| ==Phrack Inc.== |
|
|
| Volume Four, Issue Thirty-Nine, File 11 of 13 |
|
|
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN PWN |
| PWN Phrack World News PWN |
| PWN PWN |
| PWN Issue XXXIX / Part Two of Four PWN |
| PWN PWN |
| PWN Compiled by Datastream Cowboy PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
|
|
| The Charge Of The Carders May 26, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Joshua Quittner (<New York> Newsday)(Page 45) |
|
|
| Computer criminals are after your credit-card numbers -- |
| to steal with, sell and swap. |
|
|
| THE KID, from Springfield Gardens, Queens, was a carder, of course. |
|
|
| He was doing what carders do: trying to talk a salesman into overnight- |
| expressing him a $4,000 computer system -- and using a stolen credit-card |
| number for payment. |
|
|
| The salesman was playing right along on the phone; he had also notified a co- |
| worker to alert the New York State Police, said William Murphy, a customer |
| service manager at Creative Computers, who described the event as it was |
| unfolding on a recent Tuesday morning. Murphy said that on a typical day, as |
| many as a dozen times, carders would call and try to buy everything from modems |
| to whole computer systems. |
|
|
| Murphy said that these days, the security people at Creative Computers are able |
| to stop virtually all of them, either by not delivering the goods, or by |
| delivering them UPS -- that's United Police Service. |
|
|
| He sighed: "It's amazing that they even try." |
|
|
| But try they do. And at other places, they're successful. Where once hacking |
| into a credit bureau was a kind of rite of passage for computer intruders, who |
| generally did little more than look up credit histories on people like Mike |
| Dukakis, now computer criminals are mining national credit bureaus and mail- |
| order houses, coming away with credit-card numbers to sell, swap or use for |
| mail-order purchases. |
|
|
| Underground electronic bulletin board systems help spread not only the |
| passwords, but the techniques used to tap into different systems. In |
| San Diego on April 30, for instance, police raided a bulletin board called |
| Scantronics, which offered among other things, step-by-step manuals on how to |
| hack into Equifax Credit Information Services and TRW Information Services, the |
| largest credit bureaus in the nation, the San Diego Tribune reported. |
|
|
| "The potential for fraud is enormous, it's almost limitless," said Joel Lisker, |
| Mastercard International's vice president of security and risk management, who |
| noted that computer intruders accessed "thousands" of credit-card account |
| numbers in another recent case. |
|
|
| MASTERCARD is putting together a task force of its bank members to address the |
| problem, and is considering inviting hackers in to learn what they can do to |
| tighten up computer access to credit bureaus, he said. |
|
|
| Mastercard estimates it lost $57 million to counterfeit scams last year; Lisker |
| said it is impossible to say how much carders contributed. But based on the |
| volume of arrests lately, he figures carding has become a big problem. |
|
|
| "It's kind of like a farmer that sees a rat," Lisker said. "If he sees one, he |
| knows he has several. And if he sees several he knows he has a major |
| infestation. This is a major infestation." |
|
|
| "It's clearly something we should be concerned about," agreed Scott Charney, |
| chief of the U.S. Justice Department's new Computer Crime Unit. Charney said |
| that roughly 20 percent of the unit's current caseload involves credit-card |
| fraud, a number that, if nothing else, colors the notion that all hackers are |
| misunderstood kids, innocently exploring the world of computer networks. |
|
|
| "Whether such noble hackers exist, the fact of the matter is we're seeing |
| people out there whose motives are not that pure," he said. |
|
|
| On May 11, New York State Police arrested three teenagers in Springfield |
| Gardens when one of them went to pick up what he hoped was an Amiga 3000 |
| computer system from Creative Computers, at a local UPS depot. |
|
|
| "What he wanted was a computer, monitor and modem. What he got was arrested," |
| said John Kearey, a state police investigator who frequently handles computer |
| and telecommunications crimes. Police posed as UPS personnel and arrested the |
| youth, who led them to his accomplices. |
|
|
| Kearey said the teens said they got the stolen credit-card number from a |
| "hacker who they met on a bridge, they couldn't remember his name" -- an |
| interesting coincidence because the account number was for a next-door neighbor |
| of one of the youths. Police suspect that the teens, who claimed to belong to |
| a small hacking group called the MOB (for Men of Business) either hacked into a |
| credit bureau for the number, got someone else to do it, or went the low-tech |
| route -- "dumpster diving" for used carbon copies of credit receipts. |
|
|
| Indeed, most credit-card fraud has nothing to do with computer abusers. |
| Boiler-room operations, in which fast-talking con men get cardholders to |
| divulge their account numbers and expiration dates in exchange for the promise |
| of greatly discounted vacations or other too-good-to-be-true deals, are far and |
| away the most common scams, said Gregory Holmes, a spokesman for Visa. |
|
|
| But carders have an advantage over traditional credit-card cheats: By using |
| their PCs to invade credit bureaus, they can find credit-card numbers for |
| virtually anyone. This is useful to carders who pick specific credit-card |
| numbers based on location -- a neighbor is out of town for a week, which means |
| all you have to do is get his account number, stake out his porch and sign for |
| the package when the mail comes. Another advantage is address and ZIP code |
| verifications, once a routine way of double-checking a card's validity, are no |
| longer useful because carders can get that information from an account record. |
|
|
| "It's tough," Holmes said. "Where it becomes a major problem is following the |
| activity of actually getting the credit-card number; it's sent out on the black |
| market to a vast group of people" generally over bulletin boards. From there, |
| a large number of purchases can be racked up in a short period of time, well |
| before the cardholder is aware of the situation. While the cardholder is not |
| liable, the victims usually are businesses like Creative Computers, or the |
| credit-card company. |
|
|
| Murphy said his company used to get burned, although he would not divulge the |
| extent of its losses. "It happened until we got wise enough to their ways," he |
| said. |
|
|
| Now, with arrangements among various law enforcement agencies, telephone |
| companies and mail carriers, as well as a combination of call-tracing routines |
| and other verification methods, carders "rarely" succeed, he said. Also, a |
| dozen employees work on credit-card verification now, he said. "I feel sorry |
| for the companies that don't have the resources to devote departments to filter |
| these out. They're the ones that are getting hit hard." |
|
|
| In New York, federal, state and local police have been actively investigating |
| carder cases. Computers were seized and search warrants served on a number of |
| locations in December, as part of an ongoing federal investigation into |
| carding. City police arrested two youths in Queens in April after attempting |
| to card a $1,500 computer system from Creative Computers. They were arrested |
| when they tried to accept delivery. |
|
|
| "It's a legitimate way to make money. I know people who say they do it," |
| claimed a 16-year-old Long Island hacker who uses the name JJ Flash. |
|
|
| While he says he eschews carding in favor of more traditional, non-malicious |
| hacking, JJ Flash said using a computer to break into a credit bureau is as |
| easy as following a recipe. He gave a keystroke-by-keystroke description of |
| how it's done, a fairly simple routine that involved disguising the carder's |
| calling location by looping through a series of packet networks and a Canadian |
| bank's data network, before accessing the credit bureau computer. Once |
| connected to the credit bureau computer, JJ Flash said a password was needed -- |
| no problem, if you know what underground bulletin boards to check. |
|
|
| "It's really easy to do. I learned to do it in about thirty seconds. If you |
| put enough time and energy into protecting yourself, you'll never get caught," |
| he said. For instance, an expert carder knows how to check his own phone line |
| to see if the telephone company is monitoring it, he claimed. By changing the |
| location of a delivery at the last minute, he said carders have evaded capture. |
|
|
| J J FLASH said that while most carders buy computers and equipment for |
| themselves, many buy televisions, videocassette recorders and other goods that |
| are easy to sell. "You can usually line up a buyer before its done," he said. |
| "If you have a $600 TV and you're selling it for $200, you will find a buyer." |
|
|
| He said that while TRW has tightened up security during the past year, Equifax |
| was still an easy target. |
|
|
| But John Ford, an Equifax spokesman, said he believes that hackers greatly |
| exaggerate their exploits. He said that in the recent San Diego case, only 12 |
| records were accessed. "It seems to me the notion that anybody who has a PC |
