mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
378 lines
22 KiB
Text
378 lines
22 KiB
Text
==Phrack Inc.==
|
|
|
|
Volume Three, Issue Thirty-Three, File 13 of 13
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN Phrack World News PWN
|
|
PWN PWN
|
|
PWN Issue XXXIII / Part Three PWN
|
|
PWN PWN
|
|
PWN Compiled by Dispater PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
|
|
Pentagon Welcomes Hackers! September 9, 1991
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
>From USA Today
|
|
|
|
The FBI is investigating an Israeli teen's claim that he broke into a
|
|
Pentagon computer during the gulf war. An Israeli newspaper Sunday identified
|
|
the hacker as Deri Shraibman, 18. He was arrested in Jerusalem Friday but
|
|
released without being charged. Yedhiot Ahronot said Shraibman read secret
|
|
information on the Patriot missle -- used for the first time in the war to
|
|
destroy Iraq's Scud missles in midflight.
|
|
"Nowhere did it say 'no entry allowed'," Shraibman was quoted as telli
|
|
police. "It just said 'Welcome.'" The Pentagon's response: It takes
|
|
"computer security very seriously," spokesman Air Force Capt. Sam Grizzle said
|
|
Sunday. Analysts say it isn't the first time military computers have been
|
|
entered. "No system of safeguards exists ... that is 100% secure," says Alan
|
|
Sabrosky, professor at Rhodes College in Memphis.
|
|
_______________________________________________________________________________
|
|
|
|
Telesphere Sued By Creditors; Forced Into Bankruptcy
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Compiled from Telecom Digest (comp.dcom.telecom)
|
|
|
|
On Monday, August 19, Telesphere Communications, Inc. was sued by a group
|
|
of ten creditors who claim the company best known for its 900 service isn't
|
|
paying its bills. The group of creditors, all information providers using 900
|
|
lines provided through Telesphere claim they are owed two million dollars in
|
|
total for services rendered through their party lines, sports reports,
|
|
horoscopes, sexual conversation lines and other services. They claim
|
|
Telesphere has not paid them their commissions due for several months. The
|
|
group of creditors filed in U.S. Bankruptcy Court in Maryland asking that an
|
|
Involuntary Chapter 7 bankruptcy (meaning, liquidation of the company and
|
|
distribution of all assets to creditors) be started against Telesphere.
|
|
|
|
The company said it will fight the effort by creditors to force it into
|
|
bankruptcy. A spokesperson also said the company has already settled with more
|
|
than 50 percent of its information providers who are owed money. Telesphere
|
|
admitted it had a serious cash flow problem, but said this was due to the large
|
|
number of uncollectible bills the local telephone companies are charging back
|
|
to them. When end-users of 900 services do not pay the local telco, the telco
|
|
in turn does not pay the 900 carrier -- in this case Telesphere -- and the
|
|
information provider is charged for the call from a reserve each is required to
|
|
maintain.
|
|
|
|
But the information providers dispute the extent of the uncollectible
|
|
charges. They claim Telesphere has never adequately documented the charges
|
|
placed against them (the information providers) month after month. In at least
|
|
one instance, an information provider filed suit against an end-user for
|
|
non-payment only to find out through deposition that the user HAD paid his
|
|
local telco, and the local telco HAD in turn paid Telesphere. The information
|
|
providers allege in their action against the company that Telesphere was in
|
|
fact paid for many items charged to them as uncollectible, "and apparently are
|
|
using the money to finance other aspects of their operation at the expense of
|
|
one segment of their creditors; namely the information providers..."
|
|
Telesphere denied these allegations.
|
|
|
|
Formerly based here in the Chicago area (in Oak Brook, IL), Telesphere is
|
|
now based in Rockville, MD.
|
|
______________________________________________________________________________
|
|
|
|
Theft of Telephone Service From Corporations Is Surging August 28, 1991
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Edmund L. Andrews (New York Times)
|
|
|
|
"It is by far the largest segment of communications fraud," said Rami
|
|
Abuhamdeh, an independent consultant and until recently executive director of
|
|
the Communications Fraud Control Association in McLean, Va. "You have all
|
|
this equipment just waiting to answer your calls, and it is being run by people
|
|
who are not in the business of securing telecommunications."
|
|
|
|
Mitsubishi International Corp. reported losing $430,000 last summer,
|
|
mostly from calls to Egypt and Pakistan. Procter & Gamble Co. lost $300,000 in
|
|
l988. The New York City Human Resources Administration lost $529,000 in l987.
|
|
And the Secret Service, which investigates such telephone crime, says it is now
|
|
receiving three to four formal complaints every week, and is adding more
|
|
telephone specialists.
|
|
|
|
In its only ruling on the issue thus far, the Federal Communications
|
|
Commission decided in May that the long-distance carrier was entitled to
|
|
collect the bill for illegal calls from the company that was victimized. In
|
|
the closely watched Mitsubishi case filed in June, the company sued AT&T for
|
|
$10 million in the U.S. District Court in Manhattan, arguing that not only had
|
|
it made the equipment through which outsiders entered Mitsubishi's phone
|
|
system, but that AT&T, the maker of the switching equipment, had also been paid
|
|
to maintain the equipment.
|
|
|
|
For smaller companies, with fewer resources than Mitsubishi, the problems
|
|
can be financially overwhelming. For example, WRL Group, a small software
|
|
development company in Arlington, Va., found itself charged for 5,470 calls
|
|
it did not make this spring after it installed a toll-free 800 telephone
|
|
number and a voice mail recording system machine to receive incoming calls.
|
|
Within three weeks, the intruders had run up a bill of $106,776 to US
|
|
Sprint, a United Telecommunications unit.
|
|
|
|
In the past, long-distance carriers bore most of the cost, since the
|
|
thefts were attributed to weaknesses in their networks. But now, the phone
|
|
companies are arguing that the customers should be liable for the cost of
|
|
the calls, because they failed to take proper security precautions on their
|
|
equipment.
|
|
|
|
Consumertronics, a mail order company in Alamogordo, N.M., sells brochures
|
|
for $29 that describe the general principles of voice mail hacking and
|
|
the particular weaknesses of different models. Included in the brochure is a
|
|
list of 800 numbers along with the kind of voice mail systems to which they are
|
|
connected. "It's for educational purposes," said the company's owner, John
|
|
Williams, adding that he accepts Mastercard and Visa. Similar insights can be
|
|
obtained from "2600 Magazine", a quarterly publication devoted to telephone
|
|
hacking that is published in Middle Island, N.Y.
|
|
______________________________________________________________________________
|
|
|
|
Proctor & Gamble August 22, 1991
|
|
~~~~~~~~~~~~~~~~
|
|
Compiled from Telecom Digest
|
|
|
|
On 8-12-91, the "Wall Street Journal" published a front page story on an
|
|
investigation by Cincinnati police of phone records following a request by
|
|
Procter & Gamble Co. to determine who might have furnished inside information
|
|
to the "Wall Street Journal". The information, ostensibly published between
|
|
March 1st and June 10th, 1991, prompted P&G to seek action under Ohio's Trade
|
|
Secrets Law. In respect to a possible violation of this law, a Grand Jury
|
|
issued a subpoena for records of certain phone calls placed to the Pittsburgh
|
|
offices of the "Wall Street Journal" from the Cincinnati area, and to the
|
|
residence of a "Wall Street Journal" reporter. By way of context, the
|
|
Pittsburgh offices of the "Wall Street Journal" allegedly were of interest in
|
|
that Journal reporter Alecia Swasy was principally responsible for covering
|
|
Procter & Gamble, and worked out of the Pittsburgh office.
|
|
|
|
On 8-13-91, CompuServe subscriber Ryck Bird Lent related the Journal story
|
|
to other members of CompuServe's TELECOM.ISSUES SIG. He issued the following
|
|
query:
|
|
|
|
"Presumably, the records only show that calls were placed between
|
|
two numbers, there's no content available for inspection. But
|
|
what if CB had voice mail services? And what if the phone number
|
|
investigations lead to online service gateways (MCI MAil, CIS),
|
|
are those also subject to subpoena?"
|
|
|
|
At the time of Mr. Lent's post, it was known that the "Wall Street
|
|
Journal" had alleged a large amount of phone company records had been provided
|
|
by Cincinnati Bell to local police. An exact figure did not appear in Lent's
|
|
comments. Thus, I can't be certain if the Journal published any such specific
|
|
data on 8-12-91 until I see the article in question.
|
|
|
|
On 8-14-91, the Journal published further details on the police
|
|
investigation into possible violation of the Ohio Trade Secrets Law. The
|
|
Journal then asserted that a Grand Jury subpoena was issued and used by the
|
|
Cincinnati Police to order Cincinnati Bell to turn over phone records spanning
|
|
a 15-week period of time, covering 40 million calls placed from the 655 and 257
|
|
prefixes in the 513 area code. The subpoena was issued, according to the "Wall
|
|
Street Journal", only four working days after a June 10th, 1991 article on
|
|
problems in P&G's food and beverage markets.
|
|
|
|
Wednesday [8-14-91], the Associated Press reported that P&G expected no
|
|
charges to be filed under the police investigation into possible violations of
|
|
the Ohio Trade Secrets Law. P&G spokesperson Terry Loftus was quoted to say:
|
|
"It did not produce any results and is in fact winding down". Lotus went on to
|
|
explain that the company happened to "conduct an internal investigation which
|
|
turned up nothing. That was our first step. After we completed that internal
|
|
investigation, we decided to turn it over to the Cincinnati Police Department".
|
|
|
|
Attempts to contact Gary Armstrong, the principal police officer in charge
|
|
of the P&G investigation, by the Associated Press prior to 8-14-91 were
|
|
unsuccessful. No one else in the Cincinnati Police Department would provide
|
|
comment to AP.
|
|
|
|
On 8-15-91, the Associated Press provided a summary of what appeared in
|
|
the 8-14-91 edition of the "Wall Street Journal" on the P&G investigation. In
|
|
addition to AP's summary of the 8-14-91 Journal article, AP also quoted another
|
|
P&G spokesperson -- Sydney McHugh. Ms. McHugh more or less repeated Loftus'
|
|
8-13-91 statement with the following comments: "We advised the local Cincinnati
|
|
Police Department of the matter because we thought it was possible that a crime
|
|
had been committed in violation of Ohio law. They decided to conduct an
|
|
independent investigation."
|
|
|
|
Subsequent to the 8-14-91 article in the Journal, AP had once again
|
|
attempted to reach Officer Gary Armstrong with no success. Prosecutor Arthur
|
|
M. Ney has an unpublished home phone number and was therefore unavailable for
|
|
comment on Wednesday evening [08-14-91], according to AP.
|
|
|
|
In the past few weeks, much has appeared in the press concerning
|
|
allegations that P&G, a local grand jury, and/or Cincinnati Police have found a
|
|
"novel" way to circumvent the First Amendment to the U.S. Constitution. In its
|
|
8-15-91 summary of the 8-14-91 Journal article, AP quoted Cincinnati attorney
|
|
Robert Newman -- specializing in First Amendment issues -- as asserting:
|
|
"There's no reason for the subpoena to be this broad. It's cause for alarm".
|
|
Newman also offered the notion that: "P&G doesn't have to intrude in the lives
|
|
of P&G employees, let alone everyone else".
|
|
|
|
The same AP story references Cincinnati's American Civil Liberties
|
|
Union Regional Coordinator, Jim Rogers, similarly commenting that: "The
|
|
subpoena is invasive for anyone in the 513 area code. If I called "The Wall
|
|
Street Journal", what possible interest should P&G have in that?"
|
|
|
|
In a later 8-18-91 AP story, Cleveland attorney David Marburger was quoted
|
|
as observing that "what is troublesome is I just wonder if a small business in
|
|
Cincinnati had the same problem, would law enforcement step in and help them
|
|
out?" Marburger also added, "it's a surprise to me," referring to the nature
|
|
of the police investigation.
|
|
|
|
In response, Police Commander of Criminal Investigations, Heydon Thompson,
|
|
told the Cincinnati Business Courier "Procter & Gamble is a newsmaker, but
|
|
that's not the reason we are conducting this investigation." P&G spokesperson
|
|
Terry Loftus responded to the notion P&G had over-reacted by pointing out: "We
|
|
feel we're doing what we must do, and that's protect the shareholders. And
|
|
when we believe a crime has been committed, to turn that information over to
|
|
the police."
|
|
|
|
Meanwhile, the {Cincinnati Post} published an editorial this past
|
|
weekend -- describing the P&G request for a police investigation as "kind of
|
|
like when the biggest guy in a pick-up basketball game cries foul because
|
|
someone barely touches him." Finally, AP referenced what it termed "coziness"
|
|
between the city of Cincinnati and P&G in its 8-18-91 piece. In order to
|
|
support this notion of coziness, Cincinnati Mayor David Mann was quoted to say:
|
|
"The tradition here, on anything in terms of civic or charitable initiative, is
|
|
you get P&G on board and everybody else lines up." As one who lived near
|
|
Cincinnati for eight years, I recall Procter & Gamble's relationship with
|
|
Cincinnati as rather cozy indeed.
|
|
_______________________________________________________________________________
|
|
|
|
Hacker Charged in Australia August 13; 1991
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
The Associated Press reports from Melbourne that Nahshon Even-Chaim, a
|
|
20-year old computer science student, is being charged in Melbourne's
|
|
Magistrates' Court on charges of gaining unauthorized access to one of CSIRO's
|
|
(Australia's government research institute) computers, and 47 counts of
|
|
misusing Australia's Telecom phone system for unauthorized access to computers
|
|
at various US institutions, including universities, NASA, Lawrence Livermore
|
|
Labs, and Execucom Systems Corp. of Austin, Texas, where it is alleged he
|
|
destroyed important files, including the only inventory of the company's
|
|
assets. The prosecution says that the police recorded phone conversations in
|
|
which Even-Chaim described some of his activities. No plea has been entered
|
|
yet in the ongoing pre-trial proceedings.
|
|
|
|
_______________________________________________________________________________
|
|
|
|
Dial-a-Pope Catching on in the U.S. August 17, 1991
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
>From the Toronto Star
|
|
|
|
The Vatican is reaching out to the world, but it looks as if Canada won't
|
|
be heeding the call. In the U.S., if you dial a 900 number, you can get a
|
|
daily spiritual pick-me-up from Pope John Paul II. The multilingual, Vatican
|
|
-authorized service, affectionately known as Dial-a-Pope, is officially titled
|
|
"Christian Messaging From the Vatican." A spokesman from Bell Canada says
|
|
there is no such number in this country. But Des Burge, director of
|
|
communications for the Archdiocese of Toronto, says he thinks the service, for
|
|
which U.S. callers pay a fee, is a good way to help people feel more connected
|
|
to the Pope. (Toronto Star)
|
|
______________________________________________________________________________
|
|
|
|
PWN Quicknotes
|
|
~~~~~~~~~~~~~~
|
|
1. Agent Steal is sitting in a Texas jail awaiting trial for various crimes
|
|
including credit card fraud and grand theft auto.
|
|
_______________________________________________________________________________
|
|
|
|
2. Blue Adept is under investigation for allegedly breaking into several
|
|
computer systems including Georgia Tech and NASA.
|
|
_______________________________________________________________________________
|
|
|
|
3. Control C had his fingerprints, photographs, and a writing sample
|
|
subpoenaed by a Federal Grandy Jury after Michigan Bell employees,
|
|
and convicted members of the Legion of Doom (specifically The Leftist
|
|
and the Urvile) gave testimony.
|
|
|
|
Control C was formerly an employee of Michigan Bell in their security
|
|
department until January 1990, when he was fired about the same time
|
|
as the raids took place on Knight Lightning, Phiber Optic, and several
|
|
others. Control C has not been charged with a crime, but the status
|
|
of the case remains uncertain.
|
|
_______________________________________________________________________________
|
|
|
|
4. Gail Thackeray, a special deputy attorney in Maricopa County in Arizona,
|
|
has been appointed vice president at Gatekeeper Telecommunications Systems,
|
|
Inc., a start-up in Dallas. Thackeray was one of the law enforcers working
|
|
on Operation Sun-Devil, the much publicized state and federal crackdown on
|
|
computer crime. Gatekeeper has developed a device that it claims is a
|
|
foolproof defense against computer hackers. Thackeray said her leaving
|
|
will have little impact on the investigation, but one law enforcer who
|
|
asked not to be identified, said it is a sure sign the investigation in on
|
|
the skids. (ComputerWorld, June 24, 1991, page 126)
|
|
_______________________________________________________________________________
|
|
|
|
5. Tales Of The Silicon Woodsman -- Larry Welz, the notorious 1960s
|
|
underground cartoonist, has gone cyberpunk. He recently devoted an entire
|
|
issue of his new "Cherry" comice to the adventures of a hacker who gets
|
|
swallowed by her computer and hacks her way through to the Land of Woz.
|
|
(ComputerWorld, July 1, 1991, page 82)
|
|
_______________________________________________________________________________
|
|
|
|
6. The Free Software Foundation (FSF), founded on the philosophy of free
|
|
software and unrestricted access to computers has pulled some of its
|
|
computers off the Internet after malicious hackers <MOD> repeatedly deleted
|
|
the group's files. The FSF also closed the open accounts on the system to
|
|
shut out the hackers who were using the system to ricochet into computers
|
|
all over the Internet following several complaints from other Internet
|
|
users. Richard Stallman, FSF director and noted old-time hacker, refused
|
|
to go along with his employees -- although he did not overturn the decision
|
|
-- and without password access has been regulated to using a stand-alone
|
|
machine without telecom links to the outside world.
|
|
(ComputerWorld, July 15, 1991, page 82)
|
|
_______________________________________________________________________________
|
|
|
|
7. The heads of some Apple Macintosh user groups have received a letter from
|
|
the FBI seeking their assistance in a child-kidnapping case. The FBI is
|
|
querying the user group leaders to see if one of their members fits the
|
|
description of a woman who is involved in a custody dispute. It's unclear
|
|
why the FBI believes the fugitive is a Macintosh user.
|
|
(ComputerWorld, July 29, 1991, page 90)
|
|
_______________________________________________________________________________
|
|
|
|
8. Computer viruses that attack IBM PCs and compatibles are nearing a
|
|
milestone of sorts. Within the next few months, the list of viruses will
|
|
top 1,000 according to Klaus Brunnstein, a noted German computer virus
|
|
expert. He has published a list of known malicious software for MS-DOS
|
|
systems that includes 979 viruses and 19 trojans. In all, there are 998
|
|
pieces of "malware," Brunnstein said.
|
|
(ComputerWorld, July 29, 1991, page 90)
|
|
_______________________________________________________________________________
|
|
|
|
9. High Noon on the Electronic Frontier -- This fall the Supreme Court of the
|
|
United States may rule on the appealed conviction from U.S. v. Robert
|
|
Tappan Morris. You might remember that Morris is the ex-Cornell student
|
|
who accidentially shut down the Internet with a worm program. Morris is
|
|
also featured in the book "Cyberpunk" by Katie Hafner and John Markoff.
|
|
_______________________________________________________________________________
|
|
|
|
10. FBI's Computerized Criminal Histories -- There are still "major gaps in
|
|
automation and record completness" in FBI and state criminal records
|
|
systems, the Congressional Office of Technology has reported in a study on
|
|
"Automated Record Checks of Firearm Purchasers: Issues and Options." In
|
|
the report, OTA estimates that a system for complete and accurate "instant"
|
|
name checks of state and federal criminal history records when a person
|
|
buys a firearm would take several years and cost $200-$300 million. The
|
|
FBI is still receiving dispositions (conviction, dismissal, not guilty,
|
|
etc.) on only half of the 17,000 arrest records it enters into its system
|
|
each day. Thus, "about half the arrests in the FBI's criminal history
|
|
files ("Interstate Ident-ification Index" -- or "Triple I") are missing
|
|
dispositions. The FBI finds it difficult to get these dispositions." The
|
|
OTA said that Virginia has the closest thing to an instant records chck for
|
|
gun purchasers. For every 100 purchasers, 94 are approved within 90
|
|
seconds, but of the six who are disapproved, four or five prove to be based
|
|
on bad information (a mix-up in names, a felony arrest that did not result
|
|
in conviction, or a misdemeanor conviction that is not disqualifying for
|
|
gun ownership) (62 pages, $3 from OTA, Washington, D.C. 20510-8025,
|
|
202/224-9241, or U.S. Government Printing Office, Stock No.052-003-01247-2,
|
|
Washington, D.C. 20402-9325, 202/783-3238).
|
|
(Privacy Journal, August 1991, page 3)
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
Founded in 1974, Privacy Journal is an independent monthly on privacy in the
|
|
computer age. It reports in legislation, legal trends, new technology, and
|
|
public attitudes affecting the confidentiality of information and the
|
|
individual's right to privacy.
|
|
|
|
Subscriptions are $98 per year ($125 overseas) and there are special
|
|
discount rates for students and others. Telephone and mail orders accepted,
|
|
credit cards accepted.
|
|
|
|
Privacy Journal
|
|
P.O. Box 28577
|
|
Providence, Rhode Island 02908
|
|
(401)274-7861
|
|
_______________________________________________________________________________
|
|
|