| ==Phrack Inc.== |
|
|
| Volume Three, Issue 27, File 11 of 12 |
|
|
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN PWN |
| PWN P h r a c k W o r l d N e w s PWN |
| PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN |
| PWN Issue XXVII/Part 2 PWN |
| PWN PWN |
| PWN June 20, 1989 PWN |
| PWN PWN |
| PWN Created, Written, and Edited PWN |
| PWN by Knight Lightning PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
|
|
| Robert T. Morris Suspended From Cornell May 25, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Taken from the New York Times |
|
|
| Cornell University has suspended the graduate student identified by school |
| officials as the author of "the Internet worm." |
|
|
| In a May 16th letter to Robert Tappan Moris, age 23, the dean of the Cornell |
| University Graduate School said a university panel had found him guilty of |
| violating the school's Code of Academic Integrity. |
|
|
| He will be suspended until the beginning of the fall semester of 1990, and then |
| could reapply. |
|
|
| No criminal charges have been filed against Morris. A federal grand jury this |
| year forwarded its recommendations to the Justice Department, which has not |
| taken any action. |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Justice Department Wary in Computer Case May 28, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Matthew Spina (Syracuse Herald-American) |
|
|
| "Is Washington Fearful Of Losing A Landmark Trial?" |
|
|
| Some computer experts theorize that the Justice Department, afraid of bungling |
| what could become a landmark computer case, still doesn't know how to treat the |
| Cornell student whose computer worm slithered nationwide in November, 1988. |
|
|
| A further concern in Washington: A trial in the case might embarrass the |
| Department of Defense if its scientists are asked to detail how their computers |
| were among the thousands crippled by the worm. |
|
|
| For several months, the decision on how to charge 23-year-old Robert T. Morris, |
| Jr. had been before Mark Richard, a deputy assistant attorney general. Within |
| the last few weeks, Richard made a decision that now is being reviewed by an |
| assistant attorney general, according to a computer professional who has been |
| talking with the Justice Department. |
|
|
| "I thought we would have heard something from Washington by now," said Andrew |
| Baxtoer, the assistant U.S. attorney who in November and December presented the |
| case to a grand jury in Syracuse. |
|
|
| The grand jury's report was sent on the the Justice Department, which refuses |
| to comment publicly on the matter because Morris has not been indicted. |
|
|
| "Within the next two weeks I assume that a decision will be made," said one |
| official. |
|
|
| "If they decide to begin an expensive trial, they have to make sure they win so |
| as not to damage future attempts to prosecute under that law," said Eugene H. |
| Spafford, an assistant professor at Purdue University whose analysis of the |
| worm has helped federal investigators. "If they decide not to prosecute, and |
| the total thing that happens is he gets suspended (from Cornell), I will be |
| outraged." |
|
|
| So far, Cornell has taken the only disciplinary measure against Morris, |
| suspending him for the 1989-90 academic year. But the graduate student left |
| the computer science department early in November, the day after the worm |
| spread out of a computer in Upson Hall. |
|
|
| Morris, a computer science graduate student, has been called the author of a |
| rogue computer program, called a worm, that was spread from a Cornell |
| University computer. The program was designed to reproduce and infect any |
| computer linked to the Internet, a network shared by colleges, research centers |
| and military institutions. |
|
|
| However, experts say an error caused the program to replicate out of control, |
| sending thousands of copies into thousands of computers. |
|
|
| If Morris is to be charged with a felony, prosecutors would then have to show |
| he intended to destroy or extract information. |
|
|
| Proving that would be difficult since the program neither destroyed nor removed |
| information from any computer. |
|
|
| To convict Morris on most lesser charges, prosecutors would have to show he |
| intended to harm computers. |
|
|
| Prosecutors also could use a misdemeanor charge requiring them to prove only |
| that Morris gained access to a federal government computer. The worm did reach |
| computers at the Army Ballistics Research Laboratory and NASA's Langley |
| Research Center, among others. |
|
|
| Some computer experts wonder, though, if Defense Department officials will be |
| reluctant to testify publicly about how their computers were penetrated -- even |
| those computers holding non-classified information. In February, at a computer |
| convention in San Diego, Defense Department computer experts detailed some |
| security improvements made to the network since November, but then refused to |
| release copies of their presentation to people at the seminar. |
|
|
| The FBI -- which enforces the Computer Fraud and Abuse Act of 1986 -- and some |
| people in the computer industry are pushing for a vigorous prosecution to |
| display a strong case against computer hacking. Others in the industry, |
| including some of Morris' friends from Harvard University and Cornell, urge |
| leniency because he was trying to demonstrate security flaws with computers. |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Other articles about Robert Tappan Morris, Jr. and the Internet Worm are; |
|
|
| "Computer Network Disrupted By 'Virus'" (11/03/88) PWN XXII/Part 2 |
| "Virus Attack" (11/06/88) PWN XXII/Part 2 |
| "The Computer Jam: How It Came About" (11/08/88) PWN XXII/Part 2 |
| "US Is Moving To Restrict {...} Virus" (11/11/88) PWN XXII/Part 2 * |
| "FBI Studies Possible Charges In Virus" (11/12/88) PWN XXII/Part 2 |
| "Big Guns Take Aim At Virus" (11/21/88) PWN XXII/Part 3 |
| "Congressman Plan Hearings On Virus" (11/27/88) PWN XXII/Part 3 |
| "Pentagon Severs Military {...} Virus" (11/30/88) PWN XXII/Part 3 * |
| "Networks Of Computers At Risk From Invaders" (12/03/88) PWN XXII/Part 4 * |
| "Computer Virus Eradication Act of 1988" (12/05/88) PWN XXII/Part 4 * |
| "Breaking Into Computers {...}, Pure and Simple" (12/04/88) PWN XXIV/Part 1 * |
| "Cornell Panel Concludes Morris {...} Virus" (04/06/89) PWN XXVI/Part 1 |
|
|
| * - Indicates that the article was not directly related to Robert Morris, but |
| did discuss him as well as the Internet Worm incident. |
| _______________________________________________________________________________ |
|
|
| SouthernNet's Anti-Hacker Psychological Con Game April 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| WARNING! Your call is being intercepted! |
|
|
| Error: Setting may not be changed by callers. |
|
|
|
|
| Welcome to: S o u t h e r n N e t I n c. |
|
|
|
|
| You have reached the SouthernNet Fraud Department, the authorization code you |
| are attempting to use is not valid. Hacking and illegal use of codes are |
| violations of state and federal laws. |
|
|
| We are currently conducting an investigaion for code abuse in your area and we |
| are coordinating the investigation with law enforcement authorities. Persons |
| identified hacking or abusing codes will be prosecuted to the full extent of |
| the law. |
|
|
| I'll see you soon, |
|
|
| Hacker Tracker |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Hold for additional information: |
|
|
| Hacker Tracker is unavailable right now; however, you may avoid possible arrest |
| and/or prosecution by calling Hacker Tracker in person. |
|
|
| You may contact Mr. Tracker between the hours of 9:00 AM and 5:00 PM Eastern |
| Standard Time, Monday - Friday, simply by dialing the access number you have |
| just used and code number 101010 or 011010 if the access you have used |
| requires a seven digit code. Just hold the line for 10 seconds and your call |
| will automatically be routed to Mr. Tracker at no charge to you. |
|
|
| This is *NOT* a trick and it will be the intention of SouthernNet Inc. to |
| settle this matter without involving law enforcement authorities if you |
| cooperate with our fraud department 100%. |
|
|
| It will certainly be to your advantage to contact Mr. Tracker as this will |
| reflect your own decision to assist and avoid prosecution by our company!!! |
|
|
| I'll be expecting your call. |
|
|
| Hacker Tracker |
|
|
| Hold a sec... Engaging Auto Page for Hacker Tracker... |
|
|
| 50 seconds till disconnect |
| 40 seconds till disconnect |
| 30 seconds till disconnect |
| 20 seconds till disconnect |
| 10 seconds till disconnect |
| 5 seconds till disconnect |
|
|
| NO CARRIER |
|
|
|
|
| [Do you think anyone believed this and actually called "Hacker Tracker?" -KL] |
| _______________________________________________________________________________ |
|
|
| What's Happening: Computer Security Up June 4, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Taken from Gannett Westchester Newspapers |
|
|
| [Comments in brackets from Delta-Master] |
|
|
| High-tech companies are spending 64% more [than they previously spent] on |
| computer security, according to a recent survey conducted by the National |
| Center for Computer Crime Data in Los Angeles. The group surveyed 3,500 law |
| enforcement agencies and computer security experts about computer crime. The |
| prosecution rate is also up -- 6.4% in 1988 from only 2.4% during 1987. |
|
|
| Contrary to popular image, computer hackers aren't always young boys. The |
| study found that 32% of those arrested for computer crimes were female, while |
| only 14% were under 21. The study said 45% of hackers were 25 to 30 years old. |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Comments from Delta-Master |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| I do not know about you people, but the public's confusion about hackers starts |
| to bother me when they make errors. Seriously, I know of only a few hackers |
| over the age of 21. The fact that the newspapers also equate the thug-like |
| computer criminals with the mastermind-criminal type hacker (you guys) is also |
| pretty annoying, wouldn't you agree? One key phrase you must note: "32% OF |
| THOSE ARRESTED." Oh well, such are the mistakes of newspapers. |
| _______________________________________________________________________________ |
|
|
| Public Service Commission Bans Operator Companies April 24, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Jerri Stroud (St. Louis Post-Dispatch) |
|
|
| The Missouri Public Service Commission voted 4-1 last week to ban providers of |
| so-called alternative operator services in Missouri because allowing the |
| companies to operate is "not in the public interest." |
|
|
| Alternative operator services companies contract with hotels, motels colleges, |
| hospitals, airports, restaurants and other facilities to provide operator |
| assistance to customers using pay telephones or house phones. Consumer groups |
| have complained about price-gouging by the companies nationwide. |
|
|
| Mark Wheatley, a lawyer for the Office of Public Council, praised the |
| commission's decision. |
|
|
| The Office of Public Council has received numerous complaints about excessive |
| rates and surcharges by alternative operator services companies, said Wheatley. |
| Some alternative operator services companies also have accepted other |
| companies' credit cards without authorization from the companies issuing the |
| cards, he said. |
|
|
| "We feel that it's an extremely important decision by the commission." said |
| Wheatley. But he said he expects the companies affected by the ruling to |
| appeal. |
|
|
| Lawyers for the alternative operator services companies could not be reached |
| for comment. |
|
|
| In it's ruling, the commission said many consumers aren't aware of the rates |
| charged by the alternative operator services companies until they receive "a |
| bill for operator services at prices higher than those to which he is |
| accustomed." Consumer groups say the rates often are twice or three times the |
| rates charged by better-known long-distance companies. |
|
|
| Even if an operator service company identifies itself when a consumer makes a |
| call, the commission said many consumers don't understand the significance of |
| the identification. |
|
|
| "If the end user is not educated as to the intricacies of using an alternative |
| operator services provider, he does not truly have a meaningful choice..." the |
| commission said. |
|
|
| The ruling only affects intrastate calls handled by alternative operator |
| services companies, but it may effectively prevent the companies from providing |
| interstate service as well. |
|
|
| The commission specifically denied tariff requests from International |
| Telecharge Inc. and American Operator Services Inc. The commission also |
| directed three other companies -- Teleconnect Inc., Dial US, and Dial USA -- to |
| file new tariffs consistent with the ruling. |
|
|
| The ruling allows companies to operate who provide operator services in |
| connection with their business -- long-distance carriers and local telephone |
| companies, for example. But the commission also placed limits on these |
| companies. |
|
|
| Under the ruling, operator services companies must: |
|
|
| * Identify themselves to the caller as well as to the party being billed |
| by the call (in the case of a collect or third-party call). |
|
|
| * Quote rates to the caller or billed party on request, without charge. |
|
|
| * Use calling card verification procedures acceptable to the companies |
| issuing the cards. |
|
|
| * Post in a prominent position the company's name, detailed complaint |
| procedures and instruction on how to reach the local telephone company |
| operator and other long-distance carriers. |
|
|
| * Transfer emergency traffic to the local telephone company or American |
| Telephone & Telegraph Co. until the alternative services provider can |
| show that it can handle emergency calls adequately. |
| _______________________________________________________________________________ |
|
|
| Fax Attack May 13, 1989 |
| ~~~~~~~~~~ |
| Taken from The Ann Arbor News |
|
|
| "Governor's Attempt To Ban Unsolicited Advertisements Backfires!" |
|
|
| HARTFORD, Conn - The great fax attack of 1989 -- an all-out lobbying campaign |
| against a bill banning unsolicited facsimile advertising -- may have backfired |
| when the governor's fax machine was jammed for hours with unwanted messages. |
|
|
| Starting Thursday, May 11, and continuing Friday, May 12, Governor William A. |
| O'Neill's fax machine has been beeping constantly, spitting out unwanted |
| messages from angry businesses that advertise by fax. |
|
|
| The businesses oppose a bill now awaiting O'Neill's signature that would |
| prohibit them from marketing their products by fax without first obtaining the |
| permission of the recipient. Violators would face a $200 fine. |
|
|
| Starting Thursday morning, dozens of Connecticut businesses faxed to O'Neill's |
| office a form letter arguing against the fax ban. The stream of fax messages |
| was so constant (40 came in before 10 AM) that the governor's office turned off |
| the fax machine Thursday (May 11). |
|
|
| O'Neill's press secretary, Jon. L. Sandberg, said the governor still hasn't |
| decided whether he will sign the bill. But aides to the governor said the |
| persistent lobbying campaign proved how annoying unwanted messages can be. The |
| inconvenience was compounded because the governor's office was unable to use |
| its fax machine to receive information about spring flooding around the state. |
| _______________________________________________________________________________ |
|
|
| NYNEX Announces Info-Look Gateway April 28, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Introducing a new service for accessing information and more... all through |
| your personal computer! |
|
|
| Starting in May 1989, New York Telephone's INFO-LOOK (tm) Gateway Service can |
| be your link to accessing a variety of information, products and services. |
|
|
| The INFO-LOOK Gateway simplifies on-line computer access to a variety of |
| information providers. When you call the Gateway phone number through your |
| modem, you'll be able to scan a menu of information services. |
|
|
| The types of information services you may choose from include: Entertainment, |
| business, health, food, news, weather, sports, travel, government, educational |
| and reference information. The services, some interactive, are provided by |
| independent companies. |
|
|
| The INFO-LOOK Gateway is easy to use -- even if you're relatively new to using |
| a PC. |
|
|
| What you'll need to use the INFO-LOOK Gateway |
|
|
| 1. Virtually any type of personal computer. |
|
|
| 2. A modem (300, 1200, or 2400 Baud), and communications software. This |
| enables your computer to communicate with other computers via the telephone |
| system. |
|
|
| 3. A New York Telephone Calling Card. If you need a New York Telephone |
| Calling Card, (it's FREE), call your service representative whose number |
| appears on page one of your New York Telephone bill. |
|
|
| Charges for using the INFO-LOOK Gateway |
|
|
| There are ** no ** Gateway enrollment fees and ** no ** monthly subscription |
| charges. In most cases, you will be charged (New York people only): |
|
|
| o A local call to reach the INFO-LOOK Gateway. |
|
|
| o While you're browsing the Gateway directory of services, or moving between |
| services, you pay $.05 a minute. |
|
|
| o Once you connect to a service, the charge is determined by the Service |
| Provider. Some services have a per-minute usage charge. Some services are |
| free. The charges for each service are listed in the Gateway menu. |
|
|
| You'll find most charges itemized on your monthly New York Telephone bill. |
| Some Service Providers may decide to bill you separately and directly for use |
| of their services. |
|
|
| Call for more information: |
|
|
| To get your free INFO-LOOK Gateway information booklet call (toll- free) |
| 1-800-338-2720, Ext. 20, any day from 9 a.m. to 11 p.m. |
|
|
| Note: New York Telephone does not provide or control the services offered |
| through the INFO-LOOK Gateway Service. They are provided by independent |
| companies, which are responsible for the content, character, and quality |
| of their services. |
|
|
| The predictions run $5 billion now and another $5-10 billion by 1991. |
|
|
| [INFO-LOOK is already operating in Bell South and Bell Atlantic.] |
| _______________________________________________________________________________ |
|
|
| Pacific Bell Plans Access To Computers June 9, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Taken from Santa Cruz Sentinel (Section B) |
|
|
| SAN FRANCISCO (AP) -- Pacific Bell said Thursday it hopes to compete with the |
| popularity of television by offering people easy access to computerized |
| libraries, bulletin boards and the use of electronic mail. |
|
|
| PacBell's California On-line -- which will be available to anybody with a |
| personal computer, telephone and calling card -- will be among the first in the |
| nation to use a graphic-based system that simplifies procedures so only a |
| rudimentary familiarity with computers is needed. |
|
|
| "It's going to offer our customers a supplement to their current leisure |
| activities... and among other things we've seen (in trials) a lot of people |
| who got away from the TV," said Roger P. Conrad, director of Videotex Gateway |
| Services. |
|
|
| "We feel this is a more productive way for people to spend their lives and we |
| think a lot of users are going to agree," he added. Users will pay |
| "info-entrepreneurs" fees based on the time they use various services and will |
| be billed on their monthly telephone statements. Unlike some on-line |
| information services, users do not have to subscribe ahead of time. |
|
|
| Conrad said the types of services are limited only by vendors' imaginations. |
| PacBell will make money by selling telecommunication line use to the companies. |
| _______________________________________________________________________________ |
|
|
| Bulletin Boards Of Argentina June 5, 1989 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Country Code = 54 (Argentina) |
| City Code = 1 (Buenos Aires) |
|
|
| This list might be slightly incorrect due to the passage of time. The last |
| update was on December 23, 1986. |
|
|
| Name Hours Of Operation ======= Number= |
| ---- |
| Beta 23:00 - 6:30 802-0288 |
| C-Mania 21:00 - 7:00 362-8843 |
| CBM 16:00 - 12:00 90-4988 |
| Century 21 24 hours 632-7070 |
| Cerebruss 24 hours 47-2717 |
| Cerebruss Information ? 48-8300 |
| 48-9886 |
| Databank ? 44-9760 |
| Drean Conection ? 953-2523 |
| Los Pinos 13:00 - 19:00 21-0375 |
| Magenta ? 392-0124 |
| Magenta ? 392-0016 |
| Maxes 23:00 - 7:00 542-2695 |
| Mendieta 22:00 - 8:00 654-6999 |
| Pirates Cove 24:00 - 6:00 783-5023 |
| Sanctuary 24:00 - 3:00 641-4608 |
| Soft-work 22:30 - 9:00 88-2065 |
| TCConection 19:00 - 12:00 22-4197 |
| The Connection 24 Hours 82-5780 |
| The Hacker 23:00 - 7:00 748-2005 |
| Tiger ? 784-2226 |
| XCASA ? 611-8136 |
| BBS-IOM 24 Hours 804-3602 |
|
|
| Note: The settings for all systems listed above are Even, 7, 1. |
|
|
| Contributed by Noli |
| _______________________________________________________________________________ |
|
|