Copy Link
Add to Bookmark
Report

Phrack Inc. Volume 04 Issue 41 File 13

eZine's profile picture
Published in 
Phrack Inc
 · 5 years ago

  

==Phrack Inc.==

Volume Four, Issue Forty-One, File 13 of 13

PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
PWN PWN
PWN Phrack World News PWN
PWN PWN
PWN Issue 41 / Part 3 of 3 PWN
PWN PWN
PWN Compiled by Datastream Cowboy PWN
PWN PWN
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


Boy, 15, Arrested After 911 Paralyzed By Computer Hacker October 7, 1992
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Caroline Mallan (The Toronto Star)(Page A22)

A 15-year-old boy has been arrested after a hacker pulling computer pranks
paralyzed Metro's emergency 911 service.

Police with Metro's major crime unit investigated the origin of countless calls
placed to the 911 service from mid-July through last month.

The calls were routed to emergency services in the Etobicoke area, said
Detective Willie Johnston, who led the investigation.

Phony medical emergency calls were reported and police, fire and ambulance
crews were dispatched on false alarms. On one occasion, the computer hacker
managed to tie up the entire 911 service in Metro -- making it unavailable for
true emergencies.

Police were not sure last night how long the system was shut down for but
Johnston said the period was considerable.

Staff Sergeant Mike Sale warned hackers that phony calls can be traced.

"A criminal abuse of the 911 emergency system will result in a criminal
investigation and will result in an arrest," Sale said, adding police had only
been investigating this hacker for a few weeks before they came up with a
suspect.

Bell Canada investigators helped police to trace the origin of the calls and
officers yesterday arrested a teen while he was in his Grade 11 class at a
North York high school.

Two computers were seized from the boy's home and will be sent to Ottawa to be
analyzed.

Johnston said police are concerned that other hackers may also be able to halt
the 911 service, since the computer technology used was fairly basic, although
the process of rerouting the calls from a home to the Etobicoke emergency lines
was very complex.

The calls went via computer modem through two separate phone systems in major
U.S. cities before being sent back to Canada, Johnston explained.

The suspect, who cannot be named under the Young Offenders Act, is charged with
theft of telecommunications, 24 counts of mischief and 10 counts of conveying
false messages.

He was released from custody and will appear in North York youth court November
6, police said.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Police Say They've Got Hackers' Number October 8, 1992
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by John Deverell (The Toronto Star)(Page A8)

Hackers, take note. Metro police and Ma Bell are going to get you.

A young North York computer freak accused of launching 10 false medical alerts
to 911 this summer may have learned -- the hard way -- that his telephone
tricks weren't beating the pros.

Police arrived with a search warrant at the home of the 15-year-old, arrested
him and carted away his computer.

He's charged with 10 counts of conveying false messages, 24 counts of mischief,
and theft of telecommunications.

Inspector Bill Holdridge, of 911 emergency services, said the false alarms in
July and August never posed any technical problem to his switchboard but
resulted in wild goose chases for the police, fire and ambulance services.

"Those resources weren't available for real alarms, which could have been a
serious problem," Holdridge said.

The 911 service, quartered at 590 Jarvis Street, gets about 7,000 calls a day,
of which 30% warrant some kind of emergency response.

Normally, a computerized tracing system takes only seconds to provide the
address and number of the telephone from which a call originates -- unless the
point of origin has been somehow disguised.

Apparently the 911 prankster got into the telephone system illegally and routed
his calls through several U.S. networks before bringing them back to Toronto.

Detective Willie Johnston said the boy's parents were stunned when police
arrived. "They really didn't have a clue what was going on," said Johnston.

The false emergencies reported were nowhere near the accused boy's home.
"Without condoning it, you could understand it if he were sitting around the
corner watching the flashing lights," said Johnston. "But they were miles
away. It defies logic."

Neither Johnston nor Holdridge would explain how they and Bell security finally
traced the false alarms. "That might just make other hackers try to figure out
another way," Holdridge said.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Hackers Targeted 911 Systems, Police Say October 10, 1992
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Taken from United Press International

Authorities expect to make more arrests after penetrating a loose network of
computer hackers called the "Legion of Doom" they say tapped into corporate
phone lines to call 911 systems nationwide with the intent of disrupting
emergency services.

Prosecutors from Virginia, New Jersey and Maryland -- in conjunction with
investigators from two telephone companies -- traced some of the hackers and
closed in on three homes in two states.

A 23-year-old Newark, New Jersey man was arrested early on October 9th. He
faces several charges, including fraud. Other arrests are expected in two
Maryland locations.

The suspect, known by several aliases and identified by authorities only as
Maverick, told investigators the group's intent was "to attempt to penetrate
the 911 computer systems and infect them with viruses to cause havoc," said
Captain James Bourque of the Chesterfield County police in Virginia.

The probe is just beginning, according to Bourque. "Quite honestly, I think
it's only the tip of the iceberg," he said.

The hackers first penetrate the phone lines of large companies or pay phones,
then use those connections to call 911 lines, Bourque said. The hackers
usually make conference calls to other 911 services in other cities, tying up
communications in several locations simultaneously.

"One time we were linked up with Toronto and Los Angeles jurisdictions,"
Bourque said. "And none of us could disconnect."

Sometimes as many five hackers would be on the line and would make false calls
for help. Communications officers, unable to stop the calls, would have to
listen, then try to persuade the officers in other locales "that the call
wasn't real," Bourque said.

"Obviously, there's a real potential for disastrous consequences," he said.

One phone bill charged to a company in Minnesota indicated the scope of the
problem. The company discovered in a 30-day period that it had been charged
with more than $100,000 in phone calls generated by the hackers, according to
Bourque.

"I'm sure there are a multitude of other jurisdictions across the country
having the same problems," Bourque said.

People identifying themselves as members of the "Legion of Doom" -- which also
is the name of a pro wresting team -- have called a Richmond, Virginia
television station and ABC in New York in an attempt to get publicity, Bourque
said.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More On 911 "Legion Of Doom" Hacking Case October 20, 1992
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Barbara E. McMullen & John F. McMullen (Newsbytes)

NEW YORK CITY -- In a discussion with Newsbytes, Sgt. Kurt Leonard of the
Chesterfield County, Virginia Police Department has disclosed further
information concerning the on-going investigation of alleged 911 disruption
throughout the eastern seaboard of the United States by individuals purporting
to be members of the hacker group "The Legion of Doom" (LOD).

Leonard identified the individual arrested in Newark, New Jersey, previously
referred to only as "Maverick," as Scott Maverick, 23. Maverick has been
charged with terroristic threats, obstruction of a government function, and
illegal access to a computer. He is presently out on bail.

Leonard said that David Pluchino, 22, was charged to the same counts as
Maverick and an additional count of the possession of burglary tools. Leonard
said that Pluchino, the subject of a 1990 Secret Service "search and seizure"
action under the still on-going "Operation SunDevil" investigation," possessed
information linking him with members of the Legion of Doom.

The Legion of Doom connection has become the subject of controversy within the
online community. Although Maverick has been quoted as saying that he is a
member of the group and that the group's intent was "to attempt to penetrate
the 911 computer systems and inflect them with viruses to cause havoc," members
of the group have disavowed any connection with those arrested.

"Lex Luthor," one of the original members of the group, told Newsbytes when the
initial report of the arrests became public: "As far as I am concerned the LOD
has been dead for a couple of years, never to be revived. Maverick was never
in LOD. There have been 2 lists of members (one in Phrack and another in the
LOD tj) and those lists are the final word on membership."

He added, "We obviously cannot prevent copy-cats from saying they are in LOD.
When there was an LOD, our goals were to explore and leave systems as we found
them. The goals were to expose security flaws so they could be fixed before
REAL criminals and vandals such as this Maverick character could do damage. If
this Maverick character did indeed disrupt E911 service he should be not only
be charged with computer trespassing but also attempted murder. 911 is serious
business."

Lex Luthor's comments, made before the names of the arrested were released,
were echoed by Chris Goggans, aka "Erik Bloodaxe," and Mark Abene, aka "Phiber
Optik," both ex-LOD members, and by Craig Neidorf who chronicled the membership
of LOD in his electronic publication "Phrack."

When the names of the arrested became public, Newsbytes again contacted Lex
Luthor to see if the names were familiar. Luthor replied: "Can't add anything,
I never heard of them."

Phiber Optik, a New York resident, told Newsbytes that he remembered Pluchino
as a person that ran a computer "chat" system called "Interchat" based in New
Jersey. "They never were LOD members and Pluchino was not known as a computer
hacker. It sounds as though they were LOD wanabees who are now, by going to
jail, going to get the attention they desire," he said.

A law enforcement official, familiar with the SunDevil investigation of
Pluchino, agreed with Phiber, saying, "There was no indication of any
connection with the Legion of Doom." The official, speaking under the
condition of anonymity, also told Newsbytes that the SunDevil investigation of
Pluchino is still proceeding and, as such, no comment can be made.

Leonard also told Newsbytes that the investigation has been a joint effort of
New Jersey, Maryland, and Virginia police departments and said that, in
conjunction with the October 9th 2:00 AM arrests of Pluchino and Maverick, a
simultaneous "search and seizure" operation was carried out at the Hanover,
Maryland home of Zohar Shif, aka "Zeke," a 23 year-old who had also been the
subject of a SunDevil search and seizure.

Leonard also said that, in addition to computers taken from Pluchino, material
was found "establishing a link to the Legion of Doom." Told of the comments by
LOD members that the group did not exist anymore, Leonard said "While the
original members may have gone on to other things, these people say they are
the LOD and some of them have direct connection to LOD members and have LOD
materials."

Asked by Newsbytes to comment on Leonard's comments, Phiber Optik said "The
material he's referring to is probably text files that have been floating
around BBS's for years, Just because someone has downloaded the files certainly
doesn't mean that they are or ever were connected with LOD."
_______________________________________________________________________________

Complaints On Toll Fraud Aired at FCC En Banc Hearing October 13, 1992
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Art Brodsky (Communications Daily)(Page 1)

Customers of PBX manufacturers told the Federal Communications Commission (FCC)
they shouldn't be liable for toll fraud losses incurred because vendors never
told them of capabilities of their equipment that left companies open to
electronic theft. Their case was buttressed by one of country's leading toll-
fraud investigators, who told day-long en banc hearing that customers shouldn't
have to pay if they're victimized. Donald Delaney of the New York State Police
said toll fraud "is the only crime I know where the victims are held liable."
Toll fraud losses have been estimated to run into billions of dollars.

Commission's look at toll fraud came in context of what FCC can do to prevent
or lessen problem. Comr. Marshall said Commission's job would be to apportion
liability between vendors and customers. Comr. Duggan, who has been leader on
issue at Commission, said toll fraud was "hidden degenerative disease on the
body of business." He focused on insurance solution to problem, along with
sharing of liability. There are cases pending at FCC filed by AT&T customers
that deal with sharing of liability, and whether common carriers are protected
by tariffs from paying customers for losses. Witnesses told Commission it was
hard to find any law enforcement agency interested in problem, from local
police to FBI, in addition to difficulties with vendors. U.S. Secret Service
has statutory responsibility over toll fraud, said attorney William Cook, who
testified in afternoon session. There was general agreement that more customer
education was needed to prevent fraud, policy endorsed by Northern Telecom,
which has active customer education program.

AT&T came in for particular criticism in morning session as users said company
was insensitive to toll fraud problems. Thomas Mara, executive vice-president
Leucadia National Corp., whose company suffered $300,000 in toll fraud, said he
"had a hell of a time getting anybody at AT&T to pay attention" to problems his
company was encountering. Mara said his company saw level of 800 calls rise to
10,448 from 100. He said AT&T was supposed to notify users if there was any
"dramatic increase in volume, yet we were not notified of a thousandfold
increase in 800 number usage nor were we informed of an increase from a few
hours a month in international calls to thousands of hours by AT&T, only after
receiving our bills." Investigation found that 800 number connecting Rolm
switch to company's voice mail was hackers' entry method, Mara said.

Clearly angry with AT&T, Mara said he has "a feeling they use it as a profit
center." Lawrence Gessini, telecommunications director for Agway Corp. of
Syracuse, agreed, saying: "Toll fraud should not become a rationale for higher
profits for carriers." He told FCC that new programs introduced by long
distance carriers won't solve problem because of constraints, limitations and
expense.

Speaking for International Communications Association (ICA) user group, Gessini
said problems occur because new technologies allow more types of fraud and
because "old tariff concepts" that limit common carrier liability "distort
market incentives." Vendors, he said, are "generally lackadaisical and are
slow to correct even known problems in their hardware, firmware and software,"
and give low priority to complaints. ICA advocated 5 principles including FCC
inquiry into fraud, creation of advisory committee and willingness of
Commission to protect users.

Geoffrey Williams, industry consultant and telecommunications manager for
IOMEGA Corp., said AT&T has been "most notable" for asking for restitution,
while Sprint and MCI are more lenient. MCI doesn't charge users for first
hacking incident, he said, but after that users are on their own.

AT&T defended itself in afternoon session, when International Collections Dist.
Manager Peter Coulter rejected users' accusations, saying company had increased
customer education program "dramatically" since last year. He insisted that
AT&T is "very concerned" by toll fraud: "Contrary to what some people want to
believe, no long distance carrier is making a profit off toll fraud." He said
AT&T had 6,000 customers attend equipment security seminars in 1991, but that
number had been exceeded in first 6 months of 1992. He said results of
increased education program were "only preliminary" but his group was receiving
"a lot more accommodations" than complaints from customers.

Coulter, while never admitting that company should shoulder any financial
liability, admitted that "things are different now" as to how AT&T approaches
toll fraud problem. He said that within AT&T it used to be hardware division
vs. service division. "The hardware guys said it was a service problem, the
service guys said it was the hardware's fault," Coulter said. But now both
divisions are "working together on the problem . . . we're talking to each
other."

Delaney of N.Y. state police gave the FCC a picture of the toll fraud situation
dominated by as few as 15 practitioners, most of whom gain illegal entry to
telephone systems simply by dialing numbers for hours on end. Those so-called
"finger hackers," rather than computer hackers, are responsible for 90% of
fraud, he said, telling Commission that equipment vendors should be held
accountable for fraud. Most fraudulent calls go to Pakistan, Colombia and
Dominican Republic, he said.

Delaney pointed out practical objection to further vendor education problem,
telling commissioners that for vendor to engage in education would also be to
admit there could be problem with equipment security, something sales people
don't want to do. He said some customers had been sold systems and didn't know
they had capability for remote access -- means used by hackers to gain entry.
_______________________________________________________________________________

Hanging Up On Hackers October 12, 1992
~~~~~~~~~~~~~~~~~~~~~
by Miriam Leuchter (Crain's New York Business)(Page 21)

"Thieves tap phone systems, but business cuts the line."

Ron Hanley suspected a technical glitch when his company's telephone bill
listed an unusually large number of calls lasting four seconds to its 800-
number from New York City. But the executive at Dataproducts New England in
Wallingford, Connecticut didn't lose sleep over the problem -- until he got a
call two months later from the security department at American Telephone &
Telegraph Co.

Dataproducts had been hacked. Two days after that, Mr. Hanley got a bill
confirming the bad news: In one 24-hour period, street-corner phone users in
New York had made some 2,000 calls to the Caribbean on the company's line,
ringing up about $50,000 in tolls.

Dataproducts is not alone. Estimates of the cost of telecommunications fraud
in the United States each year run from $1 billion to as much as $9 billion.
According to John J. Haugh, editor of Toll Fraud and Telabuse and chairman of a
Portland, Oregon consulting firm, losses reached $4 billion in 1991 and are
expected to climb 30% in 1992.

Some 35,000 businesses and other users -- such as foundations and government
agencies -- will be hit this year. In the first six months, Mr. Haugh says,
more than 900 New York City companies were victims of telephone-related fraud.

"If you have a PBX system or calling cards or voice mail, you are vulnerable,
exceedingly vulnerable," says Peggy Snyder, executive director of the
Communications Fraud Control Association, a national information clearinghouse
based in Washington. "As technology gets more user-friendly, the opportunity
to commit a crime is much greater."

Armed with computers, modems and sometimes automatic dialers or random-number
generating software, high-technology thieves can use your telephone system as
if it is their own -- without having to pay the tolls. The series of very
short calls Mr. Hanley spotted on one phone bill should have tipped off his
800-number service provider -- which he had alerted when he spotted the pattern
-- that hackers were trying to break into his system.

Who are these hackers -- a term used to describe someone who uses a telephone
or computer to obtain unauthorized access to other computers? Many are
teenagers or young adults out to demonstrate their computer skills and make
some mischief. Five young New Yorkers are awaiting trial in federal court on
unauthorized access and interception of electronic communications charges in
one widely publicized telephone fraud case.

A much smaller proportion are more serious criminals: drug dealers, money
launderers and the like, who don't want their calls traced. In one case, Ms.
Snyder cites a prostitution ring that employed unused voice mail extensions at
one company to leave and receive messages from clients.

Many hackers have connections to call-sell operators who set up shop at phone
booths, primarily in poorer immigrant neighborhoods in cities from New York to
Los Angeles. For a flat fee -- the going rate is $10, according to one source
-- callers can phone anywhere in the world and talk as long as they want. The
hawker at the phone booth pockets the cash and someone else pays the bill.

Perhaps 15 to 20 so-called finger hackers (who crack authorization codes by
hand dialing) distribute information to call-sell operators at thousands of
locations in New York. According to Don Delaney, a senior investigator for the
New York State Police, the bulk of such calls from phone booths in the city go
to the Dominican Republic, Pakistan and Colombia.

Hackers may use more than technical skill to gain the access they want.
Sometimes they practice "social engineering" -- talking a company's employees
into divulging information about the telephone system. Or they manage a
credible imitation of an employee, pretending to be an employee.

In one of the latest schemes, a fraudulent caller gets into a company's system
and asks the switchboard operator to connect him with an outside operator. The
switchboard assumes the caller is an employee who wants to make a personal call
on his own calling card.

Instead, he uses a stolen or hacked calling card number. The fraud goes
undetected until the card's owner reports the unauthorized use to his long-
distance carrier. If the cardholder refuses to pay the charges, the phone
company traces the calls to the business from which they were placed. Because
it looks as if the call came from the company, it is often held liable for the
charge.

In another new twist, a hacker gains access to an unused voice mail extension
at a company, or takes over someone's line at night or while the regular user
is on vacation. He changes the recorded announcement to say, "Operator, this
number will accept all collect and third-party calls." Then the hacker -- or
anyone else -- can telephone anywhere in the world and bill the charges to that
extension.

Sometimes the fraud is much more organized and sophisticated, however. Robert
Rasor, special agent in charge of the financial crime division of the U.S.
Secret Service, gives an example of a three-way calling scheme in which hackers
tap into a phone system in the United States and set up a separate network that
allows people in other countries to call each other directly. "The
Palestinians are one of the more prominent groups" running these sorts of
fraud, he says.

But no matter who the end user is, businesses like Dataproducts end up footing
the bill. Personal users are generally not held liable for the unauthorized
use of their calling card numbers. Under current regulation, a business is
responsible for all calls that go through its equipment, whether or not those
calls originated at the company.

This hard fact rankles Mr. Hanley. "It's totally frustrating and almost
unbelievable that you're responsible for this bill. It's really frightening
for any company."

Dataproducts's liability was relatively small compared with the $168,000
average Mr. Haugh calculated in a study he made last year. It could have been
worse yet.

"The largest case I've ever seen in the metropolitan region was a company that
lost almost $1 million within 30 days," says Alan Brill, managing director of
the New York corporate security firm Kroll Associates Inc.

"It was a double whammy, because even though their long-distance carrier saw a
suspicious pattern of calls and blocked access to those area codes, the company
didn't know its PBX system would automatically switch to another carrier if
calls couldn't go through," Mr. Brill says. "So the company got a bill for
$300,000 from its primary carrier and a $600,000 bill from the secondary
carrier."

Both AT&T and Sprint Corp. offer service plans that limit liability to $25,000
per fraud episode for their business customers. Mr. Brill advises companies to
evaluate the cost-effectiveness of these plans in great detail, because in
order to be eligible for coverage companies must take certain steps to minimize
their risk. "If you reduce your risk significantly, you may not need the
coverage," he says.

The plans require customers to respond to a problem in as little as two hours
after notification of unauthorized calls. Doing so will stem your losses in
any event. "You also have to think about how you're staffed," adds Mr. Brill.
"Can you act that fast?"
_______________________________________________________________________________

PWN Quicknotes
~~~~~~~~~~~~~~

1. HACKER PARTY BUSTED (by Robert Burg, Gannett, 11/3/92) -- "PumpCon Popped!"
-- WHITE PLAINS, New York -- Police say a Halloween party they broke up
Sunday (11/1/92) was more than just a rowdy party - it also was a computer
hacker party.

Three men were charged with unauthorized use of a computer and attempting
computer trespass. A fourth man was arrested on an outstanding warrant
involving violating probation on a charge of computer fraud in Arizona,
Greenburgh Detective Lt. Cornelius Sullivan said.

Security officers at the Westchester Marriott contacted police after
noticing an unusual number of people entering and leaving one room. Police
said that when they arrived, there were 21 people inside and computers
hooked up to telephone lines. Police said they also found telephone credit
cards that did not belong to any of the people present.

The three charged with unauthorized use of a computer and attempted
computer trespass were Randy Sigman, 40, of Newington, Connecticut; Ronald
G. Pinz, 21, of Wallingford, Connecticut and Byron Woodard, 18, of
Woonsocket, Rhode Island.

They were being held at the Westchester County Jail in Valhalla pending
arraignment.

The man charged on the warrant, Jason Brittain, 22, of Tucson, Arizona, was
being held without bail pending arraignment.

The Westchester County District Attorney frauds division seized the
computer hardware, software, and other electrical equipment.

Sullivan said the party-goers heard about the party through computer
bulletin boards.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

2. COMPUTER ACCESS ARRESTS IN NEW YORK (Barbara E. McMullen & John F.
McMullen, Newsbytes, 11/3/92) -- GREENBURGH, NEW YORK -- The Greenburgh,
New York Police Department has announced the arrest of three individuals,
Randy P. Sigman, 40; Ronald G. Pinz, Jr, 21; and Byron J. Woodard, 18 for
the alleged crimes of Unauthorized Use Of A Computer and Attempted Computer
Trespass, both misdemeanors. Also arrested was Jason A. Brittain, 22 in
satisfaction of a State of Arizona Fugitive From Justice warrant.

The arrests took place in the midst of an "OctoberCon" or "PumpCon" party
billed as a "hacker get-together" at the Marriott Courtyard Hotel in
Greenburgh. The arrests were made at approximately 4:00 AM on Sunday
morning, November 1st. The three defendants arrested for computer crimes
were granted $1,000 bail and will be arraigned on Friday, November 6th.

Newsbytes sources said that the get together, which had attracted up to
sixty people, had dwindled to approximately twenty-five when, at 10:00
Saturday night, the police, in response to noise complaints arrived and
allegedly found computers in use accessing systems over telephone lines.
The police held the twenty-five for questioning and called in Westchester
County Assistant District Attorney Kenneth Citarella, a prosecutor versed
in computer crime, for assistance. During the questioning period, the
information on Brittain as a fugitive from Arizona was obtained and at 4:00
the three alleged criminal trespassers and Brittain were charged.

Both Lt. DeCarlo of the Greenburgh police and Citarella told Newsbytes
that the investigation is continuing and that no further information is
available at this time.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

3. U.S. PRISON SENTENCE FOR COMPUTER HACKER (New York Law Journal, 10/15/92,
Page 7) -- A Brooklyn man was sentenced yesterday to eight months in prison
for buying passwords from a computer hacker group known as the "masters of
deception" [MOD] for resale to others seeking access to confidential credit
reports.

Morton Rosenfeld, 21, received the sentence in federal court in Manhattan
after pleading guilty in June to obtaining the unauthorized access devices
to computer data bases operated by TRW Information Services and other
credit reporting companies.

The sentence, imposed by Southern District Judge Shirley Wohl Kram, is
believed to be among few prison terms levied for computer-related offenses.

Meanwhile, charges are pending against Mr. Rosenfeld's alleged source: the
five members of the masters of deception, young men in their teens and
20's. The five were accused in July of breaking into computer systems run
by credit reporting services, telephone companies and educational
institutions.

For more information about the indictment and case against MOD, see ALL the
articles in PWN 40-2.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

4. 2ND ONLINE LEGAL GUIDE RELEASED (by Barbara E. McMullen & John F. McMullen,
Newsbytes, 10/13/92) -- NEW YORK CITY -- PC Information Group has announced
the release of SysLaw, Second Edition: The Legal Guide for Online Service
Providers by attorneys Lance Rose and Jonathan Wallace.

According to the company, "Syslaw provides BBS sysops, network moderators
and other online service providers with basic information on their rights
and responsibilities, in a form that non-lawyers can easily understand."

Subjects covered by the book include the First Amendment, copyrights and
trademarks, the user agreement, negligence, privacy, criminal law, searches
and seizures, viruses and adult materials. The company claims that SysLaw
not only explains the laws, but that it gives detailed advice enabling
system operators to create the desired balance of user services, freedom,
and protection from risk on their systems."

Co-author Lance Rose told Newsbytes: "In the four years since the
publication of the first edition, the electronic community has become
alerted to the first amendment dimensions of the on-line community."

"The first amendment has profound implications to the on-line community
both to liberate providers and users of on-line systems and to protect them
from undue legal harassment. There has, in the last few years, been a lot
of law enforcement activity effecting bulletin board systems, including the
Steve Jackson and Craig Neidorf/Phrack cases," he said.

Rose continued, "The new edition incorporates these new developments as
well as containing new information concerning on-line property rights, user
agreements, sysop liabilities, viruses and adult material contained on
online systems."

SysLaw is available from PC Information Group, 1126 East Broadway, Winona,
MN 55987 (800-321-8285 or 507-452-2824) at a price of $34.95 plus $3.00
shipping and (if applicable) sales tax.

Press Contact: Brian Blackledge, PC Information Group, 800-321-8285

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

5. YET ANOTHER BOOK ABOUT THE COMPUTER UNDERGROUND (The Daily Telegraph,
12/14/92, Page 25) -- Approaching Zero: Data Crime and the Computer
Underworld by Bryan Clough and Paul Mungo (Faber & Faber, L14.99) -- A look
at the world of Fry Guy, Control C, Captain Zap and other hackers to blame
for the viruses, logic bombs and Trojan horses in the world's personal
computer networks.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

6. HONOR STUDENT NABBED IN COMPUTER FRAUD (The Washington Times, 11/9/92, Page
A6) -- BROOKSVILLE, FLA.-- Three high school honor students have been
accused of stealing tens of thousands of dollars worth of long-distance
calls as computer hackers.

Brian McGrogan, 16, and Edmund Padgett, 17, who were charged as adults, and
a 15-year-old allegedly tapped private telephone systems and dialed into an
international hacking network. One company's loss was $36,000.

"These are very sharp, intelligent kids," Hernando County sheriff's Captain
Richard Nugent said after the arrests. "It's a game to them. It's a
sport."

Some calls were made to computer bulletin boards in the United Kingdom,
Germany and Canada, where a loose network of hackers allegedly shared
information about how to obtain computer data and access information.
Arrests in the case also were made in New York and Virginia, Captain Nugent
said.

The two older boys were booked on charges of organized fraud and violation
of intellectual property. The third boy was released to his parents.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

7. A CORDLESS PHONE THAT CAN THWART EAVESDROPPERS (Business Week, 8/3/92) --
To industrial spies and other snoops, the millions of cordless phones in
use are goldmines of information. Conversations can be plucked out of the
air by means of a police type scanner, and with increasing ease. The
latest no-cord technologies offers clearer sound and longer ranges -- up to
half a mile. That's because the new phones broadcast signals at 900 MHz,
or 20 times the frequency of current models.

Cincinnati Microwave, Inc. (the radar detector people) figures executives
and consumers will pay a small premium for cordless privacy. The company
has developed a phone, to be marketed in October by its Escort division for
about $300, that thwarts eavesdroppers with "spread spectrum" technology,
which is similar to the encryption method that the military uses in secure
radios. The signals between the handset and base unit are digitized,
making them unintelligible to humans, and the transmission randomly hops
among various frequencies within the 900 MHz spectrum. To keep the cost
down to the range of other 900 MHz models, Cincinnati Microwave has
developed special microchips that keep the handset and base in sync.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

8. NEW AREA CODE -- As of November 1, 1992, a new 210 area code is serving 152
communities in the San Antonio and Rio Grande Valley areas.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

9. FOR SALE: PHONE-PHREAKING TOOLS (Brigid McMenamin, Forbes, 8/3/92, Page 64)
-- From his remote outpost in Alamogordo, New Mexico, John Williams makes a
nice living telling hackers how to rip off phone and computer systems.

Williams says he brings in about $200,000 a year publishing books on
everything from credit card scams and cracking automated teller machines to
electronic shoplifting, cellular phone phreaking and voice mailbox hacking,
each costing $29 to $39, and each complete with precise instructions. He
even sells Robofones, which save hackers from doing a lot of dialing while
they steal access codes.

Isn't what he does illegal? Perhaps it should be, but it isn't. Wrapping
himself in the First Amendment, Williams is a member in good standing of
the Alamogordo Chamber of Commerce and the New Mexico Better Business
Bureau. He thumbs his nose at companies and authorities that would like to
make him stop selling such secrets. "We don't promote fraud," he insists.
"It's all sold for educational purposes only. If we didn't publish the
information, it would still be out there."

But last year Williams got a visit form the Secret Service, which was
following up on a telephone fraud case in which one of his publications
figured prominently.

In Gainsville, Florida, in November 1990, two young men were locked up by
police for hacking into voice-mail systems and then making calls to 900
numbers. One of the pair, known as the Shark, then 20, confessed to the
crime, but said he was on assignment for Williams' Consumertronics
publication. The culprits could have been given five years on the fraud
charge alone. But the victim didn't want any publicity, so the state let
them do 50 hours of community service instead.

The Secret Service went to talk to Williams. Williams assured agent James
Pollard that he'd never told the Shark to do anything illegal.
Nevertheless, says Williams, the agent implied that Williams and members of
his family who work for him might be prosecuted for publishing voice-mail
access codes.

In the end, no charges were filed against Williams, who admits he has a
thing against big business, especially the phone companies. "For decades,
they financed right-wing regimes in Latin America," he rants.

It's a crazy world, that of the telephone toll fraudsters.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

10. NEW YORK STATE POLICE DECRIMINALIZE THE WORD "HACKER" (Barbara E. McMullen
& John F. McMullen, Newsbytes, 10/21/92) -- ALBANY, NEW YORK -- Senior
investigator Ron Stevens of the New York State Police Computer Unit has
told Newsbytes that it will be the practice of his unit to avoid the use of
the term "hacker" in describing those alleged to have committed computer
crimes.

Stevens told Newsbytes, "We use the term computer criminal to describe
those who break the law using computers. While the lay person may have
come to understand the meaning of hacker as a computer criminal, the term
isn't accurate. The people in the early days of the computer industry
considered themselves hackers and they made the computer what it is today.
There are those today who consider themselves hackers and do not commit
illegal acts."

Stevens had made similar comments in a recent conversation with Albany BBS
operator Marty Winter. Winter told Newsbytes, "'Hacker' is, unfortunately
an example of the media taking what used to be an honorable term, and using
it to describe an activity because they (the media) are too lazy or stupid
to come up with something else. Who knows, maybe one day 'computer
delinquent' WILL be used, but I sure ain't gonna hold my breath."

Stevens, together with investigator Dick Lynch and senior investigator
Donald Delaney, attended the March 1992 Computers, Freedom and Privacy
Conference (CFP-2) in Washington, DC and met such industry figures as Glenn
Tenney, congressional candidate and chairman of the WELL's annual "Hacker
Conference"; Craig Neidorf, founding editor and publisher of Phrack; Steven
Levy, author of "Hackers" and the recently published "Artificial Life";
Bruce Sterling, author of the recently published "The Hacker Crackdown";
Emmanuel Goldstein, editor and publisher of 2600: The Hacker Quarterly" and
a number of well-known "hackers."

Stevens said, "When I came home, I read as much of the literature about the
subject that I could and came to the conclusion that a hacker is not
necessarily a computer criminal."

The use of the term "hacker" to describe those alleged to have committed
computer crimes has long been an irritant to many in the online community.
When the July 8th federal indictment of 5 New York City individuals
contained the definition of computer hacker as "someone who uses a computer
or a telephone to obtain unauthorized access to other computers," there was
an outcry on such electronic conferencing system as the WELL (Whole Earth
'Lectronic Link). Many of the same people reacted quite favorably to the
Stevens statement when it was posted on the WELL.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
11. STEVE JACKSON GAMES TRIAL DATE SET -- Mike Godwin, General Counsel for the
Electronic Frontier Foundation, announced on December 23rd that the case
of Steve Jackson Games, et.al. v. The United States Secret Service et. al.
will go to trial in Austin, Texas on Tuesday, January 19, 1993.
_______________________________________________________________________________

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT