mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
945 lines
48 KiB
Text
945 lines
48 KiB
Text
![]() |
==Phrack Inc.==
|
||
|
|
||
|
Volume Four, Issue Forty, File 14 of 14
|
||
|
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
PWN PWN
|
||
|
PWN Phrack World News PWN
|
||
|
PWN PWN
|
||
|
PWN Issue 40 / Part 3 of 3 PWN
|
||
|
PWN PWN
|
||
|
PWN Compiled by Datastream Cowboy PWN
|
||
|
PWN PWN
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
|
||
|
|
||
|
Bellcore Threatens 2600 Magazine With Legal Action July 15, 1992
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
THE FOLLOWING CERTIFIED LETTER HAS BEEN RECEIVED BY 2600 MAGAZINE. WE WELCOME
|
||
|
ANY COMMENTS AND/OR INTERPRETATIONS.
|
||
|
|
||
|
Leonard Charles Suchyta
|
||
|
General Attorney
|
||
|
Intellectual Property Matters
|
||
|
|
||
|
Emanuel [sic] Golstein [sic], Editor
|
||
|
2600 Magazine
|
||
|
P.O. Box 752
|
||
|
Middle Island, New York 11953-0752
|
||
|
|
||
|
Dear Mr. Golstein:
|
||
|
|
||
|
It has come to our attention that you have somehow obtained and published in
|
||
|
the 1991-1992 Winter edition of 2600 Magazine portions of certain Bellcore
|
||
|
proprietary internal documents.
|
||
|
|
||
|
This letter is to formally advise you that, if at any time in the future you
|
||
|
(or your magazine) come into possession of, publish, or otherwise disclose any
|
||
|
Bellcore information or documentation which either (i) you have any reason to
|
||
|
believe is proprietary to Bellcore or has not been made publicly available by
|
||
|
Bellcore or (ii) is marked "proprietary," "confidential," "restricted," or with
|
||
|
any other legend denoting Bellcore's proprietary interest therein, Bellcore
|
||
|
will vigorously pursue all legal remedies available to it including, but not
|
||
|
limited to, injunctive relief and monetary damages, against you, your magazine,
|
||
|
and its sources.
|
||
|
|
||
|
We trust that you fully understand Bellcore's position on this matter.
|
||
|
|
||
|
Sincerely,
|
||
|
|
||
|
|
||
|
LCS/sms
|
||
|
|
||
|
|
||
|
LCS/CORR/JUN92/golstein.619
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Emmanuel Goldstein Responds
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
The following reply has been sent to Bellcore. Since we believe they have
|
||
|
received it by now, we are making it public.
|
||
|
|
||
|
Emmanuel Goldstein
|
||
|
Editor, 2600 Magazine
|
||
|
PO Box 752
|
||
|
Middle Island, NY 11953
|
||
|
|
||
|
July 20, 1992
|
||
|
|
||
|
Leonard Charles Suchyta
|
||
|
LCC 2E-311
|
||
|
290 W. Mt. Pleasant Avenue
|
||
|
Livingston, NJ 07039
|
||
|
|
||
|
Dear Mr. Suchyta:
|
||
|
|
||
|
We are sorry that the information published in the Winter 1991-92 issue of 2600
|
||
|
disturbs you. Since you do not specify which article you take exception to, we
|
||
|
must assume that you're referring to our revelation of built-in privacy holes
|
||
|
in the telephone infrastructure which appeared on Page 42. In that piece, we
|
||
|
quoted from an internal Bellcore memo as well as Bell Operating Company
|
||
|
documents. This is not the first time we have done this. It will not be the
|
||
|
last.
|
||
|
|
||
|
We recognize that it must be troubling to you when a journal like ours
|
||
|
publishes potentially embarrassing information of the sort described above.
|
||
|
But as journalists, we have a certain obligation that cannot be cast aside
|
||
|
every time a large and powerful entity gets annoyed. That obligation compels
|
||
|
us to report the facts as we know them to our readers, who have a keen interest
|
||
|
in this subject matter. If, as is often the case, documents, memoranda, and/or
|
||
|
bits of information in other forms are leaked to us, we have every right to
|
||
|
report on the contents therein. If you find fault with this logic, your
|
||
|
argument lies not with us, but with the general concept of a free press.
|
||
|
|
||
|
And, as a lawyer specializing in intellectual property law, you know that you
|
||
|
cannot in good faith claim that merely stamping "proprietary" or "secret" on a
|
||
|
document establishes that document as a trade secret or as proprietary
|
||
|
information. In the absence of a specific explanation to the contrary, we must
|
||
|
assume that information about the publicly supported telephone system and
|
||
|
infrastructure is of public importance, and that Bellcore will have difficulty
|
||
|
establishing in court that any information in our magazine can benefit
|
||
|
Bellcore's competitors, if indeed Bellcore has any competitors.
|
||
|
|
||
|
If in fact you choose to challenge our First Amendment rights to disseminate
|
||
|
important information about the telephone infrastructure, we will be compelled
|
||
|
to respond by seeking all legal remedies against you, which may include
|
||
|
sanctions provided for in Federal and state statutes and rules of civil
|
||
|
procedure. We will also be compelled to publicize your use of lawsuits and the
|
||
|
threat of legal action to harass and intimidate.
|
||
|
|
||
|
Sincerely,
|
||
|
|
||
|
Emmanuel Goldstein
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Exposed Hole In Telephone Network Draws Ire Of Bellcore July 24, 1992
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
Taken from Communications Daily (Page 5)
|
||
|
|
||
|
Anyone Can Wiretap Your Phone
|
||
|
|
||
|
Major security hole in telephone network creates "self-serve" monitoring
|
||
|
feature allowing anyone to listen in on any telephone conversation they choose.
|
||
|
Weakness involves feature called Busy Line Verification (BLV), which allows
|
||
|
phone companies to "break into" conversation at any time. BLV is used most
|
||
|
often by operators entering conversation to inform callers of emergency
|
||
|
message. But BLV feature can be used by anyone with knowledge of network's
|
||
|
weakness to set up ad hoc 'wiretap' and monitor conversations, said Emmanuel
|
||
|
Goldstein, editor of 2600 Magazine, which published article in its Winter 1991
|
||
|
issue.
|
||
|
|
||
|
2600 Magazine is noted for finding and exposing weaknesses of
|
||
|
telecommunications. It's named for frequency of whistle, at one time given
|
||
|
away with Cap'n Crunch cereal, which one notorious hacker discovered could,
|
||
|
when blown into telephone receiver, allow access to open 800 line. Phone
|
||
|
companies have since solved that problem.
|
||
|
|
||
|
Security risks are outlined in article titled "U.S. Phone Companies Face Built-
|
||
|
In Privacy Hole" that quotes from internal Bellcore memo and Bell Operating Co.
|
||
|
documents: "'A significant and sophisticated vulnerability' exists that could
|
||
|
affect the security and privacy of BLV." Article details how, after following 4
|
||
|
steps, any line is susceptible to secret monitoring. One document obtained by
|
||
|
2600 said: "There is no proof the hacker community knows about the
|
||
|
vulnerability."
|
||
|
|
||
|
When Bellcore learned of article, it sent magazine harsh letter threatening
|
||
|
legal action. Letter said that if at any time in future magazine "comes into
|
||
|
possession of, publishes, or otherwise discloses any Bellcore information"
|
||
|
organization will "vigorously pursue all legal remedies available to it
|
||
|
including, but not limited to, injunctive and monetary damages." Leonard
|
||
|
Suchyta, Bellcore General Attorney for Intellectual Property Matters, said
|
||
|
documents in magazine's possession "are proprietary" and constitute "a trade
|
||
|
secret" belonging to Bellcore and its members -- RBOCs. He said documents are
|
||
|
"marked with 'Proprietary' legend" and "the law says you can't ignore this
|
||
|
legend, its [Bellcore's] property." Suchyta said Bellcore waited so long to
|
||
|
respond to publication because "I think the article, as we are not subscribers,
|
||
|
was brought to our attention by a 3rd party." He said this is first time he
|
||
|
was aware that magazine had published such Bellcore information.
|
||
|
|
||
|
But Goldstein said in reply letter to Bellcore: "This is not the first time we
|
||
|
have done this. It will not be the last." He said he thinks Bellcore is
|
||
|
trying to intimidate him, "but they've come up against the wrong publication
|
||
|
this time." Goldstein insisted that documents were leaked to his magazine:
|
||
|
"While we don't spread the documents around, we will report on what's contained
|
||
|
within." Suchyta said magazine is obligated to abide by legend stamped on
|
||
|
documents. He said case law shows that the right to publish information hinges
|
||
|
on whether it "has been lawfully acquired. If it has a legend on it, it's sort
|
||
|
of hard to say it's lawfully acquired."
|
||
|
|
||
|
Goldstein said he was just making public what already was known: There's known
|
||
|
privacy risk because of BLV weakness: "If we find something out, our first
|
||
|
instinct is to tell people about it. We don't keep things secret." He said
|
||
|
information about security weaknesses in phone network "concerns everybody."
|
||
|
Just because Bellcore doesn't want everyone to know about its shortcomings and
|
||
|
those of telephone network is hardly reason to stifle that information,
|
||
|
Goldstein said. "Everybody should know if their phone calls can be listened in
|
||
|
on."
|
||
|
|
||
|
Suchyta said that to be considered "valuable," information "need not be of
|
||
|
super, super value," like proprietary software program "where you spent
|
||
|
millions of dollars" to develop it. He said information "could well be your
|
||
|
own information that would give somebody an advantage or give them some added
|
||
|
value they wouldn't otherwise have had if they had not taken it from you."
|
||
|
Goldstein said he was "sympathetic" to Bellcore's concerns but "fact is, even
|
||
|
when such weaknesses are exposed, [phone companies] don't do anything about
|
||
|
them." He cited recent indictments in New York where computer hackers were
|
||
|
manipulating telephone, exploiting weaknesses his magazine had profiled long
|
||
|
ago. "Is there any security at all [on the network]?" he said. "That's the
|
||
|
question we have to ask ourselves."
|
||
|
|
||
|
Letter from Bellcore drew burst of responses from computer community when
|
||
|
Goldstein posted it to electronic computer conference. Lawyers specializing in
|
||
|
computer law responded, weighing in on side of magazine. Attorney Lance Rose
|
||
|
said: "There is no free-floating 'secrecy' right . . . Even if a document says
|
||
|
'confidential' that does not mean it was disclosed to you with an understanding
|
||
|
of confidentiality -- which is the all-important question." Michael Godwin,
|
||
|
general counsel for Electronic Frontier Foundation, advocacy group for the
|
||
|
computer community, said: "Trade secrets can qualify as property, but only if
|
||
|
they're truly trade secrets. Proprietary information can (sort of) qualify as
|
||
|
property if there's a breach of a fiduciary duty." Both lawyers agreed that
|
||
|
magazine was well within its rights in publishing information. "If Emmanuel
|
||
|
did not participate in any way in encouraging or aiding in the removal of the
|
||
|
document from Bellcore . . . that suggests he wouldn't be liable," Godwin said.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Bellcore And 2600 Dispute Publishing Of Article July 27, 1992
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
By Barbara E. McMullen & John F. McMullen (Newsbytes)
|
||
|
|
||
|
MIDDLE ISLAND, NY -- Eric Corley a/k/a "Emmanuel Goldstein", editor and
|
||
|
publisher of 2600 Magazine: The Hacker Quarterly, has told Newsbytes that he
|
||
|
will not be deterred by threats from Bellcore from publishing material which he
|
||
|
considers important for his readership.
|
||
|
|
||
|
Earlier this month, Corley received a letter (addressed to "Emanuel Golstein")
|
||
|
from Leonard Charles Suchyta, General Attorney, Intellectual Property Matters
|
||
|
at Bellcore taking issue with the publication by 2600 of material that Suchyta
|
||
|
referred to as "portions of certain Bellcore proprietary internal documents."
|
||
|
|
||
|
The letter continued "This letter is to formally advise you that, if at any
|
||
|
time in the future you (or your magazine) come into possession of, publish, or
|
||
|
otherwise disclose any Bellcore information or documentation which either (i)
|
||
|
you have any reason to believe is proprietary to Bellcore or has not been made
|
||
|
publicly available by Bellcore or (ii) is marked "proprietary," "confidential,"
|
||
|
"restricted," or with any other legend denoting Bellcore's proprietary interest
|
||
|
therein, Bellcore will vigorously pursue all legal remedies available to it
|
||
|
including, but not limited to, injunctive relief and monetary damages, against
|
||
|
you, your magazine, and its sources."
|
||
|
|
||
|
While the letter did not mention any specific material published by 2600,
|
||
|
Corley told Newsbytes that he believes that Suchyta's letter refers to an
|
||
|
article entitled "U.S. Phone Companies Face Built-In Privacy Hole".that appears
|
||
|
on page 42 of the Winter 1991 issue. Corley said "What we published was
|
||
|
derived from a 1991 internal Bellcore memo as well as Bell Operating Company
|
||
|
documents that were leaked to us. We did not publish the documents. However,
|
||
|
we did read what was sent to us and wrote an article based upon that. The
|
||
|
story focuses on how the phone companies are in an uproar over a 'significant
|
||
|
and sophisticated vulnerability' that could result in BLV (busy line
|
||
|
verification) being used to listen in on phone calls."
|
||
|
|
||
|
The 650-word article said, in part, "By exploiting a weakness, it's possible
|
||
|
to remotely listen in on phone conversations at a selected telephone number.
|
||
|
While the phone companies can do this any time they want, this recently
|
||
|
discovered self-serve monitoring feature has created a telco crisis of sorts."
|
||
|
|
||
|
The article further explained how people might exploit the security hole,
|
||
|
saying "The intruder can listen in on phone calls by following these four
|
||
|
steps:
|
||
|
|
||
|
"1. Query the switch to determine the Routing Class Code assigned to the BLV
|
||
|
trunk group.
|
||
|
"2. Find a vacant telephone number served by that switch.
|
||
|
"3. Via recent change, assign the Routing Class Code of the BLV trunks to the
|
||
|
Chart Column value of the DN (directory number) of the vacant telephone
|
||
|
number.
|
||
|
"4. Add call forwarding to the vacant telephone number (Remote Call Forwarding
|
||
|
would allow remote definition of the target telephone number while Call
|
||
|
Forwarding Fixed would only allow the specification of one target per
|
||
|
recent change message or vacant line)."
|
||
|
|
||
|
"By calling the vacant phone number, the intruder would get routed to the BLV
|
||
|
trunk group and would then be connected on a "no-test vertical" to the target
|
||
|
phone line in a bridged connection."
|
||
|
|
||
|
The article added "According to one of the documents, there is no proof that
|
||
|
the hacker community knows about the vulnerability. The authors did express
|
||
|
great concern over the publication of an article entitled 'Central Office
|
||
|
Operations - The End Office Environment' which appeared in the electronic
|
||
|
newsletter Legion of Doom/Hackers Technical Journal. In this article,
|
||
|
reference is made to the 'No Test Trunk'."
|
||
|
|
||
|
The article concludes "even if hackers are denied access to this "feature",
|
||
|
BLV networks will still have the capability of being used to monitor phone
|
||
|
lines. Who will be monitored and who will be listening are two forever
|
||
|
unanswered questions."
|
||
|
|
||
|
Corley responded to to Suchyta's letter on July 20th, saying "I assume that
|
||
|
you're referring to our revelation of built-in privacy holes in the telephone
|
||
|
infrastructure which appeared on Page 42. In that piece, we quoted from an
|
||
|
internal Bellcore memo as well as Bell Operating Company documents. This is
|
||
|
not the first time we have done this. It will not be the last.
|
||
|
|
||
|
"We recognize that it must be troubling to you when a journal like ours
|
||
|
publishes potentially embarrassing information of the sort described above.
|
||
|
But as journalists, we have a certain obligation that cannot be cast aside
|
||
|
every time a large and powerful entity gets annoyed. That obligation compels
|
||
|
us to report the facts as we know them to our readers, who have a keen interest
|
||
|
in this subject matter. If, as is often the case, documents, memoranda, and/or
|
||
|
bits of information in other forms are leaked to us, we have every right to
|
||
|
report on the contents therein. If you find fault with this logic, your
|
||
|
argument lies not with us, but with the general concept of a free press.
|
||
|
|
||
|
"And, as a lawyer specializing in intellectual property law, you know that
|
||
|
you cannot in good faith claim that merely stamping "proprietary" or "secret"
|
||
|
on a document establishes that document as a trade secret or as proprietary
|
||
|
information. In the absence of a specific explanation to the contrary, we must
|
||
|
assume that information about the publicly supported telephone system and
|
||
|
infrastructure is of public importance, and that Bellcore will have difficulty
|
||
|
establishing in court that any information in our magazine can benefit
|
||
|
Bellcore's competitors, if indeed Bellcore has any competitors.
|
||
|
|
||
|
"If in fact you choose to challenge our First Amendment rights to disseminate
|
||
|
important information about the telephone infrastructure, we will be compelled
|
||
|
to respond by seeking all legal remedies against you, which may include
|
||
|
sanctions provided for in Federal and state statutes and rules of civil
|
||
|
procedure. We will also be compelled to publicize your use of lawsuits and the
|
||
|
threat of legal action to harass and intimidate.
|
||
|
|
||
|
Sincerely,
|
||
|
Emmanuel Goldstein"
|
||
|
|
||
|
Corley told Newsbytes "Bellcore would never have attempted this with the New
|
||
|
York Times. They think that it would, however, be easy to shut us up by simple
|
||
|
threats because of our size. They are wrong. We are responsible journalists;
|
||
|
we know the rules and we abide by them. I will, by the way, send copies of the
|
||
|
article in question to anyone who request it. Readers may then judge for
|
||
|
themselves whether any boundaries have been crossed."
|
||
|
|
||
|
Corley, who hosts the weekly "Off the Hook" show on New York City's WBAI radio
|
||
|
station, said that he had discussed the issue on the air and had received
|
||
|
universal support from his callers. Corley also told Newsbytes, that, although
|
||
|
he prefers to be known by his nomme de plume (taken from George Orwell's
|
||
|
1984), he understands that the press fells bound to use his actual name. He
|
||
|
said that, in the near future, he will "end the confusion by having my name
|
||
|
legally changed."
|
||
|
|
||
|
Bellcore personnel were unavailable for comment on any possible response to
|
||
|
Corley's letter.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Interview With Ice Man And Maniac July 22, 1992
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
By Joshua Quittner (New York Newsday)(Page 83)
|
||
|
|
||
|
Ice Man and Maniac are two underground hackers in the New England area that
|
||
|
belong to a group known as Micro Pirates, Incorporated. They agreed to be
|
||
|
interviewed if their actual identities were not revealed.
|
||
|
|
||
|
[Editor's Note: They are fools for doing this, especially in light of how
|
||
|
Phiber Optik's public media statements and remarks will
|
||
|
ultimately be used against him.]
|
||
|
|
||
|
Q: How do you define computer hacking?
|
||
|
|
||
|
Maniac: Hacking is not exploration of computer systems. It's more of an
|
||
|
undermining of security. That's how I see it.
|
||
|
|
||
|
Q: How many people are in your group, Micro Pirates Incorporated?
|
||
|
|
||
|
Ice Man: Fifteen or 14.
|
||
|
|
||
|
Maniac: We stand for similar interests. It's an escape, you know. If I'm not
|
||
|
doing well in school, I sit down on the board and talk to some guy in
|
||
|
West Germany, trade new codes of their latest conquest. Escape.
|
||
|
Forget about the real world.
|
||
|
|
||
|
Ice Man. It's more of a hobby. Why do it? You can't exactly stop. I came
|
||
|
about a year-and-a-half ago, and I guess you could say I'm one of the
|
||
|
ones on a lower rung, like in knowledge. I do all the -- you wouldn't
|
||
|
call it dirty work -- phone calls. I called you -- that kind of
|
||
|
thing.
|
||
|
|
||
|
Q: You're a "social engineer"?
|
||
|
|
||
|
Ice Man: Social engineering -- I don't know who coined the term. It's using
|
||
|
conversation to exchange information under false pretenses. For
|
||
|
example, posing as a telecommunications employee to gain more
|
||
|
knowledge and insight into the different [phone network] systems.
|
||
|
|
||
|
Q: What social engineering have you done?
|
||
|
|
||
|
Maniac: We hacked into the system that keeps all the grades for the public
|
||
|
school system. It's the educational mainframe at Kingsborough
|
||
|
Community College. But we didn't change anything.
|
||
|
|
||
|
Ice Man: They have the mainframe that stores all the schedules, Regents scores,
|
||
|
ID numbers of all the students in the New York high school area. You
|
||
|
have to log in as a school, and the password changes every week.
|
||
|
|
||
|
Q: How did you get the password?
|
||
|
|
||
|
Ice Man: Brute force and social engineering. I was doing some social
|
||
|
engineering in school. I was playing the naive person with an
|
||
|
administrator, asking all these questions toward what is it, where is
|
||
|
it and how do you get in.
|
||
|
|
||
|
Q: I bet you looked at your grades. How did you do?
|
||
|
|
||
|
Ice Man: High 80s.
|
||
|
|
||
|
Q. And you could have changed Regents scores?
|
||
|
|
||
|
Ice Man: I probably wouldn't have gotten away with it, and I wouldn't say I
|
||
|
chose not to on a moral basis. I'd rather say on a security basis.
|
||
|
|
||
|
Q: What is another kind of social engineering?
|
||
|
|
||
|
Maniac: There's credit-card fraud and calling-card fraud. You call up and
|
||
|
say, "I'm from the AT&T Corporation. We're having trouble with your
|
||
|
calling-card account. Could you please reiterate to us your four-
|
||
|
digit PIN number?" People, being kind of God-fearing -- as AT&T is
|
||
|
somewhat a God -- will say, "Here's my four-digit PIN number."
|
||
|
|
||
|
Q: Hackers from another group, MOD, were arrested recently and charged with,
|
||
|
among other things, selling inside information about how to penetrate
|
||
|
credit bureaus. Have you cleaned up your act?
|
||
|
|
||
|
Maniac: We understand the dangers of it now. We're not as into it. We
|
||
|
understand what people go through when they find out a few thousand
|
||
|
dollars have been charged to their credit-card account.
|
||
|
|
||
|
Q: Have you hacked into credit bureaus?
|
||
|
|
||
|
Ice Man: We were going to look up your name.
|
||
|
|
||
|
Maniac: CBI [Credit Bureau International, owned by Equifax, one of the largest
|
||
|
national credit bureaus], is pretty insecure, to tell you the truth.
|
||
|
|
||
|
Q: Are you software pirates, too?
|
||
|
|
||
|
Maniac: Originally. Way back when.
|
||
|
|
||
|
Ice Man: And then we branched out and into the hacking area. Software piracy
|
||
|
is, in the computer underground, the biggest thing. There are groups
|
||
|
like THG and INC, which are international. THG is The Humble Guys.
|
||
|
INC is International Network of Crackers, and I've recently found out
|
||
|
that it's run by 14 and 15-year-olds. They have people who work in
|
||
|
companies, and they'll take the software and they'll crack it -- the
|
||
|
software protection -- and then distribute it.
|
||
|
|
||
|
Q: Are there many hacking groups in New York?
|
||
|
|
||
|
Maniac: Three or four. LOD [the Legion of Doom, named by hacker Lex Luthor],
|
||
|
MOD, MPI and MOB [Men of Business].
|
||
|
|
||
|
Q: How do your members communicate?
|
||
|
|
||
|
Ice Man: The communication of choice is definitely the modem [to access
|
||
|
underground electronic bulletin boards where members leave messages
|
||
|
for each other or "chat" in real time]. After that is the voice mail
|
||
|
box [VMB]. VMBs are for communications between groups.
|
||
|
|
||
|
A company, usually the same company that has beepers and pagers and
|
||
|
answering services, has a voice-mail-box service. You call up [after
|
||
|
hacking out an access code that gives the user the ability to create
|
||
|
new voice mail boxes on a system] and can enter in a VMB number.
|
||
|
Occasionally they have outdial capabilities that allow you to call
|
||
|
anywhere in the world. I call about five every day. It's not really
|
||
|
my thing.
|
||
|
|
||
|
Q: Is your group racially integrated?
|
||
|
|
||
|
Ice Man: Half of them are Asian. Also we have, I think, one Hispanic. I never
|
||
|
met him. Race, religion -- nobody cares. The only thing that would
|
||
|
alienate you in any way would be if you were known as a lamer. If you
|
||
|
just took, took, took and didn't contribute to the underground. It's
|
||
|
how good you are, how you're respected.
|
||
|
|
||
|
Maniac: We don't work on a racial basis or an ethnic basis. We work on a
|
||
|
business basis. This is an organized hobby. You do these things for
|
||
|
us and you get a little recognition for it.
|
||
|
|
||
|
Ice Man: Yeah. If you're a member of our group and you need a high-speed
|
||
|
modem, we'll give you one, on a loan basis.
|
||
|
|
||
|
Q: How does somebody join MPI?
|
||
|
|
||
|
Maniac: They have to contact either of us on the boards.
|
||
|
|
||
|
Ice Man: And I'll go through the whole thing [with them], validating them,
|
||
|
checking their references, asking them questions, so we know what
|
||
|
they're talking about. And if it's okay, then we let them in. We
|
||
|
have members in 516, 718, 212, 201, 408, and 908. We're talking to
|
||
|
someone in Florida, but he's not a member yet.
|
||
|
|
||
|
Q: Are any MPI members in other hacking groups?
|
||
|
|
||
|
Ice Man: I know of no member of MPI that is in any other group. I wouldn't
|
||
|
call it betrayal, but it's like being in two secret clubs at one time.
|
||
|
I would want them faithful to my group, not any other group. There is
|
||
|
something called merging, a combination of both groups that made them
|
||
|
bigger and better. A lot of piracy groups did that.
|
||
|
|
||
|
Q: Aren't you concerned about breaking the law?
|
||
|
|
||
|
Maniac: Breaking the law? I haven't gotten caught. If I do get caught, I
|
||
|
won't be stupid and say I was exploring -- I'm not exploring. I'm
|
||
|
visiting, basically. If you get caught, you got to serve your time.
|
||
|
I'm not going to fight it.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
FBI Unit Helps Take A Byte Out Of Crime July 15, 1992
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
By Bill Gertz (The Washington Times)(Page A4)
|
||
|
|
||
|
FBI crime busters are targeting elusive computer criminals who travel the world
|
||
|
by keyboard, telephone and computer screen and use such code names as "Phiber
|
||
|
Optik," "Masters of Disaster," "Acid Phreak" and "Scorpion."
|
||
|
|
||
|
"Law enforcement across the board recognizes that this is a serious emerging
|
||
|
crime problem, and it's only going to continue to grow in the future," said
|
||
|
Charles L. Owens, chief of the FBI's economic crimes unit.
|
||
|
|
||
|
Last week in New York, federal authorities unsealed an indictment against five
|
||
|
computer hackers, ages 18 to 22, who were charged with stealing long-distance
|
||
|
phone service and credit bureau information and who penetrated a wide variety
|
||
|
of computer networks.
|
||
|
|
||
|
The FBI is focusing its investigations on major intrusions into banking and
|
||
|
government computers and when the objective is stealing money, Mr. Owens said
|
||
|
in an interview.
|
||
|
|
||
|
FBI investigations of computer crimes have doubled in the past year, he said,
|
||
|
adding that only about 11 percent to 15 percent of computer crimes are reported
|
||
|
to law enforcement agencies. Because of business or personal reasons, victims
|
||
|
often are reluctant to come forward, he said.
|
||
|
|
||
|
Currently, FBI agents are working on more than 120 cases, including at least
|
||
|
one involving a foreign intelligence agency. Mr. Owens said half of the active
|
||
|
cases involve hackers operating overseas, but he declined to elaborate.
|
||
|
|
||
|
The FBI has set up an eight-member unit in its Washington field office devoted
|
||
|
exclusively to solving computer crimes.
|
||
|
|
||
|
The special team, which includes computer scientists, electrical engineers and
|
||
|
experienced computer system operators, first handled the tip that led to the
|
||
|
indictment of the five hackers in New York, according to agent James C. Settle,
|
||
|
who directs the unit.
|
||
|
|
||
|
Computer criminals, often equipped with relatively unsophisticated Commodore 64
|
||
|
or Apple II computers, first crack into international telephone switching
|
||
|
networks to make free telephone calls anywhere in the world, Mr. Settle said.
|
||
|
|
||
|
Hackers then can spend up to 16 hours a day, seven days a week, breaking into
|
||
|
national and international computer networks such as the academic-oriented
|
||
|
Internet, the National Aeronautics and Space Administration's Span-Net and the
|
||
|
Pentagon's Milnet.
|
||
|
|
||
|
To prevent being detected, unauthorized computer users "loop and weave" through
|
||
|
computer networks at various locations in the process of getting information.
|
||
|
|
||
|
"A lot of it is clearly for curiosity, the challenge of breaking into systems,"
|
||
|
Mr. Settle said. "The problem is that they can take control of the system."
|
||
|
|
||
|
Also, said Mr. Owens, computer hackers who steal such information from
|
||
|
commercial data banks may turn to extortion as a way to make money.
|
||
|
|
||
|
Mr. Settle said there are also "indications" that computer criminals are
|
||
|
getting involved in industrial espionage.
|
||
|
|
||
|
The five hackers indicted in New York on conspiracy, computer-fraud, computer
|
||
|
tampering, and wire-fraud charges called themselves "MOD," for Masters of
|
||
|
Deception or Masters of Disaster.
|
||
|
|
||
|
The hackers were identified in court papers as Julio Fernandez, 18, John Lee,
|
||
|
21, Mark Abene, 20, Elias Ladopoulos, 22, and Paul Stira, 22. All live in the
|
||
|
New York City area.
|
||
|
|
||
|
Mr. Fernandez and Mr. Lee intercepted data communications from a computer
|
||
|
network operated by the Bank of America, court papers said.
|
||
|
|
||
|
They also penetrated a computer network of the Martin Marietta Electronics
|
||
|
Information and Missile Group, according to the court documents.
|
||
|
|
||
|
The hackers obtained personal information stored in credit bureau computers,
|
||
|
with the intention of altering it "to destroy people's lives or make them look
|
||
|
like saints," the indictment stated.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
And Today's Password Is... May 26, 1992
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
By Robert Matthews (The Daily Telegraph)(page 26)
|
||
|
|
||
|
"Ways Of Keeping Out The Determined Hacker"
|
||
|
|
||
|
One of the late Nobel Prize-winning physicist Richard Feynman's favorite
|
||
|
stories was how he broke into top-secret atomic bomb files at Los Alamos by
|
||
|
guessing that the lock combination was 271828, the first six digits of the
|
||
|
mathematical constant "e". Apart from being amusing, Feynman's anecdote stands
|
||
|
as a warning to anyone who uses dates, names or common words for their computer
|
||
|
password.
|
||
|
|
||
|
As Professor Peter Denning, of George Mason University, Virginia, points out in
|
||
|
American Scientist, for all but the most trivial secrets, such passwords simply
|
||
|
aren't good enough. Passwords date back to 1960, and the advent of time-
|
||
|
sharing systems that allowed lots of users access to files stored on a central
|
||
|
computer. It was not long before the standard tricks for illicitly obtaining
|
||
|
passwords emerged: Using Feynman-style educated guessing, standing behind
|
||
|
computer users while they typed in their password or trying common system
|
||
|
passwords like "guest" or "root". The biggest security nightmare is, however,
|
||
|
the theft of the user-password file, which is used by the central computer to
|
||
|
check any password typed in.
|
||
|
|
||
|
By the mid-1970s, ways of tackling this had been developed. Using so-called
|
||
|
"one-way functions", each password was encrypted in a way that cannot be
|
||
|
unscrambled. The password file then contains only apparently meaningless
|
||
|
symbols, of no obvious use to the would-be hacker. But, as Denning warns, even
|
||
|
this can be beaten if passwords are chosen sloppily. Instead of trying to
|
||
|
unscramble the file, hackers can simply feed common names and dates -- or even
|
||
|
the entire English dictionary -- through the one-way function to see if the end
|
||
|
result matches anything on the scrambled password file. Far from being a
|
||
|
theoretical risk, this technique was used during the notorious Project
|
||
|
Equalizer case in 1987, when KGB-backed hackers in Hanover broke the passwords
|
||
|
of Unix-based computers in America.
|
||
|
|
||
|
Ultimately, the only way to solve the password problem is to free people of
|
||
|
their fear of forgetting more complex ones. The long-term solution, says
|
||
|
Denning, probably lies with the use of smart-card technology. One option is a
|
||
|
card which generates different passwords once a minute, using a formula based
|
||
|
on the time given by an internal clock. The user then logs on using this
|
||
|
password. Only if the computer confirms that the password corresponds to the
|
||
|
log-on time is the user allowed to continue. Another smart-card technique is
|
||
|
the "challenge-response" protocol. Users first log on to their computer under
|
||
|
their name, and are then "challenged" by a number appearing on the screen.
|
||
|
Keying this into their smart card, a "response number" is generated by a
|
||
|
formula unique to each smart card. If this number corresponds to the response
|
||
|
expected from a particular user's smart card, the computer allows access. A
|
||
|
number of companies are already marketing smart-card systems, although the
|
||
|
technology has yet to become popular.
|
||
|
|
||
|
In the meantime, Denning says that avoiding passwords based on English words
|
||
|
would boost security. He highlights one simple technique for producing non-
|
||
|
standard words that are nonetheless easy to remember: "Pass-phrases". For
|
||
|
this, one merely invents a nonsensical phrase like "Martin says Unix gives gold
|
||
|
forever", and uses the first letter of each word to generate the password:
|
||
|
MSUGGF. Such a password will defeat hackers, even if the password file is
|
||
|
stolen, as it does not appear in any dictionary. However, Denning is wary of
|
||
|
giving any guarantees. One day, he cautions, someone may draw up a
|
||
|
computerized dictionary of common phrases. "The method will probably be good
|
||
|
for a year or two, until someone who likes to compile these dictionaries starts
|
||
|
to attack it."
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Outgunned "Computer Cops" Track High-Tech Criminals June 8, 1992
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
By Tony Rogers (Associated Press)
|
||
|
|
||
|
BOSTON -- The scam was simple. When a company ordered an airline ticket on its
|
||
|
credit card, a travel agent entered the card number into his computer and
|
||
|
ordered a few extra tickets.
|
||
|
|
||
|
The extra tickets added up and the unscrupulous agent sold them for thousands
|
||
|
of dollars.
|
||
|
|
||
|
But the thief eventually attracted attention and authorities called in Robert
|
||
|
McKenna, a prosecutor in the Suffolk County district attorney's office. He is
|
||
|
one of a growing, but still outgunned posse of investigators who track high-
|
||
|
tech villains.
|
||
|
|
||
|
After the thief put a ticket to Japan on a local plumbing company's account, he
|
||
|
was arrested by police McKenna had posing as temporary office workers. He was
|
||
|
convicted and sentenced to a year in prison.
|
||
|
|
||
|
But the sleuths who track high-tech lawbreakers say too many crimes can be
|
||
|
committed with a computer or a telephone, and too few detectives are trained to
|
||
|
stop them.
|
||
|
|
||
|
"What we've got is a nuclear explosion and we're running like hell to escape
|
||
|
the blast. But it's going to hit us," said Chuck Jones, who oversees high-tech
|
||
|
crime investigations at the California Department of Justice.
|
||
|
|
||
|
The problem is, investigators say, computers have made it easier to commit
|
||
|
crimes like bank fraud. Money transfers that once required signatures and
|
||
|
paperwork are now done by pressing a button.
|
||
|
|
||
|
But it takes time to train a high-tech enforcer.
|
||
|
|
||
|
"Few officers are adept in investigating this, and few prosecutors are adept
|
||
|
in prosecuting it," Jones said.
|
||
|
|
||
|
"You either have to take a cop and make him a computer expert, or take a
|
||
|
computer expert and make him a cop. I'm not sure what the right approach is."
|
||
|
|
||
|
In recent high-tech crimes:
|
||
|
|
||
|
- Volkswagen lost almost $260 million because of an insider computer scam
|
||
|
involving phony currency exchange transactions.
|
||
|
|
||
|
- A former insurance firm employee in Fort Worth, Texas, deleted more than
|
||
|
160,000 records from the company's computer.
|
||
|
|
||
|
- A bank employee sneaked in a computer order to Brinks to deliver 44
|
||
|
kilograms of gold to a remote site, collected it, then disappeared.
|
||
|
|
||
|
Still, computer cops have their successes.
|
||
|
|
||
|
The Secret Service broke up a scheme to make counterfeit automatic teller
|
||
|
machine cards that could have netted millions.
|
||
|
|
||
|
And Don Delaney, a computer detective for the New York State Police, nabbed
|
||
|
Jaime Liriano, who cracked a company's long-distance phone system.
|
||
|
|
||
|
Many company phone systems allow employes to call an 800 number, punch in a
|
||
|
personal identification number and then make long-distance calls at company
|
||
|
expense.
|
||
|
|
||
|
Some computer hackers use automatic speed dialers -- known as "demon dialers"
|
||
|
-- to dial 800 numbers repeatedly and try different four-digit numbers until
|
||
|
they crack the ID codes. Hackers using this method stole $12 million in phone
|
||
|
service from NASA.
|
||
|
|
||
|
Liriano did it manually, calling the 800 number of Data Products in
|
||
|
Wallingford, Connecticut, from his New York City apartment. He cracked the
|
||
|
company's code in two weeks.
|
||
|
|
||
|
Liriano started selling the long distance service -- $10 for a 20-minute call
|
||
|
anywhere -- and customers lined up inside his apartment.
|
||
|
|
||
|
But Delaney traced the calls and on March 10, he and his troopers waited
|
||
|
outside Liriano's apartment. On a signal from New York Telephone, which was
|
||
|
monitoring Liriano's line, the troopers busted in and caught him in the act.
|
||
|
|
||
|
Liriano pleaded guilty to a misdemeanor of theft of services, and was
|
||
|
sentenced to three years' probation and community service.
|
||
|
|
||
|
Data Products lost at least $35,000. "And we don't know what he made,"
|
||
|
Delaney said of Liriano.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Who Pays For Calls By Hackers? June 12, 1992
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
By Kent Gibbons (The Washington Times)(Page C1)
|
||
|
|
||
|
ICF International Inc. doesn't want to pay $82,000 for unauthorized calls by
|
||
|
hackers who tapped the company's switchboard.
|
||
|
|
||
|
AT&T says the Fairfax engineering firm owns the phone system and is responsible
|
||
|
for the calls, mostly to Pakistan.
|
||
|
|
||
|
Now their dispute and others like it are in Congress' lap. A House
|
||
|
subcommittee chairman believes a law is needed to cap the amount a company can
|
||
|
be forced to pay for fraudulent calls, the same way credit card users are
|
||
|
protected.
|
||
|
|
||
|
Edward Markey, the Massachusetts Democrat who held hearings on the subject
|
||
|
said long-distance carriers and local telephone companies should absorb much of
|
||
|
those charges.
|
||
|
|
||
|
Victims who testified said they didn't know about the illegal calls until the
|
||
|
phone companies told them, sometimes weeks after strange calling patterns
|
||
|
began. But since the calls went through privately owned switchboards before
|
||
|
entering the public telephone network, FCC rules hold the switchboard owners
|
||
|
liable.
|
||
|
|
||
|
"This is one of the ongoing dilemmas caused by the breakup of AT&T," Mr. Markey
|
||
|
said. Before the 1984 Bell system breakup, every stage of a call passed
|
||
|
through the American Telephone & Telegraph Co. network and AT&T was liable for
|
||
|
fraudulent calls.
|
||
|
|
||
|
Estimates of how much companies lose from this growing form of telephone fraud
|
||
|
range from $300 million to more than $2 billion per year.
|
||
|
|
||
|
The range is so vast because switchboard makers and victims often don't report
|
||
|
losses to avoid embarrassment or further fraud, said James Spurlock of the
|
||
|
Federal Communications Commission.
|
||
|
|
||
|
Long-distance carriers say they have stepped up their monitoring of customer
|
||
|
calls to spot unusual patterns such as repeated calls to other countries in a
|
||
|
short period. In April, Sprint Corp. added other protective measures,
|
||
|
including, for a $100 installation charge and $100 monthly fee, a fraud
|
||
|
liability cap of $25,000 per incident.
|
||
|
|
||
|
AT&T announced a similar plan last month.
|
||
|
|
||
|
Robert Fox, Sprint assistant vice president of security, said the new plans cut
|
||
|
the average fraud claim from more than $20,000 in the past to about $2,000
|
||
|
during the first five months of this year.
|
||
|
|
||
|
But the Sprint and AT&T plans don't go far enough, Mr. Markey said.
|
||
|
|
||
|
ICF's troubles started in March 1988. At the time, the portion of ICF that was
|
||
|
hit by the fraud was an independent software firm in Rockville called Chartways
|
||
|
Technologies Inc. ICF bought Chartways in April 1991.
|
||
|
|
||
|
As with most cases of fraud afflicting companies with private phone systems,
|
||
|
high-tech bandits broke into the Chartways switchboard using a toll-free number
|
||
|
set up for the company's customers.
|
||
|
|
||
|
Probably aided by a computer that randomly dials phone numbers, the hackers
|
||
|
got through security codes to obtain a dial tone to make outside calls.
|
||
|
|
||
|
The hackers used a fairly common feature some companies offer out-of-town
|
||
|
employees to save on long-distance calls. Ironically, Chartways never used the
|
||
|
feature because it was too complicated, said Walter Messick, ICF's manager of
|
||
|
contract administration.
|
||
|
|
||
|
On March 31, AT&T officials told Chartways that 757 calls were made to Pakistan
|
||
|
recently, costing $42,935.
|
||
|
|
||
|
The phone bill arrived later that day and showed that the Pakistan calls had
|
||
|
begun 11 days before, Mr.Messick said.
|
||
|
|
||
|
Because of the Easter holiday and monitoring of calls by Secret Service agents,
|
||
|
ICF's outside-calling feature was not disconnected until April 4. By then, ICF
|
||
|
had racked up nearly $82,000 in unauthorized calls.
|
||
|
|
||
|
A year ago, the FCC's Common Carrier Bureau turned down ICF's request to erase
|
||
|
the charges. The full commission will hear an appeal this fall.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Dutch Hackers Feel Data Security Law Will Breed Computer Crime July 7, 1992
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
By Oscar Kneppers (ComputerWorld Netherland)
|
||
|
|
||
|
HAARLEM, the Netherlands -- Dutch hackers will be seriously reprimanded for
|
||
|
breaking and entering computer systems, if a new law on computer crime is
|
||
|
passed in the Netherlands.
|
||
|
|
||
|
Discussed recently in Dutch parliament and under preparation for more than two
|
||
|
years, the proposed law calls hacking "a crime against property." It is
|
||
|
expected to be made official in next spring at the earliest and will consist of
|
||
|
the following three parts:
|
||
|
|
||
|
- The maximum penalty for hackers who log on to a secured computer system
|
||
|
would be six months' imprisonment.
|
||
|
|
||
|
- If they alter data in the system, they could spend up to four years in
|
||
|
prison.
|
||
|
|
||
|
- Those who illegally access a computer system that serves a "common use" --
|
||
|
like that in a hospital or like a municipal population database -- could soon
|
||
|
risk a prison sentence of six years.
|
||
|
|
||
|
This pending law does not differentiate between computer crimes committed
|
||
|
internally or externally from an office. For example, cracking the password of
|
||
|
a colleague could lead to prosecution.
|
||
|
|
||
|
Hackers believe this law will only provoke computer crime, because the hackers
|
||
|
themselves will no longer offer "cheap warnings" to a computer system with poor
|
||
|
security.
|
||
|
|
||
|
Rop Gonggrijp, who is sometimes called the King of Hacking Holland, and is
|
||
|
currently editor-in-chief of Dutch computer hacker magazine "Hack-tic" warns
|
||
|
that this law could produce unexpected and unwanted results.
|
||
|
|
||
|
"Students who now just look around in systems not knowing that it [this
|
||
|
activity] is illegal could then suddenly end up in jail," he said. Gonggrijp
|
||
|
equates hacking to a big party, where you walk in uninvited.
|
||
|
|
||
|
Gonggrijp is concerned about the repercussions the new law may have on existing
|
||
|
hackers. He said he thinks the current relationship between computer hackers
|
||
|
and systems managers in companies is favorable. "[Hackers] break into, for
|
||
|
example, an E-mail system to tell the systems manager that he has to do
|
||
|
something about the security. If this law is introduced, they will be more
|
||
|
careful with that [move]. The cheap warning for failures in the system will,
|
||
|
therefore, no longer take place, and you increase chances for so-called real
|
||
|
criminals with dubious intentions," he added.
|
||
|
|
||
|
According to a spokesman at the Ministry of Justice in The Hague, the law gives
|
||
|
the Dutch police and justice system a legal hold on hackers that they currently
|
||
|
lack.
|
||
|
|
||
|
"Computer criminals [now] have to be prosecuted via subtle legal tricks and
|
||
|
roundabout routes. A lot of legal creativity was [previously] needed. But
|
||
|
when this law is introduced, arresting the hackers will be much easier," he
|
||
|
said.
|
||
|
|
||
|
The Dutch intelligence agency Centrale Recherche Informatiedienst (CRI) in The
|
||
|
Hague agreed with this. Ernst Moeskes, CRI spokesman, said, "It's good to see
|
||
|
that we can handle computer crime in a directed way now."
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
PWN Quicknotes
|
||
|
~~~~~~~~~~~~~~
|
||
|
1. Printer Avoids Jail In Anti-Hacking Trial (By Melvyn Howe, Press
|
||
|
Association Newsfile, June 9, 1992) -- A printer avoided a jail sentence
|
||
|
in Britain's first trial under anti-hacking legislation. Freelance
|
||
|
typesetter Richard Goulden helped put his employers out of business with a
|
||
|
pirate computer program -- because he said they owed him L2,275 in back
|
||
|
pay. Goulden, 35, of Colham Avenue, Yiewsley, west London, was
|
||
|
conditionally discharged for two years after changing his plea to guilty on
|
||
|
the second day of the Southwark Crown Court hearing. He was ordered to pay
|
||
|
L1,200 prosecution costs and L1,250 compensation to the company's
|
||
|
liquidators. Goulden had originally denied the charge of unauthorized
|
||
|
modification of computer material under the 1990 Computer Misuse Act.
|
||
|
After his change of plea Judge John Hunter told him: "I think it was plain
|
||
|
at a very early stage of these proceedings that you had no defence to this
|
||
|
allegation." Mr. Warwick McKinnon, prosecuting, told the jury Goulden added
|
||
|
a program to a computer belonging to Ampersand Typesetters, of Camden,
|
||
|
north-west London, in June last year which prevented the retrieval of
|
||
|
information without a special password. Three months later the company
|
||
|
"folded". Mr Jonathan Seitler, defending, said Goulden had changed his
|
||
|
plea after realizing he had inadvertently broken the law.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
2. ICL & GM Hughes In Joint Venture To Combat Computer Hackers (Extel Examiner,
|
||
|
June 15, 1992) -- General Motors Corporation unit, Hughes STX, and ICL have
|
||
|
set up a joint venture operation offering ways of combating computer
|
||
|
hackers. Hughes STX is part of GM's GM Hughes Electronics Corporation
|
||
|
subsidiary. ICL is 80% owned by Fujitsu. Industry sources say the venture
|
||
|
could reach $100 million in annual sales within four years.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
3. Another Cornell Indictment (Ithaca Journal, June 17, 1992) -- Mark Pilgrim,
|
||
|
David Blumenthal, and Randall Swanson -- all Cornell students -- have each
|
||
|
been charged with 4 felony counts of first-degree computer tampering, 1
|
||
|
count of second-degree computer tampering, and 7 counts of second-degree
|
||
|
attempted computer tampering in connection with the release of the MBDF
|
||
|
virus to the Internet and to various BBSs.
|
||
|
|
||
|
David Blumenthal has also been charged with two counts of second-degree
|
||
|
forgery and two counts of first-degree falsifying business records in
|
||
|
connection with unauthorized account creation on Cornell's VAX5 system. He
|
||
|
was also charged with a further count of second-degree computer tampering
|
||
|
in connection with an incident that occurred in December of 1991.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
4. Computer Watchdogs Lead Troopers To Hacker (PR Newswire, July 17, 1992) --
|
||
|
Olympia, Washington -- State Patrol detectives served a search warrant at an
|
||
|
East Olympia residence Thursday evening, July 16, and confiscated a personal
|
||
|
computer system, programs and records, the Washington State Patrol said.
|
||
|
|
||
|
The resident, who was not on the premises when the warrant was served, is
|
||
|
suspected of attempts to break into computer files at the Department of
|
||
|
Licensing and the State Insurance Commissioner's office.
|
||
|
|
||
|
The "hacker's" attempts triggered computerized security devices which
|
||
|
alerted officials someone was attempting to gain access using a telephone
|
||
|
modem. Patrol detectives and computer staff monitored the suspect's
|
||
|
repeated attempts for several weeks prior to service of the warrant.
|
||
|
|
||
|
Placement of a telephone call by a non-recognized computer was all that was
|
||
|
required to trigger the security alert. The internal security system then
|
||
|
stored all attempted input by the unauthorized user for later retrieval and
|
||
|
use by law enforcement. Integrity of the state systems was not breached.
|
||
|
|
||
|
The investigation is continuing to determine if several acquaintances may be
|
||
|
linked to the break in. Charges are expected to be filed as early as next
|
||
|
week in the case.
|
||
|
|
||
|
CONTACT: Sgt. Ron Knapp of the Washington State Patrol, (206)459-6413
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
5. UPI reports that the 313 NPA will split to a new 810 NPA effective
|
||
|
August 10, 1994.
|
||
|
|
||
|
Oakland, Macomb, Genesee, Lapeer, St. Clair and Sanilac counties as well as
|
||
|
small sections of Saginaw, Shiawassee and Livingston counties will go into
|
||
|
810. Wayne, Washtenaw, Monroe, and small parts of Jackson and Lenawee
|
||
|
counties will remain in 313. The city of Detroit is in Wayne County and
|
||
|
won't change.
|
||
|
_______________________________________________________________________________
|