| ==Phrack Inc.== |
|
|
| Volume Four, Issue Forty, File 2 of 14 |
|
|
| [-=:< Phrack Loopback >:=-] |
|
|
| By Dispater & Mind Mage |
|
|
| Phrack Loopback is a forum for you, the reader, to ask questions, air |
| problems, and talk about what ever topic you would like to discuss. This is |
| also the place Phrack Staff will make suggestions to you by reviewing various |
| items of note; magazines, software, catalogs, hardware, etc. |
|
|
| In this issue: |
|
|
| Retirement of a Hacker : Jester Sluggo |
| Truth Is Out Of Style : Dispater |
| Tim Foley Virus : Guido Sanchez |
| The Hacker Files (from DC Comics) : Newsbytes |
| Sneakers (from Universal Pictures) : Press Release |
| Pirates v. AT&T: Posters : Legacy Irreverent and Captain Picard |
| Telco Trashing Yields Big Rewards : Anonymous |
| Anonymous Mail On IBM VM Systems? : Apollo |
| WWIV Link Hack : Mr. Bigg |
| The Day Bell System Died : Anonymous |
| The 1992 Consumer Electronics Show : Sarlo |
|
|
| _______________________________________________________________________________ |
|
|
| x x x |
| | | | |
| +------------+ |
| | Retirement | |
| | of a | |
| | Hacker | |
| +---+------------+---+ |
| | by Jester Sluggo | |
| +-+--------------------+-+ |
| | Released: July 9, 1992 | |
| +------------------------+ |
|
|
| I would like to begin by saying "Hello" to all readers of this file, but |
| unfortunately it will be my last time. I've been a member of the "hacker |
| underground" for over a decade and am one of the few extremely lucky hackers |
| who has successfully hacked a great number of computer systems, phone systems, |
| and other technologies, yet has never been caught. I wish to take this last |
| opportunity to reflect on my experiences, and express many personal views, |
| because although there are feelings of sadness, it is my pleasure to announce |
| my formal retirement from this "underground" community. |
|
|
| My decision to retire has been a carefully planned path which began several |
| years ago. During the early 1980's, the innocence of hacking and exploring |
| computer systems for my quest of knowledge was a great thrill. Every system |
| was like an unexplored door which lead to unlimited opportunities; various |
| computer systems, operating systems, languages, networks, software, and data. |
|
|
| But it was in the later part of the 1980's when I began to realize that I had |
| to focus my interests, knowledge and experience towards a legitimate career. |
| It's nearly impossible to earn a living solely within the resources of the |
| hacker underground, and the idea of abusing technology for monetary gain is |
| against the (unwritten) code of hacker ethics. Also at this time, the |
| innocence of exploring various systems was being replaced by the realities of |
| ruining my entire future at such a young age if I was caught and convicted by |
| the United States' legal system. |
|
|
| The media and law-enforcement agencies have almost always been biased against |
| hackers, and these are two powerful entities that influence society. Hackers |
| have always been presented in a negative context, whereas their discoveries, |
| efforts, creativeness, and hard work have been ignored except among fellow |
| hackers. In a way, it's similar to how the U.S. government and corporations |
| support research and development: A group of researchers discover, explore, |
| refine, or exploit a certain technology over a period of many years, yet their |
| efforts go unnoticed unless their research results in a product acceptable to |
| society. The researcher's results are shared, respected, and challenged among |
| the scientific community and journals long before they ever result in a product |
| (if they ever result in a product). In the same way that researchers and |
| scientists relentlessly pursue their interests, I pursued answers to my |
| curiosities and interests. |
|
|
| It is the groups that want to control the society (the legal system, and |
| police) which have labeled "hackers" as notorious people. Hackers can use |
| technology to access a variety of information which was previously accessible |
| only to these groups, and these controllers are afraid of losing their |
| advantages and control. Currently in US, the FBI is afraid of losing their |
| ability to easily tap fiber optics so they're proposing to make it mandatory |
| for central offices to make it easier for them. If people knew how common |
| illegal wiretaps occur, they'd be upset at the abuse of power. Police are |
| making illegal search and seizures, and district attorneys are filing |
| outrageous affidavits to protect their control of power and access to |
| information. |
|
|
| It was in the middle to late 1980's when the legal system and law enforcement |
| agencies increased efforts to severely penalize hackers, when the risk of |
| getting caught began to outweigh the excitement of discovering. It is |
| unbelievably difficult to carry the burden of a "serious" criminal record |
| throughout one's life when you're 20 years old (or for that matter 16 years |
| old), as well as the eternal monetary debt which comes with these consequences. |
| In the 1970's, the founders of Apple computer were caught selling Blue Boxes |
| while they were in college and got off with a minimal fine. With todays laws, |
| the potential jail time, monetary damages, and lawyer fees, the system would |
| have wasted and banned the brilliance of Steve Wozniak and Steve Jobs. Apple |
| Computer (and microcomputers) might not have been born (IBM would have loved |
| that). |
|
|
| Technology has changed faster than the legal system and society can adapt, so |
| for now, unapproved exploring of these technologies has been declared a serious |
| offense. Society trusts the legal systems' judgement, but even in 1992 law- |
| makers are just barely beginning to understand technology: "Is software |
| patentable (do not confuse with copyrightable), and to what degree?", "What |
| privacy and freedom of speech should we have with electronic mail and |
| communications?" Don't let unqualified law makers make decisions about |
| technology-related issues that will affect you, without them knowing what you |
| have to say. |
|
|
| So it was in the late 1980's when I began preparing for my retirement. I |
| outlined a set of goals and a plan to achieve them. Unfortunately this plan |
| required several years to fulfill, but I knew it was the right time of my life |
| to begin this ambitious plan. The goals I wanted to achieve were: |
|
|
| 1) Pass the knowledge I've gained onto others. |
| 2) Keep the "hacker" movement active. |
| 3) Prepare myself to be legitimately successful so that I can help to |
| influence society's views about technology as a member of the |
| society. |
|
|
| Due to the increasing danger of getting caught, and to become successful, I |
| was forced to hide from the mainstream hacker community and make my actions and |
| efforts unknown. The first two goals were closely related and took slightly |
| longer to complete than my original plan. However, they were a much greater |
| financial sacrifice than I ever imagined. The third goal will probably require |
| the rest of my lifetime, but it's a challenge I accept. |
|
|
| To complete goals 1 and 2, I've spent the last 5 years preparing a "tomb" of |
| information and knowledge used within the hacker community. Not all of the |
| information is complete, but neither is the seed that grows to become a tree. |
| Anyone with a telephone can guess ("hack" according to the media and law |
| enforcement) 4-digit passwords to telephone calling cards or PBX out-dial |
| lines, but I wanted "real" hackers. I talked and met with 100's of hackers |
| world-wide to find the right individuals who can responsibly learn and append |
| to this "tomb" -- people who have the desire, respect, effort and ability to |
| encourage new generations of hackers. This group has been selected and |
| trained, and I feel they are some of the best prospects. Their international |
| mixing should give them an almost unlimited number of opportunities, and some |
| protection. I wish them the best of all luck in their endless journey of |
| learning and knowledge. |
|
|
| To become legitimately successful meant getting a respectable job. Obviously, |
| with my interests, I knew it would have to be in the high technology |
| industries. Unfortunately, getting a job interview or a job offer with these |
| companies is difficult because the Human Resources departments always shun the |
| hiring of hackers. This is ironic, because many of the engineers and |
| programmers within these companies are made of ex-hackers, or people who share |
| a similar intense interest in technology. Also, since some of best experiences |
| of a hacker are discovered non-legitimately they can't be presented on a |
| resume. |
|
|
| My first step towards completing this goal was instinctive; to keep my |
| excitement and enjoyment focused intensely on technology. This may sound |
| strange, but many hackers know friends who "burn out" on hacking or working |
| in the high-tech companies, and I didn't want to 'burn out' at 20 years of age, |
| so I had to slow down my hacking activity. |
|
|
| The next step was getting a college education, which I've completed. College |
| is not the answer to everything... in fact it's not the answer to anything, |
| however, college is an experience I wish everyone could experience -- it's a |
| unique experience. A college degree will not guarantee a job, but it might get |
| you past the Human Resources department. If you have the chance to attend |
| college, don't miss this chance. I realize employers prefer experienced |
| workers over inexperienced "fresh" college graduates, but if you have a focused |
| interest on a certain technology, then you will find a way to keep updating |
| yourself while suffering through college. And like me, you will find the |
| college degree combined with the results of your focused efforts will open the |
| best job opportunities to you. Be focused and patient... it worked for me! |
|
|
| I am currently working on the inside of a technology-related company, enjoying |
| the work I do for a living. In fact, sometimes I think to myself, "Wow, I get |
| paid for doing this!?" It's a thrill to be doing what I do, yet I must work |
| hard, and continue working hard to achieve the highest position I am able to |
| reach to make the most of my abilities. In doing this, I hope someday to give |
| something back to the non-hacking society which may show them that hackers are |
| constructive to society, thus, changing their negative view which has labeled |
| hackers synonymous to "criminals." I would like to see mature, legitimately- |
| successful hackers, form an interest group to help cultivate the energy of the |
| younger hackers. |
|
|
| Although I am retiring from the community, I can never retire the curiosity and |
| intense interest I have about technology. Instead, I now focus these aspects |
| legitimately into my daily work and will continue to do so. I've immensely |
| enjoyed my involvement in the hacking community and will always treasure it. I |
| also hope to eventually persuade people to accept hackers and to not persecute |
| them. This last goal is the most ambitious goal, but I feel it's the most |
| important goal, because those groups that control society are wasting a group |
| of young and talented individuals who could be inventors of future |
| technologies. Now, I will formally say "goodbye" to my friends in the hacking |
| community... but not for the last time. |
|
|
| Persevere, |
|
|
| Jester Sluggo |
| _______________________________________________________________________________ |
|
|
| "Truth Is Out Of Style" |
|
|
| An Investigative Report Into Computer Security Corruption |
|
|
| by Dispater |
|
|
| It seems that these days the anti-virus industry/community has brainwashed the |
| public into thinking that any use of a modem will put you in contact with an |
| unfathomable array of dangers. It sounds like something your mom said, when |
| she didn't want you to stay out after dark doesn't it? |
|
|
| As it turns out the anti-virus community has all the moral fiber of television |
| evangelists. As they preach on about the horrors of accessing information |
| (without purchasing one of their products), they are engaging in the activity |
| that they claim should be made a federal offense, in Congress. That is the |
| "distribution of computer viruses. Not only have they been involved in this |
| type of activity since they industry began, but now there is a self proclaimed |
| "elite" [smirk] group of so-called professionals within the industry that wish |
| to keep a monopoly on the virus trade, by ruining the reputation and lives of |
| independent researchers. So in a way, we now have a "virus cartel" within the |
| computer security industry. |
|
|
|
|
| The Little Black Book of Computer Viruses |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| The Little Black Book of Computer Viruses is a printed text that has been |
| around for a few years, but is finally making waves with people who think |
| Prodigy and CompuServe are the best networks ever invented. Anyway, this book |
| contains printed out versions of viruses. Gee, viruses are SO difficult for |
| people to get their hands on aren't they? Well, one of the information |
| dinosaurs got his name in print for condemning such immorality. |
|
|
| "Professional virus fighters such as Alan Solomon at S&S |
| International are madder than angry hornets over the publication. |
| They are encouraging anti-black book campaigns that include |
| PICKETING THE AUTHOR'S HOUSE, boycotting shops that sell the book, |
| petitioning Congress, and even bringing in lawyers." |
| -- ComputerWorld, June 29, 1992, page 4 (emphasis added) |
|
|
| Well isn't it interesting to note that while Mr. Solomon is encouraging |
| personal and economic harassment of Mr. Ludwig, his close friend and business |
| associate, Sarah Gordon is doing the dirty work for him. |
|
|
|
|
| The Con |
| ~~~~~~~ |
| The National Computer Security Association's 1st Annual Conference on Viruses |
| took place in Washington, D.C. this past June. Alan Solomon and Sarah Gordon |
| were there in full force. Gordon has often been referred to as being Solomon's |
| sidekick and nowhere did she live up to this distinctive title more than at |
| this conference. |
|
|
| At the conference, Gordon purchased not one, but two copies of Ludwig's book |
| and then immediately ran to the conference organizer to make a dramatic scene |
| over how immoral it was for Mr. Ludwig to be selling such a thing. As it turns |
| out this is not the first time Sarah Gordon has engaged in such hypocritical |
| behavior. |
|
|
| Another interesting thing to note at the conference is the fact that one |
| evening, Knight Lightning and a couple of others noticed some people sitting |
| around a room and walked in out of curiosity to what was going on. As it |
| turned out what was going on was a "midnight meeting" of sorts. KL and friends |
| were asked to leave because "it was not appropriate that <they> be here." Why |
| wasn't it appropriate? It's because what these people were doing was |
| discussing the ways they were going to "take down bulletin boards" and damage |
| people's career's who distribute viruses. |
|
|
| Sometime after this conference, I learned about their plan to use "the media to |
| ruin these sysops. For example, to use influence with the media to call |
| attention to this type of activity." These people even went so far as to |
| compile a list of BBSes that they wish to "take down." |
|
|
| The Hit List |
| ~~~~~~~~~~~~ |
| Phrack received anonymous mail containing the BBS "hit list" that the self- |
| proclaimed "elite" group of modem vigilantes put together to target first. |
| Upon our receipt of this list, Phrack staff members contacted the sysops of |
| these boards and as a result, many of the numbers have since been changed. |
|
|
| +1-206-481-2728 The Festering Pit of Vile Excretions |
| [This phone number belongs to a construction company |
| called Custom Building Co.] |
| +1-213-274-1333 West Coast Technologies (Tymnet 311021300023) |
| +1-213-274-2222 DII |
| +1-213-PRI-VATE\ |
| )BBS-A-Holic |
| +1-ITS-PRI-VATE/ |
| +1-301-PRI-VATE\ |
| )Digital Underground |
| +1-301-913-5915/ |
| +1-301-948-7761 Cornerstone III |
| [ ] |
| +1-305-669-1347 The Penthouse |
| +1-516-466-4620\ |
| )Hamburger Heaven: this was down for |
| +1-517-PRI-VATE/ software problems, was titled Sentinel's Gate |
| +1-602-491-0703 The Final Frontier |
| +1-708-541-1069 Pirate's Guild |
| +1-717-367-3501 Night Eyes |
| +1-818-831-3189 Pirate's Cove |
| +1-901-756-4756 Silicon Central |
| +1-916-729-2112 The Welfare Department |
| [This is an insurance companies phone number] |
| +1-213-274-1333 West Coast Technologies (Tymnet 311021300023) |
| +1-213-274-aaaa DII |
| +1-313-LIM-ITED Canterbury Woods |
| +1-409-372-5511 The Crowbar Hotel |
| +1-514-PRI-VATE\ |
| )The Sacred Reich |
| +1-514-975-9362/ |
| +1-516-328-0847 The Grave of the Lost |
| +1-516-541-6324 Realm of Heroes |
| +1-708-459-7267 Hell Pit |
| +1-713-464-9013 South of Heaven |
| +1-818-831-3189 Pirate's Cove |
| +1-819-PRI-VATE Brain Damage |
|
|
| It is unclear as to whom is directly responsible for the organization of this |
| group or who is responsible for creating and distributing the list, however |
| there were representatives from CERT, ISPNews, and several other well known |
| individuals who are self-proclaimed security experts as well as a slew of |
| nobodies who wish to make a name for themselves. |
|
|
|
|
| The Hell Pit BBS |
| ~~~~~~~~~~~~~~~~ |
| The Hell Pit is a BBS system in Chicago and operated by a sysop named Kato. |
| Kato has a legitimate curiosity (as if a curiosity needs to be validated) about |
| the inner-workings of viruses. I shall let him relate his experience: |
|
|
| "I have been running The Hell Pit BBS for the past 3 years. It's gone |
| through many phases in that time, but the most recent has been my affection |
| for computer viruses. I became interested in viruses about one and a half |
| years ago and I set up a virus file base on my system. At first I had a |
| mere 5 or 6 viruses that I had collected from a system in the area. My |
| collection has grown to about 700 IBM computer viruses." |
|
|
| "It seems to be their objective to shut down my bulletin board system and |
| therefore eliminate my virus database. Considering these anti-virus |
| personnel claim to be interested in aspects of computer security, I find |
| their tactics highly questionable. There was recently a NCSA anti-virus |
| conference. I learned from sources that one of the people attending the |
| conference [Sarah Gordon] had committed certain acts on my BBS. This person |
| claimed to have called up, uploaded 3 fake viruses, gained access to my |
| virus database and then downloaded several viruses. This is their proof |
| that I do not adequately control virus access on my system. The anti-virus |
| personnel do not allow me to defend myself." |
|
|
| "Anti-virus personnel themselves have committed the same mistakes as I did, |
| probably much more often. There is no set of rules that determines what |
| makes someone an anti-virus authority. Certain people that seem to fit the |
| mold are allowed to exchange viruses with anti-virus personnel. What are |
| the criteria for these people? Is there any? It has been my experience |
| that if you get involved with the right circles, you are considered an anti- |
| virus authority. However, there are many places in the anti-virus community |
| for viruses to leak out. For one thing, you can never be certain who you |
| are dealing with. Just because someone is smart and claims to hold an anti- |
| virus attitude is no guarantee that that person isn't an "in the closet" |
| virus writer. |
|
|
| "At anti-virus conferences such as the NCSA anti-virus conference, guests |
| were exchanging viruses like they were baseball cards. That isn't what I |
| would consider controlling access." |
|
|
| "They do help a lot of people with computer troubles. However, to criticize |
| me for not properly controlling access to my collection of viruses is being |
| hypocritical." |
|
|
| "If anyone would like to call my system to check things out, feel free. I |
| have a lot more to offer than just computer viruses. I have a good number |
| of text files and some pretty active message bases. The Hell Pit BBS - |
| (708)459-7267" - Kato |
|
|
|
|
| Conclusions |
| ~~~~~~~~~~~ |
| It seems there is a move afoot in the anti-virus community to rid the world of |
| bulletin board systems that disseminate viruses openly and freely. The anti- |
| virus professionals believe that they must "defend the world" from this type of |
| activity. Even though during a recent conference in Washington, D.C., it was |
| disclosed that an anti-virus researcher recently uploaded three (3) viruses |
| onto a virus BBS (Hell Pit). Why was this done? To "expose the fact that the |
| sysop was not as careful as he claims to be." The person that did this was |
| then able to download viruses which was against the policy the sysop claimed |
| was in place (of course this statement is based upon the integrity of the anti- |
| virus community and their integrity is obviously suspect). |
|
|
| So, the anti-virus community set-up this sysop and made an example of him in a |
| national conference without allowing him the opportunity to defend himself. In |
| fact, the sysop may still be totally unaware that this event has even occurred, |
| until now that is. |
|
|
| These anti-virus researchers were openly exchanging copies of viruses for |
| "research purposes only." It seems okay for them to disseminate viruses in the |
| name of research because of their self-proclaimed importance in the anti-virus |
| community, but others that threaten their elite (NOT!) status are subject to be |
| framed and have examples made of them. |
|
|
|
|
| Do As I Say, Not As I Do |
| ~~~~~~~~~~~~~~~~~~~~~~~~ |
| This type of activity raises a very interesting question. Who gives private |
| sector computer security employees or consultants carte blanche to conduct this |
| type of activity? Especially when they have the gall to turn around and label |
| hackers as criminals for doing the exact same thing. The answer is not who, |
| but what; money and ego. Perhaps the most frightening aspect of this whole |
| situation is that the true battle being fought here is not over viruses and |
| bulletin board systems, but instead the free dissemination of information. For |
| a group of individuals so immersed in this world, there is a profound ignorance |
| of the concepts of First Amendment rights. |
|
|
| Phrack Magazine is ready to stand tall and vigorously keep a close watch and |
| defend against any incursion of these rights. We've been around a long time, |
| we know where the bodies are buried, our legion of followers and readers have |
| their eyes and ears open all across the country. Those of you in the security |
| industry be warned because every time you slip up, we will be there to expose |
| you. |
|
|
| Dispater |
| _______________________________________________________________________________ |
|
|
| Tim Foley Virus |
| ~~~~~~~~~~~~~~~ |
| By Guido Sanchez |
|
|
| Right after I moved from 512 to 708, I had the misfortune to realize that Steve |
| Jackson Games, a company whose games I readily buy and play, had a BBS up in my |
| home town called the Illuminati BBS. This was my misfortune as I could have |
| called it locally in Texas, but now instead had to spend my phone bill on it |
| from Illinois. |
|
|
| A good year after the Secret Service assault of Steve Jackson Games, after most |
| of the "evidence" was returned with nifty little green stickers on it, a text |
| file was put up on the BBS called FOLEY.TXT, a simple copy of the lawsuit that |
| Steve Jackson Games had filed against the government, also known as |
| JACKSUIT.TXT, distributed by the EFF I believe. |
|
|
| [Editor's Note: We have been unable to confirm that EFF ever released a file |
| called JACKSUIT.TXT, however details of the EFF's |
| participation in the Steve Jackson Games lawsuit can be found |
| in EFFector Online 1.04.] |
|
|
| It was called FOLEY.TXT obviously because of Timothy Foley, a big-shot |
| government guy [actually an agent for the U.S. Secret Service] who is one of |
| the defendants in the case. I downloaded the file, and zipped it into a file |
| called, surprisingly enough, FOLEY.ZIP. |
|
|
| Within the next week, I was gleefully spreading information as usual, and |
| uploaded the FOLEY.ZIP file along with a batch of viral files to a local BBS |
| with a beginning virus base. The theory here is to spread viruses about, |
| accessible to all so that wonderful little Anti-Viral programmers cannot |
| succeed. |
|
|
| Unfortunately, the FOLEY.ZIP file was put into the viral file base, and before |
| I could warn the sysop to move it into the appropriate file base, about 8 lame |
| warezwolves had downloaded it and by the end of the week it was widely spread |
| around the 708 NPA. |
|
|
| The moral of this story? None really, it's just an amusing vignette of what |
| can happen when people become involved in the intense bartering of information |
| that takes place via modem, and can get ridiculed if they're not sure of their |
| commodity. That's all this huge business is, everyone is a courier. Whether |
| they're pirated files, adult files, sound files, viruses, or text files; 90% of |
| the time they're just downloaded from one 1.2 gig board and uploaded to the |
| next one for more credits to download more files, etc. |
|
|
| It's a great big cycle, just like life. So, to risk sounding cliche, my rally |
| to all is this: "Slow down! Sit back and pick the roses, eat them, digest them, |
| and eventually <hopefully> excrete them!" Mr. Warhol, my fifteen minutes are |
| up. The soapbox is now free. |
| _______________________________________________________________________________ |
|
|
| The Hacker Files June 22, 1992 |
| ~~~~~~~~~~~~~~~~ |
| By Barbara E. McMullen & John F. McMullen (Newsbytes) |
|
|
| NEW YORK -- DC Comics has announced the introduction of a new twelve-issue |
| series, "The Hacker Files." DC spokesperson Martha Thomases said that the |
| first issue will ship on June 23rd. |
|
|
| The series, created by science fiction author Lewis Shiner, deals with the |
| adventures of "super-hacker" Jack Marshall who, prior to the events chronicled |
| in the series, unjustly lost his job at Digitronix and now operates as a free- |
| lance consultant. |
|
|
| The first story line, covering the first four issues of the series, deals with |
| Marshall's attempt to uncover those responsible for jamming ARPANET (Network of |
| Advanced Research Projects Agency) and causing NORAD's Space Surveillance |
| Center inside Cheyenne Mountain, Wyoming to malfunction, bringing the United |
| States to the brink of nuclear war. |
|
|
| In the course of his investigation, Marshall, AKA "Hacker," is assisted by a |
| number of members of the hacker community -- "Master Blaster," "Sue Denim," and |
| "Spider" (Master Blaster, whose real name is Mikey is a student at New York |
| City's Bronx High School of Science). |
|
|
| Fiction comes close to reality when it appears that the person responsible for |
| the virus that caused the damage is Roger P. Sylvester, a student at Columbia |
| University and the son of a high ranking official at the National Security |
| Agency (NSA); on November 2, 1988 Robert T. Morris, Jr., a Cornell student and |
| son of NSA's chief computer scientist, caused the crippling of the Internet |
| through his release of the "Internet Worm." |
|
|
| Shiner told Newsbytes, "The similarity of the characters was, of course done |
| intentionally -- you might even note the somewhat subtle connection of the |
| names: 'Sylvester The Cat' and 'Morris The Cat.' I did it partially to show |
| those somewhat knowledgeable about computers that the plot was not made out of |
| whole cloth but was the result of a good deal of research." |
|
|
| Shiner continued, "When reading comics, I look for information density and I |
| tried to make the Hacker Files rich in that regard. I'm hoping to attract some |
| computer-literate young people to comics -- comics were one of the earliest |
| forms of expression to make great use of computers and I hope, with the Hacker |
| Files, to involve more computer types in the medium." |
|
|
| Shiner also told Newsbytes that his experience as a programmer with a small |
| Dallas software firm provided him with an ongoing interest in computer and |
| communications technology. He added, "The firm was sold to EDS (Electronic |
| Data Services), Ross Perot's firm, and, with long hair and jeans, I didn't fit |
| into the EDS mold so I left and concentrated on writing." |
| _______________________________________________________________________________ |
|
|
| "Sneakers" by Universal Pictures June 24, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Taken from PR Newswire |
|
|
| Follow A Team of High-Tech Security Experts |
| Into The Complex World of Computer Crime |
|
|
| "I was trying to break into Protovision. I wanted to get the programs for |
| their new games." -- David Lightman (Matthew Broderick, "WarGames"). |
|
|
| "The world isn't run by weapons anymore, or energy or money. It's run by |
| little ones and zeros. Little bits of data. It's all just electrons." -- |
| Cosmo (Ben Kingsley, "Sneakers"). |
|
|
| In 1984, screenwriters Walter F. Parkes and Lawrence Lasker received an Academy |
| Award nomination for their script which followed the adventures of a young high |
