| ==Phrack Inc.== |
|
|
| Volume Two, Issue 24, File 13 of 13 |
|
|
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN PWN |
| PWN P h r a c k W o r l d N e w s PWN |
| PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN |
| PWN Issue XXIV/Part 3 PWN |
| PWN PWN |
| PWN February 25, 1989 PWN |
| PWN PWN |
| PWN Created, Written, and Edited PWN |
| PWN by Knight Lightning PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
|
|
| The Judas Contract Fulfilled! January 24, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| "...the other thing that made me mad was that I consider myself, at |
| least I used to consider myself, a person who was pretty careful |
| about who I trust, basically nobody had my home number, and few |
| people even knew where I really lived..." |
|
|
| -The Disk Jockey |
|
|
| The following story, as told by The Disk Jockey, is a prime example of the |
| dangers that exist in the phreak/hack community when sharing trust with those |
| who have made The Judas Contract. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Let me briefly explain how I got caught... |
|
|
| A hacker named Compaq was busted after someone turned him in for using Sprint |
| codes. While executing the search warrant, the state police noticed that he |
| had an excessive amount of computer equipment which had origins that Compaq |
| could not explain. |
|
|
| After checking around (I imagine checking serial numbers that Compaq had not |
| removed), the police found that the equipment was obtained illegally. Compaq |
| then proceeded to tell the police that I, Doug Nelson (as he thought my name |
| was) had brought them to him (true). |
|
|
| Meanwhile, Compaq was talking to me and he told me that he was keeping his |
| mouth shut the entire time. Keep in mind that I had been talking to this guy |
| for quite a long time previously and thought that I knew him quite well. I |
| felt that I was quite a preceptive person. |
|
|
| As time went by, little did I know, Compaq was having meetings again and again |
| with the state police as well as the Federal Bureau of Investigation (FBI) |
| concerning finding out who I was. He gave them a complete description of me, |
| and where I (correctly) went to school, but again, he was SURE my name was |
| Douglas Nelson, and since my phone had previously been in that name, he felt |
| assured that he was correct. The Police checked with Illinois and couldn't |
| find license plates or a driver's license in that name. He had remembered |
| seeing Illinois license plates on my car. |
|
|
| They were stuck until Compaq had a wonderful: He and I had went out to dinner |
| and over the course of conversation, I mentioned something about living in |
| Bloomfield Hills, Michigan. |
|
|
| After telling the state police this information, they wrote to Bloomfield Hills |
| and gave a description and asked for any pictures in their files that fit that |
| description. |
|
|
| The problem was that several years ago, some friends and I were arrested for |
| joyriding in a friend's snowmobile while he was on vacation. The neighbors |
| didn't know us and called the police. Charges were dropped, but our prints and |
| pictures were on file. |
|
|
| Bloomfield Hills sent back 12 pictures, which, according to the police report, |
| "Kent L. Gormat (Compaq) without hesitation identified picture 3 as the |
| individual he knows as Douglas Nelson. This individuals name was in fact |
| Douglas..." |
|
|
| A warrant was issued for me and served shortly afterwards by state, local and |
| federal authorities at 1:47 AM on June 27, 1988. |
|
|
| Lucky me to have such a great pal. In the 6 months that I was in prison, my |
| parents lived 400 miles away and couldn't visit me, my girlfriend could come |
| visit me once a month at best, since she was so far away, and Compaq, who lived |
| a whole 10 miles away, never came to see me once. This made me rather angry as |
| I figured this "friend" had a lot of explaining to do. |
|
|
| As you can see I am out of prison now, but I will be on probation until |
| December 15, 1989. |
| -The Disk Jockey |
| _______________________________________________________________________________ |
|
|
| Bogus Frequent Flyer Scheme February 13, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| >From Associated Press |
|
|
| An airline ticket agent piled up 1.7 million bonus air miles via computer |
| without leaving the ground, then sold the credits for more than $20,000, |
| according to a published report. |
|
|
| Ralf Kwaschni, age 28, was arrested Sunday when he arrived for work at Kennedy |
| International Airport and was charged with computer tampering and grand |
| larceny, authorities said. |
|
|
| Kwaschni, a ticket agent for Lufthansa Airlines, used to work for American |
| Airlines. Police said he used his computer access code to create 18 fake |
| American Airline Advantage Accounts - racking up 1.7 million bonus air miles, |
| according to the newspaper. |
|
|
| All 18 accounts, five in Kwaschni's name and 13 under fake ones, listed the |
| same post office box, according to the newspaper. |
|
|
| Instead of exchanging the bonus miles for all the free travel, Kwaschni sold |
| some of them for $22,500 to brokers, who used the credits to get a couple of |
| first class, round trip tickets from New York to Australia, two more between |
| London and Bermuda, and one between New York and Paris. It is legal to sell |
| personal bonus miles to brokers Port Authority Detective Charles Schmidt said. |
|
|
| Kwaschni would create accounts under common last names. When a person with one |
| of the names was aboard an American flight and did not have an Advantage |
| account, the passengers name would be eliminated from the flight list and |
| replaced with one from the fake accounts. |
|
|
| "As the plane was pulling away from the gate, this guy was literally wiping out |
| passengers," Schmidt said. |
| _______________________________________________________________________________ |
|
|
| Massive Counterfeit ATM Card Scheme Foiled February 11, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Douglas Frantz (Los Angeles Times) |
|
|
| The U.S. Secret Service foiled a scheme to use more than 7,700 counterfeit ATM |
| cards to obtain cash from Bank of America automated tellers. After a |
| month-long investigation with an informant, five people were arrested and |
| charged with violating federal fraud statutes. |
|
|
| "Seized in the raid were 1,884 completed counterfeit cards, 4,900 partially |
| completed cards, and a machine to encode the cards with Bank Of America account |
| information, including highly secret personal identification numbers for |
| customers." |
|
|
| The alleged mastermind, Mark Koenig, is a computer programmer for Applied |
| Communications, Inc. of Omaha, a subsidiary of U.S. West. He was temporarily |
| working under contract for a subsidiary of GTE Corporation, which handles the |
| company's 286 ATMs at stores in California. Koenig had access to account |
| information for cards used at the GTE ATMs. According to a taped conversation, |
| Koenig said he had transferred the BofA account information to his home |
| computer. He took only Bank Of America information "to make it look like an |
| inside job" at the bank. The encoding machine was from his office. |
|
|
| Koenig and confederates planned to spread out across the country over six days |
| around the President's Day weekend, and withdraw cash. They were to wear |
| disguises because some ATMs have hidden cameras. Three "test" cards had been |
| used successfully, but only a small amount was taken in the tests, according to |
| the Secret Service. |
|
|
| The prosecuting US attorney estimated that losses to the bank would have been |
| between $7 and $14 million. Bank Of America has sent letters to 7,000 |
| customers explaining that they will receive new cards. |
| _______________________________________________________________________________ |
|
|
| STARLINK - An Alternative To PC Pursuit January 24, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| STARLINK is an alternative to PC Pursuit. You can call 91 cities in 28 states |
| during off-peak hours (7pm-6am and all weekend) for $1.50 per hour. All |
| connections through the Tymnet network are 2400 bps (1200 bps works too) with |
| no surcharge and there are no maximum hours or other limitations. |
|
|
| There is a one time charge of $50 to signup and a $10 per month account |
| maintenance fee. High volume users may elect to pay a $25 per month |
| maintenance fee and $1.00 per hour charge. |
|
|
| The service is operated by Galaxy Telecomm in Virginia Beach, VA and users may |
| sign up for the service by modem at 804-495-INFO. You will get 30 minutes free |
| access time after signing up. |
|
|
| This is a service of Galaxy and not TYMNET. Galaxy buys large blocks of hours |
| from TYMNET. To find out what your local access number is you can call TYMNET |
| at (800) 336-0149 24 hours per day. Don't ask them questions about rates, |
| etc., as they don't know. Call Galaxy instead. |
|
|
| Galaxy says they will soon have their own 800 number for signups and |
| information. |
|
|
| The following is a listing of the major cities covered. There are others that |
| are a local call from the ones listed. |
|
|
|
|
| Eastern Time Zone |
|
|
| Connecticut: Bloomfield Hartford Stamford |
| Florida: Fort Lauderdale Jacksonville Longwood Miami Orlando Tampa |
| Georgia: Atlanta Doraville Marietta Norcross |
| Indiana: Indianapolis |
| Maryland: Baltimore |
| Massachusetts: Boston Cambridge |
| New Jersey: Camden Englewood Cliffs Newark Pennsauken Princeton South |
| Brunswick |
| New York: Albany Buffalo Melville New York Pittsford Rochester |
| White Plains |
| North Carolina: Charlotte |
| Ohio: Akron Cincinnati Cleveland Columbus Dayton |
| Pennsylvania: Philadelphia Pittsburgh |
| Rhode Island: Providence |
| Virginia: Alexandria Arlington Fairfax Midlothian Norfolk Portsmouth |
|
|
|
|
| Central Time Zone |
|
|
| Alabama: Birmingham |
| Illinois: Chicago Glen Ellyn |
| Kansas: Wichita |
| Michigan: Detroit |
| Minnesota: Minneapolis St. Paul |
| Missouri: Bridgeton Independence Kansas City St. Louis |
| Nebraska: Omaha |
| Oklahoma: Oklahoma City Tulsa |
| Tennessee: Memphis Nashville |
| Texas: Arlington Dallas Fort Worth Houston |
| Wisconsin: Brookfield Milwaukee |
|
|
|
|
| Mountain Time Zone |
|
|
| Arizona: Mesa Phoenix Tucson |
| Colorado: Aurora Boulder Denver |
|
|
|
|
| Pacific Time Zone |
|
|
| California: Alhambra Anaheim El Segundo Long Beach Newport Beach |
| Oakland Pasadena Pleasanton Sacramento San Francisco |
| San Jose Sherman Oaks Vernon Walnut Creek |
| Washington: Bellevue Seattle |
|
|
|
|
| STARLINK is a service of Galaxy Telecomm Division, GTC, Inc., the publishers of |
| BBS Telecomputing News, Galaxy Magazine and other electronic publications. |
| _______________________________________________________________________________ |
|
|
| Suspended Sentences For Computer Break-In February 20, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| >From Personal Computing Weekly |
|
|
| "Police Officers Sentenced For Misuse Of Police National Computer" |
|
|
| Three police officers hired by private investigators to break into the Police |
| National Computer received suspended prison sentences at Winchester Crown |
| Court. The private investigators also received suspended (prison) sentences, |
| ranging from four to six months. |
|
|
| The police officers were charged under the Official Secrets Act of conspiring |
| to obtain confidential information from the Police National Computer at Hendon. |
|
|
| One of the police officers admitted the charge, but the other two and the |
| private investigators pleaded Not Guilty. |
|
|
| The case arose out of a Television show called "Secret Society" in which |
| private investigator Stephen Bartlett was recorded telling journalist Duncan |
| Campbell that he had access to the Police National Computer, the Criminal |
| Records Office at Scotland Yard and the DHSS (Department of Health & Social |
| Security). |
|
|
| Bartlett said he could provide information on virtually any person on a few |
| hours. He said he had the access through certain police officers at |
| Basingstoke, Hampshire. Although an investigation proved the Basingstoke |
| connection to be false, the trail led to other police officers and private |
| detectives elsewhere. |
|
|
| Most of the information gleaned from the computers was used to determine who |
| owned certain vehicles, who had a good credit record -- or even who had been in |
| a certain place at a certain time for people investigating marital infidelity. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
| Of course, the actions for which the officers and others were sentenced, were |
| not computer break-ins as such, but rather misuse of legitimate access. |
| _______________________________________________________________________________ |
|
|
| Virus Hoax Caused As Much Panic As The Real Thing February 20, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| >From Popular Computing Weekly |
|
|
| "A Virus Is Up And Running" |
|
|
| Michael Banbrook gave his college network managers a scare when he planted a |
| message saying that a virus was active on the college system. |
|
|
| Banbrook's message appeared whenever a user miskeyed a password; the usual |
| message would be |
|
|
| "You are not an authorized user." |
|
|
| It was replaced by the brief but sinister: |
|
|
| "A Virus is up and running." |
|
|
| When the message was discovered by the college network manager, Banbrook was |
| immediately forbidden access to any computers at the St. Francix Xavier College |
| at Clapham in South London. |
|
|
| Banbrook, 17, told "Popular Computing Weekly" that he believed the college |
| has over-reacted and that he had, in fact thrown a spotlight on the college's |
| lackluster network security. The college has a 64 node RM Nimbus network |
| running MS-DOS. |
|
|
| "All any has to do is change a five-line DOS batch file" says Banbrook. |
| "There is no security at all" |
|
|
| Banbrook admits his motives were not entirely related to enhancing security: |
| "I was just bored and started doodling and where some people would doodle with |
| a notepad, I doodle on a keyboard. I never thought anyone would believe the |
| message." |
|
|
| Banbrook was suspended from computer science A-level classes and forbidden to |
| use the college computers for a week before it was discovered that no virus |
| existed. Following a meeting between college principal Bryan Scalune and |
| Banbrook's parents, things are said to be "back to normal." |
| _______________________________________________________________________________ |
|
|
| Phrack World News -- Quicknotes |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| For those interested in the 312/708 NPA Split, the correct date for this |
| division is November 11, 1989. However, permissive dialing will continue until |
| at least February 9, 1990. |
| ------------------------------------------------------------------------------- |
| Anyone who is wondering what Robert Morris, Jr. looks like should have a look |
| at Page 66 in the January 1989 issue of Discover Magazine. |
| _______________________________________________________________________________ |
|
|
|
|