mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
1281 lines
50 KiB
Text
1281 lines
50 KiB
Text
![]() |
==Phrack Magazine==
|
||
|
|
||
|
Volume Six, Issue Forty-Seven, File 2 of 22
|
||
|
|
||
|
*****************************************************************************
|
||
|
|
||
|
Phrack Loopback
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
G'Day,
|
||
|
|
||
|
You dont know who i am, and i appreciated that but i hope your read my little
|
||
|
note here and take it into consideration.
|
||
|
|
||
|
Ive been into the Australian Hacking Scene (if there is such a thing :-)
|
||
|
for only about 2years, but recenlty opened a h/p bbs here in Australia.
|
||
|
What i am writing and asking is if it is possilbe to place kinda an add of
|
||
|
some description in the next issue of phrack, something to the lines of:-
|
||
|
|
||
|
H/P bbs recently opened in Australia - JeSteRs BBS +61-7-ASK-AROUND
|
||
|
|
||
|
If your looking for some form of donation $$ just let me know, if your
|
||
|
wondering is his guy a fed or something, mail DATA KING and speak to him, he
|
||
|
was one of the bbs first users and as you know he has written in the Int
|
||
|
Scene for the last too issues, but wont be in Issue #47 or i would have asked
|
||
|
him to place the advertisment in this report.
|
||
|
|
||
|
Regards, Jesta
|
||
|
|
||
|
[Cool! Nice to see there's BBSs still popping up overseas. It would be
|
||
|
nice if I had the number...hell, I'd even call... but oh well,
|
||
|
I suppose I (and all the Phrack readers) will just have to "ASK-AROUND"]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Hi Erikb,
|
||
|
|
||
|
Last week you said you'd accept a bbs ad .. well here it is.
|
||
|
If you'd publish it in phrack i'd be most grateful!
|
||
|
|
||
|
A Gnu BBS!
|
||
|
1000's h/p Related texts
|
||
|
Phrack, CoTNo, B0W, cDc, NiA, CuD, Risks,Sphear,SCAM!,NeuroCactus
|
||
|
Conferences covering Unix/VMS/System Security/Phreaking
|
||
|
And absolutely no mention of "The Information Super Highway" anywhere!
|
||
|
+617-855-2923
|
||
|
|
||
|
tnx,
|
||
|
badbird
|
||
|
|
||
|
[I said I'd print the ad...and now I have.]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
ATTN: ALL COMPUTER WHIZ KIDZ..... I DESPARATELY NEED YOUR HELP!!!
|
||
|
|
||
|
|
||
|
Retired R.C.M.P officer formerly involved with priority levels of
|
||
|
electronic surveillance has informed me that my residential telephone
|
||
|
appears to have been compromised at a point other than inside or
|
||
|
immediately outside my residence.
|
||
|
|
||
|
After an intensive evaluation of the premises his conclusion was that
|
||
|
remote manipulation of the telephone company switch where my circuit
|
||
|
could be victim was the problem.
|
||
|
|
||
|
The main focus of this exercise is to show how one can infiltrate a
|
||
|
telephone company's network; remotely manipulate the company's switch;
|
||
|
process long distance calling;make it appear that the calls originated
|
||
|
from a particular site and then "fooling" the company's billing
|
||
|
mechanisms to invoice that particular location.
|
||
|
|
||
|
Is this physically possible? Bell Canada categorically denies this
|
||
|
possibility. I need proof! How is it done?
|
||
|
Please advise as soon as possible.
|
||
|
|
||
|
I'd sincerely appreciate any help, advise and/or information anyone out
|
||
|
there can offer in this particular situation.
|
||
|
|
||
|
Please leave a way to get in touch! If you prefer to remain unknown,
|
||
|
thanks a million, and rest assured that I WILL RESPECT and PROTECT you
|
||
|
anonimity.
|
||
|
|
||
|
Regards,
|
||
|
|
||
|
John P. Marinelli jmarinel@freenet.niagara.com
|
||
|
|
||
|
[My take on this is that with relative ease, someone could establish
|
||
|
call forwarding on a line, make it active to some remote location, and
|
||
|
call the original number numerous times, causing the owner of the
|
||
|
hacked line to be billed for all the calls to the forwarded location.
|
||
|
|
||
|
If anyone knows how to do this, STEP BY STEP on a DMS-100, please,
|
||
|
contact Mr. Marinelli to help him out with his court case. I don't
|
||
|
know a whole lot about NT equipment, so I don't know the
|
||
|
specifics of how this may have happened, only the generalities.
|
||
|
|
||
|
Wouldn't it be nice to have the Underground "HELP" someone out
|
||
|
for a change?]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
y0, Black Flag here... heres the info you told me to mail you about the
|
||
|
GRaP/H (Gainesville Regional Association of Phreakers and Hackers) meetingz
|
||
|
|
||
|
Gainesville, FL
|
||
|
1st + 3rd Saturday of the month, 4pm - ???
|
||
|
meet in The Loop on 13th Street
|
||
|
Black Flag will be casually carrying a 2600
|
||
|
look around, you'll see him.
|
||
|
|
||
|
[Well, looks like the Florida Hackers have a new place to congregate.
|
||
|
And so do the Florida FBI Field Offices. :) ]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
I was wondering where I could find any virus authoring tools for the PC,
|
||
|
Unix, or VMS.
|
||
|
|
||
|
|
||
|
[You can find Nowhere Man's Virus Creation ToolKit on BBSs around the
|
||
|
globe. Have you looked??? I've never heard of UNIX or VMS virus tools.
|
||
|
Do you know something I don't? Do you know how a virus works? ]
|
||
|
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Chris, found something you might like. Here's an ad from the latest
|
||
|
PHOENIX SYSTEMS catalog:
|
||
|
|
||
|
THE CALLER ID BLOCKER FIRST TIME AVAILABLE IN THE U.S.
|
||
|
|
||
|
By April, 1995 all telephone companies must deliver callers name and
|
||
|
telephone number to the caller ID system. The law prohibits any telephone
|
||
|
company from offering customers an option to permanently disable their line
|
||
|
from the ID system.
|
||
|
|
||
|
This means that even if you have an unlisted number, everyone you call will
|
||
|
now have your telephone number and name. Big brother is now one watching,
|
||
|
now he has your name and number. No more anonymous calls to the IRS, city
|
||
|
hall, real estate agents, car dealers, health department or anyone. Many
|
||
|
business professionals use their home telephone to return calls. Do you
|
||
|
want your patients and clients to have access to your home telephone number?
|
||
|
|
||
|
We are proud to bring you the unique ANONYMOUS 100. It installs on any
|
||
|
telephone in seconds and completely KILLS THE EFFECTS OF "CALLER ID"! Yes,
|
||
|
you can have your privacy back. The ANONYMOUS 100 is FCC approved and
|
||
|
carries a one year guarantee.
|
||
|
|
||
|
#1276...............................................................$69.95
|
||
|
|
||
|
Is it just me, or is this a load of bullshit? Didn't CA and TX both pass
|
||
|
laws to make CLID illegal in those states? I know that before MA would
|
||
|
allow it in the state, they told the telco that line blocking had to be
|
||
|
offered free (and it is, on per/call and permanent basis). Did the feds
|
||
|
pass this new law while I was sleeping, or is this company just playing on
|
||
|
paranoia (not the first time) and trying to make a buck?
|
||
|
|
||
|
Eric
|
||
|
|
||
|
[Well Eric, it looks to me that this is a nifty little box that waits for
|
||
|
voltage drop and immediately dials *67 before giving you a dialtone.
|
||
|
Woo Woo! $69.95! It certainly is worth that to me to not have to dial
|
||
|
3 digits before I make a call. All that wear and tear ruins the
|
||
|
fingers for typing. PFFFT....
|
||
|
|
||
|
About Caller-ID, well, it's legal just about every place I know of.
|
||
|
I'm sure there are a feel hold-outs, but offering per-line blocking for
|
||
|
individuals worried about privacy satisfied most Public Utility
|
||
|
Commissions. In fact, I think April 1 was the date that all Interconnects
|
||
|
were supposed to be upgraded to support the transfer of CLID information
|
||
|
over long distance calls. I don't think this has been turned on everywhere,
|
||
|
but the software is supposed to be in place.
|
||
|
|
||
|
*67. Don't dial from home without it.]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
This message serves a multifold purpose:
|
||
|
|
||
|
(these response/comments are in referance to Phrack Issue 46 - Sept 20 1994)
|
||
|
|
||
|
A)
|
||
|
|
||
|
A question was brought up concerning a Moterola Flip Phone and the user
|
||
|
inability to gain access to the programing documentation. I happen to
|
||
|
own (legally) a Motorola Flip Phone that I will assume to be the same and
|
||
|
I was not given the documentation either, though I have not tried asking
|
||
|
for it. I will call Motorola and ask for *my* rightful copy and foreward
|
||
|
my results (if I gain access) to phrack for proper distribution amoung
|
||
|
appropriate channels. If I do not gain access, I would appriciate to
|
||
|
hear from anyone who has (this should not be limited to simply the M.
|
||
|
Flip Phone, I have interests in all areas).
|
||
|
|
||
|
B)
|
||
|
|
||
|
Later in that issue (Sept 20, 1994) a list of university and colege
|
||
|
dialups were provided... I live in the 218/701 (right on the border) and
|
||
|
have a collection of them for addition to the list if you (or anyone
|
||
|
else) should so desire. I would post them now, but I have limited time
|
||
|
and have to dig to find them. I also have some numbers that some readers
|
||
|
may find of interest.
|
||
|
|
||
|
C)
|
||
|
|
||
|
My living in the 218/701 is the main reason for my writting. I used to
|
||
|
live 612 and knew a lot of people in the area, but now I am stuck here in
|
||
|
a little shit town (pop. 7000) where the cloest thing to a computer is
|
||
|
made by John Deere. I need to find someone in the 218 or 701 to work
|
||
|
with or meet... if you know anyone...??? The closest BBS is long
|
||
|
distance and even then it's crap... I would like to start my own, but who
|
||
|
the fuck would call? Who the fuck would I invite? My old H/P friends in
|
||
|
612 would, but I don't need the heat as they would all go through 950's
|
||
|
or some other method... I think you understand.
|
||
|
|
||
|
any help would be greatly appreciated By the way I could also use some
|
||
|
218/701 ANAC or CN/A... any help here?
|
||
|
|
||
|
Aesop
|
||
|
|
||
|
[In order:
|
||
|
|
||
|
a) Good luck with Moto. You'll need it.
|
||
|
b) Yes, I really still need your university dialups. Issue 48 will
|
||
|
have a much more complete list (I hope!)
|
||
|
c) If anyone knows any bbs'es in those area codes, please send
|
||
|
them in so I can pass along the info.
|
||
|
|
||
|
Other) For CNA information, just call your business office. They ALWAYS
|
||
|
help. Especially if you mention that CNA didn't have a current
|
||
|
record. :) ]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
To whom it may concern at phrack, I would like to subscribe to Phrack. I
|
||
|
didn't use PGP because :-
|
||
|
|
||
|
i. I never had any real need to
|
||
|
ii. I came across the document below while dinking around with gopher. I
|
||
|
would pretty much guess phrack knows about it already. If you do know about
|
||
|
it, could you tell me another way to ensure my mail privacy?
|
||
|
|
||
|
Thank you.
|
||
|
|
||
|
Xombi.
|
||
|
|
||
|
---------------------BEGIN E-MAIL DOCUMENT---------------------
|
||
|
|
||
|
This section is from the document '/email-lists/Funny'.
|
||
|
|
||
|
A lot of people think that PGP encryption is unbreakable and that the
|
||
|
NSA/FBI/CIA/MJ12 cannot read their mail. This is wrong, and it can be a
|
||
|
deadly mistake. In Idaho, a left-wing activist by the name of Craig Steingold
|
||
|
was arrested _one day_ before he and others wee to stage a protest at
|
||
|
government buildings; the police had a copy of a message sent by Steingold
|
||
|
to another activist, a message which had been encrypted with PGP and sent
|
||
|
through E-mail.
|
||
|
|
||
|
Since version 2.1, PGP ("Pretty Good Privacy") has been rigged to
|
||
|
allow the NSA to easily break encoded messages. Early in 1992, the author,
|
||
|
Paul Zimmerman, was arrested by Government agents. He was told that he
|
||
|
would be set up for trafficking narcotics unless he complied. The Government
|
||
|
agency's demands were simple: He was to put a virtually undetectable
|
||
|
trapdoor, designed by the NSA, into all future releases of PGP, and to
|
||
|
tell no-one.
|
||
|
|
||
|
After reading this, you may think of using an earlier version of
|
||
|
PGP. However, any version found on an FTP site or bulletin board has been
|
||
|
doctored. Only use copies acquired before 1992, and do NOT use a recent
|
||
|
compiler to compile them. Virtually ALL popular compilers have been
|
||
|
modified to insert the trapdoor (consisting of a few trivial changes) into
|
||
|
any version of PGP prior to 2.1. Members of the boards of Novell, Microsoft,
|
||
|
Borland, AT&T and other companies were persuaded into giving the order for
|
||
|
the modification (each ot these companies' boards contains at least one
|
||
|
Trilateral Commission member or Bilderberg Committee attendant).
|
||
|
|
||
|
It took the agency more to modify GNU C, but eventually they did it.
|
||
|
The Free Software Foundation was threatened with "an IRS investigation",
|
||
|
in other words, with being forced out of business, unless they complied. The
|
||
|
result is that all versions of GCC on the FTP sites and all versions above
|
||
|
2.2.3, contain code to modify PGP and insert the trapdoor. Recompiling GCC
|
||
|
with itself will not help; the code is inserted by the compiler into
|
||
|
itself. Recompiling with another compiler may help, as long as the compiler
|
||
|
is older than from 1992.
|
||
|
|
||
|
|
||
|
[Well, uh, gee, I think the fact that this document came from
|
||
|
/email-lists/Funny speaks for itself. I'm satisfied with PGP
|
||
|
for security, but then again, I don't have a lot of information that
|
||
|
I'm so petrified that I need to keep it encrypted, or that I send
|
||
|
out in email that I don't care if anyone sees.
|
||
|
|
||
|
To put aside some of your fears, I personally feel that PGP is ok.
|
||
|
If the trilateral commission wants your info, they will beat it out
|
||
|
of you with sticks, with the help of several multi-jurisdictional
|
||
|
task-forces for Federal law enforcement, while you are under the influence
|
||
|
of incredibly terrifying and long-lasting hallucinogenic drugs.
|
||
|
|
||
|
Don't worry.]
|
||
|
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Here is a BBS Ad for your next issue:
|
||
|
|
||
|
BBS Name: The King's Domain
|
||
|
Sysop: Ex-Nihilo
|
||
|
Speeds: 1200-14,400
|
||
|
BBS Type: Remote Access 2.02+
|
||
|
Phone #: 208-466-1679
|
||
|
|
||
|
THe BBS has a good selction of "Hood" files... (hacking/phreaking/anarchy)
|
||
|
journals such as cDc, Phrack, ATI and more... also a good selection of
|
||
|
BBS files which include Doors and Utilities... primarily RA accessories,
|
||
|
but not exclusively... supports rip graphics and is online 24 hrs a day
|
||
|
|
||
|
[Yet another ad! Is this the rebirth of BBS-dom?]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
[Editor's Note: I got a letter asking me about how to credit card
|
||
|
merchandise. I replied that I didn't agree with carding, and that
|
||
|
if the reader really wanted something, he/she should get a job and buy it.
|
||
|
This is the response I got.]
|
||
|
|
||
|
|
||
|
What the fuck? All I wanted was a fucking decent reply. Get a job, huh?
|
||
|
You know, I thought if you were to talk to one of these supposed
|
||
|
"computer hackers" you could get some usefull information. Get a job, that
|
||
|
rich coming from someone like you.
|
||
|
|
||
|
When there's something you want...take it...without using your money.
|
||
|
|
||
|
Maybe sometime I'll be able to takl to a hacker not some fucking
|
||
|
hypocritical computer geek
|
||
|
|
||
|
|
||
|
[Editor's Note: I replied to this letter by stating that carding had nothing
|
||
|
to do with hacking, that it was out and out stealing, and although
|
||
|
we had published articles about it in Phrack, I wasn't going to help anyone
|
||
|
do it, and that he/she should try to contact the authors of various
|
||
|
carding articles directly. This is the response that got.]
|
||
|
|
||
|
Come on now "Chris", you can do better than that, can't you?
|
||
|
Stealing? Who's the thief here, eh? See, when I wake up in the morning,
|
||
|
I don't have to worry about secret service, police, or any sort
|
||
|
of military shit being in my apartment. I don't get busted for doing stupid
|
||
|
things like stealing phone calls off fucking 900 numbers. I think I
|
||
|
know exactly why you don't card anything - because you're too fucking stupid
|
||
|
or don't even have the balls to do it. Fuck, you'd expect someone like
|
||
|
yourself to have different views about being a thief. Well, I guess it
|
||
|
takes a certain kind of person to hack into shit like you, but why this
|
||
|
person would start flame wars and otherwise just be a total fuckup, I don't
|
||
|
know. Or, maybe it's just the singular person I'm talking too, yeah, that's
|
||
|
probably i...there probably are other, BETTER, hackers who aren't as
|
||
|
fucking arrogant as you.
|
||
|
|
||
|
Well, have fun with your hands and PLAYGIRL's, you fucking little punk-ass
|
||
|
faggot.
|
||
|
|
||
|
And tell your mother that I won't let this affect our relationship.
|
||
|
|
||
|
Punk
|
||
|
|
||
|
aj276@freenet3.carleton.ca
|
||
|
|
||
|
[This is the future of the computer underground??]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
|
||
|
BBS AD:
|
||
|
|
||
|
System is called CyberSphincter (playing off of the current word trend of
|
||
|
cyber). The number is 717-788-7435. The NUP is 0-DAY-WAR3Z!!!
|
||
|
Modem speeds of 14.4 and lower, with no ANSI. Sysop is Ha Ha Ha.
|
||
|
|
||
|
It's running renegade (we know it can be hacked and I've done it already),
|
||
|
but we seem to believe in honor among thieves, so try to control yourself on
|
||
|
that.
|
||
|
|
||
|
-=strata=-
|
||
|
|
||
|
[ANOTHER AD!]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Hey Erik B...
|
||
|
|
||
|
I'm the remote sysop at the Digital Fallou BBS in 516. Just recently,
|
||
|
we've been getting a rash of ld callers. A day or two ago, a guy with
|
||
|
the handle "Digi-Hacker" applied. His application looked good, execpt that
|
||
|
he stated his alter handle was "Eric Bloodaxe" and that he was the editor
|
||
|
of Phrack. Now, any lame ass could just "say" that, and we don't want any
|
||
|
liars on board. :) So we decided to go right to you thru email. Did you
|
||
|
apply? If so, cool. If this isn't you, that guy is gonna most assuredly
|
||
|
be deleted..
|
||
|
|
||
|
[Well, I hate to say it, but I don't have time to do much of anything
|
||
|
anymore. I certainly don't call bbses with any regularity. I
|
||
|
do have accounts on SECTEC and UPT, but that's it. I may call some
|
||
|
in the future, but for the most part I don't have any time. If someone
|
||
|
calls up a bulletin board and applies as "Erik Bloodaxe" it isn't me.
|
||
|
(Anyone saying they are Eric Bloodaxe MOST CERTAINLY isn't me. :) )
|
||
|
|
||
|
Anyone running BBSes may want to take note of this, so they don't get
|
||
|
swindled into giving "elite" access to some pretender. You can
|
||
|
always email phrack@well.com and ask me if I have applied to your
|
||
|
bbs. ]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Chris,
|
||
|
|
||
|
I know you don't know me, but I figured you of all people could help me,
|
||
|
and give me an answer quickly.
|
||
|
|
||
|
I just got my phone bill, and on the last page is a page from some
|
||
|
company calling themselves Long Distance Billing Co., Inc. It has
|
||
|
one call "Billed on behalf of Northstar Communication" It is a call from
|
||
|
somewhere in FL, for 13 minutes, costing 51.87. I called LD Inc, and they
|
||
|
said the call was a collect call made from Northstar Comm, and that
|
||
|
my only recourse was to write a letter to Northstar. Needless to say, I
|
||
|
did not accept the collect call, I don't know anyone in 813. I called
|
||
|
NYNEX, and they said I should write to Northstar and LD INC, but didn't
|
||
|
seem to know anything about either company. They guy I talked to said it
|
||
|
was real strange that LD INC didn't give me a number to call at
|
||
|
Northstar, since most of this type of thing is handled by phone. I'm
|
||
|
beginning to wonder exactly how relieable this LD INC company is, who
|
||
|
Northstar is, and most of all who called and how the hell the call was
|
||
|
supposedly accepted by my phone. This is all the info I know:
|
||
|
|
||
|
BILLED ON BEHALF OF NORTHSTAR COMMUNICATION
|
||
|
|
||
|
1. SEP 18 923PM COL CLEARWATER FL 813-524-5111 NC 13:00 51.87
|
||
|
|
||
|
--From my phone bill
|
||
|
|
||
|
Northstar Communication
|
||
|
3665 East Bay Drive
|
||
|
Suite 204-192
|
||
|
Largo, FL 34641
|
||
|
|
||
|
--From LD INC
|
||
|
|
||
|
Long Distance Billing Co., Inc.
|
||
|
|
||
|
1-800-748-4309
|
||
|
|
||
|
--From NYNE phone bill.
|
||
|
|
||
|
If you can think of anything I can do, I;d be really greatful. I don't
|
||
|
have $50 to throw away on a call I never got, and I don't have the
|
||
|
resources you do to try and figure out who the hell these people are.
|
||
|
|
||
|
[It looks to me like you got fucked by someone in Florida using a COCOT
|
||
|
payphone. It's kind of odd that NYNEX couldn't help you more...but anyway,
|
||
|
I wouldn't pay it.
