Racketeering Division
|
||
|
investigation involved complaints by Arizona and out of state
|
||
|
victims of substantial financial losses resulting from credit
|
||
|
card fraud and theft of long distance telephone and data
|
||
|
communications services, and by victims of attacks on
|
||
|
computer systems operated by government agencies, private
|
||
|
corporations, telephone companies, financial institutions,
|
||
|
credit bureaus, and a hospital.
|
||
|
The Arizona Attorney General's office received
|
||
|
information and technical assistance from the Glendale,
|
||
|
Arizona Police Department's Computer Crime Unit, and from
|
||
|
many private sector sources, including Bellcore (Bell
|
||
|
Communications Research), American Express, Communications
|
||
|
carriers U.S. Sprint, AT&T, MCI, Com Systems, MidAmerican
|
||
|
Communications, LDL Communications, and Shared Use Network.
|
||
|
Without the cooperation of these companies and of numerous
|
||
|
federal, state and local law enforcement agencies around the
|
||
|
country, this investigation would have been impossible.
|
||
|
The privacy of our citizens and the health of our
|
||
|
economy depend upon secure, reliable computer systems.
|
||
|
Computer fraud and attempts to compromise senstitive public
|
||
|
and private computer systems will not be tolerated.
|
||
|
Individuals who commit these offenses in Arizona can expect
|
||
|
to be prosecuted.
|
||
|
|
||
|
.end.
|
||
|
P R E S S R E L E A S E
|
||
|
FOR IMMEDIATE RELEASE Contact: Wendy Harnagel
|
||
|
Wednesday, May 9, 1990 United States Attorney's Office
|
||
|
---------------------- (602) 379-3011
|
||
|
PHOENIX -- Stephen M. McNamee, United States Attorney
|
||
|
District of Arizona, Robert K. Corbin, Attorney General for
|
||
|
the State of Arizona, and Henry R. Potosky, Acting Special
|
||
|
Agent in Charge of the United States Secret Service Office in
|
||
|
Phoenix, today announced that approximately twenty-seven
|
||
|
search warrants were executed on Monday and Tuesday, May 7
|
||
|
and 8, 1990, in various cities across the nation by 150
|
||
|
Secret Service agents along with state and local law
|
||
|
enforcement officials. The warrants were issued as a part of
|
||
|
Operation Sundevil, which was a two year investigation into
|
||
|
alleged illegal computer hacking activities.
|
||
|
The United States Secret Service, in cooperation with
|
||
|
the United States Attorney's Office, and the Attorney General
|
||
|
for the State of Arizona, established an operation utilizing
|
||
|
sophisticated investigative techniques, targeting computer
|
||
|
hackers who were alleged to have trafficked in and abuse
|
||
|
stolen credit card numbers, unauthorized long distance
|
||
|
dialing codes, and who conduct unauthorized access and damage
|
||
|
to computers. While the total amount of losses cannot be
|
||
|
calculated at this time, it is estimated that the losses may
|
||
|
run into the millions of dollars. For example, the
|
||
|
unauthorized accessing of long distance telephone credit
|
||
|
cards have resulted in uncollectible charges. The same is
|
||
|
true of the use of stolen credit card numbers. Individuals
|
||
|
are able to utilize the charge accounts to purchase items for
|
||
|
which no payment is made.
|
||
|
Federal search warrants were executed in the following
|
||
|
cities:
|
||
|
|
||
|
Chicago, IL
|
||
|
Cincinatti, OH
|
||
|
Detroit, MI
|
||
|
Los Angeles, CA
|
||
|
Miami, FL
|
||
|
Newark, NJ
|
||
|
New York, NY
|
||
|
Phoenix, AZ
|
||
|
Pittsburgh, PA
|
||
|
Plano, TX
|
||
|
Richmond, VA
|
||
|
San Diego, CA
|
||
|
San Jose, CA
|
||
|
Unlawful computer hacking imperils the health and
|
||
|
welfare of individuals, corporations and government agencies
|
||
|
in the United States who rely on computers and telephones to
|
||
|
communicate.
|
||
|
Technical and expert assistance was provided to the
|
||
|
United States Secret Service by telecommunication companies
|
||
|
including Pac Bel, AT&T, Bellcore, Bell South, MCI, U.S.
|
||
|
Sprint, Mid-American, Southwestern Bell, NYNEX, U.S. West,
|
||
|
and by the many corporate victims. All are to be commended
|
||
|
for their efforts for their efforts in researching intrusions
|
||
|
and documenting losses.
|
||
|
McNamee and Corbin expressed concern that the improper
|
||
|
and alleged illegal use of computers may become the White
|
||
|
Collar crime of the 1990's. McNamee and Corbin reiterated
|
||
|
that the state and federal government will vigorously pursue
|
||
|
criminal violations of statutes under their jurisdiction.
|
||
|
Three individuals were arrested yesterday in other
|
||
|
jurisdictions on collateral or independent state charges.
|
||
|
The investigations surrounding the activities of Operation
|
||
|
Sundevil are continuing.
|
||
|
The investigations are being conducted by agents of the
|
||
|
United States Secret Service and Assistant United States
|
||
|
Attoryney Tim Holtzen, District of Arizona, and Assistant
|
||
|
Arizona Attorney General Gail Thackery.
|
||
|
|
||
|
.end.
|
||
|
_______________________________________________________________________________
|
||
|
Virus mania
|
||
|
===========
|
||
|
Robert T. Morris started it all. Who cares, it's over and done with.
|
||
|
Never the less, it's being dragged out in every national paper. It's old news
|
||
|
so we won't cover it here, but we will tell you about something the Army has up
|
||
|
its sleeve.
|
||
|
Army is Looking for a Few Good Viruses
|
||
|
By Rory J. O'conner
|
||
|
Knight-Ridder Newspapers
|
||
|
______________________________________
|
||
|
The U.S. Army is looking for help to develop the seeds of a new-age germ
|
||
|
warfare: It wants business to help it turn computer "viruses" into military
|
||
|
weapons.
|
||
|
Experts predict the viruses, if sucessfully developed, could be used to
|
||
|
wreak havoc on the increasing number of computers in the battlefield. The
|
||
|
destructive computer programs which have increasingly damaged commercial and
|
||
|
research computer systems in the past four years, could be used to disrupt
|
||
|
military communications and feed misleading data to enemy commanders.
|
||
|
The viruses could aslo be used to alter the programming of crucial
|
||
|
communications satellites serving combat units, the experts said.
|
||
|
The Army is soliciting bids from small businesses to determine the
|
||
|
feasibility of using computer viruses in warefare. And it is willing to pay up
|
||
|
to $550,000 to a company that comes up with a plan for creating the programs -
|
||
|
and figures out how to use military radio systems to introduce them into enemy
|
||
|
computers.
|
||
|
A computer virus is a kind of program designed to disrupt normal operation
|
||
|
of a computer system or damage data ont hat system by altering or destroying
|
||
|
it. The rogue programs are most effective when introduced secretly into the
|
||
|
computer system of an unsuspecting user and when their damage is subtle or
|
||
|
hidden fromt he user for some time.
|
||
|
Viruses are also self-duplicating and can spread undetected from an
|
||
|
infected computer to other computer systems they contact.
|
||
|
So far, more than 60 computer viruses have been identified, most of them
|
||
|
attacking poorly guarded personal computers used by businesses, universities
|
||
|
and inividuals. The Army's virus would have to be more sophisticated than
|
||
|
those programs.
|
||
|
But some detractors of the concept say the Army could wind up with the
|
||
|
same problem it has with biological weapons: Creating destructive elements
|
||
|
that might get loose and cause widespread damage to its own forces as well as
|
||
|
civilians.
|
||
|
"This stuff is very dangerous, and most people involved in creating
|
||
|
viruses are not aware of the threat," said a Bay Area virus expert who asked ot
|
||
|
to be named. "You can't spread anthrax around the world and not have it come
|
||
|
back around to you. And the enemy is using the same kind of computers and
|
||
|
software that we are."
|
||
|
Many experts who are fighting the explosion in virus activity by amateur
|
||
|
programmers are especially angry at government efforts to develop the programs
|
||
|
for the military. Some say it is particulary troubling in light of the
|
||
|
sentencing of Robert T. Morris Jr. (Ed -Ick), convicted in federal court of
|
||
|
sending a similar program through a government sponsored network in 1988.
|
||
|
"It bothers me that the government says in one breath (viruses) are bad
|
||
|
and illegal and then asks for someone to develop them," said Glenn Tenney, a
|
||
|
San Mateco, Calif., programmer and organizer of the annual Computer Hackers
|
||
|
Conference. "If Morris had done the same thing for the Army, they'd have paid
|
||
|
him hundreds of thousands to do it. But he did it on the wrong side and got
|
||
|
punished."
|
||
|
Computer experts say creating a virus to the Army's specifications is
|
||
|
possible with current technology - although some of the Army's requirements
|
||
|
could make developing it more difficult than creating an ordinary personal
|
||
|
computer virus.
|
||
|
First, military computer systems are usually designed with far more
|
||
|
security features than commercial systems, making it much harder for a virus to
|
||
|
enter the systems. Second, the Army is emphasizings the use of radio
|
||
|
communication to inject the virus into enemy systems. Normally, computer
|
||
|
viruses spread through the exchange of floppy disks that contain the rogue
|
||
|
program or along wires connecting several computers. Using complex military
|
||
|
radio signals instead would require expertise that mose programmers don't have.
|
||
|
.end
|
||
|
_______________________________________________________________________________
|
||
|
RIPCO May 8th, 1990
|
||
|
----- -------------
|
||
|
Operation Sun-Devil claimed more than just a few "Codelords" around the
|
||
|
states, it claimed one of the oldest and more popular boards. Nobody knows
|
||
|
when or if RIPCO shall return.
|
||
|
Reportedly, Dr. Ripco was charge on a hand-gun violation after his house
|
||
|
was searched. Phrack inc. can't comment on this.
|
||
|
The following is the exact transcript of the message left on RIPCO's
|
||
|
answering maching after Operation Sun-Devil.
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
This is 528-5020.
|
||
|
As you are probably aware, on May 8, the Secret Service conducted a series
|
||
|
of raids across the country. Early news reports indicate these raids
|
||
|
involved people and computers that could be connected with credit card and
|
||
|
long distance toll fraud. Although no arrests or charges were made, Ripco
|
||
|
BBS was confiscated on that morning. It's involvement at this time is
|
||
|
unknown. Since it is unlikely that the system will ever return, I'd just l
|
||
|
say goodbye, and thanks for your support for the last six and a half years.
|
||
|
It's been interesting, to say the least.
|
||
|
Talk to ya later.
|
||
|
{Dr. Ricpo}
|
||
|
*** END OF VOICE MESSAGE ***
|
||
|
_______________________________________________________________________________
|