Copy Link
Add to Bookmark
Report
Computer Undergroud Digest Vol. 01 Issue 27
****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 1, Issue #1.27 (Aug 9, 1990) **
****************************************************************************
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
ARCHIVISTS: Bob Krause / Alex Smith
USENET readers can currently receive CuD as alt.society.cu-digest.
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views. CuD material may be reprinted as long as the source is
cited. It is assumed that non-personal mail to the moderators may be
reprinted, unless otherwise specified. Readers are encouraged to submit
reasoned articles relating to the Computer Underground.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
DISCLAIMER: The views represented herein do not necessarily represent the
views of the moderators. Contributors assume all responsibility
for assuring that articles submitted do not violate copyright
protections.
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
CONTENTS:
File 1: Moderators' Corner
File 2: From the Mailbag (Response to Neidorf article)
File 3: Dr. Ripco Speaks Out
File 4: SJG Gurps Cyberpunk
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
----------------------------------------------------------------------
********************************************************************
*** CuD #1.27, File 1 of 4: Moderators' Comments ***
********************************************************************
Date: 9 August, 1990
From: Moderators
Subject: Moderators' Corner
++++++++++
In this file:
1) TAP Address
2) Berserker BBS update
3) Len Rose Update
+++++++++++++++++++++++++++++
TAP ADDRESS
+++++++++++++++++++++++++++++
The TAP article in CuD 1.26 did not include an address. For those wishing
to subscribe, the address is:
TAP
PO Box 20264
Louisville, KY 40250
+++++++++++++++++++++
Berserker BBS Update
+++++++++++++++++++++
In a recent issue of CuD, we inquired about the status of Berserker BBS. We
are informed that Berserker still operates, but the number was changed.
Good news for Berserker fans.
+++++++++++++++++
Len Rose Update
+++++++++++++++++
We talked with Len Rose last night, and he indicates that his trial,
scheduled for this month, will most likely be delayed until February, 1991.
The counts against him resemble those of Craig Neidorf and the "Atlanta 3."
We will provide a detailed summary of our conversation as well as a copy of
the indictment in CuD 1.28 on Monday.
********************************************************************
>> END OF THIS FILE <<
***************************************************************************
------------------------------
Date: 9 August, 1990
From: Moderators
Subject: From the Mailbag (Response to Neidorf article)
********************************************************************
*** CuD #1.27: File 2 of 4: From the Mailbag ***
********************************************************************
Date: Thu, 9 Aug 90 10:01:01 -0500
From: Michael J. Hennebry <hennebry@plains.NoDak.edu>
Subject: Re: NEIDORF TRIAL OVER! GOVERNMENT DROPS ALL CHARGES!
In article <10181@accuvax.nwu.edu> TK0JUT2%NIU.BITNET@uicvm.uic.edu writes:
>Neidorf. Defense Attorney Sheldon Zenner said that Prosecutor Bill
>Cook's decision was "in line with the highest standards of good
>government and ethical conduct." ..
The highest standard of good government and ethical conduct would not have
allowed prosecution in the first place. If ethics had anything to do with
the dismissal the other defendants would have had their "convictions"
reversed.
>.. Zenner said that the government could
>have continued to the last and let the jury decide, but did the
>honorable thing.
Dropping charges is not the same as acquittal. Perhaps Cook is going to
try again and will keep prosecuting and dropping charges until Neidorf
runs out of money to defend himself.
>Craig Neidorf was ecstatic about the decision, and feels vindicated.
>He can now resume his studies, complete his degree, and seriously
>consider law school. He *WILL NOT* resume publication of PHRACK!
No doubt killing PHRACK was one of the prosecution's goals.
>Zenner praised Bill Cook's decision to drop all charges, and added he
>is not angry, but appreciative. Zenner also felt that the the efforts
Zenner isn't Neidorf. Zenner isn't suffering from the effect of the
prosecution.
>There are those who have taken the Ed Meese line ..
I'm one of them.
>..and assumed that
>Craig must have done *something* or the government wouldn't be
>prosecuting him. ..
I'm not one of them. What Meese said was that one who is not guilty is not
a suspect. This is true. Neidorf is not guilty, therefore Neidorf was not a
suspect, therefore Cook had no right to prosecute him, therefore Cook
should be in prison for kidnapping. At the sentencing Neidorf should get
to remind the judge that to commit his crime Cook used a deadly weapon, the
federal criminal "justice" system.
>it was claimed, couldn't respond because it had to protect Craig's
>privacy and was required to sit in silence. One prosecutor even said
Has government refusal to respond to defense supporters' questions
about a prosecution *ever* been to the advantage of a defendant?
>There is little cause for Craig's supporters to gloat, because the
>emotional and financial toll on Craig and his family were substantial.
That was part of the purpose of the prosecution.
>Now, however, it is time to move on and address the lessons learned
>from the experience. Some of the issues include how computerists can
>be protected from overzealousness, ..
They can't be protected. Nobody has any protection from overzealous or evil
prosecutors. It's called prosecutorial immunity. Until we get rid of it we
are at the mercy of folks like Cook, but prosecutorial immunity is forever.
Neidorf won't get paid for what Cook has cost him. The only people
involved in a persecution who get paid anything significant are those who
participate voluntarily, and not all of them.
********************************************************************
>> END OF THIS FILE <<
***************************************************************************
------------------------------
Date: 7 August, 1990
From: . Ripco (Bruce ?)
Subject: Dr. Ripco Speaks Out
********************************************************************
*** CuD #1.27: File 3 of 4: Dr. Ripco Speaks out ***
********************************************************************
This document is being written to state my involvement with Operation
Sundevil and the events that passed on May 8th of 1990. My name is Bruce
Esquibel but most people in the modem world would know me better as Dr.
Ripco, the sysop of the Ripco Bulletin Board in Chicago.
Ripco operated since the winter of 1983 and preformed what I believe to be
a good public service to the telecommunications world. Its label as a
'phreak and hacker' board was an incorrect statement which I lived with
most of the time. Some content of the system was in fact dealing with that
subject but I have always felt most of the information especially in the
form of general files was nothing more than second hand news, traveling
board to board. Neither the board or myself ever supported or was
associated with formed hacker groups like the LOD or TKOS. In the years
Ripco operated there were members from these groups at one time or another
but only to establish accounts and rarely touched base or communicated with
other users.
The system was quite popular with it peaking at 701 users and averaging
around 600 active at any one time. Daily it took in about 50 calls with
this figure waxing and waning with the social seasonal changes of school
schedules and holidays. The majority enjoyed the freedom of expression the
system provided, not to figure out how to make a free phone call. Most of
the activity was on the main message board which could be accessed by
anyone, even those without validated accounts. The rest of the message
bases Ripco had were more specialized in their subject matter but not too
much more than what is found on other boards. Ripco's greatest claim to
fame in my opinion was the general files. It seemed to attract new users
like flies to honey. I don't think the reason for this was quality but in
fact quantity. There was over 2500 of them, divided into 23 sections. Like
the message bases only a minority of the files could be put into the
hack/phreak class.
Ripco operated with a bit of mystery to it. My personal involvement on the
board was next to nill. Unlike other operators who rule their boards like a
god, I decided long ago to let the people do what they wanted without
getting in the way and give them the freedom to stand on their own two
feet. This didn't mean the system was total anarchy, in fact many
complimented on how well the system was structured. This unusual concept
let some to believe the whole system was a setup and I was accused on
several occasions of being a FBI sting board or associated with some kind
of law enforcement. Adding to this was some argument over where the bbs
was actually located. A few adventurous individuals attempted to track it
down through the CNA bureau and ended up at a vacant storefront. The real
explanation is a long story but it comes down to multiple screw-ups by
Illinois Bell more than any deceptive practices on my part. This of course
doesn't happen in real life thus the only people that can get a phone
number for a fictitious address are 'feds'.
At least now I can put that rumor to rest. On May 8th I was awakened at my
home at 6:30a m by several Secret Service agents with a warrant for
computers and telecommunications equipment. They also had a second warrant
issued to the address where Ripco operated out of. Although there are
better ways to start the day, this did not come as a real surprise to me.
Since 1987 when Shadow Hawk made the papers with his $2.3 million software
theft charges it occured to me that as more and more people are caught, if
they even were remotly connected to Ripco, eventually something would turn
up on my end. This could be considered the reasoning of a mad man but I
have always felt that there was no illegal activity going on within the
system and could defend it no matter how petty it was taken apart. To put
it another way, Ripco's bark had a hell of a reputation but no bite.
This was probably and still is true depending how you look at it. The
warrants issued were only (!?!) seizure warrants issued to the addresses.
There were no names on them and I was not arrested or charged by the Secret
Service. This provided me some relief but since I didn't get to sleep till
4am that morning it was probably a lack of reasoning on my part.
There were at least 5 agents that came to the house, but I think they had a
few more around back in case of an escape attempt. Three of them stayed
while two others drove me to the other location. The only question they
asked before I left was it would be easier if I gave the location of any
computers I had there to which the reply was 'none.' This later proved true
since no items were taken, but they did spend about an hour looking through
everything.
I wish to point out that this was not a scene that would make good
television. They didn't break down any doors, no one I observed had a gun
drawn and overall they were pleasant in their mannerisms. This is not being
said in defense of them but I always have been curious about the stories
passed around where swat teams come down on a 16 year old for running a few
MCI numbers. One interesting side note to you electronic phreaks out there
is their radios, which probably use Motorolas digital voice protection
circuitry trip every car alarm in the neighborhood when keyed. Several of
the agents said this was normal and wished they didn't have this side
effect.
As I traveled with the agents to the other location I started to think what
they were about to see and if anything was there that needed a fast
explanation. The only thing that occured to me was three handguns I kept
for personal protection. I informed the driver of this fact and he radioed
ahead to let them know. He said matters like that isn't their concern but
added they have to check with local law enforcement to see if I was in
violation of city or state laws.
When we arrived there was a sizable crowd waiting. Besides 5 or 6 more SS
agents, there were a few others in suit and tie (the SS dresses casual) and
at least one Chicago police car with a couple officers. The agents that
escorted me there led me to a woman probably in her mid or late 20's. She
apparently was the one in charge and gave me instructions on how we were
going to enter the building. Before unlocking the front door she asked
several times if any boobytraps were set either for them or the computers.
I found this questioning amusing but was the only one smiling of the group.
Unlocking the front door led to questions about where the guns were located
and instructions on how to find them. I brought up the fact the alarm
system had to be turned off and after a few attempts she managed to
deactivate it. A different agent was sent in and recovered the weapons.
As we entered the main room I was told not to touch anything but to point
out the computer the board was run off of, which I did. The woman then
introduced herself as Barbara and informed me of what I already knew, they
were there to carry out a warrant and that it would probably take a while.
She handed me a piece of paper which was the actual warrant and as I looked
it over, a paragraph stated it was issued based on an attached affidavit,
specifically pages 26-39 by a special agent Lawson. Asking where the
attached affidavit was brought the reply "it was a closed document, I
didn't have any rights to see it" and added 'its an on-going
investigation'. I was then informed by her that I was not under arrest nor
charged but they had to read the Miranda rights to me since any questions I
answered could be used against me. Another agent said they did have
questions but I did not have to answer them, could answer them with a
lawyer present or even have a lawyer present and not answer them. He also
pointed out that I could stop answering the questions at any time so I
figured I'd agree to answer them since there wasn't all that much to hide
anyway.
Although an attempt was made to get comfortable within the building, the
main area is full of junk collected over the years and the limited seating
made things a bit crowded. We eventually ended up out back outside where
the questioning took place. From this point on Barbara made few other
comments and the bulk of the questions were handled by another young agent
named Tim.
The questions started with an apology by Tim saying there was someone who
requested specific questions to be asked for a case study or something
along those lines. He said they were fairly simple but was required to ask
them. These questions were general in nature and read off a xerox sheet,
mostly a list of phrases that were looking for definitions. What is a
phreaker, hacker, know what a virus is, have you ever written or
distributed one, etc.
After this opening round of Q & A, he announced we were going on to more
specific questions involving myself and the bulletin board. I don't really
remember most of the questions but the subject dealt with my awareness that
both credit card and long distance access codes were being passed through
the system and what was on the hidden boards that normally wasn't part of
standard access, and who had access to them. My answer to these led into
the system maintenance and how I handled it.
As far as the question about the codes went, I replied no I was not aware
of that and he point out they had printouts proving they were. Of course it
crossed my mind that if they already had soild proof, why bother to ask the
questions. I wish to publicly state that this type of information was
posted from time to time but I did not lie to the question. Regular users
of the board were aware that long ago I made clear the system policy on
this matter. Long distance codes along with credit card information was not
allowed to exist on the system. I felt that any specific information left
that could lead to direct fraud was not welcome and would be removed and
persons who repeated violating this themselves would be removed from the
system also.
To clarify the phrase 'specific information' to the readers of this file I
wish to explain my position on how I considered board policy on messages.
It is no secret that many of the posts of board 5 (fone phun) either
solicited for the need of or said they had and would share such
information. I never considered this wrongful for a number of reasons. The
primary one would be most people on there were blowing smoke as far as
really knowing anything either fraudulent or important. Few people outside
the bbs community realize that in many areas both status and ego are
wrongfully important factors to others within the modem society. Many
people who wish to raise their status will often come up with outlandish
claims in an attempt to convince others he or she is an expert on one
matter or another.
Any attempt to suppress this act I felt would of damaged Ripco's open door
policy since people do have to start somewhere and eventually learn their
peers will catch on fast if someone is pulling a bluff. Thus this type of
activity was tolerated but the line was crossed if anyone attempted to
really do it. For example if a message contained something like 'just dial
1-800-555-1212 and punch in 123456 at the tone', the entire message was
removed or in more cases re-edited especially if other parts were about
non-related matters.
Returning to the questioning, the above was explained as such but not as a
whole. If in fact they did have printouts of such activity, I suggested an
explanation which covered the maintenance aspect of the board. Basically
Ripco operated itself with my chores limited to validating new users and
updating the general files. Once every morning the messages left since my
last check-in were read. The removal/re-edit if needed was applied at this
time. Considering this occured daily around noon, a message posted let's
say at 3:00pm the preceding day was in existence for nearly 21 hours
before it got my approval or disapproval. Thus I pointed out that in theory
they could have a printout of something but if checked the following day,
it should have been removed.
This was not second questioned by them and they seemed content with it. As
far as the hidden boards went, there were two as most of the system users
knew but were not really active. Board 9 to the best memory serves me was
completely non-existant. Although it was used in the past for various
things, after one of many hard drives crashes it bit the big one and was
not in service. The message file required to use it was not there and I
believe there was even a line in the program that reset the security bit of
people that did have access in the past so they couldn't accidently enter
causing a 'file not found' error. Board 10 was active but fewer than 6
people could claim to access it. Originally it was set up when an attempt
was made on my part to collect a few bucks to keep the system running back
in 1985. It contained few messages and would only gain 5 or 6 more a year.
Questioning from this point on was more broad in nature, jumping from
subject to subject. Items like the anarchy files which were made up in part
of bomb construction articles were deemed 'wrong' by them and I defended by
saying such information could be gathered from numerous public sources.
They still insisted it was 'wrong' and shouldn't have been made available.
One fact that arose well into our chat is that it became obvious that
besides Tim who seemed to know little besides a few buzzwords, none of
those here really had an understanding of computers or much else as far as
a technical background went. Another agent even admitted later that they
were only here to serve the warrant, as far as what was really going on
with the investigation and who or what was involved, they didn't know. Any
questions I attempted to ask them were generally not answered and the
ultimate question of 'why me?' was given the reply 'catch the evening news,
this is happening right now all over the country, should make some good
headlines.'
Even the simple question of what's next, where does the stuff end up needed
a short conference among them and they decided on the following: after its
boxed up downtown, it's shipped to Washington to a department called
'diagnostics'. Tim appeared to be the only one with knowledge of this
because one of the other agents asked him 'who runs that?'. Tim explained
to him that it was part of the SS and was started a couple years ago. The
other agent just shrugged his shoulders.
To put some people fears to rest, there wasn't much else going on. I
expected they were going to ask me about certain individuals or if I knew
anything else going on, but they didn't. Even subjects like PHRACK and the
LOD were only touched upon, no specific questions were asked or answered.
They seemed pleased to find a catalog printout of the general file section
with the PHRACK issues but considering anyone with a valid account had
access to the actual files, this didn't seem to make sense to me.
After a couple hours of this with many lulls in the questioning they asked
if I would sign a statement saying basically everything I said was true and
I did because it was. The only other thing they wanted in the statement was
that I was in fact the operator and did make an attempt to keep the board
clean on a daily basis. Makes me wonder now what that could be twisted into
later down the line.
In all they were here for about 6 hours. In that time I learned little on
what was going on. One of the agents said there were 2 representatives from
AT&T present but didn't know why, saying they just had instructions to pick
them up this morning before they came and got me. My gut feeling was the
code/credit card numbers that much of the conversation was based on.
Drawing to the end they informed me the warrant was completed, led me back
inside after taking a few snapshots of your truly and handed me a receipt
of what they took. Annoying in the first place them being there, the first
thing that caught my eye was both my personal Macintoshes were on the list
along with the related hardware including a 940 meg worm drive and laser
printer. Laser printer? Maybe if you could pick it up and throw it at
someone it could be considered a lethal weapon but what else? Ripco
operated on an Apple //e and had no connections to the macs besides being
near them which apparently is the way they determined what stayed and what
went.
My guess is that after examining the rats nest of wiring that existed around
the 3 computers, they figured anything plugged into the power strip must have
been tied in with each other somehow. An IBM 386 clone and an Apple //gs
sat on the floor only a couple feet away but were untouched. Other
items taken included a 1955 Western Electric model D500 phone, any personal
phone books including a copy of the Chicago White Pages and several
pictures and cartoons I had hanging on the wall. This also included a
picture of a hooker spread eagle from a bachelor party and a picture of
Charles Manson clipped from some tabloid because it bore a resemblance to
me. All disks if not in a sealed box (probably around 3000) were also
taken along with paperwork found in various areas. These items were only
listed as 'misc.' and not broken down on the receipt.
I was cut loose only momentarily since an officer from the Chicago Police
Department replaced the many people running in and out during the morning
hours. He asked if the guns turned over to him were registered with the
city, which they weren't because you can't, so I was charged with a
misdemeanor, failure to register a firearm. A slight explanation about
this: back when Jane Byrne was mayor, she wanted to outlaw handguns
altogether. Some suburbs of Chicago tried this and met with resistance from
the NRA and feared long court battles. So they offered an a grace period
to get people who already had them to register them, but at a cut off date,
handguns could no longer be registered. Thus anyone getting caught with a
handgun after this did not face an illegal weapons charge, only the failure
to register even though someone who registered prior is safe. It ends up
going to court, having the weapons destroyed and getting 6 months
supervision with no conviction on the books. This was the outcome of that
situation.
At least that story had an ending. As far as what is going between me
and the Secret Service, I don't really know or have a clue. At this writing
it has been nearly 3 months and I haven't heard a word from them. Everything
is just speculation on my part since it seems the matter is being kept
under wraps. Even the names of the others involved on that day were not
released. I don't know if those other people were system operators or
users. One agent said you'll probably hear from us in 6-8 months while
another was not so optimistic and said it would probably take years adding
later that it's a good chance I'll be in my 50's, married with children
before I knew what happened.
In the time shortly after the seizure I talked to several lawyers to at
least get some opinions on what to do next. Without being charged it seems
very little can be done. My only options are 1) sit back and relax, wait
till they do something or 2) file a lawsuit to get the stuff back. All the
attorneys brought up the suit idea but only one suggested it wasn't really
a good way to go. Based on what they took as far as value goes, the
preliminary costs would be about half with it approaching double if it has
to go to court and heard in front of a jury. It appears the best outcome is
to get the stuff back, you can't claim damages or get your court fees back
when it comes to the federal government.
One point I want to make clear is under a seizure warrant, all material
taken is forfeited to the government. It doesn't seem like a situation
where they have to give it back after examination. They have according to
what little I could find on the subject, 5 years from the date of the
warrant to set up an indictment. Even if no indictment is made, they don't
necessarily have to return it. It can either be used for internal use or
put up at auction. There was an article in Unix Today where an agent seemed
to indicate the material is returned but I haven't found any support of
this policy.
My opinion on all of this is basic. The government came in, took my
personal property to determine if there was any wrong doing somewhere. It
seems like a case of being guilty and proving yourself innocent. Or in
another light, them thinking there was wrong doing and getting the stuff to
make sure. Either way its just not right. Although I have no desire to
battle this in court on my own, it seems to be there should have been a
charge for something, even if it was minor, with other stuff being added
later if needed. At least it would beat this nazi/gestapo tactic of
secrecy.
Is Ripco's involvement with credit cards and access codes the real basis?
Does the distribution of PHRACK play a part in it? What if they were
investigating someone on the board and felt there was information that
would help them? Did they ever think of knocking on the door first? If it
was someone else they were after, should I be the one getting penalized?
Does the first amendment come into play at all? Even though I am free to
open another board at this time if I choose, why isn't a newspapers
printing press taken when a reporter refuses to name his sources about a
sensitive story?
I don't have the answer to any of these questions. Even if I did, they
might be the wrong questions in the first place. One opinion put forth by
several people is that putting the board out of business could be all they
wanted. Its possible if any one piece of information contained within
Ripco was used in assisting someone to commit a crime, it could be all they
needed. Maybe they looked at Ripco as a pain in the ass since the beginning
but couldn't get rid of it any other way.
In closing I'd like to point out that this is not a black and white issue
reguardless of anyone's opinion. There were many who hated the board,
thought it was trash and would of liked to see it removed for good. Well
they got their wish but consider the circumstances of what happened. No
reason given, none to offer. Think about that next time you sign on to your
favorite system and see a message about someone selling a used computer or
hard drive. If that item is by chance stolen merchandise, can the operator
lose his computer because it aided someone to fence?
Based on what happened to me up to this point, its only one step away. I am
not a hacker, phreaker, have anything to do with credit cards or
manufactured explosives. Until the weapons charge I never had been arrested
and even my driving record has been clean since 1978.
1984 arrived a bit late but there is no doubt to me its here. Thanks again
to everyone that supported the board and there is always the possibility
another Ripco will appear.
You just never know.
********************************************************************
>> END OF THIS FILE <<
***************************************************************************
------------------------------
Date: Sat, 4 Aug 90 17:08:34 CDT
From: "J. Eric Townsend" <jet@karazm.math.uh.edu>
Subject: SJG Gurps Cyberpunk
********************************************************************
*** CuD #1.27: File 4 of 4: Another Gurps Review ***
********************************************************************
Here is a text file I wrote when SJG Gurps Cyberpunk was first released.
Well, I rushed out and bought GURPS Cyberpunk, in the hopes that my money
will help SJG with legal fees. (Plus, I collect game stuff.)
On the front cover, in the SJG Illuminatus logo, it says: "The book that
was seized by the U.S. Secret Service! (see p. 4)"
Anyway... (Assuming I know *nothing* about cracking/phreaking. I won't
comment on my real knowledge.) The following is a summary of text from the
GURPS Cyberpunk supplement, with a few direct quotes.
How Much Hacking Can I Do Based on the C-word manual: (From the section
entitled "Netrunning".)
0. People use handles to hide their real identity (p62).
1. You can use sensitive devices to listen in on the signals being sent to
a computer monitor, and redisplay the image on your own screen (p62).
2. General info on ISDN. (p64-65)
3. Computer accounts can come in various levels, from specialty logins
(uucp) to "superuser" who has access to everything. Some programs can give
you a higher level of access, equivalent to a "better" account (p68).
4. General info on back doors (p69).
5. General info on chat systems (p69).
6. A list of network names from around the world. No clues as to which
are real. For the US, the following are listed: WUT, UDTS 2, Datel I &
II, Telenet, Tymnet, ARPAnet, Infomaster, GraphNet, TRT, FTCC, UniNet,
Autonet, CompuServe, GENIE, AlaskaNet, JANET, Internet (p 71).
7. Passwords can be really obvious, or hard to remember random text
strings (p 72).
8. A program could possibly cause physical damage (p 72).
9. General Phreaking Info:
- Diverters: go through a bunch of systems so that tracing takes
a long time;
- Junction Boxing: Just go down to the local junction box and tie in
(p 76).
10. Lots of networks use different protocols that are sometimes
incompatible (p 77).
11. Ma Bell stuff:
- Existence of CN/A, and that Ma Bell can look you up in any way;
- Line Routing: "With access to the main phone switch computer,
a hacker can control everything about a specific phone line.";
- Monitoring: a person could monitor calls with the right access;
- After Billing: A person could change bills;
(p 82).
12. Trashing: Go through somebody's trash to find out all sorts of
interesting info about their computing equipment (p 86,87).
(13 and 14 are from the section "Attack and Defense Programs". The
programs are obviously s-f software, but...):
13. Promote: "This program is executed from a normal user account on a
system. If successful, the account is 'upgraded' to a superuser account."
14. Webster: "This is the standard icebreaker for use against Password
programs (see p 93.). It acts as an extremely fast 'brute-force' hacker."
(p 92).
15. Credcard Crime: A false balance could be entered in an account. A
device could be used to access somebody else's card without having the
correct password to get into the credcard (p 105). [note: a credcard is a
self-contained debit card that can have anything from a password to retina
scan protection.]
And, um, that's about it. Now that you've read that, you know how to break
into computer systems and do phone phreaking... 1/2 :-)
--J. Eric Townsend -- University of Houston Dept. of Mathematics
(713) 749-2120
********************************************************************
------------------------------
**END OF CuD #1.27**
********************************************************************