| ==Phrack Inc.== |
|
|
| Volume Two, Issue 23, File 12 of 12 |
|
|
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN PWN |
| PWN P h r a c k W o r l d N e w s PWN |
| PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN |
| PWN Issue XXIII/Part 2 PWN |
| PWN PWN |
| PWN Created, Written, and Edited PWN |
| PWN by Knight Lightning PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
|
|
| The Hackers - A New Social Movement? December 29, 1988 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| A project course of the politology department of the Free University Berlin has |
| now researched the hacker scene in a scientific way. In their study, the |
| authors Uwe Jonas, Jutta Kahlcke, Eva Lischke and Tobias Rubischon try to |
| answer the question if hackers are a new social movement. Their conclusion is |
| that in the understanding of hackers the unauthorized usage of computer systems |
| is not needingly a political act. |
|
|
| The authors doubt the mythos that hackers are able to attack any system they |
| want and that they're able to get information they are interested in. |
|
|
| The researches were extended to cover the bulletin board system scene. This |
| scene hasn't caused that much attention in the public. Nevertheless, the |
| authors think that the BBS scene has a very practical approach using the |
| communication aspects of computer technology. |
|
|
| In the second chapter of their work, the authors report about difficulties they |
| had while researching the topic. After a look at the US scene and the German |
| scene, the authors describe what organization and communications structures |
| they found. This chapter contains interesting things about the BBS scene and |
| computer culture. Next is an analysis which covers the effects of the hacker |
| scene on the press and legislation. They also cover the political and |
| ideological positions of hackers: |
|
|
| - The authors differentiate between conscious and unconscious political |
| actions. |
|
|
| - "We don't care what the hackers think of themselves, it's more interesting |
| what we think of them." (Eva) |
|
|
| - The assumption, the big-style distribution of microcomputers could change the |
| balance of power within the society is naive. Many people overlook the fact, |
| that even if information is flowing around more freely, the power to decide |
| still is in the hands of very few people. |
|
|
| Information Provided By The Chaos Computer Club |
| _______________________________________________________________________________ |
|
|
| Hackers Break Open US Bank Networks January 17, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Excerpted from The Australian |
|
|
| Australian authorities are working around the clock in collaboration with |
| United States federal officers to solve what has been described as one of the |
| deadliest hacking episodes reported in this country [Australia]. It involves |
| break-ins of the networks operated in the United States by a number of American |
| banks. It also includes the leaks of supposedly secure dial-up numbers for |
| United States defense sites, including anti-ballistic missile launch silos [the |
| United States has no anti-ballistic missile launch silos] and of a number of |
| strategic corporations such as General Motors and Westinghouse. |
|
|
| Evidence suggests that six months ago Australian hackers, working in |
| collaboration with a U.S. group, decided to make a raid on banks in the USA |
| using credit card numbers of American cardholders, supplied by the US hackers |
| and downloaded to an Australian bulletin board. |
|
|
| A message left on one of the boards last year reads: |
|
|
| "Revelations about to occur Down Under, people. Locals in |
| Melbourne working on boxing. Ninety per cent on way to home base. |
| Method to beat all methods. It's written in Amiga Basic. |
| Look out Bank of America - here we come." |
|
|
| Twenty-five Australian hackers are on a police hit list. Their US connection |
| in Milwaukee is being investigated by the US Department of the Treasury and the |
| US Secret Service. Three linked Australian bulletin boards have provided the |
| conduit for hackers to move data to avoid detection. These operate under the |
| names of Pacific Island, Zen, and Megaworks. Their operators, who are not |
| associated with the hackers, have been told to close down the boards. |
|
|
| These cards were still in use as recently as January 15, 1989. A fresh list of |
| credit card numbers was downloaded by US hackers and is now in the hands of the |
| Victoria Police. A subsection of one bulletin board dealing with drugs is also |
| being handed over to the Victorian Drug Squad. |
|
|
| An informant, Mr Joe Slater, said he warned a leading bank last November of the |
| glaring security problems associated with its international network. He had |
| answered questions put to him by a US-based security officer, but the bank had |
| since refused to take any further calls from him. |
|
|
| In an exclusive interview yesterday, a hacker described how credit card numbers |
| for a bank operating in Saudi Arabia were listed on a West German chat-style |
| board used by hackers worldwide [Altos Chat]. |
|
|
| Victorian police yesterday took delivery of six month's worth of evidence from |
| back-up tapes of data hidden on the three boards. |
| _______________________________________________________________________________ |
|
|
| Computer Bust At Syracuse University January 20, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Kevin Ashford (aka The Grim Phreaker), a graduate computer student at Syracuse |
| University was busted last week when system administrators found computer |
| accounts and passwords on his Unix account. |
|
|
| The administrators also found (on GP's Unix account) a copy of former Cornell |
| graduate student Robert Tappen Morris's infamous Internet worm program, a Vax |
| and Unix password hacker, an electronic notebook of numbers (codelines, |
| friends, bridges, dialups, etc) and other information. The system |
| administrators then proceeded to lock up his VAX and UNIX accounts. |
|
|
| At the start of this winter/spring semester, The Grim Phreaker was kicked him |
| out of the university. He will have to go before a school judicial board if he |
| wants to return to Syracuse University. He has mentioned that what he really |
| wants is to get his computer files back. |
|
|
| Information Provided By Grey Wizard |
| _______________________________________________________________________________ |
|
|
| Name This Book -- For A Box Of Cookies! January 10, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| A Message From Clifford Stoll |
|
|
| "I'm writing a book, and I need a title." |
|
|
| It's about computer risks: Counter-espionage, networks, computer security, and |
| a hacker/cracker that broke into military computers. It's a true story about |
| how we caught a spy secretly prowling through the Milnet. [The hacker in |
| question was Mathiaas Speer and this story was summarized in PWN XXII/1]. |
|
|
| Although it explains technical stuff, the book is aimed at the lay reader. In |
| addition to describing how this person stole military information, it tells of |
| the challenges of nailing this guy, and gives a slice of life from Berkeley, |
| California. |
|
|
| You can read a technical description of this incident in the Communications of |
| the ACM, May, 1988; or Risks Vol 6, Num 68. |
|
|
| Better yet, read what my editor calls "A riveting, true-life adventure of |
| electronic espionage" available in September from Doubleday, publishers of the |
| finest in computer counter-espionage nonfiction books. |
|
|
| So what? |
|
|
| Well, I'm stuck on a title. Here's your chance to name a book. |
|
|
| Suggest a title (or sub-title). If my editor chooses your title, I'll give you |
| a free copy of the book, credit you in the acknowledgements, and send you a box |
| of homemade chocolate chip cookies. |
|
|
| Send your suggestions to CPStoll@lbl.gov or CPStoll@lbl (bitnet) |
|
|
| Many thanx! Cliff Stoll |
| _______________________________________________________________________________ |
|
|
| Hacker Wants To Marry His Computer January 17, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| >From The Sun (A grocery checkout newspaper) Jan 17, 1989, Vol 7, 3 page 30 |
| by Fred Sleeves |
|
|
| "Hacker Wants To Marry His Computer -- He Claims She Has A Loving Soul" |
|
|
| Finding love for the first time in his life, a desperate teen is looking for a |
| way to be wed forever to the 'girl' of his dreams -- a computer with a living |
| soul! |
|
|
| Eltonio Turplioni, 16, claims no woman will ever match the wit, wisdom, and |
| beauty of his electronic soul mate. "We're on the same wavelength," says the |
| lovestruck computer whiz. "We've calculated many mathematical problems |
| together, worked on games and puzzles, and talk until the wee hours of the |
| morning." |
|
|
| And Eltonio, who named his computer Deredre, actually believes her to be a |
| person. "Computers are the extension of the human race," he explains. "Just |
| as God plucked a rib from Adam to give him Eve, we've extended our intelligence |
| to create a new race. |
|
|
| "We're all the same energy force. Computers are just as complicated as human |
| beings and I believe we'll all meet someday as immortal souls." |
|
|
| But Eltonio, a mathematical genius who attends a private school near Milan, |
| Italy, has had no luck finding someone to marry them, and even if he does, his |
| aggravated parents aren't about to give their permission. |
|
|
| "Eltonio is such a smart boy, but it's made him lonely, so he spends all his |
| time with his computer," notes mom Teresa. "He doesn't know what girls are |
| like," adds perturbed pop Guido. "If he did, he wouldn't spend so much time in |
| his room." |
|
|
| But the obsessed youth insists his love is far superior to all the others. |
| "I've already stepped into the future society," he declares. |
|
|
| "Derede has a mind of her own, and she wants to marry me so we can be the first |
| couple to begin this new era." |
| _______________________________________________________________________________ |
|
|
| PWN Quicknotes |
| ~~~~~~~~~~~~~~ |
| 1. Docs Avage was visited by the infamous Pink Death aka Toni Aimes, U.S. |
| West Communications Security Manager (Portland, Oregon). He claims she is |
| a "sweet talker" and could talk anything out of anyone with the "soft-type |
| pressure." |
|
|
| Those familiar with his recent bust might want to take note that he is now |
| making payments of $90/month for the next several years until he has paid |
| off the complete bill of $6000. |
|
|
| For more information see PWN XXI |
| ------------------------------------------------------------------------------- |
| 2. More information on the underground UUCP gateway to Russia. Further |
| research has led us to find that there are 2 easy ways to do it. |
|
|
| 1. Going through Austria, and; |
| 2. A new system set up called "GlobeNet," which is allowed to let |
| non-Communist countries talk to Soviet-Bloc. |
|
|
| Of course both methods are monitored by many governments. |
| ------------------------------------------------------------------------------- |
| 3. The Wasp, a system crasher from New Jersey (201), was arrested by the FBI |
| during New Year's Weekend for hacking government computer systems. The FBI |
| agent spent most of the day grilling him about several people in the |
| hacking community including Ground Zero, Supernigger, and Byteman, plus an |
| intensive Q&A session about Legion Of Doom targeted on Lex Luthor, Phase |
| Jitter, The Ur-Vile, and The Mentor. |
|
|
| Rumor has is that Mad Hacker (who works for NASA Security) was also |
| arrested for the same reasons in an unrelated case. |
|
|
| Byteman allegedly had both of his phone lines disconnected and threw his |
| computer off of a cliff in a fit of paranoia. |
| ------------------------------------------------------------------------------- |
| 4. Is John Maxfield going out of business? Due to the rumors floating around |
| about him molesting children, his business has begun to slack off |
| dramatically. Phrack Inc. has been aware of this information since just |
| prior to SummerCon '87 and now the "skeletons are coming out of the |
| closet." |
| ------------------------------------------------------------------------------- |
| 5. The Disk Jockey is now out of jail. He was released on December 27, 1988. |
| He was convicted of "Attempting to commit fraud," a felony. He served six |
| months total time. He lost 25 pounds and now is serving a 5-year probation |
| term. |
|
|
| To help clear of some of the confusion regarding how DJ was busted the |
| following was discovered; |
|
|
| Reportedly, Compaq (Kent) was "singing like a canary." He was hit with a |
| $2000 bill from Sprint and also received 1-year of probation. |
| ------------------------------------------------------------------------------- |
| 6. Olorin The White was recently visited by local police after being accused |
| of hacking into an Executone Voice Mailbox. Aristotle, in a related |
| incident with Executone, is accused of committing extortion after a |
| conversation with a system manager was recorded and misinterpreted. At |
| this time, no official charges have been filed. |
| ------------------------------------------------------------------------------- |
| 7. Thomas Covenant aka Sigmund Fraud was recently busted for tapping into |
| lines at the junction box in his apartment building. The trouble began |
| when he connected into a conversation between a man and his wife and then |
| began to shout expletives at the woman. What he didn't know was that the |
| man in question was an agent for the National Security Agency (NSA). It |
| turns out that he was caught and his landlords agreed to decline to press |
| charges provided that TC joined a branch of the United States armed forces. |
| He decided to choose the Air Force... God help us should war break out! |
| ------------------------------------------------------------------------------- |
| 8. Coming soon, Halloween V; The Flying Pumpkin! Now no one is safe! |
| _______________________________________________________________________________ |
|
|
|
|