| ==Phrack Inc.== |
|
|
| Volume Two, Issue Eleven, Phile #11 of 12 |
|
|
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN PWN |
| PWN *>=-{ Phrack World News }-=<* PWN |
| PWN PWN |
| PWN Issue X PWN |
| PWN PWN |
| PWN Written, Compiled, and Edited PWN |
| PWN by Knight Lightning PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
| Scan Man Revisited January 19, 1987 |
| ------------------ |
| The following is a reprint from TeleComputist Newsletter Issue Two; |
|
|
| SCAN MAN - FED OR PHREAK? (The Other Side) |
|
|
| TeleComputist is printing the statement Scan Man has made to us |
| [TeleComputist] in rebuttal to Phrack World News, whom previously printed an |
| article concerning Scan Man in Phrack Issue VIII. Those of you who have seen |
| or read the article in Phrack VIII know that it basically covered information |
| and an intercepted memo alleging Scan Man of going after hackers and turning |
| in codes off his BBS (P-80 Systems, Charleston, West Virginia 304/744-2253) as |
| a TMC employee. Please note that this statement should be read with the |
| article concerning Scan Man in Phrack Issue VIII to get the full |
| understanding. |
|
|
| Scan Man started off his statement claiming not to work for TMC, but |
| instead for a New York branch office of Telecom Management (a Miami based |
| firm). He was flown in from Charleston, West Virginia to New York every week |
| for a four to five day duration. Once in New York, Telecom Management made |
| available a leased executive apartment where Scan Man stayed as he worked. |
| His position in Telecom Management was that of a systems analyst, "...and that |
| was it!" Scan Man stated. Scan Man also stated that he had never made it a |
| secret that he was working in New York and had even left messages on his BBS |
| saying this. |
|
|
| He also went on to say that he had no part in the arrest of Shawn [of |
| Phreaker's Quest] (previously known as Captain Caveman) by TMC in Las Vegas. |
| Scan Man claimed to have no ties with TMC in Las Vegas and that they would not |
| even know him. Scan Man then went on to say that Shawn had never replied to |
| previous messages Scan man had left asking for TMC codes. Scan Man also said |
| that the messages about TMC were in no way related to him. He claimed to have |
| no ties to TMC, which is a franchised operation which makes even TMC unrelated |
| except by name. |
|
|
| Scan Man stated that he called Pauline Frazier and asked her about the |
| inquiry by Sally Ride [:::Space Cadet] who acted as an insider to obtain the |
| information in Phrack VIII. He said that Pauline said nothing to the imposter |
| (Sally Ride) and merely directed him to a TMC employee named Kevin Griffo. |
| Scan Man then went on to say that the same day Sally Ride called Pauline |
| Frazier was the same day he received his notice. And to that Scan Man made |
| the comment, "If I find out this is so heads will roll!" |
|
|
| After that comment, Scan Man came up with arguments of his own, starting |
| off with the dates printed in Phrack VIII. He claimed that the dates were off |
| and backed this up by saying Ben Graves had been fired six months previously |
| to the conversation with Sally Ride. Scan Man then went on to ask why it had |
| taken Sally Ride so long to come forward with his information. Scan Man made |
| one last comment, "It's a fucking shame that there is a social structure in |
| the phreak world!" Meaning Sally Ride merely presented his information to |
| give himself a boost socially in the phreak world. |
|
|
| This is how it ended. We would like to say that TeleComputist printed the |
| statement by Scan Man to offer both sides of the story. We make no judgements |
| here and take no sides. |
|
|
| Reprinted with permission from TeleComputist Newsletter Issue 2 |
|
|
| Copyright (C) 1986 by J. Thomas. All Rights Reserved |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
| Ok, that was Scan Man's side to the story, now that he had a few months to |
| come up with one. Lets do a critical breakdown; |
|
|
| -*- "He was flown in from Charleston, West Virginia to New York every week for |
| a four to five day duration." |
|
|
| Gee, wouldn't that get awfully expensive? Every week...and "made |
| available a leased executive apartment..." He must have been quite an |
| asset to "Telecom Management" for them to spend such large amounts on him. |
| Kinda interesting that he lived in Charleston, West Virginia (where |
| surprisingly enough there is a branch of TMC) and flew to New York every |
| week. |
|
|
| -*- "Scan Man claimed to have no ties with TMC in Las Vegas..." Ok, I'll buy |
| that. Notice how he didn't say that he had no ties with TMC in |
| Charleston. Furthermore if he had no ties with TMC in Charleston why |
| would they have his name in their company records? Why would all those |
| employees know him or dislike him for that matter? |
|
|
| -*- "Scan Man then went on to say that the same day Sally Ride called Pauline |
| Frazier was the day he received his notice." Well now, how can there be a |
| connection between the two events at all when Scan Man works for Telecom |
| Management and has "no ties with TMC" and claimed "not to work for TMC"? |
| If TMC and Telecom Management are truly independent of each other then |
| nothing Sally Ride said to Pauline Frazier could have affected him in ANY |
| way. That is unless he did work for TMC in the first place. |
|
|
| -*- "...and back this up by saying that Ben Graves had been fired six months |
| previously to the conversation with Sally Ride." Well first of all, PWN |
| did not give a date as to when Ben Graves was fired from TMC. Second of |
| all and more important, how does Scan Man know so much about TMC when he |
| works for "Telecom Management" and has "...no ties with TMC..."? |
|
|
| The rest of his statements were highly debatable and he showed no proof as to |
| their validity. As for why Sally Ride waited so long to come forward, well he |
| didn't wait that long at all, he came forward to myself in late May/early June |
| of 1986. My decision was to do nothing because there wasn't enough proof. |
| After three months of research we had enough proof and the article was |
| released. |
|
|
| With this attempt to cover up the truth, Scan Man has only given more |
| ammunition to the idea that he isn't what he claims to be. |
|
|
| Special Thanks to TeleComputist Newsletter |
| ______________________________________________________________________________ |
|
|
| The Cracker Cracks Up? December 21, 1986 |
| ---------------------- |
| "Computer 'Cracker' Is Missing -- Is He Dead Or Is He Alive" |
|
|
| By Tom Gorman of The Los Angeles Times |
|
|
| ESCONDIDO, Calif. -- Early one morning in late September, computer hacker Bill |
| Landreth pushed himself away from his IBM-PC computer -- its screen glowing |
| with an uncompleted sentence -- and walked out the front door of a friend's |
| home here. |
|
|
| He has not been seen or heard from since. |
|
|
| The authorities want him because he is the "Cracker", convicted in 1984 of |
| breaking into some of the most secure computer systems in the United States, |
| including GTE Telemail's electronic mail network, where he peeped at NASA |
| Department of Defense computer correspondence. |
|
|
| He was placed on three years' probation. Now his probation officer is |
| wondering where he is. |
|
|
| His literary agent wants him because he is Bill Landreth the author, who |
| already has cashed in on the successful publication of one book on computer |
| hacking and who is overdue with the manuscript of a second computer book. |
|
|
| The Institute of Internal Auditors wants him because he is Bill Landreth the |
| public speaker who was going to tell the group in a few months how to make |
| their computer systems safer from people like him. |
|
|
| Susan and Gulliver Fourmyle want him because he is the eldest of their eight |
| children. They have not seen him since May 1985, when they moved away from |
| Poway in northern San Diego county, first to Alaska then to Maui where they |
| now live. |
|
|
| His friends want him because he is crazy Bill Landreth, IQ 163, who has pulled |
| stunts like this before and "disappeared" into the night air -- but never for |
| more than a couple of weeks and surely not for 3 months. They are worried. |
|
|
| Some people think Landreth, 21, has committed suicide. There is clear |
| evidence that he considered it -- most notably in a rambling eight-page |
| discourse that Landreth wrote during the summer. |
|
|
| The letter, typed into his computer, then printed out and left in his room for |
| someone to discover, touched on the evolution of mankind, prospects for man's |
| immortality and the defeat of the aging process, nuclear war, communism versus |
| capitalism, society's greed, the purpose of life, computers becoming more |
| creative than man and finally -- suicide. |
|
|
| The last page reads: |
|
|
| "As I am writing this as of the moment, I am obviously not dead. I do, |
| however, plan on being dead before any other humans read this. The idea is |
| that I will commit suicide sometime around my 22nd birthday..." |
|
|
| The note explained: |
|
|
| "I was bored in school, bored traveling around the country, bored getting |
| raided by the FBI, bored in prison, bored writing books, bored being bored. I |
| will probably be bored dead, but this is my risk to take." |
|
|
| But then the note said: |
|
|
| "Since writing the above, my plans have changed slightly.... But the point is, |
| that I am going to take the money I have left in the bank (my liquid assets) |
| and make a final attempt at making life worthy. It will be a short attempt, |
| and I do suspect that if it works out that none of my current friends will |
| know me then. If it doesn't work out, the news of my death will probably get |
| around. (I won't try to hide it.)" |
|
|
| Landreth's birthday is December 26 and his best friend is not counting on |
| seeing him again. |
|
|
| "We used to joke about what you could learn about life, especially since if |
| you don't believe in a God, then there's not much point to life," said Tom |
| Anderson, 16, a senior at San Pasqual High School in Escondido, about 30 miles |
| north of San Diego. Anderson also has been convicted of computer hacking and |
| placed on probation. |
|
|
| Anderson was the last person to see Landreth. It was around September 25 -- |
| he does not remember exactly. Landreth had spent a week living in Anderson's |
| home so the two could share Landreth's computer. Anderson's IBM-PC had been |
| confiscated by authorities, and he wanted to complete his own book. |
|
|
| Anderson said he and Landreth were also working on a proposal for a movie |
| about their exploits. |
|
|
| "He started to write the proposal for it on the computer, and I went to take a |
| shower," Anderson said. "When I came out, he was gone. The proposal was in |
| mid-sentence. And I haven't seen him since." |
|
|
| Apparently Landreth took only his house key, a passport, and the clothes on |
| his back. |
|
|
| Anderson said he initially was not concerned about Landreth's absence. After |
| all this was the same Landreth who, during the summer, took off for Mexico |
| without telling anyone -- including friends he had seen just the night before |
| -- of his departure. |
|
|
| But concern grew by October 1, when Landreth failed to keep a speaking |
| engagement with a group of auditors in Ohio, for which he would have received |
| $1,000 plus expenses. Landreth may have kept a messy room and poor financial |
| records, but he was reliable enough to keep a speaking engagement, said his |
| friends and literary agent, Bill Gladstone, noting that Landreth's second |
| manuscript was due in August and had not yet been delivered. |
|
|
| But, the manuscript never came and Landreth has not reappeared. |
|
|
| Steve Burnap, another close friend, said that during the summer Landreth had |
| grown lackadaisical toward life. "He just didn't seem to care much about |
| anything anymore." |
| Typed for PWN by Druidic Death |
| From The Dallas Times Herald |
| ______________________________________________________________________________ |
|
|
| Beware The Hacker Tracker December, 1986 |
| ------------------------- |
| By Lamont Wood of Texas Computer Market Magazines |
|
|
| If you want to live like a spy in your own country, you don't have to join the |
| CIA or the M15 or the KGB. You can track hackers, like John Maxfield of |
| Detroit. |
|
|
| Maxfield is a computer security consultant running a business called |
| BoardScan, which tracks hackers for business clients. He gets occasional |
| death threats and taunting calls from his prey, among whom he is known as the |
| "hacker tracker," and answers the phone warily. |
|
|
| And although he has received no personal harassment, William Tener, head of |
| data security for the information services division of TRW, Inc., has found it |
| necessary to call in experts in artificial intelligence from the aerospace |
| industry in an effort to protect his company's computer files. TRW is a juicy |
| target for hackers because the firm stores personal credit information on |
| about 130 million Americans and 11 million businesses -- data many people |
| would love to get hold of. |
|
|
| Maxfield estimates that the hacker problem has increased by a factor of 10 in |
| the last four years, and now seems to be doubling every year. "Nearly every |
| system can be penetrated by a 14-year old with $200 worth of equipment," he |
| complains. "I have found kids as young as nine years old involved in hacking. |
| If such young children can do it, think of what an adult can do." |
|
|
| Tener estimates that there are as many as 5,000 private computer bulletin |
| boards in the country, and that as many as 2,000 are hacker boards. The rest |
| are as for uses as varied as club news, customer relations, or just as a hobby. |
| Of the 2,000 about two dozen are used by "elite" hackers, and some have |
| security features as good as anything used by the pentagon, says Maxfield. |
|
|
| The number of hackers themselves defies estimation, if only because the users |
| of the boards overlap. They also pass along information from board to board. |
| Maxfield says he has seen access codes posted on an east coast bulletin board |
| that appeared on a west coast board less than an hour later, having passed |
| through about ten boards in the meantime. And within hours of the posting of |
| a new number anywhere, hundreds of hackers will try it. |
|
|
| "Nowadays, every twerp with a Commodore 64 and a modem can do it, all for the |
| ego trip of being the nexus for forbidden knowledge," sighs a man in New York |
| City, known either as "Richard Cheshire" or "Chesire Catalyst" -- neither is |
| his real name. Cheshire was one of the earliest computer hackers, from the |
| days when the Telex network was the main target, and was the editor of TAP, a |
| newsletter for hackers and phone "phreaks". Oddly enough, TAP itself was an |
| early victim of the hacker upsurge. "The hacker kids had their bulletin |
| boards and didn't need TAP -- we were technologically obsolete," he recalls. |
|
|
| So who are these hackers and what are they doing? Tener says most of the ones |
| he has encountered have been 14 to 18 year old boys, with good computer |
| systems, often bright, middle class, and good students. They often have a |
| reputation for being loners, if only because they spend hours by themselves at |
| a terminal, but he's found out-going hacker athletes. |
|
|
| But Maxfield is disturbed by the sight of more adults and criminals getting |
| involved. Most of what the hackers do involves "theft of services" -- free |
| access to Compuserve, The Source, or other on-line services or corporate |
| systems. But, increasingly, the hackers are getting more and more into credit |
| card fraud. |
|
|
| Maxfield and Cheshire describe the same process -- the hackers go through |
| trash bins outside businesses whose computer they want to break into looking |
| for manuals or anything that might have access codes on it. They may find it, |
| but they also often find carbon copies of credit card sales slips, from which |
| they can read credit card numbers. They use these numbers to order |
| merchandise -- usually computer hardware -- over the phone and have it |
| delivered to an empty house in their neighborhood, or to a house where nobody |
| is home during the day. Then all they have to do is be there when the delivery |
| truck arrives. |
|
|
| "We've only been seeing this in the last year," Maxfield complains. "But now |
| we find adults running gangs of kids who steal card numbers for them. The |
| adults resell the merchandise and give the kids a percentage of the money." |
|
|
| It's best to steal the card number of someone rich and famous, but since |
| that's usually not possible it's a good idea to be able to check the victim's |
| credit, because the merchant will check before approving a large credit card |
| sale. And that's what makes TRW such a big target -- TRW has the credit |
| files. And the files often contain the number of any other credit cards the |
| victim owns, Maxfield notes. |
|
|
| The parents of the hackers, meanwhile, usually have no idea what their boy is |
| up to -- he's in his room playing, so what could be wrong? Tener recalls a |
| case where the parents complained to the boy about the high phone bill one |
| month. And the next month the bill was back to normal. And so the parents |
| were happy. But the boy had been billing the calls to a stolen telephone |
| company credit card. |
|
|
| "When it happens the boy is caught and taken to jail, you usually see that the |
| parents are disgruntled at the authorities -- they still think that Johnny was |
| just playing in his bedroom. Until, of course, they see the cost of Johnny's |
| play time, which can run $50,000 to $100,000. But outside the cost, I have |
| never yet seen a parent who was really concerned that somebody's privacy has |
| been invaded -- they just think Johnny's really smart," Tener says. |
|
|
| TRW will usually move against hackers when they see a TRW file or access |
| information on a bulletin board. Tener says they usually demand payment for |
| their investigation costs, which average about $15,000. |
|
|
| Tales of the damage hackers have caused often get exaggerated. Tener tells of |
| highly publicized cases of hackers who, when caught, bragged about breaking |
| into TRW, when no break-ins had occurred. But Maxfield tells of two 14-year |
| old hackers who were both breaking into and using the same corporate system. |
| They had an argument and set out to erase each other's files, and in the |
| process erased other files that cost about a million dollars to replace. |
| Being juveniles, they got off free. |
|
|
| After being caught, Tener says most hackers find some other hobby. Some, |
| after turning 18, are hired by the firms they previously raided. Tener says |
| it rare to see repeat offenders, but Maxfield tells of one 14-year-old repeat |
| offender who was first caught at age 13. |
|
|
| Maxfield and Tener both make efforts to follow the bulletin boards, and |
| Maxfield even has a network of double agents and spies within the hacker |
| community. Tener uses artificial intelligence software to examine the day's |
| traffic to look for suspicious patterns. TRW gets about 40,000 inquiries an |
| hour and has about 25,000 subscribers. But that does not address the |
| underlying problem. |
|
|
| "The real problem is that these systems are not well protected, and some can't |
| be protected at all," Maxfield says. |
|
|
| Cheshire agrees. "A lot of companies have no idea what these kids can do to |
| them," he says. "If they would make access even a little difficult the kids |
| will go on to some other system." As for what else can be done, he notes that |
| at MIT the first thing computer students are taught is how to crash the |
| system. Consequently, nobody bothers to do it. |
|
|
| But the thing that annoys old-timer Cheshire (and Maxfield as well) is that |
| the whole hacker-intruder-vandal-thief phenomenon goes against the ideology of |
| the original hackers, who wanted to explore systems, not vandalize them. |
| Cheshire defines the original "hacker ethic" as the belief that information is |
| a value-free resource that should be shared. In practice, it means users |
| should add items to files, not destroy them, or add features to programs, |
| rather than pirate them. |
|
|
| "These kids want to make a name for themselves, and they think that they need |
| to do something dirty to do that. But they do it just as well by doing |
| something clever, such as leaving a software bug report on a system," he |
| notes. |
|
|
| Meanwhile, Maxfield says we are probably stuck with the problem at least until |
| the phone systems converts to digital technology, which should strip hackers |
| of anonymity by making their calls easy to trace. |
|
|
| Until someone figures out how to hack digital phone networks, of course. -TCM |
|
|
| Typed for PWN by Druidic Death |
| ______________________________________________________________________________ |
|
|