Copy Link
Add to Bookmark
Report

Computer Undergroud Digest Vol. 01 Issue 01

  



****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 1, Issue #1.01 (March 31, 1990) **
****************************************************************************

MODERATORS: Jim Thomas / Gordon Meyer
REPLY TO: TK0JUT2@NIU.bitnet
SUBSCRIBE TO: INTERNET:TK0JUT2@NIU.BITNET@UICVM.uic.edu

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.
--------------------------------------------------------------------
DISCLAIMER: The views represented herein do not necessarily represent the
views of the moderators. Contributors assume all responsibility
for assuring that articles submitted do not violate copyright
protections.
--------------------------------------------------------------------
This is a short issue to double check the address list. Some addresses
returned the first issue of 1,200 lines because of length. If you receive
this, but did not receive the first issue, let us know and we will re-send
it. If length is a problem, let us know. We will try to keep the file
length to about 1,000 lines, but we have been informed that some notes
reject anything over 450-500. As a rule of thumb, every 100 lines
constitutes about 6 K, so if you are restricted by file size, send along
your limits.

We also remind people that in the "TK0" response, that's a ZERO,
not an "OH"!

If people send enough material, we will try to put out an issue every few
weeks. For space purposes, we will ask that signatures be kept brief and
that that formatting be at least 65 characters per line.

The feedback on the first issue was generally positive. We would like to
hear from readers regarding the types of articles you would like to see.
Content will be determined primarily by the contributions, and we
especially encourage public domain news articles. We caution all
contributors to assure no copyright violations occur. We have already been
involved in a minor squabble with the AUSTIN-AMERICAN STATESMAN (see file
3, this issue).

In a recent mail test, we accidentally send out a preliminary mailing list
due to a glitch in our auto-mailing file. This has been corrected. We
consider the names and addresses on this list strictly confidential, and
although the digest is open to all receivers and contributors, the mailing
list is NOT! Mark Seiden (among others) quickly responded. We reprint his
thoughtful observations in File 1, and accept his invitation to respond in
File 2.

There have been requests for back issues of various magazines and
journals of the computer underground. We believe that many of these
provide a historical archive for those who desire to chronicle the
growth and maturity of various groups, or who are interested in
these files for social science research as documents of a particular
societal subculture. A number of people have suggested that we
serve as a clearing house for such documents. Because there has
been no indication that any of the documents are illegal, and
because law enforcement agencies have not objected on LEGAL GROUNDS
to any of these documents publicly or--to our knowledge--privately,
we assume they are acceptable for distribution.
Currently available are:

PHRACK (issues 1-30)
LoD/H (issues 1-4)
We are missing files 10-14 of LoD/H issue #1. Perhaps
somebody could pass them along.
P/Hun (issues 1-3)
PIRATE Magazine (issues 1-5)
ATI (issues 1-44; we are missing issues #4 and #10. Could somebody
send these over?)
And other lesser digests and journals. We will also maintain
back issues of CuD.

We stress that possession and/or distribution of these documents
*IN NO WAY* constitutes support or encouragement of any activities
describes therein. However, we strongly believe that they should
be available for those interested in fully understanding the
computer underground subculture.


IN THIS ISSUE:

File 1: "Opening the Kimono too Far" (by Mark Seiden)
File 2: "Which Witch Hunt?" (Editorial response)
File 3: CuD's First Copyright Squabble--THE AUSTIN-AMERICAN STATESMAN
File 4: Satirical article from PHRACK 29, phile 7 (reprint)

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
+ END THIS FILE +
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=


******************************************************************
*** Computer Underground Digest / Issue 1.01 - File 1 of 4 ***
******************************************************************

From: dagobah!mis@uunet.UU.NET(Mark Seiden)
Message-Id: <9003300201.AA02651@seiden.com>
To: uunet!UICVM.uic.edu!TK0JUT2%NIU.BITNET@uunet.UU.NET
Subject: opening the kimono a bit too far?
Cc: risks@csl.sri.com

Greetings, 'ackologists and -osophists...

You may have noticed that in the process of setting up the BITNET mailing
list for CuD [Computer Underground Digest] our Lord of Hosts [Jim Thomas]
somehow managed to send out to everybody a test transmission containing the
email address of *everybody* on the mailing list.

This set off my "right to privacy/paranoia" detector, prompting a note to
him saying "Isn't it nice now that you've told the FBI who we all are"
whereupon he revealed that, indeed, the list contains "everything from law
enforcement on one end to at least one LoD [Legion of Doom] member on the
other." What a pleasant rainbow effect that conjured up...

Consider the DEA officials who have (reportedly) been convincing
advertisers selling Gro-lites in (among other publications) "High Times" to
turn over their customer lists. Legend has it that the Orchid Societies are
up in arms over flak-jacketed drug agents with zero-tolerance for indoor
plant-growing knocking at their member's doors, and to date discovering
only orchids... (I expect to read about it in the Wall Street Journal
gardening column any day now.)

I wonder whether overzealous g-men and women might be interested in just
who cares about the computer underground, suspecting that perhaps they
might have some personal involvement? Perhaps some of us are now or were
once in possession of forbidden knowledge valued by beancounters in excess
of $5000? Hmmm, that backup tape from that job ten years ago containing,
jeez, i forget, secrets of incalculable worth (in one case, people with
questionable smarts took hundreds of man-years [yes, they were all men] and
still didn't get it right...), and that version of troff source I always
wanted to fix... Ohmigod, I was on the PHRACK mailing list, and now I'm on
this one too, and I've been to some of the Hackers' Conferences! Now I
realize this was one of those elaborate sting operations I keep reading
about, and I got sucked in right away, naive little me...

I'm expecting the Secret Service to show up at my door any day now. I
would burn those backup tapes, but that's probably a violation of US Title
18, section whatever, "thinking about intending to try to conceal evidence
of a possible future crime" (and I'm even more afraid of a disk crash).
(Note for the Tomorrow File: A new source of revenue for lawyers: store
your hacker-client's backup tapes, which would then be protected as
privileged communication?)

Thanks a lot, Jim. You're welcome to ask the natural/more serious
follow-on questions...


Mark Seiden, mis@seiden.com, 203 329 2722

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
+ END THIS FILE +
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=


***************************************************************
*** Computer Underground Digest Issue #1.01 / File 2 of 4 ***
***************************************************************

Mark Seiden raises some good points in the previous file. His concerns
cluster around a couple of issues:

1) Is having one's name on a mailing list sufficient to trigger law
enforcement interest and subject the listee to possible harassment?

2) Are there law enforcement agents on this list?

3) Are the moderators part of a sting operation?

Mark's comments, although partly tongue in cheek, indicate the degree to
which over-zealous law-enforcement actions in recent months have had a
"chilling effect" on the free flow of information. Let's take each of
these issues in reverse order.

First, the moderators are not part of a sting, nor are we in any way
connected with, cooperating with, or otherwise involved in enforcement. One
moderator works for a computer firm, the other is an sixties-lefty whose
primary work is as a college professor and researcher of prison culture.
But, Mark is quite correct in his concern for stings. It is *not* paranoia!
Gary Marx, in his book UNDERCOVER: POLICE SURVEILLANCE IN AMERICA,
carefully and convincingly documents the threat of police stings to civil
liberties, their irony in subverting civil rights to protect society, and
the contributions to distrust and openness they create. One reason for the
emergence of this digest is the need many of us feel to raise such issues
at a time when law enforcement seems to be spending as much time
investigating computer users as other forms of crime. The emergence in many
(by now most) federal and state agencies of dedicated "computer crime
units" can too easily lead to the expansion of the definition of "abuse" to
justify the existence of these units. Once units exist, they must
investigate, apprehend and prosecute in order to justify their continued
existence.

Second, we assume from the mailing list that there are at least a few law
enforcement agents on the list. We welcome them, and hope others subscribe
as well. Perhaps they will learn something. Neither moderator is involved
in illicit activity, unless research is considered a crime, and nothing we
distribute will be knowingly illegal, violate copyright, or be knowingly
harmful. The mailing list reflects diverse group. The bulk seems to be
computerists employed in the private sector, followed by academics, and
mixed in with students, journalists, and others. We will send CuD to
anybody who requests it, and we welcome the response of law enforcement
agents in the debates.

Finally, Mark asks if having one's name on a mailing list is sufficient to
mark them for an investigation. Unfortunately, if recent history is any
indication, the answer is *YES*! Mark has already indicated a few examples
of this. The "Red Squads" of the 1960s and 1970s provide a more chilling
example. There is overwhelming evidence, including documents we ourselves
obtained as part of a class action law suit against the Michigan State
Police, to indicate that law enforcement tactics included gathering lists
by monitoring letters to editors opposing the Viet Nam war or the "social
-isms," listed license plates of cars parked near political meetings, and
by numerous other tactics totally anathema in a democratic society. In once
instance, police in East Lansing, Michigan, actually investigated a
political candidate who publicly denounced the war. The information in
these lists, even if unverified, was shared with employers, state agencies,
and other law enforcement agencies. These lists resulted in loss of
employment, promotion, or--in the case of FBI documents we
obtained--harassment in the FBI's COINTELPRO campaign. This included
anonymous letters to parents or employers of people on the list and even
direct physical harassment.

We, in the U.S., seem to have short memories. Especially because of drug
hysteria, we seem to be willing to enact legislation and permit
investigative tactics that would otherwise be unacceptable. When the
target is druggies or racketeers, there is little public outrage. But, now
the tactics seem to be applied to other behaviors as creative agents find
new uses for laws that have not yet been tested in the courts.

In the last issue of CuD, we provided a rationale for the use of handles.
We suggest that if anybody has concern about being on a list they use one.
For e-mailing, we retain only the addresses and not names. Our mailing list
of net addresses is encrypted and inaccessible, but even if it were
obtained, there is insufficient information to be of use to anybody except
e-mail hucksters marketing their warez.

Thanks for raising the issue, Mark.



***************************************************************
*** Computer Underground Digest Issue #1.01 / File 3 of 4 ***
***************************************************************

An article in the AUSTIN-AMERICAN STATESMAN by Kyle Pope is perhaps the
most balanced news story to cover the Legion of Doom indictments and the
related confiscation of equipment at Steve Jackson Games in Austin. We had
intended to reprint the entire article. However, when we called the
AUSTIN-AMERICAN STATESMAN (are there no "stateswomen," or is the A-AS still
a bastion of macho sexist swinery?), we were informed that on no account
would they allow the article to be distributed over the nets. When we asked
how much of the article they would allow us to extract, they told us that
we could excerpt *NONE* of it. Not even a single line? "None of it!" Well,
perhaps the A-AS has contracts with other news services who sell
computerized versions of the story, but "None of it?" C'mon! "Fair use
doctrine" allows reasonable reproduction of a copyright article, and after
consulting with an attorney, we reproduce well under the accepted norm.
So, we can only assume that the A-AS, while to be commended on a fair
summary of events, as some very uptight anal-retentive types in the
managing editor's office who confuse company policy with Constitutional
protections! The following is drawn from a variety of sources, but all
quotes come from: "U.S. Computer Investigation Targets Austinites" by Kyle
Pope (%cr% Austin-American Statesman, March 17, 1990: Pp A-1, A-12).

The article summarizes the background of the Legion of Doom indictments
(see CuD, 1.00, files 4, 5). In the continuing investigation, federal
agents and Austin police appeared at the home of a Steve Jackson Employee,
greeting him with guns drawn at 6:30 a.m. They confiscated his equipment,
and also took a number of books and other documents, including the M.A.
thesis of CuD co-moderator Gordon Meyer. Why this document is considered
worthy of confiscation escapes us, unless academic research is now
considered subversive, and its possession evidence of evidence of criminal
mischief. One of the concerns of federal agents was the Cyberpunk science
fiction work being written at Steve Jackon's. Influenced by science fiction
novel's such as William Gibson's NEUROMANCER and John Brunner's THE
SHOCKWAVE RIDER, Cyberpunk mixes science fiction, computer fantasy, and
alienation in futuristic techno-societies. The A-AS interviewed one writer
who explained the need for realistic detail in the genre:

Bruce Sterling, an Austin science fiction writer and one
of the world's best-known Cyberpunk writers, said
Jackson's game and its computer-related discussions are
hardly unusual for the genre.

"Cyberpunk is thriller fiction," Sterling said. "It deals
to a great extent with the romance of crime in the same
way that mysteries or techno-thrillers do."

He said the detailed discussions in the Jackson games are
what draws people to them.

"That's the charm of simulation games," he said. "You're
simulating something that's supposed to be accurate. If
it's cooked up out of thin air, the people who play these
games are going to lose interest."

Jackson, though, said he has been told by Secret Service
agents that they view the game as a user's guide to
computer mischief.

He said they made the comments when he went to the
agency's Austin office in an unsuccessful attempt to
reclaim some of his seized equipment.

"As they were reading over it, they kept making outraged
comments," Jackson said. "When they read it, they became
very, very upset.

"I said, 'This is science fiction.' They said, 'No. This
is real.'" (A-AS, p. A-12).

In their zeal to obtain information about reproduction of an E911 training
document from a Georgia telecommunications company, federal agencies
confiscated printers, monitors, CPUs, files, and other equipment from
Jackson because of suspicion that one of his employees, Loyd Blankenship,
had contacts with Legion of Doom:

Jackson's attorney said federal officials have told him
that the 911 information pilfered from Bell South has
surfaced on a computer bulletin board used at Steve
Jackson games. But the information apparently has not
been traced to a user.

Jackson said that neither he nor any of his employees is
a member of the Legion of Doom.

Blankenship, however, did consult with the group in the
course of researching and writing the Cyberpunk game,
Jackson said. Further, the group is listed in the game's
acknowledgments for its aid in providing technical
information used in Cyberpunk (A-AS, p. A-12).

----------------------

These confiscations raise a number of issues. First, it seems that any of
us can have our equipment, and therefore our livelihoods, threatened by any
connection law enforcement officials make between an offense and an alleged
possessor of information.

Second, as of this writing (March 30), to our knowledge none of those being
investigated in this incident has been indicted. Only the equipment has
been arrested. This, to us, suggests the frightening spectre of
confiscation of the equipment of innocent people and disruption of lives.
The A-AS article indicated that the confiscation is having a devastating
impact on the economic fortunes of Steve Jackson Games.

Third, it appears that laws originally intended to fight drugs and
organized crime now are being used to thwart the "dreaded computer
underground." Confiscation of any personal property that creative agents
can claim "good faith" potential relationship to either an offense or to
information about an offense, can be confiscated, including an M.A. thesis
or a draft of a novel in progress. In addition, if, in their search, agents
happen upon a few seeds of marijuana, they can, under federal anti-drug
law, incarcerate the searchee without bail.

Gary Marx has argued that we lose our freedoms not with a sweeping
crackdown, but gradually. Laws originally intended to fight one "menace"
now are being applied to another. This "other" menace is, we argue, largely
a creation of media hysteria, law enforcement ignorance of the nature of
the computer underground, and a complete failure to recognize the need to
balance protection of the public commonweal with protections of civil
liberties.

In a recent government publication (NIJ REPORTS, Jan/Feb '90, pp 2-10), the
authors lump software piracy in the same category as theft of computer
chips, computers, or trade secrets. In this classification, it seems that
stealing a new IBM 486 and giving a copy of Norton Utilities to a friend
are identical! Uploading that pirated copy from New York to a BBS in
Atlanta would, therefore, constitute a federal offense that subjects the
"felon" to the full weight of federal prosecution.

Our point is that, in a rapidly changing techno-world, laws are being used
in a way perhaps appropriate for addressing such predatory crimes as
listed in the FBI's Uniform Crime Reports, but they hardly address the
problems of perceived computer abuse, real or imagined. The use of laws
intended to combat one type of unacceptable behavior, such as racketeering
or drug abuse, hardly seem appropriate to their current use by federal
agents to combat computerists. Disrespect for law begins with its
oppressive misuse, and we suggest that, ultimately, the apparent attempt of
federal agents and prosecutors to define a social menace, and then make
their careers saving the world from it, will subvert the respect for and
rule of law in the long run.

A final note to the A-AS:
It is within an author's legal rights to write a number of DIFFERENT
stories, excerpting different parts of a news article in each, and
ultimately reprint, legally, the entire story. We are not petty enough to
do so, but we find it somewhat ironic that a company whose existence
derives from a free press so arrogantly responses to a legitimate request
to reprint with a categorical statement that *NOTHING* can be reprinted. Is
there something wrong with this picture, or did your managing editor just
have a bad day? We will print a reply if you wish to make one.

Jim Thomas (CuD co-moderator)

=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
+ END THIS FILE +
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=


***************************************************************
*** Computer Underground Digest Issue #1.01 / File 4 of 4 ***
***************************************************************

Several responses have asked why people think that the Legion of Doom has
been accused of ripping off banks. One reason may be that there is a loss
of a sense of the "absurd" in contemporary society. Satire, irony, and
subtlety have been replaced by a sense of the literal, and with this loss
comes a tendency to accept literature at face value. In a November, 1989,
issue of PHRACK, an article appeared that was intended as satire. This
intent was clear in the issues introductory file and in the text of this
file. For those who have wondered what the articled was about, we reprint
it here.


-------------------------------------------------------------


==Phrack Inc.==

Volume Three, Issue 29, File #7 of 12

The Legion of Doom!
EFT Division

Presents

HOW WE GOT RICH THROUGH ELECTRONIC FUND TRANSFERS

(OR: GEE! NO, GTE!)


A certain number of financial institutions that reside within the
packet-switched confines of the various X.25 networks use their connections to
transfer funds from one account to another, one mutual fund to another, one
stock to another, one bank to another, etc... It is conceivable that if one
could intercept these transactions and divert them into another account, they
would be transferred (and could be withdrawn) before the computer error was
noticed. Thus, with greed in our hearts, an associate and I set forth to test
this theory and conquer the international banking world.

We chose CitiCorp as our victim. This multinational had two address
prefixes of its own on Telenet (223 & 224). Starting with those two prefixes,
my associate and I began to sequentially try every possible address. We
continued through 1000 in increments of one, then A-Z, then 1000-10000 by 10's
and finally 10000-99999 by 100's. Needless to say, many addresses were
probably skipped over in our haste to find valid ones, but many we passed over
were most likely duplicate terminals that we had already encountered.

For the next few days my associate and I went over the addresses we had
found, comparing and exchanging information, and going back to the addresses
that had shown 'NOT OPERATING,' 'REMOTE PROCEDURE ERROR,' and 'REJECTING.' We
had discovered many of the same types of systems, mostly VAX/VMS's and Primes.
We managed to get into eight of the VAXen and then went forth on the CitiCorp
DECNET, discovering many more. We entered several GS1 gateways and Decservers
and found that there were also links leading to systems belonging to other
financial institutions such as Dai-Ichi Kangyo Bank New York and Chase
Manhattan. We also found hundreds of addresses to TWX machines and many
in-house bank terminals (most of which were 'BUSY' during banking hours, and
'NOT OPERATING' during off hours). In fact, the only way we knew that these
were bank terminals was that an operator happened to be idle just as I
connected with her terminal (almost like the Whoopie Goldberg movie, "Jumpin'
Jack Flash," not quite as glamorous ...yet.)

Many of the computers we eventually did penetrate kept alluding to the
electronic fund transfer in scripts, files, and personal mail. One of the
TOPS-20 machines we found even had an account EFTMKTG.EFT, (password EFTEFT)!
All the traces pointed to a terminal (or series of terminals) that did nothing
but transfer funds. We decided that this was the case and decided to
concentrate our efforts on addresses that allowed us to CONNECT periodically
but did not respond. After another week of concentrated effort, we managed to
sort through these. Many were just terminals that had been down or
malfunctioning, but there were five left that we still had no idea of their
function. My associate said that we might be able to monitor data
transmissions on the addresses if we could get into the debug port. With this
idea in mind, we set out trying sub-addresses from .00 to .99 on the mystery
addresses. Four of the five had their debug ports at the default location
(.99). The fifth was located 23 away from the default. That intrigued us, so
we put the others aside and concentrated on the fifth. Although its location
was moved, a default password was still intact, and we entered surreptitiously

The system was menu driven with several options available. One option,
Administrative Functions, put us into a UNIX shell with root privilege. After
an hour or so of nosing around, we found a directory that held the Telenet
Debug Tools package (which I had previously thought existed solely for Prime
computers). Using TDT, we were able to divert all data (incoming and outgoing
into a file so we could later read and analyze it. We named the file ".trans"
and placed it in a directory named ".. ", (dot, dot, space, space) so it woul
remain hidden. This was accomplished fairly late on a Sunday night. After
logging off, we opened a case of Coors Light and spent the rest of the night
(and part of the morning!) theorizing about what we might see tomorrow night
(and getting rather drunk).

At approximately 9:00 p.m. the following evening, we met again and logged
onto the system to view the capture file, hoping to find something useful. We
didn't have to look very far! The first transmission was just what we had bee
dreaming about all along. The computer we were monitoring initiated by
connecting with a similar computer at another institution, waited for a
particular control sequence to be sent, and then transferred a long sequence o
numbers and letters. We captured about 170 different transactions on the firs
day and several hundred more in the following week. After one business week,
we removed the file and directory, killed the TDT routine, and went through th
system removing all traces that we had been there.

We felt that we had enough to start piecing together what it all meant, s
we uploaded our findings to the LOD HP-3000 (ARMA) in Turkey. This way we
could both have access to the data, but keep it off our home systems. We
didn't bother to tell any of the other LOD members about our doings, as most
had retired, been busted, or were suspected of turning information over to the
Secret Service. Using this as a base, we analyzed the findings, sorted them,
looked for strings being sent, etc.

We came to the conclusion that the transmissions were being sent in the
following way:


XXXXXXXXXXXXTCxxxxxxxxxxxx/NNNNNNNNNNNNCnnnnnnnnnnnnAMzzzzzzz.zzOP#
X=Originating Bank ID
T=Transfer (Also could be R(ecieve), I(nquire))
C=Type of account (Checking--Also S(avings) I(RA) M(oney Market)
T(rust) W(Other wire transfer ie. Credit Transfer, etc.))
x=Originating Account Number
/=Slash to divide string
N=Destination Bank ID
C=Type of account (See above)
n=Destination Account Number
AMzzzzzzz.zz=Amount followed by dollar and cents amount
OP#=operator number supervising transaction

After this string of information was sent, the destination bank would the
echo back the transaction and, in ten seconds, unless a CONTROL-X was sent,
would send "TRANSACTION COMPLETED" followed by the Destination Bank ID.

We now needed to check out our theory about the Bank ID's, which I figure
were the Federal Reserve number for the Bank. Every bank in America that deal
with the Federal Reserve System has such a number assigned to it (as do severa
European Banks). I called up CitiBank and inquired about their Federal Reserv
Number. It was the number being sent by the computer. With this information,
we were ready to start.

I consulted an accountant friend of mine for information on Swiss or
Bahamanian bank accounts. He laughed and said that a $50,000 initial deposit
was required to get a numbered account at most major Swiss banks. I told him
to obtain the forms necessary to start the ball rolling and I'd wire the money
over to the bank as soon as I was told my account number. This shook him up
considerably, but he knew me well enough not to ask for details. He did,
however, remind me of his $1000 consulting fee. A few days later he showed up
at my townhouse with an account number, several transaction slips and
paperwork. Knowing that I was up to something shady, he had used one of his
own false identities to set up the account. He also raised his "fee" to $6500
(which was, amazingly enough, the amount he owed on his wife's BMW).

My associate and I then flew to Oklahoma City to visit the hall of record
to get new birth certificates. With these, we obtained new State ID's and
Social Security Numbers. The next step was to set up bank accounts of our own
My associate took off to Houston and I went to Dallas. We each opened new
commercial accounts at three different banks as LOD Inc. with $1000 cash.

Early the next day, armed with one Swiss and six American accounts, we
began our attack. We rigged the CitiCorp computer to direct all of its data
flow to a local Telenet node, high up in the hunt series. Amazingly, it still
allowed for connections from non-909/910 nodes. We took turns sitting on the
node, collecting the transmissions and returning the correct acknowledgments.
By 12:30 we had $184,300 in electronic funds in "Limbo." Next we turned off
the data "forwarding" on the CitiCorp computer and took control of the host
computer itself through the debug port to distribute the funds. Using its dat
lines, we sent all the transactions, altering the intended bank destinations,
to our Swiss account.

After I got the confirmation from the Swiss bank I immediately filled out
six withdrawal forms and faxed them to the New York branch of the Swiss bank
along with instructions on where the funds should be distributed. I told the
bank to send $7333 to each of our six accounts (this amount being small enough
not to set off Federal alarms). I did this for three consecutive days, leavin
our Swiss account with $52,000. I signed a final withdrawal slip and gave it
to my accountant friend.

Over the next week we withdrew the $22,000 from each of our Dallas and
Houston banks in lots of $5000 per day, leaving $1000 in each account when we
were through. We were now $66,000 apiece richer.

It will be interesting to see how the CitiCorp Internal Fraud Auditors an
the Treasury Department sort this out. There are no traces of the diversion,
it just seems to have happened. CitiBank has printed proof that the funds wer
sent to the correct banks, and the correct banks acknowledgment on the same
printout. The correct destination banks, however, have no record of the
transaction. There is record of CitiBank sending funds to our Swiss account,
but only the Swiss have those records. Since we were controlling the host whe
the transactions were sent, there were no printouts on the sending side. Sinc
we were not actually at a terminal connected to one of their line printers, no
one should figure out to start contacting Swiss banks, and since CitiBank does
this sort of thing daily with large European banks, they will be all twisted
and confused by the time they find ours. Should they even get to our bank,
they will then have to start the long and tedious process of extracting
information from the Swiss. Then if they get the Swiss to cooperate, they wil
have a dead-end with the account, since it was set up under the guise of a
non-entity. The accounts in Dallas and Houston were also in fake names with
fake Social Security Numbers; we even changed our appearances and handwriting
styles at each bank.

I'm glad I'm not the one who will have the job of tracking me down, or
even trying to muster up proof of what happened. Now we won't have to worry
about disposable income for awhile. I can finish college without working and
still live in relative luxury. It's kind of weird having over six-hundred $10
bills in a drawer, though. Too bad we can't earn any interest on it!


** Since the events described transpired, CitiBank has made their Banking
Transaction Ports all refuse collect connections. Even by connecting
with an NUI they now respond "<<ENTER PASSWORD>>". C'est La Vie.

>--------=====END=====--------<


=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
+ END OF CuD #1.01 +
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
!

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT