Copy Link
Add to Bookmark
Report
Phrack Inc. Volume 02 Issue 24 File 13
==Phrack Inc.==
Volume Two, Issue 24, File 13 of 13
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
PWN PWN
PWN P h r a c k W o r l d N e w s PWN
PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN
PWN Issue XXIV/Part 3 PWN
PWN PWN
PWN February 25, 1989 PWN
PWN PWN
PWN Created, Written, and Edited PWN
PWN by Knight Lightning PWN
PWN PWN
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
The Judas Contract Fulfilled! January 24, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"...the other thing that made me mad was that I consider myself, at
least I used to consider myself, a person who was pretty careful
about who I trust, basically nobody had my home number, and few
people even knew where I really lived..."
-The Disk Jockey
The following story, as told by The Disk Jockey, is a prime example of the
dangers that exist in the phreak/hack community when sharing trust with those
who have made The Judas Contract.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Let me briefly explain how I got caught...
A hacker named Compaq was busted after someone turned him in for using Sprint
codes. While executing the search warrant, the state police noticed that he
had an excessive amount of computer equipment which had origins that Compaq
could not explain.
After checking around (I imagine checking serial numbers that Compaq had not
removed), the police found that the equipment was obtained illegally. Compaq
then proceeded to tell the police that I, Doug Nelson (as he thought my name
was) had brought them to him (true).
Meanwhile, Compaq was talking to me and he told me that he was keeping his
mouth shut the entire time. Keep in mind that I had been talking to this guy
for quite a long time previously and thought that I knew him quite well. I
felt that I was quite a preceptive person.
As time went by, little did I know, Compaq was having meetings again and again
with the state police as well as the Federal Bureau of Investigation (FBI)
concerning finding out who I was. He gave them a complete description of me,
and where I (correctly) went to school, but again, he was SURE my name was
Douglas Nelson, and since my phone had previously been in that name, he felt
assured that he was correct. The Police checked with Illinois and couldn't
find license plates or a driver's license in that name. He had remembered
seeing Illinois license plates on my car.
They were stuck until Compaq had a wonderful: He and I had went out to dinner
and over the course of conversation, I mentioned something about living in
Bloomfield Hills, Michigan.
After telling the state police this information, they wrote to Bloomfield Hills
and gave a description and asked for any pictures in their files that fit that
description.
The problem was that several years ago, some friends and I were arrested for
joyriding in a friend's snowmobile while he was on vacation. The neighbors
didn't know us and called the police. Charges were dropped, but our prints and
pictures were on file.
Bloomfield Hills sent back 12 pictures, which, according to the police report,
"Kent L. Gormat (Compaq) without hesitation identified picture 3 as the
individual he knows as Douglas Nelson. This individuals name was in fact
Douglas..."
A warrant was issued for me and served shortly afterwards by state, local and
federal authorities at 1:47 AM on June 27, 1988.
Lucky me to have such a great pal. In the 6 months that I was in prison, my
parents lived 400 miles away and couldn't visit me, my girlfriend could come
visit me once a month at best, since she was so far away, and Compaq, who lived
a whole 10 miles away, never came to see me once. This made me rather angry as
I figured this "friend" had a lot of explaining to do.
As you can see I am out of prison now, but I will be on probation until
December 15, 1989.
-The Disk Jockey
_______________________________________________________________________________
Bogus Frequent Flyer Scheme February 13, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~
>From Associated Press
An airline ticket agent piled up 1.7 million bonus air miles via computer
without leaving the ground, then sold the credits for more than $20,000,
according to a published report.
Ralf Kwaschni, age 28, was arrested Sunday when he arrived for work at Kennedy
International Airport and was charged with computer tampering and grand
larceny, authorities said.
Kwaschni, a ticket agent for Lufthansa Airlines, used to work for American
Airlines. Police said he used his computer access code to create 18 fake
American Airline Advantage Accounts - racking up 1.7 million bonus air miles,
according to the newspaper.
All 18 accounts, five in Kwaschni's name and 13 under fake ones, listed the
same post office box, according to the newspaper.
Instead of exchanging the bonus miles for all the free travel, Kwaschni sold
some of them for $22,500 to brokers, who used the credits to get a couple of
first class, round trip tickets from New York to Australia, two more between
London and Bermuda, and one between New York and Paris. It is legal to sell
personal bonus miles to brokers Port Authority Detective Charles Schmidt said.
Kwaschni would create accounts under common last names. When a person with one
of the names was aboard an American flight and did not have an Advantage
account, the passengers name would be eliminated from the flight list and
replaced with one from the fake accounts.
"As the plane was pulling away from the gate, this guy was literally wiping out
passengers," Schmidt said.
_______________________________________________________________________________
Massive Counterfeit ATM Card Scheme Foiled February 11, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By Douglas Frantz (Los Angeles Times)
The U.S. Secret Service foiled a scheme to use more than 7,700 counterfeit ATM
cards to obtain cash from Bank of America automated tellers. After a
month-long investigation with an informant, five people were arrested and
charged with violating federal fraud statutes.
"Seized in the raid were 1,884 completed counterfeit cards, 4,900 partially
completed cards, and a machine to encode the cards with Bank Of America account
information, including highly secret personal identification numbers for
customers."
The alleged mastermind, Mark Koenig, is a computer programmer for Applied
Communications, Inc. of Omaha, a subsidiary of U.S. West. He was temporarily
working under contract for a subsidiary of GTE Corporation, which handles the
company's 286 ATMs at stores in California. Koenig had access to account
information for cards used at the GTE ATMs. According to a taped conversation,
Koenig said he had transferred the BofA account information to his home
computer. He took only Bank Of America information "to make it look like an
inside job" at the bank. The encoding machine was from his office.
Koenig and confederates planned to spread out across the country over six days
around the President's Day weekend, and withdraw cash. They were to wear
disguises because some ATMs have hidden cameras. Three "test" cards had been
used successfully, but only a small amount was taken in the tests, according to
the Secret Service.
The prosecuting US attorney estimated that losses to the bank would have been
between $7 and $14 million. Bank Of America has sent letters to 7,000
customers explaining that they will receive new cards.
_______________________________________________________________________________
STARLINK - An Alternative To PC Pursuit January 24, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
STARLINK is an alternative to PC Pursuit. You can call 91 cities in 28 states
during off-peak hours (7pm-6am and all weekend) for $1.50 per hour. All
connections through the Tymnet network are 2400 bps (1200 bps works too) with
no surcharge and there are no maximum hours or other limitations.
There is a one time charge of $50 to signup and a $10 per month account
maintenance fee. High volume users may elect to pay a $25 per month
maintenance fee and $1.00 per hour charge.
The service is operated by Galaxy Telecomm in Virginia Beach, VA and users may
sign up for the service by modem at 804-495-INFO. You will get 30 minutes free
access time after signing up.
This is a service of Galaxy and not TYMNET. Galaxy buys large blocks of hours
from TYMNET. To find out what your local access number is you can call TYMNET
at (800) 336-0149 24 hours per day. Don't ask them questions about rates,
etc., as they don't know. Call Galaxy instead.
Galaxy says they will soon have their own 800 number for signups and
information.
The following is a listing of the major cities covered. There are others that
are a local call from the ones listed.
Eastern Time Zone
Connecticut: Bloomfield Hartford Stamford
Florida: Fort Lauderdale Jacksonville Longwood Miami Orlando Tampa
Georgia: Atlanta Doraville Marietta Norcross
Indiana: Indianapolis
Maryland: Baltimore
Massachusetts: Boston Cambridge
New Jersey: Camden Englewood Cliffs Newark Pennsauken Princeton South
Brunswick
New York: Albany Buffalo Melville New York Pittsford Rochester
White Plains
North Carolina: Charlotte
Ohio: Akron Cincinnati Cleveland Columbus Dayton
Pennsylvania: Philadelphia Pittsburgh
Rhode Island: Providence
Virginia: Alexandria Arlington Fairfax Midlothian Norfolk Portsmouth
Central Time Zone
Alabama: Birmingham
Illinois: Chicago Glen Ellyn
Kansas: Wichita
Michigan: Detroit
Minnesota: Minneapolis St. Paul
Missouri: Bridgeton Independence Kansas City St. Louis
Nebraska: Omaha
Oklahoma: Oklahoma City Tulsa
Tennessee: Memphis Nashville
Texas: Arlington Dallas Fort Worth Houston
Wisconsin: Brookfield Milwaukee
Mountain Time Zone
Arizona: Mesa Phoenix Tucson
Colorado: Aurora Boulder Denver
Pacific Time Zone
California: Alhambra Anaheim El Segundo Long Beach Newport Beach
Oakland Pasadena Pleasanton Sacramento San Francisco
San Jose Sherman Oaks Vernon Walnut Creek
Washington: Bellevue Seattle
STARLINK is a service of Galaxy Telecomm Division, GTC, Inc., the publishers of
BBS Telecomputing News, Galaxy Magazine and other electronic publications.
_______________________________________________________________________________
Suspended Sentences For Computer Break-In February 20, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>From Personal Computing Weekly
"Police Officers Sentenced For Misuse Of Police National Computer"
Three police officers hired by private investigators to break into the Police
National Computer received suspended prison sentences at Winchester Crown
Court. The private investigators also received suspended (prison) sentences,
ranging from four to six months.
The police officers were charged under the Official Secrets Act of conspiring
to obtain confidential information from the Police National Computer at Hendon.
One of the police officers admitted the charge, but the other two and the
private investigators pleaded Not Guilty.
The case arose out of a Television show called "Secret Society" in which
private investigator Stephen Bartlett was recorded telling journalist Duncan
Campbell that he had access to the Police National Computer, the Criminal
Records Office at Scotland Yard and the DHSS (Department of Health & Social
Security).
Bartlett said he could provide information on virtually any person on a few
hours. He said he had the access through certain police officers at
Basingstoke, Hampshire. Although an investigation proved the Basingstoke
connection to be false, the trail led to other police officers and private
detectives elsewhere.
Most of the information gleaned from the computers was used to determine who
owned certain vehicles, who had a good credit record -- or even who had been in
a certain place at a certain time for people investigating marital infidelity.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Of course, the actions for which the officers and others were sentenced, were
not computer break-ins as such, but rather misuse of legitimate access.
_______________________________________________________________________________
Virus Hoax Caused As Much Panic As The Real Thing February 20, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>From Popular Computing Weekly
"A Virus Is Up And Running"
Michael Banbrook gave his college network managers a scare when he planted a
message saying that a virus was active on the college system.
Banbrook's message appeared whenever a user miskeyed a password; the usual
message would be
"You are not an authorized user."
It was replaced by the brief but sinister:
"A Virus is up and running."
When the message was discovered by the college network manager, Banbrook was
immediately forbidden access to any computers at the St. Francix Xavier College
at Clapham in South London.
Banbrook, 17, told "Popular Computing Weekly" that he believed the college
has over-reacted and that he had, in fact thrown a spotlight on the college's
lackluster network security. The college has a 64 node RM Nimbus network
running MS-DOS.
"All any has to do is change a five-line DOS batch file" says Banbrook.
"There is no security at all"
Banbrook admits his motives were not entirely related to enhancing security:
"I was just bored and started doodling and where some people would doodle with
a notepad, I doodle on a keyboard. I never thought anyone would believe the
message."
Banbrook was suspended from computer science A-level classes and forbidden to
use the college computers for a week before it was discovered that no virus
existed. Following a meeting between college principal Bryan Scalune and
Banbrook's parents, things are said to be "back to normal."
_______________________________________________________________________________
Phrack World News -- Quicknotes
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For those interested in the 312/708 NPA Split, the correct date for this
division is November 11, 1989. However, permissive dialing will continue until
at least February 9, 1990.
-------------------------------------------------------------------------------
Anyone who is wondering what Robert Morris, Jr. looks like should have a look
at Page 66 in the January 1989 issue of Discover Magazine.
_______________________________________________________________________________