mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
395 lines
21 KiB
Text
395 lines
21 KiB
Text
==Phrack Inc.==
|
|
|
|
Volume Three, Issue 27, File 10 of 12
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN P h r a c k W o r l d N e w s PWN
|
|
PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN
|
|
PWN Issue XXVII/Part 1 PWN
|
|
PWN PWN
|
|
PWN June 20, 1989 PWN
|
|
PWN PWN
|
|
PWN Created, Written, and Edited PWN
|
|
PWN by Knight Lightning PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
|
|
Welcome to Issue XXVII of Phrack World News!
|
|
|
|
This issue features articles on SouthernNet's hacker scam, the Florida
|
|
probation sex incident, bulletin boards in Argentina, fax attacks, computer
|
|
security, other hacking occurrences, as well as more articles and new
|
|
information about Kevin David Mitnick (aka Condor), Robert Tappan Morris, Karl
|
|
Koch (Hagbard Celine, one of Clifford Stoll's "Wily Hackers"), TRW and Social
|
|
Security Administration, the National Crime Information (NCIC) "Super
|
|
Database," and many other fun stories.
|
|
|
|
Because of our temporary exile from Bitnet, this will be the last regular issue
|
|
of Phrack World News until next Fall. Next issue expect to see the full
|
|
write-up on the details and fun events of SummerCon '89. It is only two days
|
|
away as of this writing (it kinda begins on Thursday evening for some of us)
|
|
and it looks to be the best SummerCon ever!
|
|
|
|
A very special thanks goes to Delta Master, Hatchet Molly, and The Mad Hacker
|
|
who all assisted with this issue's PWN by submitting articles. Hatchet Molly
|
|
will be serving as a collection agent for Phrack Inc. during the summer. Be
|
|
sure to forward any news articles to him that seem relevant to PWN and he will
|
|
get them to me (eventually). He can be reached on the wide area networks at;
|
|
|
|
(Hatchet Molly)
|
|
|
|
TK0GRM2@NIU.BITNET
|
|
TK0GRM2%NIU.BITNET@CUNYVM.CUNY.EDU
|
|
|
|
One other thing to mention here is a special hello to one of our government
|
|
readers... Peter Edmond Yee of NASA's Ames Research Center. He had recently
|
|
remarked that he "had access to Phrack!" I wonder if he thought that Phrack
|
|
Inc. was top secret or hard to get? Still if he wanted it that badly, Taran
|
|
King and I thought, "Why not make it easier on him and just send it to his
|
|
network address?" We did :-)))
|
|
|
|
:Knight Lightning
|
|
|
|
|
|
"The Real Future Is Behind You... And It's Only The Beginning!"
|
|
_______________________________________________________________________________
|
|
|
|
Mitnick Plea Bargain Rejected By Judge As Too Lenient April 25, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Excerpts from Kim Murphy (Los Angeles Times)
|
|
|
|
"Mr. Mitnick, you have been engaging in this conduct
|
|
for too long, and no one has actually punished you.
|
|
This is the last time you are going to do this."
|
|
|
|
Reportedly U.S. District Judge Mariana Pfaelzer unexpectedly rejected the plea
|
|
bargain of Kevin Mitnick, the hacker once called "as dangerous with a keyboard
|
|
as a bank robber with a gun." Pfaelzer declared that Mitnick deserves more
|
|
time behind bars.
|
|
|
|
As reported in recent issues of Phrack World News, "Mitnick pleaded guilty to
|
|
one count of computer fraud and one count of possessing unauthorized
|
|
long-distance telephone codes... Mitnick faces one year in prison. Under a
|
|
plea agreement with the government, he must also submit to three years'
|
|
supervision by probation officers after his release from prison."
|
|
|
|
On April 24, 1989 Judge Pfaelzer said, "Mr. Mitnick, you have been engaging in
|
|
this conduct for too long, and no one has actually punished you. This is the
|
|
last time you are going to do this." She said a confidential pre-sentence
|
|
report recommended that she exceed even the 18-month maximum prison term called
|
|
for under mandatory new federal sentencing guidelines. The judge's action
|
|
voids Mitnick's guilty plea.
|
|
|
|
Both prosecuting and defense attorneys were surprised. Mitnick's attorney said
|
|
he did not know whether his client would agree to a guilty plea carrying a
|
|
longer prison term. This could make it harder to bring charges against
|
|
Mitnick's alleged associates. If Mitnick is brought to trial, testimony from
|
|
at least one of his associates would be required to convict him, and they would
|
|
not appear as witnesses without receiving immunity from prosecution.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Computer Hacker Working On Another Plea Bargain May 6, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Excerpts from the Los Angeles Herald Examiner
|
|
|
|
Attorneys said yesterday they are negotiating a second plea bargain for
|
|
computer hacker Kevin Mitnick, whose first offer to plead guilty was scuttled
|
|
by a judge because it called for too little time in prison.
|
|
|
|
Mitnick, 25, of Panorama City, California offered in March to serve one year in
|
|
prison and to plead guilty to computer fraud and possessing unauthorized
|
|
long-distance telephone codes.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Mitnick Update May 10, 1989
|
|
~~~~~~~~~~~~~~
|
|
Excerpts taken from the Los Angeles Times
|
|
|
|
When last we heard about Kevin Mitnick, the hacker once called "as dangerous
|
|
with a keyboard as a bank robber with a gun," the judge, Judge Mariana
|
|
Pfaelzer, had rejected a plea bargain as too lenient, saying Mitnick deserved
|
|
more than the agreed one year of jail time [see above articles].
|
|
|
|
According to more recent information, Mitnick has now reached a new agreement,
|
|
with no agreed-upon prison sentence. He pleaded guilty to stealing a DEC
|
|
security program and illegal possession of 16 long-distance telephone codes
|
|
belonging to MCI Telecommunications Corp. The two charges carry a maximum of
|
|
15 years and a $500,000 fine. The government agreed to lift telephone
|
|
restrictions placed on Mitnick since he was jailed in December, 1988.
|
|
|
|
At DEC's request, Mitnick will help the firm identify and fix holes in its
|
|
security software to protect itself from other hackers. He will also cooperate
|
|
in the government's probe of Leonard DiCicco, a fellow hacker. (DiCicco is the
|
|
"friend" who turned Mitnick in.)
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Kenneth Siani Speaks Out About Kevin Mitnick May 23, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Kevin Mitnick, the hacker "so dangerous that he can't even be allowed to use a
|
|
phone." "He could ruin your life with his keyboard." "Armed with a keyboard
|
|
and considered dangerous."
|
|
|
|
These are some of the things that have been said about this person. All of
|
|
this media hype would be fine if it just sold newspapers. But it has done much
|
|
more then just sell a few papers. It has influenced those that will ultimately
|
|
decide his fate. I myself do not know the man, but I have talked to others
|
|
that do. Including one of the persons that investigated Mitnick. From all I
|
|
have heard about him, I think he is a slime ball! But even a slime ball should
|
|
not be railroaded into a prison sentence that others of equal or greater guilt
|
|
have avoided.
|
|
|
|
I personally feel the man is just a criminal, like the guy that robs a 7/11, no
|
|
better but certainly not any worse. Unfortunately he is thought of as some
|
|
kind of a "SUPER HACKER." The head of Los Angeles Police Dept's Computer Crime
|
|
Unit is quoted as saying, "Mitnick is several levels above what you would
|
|
characterize as a computer hacker."
|
|
|
|
No disrespect intended, but a statement like this from the head of a computer
|
|
crime unit indicates his ignorance on the ability of hackers and phone phreaks.
|
|
Sure he did things like access and perhaps even altered Police Department
|
|
criminal records, credit records at TRW Corp, and Pacific Telephone,
|
|
disconnecting phones of people he didn't like etc. But what is not understood
|
|
by most people outside of the hack/phreak world is that these things are VERY
|
|
EASY TO DO AND ARE DONE ALL THE TIME. In the hack/phreak community such
|
|
manipulation of computer and phone systems is all to easy. I see nothing
|
|
special about his ability to do this. The only thing special about Kevin
|
|
Mitnick is that he is not a "novice" hacker like most of the thirteen year old
|
|
kids that get busted for hacking/phreaking. It has been a number of years
|
|
since an "advanced" hacker has been arrested. Not since the days of the Inner
|
|
Circle gang have law enforcement authorities had to deal with a hacker working
|
|
at this level of ability. As a general rule, advanced hackers do not get
|
|
caught because of there activity but rather it is almost always others that
|
|
turn them in. It is therefore easy to understand why his abilities are
|
|
perceived as being extraordinary when in fact they are not.
|
|
|
|
Because of all the media hype this case has received I'm afraid that:
|
|
|
|
1.) He will not be treated fairly. He will be judged as a much greater threat
|
|
to society then others that have committed similar crimes.
|
|
|
|
2.) He will become some kind of folk hero. A Jesse James with a keyboard.
|
|
This will only cause other to follow in his footsteps.
|
|
|
|
I'm not defending him or the things he has done in any sense. All I'm saying
|
|
is let's be fair. Judge the man by the facts, not the headlines.
|
|
|
|
Disclaimer: The views expressed here are my own.
|
|
|
|
Kenneth Siani, Sr. Security Specialist, Information Systems Div., NYMA Inc.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
If you are looking for other articles about Kevin David Mitnick aka Condor
|
|
please refer to;
|
|
|
|
"Pacific Bell Means Business" (10/06/88) PWN XXI. . .Part 1
|
|
"Dangerous Hacker Is Captured" (No Date ) PWN XXII . .Part 1
|
|
"Ex-Computer Whiz Kid Held On New Fraud Counts" (12/16/88) PWN XXII . .Part 1
|
|
"Dangerous Keyboard Artist" (12/20/88) PWN XXII . .Part 1
|
|
"Armed With A Keyboard And Considered Dangerous"(12/28/88) PWN XXIII. .Part 1
|
|
"Dark Side Hacker Seen As Electronic Terrorist" (01/08/89) PWN XXIII. .Part 1
|
|
"Mitnick Plea Bargains" (03/16/89) PWN XXV. . .Part 1
|
|
_______________________________________________________________________________
|
|
|
|
Computer Intrusion Network in Detroit May 25, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Taken from the San Jose Mercury News (Knight-Ridder News Service)
|
|
|
|
DETROIT -- Secret Service agents smashed what they described as a costly,
|
|
sophisticated computer intrusion network on Wednesday, May 24, and were
|
|
surprised to discover it made up largely of teen-agers.
|
|
|
|
The computer systems of more than 20 companies including the Michigan
|
|
Department of Treasury, Home Box Office cable television services, [and RCA]
|
|
were infiltrated, according to agents serving search warrants across the
|
|
country.
|
|
|
|
Federal officials said the infiltrations by the network represented fraud of
|
|
$200,000 to $1.5 million in appropriated goods, telephone and computer time.
|
|
|
|
Agents expected to arrest some adults when they swept down on eight people who
|
|
allegedly ran the network in several states. Instead, they found only one
|
|
adult, in Chicago. The rest were teen-agers as young as 14: Two in Columbus,
|
|
Ohio; two in Boston, Massachusetts; two in Sterling Heights, Michigan [The
|
|
Outsider and The Untouchable]; and one in Atlanta, Georgia. Agents expected to
|
|
make another arrest in Los Angeles.
|
|
|
|
Officials said at least 55 other people nationwide made use of the network's
|
|
information.
|
|
|
|
In Sterling Heights, Secret Service agents pulled two eighth-grader boys, both
|
|
14, out of school and questioned them in the presence of their parents, who
|
|
apparently were unaware of their activities. James Huse, special agent in
|
|
charge of the U.S. Secret Service office in Detroit, said the youths admitted
|
|
involvement in the scheme.
|
|
|
|
He said the eight-graders, because they are juveniles, cannot be charged under
|
|
federal law and will be dealt with by local juvenile authorities.
|
|
|
|
Authorities believe the mastermind is Lynn Doucett, 35, of Chicago. She was
|
|
arrested Wednesday, May 24, and is cooperating with authorities, Huse said.
|
|
|
|
Doucett, who was convicted in Canada of telecommunications fraud, supports
|
|
herself and two children through her computer intrusion activities, which
|
|
include using stolen or counterfeit credit cards for cash advances or money
|
|
orders, according to an affidavit filed in U.S. District Court.
|
|
|
|
If convicted, she faces up to 10 years in prison and a $250,000 fine.
|
|
|
|
Special Thanks to Jedi For Additional Information
|
|
_______________________________________________________________________________
|
|
|
|
HR 1504 -- Beeper Abuse Prevention Act May 22, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
"Pagers Don't Commit Crimes, Congressmen Do."
|
|
|
|
The fools in congress assembled are at it again. Three years in jail for
|
|
selling a pager to a minor? If you didn't believe when Abbie Hoffman said that
|
|
the drug hysteria was just an excuse for more control of the citizens, think
|
|
again.
|
|
|
|
In USA Today was a "face-off" on the issues. According to this article,
|
|
Representative Kweisi Mfume (D-Md) says the following:
|
|
|
|
"The drug business is using the latest technology to promote its
|
|
deadly trade. One such advance, the paging device, or beeper, is
|
|
now appearing in classrooms and schoolyards. I have introduced the
|
|
Beeper Abuse Prevention Act to curtail the use of beepers by young
|
|
people who deal drugs. It would require the Federal Communications
|
|
Commission to prescribe regulations that would restrict the
|
|
possession and use of paging devices by persons under age 21.
|
|
|
|
Law officers say dealers and suppliers send coded messages via
|
|
beeper to youths in school. The codes translate into messages like
|
|
"meet me at our regular place after class to pick up the drugs."
|
|
Drug traffickers are even using 800 numbers now available with
|
|
regional paging services. A supplier could actually conduct a
|
|
transaction in Baltimore from Miami, for example.
|
|
|
|
My bill, H.R. 1504, would require any person selling or renting
|
|
paging devices to verify the identification and age of every
|
|
customer; encourage parents and businesses to take more
|
|
responsibility in their children's or employees' activities; make
|
|
it unlawful for a person to knowingly and willfully rent, sell or
|
|
use paging devices in violation of rules prescrived by the FCC
|
|
(there are provisions for stiff fines and up to three-year prison
|
|
terms for adults who illegally provide beepers to youths); and
|
|
require parents or businesses who allow the use of beepers to state
|
|
that intention with and affidavit at the time of purchase."
|
|
|
|
He goes on to say that he recognizes that there are legitimate uses of beepers,
|
|
but we can no longer stand by and watch drugs flow into our neighborhoods. The
|
|
opposite side is taken by Lynn Scarlett, from Santa Monica, CA. She asks what
|
|
beepers have to do with the drug trade, and regulating their use will not put a
|
|
dent it it. She also says that there is little evidence that gun control keeps
|
|
guns out of the hands of gangsters, and it will take a good dose of wizardry to
|
|
keep beepers away from bad guys. She finishes with:
|
|
|
|
"The logic of the Beeper Abuse Prevention Act opens the door for
|
|
laws to make us sign promises that we won't, we swear, use these
|
|
things for illicit acts when we buy them. De Tocqueville, that
|
|
eminent observer of our nation, warned that our loss of freedom
|
|
would sneak in through passage of quiet, seemingly innocuous and
|
|
well-intended laws -- laws like H.R. 1504.
|
|
_______________________________________________________________________________
|
|
|
|
Computer Threat Research Association (UK) March 31, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
For those of you interested an umbrella organization has been established in
|
|
the United Kingdom to coordinate information on, and research into, all aspects
|
|
of computer security. In the first instance one of the organization's primary
|
|
concerns will be combatting the threat posed by computer viruses by acting as a
|
|
clearing house for virus information and control software.
|
|
|
|
Below is a copy of an initial letter mailed to prospective members:
|
|
|
|
The Computer Threat Research Association
|
|
|
|
The computer threat research association, CoTra is a non-profit making
|
|
organization that exists to research, analyze, publicize and find solutions
|
|
for threats to the integrity and reliability of computer systems.
|
|
|
|
The issue that caused the formation of CoTra was the rise of the computer
|
|
virus. This problem has since become surrounded by fear, uncertainty and
|
|
doubt. To the average user, the computer virus and its implications are a
|
|
worry of an unknown scale. To a few unfortunates whose systems have become
|
|
victims, it is a critical issue.
|
|
|
|
The key advantage of CoTra membership will be access to advice and information.
|
|
Advice will be provided through publications, an electronic conference (a
|
|
closed conference for CoTra's members has been created on the Compulink CIX
|
|
system) as well as other channels such as general postings direct to members
|
|
when a new virus is discovered.
|
|
|
|
CoTra membership will be available on a student, full or corporate member
|
|
basis. All software that is held by CoTra that enhances system reliability,
|
|
such as virus detection and removal software, will be available to all members.
|
|
It is intended to establish discounts with suppliers of reliability tools and
|
|
services. A library of virus sources and executables and other dangerous
|
|
research material will be made available to members who have a demonstrable
|
|
need.
|
|
|
|
A register of consultants who have specific skills in the systems reliability
|
|
field will be published by CoTra and reviews of reliability enhancing software
|
|
will be produced.
|
|
|
|
Your support of CoTra will ensure that you have the earliest and most accurate
|
|
information about potential threats to your computer systems.
|
|
|
|
CoTra, The Computer Threat Research Association,
|
|
c/o 144 Sheerstock, Haddenham, Bucks. HP17 8EX
|
|
_______________________________________________________________________________
|
|
|
|
Strange Customs Service Clock Department May 1, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Written by Vanessa Jo Grimm (Goverment Computer News)(Page 6)
|
|
|
|
The U.S. attorney for Washington is reviewing an allegation that a Customs
|
|
Service official violated the Computer Security Act [PL 100-235 presumably] by
|
|
altering a computer's internal clock.
|
|
|
|
Treasury Department Inspector General Michael R. Hill referred the allegation
|
|
to the prosecutor after an investigation into year-end spending by Custom
|
|
officials at the close of Fiscal Year 1988. The allegation involves an
|
|
official who may have authorized altering the date maintained by the computers
|
|
that the agency uses for procurement documents, according to Maurice S. Moody,
|
|
the Inspector General's audit director for Financial Management Service.
|
|
|
|
Moody recently told the House Ways and Means Subcommittee on Oversight the
|
|
computers are part of the agency's Automated Commercial System. He declined to
|
|
provide Government Computer News with more details.
|
|
|
|
Allegedly the computer clock was rolled back during the first three days of
|
|
October of 1988 so that $41.8 million in procurement obligations would be dated
|
|
in September against fiscal year 1988 appropriations, Moody said.
|
|
|
|
An inspector general report issued in late February concluded Customs had not
|
|
violated any procurement laws. The inspector general's investigation is
|
|
continuing, however.
|
|
|
|
"Doesn't $41.8 million worth of procurement on the last day of the fiscal year
|
|
bother anybody?" asked Rep. Richard T. Shulze (R-Pa). The purchases did bother
|
|
the inspector general, Moody said, and this concern led to getting the United
|
|
State attorney attorney. "This problem is endemic in the federal government,"
|
|
he said. "Year-end spending is very common."
|
|
|
|
William F. Riley, Customs controller, said he knew about the rollback, but he
|
|
and Deputy Commissioner Michael H. Lane refused to say who authorized the
|
|
action... Subcommittee members continued to press Riley and Lane. "Is the
|
|
person still at Customs?" asked subcommittee chairman J. J. Pickle (D-Texas).
|
|
He is working full time and in the position he was at the time," Lane answered.
|
|
|
|
Rep. Beryl F. Anthony, Jr. (D-Ark) asked how Riley became aware of the
|
|
rollback. "He (the official who authorized the rollback) told me that it was
|
|
going to be done," Riley said.
|
|
|
|
Rep. Pickle suggested that a high ranking official would have to authorize such
|
|
an action, but Counsel advised Lane not to reply. He did say neither he nor
|
|
Commissioner von Raab had made the decision.
|
|
|
|
The balance of the article deals with the actions of Linda Gibbs, who became
|
|
aware of the incident and reported it to the inspector general after being
|
|
unable to stop the action. Gibbs also alleged that the action was intended to
|
|
use available year-end money to cover cost overrun on a contract with Northrop
|
|
Corp. She also alleged that she had been reassigned and given no new duties.
|
|
_______________________________________________________________________________
|