|
||
|
|
||
|
What I suspect happened was that somsone used one of those handy COCOT
|
||
|
services where the operators are incredibly stupid and allow calls
|
||
|
to be accepted when the "calling party" says "YES" to allow a 3rd party or
|
||
|
collect call, rather than the party being called. This happened to me at
|
||
|
my previous work extension by New Yorkers using the ENCORE service (even
|
||
|
though all our lines were listed to refuse 3rd party and collect calls.)]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
I've been having some trouble with the law, so all my notes are stashed at
|
||
|
a friend's casa at the moment. Can you recommend a good lawyer to defend me
|
||
|
for allegedly hacking some government computers? I've got a good crim def
|
||
|
guy working with me right now assisting me guring questioning from Special
|
||
|
Agents, but I will need someone that has experience if I get indicted.
|
||
|
|
||
|
[If you are facing computer crime charges, you are definately in
|
||
|
a world of hurt. There are very few computer crime-savvy lawyers
|
||
|
practicing in the World. The only thing I can suggest is that
|
||
|
you call EFF, CPSR or EPIC and ask them if they know of any
|
||
|
lawyers in your area that they can refer you to. None of these
|
||
|
groups will help you directly, except under EXTREME circumstances, and
|
||
|
only if you have been falsely accused, or have had rights violated.
|
||
|
If you are guilty, and the cops have any evidence, you are going to be
|
||
|
convicted.
|
||
|
|
||
|
Remember Baretta? "If you can't do the time, then don't do the crime."]
|
||
|
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Dear Chris,
|
||
|
|
||
|
You probably don't remember me, but we corresponded about 3 years
|
||
|
ago as part of my PhD research. I was at Edinburgh University
|
||
|
at the time and am not at UMIST in Manchester (British equivalent of MIT).
|
||
|
|
||
|
The reson I'm writing is that I was awarded my PhD last March, and for one
|
||
|
reason and another I've been sidetracked into a completely different field
|
||
|
of research - the British National Health Service and the various ways
|
||
|
computers are being used in it.
|
||
|
|
||
|
I tried getting a publisher interested in the thesis, but with little luck.
|
||
|
I also sent it to Jim and Gordon at CuD on disk for them to stick it on
|
||
|
archive, but they had problems with the formatting of it and don't seem to
|
||
|
have got round to archiving i.
|
||
|
|
||
|
If you're interested I'd be quite happy to send a couple of disks to you
|
||
|
and you can spread it around as you want. It just seems a shame for the people
|
||
|
on the net not to get a look at it. It's dressed up in airy-fairy sociological
|
||
|
language - but there's still lots in it that I think would be of interest to
|
||
|
people on the net. I saw your interview in CuD, and I agree with you about
|
||
|
most of the books written on the CU. Mine has its faults but it's got less
|
||
|
biographical data and more issue-oriented stuff.
|
||
|
|
||
|
Anyway, get in touch and let me know if I can find a good home for my magnum
|
||
|
opus.
|
||
|
|
||
|
Take care and a belated thanks for all the time you spent in helping me with
|
||
|
the PhD.
|
||
|
|
||
|
Best Wishes,
|
||
|
|
||
|
Paul Taylor
|
||
|
School of Management
|
||
|
UMIST
|
||
|
|
||
|
[Paul:
|
||
|
|
||
|
Congrats on your PHD, and continued success at UMIST!
|
||
|
I'm putting your thesis up on the Phrack WWW page so that more
|
||
|
people can get a look at it!
|
||
|
|
||
|
Thanks for sending it!]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
I read your article on hacking the French among other foreign governments.
|
||
|
Sounds pretty fun, just for kicks the other night I did a search of all the
|
||
|
computers I could get at in China. One of them was a national power grid
|
||
|
computer. Sounds like it could be fun to play with huh? The "They Might Kill
|
||
|
Us" part will tend to turn some people off, but not me.
|
||
|
|
||
|
[WOW! A National Power Grid Computer! In China! Gee. How many times
|
||
|
have you seen Sneakers? Take the tape out of your VCR, slowly run
|
||
|
a rare-earth magnet over it and set it on fire.
|
||
|
|
||
|
On the other hand, if you were at least partally serious about the
|
||
|
hacking for America, keep your eyes open.]
|
||
|
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Erikb,
|
||
|
|
||
|
Regarding your article in Phrack 46, we here in Columbus would
|
||
|
just like to say that everything except for the Krack Baby's phone number,
|
||
|
which long since went down, and the Free Net template, is total and utter
|
||
|
bullshit. The Columbus 2600 meetings were NOT started by Fungal Mutoid, he
|
||
|
is just responsible for a much larger turnout since about September (94), and
|
||
|
whoever wrote that has obviously not been to a Columbus meeting recently.
|
||
|
The Columbus 2600's have been here for quite a while, but bacause the H/P
|
||
|
scene consists of 15 people AT THE MOST, many of which haven't the time to
|
||
|
attend, the turnout is almost always low. I believe the most that have ever
|
||
|
shown up to a meeting is 10, which dwindled to 8 or so before the
|
||
|
meeting was officially half-over. Nobody knows who wrote the article which
|
||
|
you printed, although no one has been able to contact Fungal Mutoid to ask him.
|
||
|
Just thought we'd clear a few things up, and to those that don't give two
|
||
|
flying shits, we're sorry to have to bring this into a E-mag as great as
|
||
|
this.
|
||
|
|
||
|
Sincerely,
|
||
|
|
||
|
H.P. Hovercraft and
|
||
|
the Columbus H/P Gang
|
||
|
|
||
|
[Thanks for the letter. Like I always say, I can only report and print what
|
||
|
I'm told or what is sent to me. I don't live anywhere but Austin, TX, so
|
||
|
I don't know the intimacies of other areas. Thanks for sending in your
|
||
|
comments though!]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Haiku
|
||
|
|
||
|
Operator hi
|
||
|
who is it that sets my phone
|
||
|
on redial and tone
|
||
|
|
||
|
gives me rest in times
|
||
|
great stress lays its head on my
|
||
|
leads me into joy
|
||
|
|
||
|
cosmos and mizar
|
||
|
give evidence and homage
|
||
|
to your greatness, why
|
||
|
|
||
|
logon/password
|
||
|
on your very first try shall
|
||
|
succeed, as always
|
||
|
|
||
|
oh, A T and T
|
||
|
while great, holds non to the great
|
||
|
power that NYNEX
|
||
|
|
||
|
gives access to in
|
||
|
glee, awaitnig, cautiously,
|
||
|
for signs of entry
|
||
|
|
||
|
illicitly thus
|
||
|
strives to maintain control of
|
||
|
the ESS switch,
|
||
|
|
||
|
not comprehending
|
||
|
that control is simply gained
|
||
|
by a single call
|
||
|
|
||
|
to some stupid yet
|
||
|
revered operator who
|
||
|
believes you in charge
|
||
|
|
||
|
gives out system pass
|
||
|
with some small feat of trick'ry
|
||
|
PAD to PAD, too, works
|
||
|
|
||
|
sounding of the baud
|
||
|
with modem and coupler
|
||
|
connection is made
|
||
|
|
||
|
who is to question
|
||
|
the incidence of this fault
|
||
|
or acknowledge it
|
||
|
|
||
|
security's words
|
||
|
false threats followed by arrest
|
||
|
on illegal grounds
|
||
|
|
||
|
hackers, phreakers grieve
|
||
|
free the unjustly accused
|
||
|
give them freedom to
|
||
|
|
||
|
ROAM with cellular
|
||
|
phones place to place with no charge
|
||
|
test the system's worth
|
||
|
|
||
|
find holes, detect bugs
|
||
|
run systems by remote, yea,
|
||
|
to explore, to seek,
|
||
|
|
||
|
to find a network
|
||
|
of free bits and bytes unharmed--
|
||
|
innocently seen.
|
||
|
|
||
|
who doesn't know that
|
||
|
Bell or Sprint or MCI
|
||
|
would never approve--
|
||
|
|
||
|
believe in 'puter crime,
|
||
|
toll fraud, "access devices,"
|
||
|
free calls to Denmark
|
||
|
|
||
|
Information is
|
||
|
power is imperative
|
||
|
proprietary
|
||
|
|
||
|
please, spare me the grief
|
||
|
accusations being thrown
|
||
|
of phone co. crashes
|
||
|
|
||
|
are fiction unleashed
|
||
|
to the ignorant public
|
||
|
eye to make blame, fear
|
||
|
|
||
|
all phr/ackers, but all
|
||
|
have had their days and faded
|
||
|
into the past, why
|
||
|
|
||
|
must ignorant block
|
||
|
the free flow of knowledge found
|
||
|
angry sysops abound
|
||
|
|
||
|
secret service rais
|
||
|
hoisting games, computers, phones
|
||
|
never to be re-
|
||
|
|
||
|
turned hackers, phreakers
|
||
|
working for government, spies,
|
||
|
lies, deception, all
|
||
|
|
||
|
to walk free while friends
|
||
|
spend years in jail for simply
|
||
|
battling for some change
|
||
|
|
||
|
knowledge is NOT free
|
||
|
equipment costing milliions,
|
||
|
simply cannot pay
|
||
|
|
||
|
the cost for systems
|
||
|
of signal switching; no on e
|
||
|
wants to harm, just try
|
||
|
|
||
|
to use our knowledge
|
||
|
in a constructive way and
|
||
|
look around for things
|
||
|
|
||
|
which further know-how
|
||
|
of packet switching, ANI,
|
||
|
proctor tests and tones
|
||
|
|
||
|
which make little sense
|
||
|
and why is it there, what are
|
||
|
all the test lines for?
|
||
|
|
||
|
central office trash
|
||
|
provides some clues, while phone calls
|
||
|
get angry response
|
||
|
|
||
|
to inquiries re:
|
||
|
loops and lack of barriers,
|
||
|
COCOT carriers
|
||
|
|
||
|
who overcharge cause
|
||
|
frustraton, must be helped
|
||
|
end overbilling
|
||
|
|
||
|
unfairness is only
|
||
|
people not understanding
|
||
|
nor comprehending
|
||
|
|
||
|
that what we do is
|
||
|
NOT always fraud, vengeance or
|
||
|
deceitful reasons
|
||
|
|
||
|
bu for love of the
|
||
|
systems, curiosity's
|
||
|
overwhealming need
|
||
|
|
||
|
to be met and to
|
||
|
feel accomplished, proud, to
|
||
|
do and know something
|
||
|
|
||
|
WELL crackers abound
|
||
|
pirates do multiply, spread
|
||
|
wavez of warez cross coasts
|
||
|
|
||
|
and foreign countries
|
||
|
virus creators seeking
|
||
|
escape, growth, freedom
|
||
|
|
||
|
not for destruction
|
||
|
but for change, to press limits
|
||
|
to find that which makes
|
||
|
|
||
|
us whole, complete, and
|
||
|
accomplished at crossing
|
||
|
the barriers that
|
||
|
|
||
|
bound conventional
|
||
|
people in dead-end jobs with
|
||
|
little self-esteem.
|
||
|
|
||
|
hacking, phreaking, it
|
||
|
is an art form, and a quest
|
||
|
for endless reaches
|
||
|
|
||
|
to seek, to explore, to
|
||
|
realize and accomplish, to
|
||
|
take chances and live
|
||
|
|
||
|
not for rules and laws
|
||
|
but for what things should be but
|
||
|
will not come to pass.
|
||
|
|
||
|
|
||
|
--kyra
|
||
|
|
||
|
[Uh oh, we're getting pretty literary here. I can see it now:
|
||
|
|
||
|
Phrack Magazine. For the Sensitive Hack/Phreak.
|
||
|
|
||
|
Interesing poem tho...]
|
||
|
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Dear Editor of Phrack Magazine;
|
||
|
Ok Erik (mr. editor), there is also a poem that I have written for Wei.
|
||
|
|
||
|
"Thinking of Ding Wei"
|
||
|
(C) 1994, 1995 Oliver Richman.
|
||
|
|
||
|
Come here, let me tell you something,
|
||
|
How I hide my love for Wei Ding:
|
||
|
By forgetting all my thinking!
|
||
|
|
||
|
When in my mind Wei's heart I see..
|
||
|
I want to tell her "wo ai ni",
|
||
|
So her and I will always be.
|
||
|
|
||
|
Her mind is pure, like pretty Jade..
|
||
|
She makes me want to give her aid.
|
||
|
I know that her love will not fade.
|
||
|
|
||
|
My patience tries to move the sea.
|
||
|
But can I deny you and me?
|
||
|
I want our hearts to set us free.
|
||
|
|
||
|
I really love you, dear Ding Wei,
|
||
|
I think about you every day.
|
||
|
Tell me, what more can I say?
|
||
|
|
||
|
[What's this? Another Poem? A tribute of Love for some chick named Wei?
|
||
|
Holy Lord. We need to get some codes or credit cards or something in here
|
||
|
to offset this burst of "Heartfelt Emotive Print." ]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
the other day upon the stair
|
||
|
i met a man who wasn't there
|
||
|
he wasn't there again today
|
||
|
i think he's from the CIA
|
||
|
|
||
|
|
||
|
[NOW THIS IS MY KIND OF POETRY! SHORT, SIMPLE, AND FUNNY.
|
||
|
WHATEVER HAPPENED TO BENNETT CERF???]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
As a former AOLite and definite wannabe, and having d/l the log of
|
||
|
the Rushkoff/Sirius hypechat, I could tell from the beginning that it
|
||
|
would be just as you reviewed _Cyberia_ as being. Every other word
|
||
|
Rushkoff used was Cyberia or Cyberians. As lueless and vulnerable to hype
|
||
|
as I was, I couldn't help but stand back and listen to all the shit with a
|
||
|
grin. In the same not, I ran into David Brin on AOL as well, and managed
|
||
|
to get a correspondence goig with him. He was on discussing all the
|
||
|
research he did on the "Net" and about the papers he was delivering, and,
|
||
|
most importantly (of course), his upcoming BOOK about the Internet and
|
||
|
privacy. At the time, still under the glossy spell of Wired (which I still
|
||
|
find interesting) and the hype, I was eager to offer him an interview
|
||
|
proposal, which I would have published in Wired if at all possible.
|
||
|
|
||
|
Dr. Brin knew less than *I* did about the Internet. I can sum up most of
|
||
|
these people's vocabularies in one word: "BLAH." They may as well
|
||
|
reiterate that syllable ad infinitum--it amounts to the same thing.
|
||
|
|
||
|
[WOW!
|
||
|
|
||
|
Hey Cyber-guy, thanks for the super-cyber email. As we cruise along this
|
||
|
InfoBanh, exiting in Cyberia, it takes a diligent cyberian like you
|
||
|
to keep things in check!
|
||
|
|
||
|
Sorry bout that. I was overcome with a minor brain malfunction that
|
||
|
reduced my IQ to that of Douglas Rushkoff. Doesn't it all make you want
|
||
|
to puke?
|
||
|
|
||
|
I heard that yesterday on the soap opera "Loving" some character was hacking
|
||
|
into food companies to steal recipes. A month or so back, on "All My
|
||
|
Children" (The only soap I watch...but I'm embarrassed to say I watch it
|
||
|
religiously), Charlie & Cecily were dorking around on the Internet, and
|
||
|
sent each other email after reading notes they each left on alt.personals.
|
||
|
|
||
|
The world is coming to an end.]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Yo erikb:
|
||
|
|
||
|
yo dewd. eye am so paranoid, my t33th are rattling.
|
||
|
what dewd eye dew?
|
||
|
yew are the god of the internet.
|
||
|
how dew eye stop the paranoia?
|
||
|
please print answer in next phrack.
|
||
|
thanx.
|
||
|
m0fo
|
||
|
|
||
|
[Your Acid will wear off in a few hours. Don't worry. Enjoy it.
|
||
|
The CIA does.
|
||
|
|
||
|
If it doesn't go away in a few days, there are some nice men in
|
||
|
white lab coats who will be glad to help you out.
|
||
|
|
||
|
How do you stop the paranoia? Your answer: Thorazine!]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
This is Nemo Kowalski speaking (aka Paolo Bevilacqua).
|
||
|
I just discovered Phrack at the young age of 31. ;-)
|
||
|
Well, I like it a lot, at least like I enjoyed doing real
|
||
|
things here in Europe, alone and with DTE222, years ago.
|
||
|
I'm going to write something about the first anti-hacker operation
|
||
|
in Italy, "Hacker Hunter," in which, incidentally, I got busted.
|
||
|
Do you think your some of the old stories from altger and Itapac
|
||
|
can be of interest to your readers?
|
||
|
|
||
|
To Robert Clark:
|
||
|
|
||
|
I read "My Bust" and I liked it. I'm not a native english speaker,
|
||
|
but I think it was well-written, plus principally, I felt a pleasant
|
||
|
"reader sharing writer's experiences" sensation that can separate a good
|
||
|
reading from pure BS. This is expecially true since I've been busted here
|
||
|
in Italy, and I've learned that things are more similar around the
|
||
|
western world than I would have thought.
|
||
|
|
||
|
The only thing I can't share is your Seattle experience. Maybe the dichotomy
|
||
|
good druge/bad drugs has a different meaning for you?
|
||
|
|
||
|
Respect,
|
||
|
|
||
|
Nemo
|
||
|
|
||
|
[Nemo:
|
||
|
|
||
|
Please write as much or as little as you like about the busts in
|
||
|
Italy! We have an article this issue about Italy, but any further
|
||
|
insights into your experiences, esspecially regarding how busts
|
||
|
are carried out in other countries would be greatly appreciated by
|
||
|
our readers!
|
||
|
|
||
|
I look forward to reading whatever you can put together!]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Chris,
|
||
|
|
||
|
As a relative neophyte to hacking, one of the problems I come up with a
|
||
|
lot is identifying systems I locate scanning. So, I was wondering if Phrack,
|
||
|
or any other zine, had ever published a concise guide to clues to
|
||
|
help identify unknown systems. If so, could you please let me know what
|
||
|
mag, and what issue.
|
||
|
|
||
|
One last thing, are there any internet sites with info of interest to hackers?
|
||
|
I know about eff.org and freeside.com and a few others, but nothing really
|
||
|
intriguing...any suggestions?
|
||
|
|
||
|
[You will find a good start to identifying strange systems, and in
|
||
|
locating sites of interest to hackers in the #Hack FAQ we've printed
|
||
|
in this issue. ]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
For Phrack news, Darkman was busted in Winnipeg City, Canada, for various
|
||
|
reasons, but since I knew him personally I wanted to add my two cents.
|
||
|
For the record, he was busted for warez and porn as well as hacking into the
|
||
|
UoManitoba, and I heard his wife left him because he spent too much time
|
||
|
pirating on IRC. He was about 38. He could read fluently in Russign, and
|
||
|
I remember one night we discovered some secret KGB documents from the 50's,
|
||
|
real science fiction thriller stuff, and he read it to me.
|
||
|
|
||
|
Akalabeth
|
||
|
|
||
|
[It's a drag that your friend was busted, and knowing the Canadian
|
||
|
government, the porn part was probably pretty minor shit in a worldly
|
||
|
sense.
|
||
|
|
||
|
I'm kinda intrugued by the "KGB Documents" you found. Uh, were these on
|
||
|
the net? Did you have a cyrillic character set loaded? How did you
|
||
|
read these documents? Were they on paper?
|
||
|
|
||
|
SEND THEM TO PHRACK! :) ]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Top 10 Reasons Why I Should Get My Subscription FREE:
|
||
|
|
||
|
(1) I'm a programmer/Analyst for an electric utility company in Texas
|
||
|
(ahh, come on - I'm a fellow Texan!)
|
||
|
|
||
|
(2) I've read Phrack for years (loyalty scores points - right?)
|
||
|
|
||
|
(3) I've been involved with compuers since GOD created the PC
|
||
|
(I began in late 70's-early 80's).
|
||
|
|
||
|
(4) I'm *not* a narc (shh, don't tell anybody.)
|
||
|
|
||
|
(5) I *may* have a record (but if I do, it's for minor kind of stuff -
|
||
|
I'm basically a nice guy).
|
||
|
|
||
|
(6) I don't like the telephone company (you have to admit they're amusing
|
||
|
though.)
|
||
|
|
||
|
(7) I know how to get around on the 'net (can't you tell - I have an AOL
|
||
|
account <g>.)
|
||
|
|
||
|
(8) I'm a good source of info regarding all types of mainframe and PC
|
||
|
programming.
|
||
|
|
||
|
(9) PLEASE....
|
||
|
|
||
|
(10) I'll quit writing dumb letters and trying to be funny.
|
||
|
|
||
|
[David Letterman is in the background throwing up as I'm typing
|
||
|
|
||
|
Don't quit your day job...but I'll send you Phrack anyway. :) ]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
Hey Chris,
|
||
|
|
||
|
I just read your thing in Phrack abou the US being attacked by our so
|
||
|
called "allies" and I agree with you 110%! I do believe that we should start
|
||
|
some sort of CyberArmy to fight back. I don't think that our government
|
||
|
would mind, unless we crashed an economy that they were involved with or
|
||
|
something, but hell, they fuck with us, let's fuck with them. And you were
|
||
|
saying about phone costs, isn't it possible to just telnet or something over
|
||
|
there? And why stop at fighting back against our information agressors, why
|
||
|
not fight back against other countries that our government is too chickenshit
|
||
|
to fight against? Cuba comes to mind. Well, I hope you reply or something, I
|
||
|
really like Phrack, I try to get it whenever I can manage, but I don't
|
||
|
have an internet address where I can get files. Keep up the good work.
|
||
|
|
||
|
[Yet another volunteer for the US Cyber Corp! By God, I'll have
|
||
|
an army yet. :) ]
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
|
||
|
==Phrack Magazine==
|
||
|
|
||
|
Volume Six, Issue Forty-Seven, File 2a of 23
|
||
|
|
||
|
*****************************************************************************
|
||
|
|
||
|
Phrack Editorial
|
||
|
|
||
|
What you are about to read is pure speculation on my part. Do not take
|
||
|
this to be 100% fact, since most of it is hypothesis. But it sure will
|
||
|
make you think twice. "Ever get the feeling you're being cheated?"
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
So...Mitnick was busted.
|
||
|
|
||
|
There certainly are some really odd things regarding the whole mess,
|
||
|
especially with regards to the "investigating" being done by
|
||
|
a certain heretofore unheralded "security" professional and
|
||
|
a certain reporter.
|
||
|
|
||
|
One of the first oddities was the way the Mitnick saga suddenly
|
||
|
reappeared in the popular media. In February, and seemingly out of
|
||
|
nowhere, the ever diligent John Markoff entered the scene with the
|
||
|
a groundbreaking story. (Of course this is meant to be sarcastic as
|
||
|
hell.) Markoff's story dealt with a near miss by federal authorities
|
||
|
trying to apprehend Mr. Mitnick in Seattle about 5 months prior.
|
||
|
|
||
|
Now, if nothing else happened in the whole Mitnick saga, I never would
|
||
|
have given this a second thought, but in light of what followed,
|
||
|
it really does seem odd. Why would someone write about a subject that
|
||
|
is extremely dated of no current newsworthiness? "Our top story tonight:
|
||
|
Generalissimo Francisco Franco is still dead."
|
||
|
|
||
|
To be fair, I guess Markoff has had a hard on for Mitnick for ages.
|
||
|
Word always was that Mitnick didn't really like the treatment he got
|
||
|
in Markoff's book "Cyberpunk" and had been kinda screwing with him for
|
||
|
several years. (Gee, self-proclaimed techie-journalist writes something
|
||
|
untrue about computer hackers and gets harassed...who would have thought.)
|
||
|
So it really isn't that odd that Markoff would be trying to stay abreast
|
||
|
of Mitnick-related info, but it certainly is odd that he would wait
|
||
|
months and months after the fact to write something up.
|
||
|
|
||
|
But wait, a scant month and a half later, Mitnick gets busted! Not
|
||
|
just busted, but tracked down and caught through the efforts of a
|
||
|
computer security dude who had been hacked by Mitnick. Breaking the
|
||
|
story was none other than our faithful cyber-newshawk, John Markoff.
|
||
|
|
||
|
"Tsutomo Shimomura, born to an American mother and a Japanese father,
|
||
|
thus becan life as he was destined to live it...going in several
|
||
|
directions at once. A brilliant neurosurgeon, this restless young man
|
||
|
grew quickly dissatisfied with a life devoted solely to medicine.
|
||
|
He roamed the planet studying martial arts and particle physics,
|
||
|
colelcting around him a most eccentric group of friends, those
|
||
|
hard-rocking scientists The Hong Kong Cavaliers.
|
||
|
|
||
|
"And now, with his astounding jet car ready for a bold assault on the
|
||
|
dimension barrier, Tsutomo faces the greatest challenge of his turbulent
|
||
|
life...
|
||
|
|
||
|
"...while high above Earth, an alien spacecraft keeps a nervous watch on
|
||
|
Team Shimomura's every move..."
|
||
|
|
||
|
Wait a minute...that's Buckaroo Banzai. But the similarities are almost
|
||
|
eerie. Security dude by day, hacker tracker by night, ski patrol
|
||
|
rescue guy, links to the NSA! WOWOW! What an incredible guy! What an
|
||
|
amazing story!
|
||
|
|
||
|
But wait! Let's take a closer look at all of this bullshit, before it
|
||
|
becomes so thick all we can see is tinted brown.
|
||
|
|
||
|
Shimomura was supposedly hacked on Christmas Eve by Kevin Mitnick, which
|
||
|
set him off on a tirade to track down the guy who hacked his system.
|
||
|
Supposedly numerous IP tools were taken as well as "millions of dollars
|
||
|
worth of cellular source code."
|
||
|
|
||
|
First off, Shimomura's TAP is available via ftp. Modified versions of this
|
||
|
have been floating around for a while. I suppose it's safe to assume that
|
||
|
perhaps Tsutomo had modified it himself with further modifications (perhaps
|
||
|
even some of the IP/localhost spoofs that the X-consortium guys were
|
||
|
playing with, or maybe other tricks like denial of service and source-routing
|
||
|
tricks...I don't really know, I don't have any such thing authored by
|
||
|
Shimomura.)
|
||
|
|
||
|
Secondly, what is all this cellular source code? And why did Shimomura have
|
||
|
it? Could it be that this is really just some kind of smokescreen to make
|
||
|
it seem like Mitnick did something bad? For those of you who don't know,
|
||
|
Tsutomo is friends with Mark Lottor (yes, the OKI experimenter, and CTEK
|
||
|
manufacturer.). They have been friends for some time, but I don't know
|
||
|
how long. Lottor used to be roommates with, lo and behold, Kevin Poulsen!
|
||
|
Yes, that Kevin Poulsen...the guy who before Mitnick was the "computer
|
||
|
criminal de jour." Poulsen and Mitnick were no strangers.
|
||
|
|
||
|
It wouldn't be too much of a stretch of the imagination to think that
|
||
|
those files were really ROM dumps from phones that Lottor had given
|
||
|
Shimomura. It also wouldn't be too much of a stretch to imagine that
|
||
|
Mitnick knew Tsutomo, and decided to go poke around, pissing off
|
||
|
Tsutomo who knew that he'd been violated by SOMEONE HE ACTUALLY KNEW!
|
||
|
(It sure does piss me off much more to get fucked over by someone I know
|
||
|
rather than a complete stranger.)
|
||
|
|
||
|
Woah. If any of that is true, what strange bedfellows we have. But wait,
|
||
|
it gets better...
|
||
|
|
||
|
Enter John Markoff. Markoff and Tsutomo have obviously known each other for
|
||
|
a while. I don't know where they met...but I know they were together
|
||
|
at Defcon, maybe at Hope, and probably at the Tahoe Hacker's conference
|
||
|
a few years back. (I'd have to go back and look over the group
|
||
|
photos to be certain.)
|
||
|
|
||
|
Markoff already has a stake in the Mitnick story, since it was his book,
|
||
|
"Cyberpunk" that really gave ol' Kevin some coverage. Now, if Markoff knew
|
||
|
that Mitnick had hacked Tsutomo (from Tsutomo's own mouth), then certainly
|
||
|
any journalist worth his salt would see possibilities. Gee, what a great
|
||
|
concept! A colorful computer security guy tracks down one of the world's
|
||
|
most wanted hackers! What a great story! Remember that Stoll Guy?
|
||
|
|
||
|
But in order to get the book publishers really hot, it would take some more
|
||
|
press to rejuvinate interest in the Mitnick story. So the first story,
|
||
|
months after the fact, is printed.
|
||
|
|
||
|
Meanwhile, Tsutomo is supposedly tracking down Mitnick.
|
||
|
|
||
|
How does one track down a hacker? The legal (and really annoyingly hard way)
|
||
|
is to work with other system administrators and establish a trail via
|
||
|
tcp connects and eventually back to a dialup, then work with phone companies
|
||
|
to establish a trap and trace (which usually takes two or three calls) and
|
||
|
then working with local police to get a warrant. Somehow Tsutomo seemingly
|
||
|
managed to avoid all this hassle and get a lot done by himself. How?
|
||
|
Well, the Air Force OSI managed to track down the British Datastream Cowboy
|
||
|
by hacking into the systems he was hacking into the Air Force from. This is
|
||
|
the easy way. Hmmm.
|
||
|
|
||
|
I know with a good degree of certainty that Markoff's and Tsutomo's little
|
||
|
escapades pissed off a great many people within law enforcement, but I don't
|
||
|
know exactly why. If they WERE bumbling around stepping on FBI toes
|
||
|
during the course of their litle hunt, certainly the FBI would have
|
||
|
threatened them with some kind of obstruction of justice sentence if they
|
||
|
didn't stop. Did they?
|
||
|
|
||
|
Well before any of this had begun, Mitnick had been hacking other places
|
||
|
too. Guess what? He happened to hack CSCNS, where a certain ex-hacker, Scott
|
||
|
Chasin, runs the security side of things. I remember well over a year ago
|
||
|
talking to Chasin about a hacker who had breeched CNS. Discussing his
|
||
|
methods, we thought it must be Grok, back from the netherworld, since he
|
||
|
was so skilled. The hacker also made claims of being wireless to avoid
|
||
|
being traced. (This also fit into the Grok modus operandi...so we just
|
||
|
assumed it was indeed Grok and left it at that.) Chasin told the hacker
|
||
|
to get off of CNS, and that he could have an account on crimelab.com, if
|
||
|
he would only use it for mail/irc/whatever, but with no hacking, and on
|
||
|
the agreement that he would leave CSCNS alone.
|
||
|
|
||
|
The agreement was made, but went sour after only a few weeks when the mystery
|
||
|
hacker began going after CSCNS again. The Colorado Springs FBI was called
|
||
|
in to open an investigation. This was ages ago, but of course, field agencies
|
||
|
rarely talk.
|
||
|
|
||
|
Back in the present, Tsutomo goes to help out at the Well, where
|
||
|
a certain admin (pei) was having problems with intruders. This is the
|
||
|
same pei who a few months earlier told Winn Schwartau "The Well has no
|
||
|
security!" Which Winn reported in his newsletter. (This of course came after
|
||
|
Winn's account on the Well was reactvated by an anonymous person who
|
||
|
posted several messages about Markoff and signed them "km." DUH!)
|
||
|
|
||
|
So somehow, Tsutomo gets trace information leading back to a cell site in
|
||
|
North Carolina. How does a private citizen get this kind of information?
|
||
|
Don't ask me! My guess is that the feds said, give us what you know,
|
||
|
help us out a bit and don't get in our way. In return, one can surmise
|
||
|
that Tsutomo (and Markoff) got to glean more info about the investigation
|
||
|
by talking with the feds.
|
||
|
|
||
|
So, Mitnick gets busted, and Tsutomo got to ride around in a car with
|
||
|
a Signal Strength Meter and help triangulate Mitnick's cellular activity
|
||
|
to his apartment. Woo woo!
|
||
|
|
||
|
After all is said and done, Tsutomo has single handedly captured Mitnick,
|
||
|
John Markoff breaks the story on the FRONT PAGE of the New York Times, and
|
||
|
every other computer reporter in America continually quotes and
|
||
|
paraphrases Markoff's story and research as "God's Own Truth."
|
||
|
|
||
|
Mitnick, on the other hand, gets blamed for:
|
||
|
|
||
|
1) hacking Tsutomo
|
||
|
2) hacking the Well
|
||
|
3) hacking Netcom to get credit cards
|
||
|
4) hacking CSCNS
|
||
|
5) hacking Janet Reno's Cell Phone
|
||
|
6) hacking motorola
|
||
|
7) conversing with foreign nationals
|
||
|
etc..
|
||
|
|
||
|
Let's look at some these charges:
|
||
|
|
||
|
1) Mitnick was not the first (or only) to hack Tsutomo. The San Deigo
|
||
|
Supercomputer Center is a target for a lot of people. It's a major
|
||
|
Internet center, and there are all kinds of goodies there, and the
|
||
|
people who work there are smart guys with nice toys. Sorry, but
|
||
|
Mitnick is the scapegoat here.
|
||
|
|
||
|
2) Mitnick was not the first, last, or most recent to hack The Well.
|
||
|
Like Pei said, "The Well Has No Security." I know this first hand,
|
||
|
since I have an account there. I don't raise a stink about it,
|
||
|
because I pay by check, and my email is boring.
|
||
|
|
||
|
3) Mitnick was not the person who got the Netcom credit card file.
|
||
|
That file floated around for quite some time. He might have had
|
||
|
a copy of it, but so do countless others. Sorry. Wrong again.
|
||
|
|
||
|
4) Mitnick was in CNS. He was not the only one. Thanks for playing.
|
||
|
|
||
|
5) The thought that Mitnick could reprogram a MTSO to reboot upon
|
||
|
recognizing a ESN/MIN pair belonging to one specific individual
|
||
|
would require that he had hacked the manufacturer of the MTSO, and
|
||
|
gotten source code, then hacked the cellular carrier and gotten
|
||
|
a full database of ESN/MIN information. Both of these things have
|
||
|
been done by others, and Mitnick certainly could have done them too,
|
||
|
but I doubt he would have gone to that much trouble to call attention
|
||
|
to his actions.
|
||
|
|
||
|
6) Motorola, like EVERY other big-time computer industry giant has been
|
||
|
hacked by countless people.
|
||
|
|
||
|
7) Mitnick reportedly had dealings with foreign nationals, especially
|
||
|
one "Israeli" that set the CIA up in arms. Well, sure, if you get on
|
||
|
IRC and hang out, you are probably going to talk to people from other
|
||
|
countries. If you hang out on #hack and know your stuff, you will probably
|
||
|
end up trading info with someone. But, playing devil's advocate,
|
||
|
perhaps the person you might be talking to really isn't a 22 year old
|
||
|
Israeli student. Maybe he really is a 40 year old Mossad Katsa working
|
||
|
in their computer center. Was Mitnick Jewish? Would he do "whatever
|
||
|
it takes to help the plight of Jews worldwide?" Could he have been
|
||
|
approached to become one of the scores of sayanim worldwide? Sure.
|
||
|
But probably not. He'd be too hard to call on for the favors when they
|
||
|
would be needed by Mossad agents. So, I have some doubts about this.
|
||
|
|
||
|
Less than a month after the whole bust went down, Markoff and Tsutomo
|
||
|
signed with Miramax Films to produce a film and multimedia project
|
||
|
based on their hunt for Mitnick. The deal reportedly went for
|
||
|
$750,000. That is a fuckload of money. Markoff also gets to do a book,
|
||
|
which in turn will become the screenplay for the movie. (Tsutomo
|
||
|
commented that he went with Miramax "based on their track record."
|
||
|
Whatever the fuck that means.)
|
||
|
|
||
|
Less than a month and they are signed.
|
||
|
|
||
|
Looks to me like our duo planned for all this.
|
||
|
|
||
|
"Hey Tsutomo, you know, if you went after this joker, I could write a book
|
||
|
about your exploits! We stand to make a pretty penny. It would be
|
||
|
bigger than the Cuckoo's egg!"
|
||
|
|
||
|
"You know John, that's a damn good idea. Let me see what I can find.
|
||
|
Call your agent now, and let's get the ball rolling."
|
||
|
|
||
|
"I'll call him right now, but first let me write this little story to
|
||
|
recapture the interest of the public in the whole Mitnick saga. Once that
|
||
|
runs, they publishers are sure to bite."
|
||
|
|
||
|
Meanwhile Mitnick becomes the fall guy for the world's ills, and
|
||
|
two guys methodically formulate a plot to get rich. It worked!
|
||
|
|
||
|
Way to go, guys.
|
||
|
|
||
|
|
||
|
|