mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
907 lines
48 KiB
Text
907 lines
48 KiB
Text
==Phrack Inc.==
|
||
|
||
Volume Three, Issue 26, File 11 of 11
|
||
|
||
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
PWN PWN
|
||
PWN P h r a c k W o r l d N e w s PWN
|
||
PWN %%%%%%%%%%% %%%%%%%%% %%%%%%% PWN
|
||
PWN Issue XXVI/Part 3 PWN
|
||
PWN PWN
|
||
PWN April 25, 1989 PWN
|
||
PWN PWN
|
||
PWN Created, Written, and Edited PWN
|
||
PWN by Knight Lightning PWN
|
||
PWN PWN
|
||
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
||
|
||
Galactic Hacker Party March 30, 1989
|
||
%%%%%%%%%%%%%%%%%%%%%
|
||
GALACTIC HACKER PARTY
|
||
August 2-4, 1989
|
||
PARADISO, AMSTERDAM, HOLLAND
|
||
|
||
During the summer of 1989, the world as we know it will go into overload. An
|
||
interstellar particle stream of hackers, phone phreaks, radioactivists and
|
||
assorted technological subversives will be fusing their energies into a media
|
||
melt-down as the global village plugs into Amsterdam for three electrifying
|
||
days of information interchange and electronic capers.
|
||
|
||
Aided by the advanced communications technology to which they are accustomed,
|
||
the hacker forces will discuss strategies, play games, and generally have a
|
||
good time. Free access to permanently open on-line facilities will enable them
|
||
to keep in touch with home base -- wherever that is.
|
||
|
||
Those who rightly fear the threat of information tyranny and want to learn what
|
||
they can do about it are urgently invited to interface in Amsterdam in August.
|
||
There will be much to learn from people who know. Celebrity guests with
|
||
something to say will be present in body or electronic spirit.
|
||
|
||
The Force must be nurtured. If you are refused transport because your laptop
|
||
looks like a bomb, cut off behind enemy lines, or unable to attend for any
|
||
other reason, then join us on the networks. Other hacker groups are requested
|
||
to organize similar gatherings to coincide with ours. We can provide low-cost
|
||
international communications links during the conference.
|
||
|
||
[ Despite the wishes of those planning the "Galactic Hacker ]
|
||
[ Party," there will be NO change in plans for SummerCon '89! ]
|
||
|
||
For further information, take up contact as soon as possible with:
|
||
|
||
HACK-TIC PARADISO
|
||
P.O. box 22953 Weteringschans 6-8
|
||
1100 DL Amsterdam 1017 SG Amsterdam
|
||
The Netherlands The Netherlands
|
||
|
||
tel: +31 20 6001480 tel: +31 20 264521 / +31 20 237348
|
||
_______________________________________________________________________________
|
||
|
||
Subversive Bulletin Boards March 26, 1989
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
An article in a newspaper from the United Kingdom had an article relating to a
|
||
computer bulletin board being run by a 14-year-old boy in Wilmslow, Cheshire,
|
||
England. It contained information relating to such things as making plastic
|
||
explosives.
|
||
|
||
Anti-terrorist detectives are said to be investigating for possible breaches of
|
||
the Obscene Publications Act. Apparently reporters were able to easily gain
|
||
access to this bulletin board and peruse articles on such subjects as credit
|
||
card fraud, making various types of explosives, street fighting techniques and
|
||
dodging police radar traps.
|
||
|
||
One article was obviously aimed at children and described how to make a bomb
|
||
suitable for use on "the car of a teacher you do not like at school," which
|
||
would destroy the tire of a car when it was started.
|
||
|
||
The boy's parents did not seem to think that their son was doing anything
|
||
wrong, preferring him to be working with his computer rather than roaming the
|
||
streets.
|
||
|
||
A London computer consultant, Noel Bradford, is quoted as having seen the
|
||
bulletin board and found messages discussing "how to crack British Telecom, how
|
||
to get money out of people and how to defraud credit card companies. Credit
|
||
card numbers are given, along with PIN numbers, names, addresses and other
|
||
details."
|
||
_______________________________________________________________________________
|
||
|
||
Tale Of TWO TAP Magazines! April 24, 1989
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
It seemed inevitable that the battle for the rights to TAP would come into
|
||
play, but many wonder why it has taken so long.
|
||
|
||
The Renegade Chemist, long time member of Phortune 500 and one of its "Board Of
|
||
Directors," has been talking about re-starting TAP Magazine for at least two
|
||
years... nothing ever happened with it until now. TRC claims that the TAP
|
||
Magazine crew in Kentucky is just a fraud and that he is putting on the "REAL
|
||
McCoy."
|
||
|
||
For a free issue of The Renegade Chemist's TAP Magazine, send a self-addressed
|
||
stamped envelope to:
|
||
|
||
Data Security Consultants, Inc.
|
||
TAP Magazine
|
||
P.O. Box 271
|
||
South Windam, CT 06266-0271
|
||
|
||
Now on the other hand, Aristotle of the Kentucky based TAP Magazine has shown
|
||
an almost uncaring attitude about The Renegade Chemist's statements about TAP
|
||
Magazine. He says that he does not "really mind if these people put out a
|
||
magazine. Honestly I just want to help the community and the more magazines
|
||
and information, the better."
|
||
|
||
The really big news about the Kentucky based TAP Magazine came Saturday, April
|
||
22, 1989. Apparently, because of problems with local banks and the Internal
|
||
Revenue Service, TAP Magazine is now FREE!
|
||
|
||
The only catch is that if you want it, you have to send them a self-addressed
|
||
stamped envelope to get each issue or "you can send cash, but only enough to
|
||
pay for postage, 25 cents should cover it." Do not send any kinds of checks
|
||
and/or money orders. Anyone who did will be receiving their checks back or
|
||
at least those checks will not be cashed. The TAP Magazine staff will be
|
||
taking care of the printing costs out of their own pocket.
|
||
|
||
So for the FREE TAP Magazine, send a self-addressed stamped envelope to:
|
||
|
||
P.O. Box 20264
|
||
Louisville, KY 40220
|
||
|
||
Issue 93 is due for the end of April 1989, but Aristotle also wanted me to let
|
||
everyone know that he will be attending SummerCon '89 and bringing with him
|
||
plenty of issues of all the TAPs that he, Olorin The White, and Predat0r have
|
||
published.
|
||
|
||
As I have not seen TRC's TAP, I make no judgements. Instead, get a copy of
|
||
both TAPs FREE and compare them yourself. The market will decide which TAP
|
||
will continue.
|
||
|
||
Information Provided by
|
||
Aristotle and The Renegade Chemist
|
||
_______________________________________________________________________________
|
||
|
||
Computer Group Wary Of Security Agency April 11, 1989
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
Taken from the San Francisco Chronicle
|
||
|
||
A public interest group said yesterday that the National Security Agency, the
|
||
nation's biggest intelligence agency, could exert excessive control over a
|
||
program to strengthen the security of computer systems throughout the federal
|
||
government.
|
||
|
||
The group, Computer Professionals for Social Responsibility -- based in Palo
|
||
Alto -- urged key members of Congress to focus "particularly close scrutiny" on
|
||
the agency's role in helping to implement legislation aimed at safeguarding
|
||
sensitive but unclassified information in federal computers.
|
||
|
||
"There is a constant risk that the federal agencies, under the guise of
|
||
enhancing computer security, may find their programs -- to the extent that they
|
||
rely upon computer systems -- increasingly under the supervision of the largest
|
||
and most secretive intelligence organization in the country," it said.
|
||
_______________________________________________________________________________
|
||
|
||
Verifying Social Security Numbers April 11, 1989
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
Taken From The New York Times
|
||
|
||
Dorcas R. Hardy, Commisssioner of the Social Security Administration, told a
|
||
Congressional committee that the agency had verified millions of SSN's for
|
||
private credit companies.
|
||
|
||
TRW, the nation's largest credit reporting company, recently proposed paying
|
||
the Social Security Administration $1,000,000 to have 140 million numbers
|
||
verified.
|
||
|
||
Phil Gambino, an agency spokesman, reported last month that the agency had
|
||
verified social security numbers only at the request of beneficiaries or
|
||
employers and had never verified more than 25 numbers at a time. He said such
|
||
disclosures were required under the Freedom of Information Act.
|
||
|
||
At the hearing yesterday, Dorcas R. Hardy, denied any other verifications at
|
||
first. However, she later admitted that in the early 1980s, 3,000,000 social
|
||
security numbers were verified for CitiCorp and that last year 151,000 numbers
|
||
were verified for TRW. Ms. Hardy said that the 151,000 numbers were just part
|
||
of a "test run."
|
||
|
||
Senator David Pryor, a democrat from Arkansas and chairman of the Special
|
||
Committee on Aging, said that previous commissioners; the Congressional
|
||
Research Service of the Library of Congress, and Donald A. Gonya, chief counsel
|
||
for Social Security have all decided that such verification is illegal.
|
||
_______________________________________________________________________________
|
||
|
||
PWN Quicknotes
|
||
|
||
1. Prank Virus Warning Message (March 28, 1989) -- An individual placed a time
|
||
bomb message on a government service system in the San Francisco Bay Area
|
||
saying, "WARNING! A computer virus has infected the system!" The
|
||
individual is learning that such a prank is considered almost as funny as
|
||
saying that you have a bomb in your carry-on luggage as you board a plane.
|
||
-- Bruce Baker, Information Security Program, SRI International
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
2. Hackers' Dictionary In Japanese? (March 30, 1989) -- What is this you ask?
|
||
This amusing compilation was put together a decade or so ago by artificial
|
||
intelligence (AI) graduate students at Stanford, MIT, and Carnegie-Mellon
|
||
and recorded the then-current vernacular of their shared cultures. They
|
||
did it for fun, but it somehow ended up getting published.
|
||
|
||
The Hackers' Dictionary contains more than a few puns, jokes, and other
|
||
things that are hard to translate such as "moby," as in "moby memory", or
|
||
"fubar" and its regional variants "foo bar" and "foo baz."
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
3. AT&T's Air Force -- AT&T has an air force that patrols its cable routes,
|
||
some routes 24 hours a day, 365 days a year. The AT&T air force includes
|
||
helicopters and fixed-wing aircraft. For some areas, AT&T uses infantry
|
||
and armored cars. AT&T's Sue Fleming says, "We hope NOT to find any
|
||
activity. We don't want to 'catch' people. But if we do spot a digging
|
||
crew, the usual procedure is for the pilot to radio the location back to a
|
||
ground crew, who check it out. On occasion, they drop notes -- or even
|
||
land -- but that depends on where the site is. In some areas -- like New
|
||
Jersey -- unauthorized landings bring heavy penalties."
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
4. Terrorist Threat? -- Scientific advisors to the government told a Senate
|
||
panel that telecommunications networks are tempting targets for terrorist
|
||
activity. The experts said that advances in technology -- like fiber
|
||
optics, which concentrates equipment and data -- and the fragmentation of
|
||
the telecom industry after divestiture are reasons for the increased risk.
|
||
Certainly the Hinsdale, Illinois CO fire and the recent severing of a fiber
|
||
backbone in New Jersey have shown us all how vulnerable our country's
|
||
telecom network is.
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
5. FCC Rules On AOS -- The FCC has ruled on a complaint filed this summer by
|
||
two consumer groups against five Alternative Operator Services (AOS)
|
||
companies. The FCC found the complaint valid and has ordered the AOS
|
||
companies to stop certain practices immediately.
|
||
|
||
The ruling states that callers must be told when their calls are being
|
||
handled by an AOS, operators must provide callers with rate information and
|
||
hotel or payphone owners cannot block calls to other long distance
|
||
carriers. (Callers who don't take any special action when making a call
|
||
will still be routed to the pre-subscribed carrier.)
|
||
|
||
The FCC has also ordered the companies to eliminate "splashing" whenever
|
||
technically feasible. Splashing is transferring a call to a distant
|
||
carrier point-of-presence and charging the caller for the call from that
|
||
point.
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
6. Cool New Service -- CompuServe (the world's biggest computer bulletin
|
||
board) users can now dial in and search and find articles from a bunch of
|
||
different technical trade magazines. The database was put together by an
|
||
outfit called Information Access Company. It currently contains full-text
|
||
articles for 50 publications and paraphrased abstracts for 75 more. Most
|
||
coverage begins with the January 1987 issues.
|
||
|
||
You can search the publications by magazine name, author, key word, key
|
||
phrase, etc., then pull up the abstracts of the article of interest and, if
|
||
needed and when available, get the full text of the article. And it's easy
|
||
to use.
|
||
|
||
Charge for the service is $24 per hour, $1 for each abstract, and $1.50 for
|
||
each full-text article accessed. CompuServe charges $12.50 per hour for
|
||
connect time. Both per hour charges are pro-rated, and, with the databases
|
||
being so easy to use, you'll rarely be on the board for more than 10-15
|
||
minutes, so those costs will drop.
|
||
|
||
CompuServe 800-848-8199
|
||
Information Access 800-227-8431
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
7. ISDN Calling Number Identification Services (April 7, 1989) -- Bellcore
|
||
Technical Reference TR-TSY-000860, "ISDN Calling Number Identification
|
||
Services" can be purchased for $46 from:
|
||
|
||
Bellcore
|
||
Customer Service
|
||
60 New England Ave
|
||
Piscataway, NJ 08854-4196
|
||
(201) 699-5800
|
||
|
||
This Technical Reference contains Bellcore's view of generic requirements
|
||
for support of ISDN Calling Number Identification (I-CNIS). The I-CNIS
|
||
feature extends the concepts of Calling Number Delivery and Calling Number
|
||
Delivery Blocking to ISDN lines. I-CNIS also allows the customer to
|
||
specify which Directory Number (DN) should be used for each outgoing call
|
||
and provides network screening to ensure that the specified DN is valid.
|
||
I-CNIS handles calling number processing for both circuit-mode and
|
||
packet-mode ISDN calls and provides four component features: Number
|
||
Provision, Number Screening, Number Privacy, and Number Delivery. Material
|
||
on Privacy Change by the calling party and Privacy Override by the called
|
||
party is also included.
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
8. Founder of TAP Magazine, Abbie Hoffman, born in 1936, passed away on April
|
||
12, 1989. He was found dead in his apartment in New Hope, PA. He was
|
||
fully dressed under the bedcovers. An autopsy was inconclusive. An
|
||
article about him appears in the April 24, 1989 issue of Time Magazine,
|
||
"A Flower in a Clenched Fist," page 23.
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
9. Bill Landreth aka The Cracker, author of Out Of The Inner Circle, has
|
||
reappeared. Supposedly, he is now working as a bookbinder in Orange
|
||
County, California and living with the sysop of a bulletin board called the
|
||
"Pig Sty." -- Dark Sorcerer (April 19, 1989)
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
10. Hacker/Phreaker Gets "Stiff" Penalty (Green Bay, Wisconsin) -- David
|
||
Kelsey, aka Stagehand, plead guilty to two counts of class "E" felonies
|
||
and received a 90 day jail term. Once he has completed his jail term, he
|
||
will serve three years probation and an unknown amount of community
|
||
service hours.
|
||
|
||
In addition to these penalties, Stagehand must also pay restitution of
|
||
$511.00 to Schneider Communications of Green Bay, Wisconsin. Stagehand
|
||
was given all his computer equipment back as part of the plea bargain --
|
||
minus any materials considered to be "ill gotten" gains.
|
||
_______________________________________________________________________________
|
||
! ***
|
||
|
||
|
||
1:30:22 p.m. ARE YOU STILL THERE ?
|
||
! ***
|
||
|
||
|
||
1:35:22 p.m. RESPOND OR BE LOGGED OFF
|
||
!
|
||
|
||
y
|
||
supervisors who said the taps were for the police. They were told that many of
|
||
the taps were for the FBI.
|
||
|
||
Another radio amateur, Vincent Clark/KB4MIT, a technician for South-Central
|
||
Bell from 1972 to 1981, said he placed illegal wiretaps similar to those done
|
||
by Bob Draise on orders from his supervisors -- and on request from local
|
||
policemen in Louisville, Kentucky.
|
||
|
||
When asked how he got started in the illegal wiretap business, Bob said that a
|
||
friend called and asked him to come down to meet with the Cincinnati police. An
|
||
intelligence sergeant asked Bob about wiretapping some Black Muslims. He also
|
||
told Bob that Cincinnati Bell security had approved the wiretap -- and that it
|
||
was for the FBI. The sergeant pointed to his Masonic ring which Bob also wore
|
||
-- in other words, he was telling the truth under the Masonic oath -- something
|
||
that Bob put a lot of stock in.
|
||
|
||
Most of the people first wiretapped were drug or criminal related. Later on,
|
||
however, it go out of hand -- and the FBI wanted taps on prominent citizens.
|
||
"We started doing people who had money. How this information was used, I
|
||
couldn't tell you."
|
||
|
||
The January 29th "Newsday" said Draise had told investigators that among the
|
||
taps he rigged from 1972 to 1979 were several on lines used by Wren Business
|
||
Communications, a Bell competitor. It seems that when Wren had arranged an
|
||
appointment with a potential customer, they found that Bell had just been there
|
||
without being called. Wren's president is a ham radio operator, David
|
||
Stoner/K8LMB.
|
||
|
||
When spoken with, Dave Stoner said the following;
|
||
|
||
"As far as I am concerned, the initial focus for all of this began
|
||
with the FBI. The FBI apparently set up a structure throughout the
|
||
United States using apparently the security chiefs of the different
|
||
Bell companies. They say that there have been other cases in the
|
||
United States like ours in Cincinnati but they have been localized
|
||
without the realization of an overall pattern being implicated."
|
||
|
||
"The things that ties this all together is if you go way back in
|
||
history to the Hoover period at the FBI, he apparently got together
|
||
with the AT&T security people. There is an organization that I
|
||
guess exists to this day with regular meetings of the security
|
||
people of the different Bell companies. This meant that the FBI
|
||
would be able to target a group of 20 or 30 people that represented
|
||
the security points for all of the Bell and AT&T connections in the
|
||
United States. I believe the key to all of this goes back to Hoover.
|
||
The FBI worked through that group who then created the activity at
|
||
the local level as a result of central planning."
|
||
|
||
"I believe that in spite of the fact that many people have indicated
|
||
that this is an early 70's problem -- that there is no disruption to
|
||
that work to this day. I am pretty much convinced that it is
|
||
continuing. It looks like a large surveillance effort that
|
||
Cincinnati was just a part of."
|
||
|
||
"The federal prosecutor Kathleen Brinkman is in a no-win situation.
|
||
If she successfully prosecutes this case she is going to bring
|
||
trouble down upon her own Justice Department. She can't
|
||
successfully prosecute the case."
|
||
|
||
About $200 million in lawsuits have already been filed against Cincinnati Bell
|
||
and the Police Department. Several members of the police department have taken
|
||
the Fifth Amendment before the grand jury rather than answer questions about
|
||
their roles in the wiretapping scheme.
|
||
|
||
Bob Draise/WB8QCF has filed a suit against Cincinnati Bell for $78 for
|
||
malicious prosecution and slander in response to a suit filed by Cincinnati
|
||
Bell against Bob for defamation. Right after they filed the suit, several
|
||
policemen came forward and admitted to doing illegal wiretaps with them. The
|
||
Cincinnati police said they stopped this is 1974 -- although another policeman
|
||
reportedly said they actually stopped the wiretapping in 1986.
|
||
|
||
Now the CBS-TV program "60 Minutes" is interested in the Cincinnati goings-on
|
||
and has sent in a team of investigative reporters. Ed Bradley from "60
|
||
Minutes" has already interviewed Bob Draise/WB8QCF and it is expected that
|
||
sometime during this month (April) April, we will see a "60 Minutes" report on
|
||
spying by the FBI. We also understand that CNN, Ted Turner's Cable News
|
||
Network, is also working up a "Bugging of America" expose.
|
||
_______________________________________________________________________________
|
||
|
||
Crackdown On Hackers Urged April 9, 1989
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
Taken From the Chicago Tribune (Section 7, Page 12b)
|
||
|
||
"Make Punishment Fit The Crime," computer leaders say.
|
||
|
||
DALLAS (AP) -- The legal system has failed to respond adequately to the threat
|
||
that hackers pose to the computer networks crucial to corporate America, a
|
||
computer expert says.
|
||
|
||
Many computer hackers "are given slaps on the wrist," Mark Leary, a senior
|
||
analyst with International Data Corp., said at a roundtable discussion last
|
||
week.
|
||
|
||
"The justice system has to step up...to the fact that these people are
|
||
malicious and are criminals and are robbing banks just as much as if they
|
||
walked up with a shotgun," he said.
|
||
|
||
Other panelists complained that hackers, because of their ability to break into
|
||
computer systems, even are given jobs, sometimes a security consultants.
|
||
|
||
The experts spoke at a roundtable sponsored by Network World magazine, a
|
||
publication for computer network users and managers.
|
||
|
||
Computer networks have become crucial to business, from transferring and
|
||
compiling information to overseeing and running manufacturing processes.
|
||
|
||
The public also is increasingly exposed to networks through such devices as
|
||
automatic teller machines at banks, airline reservation systems and computers
|
||
that store billing information.
|
||
|
||
Companies became more willing to spend money on computer security after last
|
||
year's celebrated invasion of a nationwide network by a virus allegedly
|
||
unleased by a graduate student [Robert Tappen Morris], the experts said.
|
||
|
||
"The incident caused us to reassess the priorities with which we look at
|
||
certain threats," said Dennis Steinaur, manager of the computer security
|
||
management group of the National Institute of Standards and Technology.
|
||
|
||
But computer security isn't only a matter of guarding against unauthorized
|
||
entry, said Max Hopper, senior vice president for information systems as
|
||
American Airlines.
|
||
|
||
Hopper said American has built a "a Cheyenne mountain-type" installation for
|
||
its computer systems to guard against a variety of problems, including
|
||
electrical failure and natural disaster. Referring to the Defense Department's
|
||
underground nerve center in a Colorado mountain, he said American's precautions
|
||
even include a three-day supply of food.
|
||
|
||
"We've done everything we can, we think, to protect the total environment,"
|
||
Hopper said.
|
||
|
||
Hopper and Steinaur said that despite the high-tech image of computer
|
||
terrorism, it remains an administrative problem that should be approached as a
|
||
routine management issue.
|
||
|
||
But the experts agreed that the greatest danger to computer networks does not
|
||
come from outside hackers. Instead, they said, the biggest threat is from
|
||
disgruntled employees or others whose original access to systems was
|
||
legitimate.
|
||
|
||
Though employee screening is useful, Steinaur said, it is more important to
|
||
build into computer systems ways to track unauthorized use and to publicize
|
||
that hacking can be traced.
|
||
|
||
Steinaur said growing computer literacy, plus the activities of some
|
||
non-malicious hackers, help security managers in some respects.
|
||
|
||
Expanded knowledge "forces us as security managers not be dependent on
|
||
ignorance," Steinaur said.
|
||
|
||
"Security needs to be a part of the system, rather than a 'nuisance addition,'"
|
||
Steinaur said, "and we probably have not done a very good job of making
|
||
management realize that security is an integral part of the system."
|
||
|
||
IDC's Leary said the organization surveys of Fortune 1000 companies
|
||
surprisingly found a significant number of companies were doing little to
|
||
protect their systems.
|
||
|
||
The discussion, the first of three planned by Network World, was held because
|
||
computer sabotage "is a real problem that people aren't aware of," said editor
|
||
John Gallant. Many business people sophisticated networks."
|
||
|
||
It also is a problem that many industry vendors are reluctant to address, he
|
||
said, because it raises questions about a company's reliability.
|
||
|
||
Typed For PWN by Hatchet Molly
|
||
_______________________________________________________________________________
|
||
|
||
Ex-Worker Charged In Virus Case -- Databases Were Alleged Target Apr 12, 1989
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
by Jane M. Von Bergen (Philadelphia Inquirer)
|
||
|
||
A former employee was charged yesterday with infecting his company's computer
|
||
database in what is believed to be the first computer-virus arrest in the
|
||
Philadelphia area.
|
||
|
||
"We believe he was doing this as an act of revenge," said Camden County
|
||
Assistant Prosecutor Norman Muhlbaier said yesterday, commenting on a motive
|
||
for the employee who allegedly installed a program to erase databases at his
|
||
former company, Datacomp Corp. in Voorhees, New Jersey.
|
||
|
||
Chris Young, 21, of the 2000 block of Liberty Street, Trenton, was charged in
|
||
Camden County with one count of computer theft by altering a database.
|
||
Superior Court Judge E. Stevenson Fluharty released Young on his promise to pay
|
||
$10,000 if he failed to appear in court. If convicted, Young faces a 10-year
|
||
prison term and a $100,000 fine. Young could not be reached for comment.
|
||
|
||
"No damage was done," Muhlbaier said, because the company discovered the virus
|
||
before it could cause harm. Had the virus gone into effect, it could have
|
||
damaged databases worth several hundred thousand dollars, Muhlbaier said.
|
||
|
||
Datacomp Corp., in the Echelon Mall, is involved in telephone marketing. The
|
||
company, which has between 30 and 35 employees, had a contract with a major
|
||
telephone company to verify the contents of its white pages and try to sell
|
||
bold-faced or other special listings in the white pages, a Datacomp company
|
||
spokeswoman said. The database Young is accused of trying to destroy is the
|
||
list of names from the phone company, she said.
|
||
|
||
Muhlbaier said that the day Young resigned from the company, October 7, 1988 he
|
||
used fictitious passwords to obtain entry into the company computer,
|
||
programming the virus to begin its destruction December 7, 1988 -- Pearl Harbor
|
||
Day. Young, who had worked for the company on and off for two years -- most
|
||
recently as a supervisor -- was disgruntled because he had received some
|
||
unfavorable job-performance reviews, the prosecutor said.
|
||
|
||
Eventually, operators at the company picked up glitches in the computer system.
|
||
A programmer, called in to straighten out the mess, noticed that the program
|
||
had been altered and discovered the data-destroying virus, Muhlbaier said.
|
||
"What Mr. Young did not know was that the computer system has a lot of security
|
||
features so they could track it back to a particular date, time and terminal,"
|
||
Muhlbaier said. "We were able to ... prove that he was at that terminal."
|
||
Young's virus, Muhlbaier said, is the type known as a "time bomb" because it is
|
||
programmed to go off at a specific time. In this case, the database would have
|
||
been sickened the first time someone switched on a computer December 7, he said
|
||
|
||
Norma Kraus, a vice president of Datacomp's parent company, Volt Information
|
||
Sciences Inc, said yesterday that the company's potential loss included not
|
||
only the databases, but also the time it took to find and cure the virus. "All
|
||
the work has to stop," causing delivery backups on contracts, she said. "We're
|
||
just fortunate that we have employees who can determine what's wrong and then
|
||
have the interest to do something. In this case, the employee didn't stop at
|
||
fixing the system, but continued on to determine what the problem was." The
|
||
Volt company, based in New York, does $500 million worth of business a year
|
||
with such services as telephone marketing, data processing and technical
|
||
support. It also arranges temporary workers, particularly in the
|
||
data-processing field, and installs telecommunication services, Kraus said.
|
||
_______________________________________________________________________________
|
||
|
||
Mexico's Phone System Going Private? April 17, 1989
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
By Oryan QUEST (Special Hispanic Corespondent)
|
||
|
||
The Mexico Telephone Company, aka Telefonos de Mexico, aka Telmex, is likely to
|
||
go private in the next year or two. The Mexican government is giving serious
|
||
consideration to selling its controlling interest in that nation's
|
||
communications network, despite very stiff opposition from the local unions
|
||
which would prefer to see the existing bureaucracy stay in place.
|
||
|
||
The proposed sale, which is part of a move to upgrade the phone system there --
|
||
and it *does* need upgrading -- by allowing more private investment, is part of
|
||
a growing trend in Mexico to privatize heretofore nationalized industries.
|
||
|
||
The Mexico Telephone Company has spent more than a year planning a $14 billion,
|
||
five-year restructuring plan which will probably give AT&T and the Bell
|
||
regional holding companies a role in the improvements.
|
||
|
||
One plan being discussed by the Mexican government is a complete break-up of
|
||
Telmex, similar to the court-ordered divestiture of AT&T a few years ago.
|
||
Under this plan, there would be one central long distance company in Mexico,
|
||
with the government retaining control of it, but privately owned regional firms
|
||
providing local and auxiliary services.
|
||
|
||
Representatives of the Mexican government have talked on more than one
|
||
occasion with some folks at Southwestern Bell about making a formal proposal.
|
||
Likewise, Pacific Bell has been making some overtures to the Mexicans. It will
|
||
be interesting to see what develops.
|
||
|
||
About two years ago, Teleconnect Magazine, in a humorous article on the
|
||
divestiture, presented a bogus map of the territories assigned to each BOC,
|
||
with Texas, New Mexico and Arizona grouped under an entity called "Taco Bell."
|
||
|
||
Any phone company which takes over the Mexican system will be an improvement
|
||
over the current operation, which has been slowly deteriorating for several
|
||
years.
|
||
|
||
PS: I *Demand* To Be Let Back On MSP!
|
||
_______________________________________________________________________________
|
||
|
||
==Phrack Inc.==
|
||
|
||
Volume Three, Issue 26, File 11 of 11
|
||
|
||
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
PWN PWN
|
||
PWN P h r a c k W o r l d N e w s PWN
|
||
PWN %%%%%%%%%%% %%%%%%%%% %%%%%%% PWN
|
||
PWN Issue XXVI/Part 3 PWN
|
||
PWN PWN
|
||
PWN April 25, 1989 PWN
|
||
PWN PWN
|
||
PWN Created, Written, and Edited PWN
|
||
PWN by Knight Lightning PWN
|
||
PWN PWN
|
||
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
||
|
||
Galactic Hacker Party March 30, 1989
|
||
%%%%%%%%%%%%%%%%%%%%%
|
||
GALACTIC HACKER PARTY
|
||
August 2-4, 1989
|
||
PARADISO, AMSTERDAM, HOLLAND
|
||
|
||
During the summer of 1989, the world as we know it will go into overload. An
|
||
interstellar particle stream of hackers, phone phreaks, radioactivists and
|
||
assorted technological subversives will be fusing their energies into a media
|
||
melt-down as the global village plugs into Amsterdam for three electrifying
|
||
days of information interchange and electronic capers.
|
||
|
||
Aided by the advanced communications technology to which they are accustomed,
|
||
the hacker forces will discuss strategies, play games, and generally have a
|
||
good time. Free access to permanently open on-line facilities will enable them
|
||
to keep in touch with home base -- wherever that is.
|
||
|
||
Those who rightly fear the threat of information tyranny and want to learn what
|
||
they can do about it are urgently invited to interface in Amsterdam in August.
|
||
There will be much to learn from people who know. Celebrity guests with
|
||
something to say will be present in body or electronic spirit.
|
||
|
||
The Force must be nurtured. If you are refused transport because your laptop
|
||
looks like a bomb, cut off behind enemy lines, or unable to attend for any
|
||
other reason, then join us on the networks. Other hacker groups are requested
|
||
to organize similar gatherings to coincide with ours. We can provide low-cost
|
||
international communications links during the conference.
|
||
|
||
[ Despite the wishes of those planning the "Galactic Hacker ]
|
||
[ Party," there will be NO change in plans for SummerCon '89! ]
|
||
|
||
For further information, take up contact as soon as possible with:
|
||
|
||
HACK-TIC PARADISO
|
||
P.O. box 22953 Weteringschans 6-8
|
||
1100 DL Amsterdam 1017 SG Amsterdam
|
||
The Netherlands The Netherlands
|
||
|
||
tel: +31 20 6001480 tel: +31 20 264521 / +31 20 237348
|
||
_______________________________________________________________________________
|
||
|
||
Subversive Bulletin Boards March 26, 1989
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
An article in a newspaper from the United Kingdom had an article relating to a
|
||
computer bulletin board being run by a 14-year-old boy in Wilmslow, Cheshire,
|
||
England. It contained information relating to such things as making plastic
|
||
explosives.
|
||
|
||
Anti-terrorist detectives are said to be investigating for possible breaches of
|
||
the Obscene Publications Act. Apparently reporters were able to easily gain
|
||
access to this bulletin board and peruse articles on such subjects as credit
|
||
card fraud, making various types of explosives, street fighting techniques and
|
||
dodging police radar traps.
|
||
|
||
One article was obviously aimed at children and described how to make a bomb
|
||
suitable for use on "the car of a teacher you do not like at school," which
|
||
would destroy the tire of a car when it was started.
|
||
|
||
The boy's parents did not seem to think that their son was doing anything
|
||
wrong, preferring him to be working with his computer rather than roaming the
|
||
streets.
|
||
|
||
A London computer consultant, Noel Bradford, is quoted as having seen the
|
||
bulletin board and found messages discussing "how to crack British Telecom, how
|
||
to get money out of people and how to defraud credit card companies. Credit
|
||
card numbers are given, along with PIN numbers, names, addresses and other
|
||
details."
|
||
_______________________________________________________________________________
|
||
|
||
Tale Of TWO TAP Magazines! April 24, 1989
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
It seemed inevitable that the battle for the rights to TAP would come into
|
||
play, but many wonder why it has taken so long.
|
||
|
||
The Renegade Chemist, long time member of Phortune 500 and one of its "Board Of
|
||
Directors," has been talking about re-starting TAP Magazine for at least two
|
||
years... nothing ever happened with it until now. TRC claims that the TAP
|
||
Magazine crew in Kentucky is just a fraud and that he is putting on the "REAL
|
||
McCoy."
|
||
|
||
For a free issue of The Renegade Chemist's TAP Magazine, send a self-addressed
|
||
stamped envelope to:
|
||
|
||
Data Security Consultants, Inc.
|
||
TAP Magazine
|
||
P.O. Box 271
|
||
South Windam, CT 06266-0271
|
||
|
||
Now on the other hand, Aristotle of the Kentucky based TAP Magazine has shown
|
||
an almost uncaring attitude about The Renegade Chemist's statements about TAP
|
||
Magazine. He says that he does not "really mind if these people put out a
|
||
magazine. Honestly I just want to help the community and the more magazines
|
||
and information, the better."
|
||
|
||
The really big news about the Kentucky based TAP Magazine came Saturday, April
|
||
22, 1989. Apparently, because of problems with local banks and the Internal
|
||
Revenue Service, TAP Magazine is now FREE!
|
||
|
||
The only catch is that if you want it, you have to send them a self-addressed
|
||
stamped envelope to get each issue or "you can send cash, but only enough to
|
||
pay for postage, 25 cents should cover it." Do not send any kinds of checks
|
||
and/or money orders. Anyone who did will be receiving their checks back or
|
||
at least those checks will not be cashed. The TAP Magazine staff will be
|
||
taking care of the printing costs out of their own pocket.
|
||
|
||
So for the FREE TAP Magazine, send a self-addressed stamped envelope to:
|
||
|
||
P.O. Box 20264
|
||
Louisville, KY 40220
|
||
|
||
Issue 93 is due for the end of April 1989, but Aristotle also wanted me to let
|
||
everyone know that he will be attending SummerCon '89 and bringing with him
|
||
plenty of issues of all the TAPs that he, Olorin The White, and Predat0r have
|
||
published.
|
||
|
||
As I have not seen TRC's TAP, I make no judgements. Instead, get a copy of
|
||
both TAPs FREE and compare them yourself. The market will decide which TAP
|
||
will continue.
|
||
|
||
Information Provided by
|
||
Aristotle and The Renegade Chemist
|
||
_______________________________________________________________________________
|
||
|
||
Computer Group Wary Of Security Agency April 11, 1989
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
Taken from the San Francisco Chronicle
|
||
|
||
A public interest group said yesterday that the National Security Agency, the
|
||
nation's biggest intelligence agency, could exert excessive control over a
|
||
program to strengthen the security of computer systems throughout the federal
|
||
government.
|
||
|
||
The group, Computer Professionals for Social Responsibility -- based in Palo
|
||
Alto -- urged key members of Congress to focus "particularly close scrutiny" on
|
||
the agency's role in helping to implement legislation aimed at safeguarding
|
||
sensitive but unclassified information in federal computers.
|
||
|
||
"There is a constant risk that the federal agencies, under the guise of
|
||
enhancing computer security, may find their programs -- to the extent that they
|
||
rely upon computer systems -- increasingly under the supervision of the largest
|
||
and most secretive intelligence organization in the country," it said.
|
||
_______________________________________________________________________________
|
||
|
||
Verifying Social Security Numbers April 11, 1989
|
||
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
||
Taken From The New York Times
|
||
|
||
Dorcas R. Hardy, Commisssioner of the Social Security Administration, told a
|
||
Congressional committee that the agency had verified millions of SSN's for
|
||
private credit companies.
|
||
|
||
TRW, the nation's largest credit reporting company, recently proposed paying
|
||
the Social Security Administration $1,000,000 to have 140 million numbers
|
||
verified.
|
||
|
||
Phil Gambino, an agency spokesman, reported last month that the agency had
|
||
verified social security numbers only at the request of beneficiaries or
|
||
employers and had never verified more than 25 numbers at a time. He said such
|
||
disclosures were required under the Freedom of Information Act.
|
||
|
||
At the hearing yesterday, Dorcas R. Hardy, denied any other verifications at
|
||
first. However, she later admitted that in the early 1980s, 3,000,000 social
|
||
security numbers were verified for CitiCorp and that last year 151,000 numbers
|
||
were verified for TRW. Ms. Hardy said that the 151,000 numbers were just part
|
||
of a "test run."
|
||
|
||
Senator David Pryor, a democrat from Arkansas and chairman of the Special
|
||
Committee on Aging, said that previous commissioners; the Congressional
|
||
Research Service of the Library of Congress, and Donald A. Gonya, chief counsel
|
||
for Social Security have all decided that such verification is illegal.
|
||
_______________________________________________________________________________
|
||
|
||
PWN Quicknotes
|
||
|
||
1. Prank Virus Warning Message (March 28, 1989) -- An individual placed a time
|
||
bomb message on a government service system in the San Francisco Bay Area
|
||
saying, "WARNING! A computer virus has infected the system!" The
|
||
individual is learning that such a prank is considered almost as funny as
|
||
saying that you have a bomb in your carry-on luggage as you board a plane.
|
||
-- Bruce Baker, Information Security Program, SRI International
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
2. Hackers' Dictionary In Japanese? (March 30, 1989) -- What is this you ask?
|
||
This amusing compilation was put together a decade or so ago by artificial
|
||
intelligence (AI) graduate students at Stanford, MIT, and Carnegie-Mellon
|
||
and recorded the then-current vernacular of their shared cultures. They
|
||
did it for fun, but it somehow ended up getting published.
|
||
|
||
The Hackers' Dictionary contains more than a few puns, jokes, and other
|
||
things that are hard to translate such as "moby," as in "moby memory", or
|
||
"fubar" and its regional variants "foo bar" and "foo baz."
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
3. AT&T's Air Force -- AT&T has an air force that patrols its cable routes,
|
||
some routes 24 hours a day, 365 days a year. The AT&T air force includes
|
||
helicopters and fixed-wing aircraft. For some areas, AT&T uses infantry
|
||
and armored cars. AT&T's Sue Fleming says, "We hope NOT to find any
|
||
activity. We don't want to 'catch' people. But if we do spot a digging
|
||
crew, the usual procedure is for the pilot to radio the location back to a
|
||
ground crew, who check it out. On occasion, they drop notes -- or even
|
||
land -- but that depends on where the site is. In some areas -- like New
|
||
Jersey -- unauthorized landings bring heavy penalties."
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
4. Terrorist Threat? -- Scientific advisors to the government told a Senate
|
||
panel that telecommunications networks are tempting targets for terrorist
|
||
activity. The experts said that advances in technology -- like fiber
|
||
optics, which concentrates equipment and data -- and the fragmentation of
|
||
the telecom industry after divestiture are reasons for the increased risk.
|
||
Certainly the Hinsdale, Illinois CO fire and the recent severing of a fiber
|
||
backbone in New Jersey have shown us all how vulnerable our country's
|
||
telecom network is.
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
5. FCC Rules On AOS -- The FCC has ruled on a complaint filed this summer by
|
||
two consumer groups against five Alternative Operator Services (AOS)
|
||
companies. The FCC found the complaint valid and has ordered the AOS
|
||
companies to stop certain practices immediately.
|
||
|
||
The ruling states that callers must be told when their calls are being
|
||
handled by an AOS, operators must provide callers with rate information and
|
||
hotel or payphone owners cannot block calls to other long distance
|
||
carriers. (Callers who don't take any special action when making a call
|
||
will still be routed to the pre-subscribed carrier.)
|
||
|
||
The FCC has also ordered the companies to eliminate "splashing" whenever
|
||
technically feasible. Splashing is transferring a call to a distant
|
||
carrier point-of-presence and charging the caller for the call from that
|
||
point.
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
6. Cool New Service -- CompuServe (the world's biggest computer bulletin
|
||
board) users can now dial in and search and find articles from a bunch of
|
||
different technical trade magazines. The database was put together by an
|
||
outfit called Information Access Company. It currently contains full-text
|
||
articles for 50 publications and paraphrased abstracts for 75 more. Most
|
||
coverage begins with the January 1987 issues.
|
||
|
||
You can search the publications by magazine name, author, key word, key
|
||
phrase, etc., then pull up the abstracts of the article of interest and, if
|
||
needed and when available, get the full text of the article. And it's easy
|
||
to use.
|
||
|
||
Charge for the service is $24 per hour, $1 for each abstract, and $1.50 for
|
||
each full-text article accessed. CompuServe charges $12.50 per hour for
|
||
connect time. Both per hour charges are pro-rated, and, with the databases
|
||
being so easy to use, you'll rarely be on the board for more than 10-15
|
||
minutes, so those costs will drop.
|
||
|
||
CompuServe 800-848-8199
|
||
Information Access 800-227-8431
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
7. ISDN Calling Number Identification Services (April 7, 1989) -- Bellcore
|
||
Technical Reference TR-TSY-000860, "ISDN Calling Number Identification
|
||
Services" can be purchased for $46 from:
|
||
|
||
Bellcore
|
||
Customer Service
|
||
60 New England Ave
|
||
Piscataway, NJ 08854-4196
|
||
(201) 699-5800
|
||
|
||
This Technical Reference contains Bellcore's view of generic requirements
|
||
for support of ISDN Calling Number Identification (I-CNIS). The I-CNIS
|
||
feature extends the concepts of Calling Number Delivery and Calling Number
|
||
Delivery Blocking to ISDN lines. I-CNIS also allows the customer to
|
||
specify which Directory Number (DN) should be used for each outgoing call
|
||
and provides network screening to ensure that the specified DN is valid.
|
||
I-CNIS handles calling number processing for both circuit-mode and
|
||
packet-mode ISDN calls and provides four component features: Number
|
||
Provision, Number Screening, Number Privacy, and Number Delivery. Material
|
||
on Privacy Change by the calling party and Privacy Override by the called
|
||
party is also included.
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
8. Founder of TAP Magazine, Abbie Hoffman, born in 1936, passed away on April
|
||
12, 1989. He was found dead in his apartment in New Hope, PA. He was
|
||
fully dressed under the bedcovers. An autopsy was inconclusive. An
|
||
article about him appears in the April 24, 1989 issue of Time Magazine,
|
||
"A Flower in a Clenched Fist," page 23.
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
9. Bill Landreth aka The Cracker, author of Out Of The Inner Circle, has
|
||
reappeared. Supposedly, he is now working as a bookbinder in Orange
|
||
County, California and living with the sysop of a bulletin board called the
|
||
"Pig Sty." -- Dark Sorcerer (April 19, 1989)
|
||
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
10. Hacker/Phreaker Gets "Stiff" Penalty (Green Bay, Wisconsin) -- David
|
||
Kelsey, aka Stagehand, plead guilty to two counts of class "E" felonies
|
||
and received a 90 day jail term. Once he has completed his jail term, he
|
||
will serve three years probation and an unknown amount of community
|
||
service hours.
|
||
|
||
In addition to these penalties, Stagehand must also pay restitution of
|
||
$511.00 to Schneider Communications of Green Bay, Wisconsin. Stagehand
|
||
was given all his computer equipment back as part of the plea bargain --
|
||
minus any materials considered to be "ill gotten" gains.
|
||
_______________________________________________________________________________
|
||
! ***
|
||
|
||
|
||
1:30:22 p.m. ARE YOU STILL THERE ?
|
||
! ***
|
||
|
||
|
||
1:35:22 p.m. RESPOND OR BE LOGGED OFF
|
||
!
|
||
|