mirror of
https://github.com/fdiskyou/Zines.git
synced 2025-03-09 00:00:00 +01:00
436 lines
21 KiB
Text
436 lines
21 KiB
Text
==Phrack Magazine==
|
|
|
|
Volume Four, Issue Forty-Four, File 27 of 27
|
|
|
|
PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN
|
|
PWN PWN
|
|
PWN Phrack World News PWN
|
|
PWN PWN
|
|
PWN Compiled by Datastream Cowboy PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
|
|
Feds Pull The Plug On Phiber Optik November 4, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Joshua Quitner (Newsday) (Page 57)
|
|
|
|
The biggest case of computer intrusion in US history drew to a close yesterday
|
|
when a young Elmhurst, Queens, man was sentenced to a year and a day in jail
|
|
for his part in an electronic gang that, for years, roamed the nation's
|
|
largest telephone and data networks.
|
|
|
|
Mark Abene, 21, renowned in the digital underground as Phiber Optik, was the
|
|
last of five young New York City men to plead guilty in federal court to one
|
|
felony count of conspiracy for being in a hacker group known as MOD.
|
|
|
|
Abene apologized for his deeds yesterday. "I'm just sorry they were
|
|
misconstrued as malicious in any way," he said in Manhattan's federal
|
|
district court.
|
|
|
|
Prosecutors claimed that the young men rumbled on computer networks,
|
|
disconnecting other hackers' phone service and posting embarrassing
|
|
information culled from confidential credit networks like TRW on
|
|
underground bulletin boards. They also used their power skills to get
|
|
telephone numbers or credit reports for celebrities, including Julia
|
|
Roberts, John Gotti, Geraldo Rivera, Christina Applegate and Mad Magazine
|
|
founder William Gaines.
|
|
|
|
John Lee, 22, a co-defendant is now serving a one year sentence in a
|
|
"shock incarceration" boot camp in Lewisburg, PA. Lee and Julio Fernandez,
|
|
18, were the only gang members who made money from the two years of
|
|
break-ins.
|
|
|
|
In addition to Lee and Fernandez, Paul Stira, 23, of Cambria Heights,
|
|
Queens, and Elias Ladopoulos, 24, of Jamaica, Queens, are serving six-month
|
|
sentences in federal prisons in Pennsylvania. Fernandez has been cooperating
|
|
with authorities and is not expected to be jailed.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Computer Caper Is Unpluged
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~ October 1, 1993
|
|
by Tim Bryant (St. Louis Dispatch) (Page A1)
|
|
|
|
Investigators said 18-year-old computer hacker Paul J. Gray of Creve Coeur,
|
|
MO, was arrested on a state charge of tampering with computer data, a
|
|
misdemeanor. The college freshman reportedly used his home computer to
|
|
spy electronically on files of a federal appeals court and charge
|
|
long-distance telephone calls to Mercantile Bank
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Teen Hacker Admits Having Illegal Credit Information June 17, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by James McClear (Detroit News) (Page B7)
|
|
|
|
Ander Monson, 18, of Houghton, MI, whose electronic misadventures uploaded
|
|
him into the high-tech world of computer fraud, pleaded guilty in Oakland
|
|
County Probate Court to illegal possession of credit card information.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
In The Jungle Of MUD September 13, 1993
|
|
~~~~~~~~~~~~~~~~~~~~
|
|
by Ellen Germain (Time) (Page 61)
|
|
|
|
Virtual worlds you can hook into--and get hooked on--are the latest
|
|
rage on the computer networks.
|
|
|
|
[Ah, yes, Virtual Reality as perceived through the minds of the computer
|
|
illiterate. But wait, it's electronic crack! Keep an eye out for your
|
|
children!]
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
NCIC Abuse - Is Legislation The Answer October, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Brian Miller
|
|
|
|
Confidential information is being illegally released from the National
|
|
Crime Information Center network. But abuse of the system is difficult
|
|
to detect, and those caught are seldom punished.
|
|
|
|
A former law enforcement officer tracked town his ex-girlfriend with
|
|
information from an FBI-run law enforcement information system. Then
|
|
he killed her.
|
|
|
|
A terminal operator in Pennsylvania used the same system to conduct
|
|
background searches for her drug dealing boyfriend to see if his customers
|
|
were undercover agents.
|
|
|
|
It is hard to trace abuse to a single user because many agencies don't
|
|
require personal access codes which would keep track of who made specific
|
|
inquiries on the system and when they occurred. The General Accounting
|
|
Office polled all the states and found that 17 don't require a personal
|
|
code to access the NCIC. Most of these had an identifier only for the
|
|
terminal or agency accessing the system.
|
|
|
|
And if someone is caught abusing the system, they are seldom charged with
|
|
a crime. The GAO found that the most common penalty was a reprimand, with
|
|
some suspensions and firings. Of the 56 cases of abuse found by the GAO,
|
|
only seven people were prosecuted.
|
|
|
|
The FBI cannot force the states to adopt certain security measures
|
|
because compliance with the guidelines is voluntary. The reason for this is
|
|
that the guts of the NCIC come from the states, and the FBI simply
|
|
maintains the network.
|
|
|
|
"The main thing that can be done today is to enforce the law, and create
|
|
stronger penalties for abusing the system," said Marc Rotenbertg of
|
|
Computer Professionals for Social Responsibility, an advocacy group
|
|
based in Palo Alto, California.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Live Wires September 6, 1993
|
|
~~~~~~~~~~
|
|
by Barbara Kantrowitz et.al. (Time) (Page 63)
|
|
&
|
|
Technoid Circus
|
|
~~~~~~~~~~~~~~~
|
|
by Rex Weiner (Spin) (Page 72) September, 1993
|
|
|
|
[K-K00l cYbUR P|_|n|< aRt1Cl3zzzz
|
|
|
|
Jump On The Cyber Bandwagon!
|
|
|
|
More Journalists ride that old info highway straight to HELL!]
|
|
|
|
|
|
** BUT WAIT! A "Cyber" article we can all dig! **
|
|
|
|
Speciale Cyber Settembre, 1993
|
|
~~~~~~~~~~~~~~
|
|
di Sergio Stingo (King) (P. 131)
|
|
|
|
Il cyberpunk: tutti ne parlano, ma pochi sanno cosa sia veramente. Libri
|
|
elettronici? Scenari inquietanti del futuro prossimo venturo? Conferenze
|
|
telematiche? Nuovi tipi di abbigliamento usa-e-getta? La piu' grande
|
|
rivoluzione democratica dei nostri anni? Una rivoluzione strisciante e
|
|
silenziosa? Ia nostro stingo, sempre curioso del <<nuovo>>, S'e' messo
|
|
a girare l'italia per iundagare il fenomeno. E' stato come scoperchiare
|
|
una pentola in ebollizione. Piu' incontrava <<cyber>> e piu' scopriva che
|
|
c'era da scoprire. Dal teorico della <<brain machine>>, che sperimenta
|
|
l'oggetto misterioso tra discoteche e universita', alla prima galleria
|
|
dove sono esposte opere di hacker art. Dalle riviste-bandiera del cyber,
|
|
come <<decoder>>, alle band che stanno inventando una nuova musica. Per non
|
|
parlare del sesso, che grazie alla tecnologia cerca di ampliare la
|
|
gamma delle sensazioni possibili. Insomma, il viaggio oltre i confini di
|
|
questo mondo e' stato talmente ricco e avventuroso, che abbiamo dovuto
|
|
suddividere il reportage in due puntate. In questo numero presentiamo
|
|
la prima. E, come si dice tra cybernauti, buona navigazione.
|
|
|
|
[I don't know what that says, but its in another language, so it has to
|
|
be cooler than the American CyberCrap]
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Security Products Abound, But Is Toll Fraud Too Tough? August 30, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Dan O'Shea (Telephony) (Page 7)
|
|
|
|
Telecommunications toll fraud is an increasingly popular crime that
|
|
collectively costs its victims billions of dollars each year. Although
|
|
carriers have responded with a wave of security products and services,
|
|
the problem might be much bigger than was once thought.
|
|
|
|
Some carriers claim that industry wide toll fraud losses amount to between
|
|
$2 billion and $5 billion a year, but the true figure is closer to $8 billion,
|
|
according to Bernie Milligan, president of CTF Specialists Inc.,
|
|
a consulting group that studies toll fraud and markets security services to
|
|
large corporate telecommunications users. [ed: remember HoHo Con? Yes...THAT
|
|
Bernie]
|
|
|
|
Toll fraud involving calls coming into AT&T's 800 network dropped 75% since
|
|
the introduction of NetProtect, while Sprint estimates a 95% decrease from
|
|
last year (since the introduction of their fraud detection service). Average
|
|
losses across the industry have plummeted from $120,000 per incident to
|
|
$45,000.
|
|
|
|
Despite the offensive against telecom fraud, the problem persists and is
|
|
becoming more frequent, and new technologies will only represent potential
|
|
new adventures for hackers, CFT's Milligan said. Hacker activity is growing
|
|
at an annual rate of 35%. Some 65% to 80% of toll fraud involves
|
|
international calling, and fraud occurs on a much wider scale than just
|
|
inbound 800 calls, Milligan said. So, while losses of this type of fraud
|
|
drop, collective fraud losses are increasing by 25% each year. Customers
|
|
are still liable financially in toll fraud cases, and the carriers continue
|
|
to get paid.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Misfit Millionaires December, 1993
|
|
~~~~~~~~~~~~~~~~~~~
|
|
by Steve Fishman (Details) (Page 158)
|
|
|
|
[Author profiles several of the early Microsoft programmers, namely
|
|
Richard Brodie, Jabe Blumenthal, Kevin DeGraaf, Neil Konzen and Doug
|
|
Klunder]
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Intercourse With Lisa Palac 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Melissa Plotsky (Axcess) (Page 62)
|
|
&
|
|
Turned On By Technology In The World Of Cybersex August 30, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Marco R. della Cava (USA Today) (Page 4D)
|
|
|
|
[An interview and an overview dealing with online nastiness. Lisa Palac
|
|
editor of Future Sex and producer of Cyborgasm talks about all kinds of
|
|
stuff. As a regular peruser of Future Sex (for the articles of course)
|
|
I can't help but wonder why we haven't seen HER naked yet. Email
|
|
her at futursex@well.sf.ca.us and demand some gifs.]
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Don't Try This At Home
|
|
~~~~~~~~~~~~~~~~~~~~~~ August, 1993
|
|
(Compute) (Page 62)
|
|
|
|
Welcome to desktop forgery.
|
|
|
|
Susan Morton, senior forensic document examiner with the US Postal Service
|
|
in San Francisco, has seen gangs travelling the country packing computers,
|
|
scanners, and laser printers. Arriving in town, their first move is to rob
|
|
a mailbox to acquire some checks that were mailed to, say, a local utility
|
|
company. They will copy the account and routing code off some citizen's
|
|
check and decide what branch bank that person probably uses. Then they forge
|
|
a large corporate or government check to that person, using information from
|
|
other checks they found in the mail. Packing a forged ID, a gang member
|
|
will then go to a branch across town where presumably nobody knows the
|
|
citizen and deposit part of that forged check. The check may be for $5000,
|
|
of which the forger takes $2000 as cash, smiles and leaves.
|
|
|
|
One check forging gang was chased across Texas for about six months in the
|
|
late 1980s, recalls Robert Ansley, corporate security manager for Dell
|
|
Computer in Austin, Texas, then with the Austin police department. Armed
|
|
with a stolen Macintosh and an ID maker stolen from a highway patrol
|
|
substation, they passed more than $100,000 in bogus checks in Austin alone.
|
|
|
|
Sources say other gangs have used laser printers to forge security ID
|
|
badges to get into office buildings and steal the computers, nodding at the
|
|
friendly security guard at the front desk while trudging out with their
|
|
arms full.
|
|
|
|
"We have been urging corporations to move forward with EDI (Electronic
|
|
Data Interchange) for more and more of their business transactions and
|
|
avoid paper, since it will become so vulnerable," says Donn Parker,
|
|
computer crime expert with SRI International in Menlo Park, California.
|
|
|
|
In 1991, the Secret Service busted 66 traditional counterfeiting operations,
|
|
while seizing 52 office machines that had been used for counterfeiting
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Subduing Software Pirates October, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Suzanne Weisband and Seymour Goodman (Technology Review) (Page 30)
|
|
|
|
[The software manufacturers claim they lose between 9 and 12 billion
|
|
annually. Thank GOD for the SPA and the BSA. Like they are go to
|
|
Singapore or Hong Kong with guns and get the REAL culprits. Noooo.
|
|
Let's raid BBSes and businesses.
|
|
|
|
Their people at COMDEX told me they really weren't interested in
|
|
taking my money to help me combat Phrack Piracy. I think we all know
|
|
where THEIR interests lie.]
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Mindvox: Urban Attitude Online November, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Charles Platt (Wired) (Page 56)
|
|
|
|
[Another of those cute Mindvox RULES articles. "Fancher looked too neat,
|
|
clean, and classy to be a hacker, but he enjoyed the cut-and-thrust of
|
|
online jousting as much as anyone." But wait, there's a little
|
|
name dropping too: Wil Wheaton, Kurt Larson, Billy Idol, THE LEGION OF DOOM!
|
|
|
|
Don't get me wrong, I love Vox. And I really like the author of this story's
|
|
last book "The Silicon Man," I just get kinda edgy about stuff in Wired.
|
|
|
|
Favorite quote: "Unix is arcane," says Bruce, "and it's weird, and most
|
|
users don't want to deal with it." I know I don't. Not.]
|
|
-------------------------------------------------------------------------------
|
|
|
|
Intel To Protect Chips October 22, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~
|
|
(Newswire Sources)
|
|
|
|
One of the nation's largest manufacturers of computer chips said Friday it
|
|
will start to put serial numbers on its products in an effort to stem the
|
|
rising tide of robberies. Intel Corp. said it was taking its actions
|
|
after a flurry of armed takeover robberies at warehouses in California's
|
|
Silicon Valley over the last six months.
|
|
|
|
What the robbers are after is microprocessors -- the brains that power
|
|
personal computers. Among their favorite targets has been Intel's 486
|
|
microprocessor.
|
|
|
|
Julius Finkelstein, head of Santa Clara's High Tech Crime Task Force,
|
|
called chip robberies "the gang crime of the 1990s." "They are just
|
|
as valuable as cocaine," he said. "But they are easier to get rid of
|
|
and if you are caught the penalties aren't as severe."
|
|
|
|
The gangs, Finkelstein said, are Asian, well organized and very
|
|
knowledgable about computer components. They generally drive up to a
|
|
warehouse door as if coming for a shipment, but once inside pull out
|
|
their weapons and force the employees to the floor.
|
|
|
|
Last month, a takeover robbery at the Wylie Laboratories Electronic
|
|
Marketing Group in Santa Clara netted thieves an estimated $1 million in
|
|
chips. Finkelstein said that robbery took only about 15 minutes.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Chip Robberies Continue November 5, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~
|
|
(Newswire Sources)
|
|
|
|
Authorities said a gang of Vietnamese-speaking bandits staged a violent
|
|
takeover robbery of a San Jose computer parts company Thursday, wounding
|
|
one man and escaping with an undisclosed amount of electronic equipment.
|
|
|
|
Lt. Rob Davis said the robbery began at 1:01 a.m. when as many as
|
|
five gunmen forced their way into the Top Line Electronics Co., a
|
|
computer board manufacturer. The bandits rounded up the employees and
|
|
beat them in an attempt to find where the computer parts were stored.
|
|
|
|
One employee was shot in the hip as he tried to escape. Davis said
|
|
the man was treated at a local hospital and was listed in stable
|
|
condition.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Hacker Revelled In Spotlight, Court Told August 23, 1993
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
(The Age)
|
|
|
|
A hacker who broke into a computer at NASA in the United States,
|
|
and contemplated sending it a message not to launch a space shuttle, was
|
|
delighted with the effect he was having, the County Court was told yesterday.
|
|
|
|
The prosecutor, Mr Richard Maidment, said that in a three-way
|
|
conversation between Nahshon Even-Chaim, David John Woodcock
|
|
and another computer hacker, Woodcock discussed sending a message
|
|
to a computer at NASA to stop the launch of a space shuttle, after
|
|
Woodcock talked about the shuttle Challenger, which blew up several
|
|
years before, and said "I have got to do something about NASA."
|
|
|
|
Even-Chaim, 22, formerly of Narong Road, Caulfield, yesterday
|
|
pleaded guilty to 15 charges relating to unauthorized obtaining,
|
|
altering, inserting, and erasing of data stored in a computer, and
|
|
the interfering and obstruction of the lawful use of a computer.
|
|
|
|
Woodcock, 25, formerly of Ashleigh Avenue, Frankston, pleaded
|
|
guilty to two counts of being knowingly concerned in the obtaining
|
|
of unauthorized access by Even-Chaim to data stored in a computer.
|
|
|
|
The court was told that a co-offender, Richard Martin Jones
|
|
was earlier sentenced to six months jail, but was released on a $500,
|
|
six-month good behavior bond.
|
|
|
|
The court was told that Even-Chaim obtained free use of telephone
|
|
lines for many hours to connect his home computer to other systems
|
|
in the United States.
|
|
|
|
Mr. Maidment said that Even-Chaim, Woodcock, and Jones, who
|
|
collectively called themselves "The Realm", were arrested in April 1990
|
|
by the Australia Federal Police after an investigation that began with
|
|
information received from the United States Secret Service.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
The Last Hacker September 26, 1993
|
|
~~~~~~~~~~~~~~~
|
|
by Jonathan Littman (LA Times)
|
|
|
|
[This is the bet article I've seen yet about Kevin Poulsen. Please go
|
|
find it and read it. It covers Poulsen from beginning to end. All the
|
|
crazy stunts, the life on the run, the show down with the feds. Everything.
|
|
Here is a small excerpt.]
|
|
|
|
KIIS-Fm called it a "Win a Porsche by Friday": eight Porsches - about
|
|
$400,000 worth of steel, leather and status - given away, one a week. You could
|
|
hardly live or work in Los Angeles without being caught up in the frenzy. It
|
|
seems that the gleaming, candy-red convertibles were plastered on nearly every
|
|
billboard and bus in town. Listeners were glued to KIIS, hoping to make the
|
|
102nd call after Dees spun the third song in the magical series.
|
|
|
|
Housewives, businessmen, students and contest freaks jammed the lines with
|
|
their car phones and auto-dialers. They all had hopes, but one 24-year-old high
|
|
school dropout had a plan. America's most wanted hacker and his associates
|
|
sat by their computers and waited. On the morning of June 1, 1990 KIIS played
|
|
'Escapade,' 'Love Shack; and then, yes, "Kiss." "We blew out the phone lines,"
|
|
every line was ringing says Karen Tobin, the stations promotional director. "We
|
|
picked up the calls and counted."
|
|
|
|
The hacker was counting too. At the precise moment Price's "Kiss" hit the air
|
|
he seized control of the station's 25 phone liens, blocking out all calls but
|
|
his own. Then the man, who identified himself as Michael B. Peters, calmly
|
|
dialed the 102nd call and won a Porsche 944 S2.
|
|
|
|
It was child's play. Especially for Kevin Lee Poulsen. Computer hacking had
|
|
once seemed an innocent obsession to Poulsen, a native of Pasadena, but now it
|
|
was his life, and it had taken him over the line. This October, Poulsen will
|
|
face the first of two trials, one in San Jose and another in Los Angeles, that
|
|
federal prosecutors say are critical to the government. Because of the
|
|
seriousness of his alleged breaches of national security, they intend to use the
|
|
case as an example to the hacker underground.
|
|
|
|
As a teen-ager, Poulsen had burrowed deep into the giant switching networks
|
|
of Pacific Bell, exploring and exploiting nearly every element of its powerful
|
|
computers, from the common systems responsible for creating, changing and
|
|
maintaining phone service to the shadow systems that guard the secrets of
|
|
national security, according to accusations in a federal indictment. The U.S.
|
|
attorney in San Jose says that Poulsen had wiretapped the intimate phone calls
|
|
of a Hollywood starlet, allegedly conspired to steal classified military orders,
|
|
and reportedly uncovered unpublished telephone numbers for the Soviet Consulate
|
|
in San Francisco.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
|