| and a modem can sit down and break in to a system is patently untrue," he said. |
| "We don't have any evidence that suggests this is a frequent daily occurrence." |
|
|
| Regardless, Ford said his company is taking additional steps to minimize the |
| risk of intrusion. "If one is successful in breaking into the system, then we |
| are instituting some procedures that would render the information that the |
| hacker receives virtually useless." |
|
|
| Also, by frequently altering customers' passwords, truncating account |
| information so that entire credit-card numbers were not displayed, and possibly |
| encrypting other information, the system will become more secure. |
|
|
| "We take very seriously our responsibility to be the stewards of consumer |
| information," Ford said. |
|
|
| But others say that the credit bureaus aren't doing enough. Craig Neidorf, |
| publisher of Phrack, an underground electronic publication "geared to computer |
| and telecommunications enthusiasts," said that hacking into credit bureaus has |
| been going on, and has been easy to do "as long as I've been around." Neidorf |
| said that although he doesn't do it, associates tell him that hacking into |
| credit bureau's is "child's play" -- something the credit bureaus have been |
| careless about. |
|
|
| "For them not to take some basic security steps to my mind makes them |
| negligent," Neidorf said. "Sure you can go ahead and have the kids arrested |
| and yell at them, but why isn't Equifax or any of the other credit bureaus not |
| stopping the crime from happening in the first place? It's obvious to me that |
| whatever they're doing probably isn't enough." |
|
|
| A Recent History Of Carding |
|
|
| September 6, 1991: An 18-year-old American emigre, living in Israel, was |
| arrested there for entering military, bank and credit bureau computers. Police |
| said he distributed credit-card numbers to hackers in Canada and the United |
| States who used them to make unknown amounts of cash withdrawals. |
|
|
| January 13, 1992: Four university students in San Luis Obispo, California, |
| were arrested after charging $250,000 in merchandise to Mastercard and Visa |
| accounts. The computer intruders got access to some 1,600 credit-card |
| accounts, and used the numbers to buy, among other things: Four pairs of $130 |
| sneakers; a $3,500 stereo; two gas barbecues and a $3,000 day at Disneyland. |
|
|
| February 13, 1992: Two teenagers were arrested when one of them went to pick |
| up two computer systems in Bellevue, Wash., using stolen credit-card numbers. |
| One told police that another associate had hacked into the computer system of a |
| mail-order house and circulated a list of 14,000 credit-card numbers through a |
| bulletin board. |
|
|
| April 17, 1992: Acting on a tip from San Diego police, two teenagers in Ohio |
| were arrested in connection with an investigation into a nationwide computer |
| hacking scheme involving credit-card fraud. Police allege "as many as a |
| thousand hackers" have been sharing information for four years on how to use |
| their computers to tap into credit bureau databases. Equifax, a credit bureau |
| that was penetrated, admits that a dozen records were accessed. |
|
|
| April 22, 1992: Two Queens teens were arrested for carding computer equipment. |
| _______________________________________________________________________________ |
|
|
| Invading Your Privacy May 24, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~ |
| By Rob Johnson (The Atlanta Journal and Constitution)(Page A9) |
|
|
| Some do it for fun, others have more criminal intent. Regardless, computer |
| users have a range of techniques and weaponry when breaking into files. |
| "Rooting" forbidden files is hog heaven for hackers |
|
|
| Within an instant, he was in. |
|
|
| Voodoo Child, a 20-year-old college student with a stylish haircut and a well- |
| worn computer, had been cruising a massive researchers' network called Internet |
| when he stumbled upon a member account he hadn't explored for a while. |
|
|
| The institution performed "Star Wars" research, he later found out, but that |
| didn't interest him. "I don't know or care anything about physics," he said |
| recently. "I just wanted to get root." |
|
|
| And "getting root," hackers say, means accessing the very soul of a computer |
| system. |
|
|
| Working through the network, he started a program within the research |
| institute's computers, hoping to interrupt it at the right moment. "I figured |
| I just had a second," he said, gesturing with fingers arched above an imaginary |
| keyboard. Suddenly he pounced on the phantom keys. "And it worked." |
|
|
| He soon convinced the computer he was a system operator, and he built himself a |
| back door to Internet: He had private access to exotic supercomputers and |
| operating systems around the world. |
|
|
| Before long, though, the Atlanta-area hacker was caught, foiled by an MCI |
| investigator following his exploits over the long-distance phone lines. |
| National security experts sweated over a possible breach of top-secret |
| research; the investigation is continuing. |
|
|
| And Voodoo Child lost his computer to law enforcement. |
|
|
| "I was spending so much time on the computer, I failed out of college," he |
| said. "I would hack all night in my room, go to bed and get up at 4 in the |
| afternoon and start all over." |
|
|
| In college, he and a friend were once discovered by campus police dumpster- |
| diving behind the university computer building, searching for any scraps of |
| paper that might divulge an account number or a password that might help them |
| crack a computer. |
|
|
| Now he's sweating it out while waiting for federal agents to review his case. |
| "I'm cooperating fully," he said. "I don't want to go to prison. I'll do |
| whatever they want me to." |
|
|
| In the meantime, he's back in college and has taken up some art projects he'd |
| abandoned for the thrill of computer hacking. |
|
|
| The free-form days of computer hacking have definitely soured a bit -- even for |
| those who haven't been caught by the law. |
|
|
| "It's a lot more vicious," Voodoo Child said as a friend nodded in agreement. |
| "Card kids" -- young hackers who ferret out strangers' credit card numbers and |
| calling card accounts -- are wrecking the loose communal ethic that defined |
| hacking's earlier, friendlier days. |
|
|
| And other computer network users, he said, are terrified of the tactics of |
| sophisticated hackers who routinely attack other computer users' intelligence, |
| reputation and data. |
|
|
| "I used to run a BBS [electronic bulletin board system] for people who wanted |
| to learn about hacking," Voodoo Child said. "But I never posted anything |
| illegal. It was just for people who had questions, who wanted to do it |
| properly." |
|
|
| Doing it properly, several Atlanta-area hackers say, means exploring the gaps |
| in computer networks and corporate systems. They say it's an intellectual |
| exercise -- and an outright thrill -- to sneak into someone else's computer. |
|
|
| During a recent interview, Voodoo Child and a friend with a valid Internet |
| account dialed up the giant network, where some of their counterparts were |
| waiting for a reporter to ask them some questions. |
|
|
| "Did you get that information on the Atlanta Constitution reporter you were |
| asking about?" a faceless stranger asked. |
|
|
| A startled reporter saw his credit report and credit card numbers flashed |
| across the screen. Voodoo Child offered up the keyboard -- an introduction of |
| sorts to a mysterious, intimidating accomplice from deep inside the digital |
| otherworld. "Go ahead," he said. "Ask him anything you want." |
| _______________________________________________________________________________ |
|
|
| KV4FZ: Guilty Of Telephone Toll Fraud May 15, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By John Rice (rice@ttd.teradyne.com) in TELECOM Digest V12 #412 |
|
|
| St. Croix ham operator, Herbert L. "Herb" Schoenbohm, KV4FZ, has been found |
| guilty in federal court of knowingly defrauding a Virgin Islands long-distance |
| telephone service reseller. He was convicted April 24th of possessing and |
| using up to fifteen unauthorized telephone access devices in interstate and |
| foreign commerce nearly five years ago. |
|
|
| The stolen long distance telephone access codes belonged to the Caribbean |
| Automated Long Lines Service, Inc. (CALLS) of St. Thomas, U.S. Virgin Islands. |
| Schoenbohm was found to have made more than $1,000 in unauthorized telephone |
| calls -- although the prosecution said he was responsible for far more. |
|
|
| According to the Virgin Islands Daily News, Schoenbohm, who is also the St. |
| Croix Police Chief of Communications, showed no emotion when he was pronounced |
| guilty of the charges by a 12 member jury in U.S District Court in |
| Christiansted. The case was heard by visiting District Judge Anne Thompson. |
|
|
| Neither Schoenbohm or his defense attorney, Julio Brady, would comment on the |
| verdict. The jury deliberated about seven hours. The sentencing, which has |
| been set for June 26, 1992, will be handled by another visiting judge not |
| familiar with the case. |
|
|
| Schoenbohm, who is Vice Chairman of the V.I. Republican Committee, has been |
| released pending sentencing although his bail was increased from $5,000 to |
| $25,000. While he could receive a maximum of ten years on each count, |
| Assistant U.S. Attorney Alphonse Andrews said Schoenbohm probably will spend no |
| more than eight months in prison since all three counts are similar and will be |
| merged. |
|
|
| Much of the evidence on the four day trial involved people who received |
| unauthorized telephone calls from KV4FZ during a 1987 period recorded by the |
| CALLS computer. Since the incident took place more than five years ago, many |
| could not pinpoint the exact date of the telephone calls. |
|
|
| The prosecution produced 20 witnesses from various U.S locations, including |
| agents from the Secret Service, the U.S. Marshals Service, Treasury Department |
| and Federal Communications Commission. In addition ham operators testified for |
| the prosecution. |
|
|
| Schoenbohm was portrayed as a criminal who had defrauded calls out of hundreds |
| of thousands of dollars. Schoenbohm admitted using the service as a paying |
| customer, said it did not work and that he terminated the service and never |
| used it again. He feels that there was much political pressure to get him |
| tried and convicted since he had been writing unfavorably articles about |
| Representative DeLugo, a non-voting delegate to Congress from the Virgin |
| Islands, including his writing of 106 bad checks during the recent rubbergate |
| scandal. |
|
|
| Most, but not all the ham operators in attendance were totally opposed to |
| KV4FZ. Bob Sherrin, W4ASX from Miami attended the trial as a defense character |
| witness. Sherrin told us that he felt the conviction would be overturned on |
| appeal and that Schoenbohm got a raw deal. "They actually only proved that he |
| made $50 in unauthorized calls but the jury was made to believe it was $1,000." |
|
|
| Schoenbohm's attorney asked for a continuance due to newly discovered evidence, |
| but that was denied. There also is a question as to whether the jury could |
| even understand the technology involved. "Even his own lawyer couldn't |
| understand it, and prepared an inept case," Sherrin said. "I think he was |
| railroaded. They were out to get him. There were a lot of ham net members |
| there and they were all anti-Herb Schoenbohm. The only people that appeared |
| normal and neutral were the FCC. The trial probably cost them a million |
| dollars. All his enemies joined to bring home this verdict." |
|
|
| Schoenbohm had been suspended with pay from the police department job since |
| being indicted by the St. Croix grand jury. His status will be changed to |
| suspension without pay if there is an appeal. Termination will be automatic if |
| the conviction is upheld. Schoenbohm's wife was recently laid off from her job |
| at Pan Am when the airline closed down. Financially, it could be very |
| difficult for KV4FZ to organize an appeal with no money coming in. |
|
|
| The day after the KV4FZ conviction, Schoenbohm who is the Republican Committee |
| vice chairman was strangely named at a territorial convention as one of eight |
| delegates to attend the GOP national convention in Houston this August. He was |
| nominated at the caucus even though his felony conviction was known to |
| everyone. Schoenbohm had even withdrawn his name from consideration since he |
| was now a convicted felon. |
|
|
| The Virgin Island Daily News later reported that Schoenbohm will not be |
| attending the GOP national convention. "Schoenbohm said he came to the |
| conclusion that my remaining energies must be spent in putting my life back |
| together and doing what I can to restore my reputation. I also felt that any |
| publicity in association with my selection may be used by critics against the |
| positive efforts of the Virgin Islands delegation." |
|
|
| Schoenbohm has been very controversial and vocal on the ham bands. Some ham |
| operators now want his amateur radio license pulled -- and have made certain |
| that the Commission is very much aware of his conviction. |
| _______________________________________________________________________________ |
|
|
| AT&T Launches Program To Combat Long-Distance Theft May 13, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Virginia Randall (United Press International/UPI) |
|
|
| Citing the mushrooming cost of long-distance telephone fraud, American |
| Telephone & Telegraph Co. announced plans to combat theft of long-distance |
| telephone services from customers. |
|
|
| AT&T's program, dubbed NetProtect, is an array of software, consulting, |
| customer education and monitoring services for businesses. One program limits |
| customer liability to the first $25,000 of theft, while another ends customer |
| liability entirely under certain circumstances. |
|
|
| By law, companies are liable for the cost of calls made on their systems, |
| authorized or not. |
|
|
| Jerre Stead, president of AT&T's Business Communications unit, said, "The |
| program not only offers financial relief to victims of long-distance fraud. |
| It also gives our customers new products and services specifically designed to |
| prevent and detect fraud." |
|
|
| Long-distance calling fraud ranges from a few dollars to the hundreds of |
| thousands of dollars for victims. The Communications Fraud Control |
| Association, an industry group, estimates long-distance calling fraud costs |
| more than $1 billion a year, said Peggy Snyder, an association spokeswoman. |
|
|
| NetProtect Basic Service, offered free with long-distance and domestic 800 |
| service, consists of ongoing monitoring around the clock for unusual activity. |
|
|
| The company will start this service this week. |
|
|
| NetProtect Enhanced and Premium services offer more customized monitoring and |
| limit customer liability to $25,000 per incident or none at all, depending on |
| the program selected. |
|
|
| Pricing and permission to provide the Enhanced and Premium services are |
| dependent on Federal Communication Commission approval. AT&T expects to offer |
| these programs beginning August 1. |
|
|
| Other offerings are a $1,995 computer software package called "Hacker Tracker," |
| consulting services and the AT&T Fraud Intervention Service, a swat team of |
| specialists who will detect and stop fraud while it is in progress. |
|
|
| The company also will provide a Security Audit Service that will consult with |
| customers on possible security risks. Pricing will be calculated on a case-by- |
| case basis, depending on complexity. |
|
|
| The least expensive option for customers is AT&T's Security Handbook and |
| Training, a self-paced publication available for $65 which trains users on |
| security features for AT&T's PBX, or private branch exchanges, and voice mail |
| systems. |
|
|
| Fraud occurs through PBX systems, which are used to direct the external |
| telephone calls of a business. |
|
|
| Company employees use access codes and passwords to gain entry to their PBX |
| system. A typical use, the industry fraud group's Snyder said, would be a |
| sales force on the road calling into their home offices for an open line to |
| call other customers nationally or worldwide. |
|
|
| These access codes can be stolen and used to send international calls through |
| the company's network, billable to the company. |
|
|
| Unauthorized access to PBXs occur when thieves use an automatic dialing feature |
| in home computers to dial hundreds of combinations of phone numbers until they |
| gain access to a company's PBX system. |
|
|
| These thieves, also known as hackers, phone freaks or phrackers, then make |
| their own calls through the PBX system or sell the number to a third party to |
| make calls. |
|
|
| Others use automatic dialing to break into PBX systems through voice mail |
| systems because such systems have remote access features. |
|
|
| Calls from cellular phones also are at risk if they are remotely accessed to a |
| PBX. Electronic mail systems for intracompany calls are not affected because |
| they don't require PBX systems. |
|
|
| According to Bob Neresian of AT&T, most fraud involves long-distance calls to |
| certain South American and Asian countries, especially Columbia and Pakistan. |
|
|
| There is no profile of a typical company at risk for telephone fraud, said |
| Snyder. |
|
|
| "Any company of any size with long-distance service is at risk," she said. |
| "Criminals don't care who the long distance provider is or how big the company |
| they're stealing from is." |
|
|
| She said the industry recognized the dimensions of telephone theft in 1985, |
| when the Communications Fraud Control Association was formed in Washington D.C. |
| The group consists of providers of long-distance service, operator services, |
| private payphones, end-users of PBX systems, federal, state and local law |
| enforcement agencies and prosecutors. |
|
|
| Janice Langley, a spokeswoman for US Sprint Corp. in Kansas City, Mo., called AT&T's announcement similar to a program her company announced March 31. |
|
|
| That service, SprintGuard Plus, is available to companies with a call volume |
| of $30,000 a month. Sprint also offers basic monitoring program to customers |
| without charge. |
|
|
| "We don't have minimum billing requirements for any of these services or |
| systems," responded AT&T's Neresian. "All the carriers have seen the problem |
| and have been working on their own approaches," he said. |
|
|
| Jim Collins, a spokesman for MCI Communications in Washington, said his company |
| had been conducting phone fraud workshops free of charge for customers for four |
| years. |
| _______________________________________________________________________________ |
|
|