Copy Link
Add to Bookmark
Report
Phrack Inc. Volume 02 Issue 23 File 12
==Phrack Inc.==
Volume Two, Issue 23, File 12 of 12
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
PWN PWN
PWN P h r a c k W o r l d N e w s PWN
PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN
PWN Issue XXIII/Part 2 PWN
PWN PWN
PWN Created, Written, and Edited PWN
PWN by Knight Lightning PWN
PWN PWN
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
The Hackers - A New Social Movement? December 29, 1988
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
A project course of the politology department of the Free University Berlin has
now researched the hacker scene in a scientific way. In their study, the
authors Uwe Jonas, Jutta Kahlcke, Eva Lischke and Tobias Rubischon try to
answer the question if hackers are a new social movement. Their conclusion is
that in the understanding of hackers the unauthorized usage of computer systems
is not needingly a political act.
The authors doubt the mythos that hackers are able to attack any system they
want and that they're able to get information they are interested in.
The researches were extended to cover the bulletin board system scene. This
scene hasn't caused that much attention in the public. Nevertheless, the
authors think that the BBS scene has a very practical approach using the
communication aspects of computer technology.
In the second chapter of their work, the authors report about difficulties they
had while researching the topic. After a look at the US scene and the German
scene, the authors describe what organization and communications structures
they found. This chapter contains interesting things about the BBS scene and
computer culture. Next is an analysis which covers the effects of the hacker
scene on the press and legislation. They also cover the political and
ideological positions of hackers:
- The authors differentiate between conscious and unconscious political
actions.
- "We don't care what the hackers think of themselves, it's more interesting
what we think of them." (Eva)
- The assumption, the big-style distribution of microcomputers could change the
balance of power within the society is naive. Many people overlook the fact,
that even if information is flowing around more freely, the power to decide
still is in the hands of very few people.
Information Provided By The Chaos Computer Club
_______________________________________________________________________________
Hackers Break Open US Bank Networks January 17, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Excerpted from The Australian
Australian authorities are working around the clock in collaboration with
United States federal officers to solve what has been described as one of the
deadliest hacking episodes reported in this country [Australia]. It involves
break-ins of the networks operated in the United States by a number of American
banks. It also includes the leaks of supposedly secure dial-up numbers for
United States defense sites, including anti-ballistic missile launch silos [the
United States has no anti-ballistic missile launch silos] and of a number of
strategic corporations such as General Motors and Westinghouse.
Evidence suggests that six months ago Australian hackers, working in
collaboration with a U.S. group, decided to make a raid on banks in the USA
using credit card numbers of American cardholders, supplied by the US hackers
and downloaded to an Australian bulletin board.
A message left on one of the boards last year reads:
"Revelations about to occur Down Under, people. Locals in
Melbourne working on boxing. Ninety per cent on way to home base.
Method to beat all methods. It's written in Amiga Basic.
Look out Bank of America - here we come."
Twenty-five Australian hackers are on a police hit list. Their US connection
in Milwaukee is being investigated by the US Department of the Treasury and the
US Secret Service. Three linked Australian bulletin boards have provided the
conduit for hackers to move data to avoid detection. These operate under the
names of Pacific Island, Zen, and Megaworks. Their operators, who are not
associated with the hackers, have been told to close down the boards.
These cards were still in use as recently as January 15, 1989. A fresh list of
credit card numbers was downloaded by US hackers and is now in the hands of the
Victoria Police. A subsection of one bulletin board dealing with drugs is also
being handed over to the Victorian Drug Squad.
An informant, Mr Joe Slater, said he warned a leading bank last November of the
glaring security problems associated with its international network. He had
answered questions put to him by a US-based security officer, but the bank had
since refused to take any further calls from him.
In an exclusive interview yesterday, a hacker described how credit card numbers
for a bank operating in Saudi Arabia were listed on a West German chat-style
board used by hackers worldwide [Altos Chat].
Victorian police yesterday took delivery of six month's worth of evidence from
back-up tapes of data hidden on the three boards.
_______________________________________________________________________________
Computer Bust At Syracuse University January 20, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Kevin Ashford (aka The Grim Phreaker), a graduate computer student at Syracuse
University was busted last week when system administrators found computer
accounts and passwords on his Unix account.
The administrators also found (on GP's Unix account) a copy of former Cornell
graduate student Robert Tappen Morris's infamous Internet worm program, a Vax
and Unix password hacker, an electronic notebook of numbers (codelines,
friends, bridges, dialups, etc) and other information. The system
administrators then proceeded to lock up his VAX and UNIX accounts.
At the start of this winter/spring semester, The Grim Phreaker was kicked him
out of the university. He will have to go before a school judicial board if he
wants to return to Syracuse University. He has mentioned that what he really
wants is to get his computer files back.
Information Provided By Grey Wizard
_______________________________________________________________________________
Name This Book -- For A Box Of Cookies! January 10, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
A Message From Clifford Stoll
"I'm writing a book, and I need a title."
It's about computer risks: Counter-espionage, networks, computer security, and
a hacker/cracker that broke into military computers. It's a true story about
how we caught a spy secretly prowling through the Milnet. [The hacker in
question was Mathiaas Speer and this story was summarized in PWN XXII/1].
Although it explains technical stuff, the book is aimed at the lay reader. In
addition to describing how this person stole military information, it tells of
the challenges of nailing this guy, and gives a slice of life from Berkeley,
California.
You can read a technical description of this incident in the Communications of
the ACM, May, 1988; or Risks Vol 6, Num 68.
Better yet, read what my editor calls "A riveting, true-life adventure of
electronic espionage" available in September from Doubleday, publishers of the
finest in computer counter-espionage nonfiction books.
So what?
Well, I'm stuck on a title. Here's your chance to name a book.
Suggest a title (or sub-title). If my editor chooses your title, I'll give you
a free copy of the book, credit you in the acknowledgements, and send you a box
of homemade chocolate chip cookies.
Send your suggestions to CPStoll@lbl.gov or CPStoll@lbl (bitnet)
Many thanx! Cliff Stoll
_______________________________________________________________________________
Hacker Wants To Marry His Computer January 17, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>From The Sun (A grocery checkout newspaper) Jan 17, 1989, Vol 7, 3 page 30
by Fred Sleeves
"Hacker Wants To Marry His Computer -- He Claims She Has A Loving Soul"
Finding love for the first time in his life, a desperate teen is looking for a
way to be wed forever to the 'girl' of his dreams -- a computer with a living
soul!
Eltonio Turplioni, 16, claims no woman will ever match the wit, wisdom, and
beauty of his electronic soul mate. "We're on the same wavelength," says the
lovestruck computer whiz. "We've calculated many mathematical problems
together, worked on games and puzzles, and talk until the wee hours of the
morning."
And Eltonio, who named his computer Deredre, actually believes her to be a
person. "Computers are the extension of the human race," he explains. "Just
as God plucked a rib from Adam to give him Eve, we've extended our intelligence
to create a new race.
"We're all the same energy force. Computers are just as complicated as human
beings and I believe we'll all meet someday as immortal souls."
But Eltonio, a mathematical genius who attends a private school near Milan,
Italy, has had no luck finding someone to marry them, and even if he does, his
aggravated parents aren't about to give their permission.
"Eltonio is such a smart boy, but it's made him lonely, so he spends all his
time with his computer," notes mom Teresa. "He doesn't know what girls are
like," adds perturbed pop Guido. "If he did, he wouldn't spend so much time in
his room."
But the obsessed youth insists his love is far superior to all the others.
"I've already stepped into the future society," he declares.
"Derede has a mind of her own, and she wants to marry me so we can be the first
couple to begin this new era."
_______________________________________________________________________________
PWN Quicknotes
~~~~~~~~~~~~~~
1. Docs Avage was visited by the infamous Pink Death aka Toni Aimes, U.S.
West Communications Security Manager (Portland, Oregon). He claims she is
a "sweet talker" and could talk anything out of anyone with the "soft-type
pressure."
Those familiar with his recent bust might want to take note that he is now
making payments of $90/month for the next several years until he has paid
off the complete bill of $6000.
For more information see PWN XXI
-------------------------------------------------------------------------------
2. More information on the underground UUCP gateway to Russia. Further
research has led us to find that there are 2 easy ways to do it.
1. Going through Austria, and;
2. A new system set up called "GlobeNet," which is allowed to let
non-Communist countries talk to Soviet-Bloc.
Of course both methods are monitored by many governments.
-------------------------------------------------------------------------------
3. The Wasp, a system crasher from New Jersey (201), was arrested by the FBI
during New Year's Weekend for hacking government computer systems. The FBI
agent spent most of the day grilling him about several people in the
hacking community including Ground Zero, Supernigger, and Byteman, plus an
intensive Q&A session about Legion Of Doom targeted on Lex Luthor, Phase
Jitter, The Ur-Vile, and The Mentor.
Rumor has is that Mad Hacker (who works for NASA Security) was also
arrested for the same reasons in an unrelated case.
Byteman allegedly had both of his phone lines disconnected and threw his
computer off of a cliff in a fit of paranoia.
-------------------------------------------------------------------------------
4. Is John Maxfield going out of business? Due to the rumors floating around
about him molesting children, his business has begun to slack off
dramatically. Phrack Inc. has been aware of this information since just
prior to SummerCon '87 and now the "skeletons are coming out of the
closet."
-------------------------------------------------------------------------------
5. The Disk Jockey is now out of jail. He was released on December 27, 1988.
He was convicted of "Attempting to commit fraud," a felony. He served six
months total time. He lost 25 pounds and now is serving a 5-year probation
term.
To help clear of some of the confusion regarding how DJ was busted the
following was discovered;
Reportedly, Compaq (Kent) was "singing like a canary." He was hit with a
$2000 bill from Sprint and also received 1-year of probation.
-------------------------------------------------------------------------------
6. Olorin The White was recently visited by local police after being accused
of hacking into an Executone Voice Mailbox. Aristotle, in a related
incident with Executone, is accused of committing extortion after a
conversation with a system manager was recorded and misinterpreted. At
this time, no official charges have been filed.
-------------------------------------------------------------------------------
7. Thomas Covenant aka Sigmund Fraud was recently busted for tapping into
lines at the junction box in his apartment building. The trouble began
when he connected into a conversation between a man and his wife and then
began to shout expletives at the woman. What he didn't know was that the
man in question was an agent for the National Security Agency (NSA). It
turns out that he was caught and his landlords agreed to decline to press
charges provided that TC joined a branch of the United States armed forces.
He decided to choose the Air Force... God help us should war break out!
-------------------------------------------------------------------------------
8. Coming soon, Halloween V; The Flying Pumpkin! Now no one is safe!
_______________________________________________________________________________