Copy Link
Add to Bookmark
Report
Tolmes News Service 10
#######################################
# #
# #
# ======== =\ = ====== #
# == = \ = = #
# == = \ = ====== #
# == = \ = = #
# == = \= ====== #
# #
# #
# <Tolmes News Service> #
# ''''''''''''''''''''' #
# #
# #
# > Written by Dr. Hugo P. Tolmes < #
# #
# #
#######################################
Issue Number: 10
Release Date: November 19, 1987
Most of this issue will detail with the events concerning the bust of Shadow
Hawk. First there will be an article that describes the bust. Here it is:
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
TITLE: Youth is a Suspect in Theft of Software
FROM: The Chicago Tribune
DATE: September 17, 1987
A 17-year-old North Side youth is under investigation by the U.S. Secret
Service and the U.S. attourney's office for allegedly breaking into AT&T
computers across the nation and stealing sophisticated software valued
in the thousands of dollars. The youth is also suspected of advertising AT&T's
security devices over a network in Texas that is used as a "bulletin
board" by computer enthusiasts. The sole purpose of the computer network in
Texas, known as "Phreak Class-2600" is "to educate computer enthusiasts ... to
penetrate industrial and government sector computer systems," according to
a sworn affidavit filed in U.S. District Court by Assistant U.S. Atty.
William J. Cook.
On Sept. 4, Secret Service agents carrying a search warrant raided the
home of the youth, identified as Herbert D. Zinn Jr., of 6211 N. Artersian Ave.
The agents confiscated computers and the software that was stolen during the
break-ins, according to a U.S. Atty. Anton R. Valukas. A sworn affidavit
filed in U.S. District Court by Secret Service Agent Patrick Convery said the
the youth, using the code-name "Shadow Hawk" is suspected of breaking into an
AT&T computer at NATO Maintenance and Supply Headquarters in Burlington, N.C.
and an AT&T computer at Robins Air Force Base, Georgia, during the last
five months.
In addition, he also broke into AT&T computers at Bell Labs in
Naperville and New Jersey, according to the affidavit. Among the software
stolen during the break-ins was an artificial intelligence program that is
not yet on the market, the affidavit said. A single copy of the software is
valued at $5,000, but AT&T told the Secret Service that the program has an
estimated market value of $1 million.
An analysis of long distance calls made from Zinn's telephone disclosed
that attempts also were made to gain access to computers at the accounts
payable department of the Washington Post newspaper, a hostpital in South
Bend, Ind.; and computers in Colombus, Ohio; Rye, N.Y., and Pipe Creek, Tex.,
according to the government. Zinn's father, Herbert D. Zinn Sr., declined
to comment.
However, the affidavit said, the elder Zinn had recently retired from an
auto radio installationfederal investigators
that Zinn's son was "a bright boy" whose father had bragged at work that
his son's interest in computers "had just taken off."
"We consider this to be very serious," Valukas said. "We have said
from the beginning that we would take an aggressive stance in this area. We
are currently reviewing the matter and no charges have been filed." A
17-year-old is considered a juvenile under federal law. Valudas
characterized the software taken from NATO and the Air Force base as "low
level in terms of sensitivity."
Kathyryn Clark, a spokesman for AT&T, said "I'm aware of it. Our
security systems alert us when there is this type of break. It's in the hands
of the U.S. attorney."
Last June 6, Henry Kluepfel, an AT&T corporate security official tuned
into the Phreak Class-2600 and spotted messages from Shadow Hawk, the
affidavit said. Shadow Hawk braged in the messages that he had successfully
gained access to AT&T computer files and said he was interested in creating
some "Trojan horses" in the AT&T network. A Trojan horse, in computer
lingo, is an unauthorized computer program placed into a computer. Later
that month, another AT&T corporate security official spotted a statement
made by Shadow Hawk on another computer bulletin board in Chicago.
In that message, Shadow Hawk provided the names, telephone numbers,
passwords and other critical information needed to gain access to
seven different AT&T computers, according to the affidavit. On July 7,
a computer break-in at the Bell Labs computer in Naperville was discovered
and a record of the intruder's telephone number was spotted on the
compromised computer, the affidavit said. Illinois Bell then began using a
device known as a dial number recorder to log all calls made from the
telephone number, the affidavit said. From July 17 through July 19, the Zinn
computer gained access to the NATO computer by using and unauthorized
passowrd, according to the government.
The Zinn computer transferred software packages valued at $21,000
from the NATO computer, the affidavit said. On July 23, the AT&T software
program with an estimated $1 million market value vanished from the Bell
Labs computer in New Jersey. And, on July 27, $3,000 worth of software was
taken from Bell Labs. On July 31, the Zinn computer, according to the
affidavit, entered an AT&T computer that was holding a software program
used by the regional Bell System companies to record telephone service
requirements for customers.
That program, "if manipulated can give free telephone service and it can
be used to disrupt or halt telephone communications," the affidavit said.
On Aug. 1 and Aug. 3, 16 entries into the Naperville computer were made and
$40,000 worth of software used to support AT&T's electronic switching
system was stolen, according to the government.
On Aug. 28, the Zinn computer broke into the AT&T computer at Robins
Air Force Base and stole software that was used to back up a switching system
used by the Department of Defense, the affidavit said.
$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$
NOTA:
It seems that Shadow Hawk was severely busted for hacking. If he does not go
back into the hacking world, he should be remembered as one of the better
hackers (much better than most hackers). Shadow Hawk made several scans
of local exchanges and was known to have broken into many computers. He was
very good with the Unix operating system and definitely knew what he was
doing. As I said before, he should be remembered as one of the better hackers
of the hack/phreak world. Now I will go into the article in detail with some
explanations on different things mentioned.
======================================
"The sole purpose of the computer network in Texas, known as 'Phreak
Class-2600' is 'to educate computer enthusiasts ... to penetrate industrial
and government sector computer systems.'"-
The bbs described as "Phreak Class-2600" is actually "Phreak Klass
Room 2600." The current number to this bulletin board is (806) 799-0016. The
board isn't the greatest but it does have some very knowledgable people on it.
As described in the article, Phreak Klass is meant to educate people to
phreaking and hacking. If you would like to learn more about phreaking and
hacking, then please call. The current login is: EDUCATE. The board is public
and does not print codes or passwords to systems. The board is up for
educational purposes and codes or passwords are not tolerated.
======================================
"Henry Kluepfel, an AT&T corporate security official, tuned into the
Phreak Class-2600 and spotted messages from Shadow Hawk"-
This would indicate that there is currently an AT&T security official
on Phreak Klass. It is also likely that this security official, named Henry
Kluepfel, is on other bulletin boards related to the topics of phreaking and
hacking. Although this security official was/is monitoring messages on
Phreak Klass, it is unknown whether or not he had anything to do with the bust
of Shadow Hawk. He might still be there and it is not known by which handle he
goes by.
Although many names are definitely not the informant, it should be assumed
that one of the users on this list is Henry Kluepfel (PK Userlist):
1. D,DR.
2. EWING,JR -
3. !,DOC PHUN
4. !,FUSION
5. !,KARATE KID
6. !,ZACK
7. (TUFF),TRACKER
8. -----,OMEGA
9. ., EVADER
10. .,BAUHAUS
11. .,EASTWIND
12. .,EVADER
13. .,LOKI
14. .,MERLIN
15. .,OBERHIEMAN
16. .,RYCHE
17. .,SABRO
18. .,THE SHUFFLER
19. .,WOLFMAN
20. ...,PENDRAGON
21. 0PERATOR,THE
22. 1,VANDAL
23. 666,LUCIFER
24. ADAM,MIKE
25. ADEPT,BLUE
26. ADEPT,MAGNUS
27. ADVENGER,DEMON
28. AGENT,ADEPT
29. ALAND,PATRICK
30. ANARCHIST,ARMCHAIR
31. ANDREX,THE
32. ANGEL,DEATH
33. ANONYMOUS,RODNEY
34. ASHAD,ABDUL
35. ASSAULT,SILENT
36. ASSOCIATES,BREW
37. ATLANTIC,BILL
38. ATTACK!,OPERATIO AVOCADO,THE FLYING
40. AXIS,AGENT
41. BACARDI,DR
42. BAND,REZ
43. BANDIT,THE
44. BANDIT,TIME-
45. BARD,THE
46. BARON,RED
47. BARON,THE BAUD
48. BEEBLEBROX,ZAPHOD
49. BELLCON,MR
50. BERSITUS,BEN
51. BLACK,MR.
52. BLASTER,BYTE
53. BLIP,MR
54. BOBO,BOBO
55. BOUDREAUX,SMASHER
56. BREAKER,CIRCUIT
57. BREAKER,CODE
58. BREAKER,THE
59. BRIGGS,SIR
60. BROWN,DAVE
61. BUDMAN,THE
62. BULT,BUCKWEAT
63. BUM,DIGITAL
64. C,CTRL
65. CHANGE,RECENT
66. CHARLIE,COSMIC
67. CHEMIST,RENEGADE
68. CHEUNG,SLYDE
69. CHICKEN,THUNDER
70. CHOUINARD,JAY
71. CITIZEN,CONCERNED
72. COIL,VERTICAL
73. COLONEL,THE
74. CONNECT,CROSS
75. COOL J,LL
76. COOL,FIRECRACKER
77. COUNT,THE
78. CRACKER,THE
79. CRACKER,THE UNKNOWN
80. CREAPER,DARK
81. CRIMINAL,CORPORATE
82. CULPRIT,CARRIER
83. D MEN TOR,THE
84. DARKONE,THE
85. DEATH,COMMANDER
86. DEATH,CREEPING
87. DEATH,CRIMSON
88. DEATH,DRUIDIC
89. DECEIVER,THE
90. DELETE THIS.,THE DRUID
91. DEMON,DISK
92. DEMON,THE GUARDIAN
93. DENT,ARTHUR
94. DEVIL,ARCH
95. DIAMOND, KING
96. DOG,THE JUNKYARD
97. DRAKE,SIR FRANCIS
98. DROW,THE
99. DUDE,THE
100. DUKE,THE
101. DUTCHMAN,THE
102. EDGE,THE
103. ELIMINATOR,THE
104. ELITE,PURE
105. EQUALIZER,THE
106. ERICKSON,S.K.
107. EVANS,MARK
108. EXECUTIONER,THE
109. EXORCIST,THE
110. EXTERMINATOR,THE
111. FACTOR,DOMINANT
112. FALCON,GREY
113. FALCON,THE
114. FINGERS,FINEOUS
115. FLASH,GRANDMASTER
116. FLINT,CAPTAIN
117. FLOYD,PHREAKY
118. FLYER,MIDNIGHT
119. FOG,SINISTER
120. FOREHEAD,PORCELAIN
121. FOUL,LORD
122. FREAKER,PHILLIPPINO
123. FREEZE,THE
124. FRESH,DOUG
125. FUGATIVE,THE
126. FUGITIVE,THE
127. FUGITIVE-,-THE
128. GAMELORD,SIR
129. GHOST,GREY
130. GIBE,FRANKEN
131. GRAHAM,MICHAEL
132. GREEL,MAGNUS
133. GREEN,TYRONE
134. GREYHOUND,GRANTIN
135. GRIFFIN, THE
136. GRIFFIN,THE
137. GUARDIAN,THE
138. HACK,MULTI
139. HACK,TRASH
140. HALEN,VAN
141. HARRY,DIRTY
142. HATTER,MAD
143. HAVOC,MAJ.
144. HAWK,NIGHT
145. HAWK<_),(_>SHADOW
146. HEADROOM,MAX
147. HEART,PURPLE
148. HEARTS,JACK OF
149. HELIX,DOUBLE
150. HIEROPHANT,THE ARCANE
151. HOFFMAN,GREG
152. HOLMES,SHERLOCK
153. HORSE,CRAZY
154. I AM,SAM
155. ICOM,MR.
156. IDAP,IOWD
157. IDLE,BILLY
158. III,EPSILON
159. INSIDER,THE
160. INSTRUCTOR,THE
161. JACK,CRACKA
162. JAGGERS,BOB
163. JAMES,JESSE
164. JAY,EVIL
165. JENI,JINN
166. JOE,G.I.
167. JOHN,CRACKER
168. JOHNSON,FRED
169. KAY,DR.
170. KEY,DEGARMO &
171. KHAN,KERRANGHT,BLACK
173. KNIGHT,THE CELESTIAL
174. KNIGHT,WHITE
175. KODIAK <-,->
176. KOMMISAR,DER
177. KOUSIDIS,IVAN
178. KRACKER,THE
179. LAMBO,PIRATESOFT
180. LAWLESS,LORD
181. LEFTIST,THE
182. LEMIEUX,MARIO
183. LESTAT,VAMPIRE
184. LIGHT,BUD
185. LIGHTNING, KNIGHT
186. LOGIC,DIGITAL
187. LOOP,DEAD
188. LORD,SHADOW
189. LOVER,THE EGYPTIAN
190. LUCAS, THE 0PERATOR
191. LUTHOR,LEX
192. M.D.,DR. CRAZY
193. MAC,SIR
194. MACK,T-
195. MAD,MR
196. MAGICIAN,ZORLOFF
197. MAIDEN,IRON
198. MAN,HAC
199. MAN,TERMINAL
200. MAN,THE PHONE
201. MANIPULATOR,CODE
202. MARAUDER,THE
203. MARTYR,THE
204. MASTER, HATCHET
205. MASTER,CODES
206. MASTER,DELTA-
207. MASTER,STAR
208. MAX,MAD
209. MECHANIC,CHIEF
210. MENTOR,THE
211. MIDNITE,CAPTAIN
212. MINDED,ABSENT
213. MIRANDA,QUINTON J.
214. MONGREL,SPLIFF
215. MONK,CHIP
216. MUAD'DIB,PAUL
217. MURDERER,AX
218. MYRIAD,LORD
219. NELSON,_-STYLE-_
220. NICE,MR.
221. NOTCH,TOP
222. NUDITY,FRONTAL
223. OF IMRRYR,ELRIC
224. OF REALITY,MASTER
225. OIL,EWING
226. OMEN,THE
227. ONE,HANDSOMEST
228. ONE,KATO
229. OPPOSITION,PSYCHOTIC
230. ORACLE,THE
231. OUTRIDER,THE
232. OUTWORLD,FLINT OF
233. OVERLORD,THE
234. PANDEMONIUM,WASTED
235. PECHACEK,JOHN
236. PENGUIN,THE
237. PETRA, ACE
238. PEZ,MR.
239. PHLASH,JUMPIN' JACK
240. PHONESUCKER,THE
241. PHREAK,NYNEX
242. PHREAK-A-ZOID,THE
243. PHREAKER,PHANTOM
244. PHREAKO,PHREAKO
245. PIRATEER,BADGER
246. POLTERGEIST,ASTABULA
247. POPE,THE
248. PREFICT,FORD
249. PRODIGAL,THE
250. PROPHET,DOOM
251. PROPHET,THE
252. PSYCHEDELIC,THE
253. QUEST,ORYAN
254. QUITO,DON
255. RADIX,OTHO
256. RAVEN,STAR
257. RANGER,THE
258. RAT,SWAMP
259. REAPER,CHROMATIC
260. REQUEST,INTERRUPT
261. RIDER,GHOST
262. RIDER,MIDNIGHT
263. ROLLOVR,DETH
264. ROTTEN,JOHNNY
265. RUNNER,BLADE
266. RUNNER,SHADOW
267. RUSSO,FRANK
268. SALERNO,MIKE
269. SAXON,ANGLO
270. SECTOR,TWISTED
271. SENSEI,NINJA
272. SENSEI,THE
273. SEVEN,CONRAD
274. SHARP,FARLEY
275. SHERMAN,ROBERT
276. SHERWOOD,JOHN
277. SINISTAR,SILICON
278. SLASHER,MASTER
279. SMITH,BOOMER
280. SMITH,WINSTON
281. SQUIRE,THE
282. STALKER,DEATH
283. STARR,DAVE
284. STATE,SOLID
285. STEIN,PHREAKEN
286. STERN,HOWARD
287. STEVENS,FRANKLIN
288. STYLE,MR.
289. SWANN, DAVID
290. SWINDLER,SILICON
291. T. DISASTER,MAJOR
292. TERMINATOR,THE
293. THE DUCK,HOWARD
294. THE HACK,ZACK
295. THE PROLONGED,AGRAJAG
296. THE RIPPER,JACK
297. THIEF,THE
298. TONE,DIAL
299. TRADER,THE
300. TUCBBS,TUC
301. VICIOUS,SID
302. VIGILAN WAR,WIZARD OF
304. WARLOCK LORD,THE
305. WATCHER,THE
306. WATCHER,WOMAN
307. WATCHER,WOMEN
308. WATSON,SHITHEAD
309. WAVE,SHOCK
310. WAVE,SHORT
311. WEED,TUMBLE
312. WILLIAMS,REMO
313. WIZ KID,COMPUTER
314. WOLF,LONE
315. WONDERFUL,MR.
316. XEROX,MR.
317. YOUNG,TODD
318. ZAP,CAPT
This security agent "spotted messages from Shadow Hawk". Here are some of
Shadow Hawk's posts from Phreak Klass:
Numb: 31
Subj: SHIT.
From: SHADOW HAWK
Date: MON MAY 11 2:08:53 AM
Looks like I've got a lot to learn as far as the TELE part of telecom goes...
I've got a question about trunks: Would someone mind explaining just how they
work, how you can 'drop into' a trunk w/2600, what a physical trunk (assuming
its just wires) looks like, etc.
Also, around here there are these weird green manholes that look more like
portholes to tanks than manhole covers. They usually are accompanied by a box
of the same shade, which usually has a red light (enclosed) as an appendage.
My question is, what the hell are they? There are none close enough to my
locale for me to actually attempt to enter one, but if their 'insides' are as
hi-tech as the outside looks... you get the picture
Later,
(_>Shadow Hawk<_)
Numb: 32
Subj: Boxing
From: SHADOW HAWK
Date: FRI MAY 22 1:24:56 PM
I don't think it would be THAT hard. Probably just a small sequencer & about 16
bits of DRAM, as well as a timer & of course the tone generator and keyboard
encoder. Now that may sound complicated but with todays electronics it could
all be done with probably around 6 ICs.
I had something like this in mind a while ago, the ultimate Telecom/computer
tool. IT goes something like this: a 1 MHZ A/D and a 1 MHZ D/A converter (16
bit resolution each) are connected basically to whatever you want, and to the
computer via an RS-232 interface. 'Whatever you want' is your phone line, your
ham radio, or even your LAN. It's basically a computer controlled
oscilliscope/waveform generator, except that there's no way it could run at
full 1mhz without about 16 megs of 16 bit ram & a REALLY fast coprocessor to
convert the raw waveform data into more easily convertable data. I've been
looking for a tech to help me out with this one for a long time, but to no
avail.
(the purpose, in case it wasn't readily apparent from the above, is to
1) tone dial, 2) MF dial, 3) generate ANY modem standard, 4) FAX, 5) 'scope,
6) voice recognition? The list goes on and on...)
Enough ramblings;Later, Fnord,
(_>Shadow Hawk<_)
Numb: 36
Subj: Autovon
From: SHADOW HAWK
Date: MON JUN 1 9:20:07 PM
Executioner: I'm fairly certain that the '*' (I'm assuming that you mean the D
key on a modified touch tone keypad) connects you only to a testing device of
some sort. If my assumption was wrong, would you please explain how to do it?
It sounds interesting...
(_>SH
Numb: 35
Subj: mail? what mail?
From: SHADOW HAWK
Date: MON JUN 1 9:25:28 PM
I know of the multitude orating TH's, but that method was(is)
for a particular system where I can't even chown; I've got access to everything
else though.
Mail: As the title says, what mail? I thought I'd responded to your last mail,
but I guess not... Call me!
(_>Shadow Hawk<_)
Numb: 7
Subj: Reply to Question/Mercenary
From: SHADOW HAWK
Date: FRI MAY 22 1:09:44 PM
I've never had any problems with just dialing straight through 1 (one) sprint
950. Call me crazy, stupid, or an excessive taker of risks, but I've never even
had a run in with Sprint Security. Probably because I don't hack the codes out
myself, but that's another story.
(_>Sh
Numb: 33
Subj: BUGS
From: SHADOW HAWK
Date: MON MAY 11 2:17:12 AM
This should really go on the phreak board, BUT...
If you're referring to the bugs that are sold by deco industries, and you can
tell by their ads: they always compare their bugs to a dime or a quarter,
they're actually not that bad a deal. The phone line bug that they sell will
trasmit about a quarter to a half a block, and is powered completely from the
phone line. Their other bug, the one that's powered by (I think) a 9 volt
battery & is itself the size of a quarter, will go about 1-2 blocks. This is
without any real antenna, (except of course the phone line, or the battery
wires, respectively) which would be pretty good, except that they transmit on
the FM band. If you can find a spot on FM where theres no station, and can tune
both your receiver and the bug-transmitter to the same frequency, then you've
got it made.
As to construction, they're actually pretty easy to build if you've ever used a
soldering iron in your life. If not, make friends with a tech. and ask her/him
to do it, it is little more than a 5 minute assembly job for anyone with ANY
experience.
Later, (_>Shadow Hawk<_)
======================================
"Shadow Hawk braged in the messages that he had successfully gained access
to AT&T computer files and said he was interested in creating some 'Trojan
horses' in the AT&T network."-
This statement in the article refers to the following messages that
this security official read on Phreak Klass. Here are the messages posted by
Shadow Hawk as well as the appropriate responses (all from PK, of course):
Numb: 39
Subj: another 'stuff' already.
From: SHADOW HAWK
Date: MON MAY 11 2:21:47 AM
I better make this quick, 2 minutes left.
I've got all this source code (Notesfiles, UnAxcess, *ALL system 5 source) as
well as this list (399K) of AT&T Unixes on their net, and nothing to do with
them. Anyone out there wanna help me make some serious 'trojans?' I REALLY like
abusing the net...
Later,
(_>Shadow Hawk<_)
Numb: 38
Subj: uucp
From: SHADOW HAWK
Date: SUN MAY 31 2:16:59 AM
I've got this idea for a trojan horse type of deal...
A shellscript, run under nohup, with the 'victim' tty being the one I'm on, and
linked to the nohup.out file. I log out, and the nohup starts doin' it's thing.
I think you can figure out the rest for yourself. The question is, will itit rig
ht now but I'm doing an 8 meg uucp transfer through it
at the moment.
Later,
(_>SH
Numb: 30
Subj: my first born...
From: DRUIDIC DEATH
Date: WED MAY 13 2:36:54 PM
I7ll trade you my first born for a
chance to hack those systems. I'm
pretty good at TH and decoy
programming, so sure I'll help you.
I'd love to download the 399K
list for you too. Let's work out
a deal, how about it?
DRU'
Numb: 31
Subj: unix from the top down
From: THE PROPHET
Date: THU MAY 14 6:17:23 AM
I'd like to point out one thing about my file first... A rather embarrassing
errr. In the original version, I said "chown"
was used to change file modes, when the correct command is "chmod". This was
purely a typo, as I know the difference between the two commands. The format
for the command, though, was correct.
SState- there is one slight flaw in your trojan shell script. If the LOGNAME
variable is not set by root, it will not unprotect the password file when it is
run by the superuser. It's better to check the logname by using the logname
command, which is accomplished by using logname in place of $LOGNAME in the
script.
Shadow Hawke was asking about less easily detectable trojan horses. An easy way
to subvert a utility that normally has the uid bit set, like su, is to make a
copy of the utility and hide it in an out of the way directory, with the uid
bit NOT set. Then make a c program which does the following:
if a certain argument is given to the program (which replaces the real
utility), it executes the shell using the execvp C command.
otherwise, execute the copy of the utility.
Then set change ownership of the file to root, and set the uid bit, and name it
"su" (or whatever), and replace the real utility with it. Since su always has
the uid bit set and is always owned by root, it will be less easily detected,
unless the administrators notice the file size. This is easy to do, requires
only a minimal knowledge of C, and does not require the source code for the
subverted utility.
-TP
======================================
"Kathyryn Clark, a spokesman for AT&T, said 'I'm aware of it. Our
security systems alert us when there is this type of break'".-
I'm so sure. Shadow Hawk broke into many more systems than the ones
they busted him for.
======================================
"Later that month, another AT&T corporate security official spotted a
statement made by Shadow Hawk on another computer bulletin board in
Chicago."-
This bulletin board is most likely Ripco (Ripco International). Shadow
Hawk was a user at this bulletin board and took part in phreak/hack discussions
(and possibly posted hacked computers). Do not quote me on this. This is only
an assumption and has not been verified. The current telephone number to
Ripco is (312) 528-5020. It should also be noted that this was a different
AT&T corporate security official. A DIFFERENT one.... as if AT&T has been
monitoring all phreak/hack bulletin boards??? Both of these security
officials are being paid to monitor boards. Is it poss
security officials monitor phreak/hack bulletin boards?? Henry Kluepfel and
this security official are certainly monitoring bulletin boards!
======================================
"In that message, Shadow Hawk provided the names, telephone numbers, passwords
and other critical information needed to gain access to seven different AT&T
computers"-
It is not certain if any of these computers were the ones that Shadow
Hawk was busted for breaking into. And of course an AT&T security official
(one of those paid to monitor boards) read Shadow Hawk's message.
======================================