Copy Link
Add to Bookmark
Report

Phantasy Issue 11 Vol 03

eZine's profile picture
Published in 
Phantasy
 · 5 years ago

  

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
= =
- WELCOME TO THE ELEVENTH ISSUE OF -
= =
- -=>PHANTASY<=- -
= =
- A PUBLICATION AND NEWSLETTER OF -
= =
- THE -
= INTERNATIONAL =
- INFORMATION -
= RETRIEVAL =
- GUILD -
= =
- Hacking,Phreaking,Anarchy,Survivalism,Commentary -
= =
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Volume Number Three,Issue Number Eleven Dated 11/06/92
Editor is Mercenary : mercenar@works.UUCP

Article Submissions: The Mercenary/IIRG
862 Farmington Avenue
Suite 306
Bristol,Ct 06010

IIRG World Headquarters BBS: Dark Shadows
19.2/9600 Baud HST
24 Hours a Day
1.2 Gigs Online
2 Nodes
(203)-628-9660

Table of Discontents:


[1] More Pump-Con Bust Info
By: Anonymous

[2] Caller ID Availability
By: Mercenary

[3] Crystal Source
By: Saint Anarchy

[4] FOR THE PEOPLE
Supplied By: Bulletin Boards Across the Country
Edited by: Mercenary

1. DIGITAL TO CLOSE TWO MANUFACTURING FACILITIES
2. FBI EAVESDROPPING PLAN DRAWS INDUSTRY FIRE
3. PUMP-CON BUST RUMORS FLY
4. RESPONSE TO PUMP-CON RUMORS

[5] The Rumor Mill (Unconfirmed rumors from the Underground)
Edited By: Mercenary

1. Ronald Pinz (Victim Or Rat Fink)
2. Berlin Busts Reported
3. WINDYCON

[6] PHANTASY TIDBITS: News and Views of Interest

1. Police Officials Cited For Searching Private Records
2. Call for Papers - The Third International Virus Conference
3. Landmark Software Decision
4. Sixth International Computer Security & Virus Conference

[7] Listing of IIRG Distribution Sites

[8] Listing of PHANTASY Distribution Sites

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

OFFICIAL DISLAIMER...

All information in PHANTASY is from USER contributed material
The Publishers and Editors of PHANTASY and THE IIRG disclaim
any liability from any damages of any type that the reader or
user of such information contained within this newsletter may encounter
from the use of said information. All files are brought to you for
entertainment purposes only! We also assume all information infringes
no copyrights and hereby disclaim any liability.

PHANTASY is (C) 1990 by The IIRG
IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [1]:
********** PUMPCON BUSTED!!! ***********
10/31/92
written by someone who was there
who wishes to remain anonymous

NOTICE: The word "Hacker" is used frequently throughout this file - it is
to be interperated as "a computer literate person", and NOT as
"someone who engages in illegal activities using a computer".

Friday, October 30, Pumpcon began, at the Courtyard of the Marriott, in
Greenburgh, NY. All in all, about 30 hackers showed up, and had a great time.
At least until the evening of Oct. 31st, when 8-10 members of the Greenburgh
police force showed up and raided the Con. At the time of the raid, there were
between 20 and 25 hackers in the hotel. 3 of the 4 rooms rented by Con
attendees were raided. All the occupants of these rooms were taken to a
conference room, and then another hotel room (255) where they were held
approximately 6-8 hours for questioning.

The police all came in unmarked police cars, and parked on all 4 sides of the
hotel. No one noticed they were there, until they were standing in the hall
where all 4 rooms were located. The officers stood in the hall outside the
doors, but did not enter the rooms right away. They waited about five
minutes, for some unknown reason, which was just enough time for them to be
noticed by the hackers in at least one of the rooms. Unfortunately, there was
no way the hackers in one room could warn the other rooms - the fone lines were
busy, and the cops in the hall kinda left the "walk down and tell 'em in
person" option out.

The police produced copies of a search warrant to search rooms 246, 233, and
237. Room 246 was the one where everyone was hanging out; it was pretty much
THE room. It was where the computers were located, and where most of the Con
attendees were 99% of the time. The other two rooms were rented by attendees
of the con, and were simply used for sleeping quarters.

Before too long, the police entered the rooms, and began rounding up people.
My recollection of this time period is a bit faint, and I don't remember all
the minute details. All I know is that we all ended up in a conference room,
and then room 255.

A few hackers who had been out driving around during the time of the bust
returned a few hours later, and when they were seen by police, they were
immediately taken to 255 and questioned. (They were walking down the
hall, when a cop appeared, and told them to step into a room) The cops asked
them if they were hackers, and when they didn't answer, one police officer
reached into the coat pocket of one of the people, and produced an auto
dialer. This in itself was enough to send the three to room 255, where the
rest of the hackers were being held for questioning. My question to you -
isn't that just a bit illegal? Bodily search without probable cause OR a
warrant? Ooops - I'm forgetting - we're HACKERS! We're ALL BAD! We're
ALWAYS breaking the law. We don't have RIGHTS!

Room 255 was packed. No one was allowed to smoke, and everyone was nervous
as hell. One by one people were called to be interviewed, with some
interviews lasting 5 minutes, others lasting 30 or 45 minutes. Some people
were sleeping, others were conversing, and still others were shaking, and
looked like they were about to puke at any second. Even though the situation
was quite serious, a few joked around, saying things like "So guys, I guess
PumpCon '93 won't be held here, eh?".

No one knew who was going to be arrested, or when they would be released.
The 2 cops in the room with them were actually pretty cool, and answered any
questions they could to the best of their knowledge. They weren't the guys
in charge of the investigation; they were simply there to make sure we didn't
leave. Of course, as friendly as they seemed, they were still cops...

All the people who were detained were held until between 5:45 and 6:30am.
Four hackers were arrested, 1 because 2 of the rooms were registered in his
name, a second because he signed for the rooms, and the others for previous
crimes, apparently. No one knows as of yet. As of this message, no news
on what will become of those arrested is known. They have not yet been
arraigned. The other hackers were all searched, questioned, and then released
pending further investigation. Those under the age of 18 had their parents
notified.

To my knowledge, there were no federal investigators there at the time of the
bust. However, people kept mentioning the FBI and the Secret Service, and it
is very possible that they will be called in to investigate. Actually, it's
more than just possible, it's almost guaranteed. The police said that
although most of those detained were released, there will most likely be more
arrests in the near future, as more is learned about the alleged illegal
doings.

3 computers (2 Amigas, and 1 AT&T dumb term) were confiscated, along with
anything which looked like it could have been involved in phone fraud. For
some odd reason, although Auto Dialers were listed on the search warrant, not
all of them were confiscated. I acutally don't know if ANY were, I do know
that not ALL were. ;)

In one of the rooms, there were about 2 dozen computer magazines which were
apparently confiscated, although the warrant did not specify that magazines
could be taken. But, when you're busting HACKERS, I suppose you can take what
you want. After all, hackers are evil geniuses, and don't have the same rights
as NORMAL criminals do.

As of yet, the actual charges against the hackers are not known. The raid
apparently stemmed because the hackers were ALLEGEDLY using stolen calling card
numbers and/or access codes to obtain free phone calls. One of these card
numbers or codes was rummored to have tripped a flag at AT&T, which alerted
security personel that something was possibly wrong.

This assumption about the calling card fraud is made because the police
confiscated any calling card found during their searches, and some of the
questions they asked the detained centered entirely around calling card
theft and use. A few other questions asked me were "Do you know what
computer systems were accessed?", "Do you refer to each other with handles?",
"Who was primarily responsible for this meeting?", and "Where did you hear
about this meeting?"

My interview lasted only about 10 minutes, and it started at about 5:50am.
Everyone was dead tired, and the cops wanted to get everything over with
as fast as possible so they could get some sleep. After the interviews were
over, everyone left, to wait and see what the next few days will bring.

I am releasing this file now, to prevent any rumors from starting, and to try
to make the outside world aware of what happened during PumpCon. I have
left out any specific incidences and references to specific people as a
precaution, since the investigation is only beginning. We were hoping to write
a file of all the attendees of PumpCon, to share with the world the names of
those who were there. However, as you can obviously see, that would be highly
stupid. For anyone who WAS there who is reading this, rest assured that the
running list of names which was kept made a very tasteless dinner for the one
who had it in his pocket.

Oh, BTW, one of the cops who was apparently in charge made a comment to me...
he said "You can post a message on the boards telling your friends to stay
out of Greenburgh". Well boys, you heard him - PumpCon '93 will be held in
Greenburgh, at the Courtyard Marriott....


*--------------*

The following is a word for word copy of the search warrant issued to each
person who was detained and questioned. No spelling errors were corrected,
but I probably made a few when I typed this in. Oh well.


TOWN of GREENBURGH POLICE DEPARTMENT
WESTCHESTER COUNTY, NEW YORK
ORDER OF SEARCH AND SEIZURE
-----

( signed here by Det. Hugh F. Gallagher #103)
----------------------------------------------

JUSTICE COURT, TOWN OF GREENBURGH
WESTCHESTER COUNTY, NEW YORK ORDER
-----
IN THE MATTER OF Room 233, 237, & 246 Westchester Marriott Courtyard
THE APPLICATION FOR AN ORDER OF SEARCH AND SEIZURE OF: (Specify)

Computers Disketts Computer Printers
Computer Terminals Auto Dialers Disketts
Calling Card Computer Systems & Wire
Computer Printouts Disk Drives
Modems Hand Written Notes About Credit Co.
" " " " Computer Service.
______________________________________________________________________X

IN THE NAME OF THE PEOPLE OF THE STATE OF NEW YORK

TO: ANY POLICE OFFICER OF THE TOWN OF GREENBURGH POLICE DEPARTMENT

PROOF by affidavit having been made before me this day by Det.H.Gallagher #103
____________(Affiant) of the Town of Greenburgh Police Department that certain
property, which is (stolen/unlawfully possessed, used to commit an
offense...) and which constitutes evidence and tends to demonstrate that an
offense has been committed and that a particular person participated in the
commission of an offense will be found at the location captioned above.

YOU ARE THEREFORE COMMANDED,

** (Between the hours of 6:AM - 9:00 PM / AT ANY TIME OF DAY OR NIGHT) **
** (WITHOUT GIVING NOTICE OF YOUR AUTHORITY AND PURPOSE)**

TO MAKE A SEARCH of the above described (location/person)** for the following
property: (describe fully)

Room # 233, 237, & 246 of the West. Marriott Courtyard
and all its occupants as listed on this attached affidavit.
>><< Suspects name was written here >><<

AND if any such property is found, you are hereby directed to seize the same
and without unnecessary delay, return it to the court, together with this
warrant and a written inventory of such property subscribed and sworn by you.

THIS COURT DIRECTS THAT this SEARCH WARRANT and ORDER issued this 1 day of
NOV. 1992 is valid and must be executed no more than ten (10) days after the
date of issuance.

<< illegible justice's name here >>
_____________________________________
Justice Name Signature

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [2]: Caller Id Availability
By: Mercenary

Whose Got caller Id,

Im sick and tired of reading messages about who does and who doesn't, so its
time to set the record straight.

Now here we go, these are the states that have up and running Caller Id
Service,

ALABAMA INDIANA MAINE NORTH DAKOTA VERMONT
DELEWARE IOWA MICHIGAN NEBRASKA WEST VIRGINIA
FLORIDA KENTUCKY MINNESOTA OKLAHOMA
GEORGIA LOUISIANA NEVADA SOUTH CAROLINA
IDAHO MASSACHUSETTS NEW JERSEY TENNESSEE
ILLINOIS MARYLAND NORTH CAROLINA VIRGINIA


Service is currently pending in these states,

CALIFORNIA NEW YORK WASHINGTON WYOMING
CONNECTICUT OREGON WISCONSIN

NO Service is available in,

ARIZONA TEXAS NEW MEXICO COLORADO MISSOURI
ARKANSAS OHIO PENNSYLVANIA NEW HAMPSHIRE KANSAS
MINNESOTA UTAH SOUTH DAKOTA MONTANA ALASKA
HAWAII
RHODE ISLAND


Now for the truth on Caller Id Operation,

1. A Caller Id phone or box will show the information for every call WHERE
THE INFORMATION IS AVAILABLE, If the the call comes from another area,
where Caller ID has not yet been approved, or from an area that is not
connected to your area's service, the display will read "OUT OF AREA".


2. If a caller pays for the block-out service and prevents information from
being transmitted, "PRIVATE" will appear on the display.


I hope this sets the record straight....

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [3]: Crystal Source
By: Saint Anarchy

For those of you trying to modify a Rat Shack (Radio Shack) auto-dialer
Part Number: 43-141, from the Sanctuary Phile or Similar text file
floating around.
A good source for the 6.5536 MHz Crystal is the Digi-Key Corporation
call them at 1-800-344-4539 (1-800-DIGI-KEY).
The crystal can be found in catalog #926 on page 116, Digi-Key Part Number
X018, Pricing is as follows...

1 - 1.51
10 - 12.60
100 - 100.80

Hope this helps those of you I've seen on the boards looking for a source
of this crystal,

Saint Anarchy/IIRG


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [4]: FOR THE PEOPLE
Supplied By: Bulletin Boards Across the Country
Edited by: Mercenary

-------------------------------------------------------------------------------

Part 1:
DIGITAL TO CLOSE TWO MANUFACTURING FACILITIES


DIGITAL EQUIPMENT CORPORATION ANNOUNCES
ITS INTENTION TO CLOSE MANUFACTURING FACILITIES
IN SPRINGFIELD, MASSACHUSETTS AND BURLINGTON, VERMONT



MAYNARD, Mass. -- October 29, 1992 -- Digital Equipment Corporation
informed its employees today that it intends to close its
manufacturing facilities in Springfield, Massachusetts and
Burlington, Vermont. There will continue to be Sales and Services
facilities in both cities.
The process for the plant closings, which will affect
approximately 320 employees in Springfield and 350 in Burlington,
will be a gradual reduction of the workforce over the course of six
months. It is expected that the process will be complete by April of
1993.
The details for closing the plants were outlined today to
employees in group meetings. Digital will offer the affected
employees a number of benefits including a financial support package
based on years of service to the corporation; continuation of
medical, dental and life insurance for a specified period; and
professional outplacement assistance.
Edward B. McDonough, vice president, Manufacturing and
Logistics for Digital, said, "The computer industry has been going
through a period in which technology has advanced by orders of
magnitude, increasing the efficiency with which products can be
manufactured.

"The movement of computing power to semiconductors; the shift
in demand to high-volume, low-margin commodity products; and the
decreased demand caused by a soft worldwide economy has left
Digital, and other companies in our industry, with excess worldwide
manufacturing capacity. For over three years, the corporation has
been restructuring its manufacturing function to adjust to the new
capacity needs by eliminating redundancies and divesting in areas
where we cannot clearly differentiate ourselves in the market."
McDonough continued, "Manufacturing will remain a core
competency for Digital. Our goal is to position manufacturing
capacity to best serve our customers worldwide and to optimize the
utilization of our assets. It is on the basis of this strategic
intent -- and not an issue of quality of work -- that the decision
was made to close the Springfield and Burlington plants. Both plants
and their employees have held an important place in Digital's
history."
The disposition of the two sites, which are owned by Digital,
has not yet been determined. The corporation is currently working
with state and local governments, as well as outside organizations,
to find external alternatives for the plants.

------------------------------------------------------------------------------

Part 2:
FBI EAVESDROPPING PLAN DRAWS INDUSTRY FIRE

By Steve Higgins

A broad flank of computer industry and public policy groups is
rallying in a renewed attempt to thwart an FBI proposal to limit the
security of electronic communications.
The U.S. Congress adjourned last month without considering a bill embodying
the FBI's so called "Digital Telephony Proposal," which seeks to force
vendors and end users of communications equipment to ensure the FBI's
ability to tap their communications networks.
"But they will probably do it next year," said David Banisar, a policy
analyst for Computer Professionals for Social Responsibility (CPSR)
in Washington.
That likelihood has generated a round of vehement opposition from an
unlikely consortium: industry vendors including IBM and Sun Microsystems
Inc., professional groups such as the Electronic Frontier Foundation and the
CPSR, and watchdog organizations including the American Civil Liberties
Union.
If the proposal becomes law, "it will require that every system from
AppleTalk LANs up have multiple, redundant systems to let the FBI tap
them," Banisar said.
In its proposal, the FBI suggests levying daily fines on vendors and
users of equipment that do not comply.
"We have to have the technical capability, or we are out of the business
of wiretapping," said Keir Boyd, deputy assistant director of the FBI's
technical services division in Washington. "We are not willing to back
off on the compulsory part."
Those opposed say the FBI's plan would cost U.S. industry money by
requiring that vendors and users retool existing products. The opponents
also say that the plan would hinder U.S. competitiveness by preventing
American companies from developing advanced communications equipment
and that it would pave the way for groups other than the FBI to tap
private communications.
"We are moving [to] a society where E-mail communications and video
conferencing are the norm," said. Whitfield Diffy, a cryptography engineer
at Sun in Mountain View, Calif.
Diffy said that if the FBI proposal is passed, privacy will be virtually
non-existent and "democratic government and free life could be swept
away."
All that, members of the opposition say, is not worth the value of the
estimated 600 to 800 wiretaps that the FBI conducts each year.'
Next year, the rhetoric is likely to rise as Sen. Patrick Leahy (D-VT)
and Rep. Jack Brooks (D-Texas) formally consider the proposal for inclusion
in a congressional bill .
But, for its part, the CPSR isn't waiting until the next Congress to take
action. The group recently filed a request under the Freedom of Information
Act for the FBI's reasoning behind the proposal.
Meanwhile, CPSR and other members of the consortium are still talking to
the FBI to head off what they consider an extreme proposal.
"We always offer to be helpful, to see if there are any less Draconian
solutions," said John Podesta, a consultant at the Electronic Frontier
Foundation, a lobbying group of industry professionals in Washington, who
said meetings with the FBI are "always cooperative."
But, Podesta added," [the FBI] still always seems to say,'We won't back
off of this legislation.' There will be a fight next year."

-------------------------------------------------------------------------------

Part 3:
PUMP-CON BUST RUMORS FLY

Actually, here is what I heard about Pumpcon:

They had multiple terminals set up hacking cards and systems. The manager
came to the door and told Randy that there was a noise complaint.
Just as Randy was starting to talk to the manager, the Feds, AT&T security
and various other organizations busted into the room.
They Rounded up 35 people, some of which are still in jail because they
couldn't make bail. The case is a now federal one, having been turned over
to the FBI.
I've also heard that AT&T and the FBI want to turn this case into an example.
It is already high profile in the NY/CT area from what I understand, and
those out on bail have already received messages from reporters.
It would seem to me that the noise complaint was just bullshit to get them
to open up the door.
Now the question that comes to mind is how did the FBI, AT&T security and
everyone else coordinate so quickly and bust this hotel room?
Well, speculation is (as always) that someone dropped a very big dime on
Pumpcon.
There is also speculation on who did it. Right now the leader in
the polls is No Name Brand.
NNB has friends in Metromedia and AT&T security.
Keep in mind that he was busted not too long ago and returned to hacking in
record time.
His excuse for not showing up?
According to him, his ride (Orion) screwed him over and left him.
Another possibility kicked around was that Phiber did it to receive a break
on his upcomming sentencing but most people aren't going for this one.
Most are going the NNB route.
Randy's phone is tapped.
Night Ranger reportedly got away (he and Spicoli supposedly carded their
room and $110 worth of pizza).
All this info is second generation from Randy S. Hacker. Believe what you
want, make your own conclusions.
Thirty five people...they didn't have enough cells for them all and
supposedly questioned them for 10 hours. In my opinion, someone dropped a
dime on them. It is also my opinion that NNB was that person.
He is just the type of self-serving, vindictive, egotistical little fuck
to pull a stunt like that.

-------------------------------------------------------------------------------

Part 4:
RESPONSE TO PUMP-CON RUMORS

THESE RUMORS ARE NOT TRUE!!!!

Yes, there were computers there. NO! they WERE NOT set up to hack cards and
systems!
People were playing games on them, and a few people were calling out at
various times. The FBI was **NOT** there. AT&T security WAS there though.
The case has NOT been turned over to the feds - it's still a local thing,
and will hopefully stay that way. Only 4 people were arrested, 3 of whom are
out on bail, 1 had an outstanding warrant and was being shipped back to his
home state. He had no bail set. I talked to Randy myself, just got off the
phone with him.
He set me straight on a LOT of things. There are a LOT of places where the
cops possibly screwed up, which may help the defense. No one knows as of yet.
The charges are apparently are "Illegal use of a computer" and "Computer
trespass". There may be more charges added at a later time, and there may be
charges dropped. It's too early to tell. AT&T said there was an 800 system
in GA which was hacked "by SOMEONE in that room" and that apparently set off
flags all over. *I* personally know of NO such thing, OR system,and neither
did a few others I talked to. I DO know for sure that whatever was done, it
wasn't Randy's fault; I didn't once see him behind a terminal. I believe to
that it was a setup - PumpCon was HIGHLY announced, and there were a few who
could have benefitted from "ratting" on it.
I don't know who those people are, nor will I point any fingers.
But I guarantee you the person, if any, who set up PumpCon will wish someday
that he hadn't. Anyway, I wanted to post this to clear up the rumors that
are starting. I know I can't control them all, but some of this shitis
getting WAY out of hand.

246
+ 233
+ 237
----------
103

(PumpCon addition.... 3 rooms = 1 badge #)

The Bash... The Bullshit...The Bust... PumpCon '92.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [5] The Rumor Mill (Unconfirmed rumors from the Underground)
Edited By: Mercenary

Part (1) : RONALD PINZ (VICTIM or RAT FINK)

In Phantasy Magazines Issue #9 Rumor Mill section, an anonymous user
found this file pertaining to Robert Pinz and has drawn these
unvalidated (as of yet) conclusions,

-------------------------------------------------------------------------------

The Following information, (EDITED) has been circulating up in the New England
area of operations. The file has been validated as legal as the individual
named is known to have turned in The Purgatory BBS for having semi-legal
posted material.

Real name : Ron Pinz (Ronald Pinz)
Handles Used : IXOM
Past Handles : Dr. Disk,Bazooka Bill
Sex : Male
Age : 21
Birthdate : 06/28/71
Phone Numbers : 203-(EDITED)
: 203-(EDITED)
Address : (Edited)
City/State : Wallingford, Ct.
Zip code : 06492

Biography:

After being thrown out of the military service for computer hacking while
on duty, Its believed that Ronald is now trying to court favors from AT&T
for a $50,000 job in New Jersey by turning in phreakers and hackers.
It is already officially confirmed that Ron has turned in one BBS and
is now setting sites on other BBS's. Its too bad he doesn't know about
AT&T's policy of not hiring hackers as they figure that an ex-hacker
employee cannot be trusted,we urge you to delete him from your system
if you have any files that are not public domain.

-------------------------------------------------------------------------------
I (EDITED), find it most interesting that this phile was circulating right
before the Pump-Con Arrests, because in CUD 4.55 we find,
-------------------------------------------------------------------------------

Date: Tue, 03 Nov 92 03:00:44 EST
From: mcmullen@MINDVOX.PHANTOM.COM(John F. McMullen)
Subject: File 4--Computer Access Arrests In NY (NEWSBYTES reprint ((CR))

GREENBURGH, NEW YORK, U.S.A., 1992 NOV 3 (NB) -- The Greenburgh, New
York Police Department has announced the arrest of three individuals,
Randy P. Sigman, 40; Ronald G. Pinz, Jr, 21; and Byron J. Woodard, 18
for the alleged crimes of Unauthorized Use Of A computer and Attempted
Computer Trespass, both misdemeanors. Also arrested was Jason A.
Britain, 22 in satisfaction of a State of Arizona Fugitive From
Justice warrant.

The arrests took place in the midst of an "OctoberCon" or "PumpCon"
party billed as a "hacker get-together" at the Marriott Courtyard
Hotel in Greenburgh. . The arrests were made at approximately 4:00 AM
on Sunday morning, November 1st. The three defendants arrested for
computer crimes were granted $1,000 bail and will be arraigned on
Friday, November 6th.

Newsbytes sources said that the get together, which had attracted up
to sixty people, had dwindled to approximately twenty-five when, at
10:00 Saturday night, the police, in response to noise complaints
arrived and allegedly found computers in use accessing systems over
telephone lines. The police held the twenty-five for questioning and
called in Westchester County Assistant District Attorney Kenneth
Citarella, a prosecutor versed in computer crime, for assistance.
During the questioning period, the information on Britain as a
fugitive from Arizona was obtained and at 4:00 the three alleged
criminal trespassers and Britain were charged.

Both Lt. DeCarlo of the Greenburgh police and Citarella told Newsbytes
that the investigation is continuing and that no further information
is available at this time.

(Barbara E. McMullen & John F. McMullen/19921103)

-------------------------------------------------------------------------------

Now we find that Ronald Pinz has been arrested at Pump-Con, what better way
than to court favors from AT&T than to attend a hackers conference, let
people incriminate themselves and than have the police barge in an arrest
you and the others. Ive heard AT&T security was there, Now doesnt that make
you folks out there wonder? Lets see what happens to Mr. Pinz in court.

-------------------------------------------------------------------------------

Part (2) : BERLIN BUSTS REPORTED


Bad news from Berlin, on Wed. Oct 25th,twelve mailboxes,25 machines,and
some thousand floppies were seized. People are charged for distributing
pirated software. The local DA refuses to give further information.
But the real thing is, some sysops couldnt resist to keep track of TOO
MUCH INFORMATION, not only names,telephone numbers,and addresses, but even
precise logs of who downloaded which software.
Authorties are believed to be planning on prosecuting users who downloaded
copyrighted materials.

-------------------------------------------------------------------------------

Part (3) : WINDYCON

To: All
Subject: come hither

This weekend only, at the Woodfielf Hyatt in Schaemburg..

WINDYCON!!!!

See all manners of various freaks..a must see...

We, the prestigous, will be there, feel free to attend..

Cecil Adams
Board Pariah

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [6]: PHANTASY TIDBITS: News and Views of Interest

-------------------------------------------------------------------------------

Part 1: Police Officials Cited for Searching Private Computer Records

Los Angeles (AP, 30 Oct 1992) More than 45 police officials have been
cited since 1989 for using department computers to check the backgrounds
of baby sitters,house sitters, and others for personal reasons.
"Its a very serious problem", Police Commissioner Ann Reiss Lane Said
The citations came to light after a civilian Police Commission investigator
was suspended 10 days for using department computers without permission to
get confidential data on White Supremacist Tom Metzger and actor Arnold
Schwarzenegger.
The union representing Robert Bauman appealed the suspension and submitted
records showing that more than 45 department employees had been disciplined
in the last three years for illegal computer use.
Most recieved suspensions of two or three days or verbal reprimands.
As an example, Lane said Thursday, an officer might use the computer to check
the background of an individual about to marry one of the officers relatives.
Bauman's 1--day suspension without pay was upheld last week by the Civil
Service Commission. Bauman, a 23-year civilian employee, said he already
has served the suspension and was back at work. Bauman a permit processor
routinely uses police computers to check the criminal records,police files,
and tax records of people apply for police permits for massage parlors, gun
stores and pawn shops.
He said he gathered information on Metzger because he is a part-time
historian who does research on right-and left-wing political groups.
Bauman said he tapped into Schwarzeneggers files because a co-worker
was curious about the actor.


IIRG NOTE: Another case of the Police getting there wrists slapped.
Had this been a hacker he would have been screwed

-------------------------------------------------------------------------------

Part 2: Subject: Call for Papers - The Third International Virus
Bulletin Conference

Amsterdam, 9th-10th September 1993

Call for Papers

The International Virus Bulletin Conference is the largest and most
prestigious annual event to address the computer virus threat in
Europe. The 1992 conference, held in Edinburgh, attracted over 200
delegates and 23 speakers, from more than 20 countries.

Abstracts of between 200 and 500 words outlining prospective papers
for presentation at next year's Virus Bulletin conference are duly
invited from all parties engaged in any capacity in combating the
computer virus threat.

Papers will be selected for their originality and appeal to a diverse
audience comprising corporate computer security staff, PC support
specialists, hardware and software developers, government, military,
public sector and corporate IT managers, researchers and others engaged
in devising technical and procedural countermeasures.

Papers covering the following topics are particularly welcome:

* Case studies of genuine virus outbreaks.

* Post-attack recovery: tools, techniques and lessons learned.

* Evaluation methods and protocols for testing anti-virus software.

* Running a virus help desk.

* Protecting file servers.

* Dealing with viruses in compressed software.

* What should be in a virus hunter's toolkit?

The conference will be held in two streams: stream one will address the
management of the virus threat, while stream two will concentrate on

The conference will be held in two streams: stream one will address the
Abstracts should be completed by December 1st 1993 and should be sent to the
Editor, Virus Bulletin, 21 The Quadrant, Abingdon Science Park, Abingdon,
Oxon OX14 3YS, UK. Fax +44 (0)235 559935.

-------------------------------------------------------------------------------

Part 3: Landmark Software Decision

Published in the San Francisco Examiner is the following legal decision on
disassembly of software

"In the first binding ruling on the application of copyright law
to a common process called reverse engineering, a federal appeals
court said video game maker Accolade Inc. of San Jose could copy a
video game system's code copyrighted by Redwood City-based Sega
Enterprises Ltd. in order to design games for the Sega console.
Reverse engineering is the parctice of taking apart a product to
see how it works, and using the knowledge to design one's own
product. During the process, Accolade made a copy of Sega's
encoded computer program, designed to exclude unlicensed game
makers, in order to translate the information and extract the key
to the code. The Ninth Circuit Court of Appeal in San Francisco
said the copying did not violate Sega's federally protected
copyright on it's software package. The court said Sega's
exclusive rights over it's own programs did not entitle it to
Enterprises Ltd. in order to design games for the Sega console.
Reverse engineering is the parctice of taking apart a product to
see how it works, and using the knowledge to design one's own
product. During the process, Accolade made a copy of Sega's
encoded computer program, designed to exclude unlicensed game
makers, in order to translate the information and extract the key
to the code. The Ninth Circuit Court of Appeal in San Francisco
said the copying did not violate Sega's federally protected
copyright on it's software package. The court said Sega's
exclusive rights over it's own programs did not entitle it to
prohibit another company from learning how the Sega system worked
and designing games that would fit it, as long as those games
did not copy Sega games."

-------------------------------------------------------------------------------

Part 4: SIXTH INTERNATIONAL COMPUTER SECURITY & VIRUS CONFERENCE
and Exposition

sponsored by DPMA Fin.Ind.Chapter in cooperation with
ACM-SIGSAC, BCS, CMA, COS, EDPAAph, ISSAny, NUInypc, IEEE Computer Society

C A L L F O R P A P E R S

Approximately 500 attendees will hear 90 speakers and 53 vendors over 3 days
Wednesday thru Friday - March 10-12, 1993 - New York Ramada Madison Square

YOUR AUDIENCE:

Past attendees have represented industry, military
government, forensic and academic settings -
creators and users of related software and hardware.

They travel from U.S. and many international locations
and have titles such as MIS Director, Security Analyst,
Operations Manager, Investigator, Programming Leader

TOPICS OF INTEREST INCLUDE (but are not limited to):

- prevention, detection, and recovery from viruses,
crackers, and other unauthorized usage
- oritinal research in these and related topics
- survey of products and techniques available
- particulars of LSN, UNIX, cryptography, military use
- Computer crime, law, data liability, related contexts
= US/international sharing of research & techniques
- case studies of mainframe, pc &/or network security, e.g.,
- 1992 hurricane, flood, fire disaster recovery
- recent court decisions
- security implementation and user awareness in industry

PAPER SUBMISSION:

Send a draft final paper for receipt by Wednesday, 11/11/92.
Address to Judy Brand, Conference Chair, box 6313 FDR Station,
New York, NY 10150, USA. Please include a small photo and
introductory bio not exceeding 50 words. Successful submittors
or co-authors are expected to present in person. Presenters
receive the Conference Proceedings and complimentary admission.

PAPER FORMAT:

Send one original and three copies. When making the copies,
please cover over the author name(s) and other identifying data.
Each paper goes to three revieweers.

Type double spaced, with page# below bottom line (may be
handwritten): TITLE (caps); Name; Position, Affiliation;
Telephone, City/State/Zip, Electronic Address (optional).

NOTIFICATION:

Written and (where practicable) telephoned confirmation will
be initiated by Monday, 1/13/93, to facilitate low cost travel.
Those needing earlier notification should attach a note.

You may be asked to perform specific revisions to be accepted.
Nobody can guarantee you a place without an acceptable paper.

AT THE CONFERENCE:

There are five tracks. Time your presentation to last
40 minutes and have clear relation to your paper. A committee
member will preside over your assigned room and adhere to schedule.

Don't hesitate to submit a presentation you've given elsewhere
to a more specialized audience. Most attendees will find it
please cover over the author name(s) and other identifying data.
Each paper goes to three revieweers.

Type double spaced, with page# below bottom line (may be
handwritten): TITLE (caps); Name; Position, Affiliation;
Telephone, City/State/Zip, Electronic Address (optional).

NOTIFICATION:

Written and (where practicable) telephoned confirmation will
be initiated by Monday, 1/13/93, to facilitate low cost travel.
Those needing earlier notification should attach a note.

You may be asked to perform specific revisions to be accepted.
Nobody can guarantee you a place without an acceptable paper.


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [7]: IIRG Distribution Sites
(or Gateways to Oblivion)



////// ////// /////// ////////
// // // // //
// // /////// // ////
// // // // // //
////// * ////// * // // * /////////




IIRG World HQ: Dark Shadows
19.2/9600 Baud HST
24 Hours a Day
1.2 Gigs Online
Sysop: Anubis
2 Nodes
(203)-628-9660


IIRG Distribution Site 1: Wired World BBS
INC Europe
TPC Courier (WHQ)
THP
IIRG Distribution Site
Sysop: Digital Justice
+39-89-254138

IIRG Distribution Site 2: Cyberdyne Network Germany
United Forces
Sysop: E605
+49-5341-59004
+49-5341-54052


IIRG Distribution Site 3: The Sanitarium
Sysops: Morbid Angel [INC/ACID]
Spectral Illusion [ACID/RAZOR]
IIRG Distribution Site
ACID Member Board
INC Courier Board
RAZOR 1911 Courier Board
VISA World Headquarters
(817)PRI-VATE

IIRG Distribution Site 4: The WareHouse
(203)-231-8589 14.4
(203)-231-8588 9600
OVER A GIG ONLINE
Sysop: Ionizer


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Section [8]: Phantasy Distribution Sites

Phantasy's Distribution Site's are continually growing,we apologize if you
called a board and didn't find the Mag. Network Distribution Sites will
have the Issues first, we suggest calling one of them if a problem does
arise.


1. Lightning Systems
(414) 363-4282
Sixty Million Bytes OnLine
USRobotics Dual Standard HST/V.32bis
2400 thru 14.4k v.32bis/HST

2. Sycamore Elite
19,200-1200 Baud HST, 24 Hours a day
(815) 895-5573

3. The Works BBS at (617-861-8976)
Largest Text Files BBS in the world, 3500+ text files online.
2400-300 Baud, 24 Hours a day

4. Pipers Pit BBS
19,200-9600 HST ONLY!!
24 Hours a Day
THG Distro Site 1300 Megs
(203)PRI-VATE [2 Nodes]

5. Blitzkrieg BBS TAP Magazine
(502)-499-8933 P.O. BOX 20264
Home of TAP MAgazine Louisville,KY. 40250-0264

6. The Dickinson Nightlight
(713)-337-1452
Der WeltanSchauung Distro Site (World View Magazine)
Phantasy Distro Site


PHANTASY is also available on:

1. RIPCO BBS (312)528-5020
2. KRACKER BOX (303)438-1481

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
PHANTASY(C) IIRG 1991,1992
May Odin Guide Your Way!
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT