Copy Link
Add to Bookmark
Report

Phrack Inc. Volume 04 Issue 44 File 27

eZine's profile picture
Published in 
Phrack Inc
 · 5 years ago

  

==Phrack Magazine==

Volume Four, Issue Forty-Four, File 27 of 27

PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN
PWN PWN
PWN Phrack World News PWN
PWN PWN
PWN Compiled by Datastream Cowboy PWN
PWN PWN
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


Feds Pull The Plug On Phiber Optik November 4, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Joshua Quitner (Newsday) (Page 57)

The biggest case of computer intrusion in US history drew to a close yesterday
when a young Elmhurst, Queens, man was sentenced to a year and a day in jail
for his part in an electronic gang that, for years, roamed the nation's
largest telephone and data networks.

Mark Abene, 21, renowned in the digital underground as Phiber Optik, was the
last of five young New York City men to plead guilty in federal court to one
felony count of conspiracy for being in a hacker group known as MOD.

Abene apologized for his deeds yesterday. "I'm just sorry they were
misconstrued as malicious in any way," he said in Manhattan's federal
district court.

Prosecutors claimed that the young men rumbled on computer networks,
disconnecting other hackers' phone service and posting embarrassing
information culled from confidential credit networks like TRW on
underground bulletin boards. They also used their power skills to get
telephone numbers or credit reports for celebrities, including Julia
Roberts, John Gotti, Geraldo Rivera, Christina Applegate and Mad Magazine
founder William Gaines.

John Lee, 22, a co-defendant is now serving a one year sentence in a
"shock incarceration" boot camp in Lewisburg, PA. Lee and Julio Fernandez,
18, were the only gang members who made money from the two years of
break-ins.

In addition to Lee and Fernandez, Paul Stira, 23, of Cambria Heights,
Queens, and Elias Ladopoulos, 24, of Jamaica, Queens, are serving six-month
sentences in federal prisons in Pennsylvania. Fernandez has been cooperating
with authorities and is not expected to be jailed.

-------------------------------------------------------------------------------

Computer Caper Is Unpluged
~~~~~~~~~~~~~~~~~~~~~~~~~~ October 1, 1993
by Tim Bryant (St. Louis Dispatch) (Page A1)

Investigators said 18-year-old computer hacker Paul J. Gray of Creve Coeur,
MO, was arrested on a state charge of tampering with computer data, a
misdemeanor. The college freshman reportedly used his home computer to
spy electronically on files of a federal appeals court and charge
long-distance telephone calls to Mercantile Bank

-------------------------------------------------------------------------------

Teen Hacker Admits Having Illegal Credit Information June 17, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by James McClear (Detroit News) (Page B7)

Ander Monson, 18, of Houghton, MI, whose electronic misadventures uploaded
him into the high-tech world of computer fraud, pleaded guilty in Oakland
County Probate Court to illegal possession of credit card information.

-------------------------------------------------------------------------------

In The Jungle Of MUD September 13, 1993
~~~~~~~~~~~~~~~~~~~~
by Ellen Germain (Time) (Page 61)

Virtual worlds you can hook into--and get hooked on--are the latest
rage on the computer networks.

[Ah, yes, Virtual Reality as perceived through the minds of the computer
illiterate. But wait, it's electronic crack! Keep an eye out for your
children!]

-------------------------------------------------------------------------------

NCIC Abuse - Is Legislation The Answer October, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Brian Miller

Confidential information is being illegally released from the National
Crime Information Center network. But abuse of the system is difficult
to detect, and those caught are seldom punished.

A former law enforcement officer tracked town his ex-girlfriend with
information from an FBI-run law enforcement information system. Then
he killed her.

A terminal operator in Pennsylvania used the same system to conduct
background searches for her drug dealing boyfriend to see if his customers
were undercover agents.

It is hard to trace abuse to a single user because many agencies don't
require personal access codes which would keep track of who made specific
inquiries on the system and when they occurred. The General Accounting
Office polled all the states and found that 17 don't require a personal
code to access the NCIC. Most of these had an identifier only for the
terminal or agency accessing the system.

And if someone is caught abusing the system, they are seldom charged with
a crime. The GAO found that the most common penalty was a reprimand, with
some suspensions and firings. Of the 56 cases of abuse found by the GAO,
only seven people were prosecuted.

The FBI cannot force the states to adopt certain security measures
because compliance with the guidelines is voluntary. The reason for this is
that the guts of the NCIC come from the states, and the FBI simply
maintains the network.

"The main thing that can be done today is to enforce the law, and create
stronger penalties for abusing the system," said Marc Rotenbertg of
Computer Professionals for Social Responsibility, an advocacy group
based in Palo Alto, California.

-------------------------------------------------------------------------------

Live Wires September 6, 1993
~~~~~~~~~~
by Barbara Kantrowitz et.al. (Time) (Page 63)
&
Technoid Circus
~~~~~~~~~~~~~~~
by Rex Weiner (Spin) (Page 72) September, 1993

[K-K00l cYbUR P|_|n|< aRt1Cl3zzzz

Jump On The Cyber Bandwagon!

More Journalists ride that old info highway straight to HELL!]


** BUT WAIT! A "Cyber" article we can all dig! **

Speciale Cyber Settembre, 1993
~~~~~~~~~~~~~~
di Sergio Stingo (King) (P. 131)

Il cyberpunk: tutti ne parlano, ma pochi sanno cosa sia veramente. Libri
elettronici? Scenari inquietanti del futuro prossimo venturo? Conferenze
telematiche? Nuovi tipi di abbigliamento usa-e-getta? La piu' grande
rivoluzione democratica dei nostri anni? Una rivoluzione strisciante e
silenziosa? Ia nostro stingo, sempre curioso del <<nuovo>>, S'e' messo
a girare l'italia per iundagare il fenomeno. E' stato come scoperchiare
una pentola in ebollizione. Piu' incontrava <<cyber>> e piu' scopriva che
c'era da scoprire. Dal teorico della <<brain machine>>, che sperimenta
l'oggetto misterioso tra discoteche e universita', alla prima galleria
dove sono esposte opere di hacker art. Dalle riviste-bandiera del cyber,
come <<decoder>>, alle band che stanno inventando una nuova musica. Per non
parlare del sesso, che grazie alla tecnologia cerca di ampliare la
gamma delle sensazioni possibili. Insomma, il viaggio oltre i confini di
questo mondo e' stato talmente ricco e avventuroso, che abbiamo dovuto
suddividere il reportage in due puntate. In questo numero presentiamo
la prima. E, come si dice tra cybernauti, buona navigazione.

[I don't know what that says, but its in another language, so it has to
be cooler than the American CyberCrap]

-------------------------------------------------------------------------------

Security Products Abound, But Is Toll Fraud Too Tough? August 30, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Dan O'Shea (Telephony) (Page 7)

Telecommunications toll fraud is an increasingly popular crime that
collectively costs its victims billions of dollars each year. Although
carriers have responded with a wave of security products and services,
the problem might be much bigger than was once thought.

Some carriers claim that industry wide toll fraud losses amount to between
$2 billion and $5 billion a year, but the true figure is closer to $8 billion,
according to Bernie Milligan, president of CTF Specialists Inc.,
a consulting group that studies toll fraud and markets security services to
large corporate telecommunications users. [ed: remember HoHo Con? Yes...THAT
Bernie]

Toll fraud involving calls coming into AT&T's 800 network dropped 75% since
the introduction of NetProtect, while Sprint estimates a 95% decrease from
last year (since the introduction of their fraud detection service). Average
losses across the industry have plummeted from $120,000 per incident to
$45,000.

Despite the offensive against telecom fraud, the problem persists and is
becoming more frequent, and new technologies will only represent potential
new adventures for hackers, CFT's Milligan said. Hacker activity is growing
at an annual rate of 35%. Some 65% to 80% of toll fraud involves
international calling, and fraud occurs on a much wider scale than just
inbound 800 calls, Milligan said. So, while losses of this type of fraud
drop, collective fraud losses are increasing by 25% each year. Customers
are still liable financially in toll fraud cases, and the carriers continue
to get paid.

-------------------------------------------------------------------------------

Misfit Millionaires December, 1993
~~~~~~~~~~~~~~~~~~~
by Steve Fishman (Details) (Page 158)

[Author profiles several of the early Microsoft programmers, namely
Richard Brodie, Jabe Blumenthal, Kevin DeGraaf, Neil Konzen and Doug
Klunder]

-------------------------------------------------------------------------------

Intercourse With Lisa Palac 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Melissa Plotsky (Axcess) (Page 62)
&
Turned On By Technology In The World Of Cybersex August 30, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Marco R. della Cava (USA Today) (Page 4D)

[An interview and an overview dealing with online nastiness. Lisa Palac
editor of Future Sex and producer of Cyborgasm talks about all kinds of
stuff. As a regular peruser of Future Sex (for the articles of course)
I can't help but wonder why we haven't seen HER naked yet. Email
her at futursex@well.sf.ca.us and demand some gifs.]

-------------------------------------------------------------------------------

Don't Try This At Home
~~~~~~~~~~~~~~~~~~~~~~ August, 1993
(Compute) (Page 62)

Welcome to desktop forgery.

Susan Morton, senior forensic document examiner with the US Postal Service
in San Francisco, has seen gangs travelling the country packing computers,
scanners, and laser printers. Arriving in town, their first move is to rob
a mailbox to acquire some checks that were mailed to, say, a local utility
company. They will copy the account and routing code off some citizen's
check and decide what branch bank that person probably uses. Then they forge
a large corporate or government check to that person, using information from
other checks they found in the mail. Packing a forged ID, a gang member
will then go to a branch across town where presumably nobody knows the
citizen and deposit part of that forged check. The check may be for $5000,
of which the forger takes $2000 as cash, smiles and leaves.

One check forging gang was chased across Texas for about six months in the
late 1980s, recalls Robert Ansley, corporate security manager for Dell
Computer in Austin, Texas, then with the Austin police department. Armed
with a stolen Macintosh and an ID maker stolen from a highway patrol
substation, they passed more than $100,000 in bogus checks in Austin alone.

Sources say other gangs have used laser printers to forge security ID
badges to get into office buildings and steal the computers, nodding at the
friendly security guard at the front desk while trudging out with their
arms full.

"We have been urging corporations to move forward with EDI (Electronic
Data Interchange) for more and more of their business transactions and
avoid paper, since it will become so vulnerable," says Donn Parker,
computer crime expert with SRI International in Menlo Park, California.

In 1991, the Secret Service busted 66 traditional counterfeiting operations,
while seizing 52 office machines that had been used for counterfeiting

-------------------------------------------------------------------------------

Subduing Software Pirates October, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~
by Suzanne Weisband and Seymour Goodman (Technology Review) (Page 30)

[The software manufacturers claim they lose between 9 and 12 billion
annually. Thank GOD for the SPA and the BSA. Like they are go to
Singapore or Hong Kong with guns and get the REAL culprits. Noooo.
Let's raid BBSes and businesses.

Their people at COMDEX told me they really weren't interested in
taking my money to help me combat Phrack Piracy. I think we all know
where THEIR interests lie.]

-------------------------------------------------------------------------------

Mindvox: Urban Attitude Online November, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Charles Platt (Wired) (Page 56)

[Another of those cute Mindvox RULES articles. "Fancher looked too neat,
clean, and classy to be a hacker, but he enjoyed the cut-and-thrust of
online jousting as much as anyone." But wait, there's a little
name dropping too: Wil Wheaton, Kurt Larson, Billy Idol, THE LEGION OF DOOM!

Don't get me wrong, I love Vox. And I really like the author of this story's
last book "The Silicon Man," I just get kinda edgy about stuff in Wired.

Favorite quote: "Unix is arcane," says Bruce, "and it's weird, and most
users don't want to deal with it." I know I don't. Not.]
-------------------------------------------------------------------------------

Intel To Protect Chips October 22, 1993
~~~~~~~~~~~~~~~~~~~~~~
(Newswire Sources)

One of the nation's largest manufacturers of computer chips said Friday it
will start to put serial numbers on its products in an effort to stem the
rising tide of robberies. Intel Corp. said it was taking its actions
after a flurry of armed takeover robberies at warehouses in California's
Silicon Valley over the last six months.

What the robbers are after is microprocessors -- the brains that power
personal computers. Among their favorite targets has been Intel's 486
microprocessor.

Julius Finkelstein, head of Santa Clara's High Tech Crime Task Force,
called chip robberies "the gang crime of the 1990s." "They are just
as valuable as cocaine," he said. "But they are easier to get rid of
and if you are caught the penalties aren't as severe."

The gangs, Finkelstein said, are Asian, well organized and very
knowledgable about computer components. They generally drive up to a
warehouse door as if coming for a shipment, but once inside pull out
their weapons and force the employees to the floor.

Last month, a takeover robbery at the Wylie Laboratories Electronic
Marketing Group in Santa Clara netted thieves an estimated $1 million in
chips. Finkelstein said that robbery took only about 15 minutes.

-------------------------------------------------------------------------------

Chip Robberies Continue November 5, 1993
~~~~~~~~~~~~~~~~~~~~~~~
(Newswire Sources)

Authorities said a gang of Vietnamese-speaking bandits staged a violent
takeover robbery of a San Jose computer parts company Thursday, wounding
one man and escaping with an undisclosed amount of electronic equipment.

Lt. Rob Davis said the robbery began at 1:01 a.m. when as many as
five gunmen forced their way into the Top Line Electronics Co., a
computer board manufacturer. The bandits rounded up the employees and
beat them in an attempt to find where the computer parts were stored.

One employee was shot in the hip as he tried to escape. Davis said
the man was treated at a local hospital and was listed in stable
condition.

-------------------------------------------------------------------------------

Hacker Revelled In Spotlight, Court Told August 23, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(The Age)

A hacker who broke into a computer at NASA in the United States,
and contemplated sending it a message not to launch a space shuttle, was
delighted with the effect he was having, the County Court was told yesterday.

The prosecutor, Mr Richard Maidment, said that in a three-way
conversation between Nahshon Even-Chaim, David John Woodcock
and another computer hacker, Woodcock discussed sending a message
to a computer at NASA to stop the launch of a space shuttle, after
Woodcock talked about the shuttle Challenger, which blew up several
years before, and said "I have got to do something about NASA."

Even-Chaim, 22, formerly of Narong Road, Caulfield, yesterday
pleaded guilty to 15 charges relating to unauthorized obtaining,
altering, inserting, and erasing of data stored in a computer, and
the interfering and obstruction of the lawful use of a computer.

Woodcock, 25, formerly of Ashleigh Avenue, Frankston, pleaded
guilty to two counts of being knowingly concerned in the obtaining
of unauthorized access by Even-Chaim to data stored in a computer.

The court was told that a co-offender, Richard Martin Jones
was earlier sentenced to six months jail, but was released on a $500,
six-month good behavior bond.

The court was told that Even-Chaim obtained free use of telephone
lines for many hours to connect his home computer to other systems
in the United States.

Mr. Maidment said that Even-Chaim, Woodcock, and Jones, who
collectively called themselves "The Realm", were arrested in April 1990
by the Australia Federal Police after an investigation that began with
information received from the United States Secret Service.

-------------------------------------------------------------------------------

The Last Hacker September 26, 1993
~~~~~~~~~~~~~~~
by Jonathan Littman (LA Times)

[This is the bet article I've seen yet about Kevin Poulsen. Please go
find it and read it. It covers Poulsen from beginning to end. All the
crazy stunts, the life on the run, the show down with the feds. Everything.
Here is a small excerpt.]

KIIS-Fm called it a "Win a Porsche by Friday": eight Porsches - about
$400,000 worth of steel, leather and status - given away, one a week. You could
hardly live or work in Los Angeles without being caught up in the frenzy. It
seems that the gleaming, candy-red convertibles were plastered on nearly every
billboard and bus in town. Listeners were glued to KIIS, hoping to make the
102nd call after Dees spun the third song in the magical series.

Housewives, businessmen, students and contest freaks jammed the lines with
their car phones and auto-dialers. They all had hopes, but one 24-year-old high
school dropout had a plan. America's most wanted hacker and his associates
sat by their computers and waited. On the morning of June 1, 1990 KIIS played
'Escapade,' 'Love Shack; and then, yes, "Kiss." "We blew out the phone lines,"
every line was ringing says Karen Tobin, the stations promotional director. "We
picked up the calls and counted."

The hacker was counting too. At the precise moment Price's "Kiss" hit the air
he seized control of the station's 25 phone liens, blocking out all calls but
his own. Then the man, who identified himself as Michael B. Peters, calmly
dialed the 102nd call and won a Porsche 944 S2.

It was child's play. Especially for Kevin Lee Poulsen. Computer hacking had
once seemed an innocent obsession to Poulsen, a native of Pasadena, but now it
was his life, and it had taken him over the line. This October, Poulsen will
face the first of two trials, one in San Jose and another in Los Angeles, that
federal prosecutors say are critical to the government. Because of the
seriousness of his alleged breaches of national security, they intend to use the
case as an example to the hacker underground.

As a teen-ager, Poulsen had burrowed deep into the giant switching networks
of Pacific Bell, exploring and exploiting nearly every element of its powerful
computers, from the common systems responsible for creating, changing and
maintaining phone service to the shadow systems that guard the secrets of
national security, according to accusations in a federal indictment. The U.S.
attorney in San Jose says that Poulsen had wiretapped the intimate phone calls
of a Hollywood starlet, allegedly conspired to steal classified military orders,
and reportedly uncovered unpublished telephone numbers for the Soviet Consulate
in San Francisco.

-------------------------------------------------------------------------------


← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT