mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
589 lines
28 KiB
Text
589 lines
28 KiB
Text
![]() |
==Phrack Magazine==
|
||
|
|
||
|
Volume Four, Issue Forty-Two, File 14 of 14
|
||
|
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
PWN PWN
|
||
|
PWN Phrack World News PWN
|
||
|
PWN PWN
|
||
|
PWN Compiled by Datastream Cowboy PWN
|
||
|
PWN PWN
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
|
||
|
|
||
|
STEVE JACKSON GAMES v. UNITED STATES SECRET SERVICE
|
||
|
|
||
|
Rights To Be Tested In Computer Trial January 20, 1993
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Joe Abernathy (The Houston Chronicle)(Page A13)
|
||
|
*Reprinted With Permission*
|
||
|
|
||
|
Summary Judgment Denied In Case
|
||
|
|
||
|
AUSTIN -- A judge Tuesday denied plaintiff lawyers' request for summary
|
||
|
judgment in a case brought against the U.S. Secret Service to set the bounds of
|
||
|
constitutional protections for electronic publishing and electronic mail.
|
||
|
|
||
|
U.S. District Judge Sam Sparks acted after hearing complicated arguments
|
||
|
regarding application of 1st and 4th Amendment principles in computer-based
|
||
|
communications and publishing. The case will go to trial at 9 a.m. today.
|
||
|
|
||
|
"Uncontested facts show the government violated the Privacy Protection Act and
|
||
|
the Electronic Communications Privacy Act," said Pete Kennedy, attorney for
|
||
|
Steve Jackson Games, an Austin game company that brought the lawsuit.
|
||
|
|
||
|
Mark W. Batten, attorney for the Department of Justice, which is defending the
|
||
|
Secret Service, declined to comment on the proceedings.
|
||
|
|
||
|
Steve Jackson's company, which publishes fantasy role-playing games -- not
|
||
|
computer games -- was raided by the Secret Service on March 1, 1990, during a
|
||
|
nationwide sweep of suspected criminal computer hackers.
|
||
|
|
||
|
Agents seized several computers and related hardware from the company and from
|
||
|
the Austin home of Steve Jackson employee Loyd Blankenship. Taken from the
|
||
|
game publisher was an electronic bulletin board used to play-test games before
|
||
|
they were printed and exchange electronic mail with customers and free-lance
|
||
|
writers.
|
||
|
|
||
|
Another seized computer contained the text of the company's work in progress,
|
||
|
GURPS Cyberpunk, which was being prepared for the printers.
|
||
|
|
||
|
Blankenship's purported membership in the Legion of Doom -- a group of computer
|
||
|
hackers from Austin, Houston and New York -- led the Secret Service to Steve
|
||
|
Jackson's door.
|
||
|
|
||
|
Neither Jackson nor his company was suspected of wrongdoing.
|
||
|
|
||
|
The game publisher is named in two paragraphs of the 42-paragraph affidavit
|
||
|
requesting the 1990 search warrant, which targeted Blankenship -- a fact
|
||
|
Kennedy cited in seeking summary judgment.
|
||
|
|
||
|
Kennedy presented evidence that the original Secret Service affidavit for the
|
||
|
warrant used to raid Steve Jackson Games contained false statements.
|
||
|
Supporting documentation showed that Bellcore expert Henry Kluepfel disputes
|
||
|
statements attributed to him that accounted for the only link between Steve
|
||
|
Jackson Games and the suspicion Blankenship was engaged in illegal activity.
|
||
|
|
||
|
Batten came away visibly shaken from questioning by Sparks, and later had a
|
||
|
tense exchange with Kennedy outside the courtroom.
|
||
|
|
||
|
The lawsuit contends the government violated 1st Amendment principles by
|
||
|
denying the free speech and public assembly of callers to Jackson's bulletin
|
||
|
board system, Illuminati. This portion of the complaint was brought under the
|
||
|
Privacy Protection Act, which also covers the seized Cyberpunk manuscripts --
|
||
|
if the judge rules that such a book, stored electronically prior to
|
||
|
publication, is entitled to the same protections as a printed work.
|
||
|
The government lawyers argued the Privacy Protection Act applies only to
|
||
|
journalistic organizations -- an argument Sparks didn't seem to buy.
|
||
|
|
||
|
The lawsuit also contends 4th Amendment principles providing against
|
||
|
unreasonable search and seizure were violated, on grounds the Electronic
|
||
|
Communications Privacy Act specifies protection for publishers.
|
||
|
|
||
|
The Justice Department contends electronic mail does not enjoy constitutional
|
||
|
protections.
|
||
|
|
||
|
"They (users of Illuminati) had no expectation of privacy in their electronic
|
||
|
mail messages," Batten said. The basis of the argument is that Illuminati's
|
||
|
callers were not sending communications to others, but rather "revealing" them
|
||
|
to a third party, Steve Jackson, thus negating their expectation of privacy.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Computer Case Opens; Agent Admits Errors January 27, 1993
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Joe Abernathy (The Houston Chronicle)(Page A11)
|
||
|
*Reprinted With Permission*
|
||
|
|
||
|
AUSTIN -- Plaintiff's attorneys wrested two embarrassing admissions from the
|
||
|
U.S. Secret Service on the opening day of a federal civil lawsuit designed to
|
||
|
establish constitutional protections for electronic publishing and electronic
|
||
|
mail.
|
||
|
|
||
|
Special Agent Timothy Folly of Chicago admitted that crucial statements were
|
||
|
erroneous in an affidavit he used to obtain warrants in a 1990 crackdown on
|
||
|
computer crime.
|
||
|
|
||
|
Foley also conceded that the Secret Service's special training for computer
|
||
|
crime investigators overlooks any mention of a law that limits search-and-
|
||
|
seizure at publishing operations.
|
||
|
|
||
|
The case before U.S. District Judge Sam Sparks was brought by Steve Jackson
|
||
|
Games, an Austin game publisher, with the support of electronic civil rights
|
||
|
activists who contend that federal agents have overstepped constitutional
|
||
|
bounds in their investigations of computer crime.
|
||
|
|
||
|
Jackson supporters already have committed more than $200,000 to the litigation,
|
||
|
which seeks $2 million in damages from the Secret Service and other defendants
|
||
|
in connection with a March 1990 raid on Jackson Games.
|
||
|
|
||
|
Plaintiffs hope to establish that First Amendment protections of the printed
|
||
|
word extend to electronic information and to guarantee privacy protections for
|
||
|
users of computer bulletin board systems, such as one called Illuminati that
|
||
|
was taken in the raid.
|
||
|
|
||
|
Steve Jackson's attorney, Jim George of Austin, focused on those issues in
|
||
|
questioning Foley about the seizure of the personal computer on which
|
||
|
Illuminati ran and another PC which contained the manuscript of a pending
|
||
|
Jackson Games book release, "GURPS Cyberpunk."
|
||
|
|
||
|
"At the Secret Service computer crime school, were you, as the agent in charge
|
||
|
of this investigation, made aware of special rules for searching a publishing
|
||
|
company?" George asked Foley. He was referring to the Privacy Protection Act,
|
||
|
which states that police may not seize a work in progress from a publisher. It
|
||
|
does not specify what physical form such a work must take.
|
||
|
|
||
|
Foley responded that the Secret Service does not teach its agents about those
|
||
|
rules.
|
||
|
|
||
|
Earlier, Foley admitted that his affidavit seeking court approval to raid
|
||
|
Jackson Games contained an error.
|
||
|
|
||
|
During the raid -- one of several dozen staged that day around the country in
|
||
|
an investigation called Operation Sun Devil -- agents were seeking copies of a
|
||
|
document hackers had taken from the computer system of BellSouth.
|
||
|
|
||
|
No criminal charges have been filed against Jackson, his company, or others
|
||
|
targeted in several Austin raids. The alleged membership of Jackson employee
|
||
|
Loyd Blankenship in the Legion of Doom hacker's group -- which was believed
|
||
|
responsible for the BellSouth break-in -- lead agents to raid Jackson Games at
|
||
|
the same time that Blankenship's Austin home was raided.
|
||
|
|
||
|
Foley's affidavit stated that Bell investigator Henry Kluepfel had logged on to
|
||
|
the Illuminati bulletin board and found possible evidence of a link between
|
||
|
Jackson Games and the Legion of Doom.
|
||
|
|
||
|
But George produced a statement from Kluepfel, who works for Bellcore, formerly
|
||
|
AT&T Bell Labs, disputing statements attributed to him in the affidavit. Foley
|
||
|
acknowledged that part of the affidavit was erroneous.
|
||
|
|
||
|
The U.S. Department of Justice, which is defending the Secret Service, contends
|
||
|
that only traditional journalistic organizations enjoy the protections of the
|
||
|
Privacy Protection Act and that users of electronic mail have no reasonable
|
||
|
expectation of privacy.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Judge Rebukes Secret Service For Austin Raid January 29, 1993
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Joe Abernathy (The Houston Chronicle)(Page A21)
|
||
|
*Reprinted With Permission*
|
||
|
|
||
|
AUSTIN -- A federal judge lambasted the U.S. Secret Service Thursday for
|
||
|
failing to investigate properly before it seized equipment from three Austin
|
||
|
locations in a 1990 crackdown on computer crime.
|
||
|
|
||
|
U.S. District Judge Sam Sparks' comments came on the final day of trial in a
|
||
|
lawsuit brought by Steve Jackson Games, an Austin publisher, with the support
|
||
|
of national computer rights activists.
|
||
|
|
||
|
The judge did not say when he will issue a formal ruling in the case. In
|
||
|
addition to seeking $ 2 million in damages from the Secret Service and other
|
||
|
defendants, Jackson hopes to establish privacy and freedom of the press
|
||
|
protections for electronic information.
|
||
|
|
||
|
In a packed courtroom Thursday morning, Sparks dressed down Secret Service
|
||
|
Special Agent Timothy Foley of Chicago, who was in charge of the March 1, 1990,
|
||
|
raid on Jackson, one of his employees and a third Austin man. No criminal
|
||
|
charges have been filed in connection with the raids.
|
||
|
|
||
|
"The Secret Service didn't do a good job in this case," Sparks said. "We know
|
||
|
no investigation took place. Nobody ever gave any concern as to whether
|
||
|
(legal) statutes were involved. We know there was damage (to Jackson)."
|
||
|
|
||
|
The Secret Service has seized dozens of computers since the nationwide
|
||
|
crackdown began in 1990, but Jackson, a science fiction magazine and game book
|
||
|
publisher, is the first to challenge the practice. A computer seized at
|
||
|
Jackson Games contained the manuscript for a pending book, and Jackson alleges,
|
||
|
among other things, that the seizure violated the Privacy Protection Act, which
|
||
|
prohibits seizure of publishers' works in progress.
|
||
|
|
||
|
Agents testified that they were not trained in that law at the special Secret
|
||
|
Service school on computer crime.
|
||
|
|
||
|
Sparks grew visibly angry when testimony showed that Jackson never was
|
||
|
suspected of a crime, that agents did no research to establish a criminal
|
||
|
connection between the firm and the suspected illegal activities of an
|
||
|
employee, and that they did not determine that the company was a publisher.
|
||
|
|
||
|
"How long would it have taken you, Mr. Foley, to find out what Steve Jackson
|
||
|
Games did, what it was? " asked Sparks. "An hour?
|
||
|
|
||
|
"Was there any reason why, on March 2, you could not return to Steve Jackson
|
||
|
Games a copy, in floppy disk form, of everything taken?
|
||
|
|
||
|
"Did you read the article in Business Week magazine where it had a picture of
|
||
|
Steve Jackson -- a law-abiding, tax-paying citizen -- saying he was a computer
|
||
|
crime suspect?
|
||
|
|
||
|
"Did it ever occur to you, Mr. Foley, that seizing this material could harm
|
||
|
Steve Jackson economically? "
|
||
|
|
||
|
Foley replied, "No, sir," but the judge offered his own answer:
|
||
|
|
||
|
"You actually did; you just had no idea anybody would actually go out and hire
|
||
|
a lawyer and sue you."
|
||
|
|
||
|
The judge's rebuke apparently convinced the government to close its defense
|
||
|
after the testimony from Foley, only one of several government witnesses on
|
||
|
hand. Justice Department attorney Mark Battan entered subdued testimony
|
||
|
seeking to limit the award of monetary damages.
|
||
|
|
||
|
The judge's comments came after cross-examination of Foley by Pete Kennedy,
|
||
|
Jackson's attorney.
|
||
|
|
||
|
Sparks questioned Foley about the raid, focusing on holes in the search
|
||
|
warrant, why Jackson was not allowed to copy his work in progress after it was
|
||
|
seized, and why his computers were not returned after the Secret Service
|
||
|
analyzed them.
|
||
|
|
||
|
"The examination took seven days, but you didn't give Steve Jackson's computers
|
||
|
back for three months. Why?" asked Sparks.
|
||
|
|
||
|
"So here you are, with three computers, 300 floppy disks, an owner who was
|
||
|
asking for it back, his attorney calling you, and what I want to know is why
|
||
|
copies of everything couldn't be given back in days. Not months. Days.
|
||
|
|
||
|
"That's what makes you mad about this case."
|
||
|
|
||
|
Besides alleging that the seizure violated the Privacy Protection Act, Jackson
|
||
|
alleged that since one of the computers was being used to run a bulletin board
|
||
|
system containing private electronic mail, the seizure violated the Electronic
|
||
|
Communications Privacy Act.
|
||
|
|
||
|
Justice Department attorneys have refused comment on the case, but contended in
|
||
|
court papers that Jackson Games is a manufacturer, and that only journalistic
|
||
|
organizations can call upon the Privacy Protection Act.
|
||
|
|
||
|
The government said that seizure of an electronic bulletin board system does
|
||
|
not constitute interception of electronic mail.
|
||
|
|
||
|
The Electronic Frontier Foundation committed more than $200,000 to the Jackson
|
||
|
suit. The EFF was founded by Mitchell Kapor of Lotus Technology amid a
|
||
|
computer civil liberties movement sparked in large part by the Secret Service
|
||
|
computer crime crackdown that included the Austin raids.
|
||
|
|
||
|
"The dressing down of the Secret Service for their behavior is a major
|
||
|
vindication of what we've been saying all along, which is that there were
|
||
|
outrageous actions taken against Steve Jackson that hurt his business and sent
|
||
|
a chilling effect to everyone using bulletin boards, and that there were larger
|
||
|
principles at stake," said Kapor, contacted at his Cambridge, Massachusetts
|
||
|
office.
|
||
|
|
||
|
Shari Steele, who attended the trial as counsel for the EFF, said, "We're very
|
||
|
happy with the way the case came out. That session with the judge and Tim
|
||
|
Foley is what a lawyer dreams about."
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Going Undercover In The Computer Underworld January 26, 1993
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Ralph Blumenthal (The New York Times)(Page B1)
|
||
|
|
||
|
[A 36-year old law enforcement officer from the East Coast masquerades
|
||
|
as "Phrakr Trakr" throughout the nation's computer bulletin boards.
|
||
|
As the organizer of the High-Tech Crime Network, he has educated other
|
||
|
officers in over 28 states in the use of computer communications.
|
||
|
Their goal is to penetrate some 3000 underground bbses where computer
|
||
|
criminals trade in stolen information, child pornography and bomb
|
||
|
making instructions.
|
||
|
|
||
|
"I want to make more cops aware of high-tech crime," he said. "The
|
||
|
victims are everybody. We all end up paying for it."]
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Hackers Breaking Into UC Computers January 23, 1993
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by T. Christian Miller (The San Francisco Chronicle)(Page A20)
|
||
|
|
||
|
[According to the University of California, hackers have been breaking
|
||
|
into the DOD and NASA through UC computer systems. The investigation
|
||
|
links over 100 computer hackers who have reportedly penetrated
|
||
|
computers at UC Davis, UC Berkeley, NYU, FSU, and CSU. The FBI stated
|
||
|
that the investigation reached as far as Finland and Czechoslovakia
|
||
|
but did not comment on any arrests.
|
||
|
|
||
|
University officials have asked all users to change to more complex
|
||
|
passwords by April 1.]
|
||
|
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Feds Sued Over Hacker Raid At Mall February 5, 1993
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Joe Abernathy (The Houston Chronicle)(Page A5)
|
||
|
|
||
|
[A lawsuit was filed 2-4-93 in the Washington, D.C. federal court to
|
||
|
force the secret service to disclose its involvement in the disruption
|
||
|
of a meeting of computer hackers last year. The meeting, a monthly
|
||
|
gathering of readers of "2600 Magazine" at the Pentagon City Mall was
|
||
|
disrupted on November 6, 1992, when mall security and Arlington County
|
||
|
Police questioned and searched the attendees.
|
||
|
|
||
|
The suit was filed by the Computer Professionals for Social
|
||
|
Responsibility. "If this was a Secret Service operation, it raises
|
||
|
serious constitutional questions," said Marc Rotenberg, director of
|
||
|
CPSR.
|
||
|
|
||
|
The Secret Service declined to comment on the matter.]
|
||
|
|
||
|
----------
|
||
|
|
||
|
|
||
|
[New Info in 2600 Case - from email sent by CPSR]
|
||
|
|
||
|
One month after being sued under the Freedom of Information
|
||
|
Act (FOIA), the Secret Service has officially acknowledged that
|
||
|
it possesses "information relating to the breakup of a meeting
|
||
|
of individuals at the Pentagon City Mall in Arlington, Virginia."
|
||
|
The admission, contained in a letter to Computer Professionals for
|
||
|
Social Responsibility (CPSR), confirms widespread suspicions that
|
||
|
the agency played a role in the detention and search of
|
||
|
individuals affiliated with "2600" Magazine at the suburban
|
||
|
Washington mall on November 6, 1992.
|
||
|
|
||
|
CPSR filed suit against the Secret Service on February 4
|
||
|
after the agency failed to respond to the organization's FOIA
|
||
|
request within the statutory time limit. In its recent response,
|
||
|
the Secret Service released copies of three news clippings
|
||
|
concerning the Pentagon City incident but withheld other
|
||
|
information "because the documents in the requested file contain
|
||
|
information compiled for law enforcement purposes." While the
|
||
|
agency asserts that it possesses no "documentation created by the
|
||
|
Secret Service chronicling, reporting, or describing the breakup
|
||
|
of the meeting," it does admit to possessing "information provided
|
||
|
to the Secret Service by a confidential source which is
|
||
|
information relating to the breakup of [the] meeting." Federal
|
||
|
agencies classify other law enforcement agencies and corporate
|
||
|
entities, as well as individuals, as "confidential sources."
|
||
|
|
||
|
The propriety of the Secret Service's decision to withhold
|
||
|
the material will be determined in CPSR's pending federal lawsuit.
|
||
|
A copy of the agency's letter is reprinted below.
|
||
|
|
||
|
David L. Sobel dsobel@washofc.cpsr.org
|
||
|
Legal Counsel (202) 544-9240 (voice)
|
||
|
CPSR Washington Office (202) 547-5481 (fax)
|
||
|
|
||
|
************************************************
|
||
|
|
||
|
|
||
|
DEPARTMENT OF THE TREASURY
|
||
|
UNITED STATES SECRET SERVICE
|
||
|
|
||
|
MAR 5 1993
|
||
|
|
||
|
920508
|
||
|
|
||
|
|
||
|
David L. Sobel
|
||
|
Legal Counsel
|
||
|
Computer Professionals for
|
||
|
Social Responsibility
|
||
|
666 Pennsylvania Avenue, S.E.
|
||
|
Suite 303
|
||
|
Washington, D.C. 20003
|
||
|
|
||
|
Dear Mr. Sobel:
|
||
|
|
||
|
This is in response to your Freedom of Information Act (FOIA)
|
||
|
request for access to "copies of all records related to the
|
||
|
breakup of a meeting of individuals affiliated with "2600
|
||
|
Magazine" at the Pentagon City Mall in Arlington, Virginia on
|
||
|
November 6, 1992."
|
||
|
|
||
|
Enclosed, please find copies of materials which are responsive to
|
||
|
your request and are being released to you in their entirety.
|
||
|
|
||
|
Other information has been withheld because the documents in the
|
||
|
requested file contain information compiled for law enforcement
|
||
|
purposes. Pursuant to Title 5, United States Code, Section
|
||
|
552(b)(7)(A); (C); and (D), the information has been exempted
|
||
|
since disclosure could reasonably be expected to interfere with
|
||
|
enforcement proceedings; could reasonably be expected to
|
||
|
constitute an unwarranted invasion of personal privacy to other
|
||
|
persons; and could reasonably be expected to disclose the
|
||
|
identity of a confidential source and/or information furnished by
|
||
|
a confidential source. The citations of the above exemptions are
|
||
|
not to be construed as the only exemptions that are available
|
||
|
under the Freedom of Information Act.
|
||
|
|
||
|
In regard to this matter it is, however, noted that your FOIA
|
||
|
request is somewhat vague and very broadly written. Please be
|
||
|
advised, that the information being withheld consists of
|
||
|
information provided to the Secret Service by a confidential
|
||
|
source which is information relating to the breakup of a meeting
|
||
|
of individuals at the Pentagon City Mall in Arlington, Virginia,
|
||
|
and, therefore, appears to be responsive to your request as it
|
||
|
was written. If, however, the information you are seeking is
|
||
|
information concerning the Secret Service's involvement in the
|
||
|
breakup of this meeting, such as any type of documentation
|
||
|
created by the Secret service chronicling, reporting, or
|
||
|
describing the breakup of the meeting, please be advised that no
|
||
|
such information exists.
|
||
|
|
||
|
If you disagree with our determination, you have the right of
|
||
|
administrative appeal within 35 days by writing to Freedom of
|
||
|
Information Appeal, Deputy Director, U. S. Secret Service,
|
||
|
1800 G Street, N.W., Washington, D.C. 20223. If you choose to
|
||
|
file an administrative appeal, please explain the basis of your
|
||
|
appeal.
|
||
|
|
||
|
Sincerely,
|
||
|
|
||
|
/Sig/
|
||
|
Melvin E. Laska
|
||
|
ATSAIC
|
||
|
Freedom of Information &
|
||
|
Privacy Acts Officer
|
||
|
|
||
|
Enclosure
|
||
|
|
||
|
*******************************************
|
||
|
|
||
|
For more information, refer to Phrack World News, Issue 41/1:
|
||
|
|
||
|
Reports of "Raid" on 2600 Washington Meeting November 9, 1992
|
||
|
Confusion About Secret Service Role In 2600 Washington Raid November 7, 1992
|
||
|
Conflicting Stories In 2600 Raid; CRSR Files FOIA November 11, 1992
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Surfing Off The Edge February 8, 1993
|
||
|
~~~~~~~~~~~~~~~~~~~~
|
||
|
by Richard Behar (Time Magazine)(Page 62)
|
||
|
|
||
|
[This article is so full of crap that I cannot even bring myself
|
||
|
to include a synopsis of it. Go to the library and read it
|
||
|
and laugh.]
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Bulgarian Virus Writer, Scourge in the West, Hero at Home January 29, 1993
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by David Briscoe (Associated Press)
|
||
|
|
||
|
[The Dark Avenger, believed to be a computer programmer in Sophia, has
|
||
|
drawn the attention of computer crime squads in the US and Europe. To
|
||
|
many programmers the Dark Avenger is a computer master to many young
|
||
|
Bulgarians. "His work is elegant. ... He helps younger programmers.
|
||
|
He's a superhero to them," said David Stang director for the
|
||
|
International Virus Research Center.
|
||
|
|
||
|
Neither Bulgaria nor the US has laws against the writing of computer
|
||
|
viruses]
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Computer Security Tips Teach Tots To Take Byte Out Of Crime February 3, 1993
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Michelle Locke (Associated Press)
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
Young Students Learn Why Computer Hacking Is Illegal February 4, 1993
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Bill Wallace (San Francisco Chronicle)(Page A22)
|
||
|
|
||
|
[In an attempt to teach computer crime prevention, children in
|
||
|
kindergarten through third grade in a Berkeley elementary school are
|
||
|
being shown a 30 minute presentation on ethics and security.
|
||
|
|
||
|
The program consists of several skits using puppets to show the
|
||
|
children various scenarios from eating food near computer systems to
|
||
|
proper password management.
|
||
|
|
||
|
In one episode, Gooseberry, a naive computer user, has her files
|
||
|
erased by Dirty Dan, the malicious hacker, when she neglects to log
|
||
|
off.
|
||
|
|
||
|
Philip Chapnick, director of the Computer Security Institute in San
|
||
|
Francisco, praised the idea. "One of the major issues in information
|
||
|
security in companies now is awareness. Starting the kids early ... I
|
||
|
think it will pay off," said Chapnick.]
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Tracking Hackers - Experts Find Source In Adolescence February 25, 1993
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
By Mike Langberg (Knight-Ridder News Service)
|
||
|
|
||
|
[At the National Computer Security Association convention in San
|
||
|
Francisco, four experts analyzed the psyche of today's hacker.
|
||
|
The panel decided that hacker bonding came from a missing or defective
|
||
|
family. The panel also decided that hackers weren't necessarily
|
||
|
geniuses, and that a few weeks of study would be enough to begin.
|
||
|
|
||
|
Panel member Winn Schwartau stated that there should be an end to
|
||
|
slap-on-the-wrist penalties. Sending hackers to jail would send a
|
||
|
clear message to other hackers, according to Schwartau.
|
||
|
|
||
|
"What strikes me about hackers is their arrogance," said Michael
|
||
|
Kabay, computer security consultant from Montreal. "These people seem
|
||
|
to feel that their own pleasures or resentments are of supreme
|
||
|
importance and that normal rules of behavior simply don't apply to
|
||
|
them."]
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Bomb Recipes Just A Keystroke Away January 10, 1993
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Tracy Gordon Fox (The Hartford Courant)(Page B1)
|
||
|
|
||
|
[Teenagers gathering information via computer have contributed greatly
|
||
|
to the fifty percent increase in the number of homemade explosives
|
||
|
found last year.
|
||
|
|
||
|
The computer age has brought the recipes for the explosives to the
|
||
|
fingertips of anyone with a little computer knowledge and a modem.
|
||
|
|
||
|
One of the first police officers to discover that computers played a
|
||
|
part in a recent West Hartford, Connecticut, bombing said that
|
||
|
hackers were loners, who are socially dysfunctional, excel in
|
||
|
mathematics and science, and are "over motivated in one area."
|
||
|
|
||
|
The trend has been seen around the country. The 958 bombing incidents
|
||
|
reported nationally to the Bureau of Alcohol, Tobacco and Firearms was
|
||
|
the highest in 15 years.]
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Hackers Hurt Cellular Industry January 25, 1993
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by John Eckhouse (The San Francisco Chronicle)(Page C1)
|
||
|
|
||
|
[With only a little equipment and technical knowledge, telephone
|
||
|
pirates can make free calls and eavesdrop on cellular conversations.
|
||
|
|
||
|
"Technically, eavesdroping is possible, but realistically I don't
|
||
|
think it can be done," said Justin Jasche chief executive of Cellular One.
|
||
|
|
||
|
The Cellular Telecommunications Industry Association estimates that
|
||
|
hackers make about $300 million worth of unauthorized calls a year,
|
||
|
though others put the figure much higher.]
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Cellular Phreaks and Code Dudes February 1993
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by John Markoff (Wired) (page 60)
|
||
|
|
||
|
[Two hackers, V.T. and N.M. have discovered that celluar phones are
|
||
|
really just little computers linked by a gigantic cellular network.
|
||
|
And like most computers, they are programmable. The hackers have
|
||
|
discovered that the OKI 900 has a special mode that will turn it into
|
||
|
a scanner, enabling them to listen in on other cellular conversations.
|
||
|
|
||
|
The two also discovered that the software stored in the phones ROM
|
||
|
takes up roughly 40K, leaving over 20K free to add in other features,
|
||
|
They speculate on the use of the cellular phone and a computer
|
||
|
to track users through cell sites, and to monitor and decode
|
||
|
touchtones of voice mail box codes and credit card numbers.
|
||
|
|
||
|
Said V.T. of the OKI's programmers, "This phone was clearly built by
|
||
|
hackers."]
|
||
|
|
||
|
-------------------------------------------------------------------------------
|
||
|
|
||
|
Callers Invited To Talk Sex, Thanks To Hacker's Prank February 5, 1993
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
(The Vancouver Sun) (Page A-9)
|
||
|
|
||
|
[For the past two weeks, surprised callers to CTC Payroll Services'
|
||
|
voice-mail system have been invited to talk sex. Instead
|
||
|
of a pleasant, professional salutation, callers hear a man's voice
|
||
|
suggesting that they engage a variety of intimate activities.
|
||
|
|
||
|
The prankster is a computer hacker who can re-program the greeting message
|
||
|
on company telephones. Company owner Cheryl MacLeod doesn't think the joke
|
||
|
is very funny and says the hacker is ruining her business.]
|
||
|
_______________________________________________________________________________
|