Copy Link
Add to Bookmark
Report

Phrack Inc. Volume 04 Issue 43 File 27

eZine's profile picture
Published in 
Phrack Inc
 · 5 years ago

  

==Phrack Magazine==

Volume Four, Issue Forty-Three, File 27 of 27

PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN
PWN PWN
PWN Phrack World News PWN
PWN PWN
PWN Compiled by Datastream Cowboy PWN
PWN PWN
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


New Yorker Admits Cracking July 3, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~
(From AP Newswire Sources)

Twenty-one-year-old Mark Abene of New York, known as "Phiber Optik" in
the underground computing community, has pleaded guilty to charges he
participated in a group that broke into computers used by phone companies
and credit reporting services.

The Reuter News Service says Abene was the last of the five young men
indicted in the huge 1991 computer break-in scheme to admit committing the
crimes. The group called itself "MOD," an acronym used for "Masters of
Disaster" and "Masters of Deception."

Abene pleaded guilty to one count of conspiracy and one count of
unlawful access to computers. He faces a possible maximum prison term of
10 years and fine of $500,000.

-----------------------------------------------------------------------------

China Executes Computer Intruder April 26, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(From AP Newswire Sources)

A man accused of invading a computer and embezzling some
$192,000 has been executed in China.

Shi Biao, an accountant at the Agricultural Bank of China's Jilin
branch, was accused of forging deposit slips from Aug. 1 to
Nov. 18, 1991.

The crime was the first case of bank embezzlement via
computer in China. Authorities became aware of the plot
when Shi and his alleged accomplice, Yu Lixin, tried to wire
part of the money to Shenzhen in southern China.

-----------------------------------------------------------------------------

Teen Takes the A Train --- Literally May 13, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(From AP Newswire sources)

A 16 year old 10th grader successfully conveyed passengers on a NYC 10 car
subway train for 2.5 hours until he went around a curve too quickly and
could not reset the emergency brakes. Keron Thomas dressed as a NY subway
train engineer impersonated Regoberto Sabio, a REAL subway motorman, while he
was on vacation and even obtained Sabio's "pass number".

Thomas was a Subway enthusiast who hung around train stations and areas
where subway motormen and other subway workers hang out. A NYC subway
spokesman was quoted as saying "Buffs like to watch...pretty soon they
figure out how" [to run the train]. "This guy really knew what he was doing".

Thomas was charged with criminal trespassing, criminal impersonation, and
reckless endangerment.

-----------------------------------------------------------------------------

Banks React To Scheme That Used Phony ATM May 13, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(From AP Newswire Sources)

At least three people are believed to be involved in an ATM scam that is
thought to have netted roughly $ 60,000. The fraud was perpetrated by
obtaining a real ATM machine (theorized to have been stolen from a warehouse)
and placing it in a Connecticut shopping mall.

When people attempted to use the machine, they received a message that the
machine wasn't working correctly and gave back the card. Little did they
know that their bank account number and PIN code was recorded. The fake
machine was in place for about 2 weeks. It was removed and the thieves
began making withdrawals.

The Secret Service thinks the scammers recorded anywhere from 2000 to 3000
account numbers/pin codes but did not get a chance to counterfeit
and withdraw money except from a few hundred accounts before it
became too dangerous to continue

-----------------------------------------------------------------------------

Hacker Gets Jail Time June 5, 1993
~~~~~~~~~~~~~~~~~~~~~
(Newsday) (Page 13)

A Brooklyn College film student, who was part of a group that allegedly broke
into computer systems operated by major telephone companies, was sentenced
yesterday to 1 year and 1 day in prison.

John Lee, 21, of Bedford Stuyvesant, also was sentenced to 200 hours of
community service, which Manhattan Federal District Court Judge Richard Owen
recommended he spend teaching others to use computers. Lee had pled guilty
December 3, 1992, to a conspiracy charge involving computer tampering, fraud
and illegal wiretapping.

_______________________________________________________________________________

Hacker Gets Prison Term For Phone Computer Tampering June 4, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Gail Appleson (The Reuter Business Report)

NEW YORK -- A computer hacker known as "Corrupt" who was part of a group that
broke into computer systems operated by major telephone companies was
sentenced Friday to one year and one day in prison.

The defendant, John Lee, 21, of New York had pleaded guilty December 3, 1992
to a conspiracy charge involving computer tampering, fraud and illegal
wiretapping.

The indictment alleges the defendants broke into computer switching systems
operated by Southwestern Bell, New York Telephone, Pacific Bell, U.S. West
and Martin Marietta Electronics Information and Missile Group.

Southwestern Bell allegedly lost $370,000 because of the crimes.

The defendants also allegedly tampered with systems owned by the nation's
largest credit reporting companies including TRW, Trans Union and Information
America. They allegedly obtained 176 TRW credit reports on various
individuals.

The indictment alleged the group broke into the computers "to enhance their
image and prestige among other computer hackers and to harass and intimidate
rival hackers and other people they did not like."
_______________________________________________________________________________

Professional Computer Hackers First To Land In Jail Under New Law June 4, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Nicholas Hills (The Vancouver Sunds)(Page A11)

LONDON -- In Brussels, they were celebrated as the two young men who broke the
gaudy secrets of EC president Jacques Delors' expense accounts.

In Sweden, they were known as the Eight-Legged Groove Machine, bringing down
part of the country's telephone network, forcing a highly publicized apology
from a government minister who said the chaos was all due to a 'technical
fault'.

They also broke into various European defense ministry networks, academic
systems at Hull University and the financial records of the leading London
bankers, S.G. Warburg.

No, these weren't two happy-go-lucky burglars; but rather, professional
computer hackers, aged 24 and 22, who made legal as well as technological
history by being the first offenders of this new trade to be jailed for their
crimes under new British law.

Neil Woods and Karl Strickland have gone to prison for six months each for
penetrating computer systems in 15 different countries. The ease with which
they conducted this exercise, and their attitude that they were simply engaging
in "intellectual joyriding," has confirmed the worst fears of legal and
technological experts that computer hacking in Europe, at least, has become a
virtually uncontrollable virus.

The case became a cause celebre because of what had happened months before in
another courtroom where a teenage computer addict who had hacked into the White
House system, the EC, and even the Tokyo Zoo -- using a $400 birthday present
from his mother -- had walked free because a jury accepted, basically, that a
computer had taken over his mind.

The case of 19-year-old Paul Bedworth, who began hacking at the age of 14, and
is now studying "artificial intelligence" at Edinburgh University, provides an
insight into why hackers have turned the new computer world into an equivalent
state of delirium tremens.

Bedworth and two young friends caused thousands of dollars worth of damage to
computer systems in Britain and abroad. They were charged with criminal
conspiracy under the Computer Misuse Act of 1990.

Bedworth never did deny computer hacking at his trial, and did not give
evidence in his defense. He simply said through his lawyer that there could
not have been any criminal intent because of his "pathological obsession" with
computers.

A jury of eight men and three women unanimously acquitted him.

Until the passage of the Computer Misuse Act in 1990, hacking was legal in
Britain. Bedworth may have been found not guilty, but his activities were so
widespread that the authorities' investigation involved eight different British
police forces, and others from as far afield as Finland and Singapore. It
produced so much evidence - mostly on disk - that if it had been printed out on
ordinary laser printer paper, it is estimated that the material would have
reached a height of 42 meters.

The police were devastated by the verdict, but are now feeling somewhat better
after the conviction of Woods and Strickland.

The pair, using the nicknames of Pad and Gandalf, would spend up to six hours a
day at their computers, boasting about "smashing" databases.

-----------------------------------------------------------------------------

Computers Turned My Boy Into A Robot March 18, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By Martin Phillips (Daily Mirror)(Page 1)

Connie Bedworth said she was powerless to control the "monster" as he
glued himself to the screen nearly 24 hours as day. "He didn't want
to eat or sleep--he just couldn't bear to be away from it, " she said.

A jury decided Paul Bedworth, now 19, was so "hooked" he could not stop
himself hacking in to companies' systems -- allegedly costing them
thousands of dollars.

-----------------------------------------------------------------------------

Hot For The Fingertips: An Internet Meeting Of Minds May 23, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Frank Bajak (Associated Press)

NEW YORK -- Somewhere in the ether and silicon that unite two workstations 11
floors above lower Broadway, denizens of the cyberpunk milieu are feverishly
debating whether anyone in government can be trusted.

This is the 12-by-20-foot bare-walled home of MindVox, today's recreation hall
for the new lost generation's telecomputing crowd. You can enter by phone
line or directly off Internet.

Patrick Kroupa and Bruce Fancher are the proprietors, self-described former
Legion of Doom telephone hackers who cut the cord with computing for a time
after mid-1980s teen-age shenanigans.

Kroupa is a towering 25-year-old high school dropout in a black leather jacket,
with long hair gathered under a gray bandanna, three earrings and a hearty
laugh.

Fancher is 22 and more businesslike, but equally in love with this dream he
left Tufts University for.

They've invested more than $80,000 into Mindvox, which went fully operational
in November and has more than 2,000 users, who pay $15 to $20 a month plus
telephone charges.

MindVox aspires to be a younger, harder-edged alternative to the WELL, a
fertile 8-year-old watering hole for the mind in Sausalito, California, with
more than 7,000 users, including scores of computer age luminaries.

One popular feature is a round-table discussion on computer theft and security
hosted by a U.S. Treasury agent. The latest hot topic is the ease of breaking
into a new flavor of local access network.

-----------------------------------------------------------------------------

Hi Girlz, See You In Cyberspace May 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Margie (Sassy Magazine) (Page 79)

[Margie hits the net via Mindvox. Along the way she discovers
flame wars, sexism, and a noted lack of females online. This
is her story. :) ]

-----------------------------------------------------------------------------

Hacker Accused of Rigging Radio Contests April 22, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By Don Clark (San Francisco Chronicle)

A notorious hacker was charged yesterday with using computers to
rig promotional contest at three Los Angeles radio stations, in
a scheme that allegedly netted two Porsches, $20,000 in cash and
at least two trips to Hawaii.

Kevin Lee Poulsen, now awaiting trial on earlier federal charges,
is accused of conspiring with two other hackers to seize control of
incoming phone lines at the radio stations. By making sure that only
their calls got through, the conspirators were assured of winning the
contests, federal prosecutors said.

A new 19-count federal indictment filed in Los Angeles charges
that Poulsen also set up his own wire taps and hacked into computers
owned by California Department of Motor Vehicles and Pacific Bell.
Through the latter, he obtained information about the undercover
businesses and wiretaps run by the FBI, the indictment states.

Poulsen, 27, is accused of committing the crimes during 17
months on the lam from earlier charges of telecommunications and
computers fraud filed in San Jose. He was arrested in April 1991
and is now in the federal Correctional Institution in Dublin. In
December, prosecutors added an espionage charge against him for his
alleged theft of a classified military document.

The indictment announced yesterday adds additional charges of
computer and mail fraud, money laundering, interception of wire
communications and obstruction of justice.

Ronald Mark Austin and Justin Tanner Peterson have pleaded guilty
to conspiracy and violating computer crime laws and have agreed to
help against Poulsen. Both are Los Angeles residents.

Poulsen and Austin have made headlines together before. As
teenagers in Los Angeles, the two computer prodigies allegedly broke
into a Pentagon-organized computer network that links researchers and
defense contractors around the country.

-----------------------------------------------------------------------------

SPA Tracks Software Pirates on Internet March 22, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By Shawn Willett (InfoWorld)(Page 12)

The Software Publishers Association has begun investigating reports of
widespread piracy on the Internet, a loose amalgam of thousands of computer
networks.

The Internet, which began as a Unix-oriented, university-based communi-
cations network, now reaches into corporate and government sites in 110
countries and is growing at a rapid pace.

The software theft, according to Andrew Patrizio, an editor at the
_Software Industry Bulletin_, has been found on certain channels, particularly
the warez channel.

"People are openly talking about pirating software; there seems to be no
one there to monitor it", Patrizio said.

A major problem with the Internet is that the "sites" from where the
software is being illegally downloaded can physically be located in countries
that do not have strong antipiracy laws, such as Italy or the former Soviet
Union. The Internet also has no central administrator or system operator.

"Policing the entire Internet would be a job", said Peter Beruk,
litigation manager for the SPA, in Washington. "My feeling would be to target
specific sections that are offering a lot of commercial software free for the
download", he said.

---------------------------------------------------------------------------

Socialite's Son Will Have To Pay $15,000 To
Get His Impounded 1991 BMW Back March 23, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By John Makeig (Houston Chronicle)(Page 14A)

Kenyon Shulman, son of Houston socialite Carolyn Farb will have to pay
15 thousand dollars to get back his 1991 BMW 325i after being impounded
when Houston police found 400 doses of the drug ecstasy in its trunk.

This is just the latest brush with authorities for Shulman who in 1988
was raided by Harris County authorities for using his personal computer
to crack AT&T codes to make free long distance calls.

--------------------------------------------------------------------------

Austin Man Gets 10 Years For Computer Theft, Sales May 6, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By Jim Phillips (Austin American Statesman)(Page B3)

Jason Copson, who was arrested in July under his alias Scott Edward Berry,
has been sentenced to 10 years on each of four charges of burglary and
one count of assault. The charges will run concurrently. Copson still
faces charges in Maryland and Virginia where he served a prison term and
was serving probation for dealing in stolen goods. Police arrested Copson
and Christopher Lamprecht on July 9 during a sting in which the men tried to
sell computer chips stolen from Advanced Micro Devices.

---------------------------------------------------------------------------
Treasury Told Computer Virus Secrets June 19, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By: Joel Garreau (Washington Post) (Page A01)

For more than a year, computer virus programs that can wreak havoc with
computer systems throughout the world were made available by a U.S. government
agency to anyone with a home computer and a modem, officials acknowledged this
week.

At least 1,000 computer users called a Treasury Department telephone number,
spokesmen said, and had access to the virus codes by tapping into the
department's Automated Information System bulletin board before it was muzzled
last month.

The bulletin board, run by a security branch of the Bureau of Public Debt in
Parkersburg, W.Va., is aimed at professionals whose job it is to combat such
malicious destroyers of computer files as "The Internet Worm," "Satan's Little
Helper" and "Dark Avenger's Mutation Engine." But nothing blocked anyone else
from gaining access to the information.

Before the practice was challenged by anonymous whistleblowers, the bulletin
board offered "recompilable disassembled virus source code"-that is, programs
manipulated to reveal their inner workings. The board also made available
hundreds of "hackers' tools"-the cybernetic equivalent of safecracking aids.
They included "password cracker" software-various programs that generate huge
volumes of letters and numbers until they find the combination that a computer
is programmed to recognize as authorizing access to its contents-and "war
dialers," which call a vast array of telephone numbers and record those hooked
to a computer.

The information was intended to educate computer security personnel,
according to Treasury spokesmen. "Until you understand how penetration is done,
you can't secure your system," said Kim Clancy, the bulletin board's operator.

The explosion of computer bulletin boards-dial-up systems that allow users
to trade any product that can be expressed in machine-readable zeros and
ones-has also added to the ease of virus transmission, computer analysts say.
"I am Bulgarian and my country is known as the home of many productive virus
writers, but at least our government has never officially distributed viruses,"
wrote Vesselin Vladimirov Bontchev of the Virus Test Center of the University
of Hamburg, Germany.

At first, the AIS bulletin board contained only routine security alert
postings. But then operator Clancy "began to get underground hacker files and
post them on her board," said Bruce Sterling, author of "The Hacker Crackdown:
Law and Disorder on the Electronic Frontier." "She amassed a truly impressive
collection of underground stuff. If you don't read it, you don't know what's
going to hit you."

Clancy, 30, who is a former Air Force bomb-squad member, is highly regarded
in the computer security world. Sterling, one of the nation's foremost writers
about the computer underground, called her "probably the best there is in the
federal government who's not military or NSA (National Security Agency).
Probably better than most CIA."

Clancy, meanwhile, is staying in touch with the underground. In fact, this
week, she said, she was "testing a product for some hackers." Before it goes
into production, she will review it to find potential bugs. It is a new war
dialer called "Tone-Loc." "It's an extremely good tool. Saves me a lot of
trouble. It enables me to run a hack against my own phone system faster" to
determine points of vulnerability.

-----------------------------------------------------------------------------

[AGENT STEAL -- WORKING WITH THE FEDS]


IN THE UNITED STATES DISTRICT COURT

FOR THE NORTHERN DISTRICT OF TEXAS

DALLAS DIVISION
-----------------------------------

THE UNITED STATES OF AMERICA *
*
V. * CRIMINAL NO. 3-91-194-T
* (FILED UNDER SEAL)
JUSTIN TANNER PETERSEN (1) *

JOINT MOTION TO SEAL

COMES NOW the United States of America, by its United

States Attorney, at the request of the defendant, and hereby

requests that this Honorable Court seal the record in this case.

In support thereof, the United States states the following:

1. The case is currently being transferred to the

Middle District of California for plea and disposition pursuant

to Federal Rule of Criminal Procedure 20;

2. The defendant is released on bond by the United

States District Court for the Middle District of California;

3. The defendant, acting in an undercover capacity,

currently is cooperating with the United States in the

investigation of other persons in California; and

4. The United States believes that the disclosure of

the file in this case could jeopardize the aforesaid

investigation and possibly the life of the defendant.

Consequently, the United States requests that this Honorable

Court seal the record in this case.

Respectfully submitted,
MARVIN COLLINS
United States Attorney



LEONARD A. SENEROTE
Assistant United States Attorney
Texas State Bar No. 18024700
1100 Commerce Street, Room 16G28
Dallas, Texas 75242-1699
(214) 767-0951

CERTIFICATE OF CONFERENCE

The defendant joins in this motion.



LEONARD A. SENEROTE
Assistant United States Attorney


[The entire file of information gathered from the courts regarding
Agent Steal is available from Phrack for $5.00 + $2 postage]
-------------------------------------------------------------------------

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT