| ==Phrack Inc.== |
|
|
| Volume Three, Issue 25, File 9 of 11 |
|
|
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN PWN |
| PWN P h r a c k W o r l d N e w s PWN |
| PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN |
| PWN Issue XXV/Part 1 PWN |
| PWN PWN |
| PWN March 29, 1989 PWN |
| PWN PWN |
| PWN Created, Written, and Edited PWN |
| PWN by Knight Lightning PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
|
|
| Standing On The Edge Of The Network |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Greetings once again and welcome to Phrack World News Issue 25, our 25th |
| Anniversary Special. |
|
|
| This issue features articles about the New TAP Magazine, a battle between |
| Southwestern Bell and bulletin board operators in Oklahoma City, a whole file's |
| worth of information about the KGB hackers, Matthias Speer, Klaus Brunnstein, |
| an interview with Pengo, and much more. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Suiting Up For SummerCon '89 March 22, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Once again, for those who may have missed last issue... |
|
|
| SummerCon '89 |
| Saint Louis, Missouri |
| June 23-25, 1989 |
|
|
| Brought To You By |
| Forest Ranger / Knight Lightning / Taran King |
|
|
| The agenda for this year's SummerCon is going to be a sort of mixture of the |
| first two. We do intend to hold an actual conference on Saturday, June 24, |
| 1989. This conference will last as long as necessary and anyone who wishes to |
| speak should prepare a presentation ahead of time and notify us as soon as |
| possible. |
|
|
| The location of SummerCon '89 has been decided upon, but reservations are still |
| in the progress of being made. For this reason, we have declined to print the |
| name of the hotel for the convention at this time. Anyone who is seriously |
| interested in going to SummerCon '89 and thinks that they will be able to |
| attend should contact Taran King or myself as soon as possible. |
|
|
| :Knight Lightning |
| _______________________________________________________________________________ |
|
|
| Mitnick Plea Bargains March 16, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~ |
| By Kim Murphy (Los Angeles Times [Excerpts Only]) |
|
|
| Kevin Mitnick pleaded guilty to one count of computer fraud and one count of |
| possessing unauthorized long-distance telephone codes. He admitted penetrating |
| a DEC computer in Mass., secretly obtaining a copy of a sophisticated computer |
| security program which the company had spent $1 million to develop. |
|
|
| The program, said Mitnick's attorney, was designed to alert companies when |
| their computers had been penetrated by hackers like Mitnick. Mitnick never |
| attempted to sell or distribute the program, he said. Mitnick also admitted |
| possessing 16 unauthorized MCI long-distance codes that enabled him to make |
| long-distance telephone calls without charge. A prosecutor said Mitnick used |
| the codes to make connections to computers. |
|
|
| Mitnick faces one year in prison. Under a plea agreement with the government, |
| he must also submit to three years' supervision by probation officers after his |
| release from prison. Prosecutors said they agreed to a 12-month sentence |
| because the amount of financial damage was relatively low. DEC lost about |
| $100,000 to $200,000 in computer "down time" investigating the security program |
| theft. |
|
|
| As part of the plea agreement, prosecutors agreed to dismiss two additional |
| counts charging Mitnick with illegally accessing the Leeds University computer |
| in England and separate charge related to the DEC computer program. |
| _______________________________________________________________________________ |
|
|
| The NEW Technological Advancement Party (TAP) March 11, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Aristotle and the TAP Magazine Staff |
|
|
|
|
| How TAP Will Be Printed |
|
|
| TAP will be created, edited, and printed on various machines that the staff |
| either owns or has full access to. The computers range from personal computers |
| to mainframes. |
|
|
| The printing devices range from dot-matrix printers to industrial laser |
| printers. Again, the staff has full access to all of these devices. In order |
| to upgrade the quality of print and to take some of the load off of the staff, |
| the staff is looking into getting TAP printed by a professional printer. |
|
|
|
|
| Funding Of TAP |
|
|
| Hopefully TAP will be funded majorly by the subscribers. Unlike TAP in it's |
| early years, we cannot afford to just give TAP away. Except for issue 92, we |
| will not GIVE TAP away for free. We feel the policy of the old TAP towards |
| this issue was the major cause of their cronic shortage of money. As far as |
| startup costs, the staff can support all costs except for Printing, Paper, and |
| Postage. For 1.00 an issue, we feel we should be able to sufficiently support |
| TAP from the subscribers fees. All money received will be put into an account |
| that will be used for TAP purposes ONLY. There will be no distributing of |
| wealth between the staff. The three expenses above will be the major areas of |
| spending with an occasional expense of advertising and such. |
|
|
|
|
| How TAP Will Be Getting Articles |
|
|
| As of right now, the staff has enough articles ready to be printed to support |
| TAP for at least 4 issues. We hope TAP will become dependant on articles |
| submitted by subscribers. If people do not submit articles to TAP, we will be |
| forced to fill up space with lesser articles (thus lessening the quality of |
| TAP.) We figure that at the worst, TAP can sustain itself for one year with NO |
| submitted articles. That way we will not be ripping anyone off and we can fade |
| away in peace. (Hopefully we won't have to do that!) |
|
|
|
|
| Who is involved with TAP |
|
|
| As of 03/07/89, the TAP staff consists of five people. These 'staffers' are: |
| Aristotle, Olorin The White, Predat0r, and two others that wish to remain |
| anonymous. The last two have elected to remain anonymous for various reasons, |
| one being to maintain their freedom. The staff does not feel that we need to |
| list names in TAP (yet) to give the newsletter a good reputation. We feel that |
| readers should subscribe to TAP because of the quality of the newsletter and |
| not because of the staff members. Of course, if you submit an article, you |
| will be given credit where it is due. Credit to the author of any article we |
| print will be given unless the author expresses wishes that he/she does not |
| want to be recognized. Of course if TAP cannot find the name of the author of |
| a specific article, we cannot print the credits. |
|
|
|
|
| Why We Decided To Print A Newsletter |
|
|
| After gathering information from bulletin boards and other sources, various |
| members of the staff decided that they would like to print hard to obtain |
| information in hardcopy form and an easy to understand format. We feel that |
| certain information cannot be successfully represented and distributed with |
| computers only. One excellent example is a schematic of any device. We all |
| know how bad ASCII schematics suck. And with practically everyone in the |
| community owning a different computer, how can we communicate efficiently? |
| Well, printed material (on paper) is our answer. |
|
|
| In addition to the advantage print has over text files, there are various other |
| reasons for our wanting to print a newsletter. Due to the lack of experts |
| wanting to teach newcomers to the community (excluding certain individuals), we |
| have decided to do something about it. TAP will attempt to explain information |
| so that EVERYONE can understand it. We will not hesitate to help any |
| beginners, nor hesitate to give information to the more experienced members of |
| the community. All members of the community will be supported by TAP. TAP is |
| an equal opportunity informer. |
|
|
|
|
| Why We Decided To Print TAP |
|
|
| When we first received our collection of TAP issues (along with some 2600's), |
| we were astounded. After learning from bbs's and voice calls, the value of TAP |
| and 2600 were obvious. We liked 2600 a lot, but we LOVED TAP. TAP fit our |
| personalities perfectly. It has something for everyone. Around that time, we |
| promptly looked into subscribing to the two magazines. As you know, TAP died |
| in 1984 and 2600 is still in print. Well, we subscribed to 2600 and kept on |
| studying our old TAP issues. When the suggestion came to put out a magazine, |
| the first idea that was suggested was TAP. It was decided after a LONG |
| discussion that TAP would be perfect for our newsletter. Since we are |
| interested in hacking, phreaking, AND other topics, we felt TAP better |
| expressed our opinions and ideas than any other newsletter idea. Hell, we just |
| straight up loved that old TAP and we cannot pass up the opportunity to bring |
| it back into existence and (hopefully) it's original glory. |
|
|
|
|
| Where To Find TAP |
|
|
| If you have any other questions regarding TAP, you can contact the staff via |
| snail mail (US postal service) or via staff accounts on the bulletin boards |
| listed below. |
|
|
| US Mailing Address: TAP |
| P.O. Box 20264 |
| Louisville, KY 40220 |
|
|
| Beehive BBS - 703-823-6591 |
| Hackers Den - 718-358-9209 |
| Ripco - 312-528-5020 |
|
|
|
|
| Thank you, Tap Staff |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
| Editor's Comments |
| ~~~~~~~~~~~~~~~~~ |
| Upon first hearing about the newly formed TAP Magazine, I scoffed and thought |
| it would be another pipe dream like many other countless previous attempts. To |
| my surprise, the magazine was delivered just like they promised. |
|
|
| Issue 92 contained the following: |
|
|
| TAP RAP - Basically the staff's remarks about the new magazine and the |
| subscription information. |
|
|
| A BIT on BITNET (An Introduction to BITNET) - This was a reprint of Aristotle's |
| Bitnet file that appeared in P/HUN Newsletter Issue 3. |
|
|
| BELL PAYS for Evil deeds - News article about Cincinnati Bell Telephone Co. |
|
|
| TMC PIN - Information about PIN codes of TeleMarketing Company. |
|
|
| Pyro-How To - How to make Nitrogen Tri-Iodide. |
|
|
| Miscellaneous catalog information for Loompanics Unlimited and Specialized |
| Products Company. |
|
|
| Big Brother section - An article about revenge tactics and social engineering |
| taken from Flagship News (employee publication of |
| American Airlines). The article was also previously seen |
| in RISKS Digest. |
|
|
| TELEPHONE CONTROLLED TAPE STARTER + Schematics |
|
|
| The infamous "Ma Bell Is A Cheap Mother" logo and a few other surprises are |
| also included in this issue. The last part of the newsletter lists |
| information that the TAP Staff is looking for. |
|
|
| My reaction to the issue was positive over all. The print quality was very |
| good and extremely readable. The issue itself was a bit crumpled up by the US |
| Postal Service, but that is to be expected. The first issue was a test |
| product and that is the reason for a little bit of un-original material, says |
| Aristotle. |
|
|
| It is my understanding that the future holds all sorts of neat articles and |
| overall it would appear that at $12.00 a year, the new TAP is a good |
| investment. |
|
|
| :Knight Lightning |
| _______________________________________________________________________________ |
|
|
| Two Men Seized As Phone Looters March 13, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Two phony repairmen wearing stolen Illinois Bell hardhats and carrying around |
| stolen repairman tools have demonstrated that ripping off payphones is not |
| small change. |
|
|
| Arrested in Chicago, Illinois last week were George W. Parratt, age 47, of Sauk |
| Village, IL and Arthur P. Hopkinson, age 40, of Hickory Hills, IL; two south |
| suburbs of Chicago. |
|
|
| The two men, posing as Illinois Bell repairmen and driving a white and blue van |
| disguised to look like an Illinois Bell truck, have stolen thousands of dollars |
| from pay telephones all over Chicago. Their average take was about $200 per |
| phone -- and they have hit some phones two or three times. |
|
|
| Just the cost of repairing the phones damaged in the past year cost more than |
| $50,000 said Illinois Bell Telephone spokesman Tony Abel. |
|
|
| These two fellows were making a full time living looting pay phones, although |
| Mr. Abel did not have the final total of the amount looted immediately |
| available when we discussed the case. |
|
|
| Abel said Illinois Bell employees spotted the phony van on two separate days |
| and notified the security department of Bell. Security representatives were |
| able to trace the license plate on the van, and they found it parked in |
| Parratt's driveway. The investigators secretly followed the van and watched |
| Parratt and Hopkinson loot two pay phones in Calumet City, Illinois, and two in |
| Hammond, Indiana; a community on the stateline served by Illinois Bell. |
|
|
| When the two men drove back across the stateline into Calumet City, and started |
| breaking into another payphone, the investigators arrested them. Cook County |
| sheriff's Lt. Thomas Oulette, called to the scene, said the two had $120 in |
| change and $650 in stolen tools from Illinois Bell at the time of their arrest. |
| He said they were able to break into a coin box, dump it and get away in less |
| than three minutes. |
|
|
| "It was a pretty good scam," said Oulette, who noted that the investigators |
| from Illinois Bell told him they believed the company had been hit by the pair |
| for about $35,000 in the nine months the company was specifically aware of them |
| without knowing who they were. |
|
|
| Parratt and Hopkinson were released on bond, and are scheduled to appear in |
| Circuit Court (Markham, Illinois branch) on April 17, 1989. |
|
|
| Information Provided by Patrick Townson |
| _______________________________________________________________________________ |
|
|
| Bank Fraud Was "Easy" February 24, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~ |
| >From The Independent (London) |
|
|
| "A 17-year-old junior cashier cheated the National Westminster Bank out of 1 |
| million pounds in a computer fraud," a court heard yesterday. |
|
|
| Judge Helen Palin criticized the bank for lax security and refused to make a |
| compensation order for 15,000 pounds which the bank has not been able to |
| recover. |
|
|
| After being given access to the bank's computer system he began by paying 10 |
| pounds into his own account. He then paid himself 12,000 in imaginary cheques. |
| Later, he transferred a credit for 984,252 pounds into the account of a friend |
| and celebrated by buying 50 bottles of champagne. |
|
|
| The judge said, "One of the worrying features of this case is that a young man |
| who hasn't long left school is able to work the system in the NatWest bank on a |
| number of occasions without being found out. Indeed, the general chat within |
| the bank seems to be how easy it is to defraud that bank." |
| _______________________________________________________________________________ |
|
|
| Two Men Accused Of "Hacker" Crime February 24, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By James Gribble (Milwaukee Journal) |
|
|
| Vowing to step up efforts to stop computer crime, a Milwaukee County prosecutor |
| has charged two Milwaukee men with fraudulently obtaining free long-distance |
| telephone service. |
|
|
| The felony charges filed Thursday against Alan Carr, age 35 and David Kelsey, |
| age 26 are the first so-called hacker crimes to be prosecuted by the district |
| attorney's office. |
|
|
| Working independently, using home computers and similar software programs, the |
| men are alleged to have obtained calling card codes for customers of an |
| independent long-distance telephone company, Schneider Communications. |
|
|
| They then used the codes to bill their personal calls to Schneider's customers, |
| according to a criminal complaint prepared by Assistant District Attorney Jon |
| N. Reddin, head of the district attorney's White Collar Crime Unit. |
|
|
| Reddin said the total theft probably was less than $1,000, but he said the case |
| reflected a growing problem. |
|
|
| "I have the feeling, from our investigation, that there's a lot of people out |
| there doing this," he said. "The only way to stop it is to prosecute them, |
| because this is theft. It's almost like some one stealing your credit card and |
| using it to make purchases." |
|
|
| Schneider Communications was the victim in this case, Reddin said, because the |
| company had to write off the customer billings for which Carr and Kelsey turned |
| out to be responsible. |
|
|
| According to court records and Reddin, the investigation was prompted by a |
| complaint from Schneider Communications. |
|
|
| The company's computer keeps track of all calls that are rejected because of an |
| improper access code. Clients dialing incorrectly would cause 10 to 30 |
| rejected calls a month, but sometime last year the number jumped to 1,000 or |
| 2,000 per month. |
|
|
| Computer printouts showed the unknown parties were repeatedly dialing the |
| computer and changing the access code sequentially, Reddin said. Hundreds of |
| calls at a time were being made in this fashion, and each time the code was |
| changed one digit at a time until a working code was encountered. |
|
|
| Because the company had no way of knowing where the calls were coming from, |
| Wisconsin Bell placed a tracing device on the line, through which the calls |
| were traced to the phone numbers of Carr and Kelsey. |
|
|
| The men were apparently unaware of each other and simply happened to be |
| involved in similar schemes, Reddin said. |
|
|
| Carr is alleged to have used a bootleg computer program called "Hacking |
| Construction Set Documentation." Kelsey is alleged to have used a similar |
| bootleg program called "Mickey-Dialer." The programs were seized in raids at |
| the defendant's houses, according to court records. |
|
|
| Reddin acknowledged that technological safeguards can detect such thefts after |
| the fact but not prevent them. What Carr and Kelsey are alleged to have done |
| can be done by any computer buff with the right software and know-how, Reddin |
| said. |
|
|
| The key to deterring computer crime, in Reddin's view, lies in it's prompt |
| reporting to authorities. |
|
|
| "The best way I can think of to do that is by filing a complaint with our |
| office," Reddin said. |
| _______________________________________________________________________________ |
|
|