Copy Link
Add to Bookmark
Report
Vaginal and Anal Secretions Newsletter 062
ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ»
º ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ßÜ Û ÛßßßÛ Ûßßßß ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ º
º ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ßÜ Û Û Û ÛÜÜÜÜ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ º
º ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ßÜ Û ÛßßßÛ Û ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ º
º ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ ßÛ Û Û ÜÜÜÜÛ ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ º
ÌÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͹
º Vaginal and Anal Secretions Newsletter #0062 º
ÇÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄĶ
º Date Released : [07/15/92] Author: iNFoWoRLd RePRiNT. º
ÇÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄĶ
º More MoD Bust News - From Infoworld Magazine. º
ÓÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄĽ
This is a reprint of an article first appearing in COMPUTERWORLD
magazine. I found this to be of interest to you guys and this way it gets
around to more people.
WIRETAP SNARES ALLEGED HACKERS
New York - Last week's indictment of some of the most notorius and
self-promoting names in the computer hacker community signals a newfound
aggressiveness on the part of frustrated federal law enforcement agents.
A two-year investigation snared five defendants, ranging in age from
18 to 22, in the governments first use of court-authorized wiretaps to monitor
voice conversations and data transmissions of computer hackers.
The defendants are charged with breaking into computer systems at
several regional telephone companies, Fortune 500 firms such as Martin
Marietta Corp., universities and credit-reporting agencies such as TRW, Inc.,
which reportedly had 176 consumer credit reports stolen and sold to private
investigators.
Hardest hit was St. Louis-based Southwestern Bell, which had to spend
$370,000 to locate corrupted programs and install new securty devies,
according to the indictment.
SERIOUS REPERCUSSIONS
The charges were the result of a joint investigation by the U.S.
Attorney's Office, the Secret Service, and the FBI. The 11-count indictment
accuses the five defendants of computer fraud, computer tampering, wire fraud,
illegal wiretapping and conspiracy.
If convicted, they face up to five years in prison for each count, for
a total of 55 years, plus a maximum fine of $250,000 for each count.
Agents expressed concern that the penetration of some of the country's
most secure data networks by young men barely out of high school may have
started out as a round of one-up-manship to see who could get into the most
sophisticated system as well as harass others.
"This is no game, and we want them to know that," FBI special agent
Richard DeFilippo said. "We're not going to sit by and watch these guys play
an electronic version of 'Can you top this?' "
According to the indictment, the men allegedly carried on a
conversation in early november 1991 in which they sought instructions on how
to add and remove delinquency reports "to destroy people's lives ... or make
them look like a saint."
Several days later, members allegedly discussed a lenghy list of
institutions that operated computers, with one member noting, "We've just got
to start hitting these sites left and right." Law enforcement officials
interpreted that to mean government offices, private companies and a U.S. Air
Force base.
The high profile raid, however, may have little real effect on
hacking in the long term. "Ultimately, the only purpose this will probably
serve is that hackers will go deeper underground, which is a heck of a lot
more frightening," said Ian Murphy, president of IAM/Secure Data Systems,
Inc., a security consultancy in Gladwyne, Pa.
The arrests, however, may serve to wake some firms up to their
security vulnerabilities. At many companies, the only securt system is a
poster above the copy machine that shows a dog with a moustache and a Sherlock
Holmes hat, said David Stang, chairman of the International Computer Securtiy
Association in Washington, D.C.
NAME GAME
Indicted last week were Mark Abene, known as Phiber Optik; Elias
Ladopoulous, known as Acid Phreak; Julio Fernandez, known as Outlaw; John Lee,
known as Corrupt; and Paul Stira, known as Scorpion.
The indictment charges that they were part of a close-knit group of
hackers called MOD, an acronym used variously to mean Masters of Disaster and
Masters of Deception.
The group's earliest known act dates back to Nov. 28, 1989, when
authorities said the group wiped out nearly al the information contained in
the Learning Link computer operated by the Educational Broadcast Corp., WNET
Channel 13 in New York. A message was allegedly left that said: "Happy
Thanksgiving you turkeys, from all of us at MOD," signed by Acid Phreak,
Phiber Optik and Scorpion.
That does not wash with some observers. "Several times, Phiber Optik
has spoken publicly and very genuinely about his aversion to corrupting data,
so it seems unusual that he would destroy data and then identify himself,"
said Mike Goodwin, general counsel at the Electronic Frontier Foundation, a
civil liverties lobbying group based in Washington, D.C. "This whole
indictment could very well be an attempt to frame some people who the
authorities believe glorify hacking."
The hoped-for chilling effects of the indictments could thus be
reversed into outrage if the investigation turns out to be bungled. The
federal government, after all, has a checked history of computer raids,
obsevers pointed out.
In early 1989, for example, Secret Service Agents arrested Craig
Neidorf for allegedly dialing into the computers at Atlanta-based Bellsouth
Corp. and copying doccuments on the firm's 911 system. The agency charged
Neidorf with illegaly publishing a doccument that Bellsouth claimed was worth
$79,000. The goverment's case later collapsed when it was discovered that the
information can be ordered from Bellsouth for $13. The price of victory for
Neidorf: more than $100,000 in legal fees.
Moreover, in March 1990, the Secret Service raided the home of Steve
Jackson, who published role-playing computer games in Austing, Texas. The
agents seized computeres they said contained a "handbook of computer crime."
The handbook was, in fact, an electronic game under development.
Jackson was not charged with any crime, but he said the prolonged
disruption and seizing of equipment pushed his business close to bankruptcy.
A 'GOOD' CASE
Government officials seem anxious to sponge away those memories. The
FBI has long expressed the desire to prosecute a "good" computer crime case,
and perhaps this is it, said Buck Bloombecker, director of the National Center
for Computer Crime Data in Santa Cruz, California.
Officials think this could be that case. Assistant U.S. Attorney
Stephen Fishbein said members of MOD were able to obtain unauthorized
passwords and billing codes from switchign systems at telcom companies such as
Southwestern Bell to make free long-distance telephone calls.
At the FBI, DiFilippo said he expects other indictments could result
and other victims could be found in the course of the ongoing investigation.
That appears to have begun already. In a related action last month, Morton
Rosenfeld and Alfredo de la Fe each pleaded guilty in U.S. District Court in
New York to conspiracy to use passwords and other access devices purchased
from MOD.
During the past few years, TRW and other credit-reporting agencies
have become such frequent hacker victims that "it's no longer considered
impressive to be able to get someone's TRW report," Murphy said. "It's too
easy."
NEW PROBE UNDER WAY
Law enforcement officials in San Diego are currently investigation
computer system breaches into the credit-reporting network of Equifax, Inc. in
Atlanta.
Last week's indictments could also possibly signal greater use of
wiretaps in federal computer crime investigations. Already, there is
legislation in congress that, if passed, would allow federal investigators to
intercept digital transmissions, said Otto G. Obermaier, U.S. Attorney for the
Southern District of New York.
Under current statues, federal investigators can now intercept only
analog transmissions, as they did in this case.
ÄÄÄÍÍÍÍÍ[ VaS DiSTRiBuTioN SiTeS ]ÍÍÍÍÍÄÄÄ
ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ»
º BBS Name Number Baud Sysop Title º
ÇÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄĶ
º LiVe WiRE BBS (313)464-1470 14.4 Studmuffin World HQ º
º PoT BBS (313)462-1906 24oo Phreak_Accident World HQ º
º Floating Pancreas (305)551-0311 14.4 Majestic Cockster Dist. #1 º
º Midian BBS (703)790-8048 14.4 The Raging Golemn Dist. #2 º
ÇÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄĶ
º VaS Voice Mail Box (313)910-3030 FoR THe LaTeST NeWS iN VaS And To º
º LeAve uS CoMmEnTs! º
º VaS FaX Line (313)380-4904 SeND C/o VaS! FaX uS CooL StuFF LiKE º
º PiCTuReS oR SomEthIng LiKe ThAt! º
ÇÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄĶ
º And To Reach us Via U.S. Mail, Send Letters To: º
º º
º VaS World Headquarters º
º P.O. Box 530768 º
º Livonia,MI 48153 º
ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