Copy Link
Add to Bookmark
Report

Sphear_0002

eZine's profile picture
Published in 
Sphear
 · 5 years ago

  


ÚÁÁÁÁÁÁ¿
´SphearÃ
ÀÂÂÂÂÂÂÙ

\_\ \__\ \ \ \_\ \ \__\
\/ / / / / / /\ / /
\ \/_\/ \/_\/ \/_\ \/__\ \/_\/
\_\/ \/ \/ \/ \/_\ \/ \/ \/ \

Digital Zine

Phreaking
Hacking
Anarchy
(And AnyThing Else P/H/A/C/C/V)
Editor: Signal
Co-Editor: Mustang

Sphear can be reached at:
[system@axposf.pa.dec.com]
[sphear.digizine@lambada.oit.unc.edu]
No Flame Mail or Hate Mail Please

(If You Dont Like It.. Don't Read it);
[All Information Contained in This File Is]
[ For Informational Purposes ONLY ]
[In Other Words: If You Fuck Up, Its Your ]
[Problem, not Ours. ]

Issue #2
[02.14.94]
ÚÄÄÄÄÄÄÄÄ¿
³Contents³
ÄÅÄÄÄÄÄÄÄÄÅÄ
³Articles³
ÀÄÄÄÄÄÄÄÄÙ
Voice Mail Boxes
Writers Wanted
RedBox Legality
Clinton & Clipper
2600 Congressional Testimony (1240Lines)

ÚÁÁÁÁÁÁ¿
´PhilezÃ
ÀÂÂÂÂÂÂÙ
CaveAsp.Zip
CaveTmc.ZIp

³Voice Mail Boxes³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ by Raven ³



Ok, This is a list of several popular Voice Mail systems, their default
passwords, and maybe a little info about the actual system. Voice Mail
is my second favorite way to contact people in the h/p community, next to
e-mail.. This is more personal than e-mail, but is also just as anonymous,
and just as safe..

1. The Message Center (TMC):
Hit '*' when you hear the greeting of the box, and you'll be prompted
for your password, hit '*' again. You'll hear 'Welcome to The Message
Center.' You're now in the main menu-thing,where you will continue
to enter box numbers in hopes of finding a virgin box. When you hear
the tmc bitch say something like 'Please leave your name and a short
message for box number XXXXXXX..' then you've found a virgin box, hit
'*' to enter the box, you should be greeted, and given step by step
instructions on setting up your box for the first time <how lovely!>.
If you happen to get prompted for your password instead of being given
instructions, then try anothe box, if it happens again, then you're
basically screwed, meaning the admin put a password on all the boxes,
the only thing left for you to really do is social engineer it..
Also, when you've hit 3 incorrect box numbers from the main, you'll
probably hear 'Thank you, goodbye.' as it tries to hang up on you,
to avoid this, simply press '*'...
**Note**: Caveman wrote an excellent text file on TMC, that is a must
for anyone interested, and who lacks experience.. He has
also done a text on aspens <blegh>..

2. Meridian Mail:
To enter mail system when you hear the box's greeting, hit '*1'. Then
enter the mail box number plus the pound key ('#'). The default
passwords are the same as the mail box number, on meridians.
There is a known way to dialout off of a meridian voice mail, but it
is quite hard to do (you have to dial faster than redial on your phone,
and you have to have the right codes..)

3. Audix:
Just like a Meridian, but to enter the system, hit '*7'.
Simple, eh?

4. Industrial:
Enter the system using the pound key ('#'). Default passwords are
the mailbox number or '0000'.

5. Pactel:
Use pound to enter the system. Default password '0000'.

6. The Voice Mail System:
Use pound to enter your box. Enter the box number. Default password
is '1111'.

That's it. This is not ment to be a detailed text on how to identify
different systems, or whatnot.. This is to provide the basics of getting
into the box. There are several other common VMB systems, but, I fealt
that these were the most important. If you have any information on any
of the following systems : PhoneMail, Yamaha(tri-log), then please contact
me at [raven1@axposf.pa.dec.com]

-Raven


³ Writers Wanted ³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´

Sphear DigiZine, Is Looking for some good writers. Some
people who have technical knowledge, or people who acctually
hack or phreak. Any file donations would also be helpful.
Please mail [sphear.digizine@lambada.oit.unc.edu] with any
articles or UUEncoded Files. Sphear DigiZine is also an
editorial forum, in which people can express their views.



³Redbox Legality³
ÃÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ by Signal ³

These days, the question of possessing a 'RedBox' has become evermore
debateable. Some people say that merely owning a device doesnot constitute
fraud, and that it is analogous to owning a baseball bat or a kitchen knife.
It exists but yet is not illegal to possess. And the law only comes into play
when these objects are used in an illegal manner, such as assault, and murder.
Even the fact that a tone-dialer was modified would merely establish the point
that what i do with my tone-dialer is my business. In somecases where the
Redbox is a homemade creation, the redbox would merely be a device that
created sounds. It could not be considered an illegal or even fraudulent device
until it is applied in such a way. Although guns and other such dangerous
weapons need to be registered, one can not imagine registering a tone
-dialer or device that produces quarter-like tones. We must limit our minds to
such irrelevant questions such as whether or not owning a device, such as a
tone-dialer, is legal. The is no doubt that owning a device to produce tones
is not illegal, yet there are ignorant people out there that think owning such
a device is felony. If you thought about this logically you would see that
owning a redbox is not illegal, so long as the redbox is not
used in an illegal fashion. It would be perfectly legal to use
the redbox to kill a fly. But this brings up the question of
murder. 'The Killing of A Fly' and thus could be considered
illegal.


³Clinton & Clipper³
ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÙ


EFF Press Release Feb 4 '94 * DISTRIBUTE WIDELY *

At two briefings, Feb. 4, 1994, the Clinton Administration and various
agencies gave statements before a Congressional committee, and later
representatives of civil liberties organizations, industry
spokespersons and privacy advocates. The Electronic Frontier
Foundation's position, based on what we have seen and heard from the
Administration today, is that the White House is set on a course that
pursues Cold War national security and law enforcement interests to
the detriment of individual privacy and civil liberties.
The news is grim. The Administration is:
* not backing down on Clipper
* not backing down on key escrow
* not backing down on selection of escrow agents
* already adamant on escrowed key access procedures
* not willing to eliminate ITAR restrictions
* hiding behind exaggerated threats of "drug dealers" and "terrorists"
The material released to the industry and advocacy version of the
briefing have been placed online at ftp.eff.org (long before their
online availability from government access sites, one might add). See
below for specific details.
No information regarding the Congressional committee version of the
briefing has been announced. EFF Director Jerry Berman, who attended
the private sector meeting, reported the following:
"The White House and other officials briefed industry on its Clipper
chip and encryption review. While the review is not yet complete, they
have reached several policy conclusions. First, Clipper will be
proposed as a new Federal Information Processing Standard (FIPS) next
Wednesday. [Feb. 9] It will be "voluntary" for government agencies
and the private sector to use. They are actively asking other vendors
to jump in to make the market a Clipper market. Export licensing
processes will be speeded up but export restrictions will not be
lifted in the interests of national security. The reason was stated
bluntly at the briefing : to frustrate competition with clipper by
other powerful encryption schemes by making them difficult to market,
and to "prevent" strong encryption from leaving the country thus
supposedly making the job of law enforcement and intelligence more
difficult. Again in the interest of national security. Of course,
Clipper will be exportable but they would not comment on how other
governments will view this. Treasury and NIST will be the escrow
agents and Justice asserted that there was no necessity for
legislation to implement the escrow procedures.
"I asked if there would be a report to explain the rationale for
choosing these results - we have no explanation of the Administration's
thinking, or any brief in support of the results. They replied that
there would be no report because they have been unable to write one,
due to the complexity of the issue.
"One Administration spokesperson said this was the Bosnia of Telecomm-
unications. I asked, if this was so, how, in the absence of some
policy explanation, could we know if our policy here will be as
successful as our policy in Bosnia?"
The announcements, authorization procedures for release of escrowed keys,
and q-and-a documents from the private sector briefing are online at EFF.
They are:
"Statement of the [White House] Press Secretary" [White House]
file://ftp.eff.org/pub/EFF/Policy/Crypto/wh_press_secy.statement
"Statement of the Vice President" [very short - WH]
file://ftp.eff.org/pub/EFF/Policy/Crypto/gore_crypto.statement
"Attorney General Makes Key Escrow Encryption Announcements" [Dept. of Just.]
file://ftp.eff.org/pub/EFF/Policy/Crypto/reno_key_escrow.statement
"Authorization Procedures for Release of Encryption Key Components in
Conjunction with Intercepts Pursuant to Title III/State Statutes/FISA"
[3 docs. in one file - DoJ]
file://ftp.eff.org/pub/EFF/Policy/Crypto/doj_escrow_intercept.rules
"Working Group on Data Security" [WH]
file://ftp.eff.org/pub/EFF/Policy/Crypto/interagency_workgroup.announce
"Statement of Dr. Martha Harris Dep. Asst. Secy. of State for Polit.-Mil.
Affairs: Encryption - Export Control Reform" [Dept. of State]
file://ftp.eff.org/pub/EFF/Policy/Crypto/harris_export.statement
"Questions and Answers about the Clinton Administration's Encryption
Policy" [WH]
file://ftp.eff.org/pub/EFF/Policy/Crypto/wh_crypto.q-a
These files are available via anonymous ftp, or via WWW at:
http://www.eff.org/ in the "EFF ftp site" menu off the front page.
Gopher access:
gopher://gopher.eff.org/
Look in "EFF Files"/"Papers and Testimony"/"Crypto"
All seven of these documents will be posted widely on the net
immediately following this notice.
Contacts:
Digital Privacy: Jerry Berman, Exec. Director <jberman@eff.org>
Daniel J. Weitzner, Sr. Staff Counsel <djw@eff.org>
Archives: Stanton McCandlish, Online Activist <mech@eff.org>
General EFF Information: info@eff.org

Congressional Testimony
-----------------------

At long last, 2600 has obtained a transcript of the hearings from
last June where two members of congress - Edward J. Markey (D-MA)
and Jack Fields (R-TX) - launched into a tirade against the evils
of computer hackers and generally demonstrated their ignorance
on the subject and their unwillingness to listen to anything that
didn't match their predetermined conclusions. Those conclusions are
basically that 2600 Magazine is a manual for criminals and that
hackers are a blight on civilization. At least, that was my
interpretation, which is admittedly biased since I was on the
receiving end of this double dose of dogma. I'd be most interested
in hearing yours as would the rest of us at 2600. While you may
think that members of Congress would also be interested, I would
have to say it doesn't seem too likely. I was asked down there to
address the issue of new technology, its implications, and the
social benefits and dangers. That is what I addressed in my twenty
pages of written testimony and my opening remarks. What happened
during the hearing was like something out of the Geraldo show, only
worse. This was the Congress of the United States. Look for the
soundbites, the simplistic solutions, the demonization of a
perceived enemy, and the eagerness to legislate away the problems
and avoid the complex issues. It's too bad it took them three
quarters of a year to get this transcript to us.

To be official, this is the full transcript of all spoken testimony
from the second panel on June 9, 1993. (If you want a copy of
my written testimony, email me at emmanuel@well.sf.ca.us.) This
is a literal transcript, meaning that any and all factual
or technical inaccuracies are reproduced without comment. The
panel you'll see being referred to that was on first was one on
the Clipper Chip, a subject these members of Congress were a bit
more enlightened on. To obtain your own copy of this hearing and
the other related ones, contact the U.S. Government Printing
Office (202-512-0000) and ask for Serial No. 103-53, known as
"Hearings Before The Subcommittee on Telecommunications and
Finance of the Committee on Energy and Commerce, House of
Representatives, One Hundred Third Congress, First Session,
April 29 and June 9, 1993".

----------------------------------------------------------------------

It was a very hot day in June....

Mr. MARKEY. If you could close the door, please, we could move
on to this very important panel. It consists of Mr. Donald Delaney,
who is a senior investigator for the New York State Police. Mr.
Delaney has instructed telecommunications fraud at the Federal Law
Enforcement Training Center and has published chapters on computer
crime and telecommunications fraud. Dr. Peter Tippett is an expert
in computer viruses and is the director of security products for
Symantec Corporation in California. Mr. John J. Haugh is chairman
of Telecommunications Advisors Incorporated, a telecommunications
consulting firm in Portland, Oreg., specializing in network
security issues. Dr. Haugh is the editor and principal author of
two volumes entitled "Toll Fraud" and "Telabuse" in a newsletter
entitled "Telecom and Network Security Review." Mr. Emmanuel
Goldstein is the editor-in-chief of "2600: The Hacker Quarterly."
Mr. Goldstein also hosts a weekly radio program in New York called
"Off The Hook." Mr. Michael Guidry is chairman and founder of the
Guidry Group, a security consulting firm specializing in
telecommunications issues. The Guidry Group works extensively with
the cellular industry in its fight against cellular fraud.
We will begin with you, Mr. Delaney, if we could. You each
have 5 minutes. We will be monitoring that. Please try to abide by
the limitation. Whenever you are ready, please begin.
STATEMENTS OF DONALD P. DELANEY, SENIOR INVESTIGATOR, NEW YORK
STATE POLICE; JOHN J. HAUGH, CHAIRMAN, TELECOMMUNICATIONS ADVISORS;
EMMANUEL GOLDSTEIN, PUBLISHER, 2600 MAGAZINE; PETER S. TIPPETT,
DIRECTOR, SECURITY AND ENTERPRISE PRODUCTS, SYMANTEC CORP.; AND
MICHAEL A. GUIDRY, CHIEF EXECUTIVE OFFICER, THE GUIDRY GROUP
Mr. DELANEY. Thank you, Mr. Chairman, for the invitation to
testify today.
As a senior investigator with the New York State Police, I
have spent more than 3 years investigating computer crime and
telecommunications fraud. I have executed more than 30 search
warrants and arrested more than 30 individuals responsible for the
entire spectrum of crime in this area.
I authored two chapters in the "Civil and Criminal
Investigating Handbook" published by McGraw Hill entitled
"Investigating Computer Crime and Investigating Telecommunications
Fraud." Periodically I teach a 4-hour block instruction on
telecommunications fraud at the Federal Law Enforcement Training
Center in Georgia.
Although I have arrested some infamous teenagers, such as
Phiber Optic, ZOD, and Kong, in some cases the investigations were
actually conducted by the United States Secret Service. Because
Federal law designates a juvenile as one less than 18 years of age
and the Federal system has no means of prosecuting a juvenile,
malicious hackers, predominately between 13 and 17 years of age,
are either left unprosecuted or turned over to local law
enforcement. In some cases, local law enforcement were either
untrained or unwilling to investigate the high-tech crime.
In examining telecommunications security, one first realizes
that all telecommunications is controlled by computers. Computer
criminals abuse these systems not only for free service but for a
variety of crimes ranging from harassment to grand larceny and
illegal wiretapping. Corporate and Government espionage rely on the
user-friendly networks which connect universities, military
institutions, Government offices, corporate research and
development computers. Information theft is common from those
companies which hold our credit histories. Their lack of security
endanger each of us, but they are not held accountable.
One activity which has had a financial impact on everyone
present is the proliferation of call sell operations. Using a
variety of methods, such as rechipped cellular telephones,
compromised PBX remote access units, or a combination of cellular
phone and international conference lines, the entrepreneur deprives
the telephone companies of hundreds of millions of dollars each
year. These losses are passed on to each of us as higher rates.
The horrible PBX problem exists because a few dozen finger
hackers crack the codes and disseminate them to those who control
the pay phones. The major long distance carriers each have the
ability to monitor their 800 service lines for sudden peaks in use.
A concerted effort should be made by the long distance carriers to
identify the finger hackers, have the local telephone companies
monitor the necessary dialed number recorders, and provide local
law enforcement with timely affidavits. Those we have arrested for
finger hacking the PBX's have not gone back into this type of
activity or crime.
The New York State Police have four newly trained
investigators assigned to investigate telecommunications fraud in
New York City alone. One new program sponsored by AT&T is
responsible for having trained police officers from over 75
departments about this growing blight in New York State alone.
Publications, such as "2600," which teach subscribers how to
commit telecommunications crime are protected by the First
Amendment, but disseminating pornography to minors is illegal. In
that many of the phone freaks are juveniles, I believe legislation
banning the dissemination to juveniles of manuals on how to commit
crime would be appropriate.
From a law enforcement perspective, I applaud the proposed
Clipper chip encryption standard which affords individuals
protection of privacy yet enables law enforcement to conduct
necessary court-ordered wiretaps, and with respect to what was
being said in the previous conversation, last year there were over
900 court-ordered wiretaps in the United States responsible for the
seizure of tons of illicit drugs coming into this country, solving
homicides, rapes, kidnappings. If we went to an encryption standard
without the ability for law enforcement to do something about it,
we would have havoc in the United States -- my personal opinion.
In New York State an individual becomes an adult at 16 years
old and can be prosecuted as such, but if a crime being
investigated is a Federal violation he must be 18 years of age to
be prosecuted. Even in New York State juveniles can be adjudicated
and given relevant punishment, such as community service.
I believe that funding law enforcement education programs
regarding high-tech crime investigations, as exists at the Federal
Law Enforcement Training Center's Financial Frauds Institute, is
one of the best tools our Government has to protect its people with
regard to law enforcement.
Thank you.
Mr. WYDEN [presiding]. Thank you very much for a very helpful
presentation.
Let us go next to Mr. Haugh.

We welcome you. It is a pleasure to have an Oregonian,
particularly an Oregonian who has done so much in this field, with
the subcommittee today. I also want to thank Chairman Markey and
his excellent staff for all their efforts to make your attendance
possible today.
So, Mr. Haugh, we welcome you, and I know the chairman is
going to be back here in just a moment.
STATEMENT OF JOHN J. HAUGH
Mr. HAUGH. Thank you, Mr. Wyden.
We expended some 9,000 hours, 11 different people, researching
the problem of toll fraud, penetrating telecommunications systems,
and then stealing long distance, leading up to the publication of
our two-volume reference work in mid-1992. We have since spent
about 5,000 additional hours continuing to monitor the problem, and
we come to the table with a unique perspective because we are
vender, carrier, and user independent.
In the prior panel, the distinguished gentleman from AT&T, for
whom I have a lot of personal respect, made the comment that the
public justifiably is confident that the national wire network is
secure and that the problem is wireless. With all due respect, that
is a laudable goal, but as far as what is going on today, just
practical reality, that comment is simply incorrect, and if the
public truly is confident that the wired network is secure, that
confidence is grossly misplaced.
We believe 35,000 users will become victimized by toll fraud
this year, 1993. We believe the national problem totals somewhere
between $4 and $5 billion. It is a very serious national problem.
We commend the chairman and this committee for continuing to
attempt to draw public attention and focus on the problem.
The good news, as we see it, over the last 3 years is that the
severity of losses has decreased. There is better monitoring,
particularly on the part of the long distance carriers, there is
more awareness on the part of users who are being more careful
about monitoring and managing their own systems, as a result of
which the severity of loss is decreasing. That is the good news.
The bad news is that the frequency is greatly increasing, so
while severity is decreasing, frequency is increasing, and I will
give you some examples. In 1991 we studied the problem from 1988 to
1991 and concluded that the average toll fraud loss was $168,000.
We did a national survey from November of last year to March of
this year, and the average loss was $125,000, although it was
retrospective. Today we think the average loss is $30,000 to
$60,000, which shows a rather dramatic decline.
The problem is, as the long distance thieves, sometimes called
hackers, are rooted out of one system, one user system, they
immediately hop into another one. So severity is dropping, but
frequency is increasing. Everybody is victimized. You have heard
business users with some very dramatic and very sad tales. The
truth is that everybody is victimized; the users are victimized;
the long distance carriers are victimized; the cellular carriers
are victimized, the operator service providers; the co-cod folks,
the aggregators and resellers are victimized; the LEC's and RBOC's,
to a limited extent, are victimized; and the vendors are victimized
by being drawn into the problem.
Who is at fault? Everybody is at fault. The Government is at
fault. The FCC has taken a no-action, apathetic attitude toward
toll fraud. That Agency is undermanned, it is understaffed, it is
underfunded, it has difficult problems -- no question about that --
but things could and should be done by that Agency that have not
been done.
The long distance carriers ignored the problem for far too
long, pretended that they could not monitor when, in fact, the
technology was available. They have done an outstanding job over
the last 2 years of getting with it and engaging themselves fully,
and I would say the long distance carriers, at the moment, are
probably the best segment of anyone at being proactive to take care
of the problem.
Users too often ignored security, ignored their user manuals,
failed to monitor, failed to properly manage. There has been
improvement which has come with the public knowledge of the
problem. CPE venders, those folks who manufactured the systems that
are so easy to penetrate, have done an abysmally poor job of
engineering into the systems security features. They have ignored
security. Their manuals didn't deal with security. They are
starting to now. They are doing a far better job. More needs to be
done.
The FCC, in particular, needs to become active. This committee
needs to focus more attention on the problem, jawbone, keep the
heat on the industry, the LEC's and the RBOC's in particular. The
LEC's and the RBOC's have essentially ignored the problem. They are
outside the loop, they say, yet the LEC's and the RBOC's collected
over $21 billion last year in access fees for connecting their
users to the long distance networks. How much of that $21 billion
did the LEC's and the RBOC's reinvest in helping to protect their
users from becoming victimized and helping to combat user-targeted
toll fraud? No more than $10 million, one-fifth of 1 percent.
Many people in the industry feel the LEC's and the RBOC's are
the one large group that has yet to seriously come to the table.
Many in the industry -- and we happen to agree -- feel that 3 to 4
percent of those access fees should be reinvested in protecting
users from being targeted by the toll fraud criminals.
The FCC should become more active. The jawboning there is at
a minimal level. There was one show hearing last October, lots of
promises, no action, no regulation, no initiatives, no meetings. A
lot could be done. Under part 68, for example, the FCC, which is
supposed to give clearance to any equipment before it is connected
into the network, they could require security features embedded
within that equipment. They could prevent things like low-end PBX's
from being sold with three-digit barrier codes that anyone can
penetrate in 3 to 5 minutes.
Thank you, Mr. Chairman.
Mr. MARKEY. THANK YOU, MR. HAUGH, VERY MUCH.
Mr. Goldstein, let's go to you next.

STATEMENT OF EMMANUEL GOLDSTEIN
Mr. GOLDSTEIN. Thank you, Mr. Chairman, and thank you to this
committee for allowing me the opportunity to speak on behalf of
those who, for whatever reason, have no voice.
I am in the kind of unique position of being in contact with
those people known as computer hackers throughout the world, and I
think one of the misconceptions that I would like to clear up, that
I have been trying to clear up, is that hackers are analogous to
criminals. This is not the case. I have known hundreds of hackers
over the years, and a very, very small percentage of them are
interested in any way in committing any kind of a crime. I think
the common bond that we all have is curiosity, an intense form of
curiosity, something that in many cases exceeds the limitations
that many of us would like to put on curiosity. The thing is
though, you cannot really put a limitation on curiosity, and that
is something that I hope we will be able to understand.
I like to parallel the hacker culture with any kind of alien
culture because, as with any alien culture, we have difficulty
understanding its system of values, we have difficulty
understanding what it is that motivates these people, and I hope to
be able to demonstrate through my testimony that hackers are
friendly people, they are curious people, they are not out to rip
people off or to invade people's privacy; actually, they are out to
protect those things because they realize how valuable and how
precious they really are.
I like to draw analogies to where we are heading in the world
of high technology, and one of the analogies I have come up with is
to imagine yourself speeding down a highway, a highway that is
slowly becoming rather icy and slippery, and ask yourself the
question of whether or not you would prefer to be driving your own
car or to be somewhere inside a large bus, and I think that is kind
of the question we have to ask ourselves now. Do we want to be in
control of our own destiny as far as technology goes, or do we want
to put all of our faith in somebody that we don't even know and
maybe fall asleep for a little while ourselves and see where we
wind up? It is a different answer for every person, but I think we
need to be able to at least have the opportunity to choose which it
is that we want to do.
Currently, there is a great deal of suspicion, a great deal of
resignation, hostility, on behalf of not simply hackers but
everyday people on the street. They see technology as something
that they don't have any say in, and that is why I particularly am
happy that this committee is holding this hearing, because people,
for the most part, see things happening around them, and they
wonder how it got to that stage. They wonder how credit files were
opened on them; they wonder how their phone numbers are being
passed on through A&I and caller ID. Nobody ever went to these
people and said, "Do you want to do this? Do you want to change the
rules?"
The thing that hackers have learned is that any form of
technology can and will be abused, whether it be calling card
numbers or the Clipper chip. At some point, something will be
abused, and that is why it is important for people to have a sense
of what it is that they are dealing with and a say in the future.
I think it is also important to avoid inequities in access to
technology, to create a society of haves and have-nots, which I
feel we are very much in danger of doing to a greater extent than
we have ever done before. A particular example of this involves
telephone companies, pay phones to be specific. Those of us who can
make a telephone call from, say, New York to Washington, D.C., at
the cheapest possible rate from the comfort of our own homes will
pay about 12 cents for the first minute. However, if you don't have
a phone or if you don't have a home, you will be forced to pay
$2.20 for that same first minute.
What this has led to is the proliferation of what are known as
red boxes. I have a sample (indicating exhibit). Actually, this is
tremendously bigger than it needs to be. A red box can be about a
tenth of the size of this. But just to demonstrate the sound that
it takes for the phone company to believe that you have put a
quarter into the phone (brief tone is played), that is it, that is
a quarter.
Now we can say this is the problem, this huge demonic device
here is what is causing all the fraud, but it is not the case. This
tape recorder here (same brief tone is played) does the same thing.
So now we can say the tones are the problem, we can make tones
illegal, but that is going to be very hard to enforce.
I think what we need to look at is the technology itself: Why
are there gaping holes in them? and why are we creating a system
where people have to rip things off in order to get the same access
that other people can get for virtually nothing?
I think a parallel to that also exists in the case of cellular
phones. I have a device here (indicating exhibit) which I won't
demonstrate, because to do so would be to commit a Federal crime,
but by pressing a button here within the course of 5 seconds we
will be able to hear somebody's private, personal cellular phone
call.
Now the way of dealing with privacy with cellular phone calls
is to make a law saying that it is illegal to listen. That is the
logic we have been given so far. I think a better idea would be to
figure out a way to keep those cellular phone calls private and to
allow people to exercise whatever forms of privacy they need to
have on cellular phone calls.
So I think we need to have a better understanding both from
the legislative point of view and in the general public as far as
technology in itself, and I believe we are on the threshold of a
very positive, enlightened period, and I see that particularly with
things like the Internet which allow people access to millions of
other people throughout the world at very low cost. I think it is
the obligation of all of us to not stand in the way of this
technology, to allow it to go forward and develop on its own, and
to keep a watchful eye on how it develops but at the same time not
prevent it through overlegislation or overpricing.
Thank you very much for the opportunity to speak.
Mr. MARKEY. Thank you, Mr. Goldstein.
Dr. Tippett.

STATEMENT OF PETER S. TIPPETT
Mr. TIPPET. Thank you.
I am Peter Tippett from Symantec Corporation, and today I am
also representing the National Computer Security Association and
the Computer Ethics Institute. Today is Computer Virus Awareness
Day, in case you are not aware, and we can thank Jack Fields,
Representative Fields, for sponsoring that day on behalf of the
Congress, and I thank you for that.
We had a congressional briefing this morning in which nine
representatives from industry, including telecommunications and
aerospace and the manufacturing industry, convened, and for the
first time were willing to talk about their computer virus problems
in public. I have got to tell you that it is an interesting
problem, this computer virus problem. It is a bit different from
telephone fraud. The virus problem is one which has probably among
the most misrepresentation and misunderstanding of these various
kinds of fraud that are going on, and I would like to highlight
that a little bit. But before I do, I would like to suggest what we
know to be the costs of computer viruses just in America.
The data I am representing comes from IBM and DataQuest, a
Dunn and Bradstreet company, it is the most conservative
interpretation you could make from this data. It suggests that a
company of only a thousand computers has a virus incident every
quarter, that a typical Fortune 500 company deals with viruses
every month, that the cost to a company with only a thousand
computers is about $170,000 a year right now and a quarter of a
million dollars next year. If we add these costs up, we know that
the cost to United States citizens of computer viruses just so far,
just since 1990, exceeds $1 billion.
When I go through these sorts of numbers, most of us say,
well, that hype again, because the way the press and the way we
have heard about computer viruses has been through hype oriented
teachings. So the purpose here is not to use hype and not to sort
of be alarmist and say the world is ending, because the world isn't
ending per se, but to suggest that there isn't a Fortune 500
company in the United States who hasn't had a computer virus
problem is absolutely true, and the sad truth about these viruses
is that the misconceptions are keeping us from doing the right
things to solve the problem, and the misconceptions stem from the
fact that companies that are hit by computer viruses, which is
every company, refused to talk about that until today.
There are a couple of other unique things and misconceptions
about computer viruses. One is that bulletin boards are the leading
source of computer viruses. Bulletin boards represent the infancy
of the superhighway, I think you could say, and there are a lot of
companies that make rules in their company that you are not allowed
to use bulletin boards because you might get a virus. In fact, it
is way in the low, single-digit percents. It may be as low as 1
percent of computer viruses that are introduced into companies come
through some route via a bulletin board.
We are told that some viruses are benign, and, in fact, most
people who write computer viruses think that their particular virus
is innocuous and not harmful. It turns out that most virus authors,
as we just heard from Mr. Goldstein, are, in fact, curious people
and not malicious people. They are young, and they are challenged,
and there is a huge game going on in the world. There is a group of
underground virus bulletin boards that we call virus exchange
bulletin boards in which people are challenged to write viruses.
The challenge works like this: If you are interested and
curious, you read the threads of communication on these bulletin
boards, and they say, you know, "If you want to download some
viruses, there's a thousand here on the bulletin board free for
your downloading," but you need points. Well, how do you get
points? Well, you upload some viruses. Well, where do you get some
viruses from? If you upload the most common viruses, they are not
worth many points, so you have to upload some really good, juicy
viruses. Well, the only way to get those is to write them, so you
write a virus and upload your virus, and then you gain acceptance
into the culture, and when you gain acceptance into the culture you
have just added to the problem.
It is interesting to know that the billion dollars that we
have spent since 1990 on computer viruses just in the United States
is due to viruses that were written in 1988 and 1987. Back then, we
only had one or two viruses a quarter, new, introduced into the
world. This year we have a thousand new computer viruses introduced
into our community, and it won't be for another 4 or 5 years before
these thousand viruses that are written now will become the major
viruses that hurt us in the future.
So virus authors don't believe they are doing anything wrong,
they don't believe that they are being harmful, and they don't
believe that what they do is dangerous, and, in fact, all viruses
are.
Computer crime laws don't have anything to do with computer
virus writers, so we heard testimony this morning from Scott
Charney of the Department of Justice who suggested that authorized
access is the biggest law you could use, and, in fact, most viruses
are brought into our organizations in authorized ways, because
users who are legitimate in the organizations accidentally bring
these things in, and then they infect our companies.
In summary, I think that we need to add a little bit of
specific wording in our computer crime legislation that relates
particularly to computer viruses and worms. We need, in particular,
to educate. We need to go after an ethics angle. We need to get to
the point where Americans think that writing viruses or doing these
other kinds of things that contaminate our computer superhighways
are akin to contaminating our expressways.
In the sixties we had a big "Keep America Beautiful" campaign,
and most Americans would find it unthinkable to throw their garbage
out the window of their car, but we don't think it unthinkable to
write rogue programs that will spread around our highway.
Thank you.
Mr. MARKEY. Thank you, Dr. Tippett.
Mr. Guidry.

STATEMENT OF MICHAEL A. GUIDRY
Mr. GUIDRY. Thank you, Mr. Chairman, for giving me the
opportunity to appear before this subcommittee, and thank you,
subcommittee, for giving me this opportunity.
The Guidry Group is a Houston-based security consulting firm
specializing in telecommunication issues. We started working in
telecommunication issues in 1987 and started working specifically
with the cellular industry at that time. When we first started, we
were working with the individual carriers across the United States,
looking at the hot points where fraud was starting to occur, which
were major metropolitan cities of course.
In 1991, the Cellular Telephone Industry Association contacted
us and asked us to work directly with them in their fight against
cellular fraud. The industry itself has grown, as we all know,
quite rapidly. However, fraud in the industry has grown at an
unbelievable increase, actually faster than the industry itself,
and as a result of that fraud now is kind of like a balloon, a
water balloon; it appears in one area, and when we try to stamp it
out it appears in another area.
As a result, what has happened is, when fraud first started,
there was such a thing as subscription fraud, the same type of
fraud that occurred with the land line telecommunication industry.
That subscription fraud quickly changed. Now what has occurred is,
technology has really stepped in.
First, hackers, who are criminals or just curious people,
would take a telephone apart, a cellular phone apart, and change
the algorithm on the chip, reinsert the chip into the telephone,
and cause that telephone to tumble. Well, the industry put its best
foot forward and actually stopped, for the most part, the act of
tumbling in cellular telephones. But within the last 18 months
something really terrible has happened, and that is cloning.
Cloning is the copying of the MIN and and ESN number, and, for
clarification, the MIN is the Mobile Identification Number that is
assigned to you by the carrier, and the ESN number is the
Electronic Cellular Number that is given to the cellular telephone
from that particular manufacturer. As a result, now we have
perpetrators, or just curious people, finding ways to copy the MIN
and the ESN, thereby victimizing the cellular carrier as well as
the good user, paying subscriber. This occurs when the bill is
transmitted by the carrier to the subscriber and he says something
to the effect of, "I didn't realize that I had made $10,000 worth
of calls to the Dominican Republic," or to Asia or Nicaragua or
just any place like that.
Now what has happened is, those clone devices have been placed
in the hands of people that we call ET houses, I guess you would
say, and they are the new immigrants that come into the United
States for the most part that do not have telephone subscriptions
on the land line or on the carrier side from cellular, and now they
are charged as much as $25 for 15 minutes to place a call to their
home.
Unfortunately, though, the illicit behavior of criminals has
stepped into this network also. Now we have gang members, drug
dealers, and gambling, prostitution, vice, just all sorts of crime,
stepping forward to use this system where, by using the cloning,
they are avoiding law enforcement. Law enforcement has problems, of
course, trying to find out how to tap into those telephone systems
and record those individuals.
Very recently, cloning has even taken a second step, and that
is now something that we term the magic phone, and the magic phone
works like this: Instead of cloning just one particular number, it
clones a variety of numbers, as many as 14 or 66, thereby
distributing the fraud among several users, which makes it almost
virtually impossible for us to detect at an early stage.
In response to this, what has happened? A lot of legitimate
people have started to look at using the illegitimate cellular
services. They are promised that this is a satellite phone or just
a telephone that if they pay a $2,500 fee will avoid paying further
bills. So now it has really started to spread.
Some people in major metropolitan areas, such as the
Southwest, Northeast, and Southeast, have started running their own
mini-cellular companies by distributing these cloning phones to
possible clients and users, collecting the fee once a month to
reactivate the phone if it is actually denied access.
The cellular industry has really stepped up to the plate I
think the best they can right now in trying to combat this by
working with the switch manufacturers and other carriers, 150 of
them to date with the cellular telephone industry, as well as the
phone manufacturers, and a lot of companies have started looking at
software technology. However, these answers will not come to pass
very soon. What we must have is strong legislation.
We have been working for the last 18 months, specifically with
the Secret Service and a lot of local, State, and Federal law
enforcement agencies. The Service has arrested over 100 people
involved in cellular fraud. We feel very successful about that. We
also worked with local law enforcement in Los Angeles to form the
L.A. Blitz, and we arrested an additional 26 people and seized 66
illegal telephones and several computers that spread this cloning
device.
However, now we have a problem. U.S. Title 18, 1029, does not
necessarily state cellular or wireless. It is very important, and
I pray that this committee will look at revising 1029 and changing
it to include wireless and cellular. I think wireless
communications, of course, like most people, is the wave of the
future, and it is extremely important that we include that in the
legislation so that when people are apprehended they can be
prosecuted.
Thank you, sir.
Mr. MARKEY. Thank you, Mr. Guidry, very much.
We will take questions now from the subcommittee members.
Let me begin, Mr. Delaney. I would like you and Mr. Goldstein
to engage in a conversation, if we could. This is Mr. Goldstein's
magazine, "The Hacker Quarterly: 2600," and for $4 we could go out
to Tower Records here in the District of Columbia and purchase
this. It has information in it that, from my perspective, is very
troubling in terms of people's cellular phone numbers and
information on how to crack through into people's private
information.
Now you have got some problems with "The Hacker Quarterly,"
Mr. Delaney.
Mr. DELANEY. Yes, sir.
Mr. MARKEY. And your problem is, among other things, that
teenagers can get access to this and go joy riding into people's
private records.
Mr. DELANEY. Yes, sir. In fact, they do.
Mr. MARKEY. Could you elaborate on what that problem is?
And then, Mr. Goldstein, I would like for you to deal with the
ethical implications of the problem as Mr. Delaney would outline
them.
Mr. DELANEY. Well, the problem is that teenagers do read the
"2600" magazine. I have witnessed teenagers being given free copies
of the magazine by the editor-in-chief. I have looked at a
historical perspective of the articles published in "2600" on how
to engage in different types of telecommunications fraud, and I
have arrested teenagers that have read that magazine.
The publisher, or the editor-in-chief, does so with impunity
under the cloak of protection of the First Amendment. However, as
I indicated earlier, in that the First Amendment has been abridged
for the protection of juveniles from pornography, I also feel that
it could be abridged for juveniles being protected from manuals on
how to commit crime -- children, especially teenagers, who are
hackers, and who, whether they be mischievous or intentionally
reckless, don't have the wherewithal that an adult does to
understand the impact of what he is doing when he gets involved in
this and ends up being arrested for it.
Mr. MARKEY. Mr. Goldstein, how do we deal with this problem?
Mr. GOLDSTEIN. First of all, "2600" is not a manual for
computer crime. What we do is, we explain how computers work. Very
often knowledge can lead to people committing crimes, we don't deny
that, but I don't believe that is an excuse for withholding the
knowledge.
The article on cellular phones that was printed in that
particular issue pretty much goes into detail as to how people can
track a cellular phone call, how people can listen in, how exactly
the technology works. These are all things that people should know,
and perhaps if people had known this at the beginning they would
have seen the security problems that are now prevalent, and perhaps
something could have been done about it at that point.
Mr. MARKEY. Well, I don't know. You are being a little bit
disingenuous here, Mr. Goldstein. Here, on page 17 of your spring
edition of 1993, "How to build a pay TV descrambler." Now that is
illegal.
Mr. GOLDSTEIN. Not building. Building one is not illegal.
Mr. MARKEY. Oh, using one is illegal?
Mr. GOLDSTEIN. Exactly.
Mr. MARKEY. I see. So showing a teenager, or anyone, how to
build a pay TV descrambler is not illegal. But what would they do
then, use it as an example of their technological prowess that they
know how to build one? Would there not be a temptation to use it,
Mr. Goldstein?
Mr. GOLDSTEIN. It is a two-way street, because we have been
derided by hackers for printing that information and showing the
cable companies exactly what the hackers are doing.
Mr. MARKEY. I appreciate it from that perspective, but let's
go over to the other one. If I am down in my basement building a
pay TV descrambler for a week, am I not going to be tempted to see
if it works, Mr. Goldstein? Or how is it that I then prove to
myself and my friends that I have actually got something here which
does work in the real world?
Mr. GOLDSTEIN. It is quite possible you will be tempted to try
it out. We don't recommend people being fraudulent --
Mr. MARKEY. How do you know that it works, by the way?
Mr. GOLDSTEIN. Actually, I have been told by most people that
is an old version that most cable companies have gotten beyond.
Mr. MARKEY. So this wouldn't work then?
Mr. GOLDSTEIN. It will work in some places, it won't work in
all places.
Mr. MARKEY. Oh, it would work? It would work in some places?
Mr. GOLDSTEIN. Most likely, yes. But the thing is, we don't
believe that because something could be used in a bad way, that is
a reason to stifle the knowledge that goes into it.
Mr. MARKEY. That is the only way this could be used. Is there
a good way in which a pay TV descrambler could be used that is a
legal way?
Mr. GOLDSTEIN. Certainly, to understand how the technology
works in the first place, to design a way of defeating such devices
in the future or to build other electronic devices based on that
technology.
Mr. MARKEY. I appreciate that, but it doesn't seem to me that
most of the subscribers to "2600" magazine --
Mr. GOLDSTEIN. That is interesting that you are pointing to
that. That is our first foray into cable TV. We have never even
testified on the subject before.
Mr. MARKEY. I appreciate that.
Well, let's move on to some of your other forays here. What
you have got here, it seems to me, is a manual where you go down
Maple Street and you just kind of try the door on every home on
Maple Street. Then you hit 216 Maple Street, and the door is open.
What you then do is, you take that information, and you go down to
the corner grocery store, and you post it: "The door of 216 Maple
is open."
Now, of course, you are not telling anyone to steal, and you
are not telling anyone that they should go into 216 Maple. You are
assuming that everyone is going to be ethical who is going to use
this information, that the house at 216 Maple is open. But the
truth of the matter is, you have got no control at this point over
who uses that information. Isn't that true, Mr. Goldstein?
Mr. GOLDSTEIN. The difference is that a hacker will never
target an individual person as a house or a personal computer or
something like that. What a hacker is interested in is wide open,
huge data bases that contain information about people, such as TRW.
A better example, I feel, would be one that we tried to do 2
years ago where we pointed out that the Simplex Lock Corporation
had a very limited number of combinations on their hardware locks
that they were trying to push homeowners to put on their homes, and
we tried to alert everybody as to how insecure these are, how easy
it is to get into them, and people were not interested.
Hackers are constantly trying to show people how easy it is to
do certain things.
Mr. MARKEY. I appreciate what you are saying. From one
perspective, you are saying that hackers are good people out there,
almost like -- what are they called? -- the Angels that patrol the
subways of New York City.
Mr. GOLDSTEIN. Guardian Angels. I wouldn't say that though.
Mr. MARKEY. Yes, the Guardian Angels, just trying to protect
people.
But then Mr. Delaney here has the joy riders with the very
same information they have taken off the grocery store bulletin
board about the fact that 216 Maple is wide open, and he says we
have got to have some laws on the books here to protect against it.
So would you mind if we passed, Mr. Goldstein, trespassing
laws that if people did, in fact, go into 216 and did do something
wrong, that we would be able to punish them legally? Would you have
a problem with that?
Mr. GOLDSTEIN. I would be thrilled if computer trespassing
laws were enforced to the same degree as physical trespassing laws,
because then you would not have teenage kids having their doors
kicked in by Federal marshals and being threatened with $250,000
fines, having all their computer equipment taken and having guns
pointed at them. You would have a warning, which is what you get
for criminal trespass in the real world, and I think we need to
balance out the real world --
Mr. MARKEY. All right. So you are saying, on the one hand, you
have a problem that you feel that hackers are harassed by law
enforcement officials and are unduly punished. We will put that on
one side of the equation. But how about the other side? How about
where hackers are violating people's privacy? What should we do
there, Mr. Goldstein?
Mr. GOLDSTEIN. When a hacker is violating a law, they should
be charged with violating a particular law, but that is not what I
see today. I see law enforcement not having a full grasp of the
technology. A good example of this was raids on people's houses a
couple of years ago where in virtually every instance a Secret
Service agent would say, "Your son is responsible for the AT&T
crash on Martin Luther King Day," something that AT&T said from the
beginning was not possible.
Mr. MARKEY. Again, Mr. Goldstein, I appreciate that. Let's go
to the other side of the problem, the joy rider or the criminal
that is using this information. What penalties would you suggest to
deal with the bad hacker? Are there bad hackers?
Mr. GOLDSTEIN. There are a few bad hackers. I don't know any
myself, but I'm sure there are.
Mr. MARKEY. I assume if you knew any, you would make sure we
did something about them. But let's just assume there are bad
people subscribing. What do we do about the bad hacker?
Mr. GOLDSTEIN. Well, I just would like to clarify something.
We have heard here in testimony that there are gang members and
drug members who are using this technology. Now, are we going to
define them as hackers because they are using the technology?
Mr. MARKEY. Yes. Well, if you want to give them another name,
fine. We will call them hackers and crackers, all right?
Mr. GOLDSTEIN. I think we should call them criminals.
Mr. MARKEY. So the crackers are bad hackers, all right? If you
want another word for them, that is fine, but you have got the
security of individuals decreasing with the sophistication of each
one of these technologies, and the crackers are out there. What do
we do with the crackers who buy your book?
Mr. GOLDSTEIN. I would not call them crackers. They are
criminals. If they are out there doing something for their own
benefit, selling information --
Mr. MARKEY. Criminal hackers. What do we do with them?
Mr. GOLDSTEIN. There are existing laws. Stealing is still
stealing.
Mr. MARKEY. OK. Fine.
Dr. Tippett.
Mr. TIPPETT. I think that the information age has brought on
an interesting dilemma that I alluded to earlier. The dilemma is
that the people who use computers don't have parents who used
computers, and therefore they didn't get the sandbox training on
proper etiquette. They didn't learn you are not supposed to spit in
other people's faces or contaminate the water that we drink, and we
have a whole generation now of 100 million in the United States
computer users, many of whom can think this through themselves,
but, as we know, there is a range of people in any group, and we
need to point out the obvious to some people. It may be the bottom
10 percent.
Mr. MARKEY. What the problem is, of course, is that the
computer hacker of today doesn't have a computer hacker parent, so
parents aren't teaching their children how to use their computers
because parents don't know how to use computers. So what do we do?
Mr. TIPPETT. It is incumbent upon us to do the same kind of
thing we did in the sixties to explain that littering wasn't right.
It is incumbent upon us to take an educational stance and for
Congress to credit organizations, maybe through a tax credit or
through tax deductions, for taking those educational opportunities
and educating the world of people who didn't have sandbox training
what is good and what is bad about computing.
So at least the educational part needs to get started, because
I, for one, think that probably 90 percent of the kids -- most of
the kids who do most of the damage that we have all described up
here, in fact, don't really believe they are doing any damage and
don't have the concept of the broadness of the problem that they
are doing. The 10 percent of people who are criminal we could go
after potentially from the criminal aspect, but the rest we need to
get after from a plain, straight ahead educational aspect.
Mr. MARKEY. I appreciate that.
I will just say in conclusion -- and this is for your benefit,
Mr. Goldstein. When you pass laws, you don't pass laws for the good
people. What we assume is that there are a certain percent of
people -- 5 percent, 10 percent; you pick it -- who really don't
have a good relationship with society as a whole, and every law
that we pass, for the most part, deals with those people.
Now, as you can imagine, when we pass death penalty statutes,
we are not aiming it at your mother and my mother. It is highly
unlikely they are going to be committing a murder in this lifetime.
But we do think there is a certain percentage that will. It is a
pretty tough penalty to have, but we have to have some penalty that
fits the crime.
Similarly here, we assume that there is a certain percentage
of pathologically damaged people out there. The cerebral mechanism
doesn't quite work in parallel with the rest of society. We have to
pass laws to protect the rest of us against them. We will call them
criminal hackers. What do we do to deal with them is the question
that we are going to be confronted with in the course of our
hearings?
Let me recognize the gentleman from Texas, Mr. Fields.
Mr. FIELDS. Thank you, Mr. Chairman.
Just for my own edification, Mr. Goldstein, you appear to be
intelligent; you have your magazine, so obviously you are
entrepreneurial. For me personally, I would like to know, why don't
you channel the curiosity that you talk about into something that
is positive for society? And, I'm going to have to say to you, I
don't think it is positive when you invade someone else's privacy.
Mr. GOLDSTEIN. I agree.
Mr. FIELDS. Whether it is an individual or a corporation.
Mr. GOLDSTEIN. Well, I would like to ask a question in return
then. If I discover that a corporation is keeping a file on me and
I access that corporation's computer and find out or tell someone
else, whose privacy am I invading? Or is the corporation invading
my privacy?
You see, corporations are notorious for not volunteering such
information: "By the way, we are keeping files on most Americans
and keeping track of their eating habits and their sexual habits
and all kinds of other things." Occasionally, hackers stumble on to
information like that, and you are much more likely to get the
truth out of them because they don't have any interest to protect.
Mr. FIELDS. Are you saying with this book that is what you are
trying to promote? because when I look through this book, I find
the same thing that the chairman finds, some things that could
actually lead to criminal behavior, and when I see all of these
codes regarding cellular telephones, how you penetrate and listen
to someone's private conversation, I don't see where you are doing
anything for the person, the person who is actually doing the
hacking. I see that as an invasion of privacy.
Mr. GOLDSTEIN. All right. I need to explain something then.
Those are not codes, those are frequencies. Those are frequencies
that anybody can listen to, and by printing those frequencies we
are demonstrating how easy it is for anybody to listen to them.
Now if I say that by tuning to 871 megahertz you can listen to
a cellular phone call, I don't think I am committing a crime, I
think I am explaining to somebody. What I have done at previous
conferences is hold up this scanner and press a button and show
people how easy it is to listen, and those people, when they get
into their cars later on in the day, they do not use their cellular
telephones to make private calls of a personal nature because they
have learned something, and that is what we are trying

  
to do, we
are trying to show people how easy it is.
Now, yes, that information can be used in a bad way, but to
use that as an excuse not to give out the information at all is
even worse, and I think it is much more likely that things may be
fixed, the cellular industry may finally get its act together and
start protecting phone calls. The phone companies might make red
boxes harder to use or might make it easier for people to afford
phone calls, but we will never know if we don't make it public.
Mr. FIELDS. I want to be honest with you, Mr. Goldstein. I
think it is frightening that someone like you thinks there is a
protected right in invading someone else's privacy.
Mr. Guidry, let me turn to you. How does a hacker get the
codes that you were talking about a moment ago -- if I understood
what you were saying correctly, the manual ID number, the other
cellular numbers that allow them to clone?
Mr. GUIDRY. Well, unfortunately, "2600" would be a real good
bet to get those, and we have arrested people and found those
manuals in their possession.
The other way is quite simply just to what we call dumpster
dive, and that is to go to cellular carriers where they may destroy
trash. Unfortunately, some of it is shredded and put back together,
some of it is not shredded, and kids, criminals, go into those
dumpsters, withdraw that information, piece it together, and then
experiment with it. That information then is usually sold for
criminal activity to avoid prosecution.
Mr. FIELDS. You are asking the subcommittee to include
wireless and cellular, and I think that is a good recommendation.
I think certainly that is one that we are going to take as good
counsel. But it appears that much of what you are talking about is
organized activity, and my question is, does the current punishment
scheme actually fit the crime, or should we also look at increasing
punishment for this type of crime?
Mr. GUIDRY. I would strongly suggest that we increase the
punishment for this sort of crime. It is unfortunate that some
hackers take that information and sell it for criminal activity,
and, as a result, if prosecution is not stiff enough, then it far
outweighs the crime.
Mr. FIELDS. What is the punishment now for this type of
cellular fraud?
Mr. GUIDRY. Right now, it can be as high as $100,000 and up to
20 years in the penitentiary.
Mr. FIELDS. Mr. Delaney, do you feel that that is adequate?
Mr. DELANEY. Under New York State law, which is what I deal
with, as opposed to the Federal law, we can charge a host of
felonies with regard to one illicit telephone call if you want to
be creative with the law. Sections 1029 and 1039 really cover just
about everything other than the cellular concern and the wireless
concern.
However, I think the thing that is not dealt with is the
person who is running the call sell operations. The call selling
operations are the biggest loss of revenue to the telephone
companies, cellular companies. Whether they are using PBX's or call
diverters or cellular phones, this is where all the fraud is coming
from, and there is only a handful of people who are originating
this crime.
We have targeted these people in New York City right now, and
the same thing is being done in Los Angeles and Florida, to
determine who these people are that use just the telephone to hack
out the codes on PBX's, use ESN readers made by the Curtis Company
to steal the ESN and MIN's out of the air and then to disseminate
this to the street phones and to the cellular phones that are in
cars and deprive the cellular industry of about $300 million a
year, and the rest of the telecommunications networks in the United
States probably of about $1 billion a year, due to the call sell
operations.
In one particular case that we watched, as a code was hacked
out on a PBX in a company in Massachusetts, the code was
disseminated to 250 street phones within the period of a week. By
the end of the month, a rather small bill of $40,000 was sent to
the company, small only because they were limited by the number of
telephone lines going through that company. Had it been a larger
company whose code had been cracked by the finger hacker, the bill
would have been in the hundreds of thousands of dollars, or over $1
million as typically some of the bills have been.
But this is a relatively small group of people creating a
tremendous problem in the United States, and a law specifically
dealing with a person who is operating as an entrepreneur, running
a call selling operation, I think would go far to ending one of the
biggest problems we have.
Mr. FIELDS. Let me ask so I understand, Mr. Delaney and Mr.
Guidry, because I am a little confused, or maybe I just didn't
understand the testimony, are these individual hackers acting
separately, or are these people operating within a network, within
an organization?
Mr. DELANEY. These finger hackers are the people that control
the network of people that operate telephone booths and cellular
phones for reselling telephone service. These finger hackers are
not computer hackers.
Mr. FIELDS. When you say finger hackers, is this one person
operating independently, or is that finger hacker operating in
concert --
Mr. GUIDRY. No. He has franchised. He has franchised out. He
actually sells the computer and the software and the cattail to do
this to other people, and then they start their own little group.
Now it is going internationally.
Mr. FIELDS. Explain to me, if the chairman would permit --
Mr. MARKEY. Please.
Mr. FIELDS. Explain to me the franchise.
Mr. GUIDRY. What happens is, let's pretend we are in Los
Angeles right now and I have the ability to clone a phone that is
using a computer, a cattail, we call it, that goes from the
computer, the back of the computer, into the telephone, and I have
the diskette that tells me how to change that program. I can at
some point sell the cloning. You can come to me, and I can clone
your phone.
However, that is one way for me to make money. The best way
for me to make money is to buy computers, additional diskettes, and
go to Radio Shack or some place and make additional cattails and
say, "I can either clone your phone for $1,500, or what you can do
for $5,000 is start your own company." So you say, "Well, wow,
that's pretty good, because how many times would I have to sell one
phone at from $500 to $1,500 to get my initial investment back?" As
a result now, you have groups, you have just youngsters as well as
organized crime stepping in.
The Guidry Group has worked in the Philippines on this, we
have worked in Mexico, the Dominican Republic, Chile, Argentina,
and next week I will be in London and in Rome. It is so bad, sir,
that now intelligence agencies in Rome have told me -- and that is
what I am going there for -- that organized crime seems to think
that telecommunications fraud is more lucrative, unfortunately,
than drugs, and it is darned sure more lucrative in the Los
Angeles, probably New York, and Miami areas, because right now
prosecution is not that strong. It is unfortunate that all of law
enforcement is not trained, nor could they be, to pick up on
someone standing on a corner using an illegitimate phone.
Mr. FIELDS. How would a person know where to get their
telephone cloned?
Mr. GUIDRY. Let me tell you what happens. Normally when we go
into a major metropolitan city, or we also check the computer
bulletin boards, a lot of times that information is there. Most of
the time, though, it is in magazines, like green sheets, which are
free advertisements saying, "Call anywhere in the world. Come to --"
a location, or, "Call this number." Also in Los Angeles, for some
reason, they seem to advertise a lot in sex magazines, and people
will simply buy a sex magazine and there will be a statement in
there, "Earn money the fast way. Start your own telecommunications
company." And then we will follow up on that tip and work with the
Secret Service to try to apprehend those people.
Mr. FIELDS. Mr. Haugh.
Mr. HAUGH. If I could just add a few comments, it would be
most unfortunate if this denigrates into a discussion of
adolescents who are curious and so-called finger hackers. The truth
of the matter is that the toll fraudsters are adults, they are
organized, they are smart, they are savvy, and the drug dealers in
particular are learning very quickly that it is far more lucrative,
far less dangerous, to go into the telecom crime business.
"Finger hacking" is a term, but the truth is, war dialers,
speed dialers, modems, automated equipment now will hack and crack
into systems and break the codes overnight. While the criminal
sleeps, his equipment penetrates those systems. He gets up in the
morning, and he has got a print sheet of new numbers that his
equipment penetrated overnight.
We have interviewed the criminals involved. These so-called
idle curiosity adolescents are being paid up to $10,000 a month for
new codes. I don't call that curiosity, I call that venality. We
are talking a $4 billion problem.
The chairman came up with the Maple Street example. I think
even better yet, Mr. Chairman, the truth is that 216 Maple had a
security device on the door and a code, and what Mr. Goldstein and
his ilk do is sell that code through selling subscriptions to these
periodicals. There is a big difference, in my opinion, between
saying, "216 Maple is open" -- that is bad enough -- than to say,
"You go to 216 Maple, and push 4156, and you can get in the door."
But we are talking about crime, we are talking about adults,
we are talking about organized crime, perhaps not in the Cosa
Nostra sense, but even the Cosa Nostra is wising up that they can
finance some of these operations, and in New York and Los Angeles,
in particular, the true Mafia is now beginning to finance some of
these telecom fraud operations.
Mr. FIELDS. Mr. Guidry, one last question. Is it the Secret
Service that is at the forefront of Federal activity?
Mr. GUIDRY. Yes, sir, it is.
Mr. FIELDS. Do they have the resources to adequately deal with
this problem?
Mr. GUIDRY. No, sir. The problem is growing so rapidly that
they are undermanned in this area but have asked for additional
manpower.
Mr. FIELDS. Is this a priority for the Secret Service?
Mr. GUIDRY. Yes, sir, it is.
Mr. FIELDS. Thank you, Mr Chairman.
Mr. MARKEY. The gentleman's time has expired.
Again, it is a $4 to $5 billion problem.
Mr. HAUGH. That is what our research indicated.
Mr. MARKEY. There were 35,000 victims last year alone.
Mr. HAUGH. Yes, sir, and this is only users, large users. Now
it can be businesses, nonprofits. There is a university on the East
Coast that just this last week got hit for $490,000, and the fraud
is continuing.
Mr. MARKEY. The gentleman from Ohio.
Mr. OXLEY. Thank you, Mr. Chairman.
Let me ask the witnesses: Other than making the penalties
tougher for this type of activity, what other recommendations, if
any, would any of you have that we could deal with, that our
subcommittee should look at, and the Judiciary Committee, I assume,
for what we might want to try to accomplish?
Mr. Haugh?
Mr. HAUGH. I happen to disagree with a couple of the witnesses
who have indicated tougher penalties. I mean it sounds great. You
know, that is the common instant reaction to anything, expand the
penalties. I happen to think 20 years is plenty enough for criminal
penetration of a telecom system, and there are a few housekeeping
things that could be done.
The problem isn't the adequacy of the law, the laws are pretty
adequate, and, as Mr. Delaney indicated, you have a violation
someplace, you have got a State law and a Federal law, both, and if
you are a smart prosecutor, there are about eight different ways
you can go after these criminals.
The truth is, we have got inadequate enforcement, inadequate
funding, inadequate pressure on the part of the Congress on the FCC
to make more proactive efforts and to put more heat on the industry
to coordinate.
The truth is that the carriers compete with each other
fiercely. They, with some limited exceptions, don't share
appropriate information with each other. The LEC's and the RBOC's
hide behind privacy; they hide behind other excuses not to
cooperate with law enforcement and with the rest of the industry as
effectively as they should.
So I think putting the heat on the industry, putting the heat
on the FCC, more adequately funding the FCC, more adequately
funding the Secret Service, and having hearings like this that
focus on the problem is the answer and not expanding the penalty
from 20 years to 25 years. Nobody gets 20 years anyway, so
expanding the 20 years is, to me, not the answer.
Mr. OXLEY. What is the average sentence for something like
that?

Mr. HAUGH. I think the average toll fraud criminal who
actually goes to jail -- and they are few and far between -- spends
3 to 6 months, and they are out.
Now recidivism levels are low, I agree with Mr. Delaney. Once
you catch them, they rarely go back to it. So it isn't a question
of putting them in jail forever, it is a question of putting them
in jail. The certainty of punishment level is very low.
We talked to a drug dealer in New York City who left the drug
business to go into toll fraud because he told me he can make
$900,000 a year -- nontaxable income, he called it -- and never
ever worry about going to jail.
Mr. DELANEY. In New York City, I have never seen anybody go to
jail on a first offense for anything short of armed robbery, let
alone telephone fraud. They typically get 200 hours of community
service, depending upon the judge.
These people that I am speaking about are not the computer
hackers that we were speaking about earlier, these are the people
that are the finger hackers that break into the PBX's around the
country. These are immigrants in the United States, they are
adults, they know how to operate a telephone. They sit there
generally -- almost every one that we have arrested so far uses a
Panasonic memory telephone, and they sit there night and day try
ing to hack out the PBX codes. They go through all the default
codes of the major manufacturers of PBX's. They know that much.
We don't have a single person in New York City, that I know
of, that is hacking PBX's with a computer. The long distance
carriers can see patterns of hacking into 800 lines, which are
typically the PBX's, and they can see that it is being done by
telephone, by finger hacking a telephone key pad, as opposed to a
computer.
The war dialing programs that Mr. Haugh referred to are
typically used by the computer hackers to get these codes, but they
create only a minuscule amount of the fraud that is ongoing in the
country. The great majority is generated by the finger hackers who
then disseminate those codes to the telephone booths and the call
selling operations that operate out of apartments in New York City.
In one apartment with five telephones in it that operates 16 hours
a day for 365 days a year selling telephone service at $10 for 20
minutes, you take in $985,000. It is a very profitable business.
One of the individuals we arrested that said he did this
because it was more profitable and less likely that he be caught
than in selling drugs was murdered several months after we arrested
him in the Colombian section of Queens because he was operating as
an independent. It is a very controlled situation in New York City,
and different ethnicities throughout New York City control the call
sell operations in their neighborhoods, and everyone in those
neighborhoods knows where they can go to make an illicit phone call
or to get a phone cloned, whether it is a reprogrammed phone or
rechipped.
Mr. OXLEY. Mr. Guidry, did you have a comment?
Mr. GUIDRY. Well, I think that we really do need to enforce
the laws and we need to make some statutory changes in title 18,
section 1029 to include cellular and wireless.
I have been in courtrooms where really savvy defense attorneys
say, "Well, it does not specifically indicate cellular or
wireless," and that raises some question in the jury's mind, and I
would just as soon that question not be there.
Mr. OXLEY. Thank you.
Mr. Chairman, I see we have got a vote, and I yield back the
balance of my time.
Mr. MARKEY. Thank you.
We are going to have each one of you make a very brief summary
statement to the committee if you could, and then we are going to
adjourn the hearing.
As you know, the Federal Communications Commission will be
testifying before this subcommittee next week. We have a great
concern that, although they held an all-day hearing on toll fraud
last October, while we thought they were going to move ahead in an
expeditious fashion, that, with a lot of good information, it has
all sat on the shelf since that time. We expected them to act on
that information to establish new rules protecting consumers and
pushing carriers to do a lot more than they have done thus far to
protect their networks. In light of recent court decisions holding
that consumers are always liable I think that action by the FCC is
long overdue, and at the FCC authorization hearing next week I
expect to explore this issue with the commissioners in depth, so
you can be sure of that, Mr. Haugh.
Let's give each of you a 1-minute summation. Again, we will go
in reverse order and begin with you, Mr. Guidry.
Mr. GUIDRY. Thank you, sir.
Telecommunications fraud, of course, is going internationally,
and as it goes internationally and starts to franchise and get more
organized, we are going to have to figure out a better way to
combat it. Industry itself right now is putting its best foot
forward. However, I would ask this committee to strongly look at

changing some of this legislation and to also increase law
enforcement's efforts through manpower.
Thank you very much, sir.
Mr. MARKEY. Thank you.
Mr. Haugh.
Mr. HAUGH. I agree with Mr. Guidry that there are some
housekeeping changes that need to be made, and the particular title
and section he referred to should definitely be amended to include
more clearly wireless.
The overall problem is an immense one; it is a very serious
one; it is a complicated one. Everybody is at fault. Finger
pointing has been carried to an extreme. Again, I think the long
distance carriers, the big three -- AT&T, MCI, and Sprint -- have
done a superb job of coming up to speed with monitoring. They are
starting to cooperate better. They have really come to the table.
The laggards are the LEC's and the RBOC's, the CPE
manufacturers, and the FCC. In fairness to the FCC, they are
understaffed, undermanned, underfunded. They can't even take care
of all their mandated responsibilities right now, let alone take on
new chores.
All that said, there is a great deal the FCC can do --
jawboning, regulations, pushing the LEC's and the RBOC's, in
particular, to get real, get serious -- and I would urge this
committee -- applaud your efforts and urge you to continue that.
Mr. MARKEY. Thank you.
Dr. Tippett.
Mr. TIPPETT. Thank you.
The computer virus issue is a little bit different than the
toll fraud issue. In fact, there are no significant laws that deal
with viruses, and, in fact, the fact that there are no laws gives
the people who write viruses license to write them. The typical
statement you read is, "It's not illegal, and I don't do anything
that is illegal." So in the computer virus arena we do need laws.
They don't need to be fancy; they don't need to be extensive. There
are some suggestions of approaches to virus legislation in my
written testimony.
We also need education, and I would encourage Congress to
underwrite some education efforts that the private sector could
perform in various ways, perhaps through tax incentives or tax
credits. The problem is growing and large. It exceeds $1 billion
already in the United States, and it is going to be a $2 billion
problem in 1994.
As bad as toll fraud seems, this virus issue is, oddly, more
pervasive and less interesting to a whole lot of people, and I
think it needs some higher attention.
Mr. MARKEY. Thank you.
Mr. Goldstein.
Mr. GOLDSTEIN. Thank you.
I would like to close by cautioning the subcommittee and all
of us not to mix up these two very distinct worlds we are talking
about, the world of the criminal and the world of the experimenter,
the person that is seeking to learn. To do so will be to create a
society where people are afraid to experiment and try variations on
a theme because they might be committing some kind of a crime, and
at the same time further legislation could have the effect of not
really doing much for drug dealers and gangsters, who are doing far
more serious crimes than making free phone calls, and it is not
likely to intimidate them very much.
I think the answer is for all of us to understand specifically
what the weaknesses in the technology are and to figure out ways to
keep it as strong and fortress-like as possible. I do think it is
possible with as much research as we can put into it.
Thank you.
Mr. MARKEY. Thank you, Mr. Goldstein.
Mr. Delaney.
Mr. DELANEY. Last year, the Secret Service and the FBI
arrested people in New York City for conducting illegal wiretaps.
The ability to still do that by a hacker exists in the United
States. Concerned with privacy, I am very happy to see that
something like the Clipper chip is going to become available to
protect society. I do hope, though, that we will always have for
the necessary law enforcement investigation the ability to conduct
those wiretaps. Without it, I see chaos.
But with respect to the cellular losses, the industry is
coming along a very rapid rate with technology to save them money
in the future, because with encryption nobody will be able to steal
their signals either.
Mr. MARKEY. Thank you, Mr. Delaney.
I apologize. There is a roll call on the Floor, and I only
have 3 minutes to get over there to make it. You have all been very
helpful to us here today. It is a very tough balancing act, but we
are going to be moving aggressively in this area. And we are going
to need all of you to stay close to us so that we pass legislation
that makes sense.
This hearing is adjourned. Thank you.
[Whereupon, at 12:16 p.m., the subcommittee was adjourned.]

Philez
------

CaveAsp.Zip
-----------
by Caveman

Description: Informational Texts on Aspen Mail Systems

begin 400 CAVEASP.ZIP
M4$L#! H !@ & -N +!CEN,0$E1D (1! ) 05-014XN5%A480I[!P8;
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M7G*N;H?L@ZV&ZQ5Q]3[JM+Z4#?,*L W=[87?J%711K)MZX6%O50XB^;^*71
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M!9,J00O?%7V11=@L5 ABAS%"A*#%45N.K*;NERR@* =&P)@'WG@^.+G"=)W
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MKP2U&T@1Q8:@;^>[.@<]9* &4$L! @L "@ & 8 VX L&.6XQ 25&0 A$$
M D 0 @ $%34$5.+E185%!+!08 0 ! #< "\
M&0
M
B

end

Cavetmc.Zip
-----------
by Caveman
Description: Informational Text File on The Message Center VMB
systems.

begin 400 CAVETMC.ZIP
M4$L#! H !@ & (BU?QB7T0O"I \ 'HF ' 5$U#+E185%F?!1\%_Q\#
M#P8_!Q8?!0@$#P<(%PD.# \)!PD*+P@/!0<&!P4'"@<&"0\G!@<)%@4&"!<&
M#P8/!R\#!10#!08%! D&! 4$ P4(! ,4!@4&!0?__________T\4 2(C% 4$
M!0<%%P9'"4XIK@E."&Y_%Q(C9 4$!385!@4'!2<&%Q8'!B<&%P;W5_')ZUM#
M!/M?X"1J5(%;XD)RH3EM-..C1%HC!V*-&#F8W&'!$[\C_S>:SL=L!T4X83N
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MCB7>42O'?M%LSM+/8*(B+9X5D'1PT .?8.7/5[N.; KQLT0ZNJSV[3 !7Z%
MRV'Q*77L;D2?RA'+/*0W/_+(V*S%KI[Y;G'&MF^D*$$$&3%R$$%&BA2@!R$1
MPN'%D+F'QZR>=8R:LYA^-HDOQ==3Y<A?K%XD&&N]"ZT\XMM]%$:4I)#&Z!HB
MJ/5GA#QYH/)R#HT=C/TK9]-EM58!O;BLI/KA1SC>9E%-#3DAD<#A3:T5^H:L
MLU(BM@CG8SL3T@VLN)6[19*U0L0%/0"VN/&8:1:-1]T:%3I5>:6G5$+N-)J3
M2:!O6:PM*1BN9</5F;\XZ4KS^&[O1^I6R<()2*-))ZBZ8MW(A>O#C<IR4:(!
M?7*^KOK<QO+]IY]-NL?[:EYV&:6*UK\Z-"5HUW_W\FB:EMNNLUES-+'X_I>?
M1,3J3V3# 6G-U<7)2[+;82-F.L!HOT[>EG.)3J,PKZ1A*NU'Z-I[Y^V(^9[H
MU2&/01-":)FZD483<MU%-='7A*TJ;14I<L9,&B3$'2G#4@LY!]718B,1PX-#
MI=;Q>W8Y:A(8RZHFP2R9_@*GD YU\S6S9DM3A^CZ0EU'=0YS!TF0MCQ"\<]9
M/D*>>7GJ;RH9BR'MW &INB[=V[&RXC>ZDYD+N%4:IUA96MZ;405J.S-G8)L^
M3!>J&&%AGT0^]FJX/S/9>%&2>)1VU*9^(F(;D7:8 FTO<2PIH>I0"4)3#3R6
ML2WKXM>L@[[TF#AAP$-]]X7C]V2__G"GYXQY ZRONSR'08&OG+\S->!9199,
MZ&+*N+*@7=<?PHS0W!4?<49"\?#I+RP>(WW@;/>#B!(%T*H9#8*VD3ICV4'H
MZ*?22^*:G)#77[/]4K*WLA-#P6HZM(KAY>#(EZ9H6JS"-/\,ZM*Z^SAX\.#!
MTU=RB1[H;<!XM[V)4BRFRUFV!=V8^!WXZ9-N0&9TL./*-6[J_.B!^?Z]D1^,
M@&K^WN>?P7[F*+N(Q9"J:RO4R2';<38M6]U$5)H+5R%UUG?@983E)#+H6RLQ
MXD1LBKB 38FKC\])22=4R]:(8?%R?F)7M_FZC%-H MM*8F94S(B&YH^AP2IA
M4Y.8K2M0J^<-G6DT<W2+?;%$.!9*%.I5:YI!5YS.+JN%T?*%F:HV);O"=>'7
M.ZN61X-8Z,6GPH+-&!$US'"$QQR06-LKPPBMS,*C*S0N)%YJONV\J.CQY:">
MA1M-T4* J2(1@A##C0<UD!&&$ $Y"HEJ'$?2. ZDM?"_W6+P<MJ8XV)[GZ+(
M@U/,$H\U8I!.*%26"CEM/5:A2;0L13<B@43C&I08.[YH]MX'6U@$!Z[]P)[T
M[]@81S,:6G-WFC_30*D5I9.3>O%[L$B=BOQP>(7-J'50(7/F8K-V414+B;;N
MBZ4GQ)TJ5V#&0UDME1Q?44('9VR*8YUQU[CU1XIL[&;-EZ>_,AE(B11SOEDL
MBTDJY2LOO&DM-9K(D1D/U;0&TJ:#P=3K+76FF,HZ50L\9K&"0LB(=;"[K>67
MB39P1C8JG%4)8.GV/"&/P;T*6%(':&TT"V1A@8YR4+G>BZ(LR+B(@A=U+T^+
MQOS/!F86>F.P/MFKWZS#*AQ?>+7>ZT,1>?PZ1'7$+CM=55YDZG:QOMJ''V7S
M&H<4IU\^&S^.J8Z!HU=@Q#!()C"F3SF&!K&D/8QDHHJ6;&P^&X_)#L&2O&B=
MN#$$%"<'DJPE/<39VP#B6G*8Z*EK]5W;#W94T3<$/^Q-/V]'!_/3X0X#1E85
MV.\TJJ3(@-9XU!@+ '7& L#P+ 8OY3RXLH"%QBQ:H:;, @6(8'($H<6E[+3(
MQ7U9RDFP+EJ=PN=RBZ:0PB"6&!_=/E\DNX5"IZ!R\%I2IBDF 4X[+.ZAO9".
MZHD4SD%_AH9NW2\TD I/@'9=,,M&&Q4+?9 \I3(]W#PH)Z7R/1 ]R]+FI[OA
MG=0;S;CC18Q-@J^_&B.RC<CFQB.L+Q9<3&^"'-1MMM*@UY40FU30*V_I:<)V
M](C /FMB,H\ANLDD53FX<I!5A6(>/VN"N*6:!QL29B 5^_CHUIC7'Z%:#4F*
MB3D)@9SQ)W>%Q-0(U5IB)35<8A@ESJ^L2:XU<OA00=4%^S>SHO?0IV HH7V+
M4Z<=6%F>BH;0*.S(&UV$*V&KR=5?,_BA4G[X:KA:8IA*TJ^D8)&;G%#_ 4N4
M1CAL:N4G56K),*1&Y4=4JC[K;F!JEG@TT\)^.R]JK'-,63B*'="8E[$NRB1]
MC#=41;?F6H?AV+28K4"8390]QX?062.D!/\)*8FP2VHH$Y1S9([BDGT4J-8\
M;.G@5#.)BW?,FV(H?>X*>UZ4N2*IDJ2(I.J.\)'\1DVLT.$SN.2W\W!2S6&J
M@TB="B=02D%F5QAR8L@:@Y=;(F!)U->,4ZQ;8*9.?E/]SI7SY8$%+%)/MNJI
M-$'XD6#%CLA4:A401 +;QO26/"DV[GC(4?ITH,!U^0N4$4]B #'#!-F6!UT-
M$!?^/M!IRQ@/,"]9#F)<NB-Y& _# <Z.W-Z9U $!-)GX4/699/X,,+<QQ%1H
MH8F!^'5D'^RT'+DNH>G^,P=M:_1(+8D_(Q#IGDH,9(1E77\2LPXK-$:5B@9Y
MP06Z7*Q]26H*-R.5;6CU;RP#IALJS<"T9SO=(EZZEYS[P.37N2UNAG ?0S +
M@JFMHY]_J)% 5EL8O7K(1N4AK"!A"YGA1ORAP.MXV'$F:^M%,2=8'1!=A(9:
MCX>A<<(S<7II?.BQ(F,2.[%#F>C4UW7B(98U@7ST;8<$QYBB2L(NA] E]O;4
M8,(&M,D^!G8.NL\0M=-%B]4NC7YB!!BQ; -,\>[G**0[!R$>5!Q6.?'B:RT;
MYP;1R>4U8TO*<&$I5#TG5X59N0B?;_X*$-B 4TA!]6GUPIU'3&>[\]Y<.;#$
MJHDN9ECITR*9I&UKF"KFP;(4!4R)^;IP)L%1/EQ!/;/Q;".(*E7D>RN.2I1%
MZ38F:#N-,VF(#EA*5"PNL@C?8<MB*0^Z]@=F=8J&Z-9)$0RY)2FG51(%,$Y@
MH1B5F"+D:V[^(=_@ CJEO>Z%:@H**,%LJ*-)3.\C,X06BA L9N>#E6>PL4O"
MEQ0O.. N'@^<;S0:\W0IFFA)_X FIE2J/R4<G=0?+C5,E8J6S 1DG6F(!<-%
M"C=P2YV!'=*EXXY<T;Y@0W+<&88G=5'7PL?4UP6NQ(TH)Y8_&(R8@W@!48_N
M<@D5_ 4.2)!)R^M+;[FHTY#56AKB7#%!#?:N^JA.,B&.*&6LQW%:WH8-[ ?R
M*;%R-9NMD$7>=U]C<A1=*=FKY!?MW]6O.2DAJ5(-G03^))UQEUL0Z; FKO$:
MM%E^F*M$ZX^/'"6RQ@_UR%FM=:>@7H?O;US<CX"_K:X";]K)9V5I%]'1CQ@Q
M,@?(ZUM#!/LA^S.W2R=#-":CR4;O_LF*Z/<QUY+<^%KH<(A74$L! @L "@ &
M 8 B+5_&)?1"\*D#P >B8 < %1-0RY46%10
M2P4& $ 0 U R0\ & �I;5$A51U-=(" @7U]?7U]?7U]?(" @
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M;B @(" @(" @(" @(" @(" @(#,P,"TQ-"PT,# @2%-4

end


End Of Sphear DigiZine Issue #2
-------------------------------


← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT