Copy Link
Add to Bookmark
Report

Phrack Inc. Volume 03 Issue 33 File 13

eZine's profile picture
Published in 
Phrack Inc
 · 5 years ago

  

==Phrack Inc.==

Volume Three, Issue Thirty-Three, File 13 of 13

PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
PWN PWN
PWN Phrack World News PWN
PWN PWN
PWN Issue XXXIII / Part Three PWN
PWN PWN
PWN Compiled by Dispater PWN
PWN PWN
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


Pentagon Welcomes Hackers! September 9, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~
>From USA Today

The FBI is investigating an Israeli teen's claim that he broke into a
Pentagon computer during the gulf war. An Israeli newspaper Sunday identified
the hacker as Deri Shraibman, 18. He was arrested in Jerusalem Friday but
released without being charged. Yedhiot Ahronot said Shraibman read secret
information on the Patriot missle -- used for the first time in the war to
destroy Iraq's Scud missles in midflight.
"Nowhere did it say 'no entry allowed'," Shraibman was quoted as telli
police. "It just said 'Welcome.'" The Pentagon's response: It takes
"computer security very seriously," spokesman Air Force Capt. Sam Grizzle said
Sunday. Analysts say it isn't the first time military computers have been
entered. "No system of safeguards exists ... that is 100% secure," says Alan
Sabrosky, professor at Rhodes College in Memphis.
_______________________________________________________________________________

Telesphere Sued By Creditors; Forced Into Bankruptcy
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Compiled from Telecom Digest (comp.dcom.telecom)

On Monday, August 19, Telesphere Communications, Inc. was sued by a group
of ten creditors who claim the company best known for its 900 service isn't
paying its bills. The group of creditors, all information providers using 900
lines provided through Telesphere claim they are owed two million dollars in
total for services rendered through their party lines, sports reports,
horoscopes, sexual conversation lines and other services. They claim
Telesphere has not paid them their commissions due for several months. The
group of creditors filed in U.S. Bankruptcy Court in Maryland asking that an
Involuntary Chapter 7 bankruptcy (meaning, liquidation of the company and
distribution of all assets to creditors) be started against Telesphere.

The company said it will fight the effort by creditors to force it into
bankruptcy. A spokesperson also said the company has already settled with more
than 50 percent of its information providers who are owed money. Telesphere
admitted it had a serious cash flow problem, but said this was due to the large
number of uncollectible bills the local telephone companies are charging back
to them. When end-users of 900 services do not pay the local telco, the telco
in turn does not pay the 900 carrier -- in this case Telesphere -- and the
information provider is charged for the call from a reserve each is required to
maintain.

But the information providers dispute the extent of the uncollectible
charges. They claim Telesphere has never adequately documented the charges
placed against them (the information providers) month after month. In at least
one instance, an information provider filed suit against an end-user for
non-payment only to find out through deposition that the user HAD paid his
local telco, and the local telco HAD in turn paid Telesphere. The information
providers allege in their action against the company that Telesphere was in
fact paid for many items charged to them as uncollectible, "and apparently are
using the money to finance other aspects of their operation at the expense of
one segment of their creditors; namely the information providers..."

Telesphere denied these allegations.

Formerly based here in the Chicago area (in Oak Brook, IL), Telesphere is
now based in Rockville, MD.
______________________________________________________________________________

Theft of Telephone Service From Corporations Is Surging August 28, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Edmund L. Andrews (New York Times)

"It is by far the largest segment of communications fraud," said Rami
Abuhamdeh, an independent consultant and until recently executive director of
the Communications Fraud Control Association in McLean, Va. "You have all
this equipment just waiting to answer your calls, and it is being run by people
who are not in the business of securing telecommunications."


Mitsubishi International Corp. reported losing $430,000 last summer,
mostly from calls to Egypt and Pakistan. Procter & Gamble Co. lost $300,000 in
l988. The New York City Human Resources Administration lost $529,000 in l987.
And the Secret Service, which investigates such telephone crime, says it is now
receiving three to four formal complaints every week, and is adding more
telephone specialists.

In its only ruling on the issue thus far, the Federal Communications
Commission decided in May that the long-distance carrier was entitled to
collect the bill for illegal calls from the company that was victimized. In
the closely watched Mitsubishi case filed in June, the company sued AT&T for
$10 million in the U.S. District Court in Manhattan, arguing that not only had
it made the equipment through which outsiders entered Mitsubishi's phone
system, but that AT&T, the maker of the switching equipment, had also been paid
to maintain the equipment.

For smaller companies, with fewer resources than Mitsubishi, the problems
can be financially overwhelming. For example, WRL Group, a small software
development company in Arlington, Va., found itself charged for 5,470 calls
it did not make this spring after it installed a toll-free 800 telephone
number and a voice mail recording system machine to receive incoming calls.
Within three weeks, the intruders had run up a bill of $106,776 to US
Sprint, a United Telecommunications unit.

In the past, long-distance carriers bore most of the cost, since the
thefts were attributed to weaknesses in their networks. But now, the phone
companies are arguing that the customers should be liable for the cost of
the calls, because they failed to take proper security precautions on their
equipment.

Consumertronics, a mail order company in Alamogordo, N.M., sells brochures
for $29 that describe the general principles of voice mail hacking and
the particular weaknesses of different models. Included in the brochure is a
list of 800 numbers along with the kind of voice mail systems to which they are
connected. "It's for educational purposes," said the company's owner, John
Williams, adding that he accepts Mastercard and Visa. Similar insights can be
obtained from "2600 Magazine", a quarterly publication devoted to telephone
hacking that is published in Middle Island, N.Y.
______________________________________________________________________________

Proctor & Gamble August 22, 1991
~~~~~~~~~~~~~~~~
Compiled from Telecom Digest

On 8-12-91, the "Wall Street Journal" published a front page story on an
investigation by Cincinnati police of phone records following a request by
Procter & Gamble Co. to determine who might have furnished inside information
to the "Wall Street Journal". The information, ostensibly published between
March 1st and June 10th, 1991, prompted P&G to seek action under Ohio's Trade
Secrets Law. In respect to a possible violation of this law, a Grand Jury
issued a subpoena for records of certain phone calls placed to the Pittsburgh
offices of the "Wall Street Journal" from the Cincinnati area, and to the
residence of a "Wall Street Journal" reporter. By way of context, the
Pittsburgh offices of the "Wall Street Journal" allegedly were of interest in
that Journal reporter Alecia Swasy was principally responsible for covering
Procter & Gamble, and worked out of the Pittsburgh office.

On 8-13-91, CompuServe subscriber Ryck Bird Lent related the Journal story
to other members of CompuServe's TELECOM.ISSUES SIG. He issued the following
query:

"Presumably, the records only show that calls were placed between
two numbers, there's no content available for inspection. But
what if CB had voice mail services? And what if the phone number
investigations lead to online service gateways (MCI MAil, CIS),
are those also subject to subpoena?"


At the time of Mr. Lent's post, it was known that the "Wall Street
Journal"
had alleged a large amount of phone company records had been provided
by Cincinnati Bell to local police. An exact figure did not appear in Lent's
comments. Thus, I can't be certain if the Journal published any such specific
data on 8-12-91 until I see the article in question.

On 8-14-91, the Journal published further details on the police
investigation into possible violation of the Ohio Trade Secrets Law. The
Journal then asserted that a Grand Jury subpoena was issued and used by the
Cincinnati Police to order Cincinnati Bell to turn over phone records spanning
a 15-week period of time, covering 40 million calls placed from the 655 and 257
prefixes in the 513 area code. The subpoena was issued, according to the "Wall
Street Journal"
, only four working days after a June 10th, 1991 article on
problems in P&G's food and beverage markets.

Wednesday [8-14-91], the Associated Press reported that P&G expected no
charges to be filed under the police investigation into possible violations of
the Ohio Trade Secrets Law. P&G spokesperson Terry Loftus was quoted to say:
"It did not produce any results and is in fact winding down". Lotus went on to
explain that the company happened to "conduct an internal investigation which
turned up nothing. That was our first step. After we completed that internal
investigation, we decided to turn it over to the Cincinnati Police Department"
.

Attempts to contact Gary Armstrong, the principal police officer in charge
of the P&G investigation, by the Associated Press prior to 8-14-91 were
unsuccessful. No one else in the Cincinnati Police Department would provide
comment to AP.

On 8-15-91, the Associated Press provided a summary of what appeared in
the 8-14-91 edition of the "Wall Street Journal" on the P&G investigation. In
addition to AP's summary of the 8-14-91 Journal article, AP also quoted another
P&G spokesperson -- Sydney McHugh. Ms. McHugh more or less repeated Loftus'
8-13-91 statement with the following comments: "We advised the local Cincinnati
Police Department of the matter because we thought it was possible that a crime
had been committed in violation of Ohio law. They decided to conduct an
independent investigation."


Subsequent to the 8-14-91 article in the Journal, AP had once again
attempted to reach Officer Gary Armstrong with no success. Prosecutor Arthur
M. Ney has an unpublished home phone number and was therefore unavailable for
comment on Wednesday evening [08-14-91], according to AP.

In the past few weeks, much has appeared in the press concerning
allegations that P&G, a local grand jury, and/or Cincinnati Police have found a
"novel" way to circumvent the First Amendment to the U.S. Constitution. In its
8-15-91 summary of the 8-14-91 Journal article, AP quoted Cincinnati attorney
Robert Newman -- specializing in First Amendment issues -- as asserting:
"There's no reason for the subpoena to be this broad. It's cause for alarm".
Newman also offered the notion that: "P&G doesn't have to intrude in the lives
of P&G employees, let alone everyone else"
.

The same AP story references Cincinnati's American Civil Liberties
Union Regional Coordinator, Jim Rogers, similarly commenting that: "The
subpoena is invasive for anyone in the 513 area code. If I called "
The Wall
Street Journal", what possible interest should P&G have in that?"

In a later 8-18-91 AP story, Cleveland attorney David Marburger was quoted
as observing that "what is troublesome is I just wonder if a small business in
Cincinnati had the same problem, would law enforcement step in and help them
out?"
Marburger also added, "it's a surprise to me," referring to the nature
of the police investigation.

In response, Police Commander of Criminal Investigations, Heydon Thompson,
told the Cincinnati Business Courier "Procter & Gamble is a newsmaker, but
that's not the reason we are conducting this investigation."
P&G spokesperson
Terry Loftus responded to the notion P&G had over-reacted by pointing out: "We
feel we're doing what we must do, and that's protect the shareholders. And
when we believe a crime has been committed, to turn that information over to
the police."


Meanwhile, the {Cincinnati Post} published an editorial this past
weekend -- describing the P&G request for a police investigation as "kind of
like when the biggest guy in a pick-up basketball game cries foul because
someone barely touches him."
Finally, AP referenced what it termed "coziness"
between the city of Cincinnati and P&G in its 8-18-91 piece. In order to
support this notion of coziness, Cincinnati Mayor David Mann was quoted to say:
"The tradition here, on anything in terms of civic or charitable initiative, is
you get P&G on board and everybody else lines up."
As one who lived near
Cincinnati for eight years, I recall Procter & Gamble's relationship with
Cincinnati as rather cozy indeed.
_______________________________________________________________________________

Hacker Charged in Australia August 13; 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~
The Associated Press reports from Melbourne that Nahshon Even-Chaim, a
20-year old computer science student, is being charged in Melbourne's
Magistrates' Court on charges of gaining unauthorized access to one of CSIRO's
(Australia's government research institute) computers, and 47 counts of
misusing Australia's Telecom phone system for unauthorized access to computers
at various US institutions, including universities, NASA, Lawrence Livermore
Labs, and Execucom Systems Corp. of Austin, Texas, where it is alleged he
destroyed important files, including the only inventory of the company's
assets. The prosecution says that the police recorded phone conversations in
which Even-Chaim described some of his activities. No plea has been entered
yet in the ongoing pre-trial proceedings.

_______________________________________________________________________________

Dial-a-Pope Catching on in the U.S. August 17, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>From the Toronto Star

The Vatican is reaching out to the world, but it looks as if Canada won't
be heeding the call. In the U.S., if you dial a 900 number, you can get a
daily spiritual pick-me-up from Pope John Paul II. The multilingual, Vatican
-authorized service, affectionately known as Dial-a-Pope, is officially titled
"Christian Messaging From the Vatican." A spokesman from Bell Canada says
there is no such number in this country. But Des Burge, director of
communications for the Archdiocese of Toronto, says he thinks the service, for
which U.S. callers pay a fee, is a good way to help people feel more connected
to the Pope. (Toronto Star)
______________________________________________________________________________

PWN Quicknotes
~~~~~~~~~~~~~~
1. Agent Steal is sitting in a Texas jail awaiting trial for various crimes
including credit card fraud and grand theft auto.
_______________________________________________________________________________

2. Blue Adept is under investigation for allegedly breaking into several
computer systems including Georgia Tech and NASA.
_______________________________________________________________________________

3. Control C had his fingerprints, photographs, and a writing sample
subpoenaed by a Federal Grandy Jury after Michigan Bell employees,
and convicted members of the Legion of Doom (specifically The Leftist
and the Urvile) gave testimony.

Control C was formerly an employee of Michigan Bell in their security
department until January 1990, when he was fired about the same time
as the raids took place on Knight Lightning, Phiber Optic, and several
others. Control C has not been charged with a crime, but the status
of the case remains uncertain.
_______________________________________________________________________________

4. Gail Thackeray, a special deputy attorney in Maricopa County in Arizona,
has been appointed vice president at Gatekeeper Telecommunications Systems,
Inc., a start-up in Dallas. Thackeray was one of the law enforcers working
on Operation Sun-Devil, the much publicized state and federal crackdown on
computer crime. Gatekeeper has developed a device that it claims is a
foolproof defense against computer hackers. Thackeray said her leaving
will have little impact on the investigation, but one law enforcer who
asked not to be identified, said it is a sure sign the investigation in on
the skids. (ComputerWorld, June 24, 1991, page 126)
_______________________________________________________________________________

5. Tales Of The Silicon Woodsman -- Larry Welz, the notorious 1960s
underground cartoonist, has gone cyberpunk. He recently devoted an entire
issue of his new "Cherry" comice to the adventures of a hacker who gets
swallowed by her computer and hacks her way through to the Land of Woz.
(ComputerWorld, July 1, 1991, page 82)
_______________________________________________________________________________

6. The Free Software Foundation (FSF), founded on the philosophy of free
software and unrestricted access to computers has pulled some of its
computers off the Internet after malicious hackers <MOD> repeatedly deleted
the group's files. The FSF also closed the open accounts on the system to
shut out the hackers who were using the system to ricochet into computers
all over the Internet following several complaints from other Internet
users. Richard Stallman, FSF director and noted old-time hacker, refused
to go along with his employees -- although he did not overturn the decision
-- and without password access has been regulated to using a stand-alone
machine without telecom links to the outside world.
(ComputerWorld, July 15, 1991, page 82)
_______________________________________________________________________________

7. The heads of some Apple Macintosh user groups have received a letter from
the FBI seeking their assistance in a child-kidnapping case. The FBI is
querying the user group leaders to see if one of their members fits the
description of a woman who is involved in a custody dispute. It's unclear
why the FBI believes the fugitive is a Macintosh user.
(ComputerWorld, July 29, 1991, page 90)
_______________________________________________________________________________

8. Computer viruses that attack IBM PCs and compatibles are nearing a
milestone of sorts. Within the next few months, the list of viruses will
top 1,000 according to Klaus Brunnstein, a noted German computer virus
expert. He has published a list of known malicious software for MS-DOS
systems that includes 979 viruses and 19 trojans. In all, there are 998
pieces of "malware," Brunnstein said.
(ComputerWorld, July 29, 1991, page 90)
_______________________________________________________________________________

9. High Noon on the Electronic Frontier -- This fall the Supreme Court of the
United States may rule on the appealed conviction from U.S. v. Robert
Tappan Morris. You might remember that Morris is the ex-Cornell student
who accidentially shut down the Internet with a worm program. Morris is
also featured in the book "Cyberpunk" by Katie Hafner and John Markoff.
_______________________________________________________________________________

10. FBI's Computerized Criminal Histories -- There are still "major gaps in
automation and record completness"
in FBI and state criminal records
systems, the Congressional Office of Technology has reported in a study on
"Automated Record Checks of Firearm Purchasers: Issues and Options." In
the report, OTA estimates that a system for complete and accurate "instant"
name checks of state and federal criminal history records when a person
buys a firearm would take several years and cost $200-$300 million. The
FBI is still receiving dispositions (conviction, dismissal, not guilty,
etc.) on only half of the 17,000 arrest records it enters into its system
each day. Thus, "about half the arrests in the FBI's criminal history
files ("
Interstate Ident-ification Index" -- or "Triple I") are missing
dispositions. The FBI finds it difficult to get these dispositions."
The
OTA said that Virginia has the closest thing to an instant records chck for
gun purchasers. For every 100 purchasers, 94 are approved within 90
seconds, but of the six who are disapproved, four or five prove to be based
on bad information (a mix-up in names, a felony arrest that did not result
in conviction, or a misdemeanor conviction that is not disqualifying for
gun ownership) (62 pages, $3 from OTA, Washington, D.C. 20510-8025,
202/224-9241, or U.S. Government Printing Office, Stock No.052-003-01247-2,
Washington, D.C. 20402-9325, 202/783-3238).
(Privacy Journal, August 1991, page 3)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Founded in 1974, Privacy Journal is an independent monthly on privacy in the
computer age. It reports in legislation, legal trends, new technology, and
public attitudes affecting the confidentiality of information and the
individual's right to privacy.

Subscriptions are $98 per year ($125 overseas) and there are special
discount rates for students and others. Telephone and mail orders accepted,
credit cards accepted.

Privacy Journal
P.O. Box 28577
Providence, Rhode Island 02908
(401)274-7861
_______________________________________________________________________________

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT