mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
313 lines
17 KiB
Text
313 lines
17 KiB
Text
==Phrack Inc.==
|
|
|
|
Volume Three, Issue Thirty-four, File #11 of 11
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN Phrack World News PWN
|
|
PWN PWN
|
|
PWN Issue XXXIV, Part Two PWN
|
|
PWN PWN
|
|
PWN Compiled by Dispater PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
Mind Rape or Media Rape?
|
|
~~~~~~~~~~~~~~~~~~~~~~~
|
|
Special Thanks: Night Ranger
|
|
|
|
Thursday September 26, 1991 was no ordinary day for Mind Rape, a young Arizona
|
|
State college student. When he finally made it home that day, he found his home
|
|
had been raided by the feds. 'They took EVERYTHING! Including my Metallica
|
|
tape!' he told me. After talking to him for quite a while I learned a lot, not
|
|
just about his bust but about hacking in general. He instructed me not to say
|
|
anything specifically on the advice of his lawyer and the EFF, but he did want
|
|
me to let the real reason he was busted be known - His electronic newsletter
|
|
entitled NSA (for National Security Anarchists). Mind Rape has some very
|
|
important views on hacking that the government doesn't want others to hear.
|
|
Some of these views were contained in his newest and soon to be released
|
|
newsletter NSA issue number five, which was confiscated of course. He was also
|
|
working on a book about hacker's philosophy, which was taken too. He has not
|
|
yet been charged but in the eyes of the media he is already been tried and
|
|
found guilty. It is unfortunate the general public gets its information from
|
|
news reports like the following because, as you can see, they can be quite
|
|
misleading. Hopefully once Mind Rape gets everything straight he will continue
|
|
to write his book, after all it is his constitutional right to do so, and I
|
|
think it be quite informative to both the hackers of the nineties and the
|
|
outside world.
|
|
|
|
The following is a transcript of a news report covering his story...
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Male Announcer: That student is Donald _____ of Phoenix. Officials of
|
|
LDL Long Distance believe he's one of around 20 hackers who've been ripping off
|
|
their company for fun and profit. In tonight's Night Team Report we'll see how
|
|
this kind of thievery adds up. The nation's telephone companies loose more
|
|
than a billion dollars a year to hackers. Mark Nighten (sp?) a security
|
|
director for LDL Long Distance. Last month he was poring through records like
|
|
these which convinced him to believe that someone was making hundreds of
|
|
computer generated phone calls to his company's 1-800 access line trying to get
|
|
customer's calling card codes. He went to the Phoenix Police. They got a
|
|
search warrant and traced the calls to a house near 18th Drive near Union
|
|
Hills. Police went there last month and came away with a computer, software
|
|
and a list of phone codes, all belonging to 19 year old Donald _____ an ASU
|
|
student. With nighten suspects _____ is just one of 20 hacker on his network
|
|
who can make thousands of dollars worth of calls which would wind up on other
|
|
people's phone bills.
|
|
|
|
Mark: You can see the magnitude of this. Off of one authorization code
|
|
you could have 10, maybe 150 other people...
|
|
|
|
Male Announcer: Lemme ask ya...How bad are you getting ripped off here?
|
|
|
|
Mark: We've had to have somebody on this 24 hours a day. We've been
|
|
getting killed.
|
|
|
|
Male Announcer: Hackers often sell the codes they steal to other students.
|
|
So that hundreds of students and Arizona State University and University of
|
|
Arizona also could be ripping of the company. Students at Arizona State
|
|
University told me today that they have not herd of LDL's troubles, but they
|
|
confirmed that stolen phone codes do have a way of getting around.
|
|
|
|
I iz a College Student: Someone hears...ya know...about the interest and
|
|
someone else knows somebody...ya know...and they tell you and you talk to
|
|
them and...ya know...it's not overly expensive or anything like that.
|
|
|
|
Male Announcer: Dr. Dan Kneer of Arizona State University's School
|
|
of Business is a nationally recognized expert on computer crime. [who?] He
|
|
contends that hacking is mushrooming.
|
|
|
|
Dr. Dan: The problem that I see is that these people philosophically
|
|
don't see this as a crime. For most of them this is an intellectual challenge.
|
|
|
|
Male Announcer: That challenge led Dutch students to break into a United
|
|
States Army Computer during operation desert storm. And as this Japanese
|
|
documentary shows, it led hackers in a New York City to use payphones to commit
|
|
big time rip-offs. Now it's important to point out that Donald ______, that
|
|
Arizona State University student, has not yet been charged with any crime and
|
|
if he is charged he is innocent until proven guilty.
|
|
|
|
Female announcer: What is the penalty for hacking?
|
|
|
|
Male Announcer: Just for getting into a system when you're not supposed to
|
|
can be up to a year and a half in prison. But if there is criminal intent to
|
|
steal, to rip-off that system, the penalty can be as high as 10 years in jail
|
|
and a $150,000.00 fine.
|
|
|
|
_______________________________________________________________________________
|
|
|
|
Computer Hacker Gets Probation September 26, 1991
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Special Thanks: Flaming Carrot (Pittsburgh Post-Gazette)
|
|
|
|
A Mt. Lebanon woman who was able to make thousands of free long-distance
|
|
telephone calls by breaking into voice mail boxes with a touch tone telephone
|
|
has been placed on 10 years probation. Last Friday, Common Pleas Judge Robert
|
|
E. Dauer ordered Andrea Gerulis, 20, of Castle Shannon Boulevard to make
|
|
restitution of $4,300 to Magee Womens Hospital and $2,516 to Pittsburgh
|
|
Cellular Telephone Co.
|
|
|
|
Gerulis, a Mt. Lebanon High School graduate, was a computer hacker who
|
|
entered telephone computer systems illegally so that she could make telephone
|
|
calls without paying for the service. Mt. Lebanon police Detective John L.
|
|
Michalec posed as a computer hacker and spent nine months investigating her
|
|
activities, which were done by dialing codes on a touch-tone telephone.
|
|
|
|
After a non-jury trial in May, Dauer convicted her of two counts of theft
|
|
of services and two counts of unlawful use of computers. Assistant District
|
|
Attorney Thaddeus A. Dutkowski recommended probation because he didn't want
|
|
Gerulis to go to jail, where she could teach inmates how to commit crimes with
|
|
a telephone. If she were incarcerated, she would have the largest classroom
|
|
environment she could hope for, Dutkowski said.
|
|
|
|
Dauer agreed that inmates already know too much about committing crimes
|
|
with telephones. Gerulis told Dauer that she was sorry for what she did, that
|
|
when she started, she was doing it for fun. She was also ordered to continue
|
|
psychological counseling.
|
|
_______________________________________________________________________________
|
|
|
|
More Archaic Government Regulations Proposed
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Special Thanks: Stainless Steal Provider (New York Times)
|
|
|
|
The federal government said Thursday that it would introduce a standard
|
|
for authenticating electronic data later this summer, but the announcement
|
|
prompted an angry reaction from one of the leading private providers of software
|
|
that protects computer data.
|
|
|
|
The company, RSA Data Security Inc. of Redwood City, Calif., said the
|
|
government had failed to address fears about the possibility of a secret "trap
|
|
door," which would permit intelligence and law-enforcement agencies to look at
|
|
private data.
|
|
|
|
The issue of providing special mechanisms to permit government access to
|
|
private information has caused a growing public debate recently.
|
|
|
|
Earlier this year an anti-terrorism bill introduced in Congress called on
|
|
the computer and telecommunication industries to permit federal agencies to
|
|
look at private data. But the statement was later dropped from the bill after
|
|
extensive public opposition.
|
|
|
|
Government officials said that it would be possible for technical experts
|
|
to examine the standard when it is released this summer and they could decide
|
|
for themselves whether there were any shortcomings in the design of the
|
|
standard.
|
|
|
|
"It will be openly published and people can inspect it to their heart's
|
|
content," said James H. Burrows, head of the computer systems laboratory at the
|
|
National Institute of Standards and Technology.
|
|
|
|
He added that the new standard was not intended to encrypt computer data,
|
|
and that the government would continue to rely on an earlier technology known
|
|
as the Data Encryption Standard to actually hide information from potential
|
|
electronic eavesdroppers.
|
|
|
|
Burrows said there was a project under way to develop a successor to that
|
|
standard, but that it was years away from completion.
|
|
______________________________________________________________________________
|
|
|
|
Computer Whiz Accused Of Illegal Access and Mischief September 25, 1991
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Peter G. Chronis (The Denver Post Page 1 "NASA vs. Hobbyist")
|
|
|
|
An Aurora computer hobbyist who allegedly used a personal computer and his
|
|
home phone to penetrate NASA computers hacked off Uncle Sam enough to be
|
|
indicted on seven federal counts yesterday. Richard G. Wittman, 24, the
|
|
alleged "hacker," was accused of two felonies, including gaining unauthorized
|
|
access to NASA computers to alter, damage, or destroy information, and five
|
|
misdemeanor counts of interfering with the government's operation of the
|
|
computers. Wittman allegedly got into the NASA system on March 7, June 11,
|
|
June 19, June 28, July 25, July 30, and Aug. 2, 1.
|
|
|
|
Bob Pence, FBI chief in Denver, said Wittman used a personal computer in
|
|
his home and gained access to the NASA systems over telephone lines. The
|
|
investigation, which took more than a year, concluded that Wittman accessed the
|
|
NASA computer system and agency computers at the Marshall Space flight Center in
|
|
Huntsville, Alabama, and the Goddard Space Flight Center in Greenbelt,
|
|
Maryland.
|
|
|
|
The NASA computers are linked to a system called Telenet, which allows
|
|
qualified people to access government data bases. A user name and password
|
|
are required to reach the NASA computers. Federal sources declined to reveal
|
|
more information because the complex case involves "sensitive material."
|
|
|
|
Wittman, a high-school graduate, apparently hadn't worked in the computer
|
|
industry and held a series of odd jobs. The felony counts against him each
|
|
carry a possible five-year prison term and $250,000 fine.
|
|
_______________________________________________________________________________
|
|
|
|
Security Increases
|
|
~~~~~~~~~~~~~~~~~
|
|
Special Thanks: Stainless Steal Provider (New York Times)
|
|
|
|
The foundation was started by Richard Stallman, who was awarded a MacArthur
|
|
Foundation fellowship in 1. While mainstream software companies
|
|
have prohibited users from freely copying their programs, Stallman, who is
|
|
widely respected for developing computer languages and software editing tools,
|
|
has argued that information is not the same as other commodities and should be
|
|
shared without cost.
|
|
|
|
His password has been widely known among network users because he has
|
|
refused to keep it secret. He is bitter about the changes that have
|
|
accompanied the coming of age of computer networks.
|
|
|
|
Last month, after security was increased at the foundation and many users
|
|
were stripped of their guest privileges, Stallman said he considered giving up
|
|
his quest.
|
|
|
|
In the end, he decided that the cause of creating free software was too
|
|
important to abandon, but he said he feels like a pariah. "Since I won't agree
|
|
to have a real password, I will only be able to log in on the 'inside'
|
|
machines,"
|
|
he wrote in an electronic message in response to a reporter's query.
|
|
|
|
"I still feel partly ashamed of participating in this. I've been forced to
|
|
choose between two principles, both of which are so important to me that I
|
|
won't accept the loss of either of them."
|
|
|
|
Idealists like Stallman and Ted Nelson, the author of the cult classic
|
|
"Computer Lib," hoped that the computer revolution wouldn't be like the
|
|
industrial revolution. This time the wealth -- information -- would be free to
|
|
everyone and instant communication would break down the barriers between rich
|
|
and poor and remake mankind.
|
|
|
|
Marvin Minsky, a computer science professor at MIT, said that for 15
|
|
years, beginning in 1963, researchers at the school lived in a paradise,
|
|
sharing computers and networks before a system of password protection was
|
|
installed. Now that has changed. "It's sad," he said.
|
|
|
|
"But Richard Stallman is living in a dream world. He has this view that
|
|
his idea of computer ethics will prevail. But it's not going to happen this
|
|
year or next."
|
|
|
|
Instead of finding community on computer networks, many users are now
|
|
confronted with virus invasions and information theft, leading to the same
|
|
sense of alienation and fear felt by residents of large cities.
|
|
|
|
"At first I thought this was Marshall McLuhan's global village coming to
|
|
reality," said Neil Harris, a manager at General Electric Information Services
|
|
Co., which sets up computer conferences and sells information to about 200,000
|
|
members around the world.
|
|
|
|
"But it's not that at all. It's a lot of people connecting in hundreds of
|
|
small communities based around highly specific interests."
|
|
|
|
Steven Levy, who has written about the early days of computing at MIT, said
|
|
that the demise of the Free Software Foundation's open door policy was
|
|
inevitable.
|
|
|
|
"When you pass the plate around in church you don't expect people to steal
|
|
from it," he said. "But sooner or later everyone knows that the plate is
|
|
unguarded, and there are always people who don't care about the church. The
|
|
question is how far do you go to protect it? Do you lock the church or do you
|
|
send an armed guard around with the plate?"
|
|
______________________________________________________________________________
|
|
|
|
PWN Quicknotes
|
|
~~~~~~~~~~~~~
|
|
1. On June 12, 1991, Sirhackalot's equipment was confiscated by the Southern
|
|
Bell and the FBI without any charges being filed. Neither the FBI nor
|
|
Southern Bell bothered to explain why they were in his home and taking his
|
|
personal possessions. Again neither party could tell Sirhackalot what he
|
|
supposedly did to bring both agency's to his doorstep. Also busted were
|
|
Mr.Doo and The Imortal Phreak. [Special Thanks: The Marauder (404)]
|
|
_______________________________________________________________________________
|
|
|
|
2. Bill Cook is no longer an assistant United States Attorney in Chicago. It
|
|
is unknown how he left his position. Basic questions go unanswered. Did
|
|
he quit or was fired? If he was fired, we'd like to know exactly why.
|
|
_______________________________________________________________________________
|
|
|
|
3. Wanted: Targets of Operation Sun Devil
|
|
|
|
Computer Professionals for Social Responsibility (CPSR) is pursuing a
|
|
lawsuit against the Secret Service seeking the release of information
|
|
concerning Operation Sun Devil. In recently filed court papers, the
|
|
agency claims that the information cannot be disclosed because, among
|
|
other reasons, disclosure would violate the privacy of those individuals
|
|
who are the targets of the investigation. This argument can be overcome
|
|
if CPSR obtains signed releases from those individuals. CPSR is
|
|
requesting the cooperation of anyone who was the subject of a Sun Devil
|
|
raid on or about May 7, 1. We are prepared to enter into an attorney-
|
|
client relationship with individuals responding to this request, so that
|
|
confidentiality will be assured.
|
|
|
|
Please respond ASAP to:
|
|
|
|
David Sobel
|
|
CPSR Legal Counsel
|
|
(202) 544-9240
|
|
dsobel@washofc.cpsr.org
|
|
_______________________________________________________________________________
|
|
|
|
4. Recently Microsoft discovered it was the victim of trespassing. A
|
|
security guard noticed two people playing volleyball on the premises and
|
|
knew that they did not work for Microsoft. The officer approached the
|
|
volleyball players and asked them to leave. The trespassers left. Later
|
|
someone asked the security guard how he knew that the people playing
|
|
volleyball were not Microsoft employees. He replied, "They had tans."
|
|
[Special Thanks: Psychotic Surfer]
|
|
_______________________________________________________________________________
|
|
|
|
|