mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
508 lines
22 KiB
Text
508 lines
22 KiB
Text
==Phrack Magazine==
|
|
|
|
Volume Four, Issue Forty-Three, File 27 of 27
|
|
|
|
PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN
|
|
PWN PWN
|
|
PWN Phrack World News PWN
|
|
PWN PWN
|
|
PWN Compiled by Datastream Cowboy PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
|
|
New Yorker Admits Cracking July 3, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
(From AP Newswire Sources)
|
|
|
|
Twenty-one-year-old Mark Abene of New York, known as "Phiber Optik" in
|
|
the underground computing community, has pleaded guilty to charges he
|
|
participated in a group that broke into computers used by phone companies
|
|
and credit reporting services.
|
|
|
|
The Reuter News Service says Abene was the last of the five young men
|
|
indicted in the huge 1991 computer break-in scheme to admit committing the
|
|
crimes. The group called itself "MOD," an acronym used for "Masters of
|
|
Disaster" and "Masters of Deception."
|
|
|
|
Abene pleaded guilty to one count of conspiracy and one count of
|
|
unlawful access to computers. He faces a possible maximum prison term of
|
|
10 years and fine of $500,000.
|
|
|
|
-----------------------------------------------------------------------------
|
|
|
|
China Executes Computer Intruder April 26, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
(From AP Newswire Sources)
|
|
|
|
A man accused of invading a computer and embezzling some
|
|
$192,000 has been executed in China.
|
|
|
|
Shi Biao, an accountant at the Agricultural Bank of China's Jilin
|
|
branch, was accused of forging deposit slips from Aug. 1 to
|
|
Nov. 18, 1991.
|
|
|
|
The crime was the first case of bank embezzlement via
|
|
computer in China. Authorities became aware of the plot
|
|
when Shi and his alleged accomplice, Yu Lixin, tried to wire
|
|
part of the money to Shenzhen in southern China.
|
|
|
|
-----------------------------------------------------------------------------
|
|
|
|
Teen Takes the A Train --- Literally May 13, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
(From AP Newswire sources)
|
|
|
|
A 16 year old 10th grader successfully conveyed passengers on a NYC 10 car
|
|
subway train for 2.5 hours until he went around a curve too quickly and
|
|
could not reset the emergency brakes. Keron Thomas dressed as a NY subway
|
|
train engineer impersonated Regoberto Sabio, a REAL subway motorman, while he
|
|
was on vacation and even obtained Sabio's "pass number".
|
|
|
|
Thomas was a Subway enthusiast who hung around train stations and areas
|
|
where subway motormen and other subway workers hang out. A NYC subway
|
|
spokesman was quoted as saying "Buffs like to watch...pretty soon they
|
|
figure out how" [to run the train]. "This guy really knew what he was doing".
|
|
|
|
Thomas was charged with criminal trespassing, criminal impersonation, and
|
|
reckless endangerment.
|
|
|
|
-----------------------------------------------------------------------------
|
|
|
|
Banks React To Scheme That Used Phony ATM May 13, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
(From AP Newswire Sources)
|
|
|
|
At least three people are believed to be involved in an ATM scam that is
|
|
thought to have netted roughly $ 60,000. The fraud was perpetrated by
|
|
obtaining a real ATM machine (theorized to have been stolen from a warehouse)
|
|
and placing it in a Connecticut shopping mall.
|
|
|
|
When people attempted to use the machine, they received a message that the
|
|
machine wasn't working correctly and gave back the card. Little did they
|
|
know that their bank account number and PIN code was recorded. The fake
|
|
machine was in place for about 2 weeks. It was removed and the thieves
|
|
began making withdrawals.
|
|
|
|
The Secret Service thinks the scammers recorded anywhere from 2000 to 3000
|
|
account numbers/pin codes but did not get a chance to counterfeit
|
|
and withdraw money except from a few hundred accounts before it
|
|
became too dangerous to continue
|
|
|
|
-----------------------------------------------------------------------------
|
|
|
|
Hacker Gets Jail Time June 5, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~
|
|
(Newsday) (Page 13)
|
|
|
|
A Brooklyn College film student, who was part of a group that allegedly broke
|
|
into computer systems operated by major telephone companies, was sentenced
|
|
yesterday to 1 year and 1 day in prison.
|
|
|
|
John Lee, 21, of Bedford Stuyvesant, also was sentenced to 200 hours of
|
|
community service, which Manhattan Federal District Court Judge Richard Owen
|
|
recommended he spend teaching others to use computers. Lee had pled guilty
|
|
December 3, 1992, to a conspiracy charge involving computer tampering, fraud
|
|
and illegal wiretapping.
|
|
|
|
_______________________________________________________________________________
|
|
|
|
Hacker Gets Prison Term For Phone Computer Tampering June 4, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Gail Appleson (The Reuter Business Report)
|
|
|
|
NEW YORK -- A computer hacker known as "Corrupt" who was part of a group that
|
|
broke into computer systems operated by major telephone companies was
|
|
sentenced Friday to one year and one day in prison.
|
|
|
|
The defendant, John Lee, 21, of New York had pleaded guilty December 3, 1992
|
|
to a conspiracy charge involving computer tampering, fraud and illegal
|
|
wiretapping.
|
|
|
|
The indictment alleges the defendants broke into computer switching systems
|
|
operated by Southwestern Bell, New York Telephone, Pacific Bell, U.S. West
|
|
and Martin Marietta Electronics Information and Missile Group.
|
|
|
|
Southwestern Bell allegedly lost $370,000 because of the crimes.
|
|
|
|
The defendants also allegedly tampered with systems owned by the nation's
|
|
largest credit reporting companies including TRW, Trans Union and Information
|
|
America. They allegedly obtained 176 TRW credit reports on various
|
|
individuals.
|
|
|
|
The indictment alleged the group broke into the computers "to enhance their
|
|
image and prestige among other computer hackers and to harass and intimidate
|
|
rival hackers and other people they did not like."
|
|
_______________________________________________________________________________
|
|
|
|
Professional Computer Hackers First To Land In Jail Under New Law June 4, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Nicholas Hills (The Vancouver Sunds)(Page A11)
|
|
|
|
LONDON -- In Brussels, they were celebrated as the two young men who broke the
|
|
gaudy secrets of EC president Jacques Delors' expense accounts.
|
|
|
|
In Sweden, they were known as the Eight-Legged Groove Machine, bringing down
|
|
part of the country's telephone network, forcing a highly publicized apology
|
|
from a government minister who said the chaos was all due to a 'technical
|
|
fault'.
|
|
|
|
They also broke into various European defense ministry networks, academic
|
|
systems at Hull University and the financial records of the leading London
|
|
bankers, S.G. Warburg.
|
|
|
|
No, these weren't two happy-go-lucky burglars; but rather, professional
|
|
computer hackers, aged 24 and 22, who made legal as well as technological
|
|
history by being the first offenders of this new trade to be jailed for their
|
|
crimes under new British law.
|
|
|
|
Neil Woods and Karl Strickland have gone to prison for six months each for
|
|
penetrating computer systems in 15 different countries. The ease with which
|
|
they conducted this exercise, and their attitude that they were simply engaging
|
|
in "intellectual joyriding," has confirmed the worst fears of legal and
|
|
technological experts that computer hacking in Europe, at least, has become a
|
|
virtually uncontrollable virus.
|
|
|
|
The case became a cause celebre because of what had happened months before in
|
|
another courtroom where a teenage computer addict who had hacked into the White
|
|
House system, the EC, and even the Tokyo Zoo -- using a $400 birthday present
|
|
from his mother -- had walked free because a jury accepted, basically, that a
|
|
computer had taken over his mind.
|
|
|
|
The case of 19-year-old Paul Bedworth, who began hacking at the age of 14, and
|
|
is now studying "artificial intelligence" at Edinburgh University, provides an
|
|
insight into why hackers have turned the new computer world into an equivalent
|
|
state of delirium tremens.
|
|
|
|
Bedworth and two young friends caused thousands of dollars worth of damage to
|
|
computer systems in Britain and abroad. They were charged with criminal
|
|
conspiracy under the Computer Misuse Act of 1990.
|
|
|
|
Bedworth never did deny computer hacking at his trial, and did not give
|
|
evidence in his defense. He simply said through his lawyer that there could
|
|
not have been any criminal intent because of his "pathological obsession" with
|
|
computers.
|
|
|
|
A jury of eight men and three women unanimously acquitted him.
|
|
|
|
Until the passage of the Computer Misuse Act in 1990, hacking was legal in
|
|
Britain. Bedworth may have been found not guilty, but his activities were so
|
|
widespread that the authorities' investigation involved eight different British
|
|
police forces, and others from as far afield as Finland and Singapore. It
|
|
produced so much evidence - mostly on disk - that if it had been printed out on
|
|
ordinary laser printer paper, it is estimated that the material would have
|
|
reached a height of 42 meters.
|
|
|
|
The police were devastated by the verdict, but are now feeling somewhat better
|
|
after the conviction of Woods and Strickland.
|
|
|
|
The pair, using the nicknames of Pad and Gandalf, would spend up to six hours a
|
|
day at their computers, boasting about "smashing" databases.
|
|
|
|
-----------------------------------------------------------------------------
|
|
|
|
Computers Turned My Boy Into A Robot March 18, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Martin Phillips (Daily Mirror)(Page 1)
|
|
|
|
Connie Bedworth said she was powerless to control the "monster" as he
|
|
glued himself to the screen nearly 24 hours as day. "He didn't want
|
|
to eat or sleep--he just couldn't bear to be away from it, " she said.
|
|
|
|
A jury decided Paul Bedworth, now 19, was so "hooked" he could not stop
|
|
himself hacking in to companies' systems -- allegedly costing them
|
|
thousands of dollars.
|
|
|
|
-----------------------------------------------------------------------------
|
|
|
|
Hot For The Fingertips: An Internet Meeting Of Minds May 23, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Frank Bajak (Associated Press)
|
|
|
|
NEW YORK -- Somewhere in the ether and silicon that unite two workstations 11
|
|
floors above lower Broadway, denizens of the cyberpunk milieu are feverishly
|
|
debating whether anyone in government can be trusted.
|
|
|
|
This is the 12-by-20-foot bare-walled home of MindVox, today's recreation hall
|
|
for the new lost generation's telecomputing crowd. You can enter by phone
|
|
line or directly off Internet.
|
|
|
|
Patrick Kroupa and Bruce Fancher are the proprietors, self-described former
|
|
Legion of Doom telephone hackers who cut the cord with computing for a time
|
|
after mid-1980s teen-age shenanigans.
|
|
|
|
Kroupa is a towering 25-year-old high school dropout in a black leather jacket,
|
|
with long hair gathered under a gray bandanna, three earrings and a hearty
|
|
laugh.
|
|
|
|
Fancher is 22 and more businesslike, but equally in love with this dream he
|
|
left Tufts University for.
|
|
|
|
They've invested more than $80,000 into Mindvox, which went fully operational
|
|
in November and has more than 2,000 users, who pay $15 to $20 a month plus
|
|
telephone charges.
|
|
|
|
MindVox aspires to be a younger, harder-edged alternative to the WELL, a
|
|
fertile 8-year-old watering hole for the mind in Sausalito, California, with
|
|
more than 7,000 users, including scores of computer age luminaries.
|
|
|
|
One popular feature is a round-table discussion on computer theft and security
|
|
hosted by a U.S. Treasury agent. The latest hot topic is the ease of breaking
|
|
into a new flavor of local access network.
|
|
|
|
-----------------------------------------------------------------------------
|
|
|
|
Hi Girlz, See You In Cyberspace May 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Margie (Sassy Magazine) (Page 79)
|
|
|
|
[Margie hits the net via Mindvox. Along the way she discovers
|
|
flame wars, sexism, and a noted lack of females online. This
|
|
is her story. :) ]
|
|
|
|
-----------------------------------------------------------------------------
|
|
|
|
Hacker Accused of Rigging Radio Contests April 22, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Don Clark (San Francisco Chronicle)
|
|
|
|
A notorious hacker was charged yesterday with using computers to
|
|
rig promotional contest at three Los Angeles radio stations, in
|
|
a scheme that allegedly netted two Porsches, $20,000 in cash and
|
|
at least two trips to Hawaii.
|
|
|
|
Kevin Lee Poulsen, now awaiting trial on earlier federal charges,
|
|
is accused of conspiring with two other hackers to seize control of
|
|
incoming phone lines at the radio stations. By making sure that only
|
|
their calls got through, the conspirators were assured of winning the
|
|
contests, federal prosecutors said.
|
|
|
|
A new 19-count federal indictment filed in Los Angeles charges
|
|
that Poulsen also set up his own wire taps and hacked into computers
|
|
owned by California Department of Motor Vehicles and Pacific Bell.
|
|
Through the latter, he obtained information about the undercover
|
|
businesses and wiretaps run by the FBI, the indictment states.
|
|
|
|
Poulsen, 27, is accused of committing the crimes during 17
|
|
months on the lam from earlier charges of telecommunications and
|
|
computers fraud filed in San Jose. He was arrested in April 1991
|
|
and is now in the federal Correctional Institution in Dublin. In
|
|
December, prosecutors added an espionage charge against him for his
|
|
alleged theft of a classified military document.
|
|
|
|
The indictment announced yesterday adds additional charges of
|
|
computer and mail fraud, money laundering, interception of wire
|
|
communications and obstruction of justice.
|
|
|
|
Ronald Mark Austin and Justin Tanner Peterson have pleaded guilty
|
|
to conspiracy and violating computer crime laws and have agreed to
|
|
help against Poulsen. Both are Los Angeles residents.
|
|
|
|
Poulsen and Austin have made headlines together before. As
|
|
teenagers in Los Angeles, the two computer prodigies allegedly broke
|
|
into a Pentagon-organized computer network that links researchers and
|
|
defense contractors around the country.
|
|
|
|
-----------------------------------------------------------------------------
|
|
|
|
SPA Tracks Software Pirates on Internet March 22, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Shawn Willett (InfoWorld)(Page 12)
|
|
|
|
The Software Publishers Association has begun investigating reports of
|
|
widespread piracy on the Internet, a loose amalgam of thousands of computer
|
|
networks.
|
|
|
|
The Internet, which began as a Unix-oriented, university-based communi-
|
|
cations network, now reaches into corporate and government sites in 110
|
|
countries and is growing at a rapid pace.
|
|
|
|
The software theft, according to Andrew Patrizio, an editor at the
|
|
_Software Industry Bulletin_, has been found on certain channels, particularly
|
|
the warez channel.
|
|
|
|
"People are openly talking about pirating software; there seems to be no
|
|
one there to monitor it", Patrizio said.
|
|
|
|
A major problem with the Internet is that the "sites" from where the
|
|
software is being illegally downloaded can physically be located in countries
|
|
that do not have strong antipiracy laws, such as Italy or the former Soviet
|
|
Union. The Internet also has no central administrator or system operator.
|
|
|
|
"Policing the entire Internet would be a job", said Peter Beruk,
|
|
litigation manager for the SPA, in Washington. "My feeling would be to target
|
|
specific sections that are offering a lot of commercial software free for the
|
|
download", he said.
|
|
|
|
---------------------------------------------------------------------------
|
|
|
|
Socialite's Son Will Have To Pay $15,000 To
|
|
Get His Impounded 1991 BMW Back March 23, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By John Makeig (Houston Chronicle)(Page 14A)
|
|
|
|
Kenyon Shulman, son of Houston socialite Carolyn Farb will have to pay
|
|
15 thousand dollars to get back his 1991 BMW 325i after being impounded
|
|
when Houston police found 400 doses of the drug ecstasy in its trunk.
|
|
|
|
This is just the latest brush with authorities for Shulman who in 1988
|
|
was raided by Harris County authorities for using his personal computer
|
|
to crack AT&T codes to make free long distance calls.
|
|
|
|
--------------------------------------------------------------------------
|
|
|
|
Austin Man Gets 10 Years For Computer Theft, Sales May 6, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Jim Phillips (Austin American Statesman)(Page B3)
|
|
|
|
Jason Copson, who was arrested in July under his alias Scott Edward Berry,
|
|
has been sentenced to 10 years on each of four charges of burglary and
|
|
one count of assault. The charges will run concurrently. Copson still
|
|
faces charges in Maryland and Virginia where he served a prison term and
|
|
was serving probation for dealing in stolen goods. Police arrested Copson
|
|
and Christopher Lamprecht on July 9 during a sting in which the men tried to
|
|
sell computer chips stolen from Advanced Micro Devices.
|
|
|
|
---------------------------------------------------------------------------
|
|
Treasury Told Computer Virus Secrets June 19, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By: Joel Garreau (Washington Post) (Page A01)
|
|
|
|
For more than a year, computer virus programs that can wreak havoc with
|
|
computer systems throughout the world were made available by a U.S. government
|
|
agency to anyone with a home computer and a modem, officials acknowledged this
|
|
week.
|
|
|
|
At least 1,000 computer users called a Treasury Department telephone number,
|
|
spokesmen said, and had access to the virus codes by tapping into the
|
|
department's Automated Information System bulletin board before it was muzzled
|
|
last month.
|
|
|
|
The bulletin board, run by a security branch of the Bureau of Public Debt in
|
|
Parkersburg, W.Va., is aimed at professionals whose job it is to combat such
|
|
malicious destroyers of computer files as "The Internet Worm," "Satan's Little
|
|
Helper" and "Dark Avenger's Mutation Engine." But nothing blocked anyone else
|
|
from gaining access to the information.
|
|
|
|
Before the practice was challenged by anonymous whistleblowers, the bulletin
|
|
board offered "recompilable disassembled virus source code"-that is, programs
|
|
manipulated to reveal their inner workings. The board also made available
|
|
hundreds of "hackers' tools"-the cybernetic equivalent of safecracking aids.
|
|
They included "password cracker" software-various programs that generate huge
|
|
volumes of letters and numbers until they find the combination that a computer
|
|
is programmed to recognize as authorizing access to its contents-and "war
|
|
dialers," which call a vast array of telephone numbers and record those hooked
|
|
to a computer.
|
|
|
|
The information was intended to educate computer security personnel,
|
|
according to Treasury spokesmen. "Until you understand how penetration is done,
|
|
you can't secure your system," said Kim Clancy, the bulletin board's operator.
|
|
|
|
The explosion of computer bulletin boards-dial-up systems that allow users
|
|
to trade any product that can be expressed in machine-readable zeros and
|
|
ones-has also added to the ease of virus transmission, computer analysts say.
|
|
"I am Bulgarian and my country is known as the home of many productive virus
|
|
writers, but at least our government has never officially distributed viruses,"
|
|
wrote Vesselin Vladimirov Bontchev of the Virus Test Center of the University
|
|
of Hamburg, Germany.
|
|
|
|
At first, the AIS bulletin board contained only routine security alert
|
|
postings. But then operator Clancy "began to get underground hacker files and
|
|
post them on her board," said Bruce Sterling, author of "The Hacker Crackdown:
|
|
Law and Disorder on the Electronic Frontier." "She amassed a truly impressive
|
|
collection of underground stuff. If you don't read it, you don't know what's
|
|
going to hit you."
|
|
|
|
Clancy, 30, who is a former Air Force bomb-squad member, is highly regarded
|
|
in the computer security world. Sterling, one of the nation's foremost writers
|
|
about the computer underground, called her "probably the best there is in the
|
|
federal government who's not military or NSA (National Security Agency).
|
|
Probably better than most CIA."
|
|
|
|
Clancy, meanwhile, is staying in touch with the underground. In fact, this
|
|
week, she said, she was "testing a product for some hackers." Before it goes
|
|
into production, she will review it to find potential bugs. It is a new war
|
|
dialer called "Tone-Loc." "It's an extremely good tool. Saves me a lot of
|
|
trouble. It enables me to run a hack against my own phone system faster" to
|
|
determine points of vulnerability.
|
|
|
|
-----------------------------------------------------------------------------
|
|
|
|
[AGENT STEAL -- WORKING WITH THE FEDS]
|
|
|
|
|
|
IN THE UNITED STATES DISTRICT COURT
|
|
|
|
FOR THE NORTHERN DISTRICT OF TEXAS
|
|
|
|
DALLAS DIVISION
|
|
-----------------------------------
|
|
|
|
THE UNITED STATES OF AMERICA *
|
|
*
|
|
V. * CRIMINAL NO. 3-91-194-T
|
|
* (FILED UNDER SEAL)
|
|
JUSTIN TANNER PETERSEN (1) *
|
|
|
|
JOINT MOTION TO SEAL
|
|
|
|
COMES NOW the United States of America, by its United
|
|
|
|
States Attorney, at the request of the defendant, and hereby
|
|
|
|
requests that this Honorable Court seal the record in this case.
|
|
|
|
In support thereof, the United States states the following:
|
|
|
|
1. The case is currently being transferred to the
|
|
|
|
Middle District of California for plea and disposition pursuant
|
|
|
|
to Federal Rule of Criminal Procedure 20;
|
|
|
|
2. The defendant is released on bond by the United
|
|
|
|
States District Court for the Middle District of California;
|
|
|
|
3. The defendant, acting in an undercover capacity,
|
|
|
|
currently is cooperating with the United States in the
|
|
|
|
investigation of other persons in California; and
|
|
|
|
4. The United States believes that the disclosure of
|
|
|
|
the file in this case could jeopardize the aforesaid
|
|
|
|
investigation and possibly the life of the defendant.
|
|
|
|
Consequently, the United States requests that this Honorable
|
|
|
|
Court seal the record in this case.
|
|
|
|
Respectfully submitted,
|
|
MARVIN COLLINS
|
|
United States Attorney
|
|
|
|
|
|
|
|
LEONARD A. SENEROTE
|
|
Assistant United States Attorney
|
|
Texas State Bar No. 18024700
|
|
1100 Commerce Street, Room 16G28
|
|
Dallas, Texas 75242-1699
|
|
(214) 767-0951
|
|
|
|
CERTIFICATE OF CONFERENCE
|
|
|
|
The defendant joins in this motion.
|
|
|
|
|
|
|
|
LEONARD A. SENEROTE
|
|
Assistant United States Attorney
|
|
|
|
|
|
[The entire file of information gathered from the courts regarding
|
|
Agent Steal is available from Phrack for $5.00 + $2 postage]
|
|
-------------------------------------------------------------------------
|