| school hacker (Matthew Broderick) whose computer made contact with the |
| mainframe computers at North American Air Defense Command (NORAD). |
|
|
| A critical and box office success, "WarGames" was the first major motion |
| picture to explore the emerging worlds of computer games, hacking, crashing and |
| data piracy. It soon found a legion of fans who had also discovered the vast |
| frontiers available through their personal computer. |
|
|
| Eight years later, Parkes and Lasker along with writer-director Phil Alden |
| Robinson ("Field of Dreams") have collaborated on "Sneakers," a Universal |
| Pictures release which follows a team of high-tech security experts into the |
| complex world of computer crime. The caper film, directed by Robinson, stars |
| Robert Redford, Dan Aykroyd, Ben Kingsley, River Phoenix, Sidney Poitier, David |
| Strathairn, James Earl Jones, and Mary McDonnell. |
|
|
| Parkes and Lasker first heard the term "sneakers" at a computer convention in |
| 1981 as a nickname for IBM's kid programmers. Months later, they met the |
| editor of a small computer magazine who had a very different definition of the |
| word. "Sneakers," their source explained, is a term that is synonymous with |
| "black hatters" and "tiger teams," or individuals who are hired to break into |
| places in order to test the security of the installation. |
|
|
| Teaming up with Robinson, the trio wrote the basic outline of a story about a |
| team of sneakers whose questionable pasts had brought them together. Robinson |
| then embarked on some extensive research, but what had begun as basic fact- |
| finding about computer outlaws soon evolved into clandestine meetings with |
| underground hackers, FBI men, cryptologists, wire tappers, professional |
| penetrators and an endless stream of cyberpunks who were the pioneers in system |
| break-ins. |
|
|
| The "Sneakers" research led to meetings with numerous characters, ranging from |
| the notorious Captain Crunch (John Draper) to renowned mathematician Leonard |
| Adelman, called the father of public-key encryption. Using computer |
| encryption as a plot device, the writers were able to concoct an intricate |
| "what if" story which explored the possibility of a "black box" that could |
| potentially crack the code of any electronic information in the world. |
|
|
| "'Sneakers' has to do with a new age... the information age," said Redford. |
| "It's quite possible that a war in the future will be a war of information. |
| Whoever has it, wins." |
|
|
| Coming to theaters this September. |
| _______________________________________________________________________________ |
|
|
| Pirates v. AT&T: Posters |
| ~~~~~~~~~~~~~~~~~~~~~~~~ |
| Special thanks to Legacy Irreverent and Captain Picard |
|
|
| On May 24 1992, two lone pirates, Legacy (of CyberPunk System) and Captain |
| Picard (of Holodeck) had finally had enough of AT&T. Together, they traveled |
| to the AT&T Maintenance Facility (just west of Goddard, Kansas) and claimed the |
| property in the name of pirates and hackers everywhere. |
|
|
| They hoisted the Jolly Roger skull and crossbones high on the AT&T flagpole, |
| where it stayed for two days until it was taken down by security. |
|
|
| This event was photographed and videotaped by EGATOBAS Productions, to preserve |
| this landmark in history. And now you can witness the event. For a limited |
| time they are offering full color posters and t-shirts of the Jolly Roger |
| Pirate flag flying high over AT&T, with the AT&T logo in plain view, with the |
| caption; "WE CAME, WE SAW, WE CONQUERED." |
|
|
| Prices: 11" x 17" Full Color poster........................... $ 7.00 US |
| 20" x 30" Full Color poster $20.00 US |
| T-shirts $20.00 US |
|
|
| If you are interested in purchasing, simply send check or money order for the |
| amount, plus $1.00 US for postage and handling to: |
|
|
| CyberPunk System |
| P.O. Box 771027 |
| Wichita, KS 67277-1072 |
|
|
| Be sure to specify size on T-shirt. |
|
|
| A GIF of this is also available from CyberPunk System, 1:291/19, 23:316/0, |
| 72:708/316, 69:2316/0. FREQ magicname PIRATE |
| _______________________________________________________________________________ |
|
|
| Telco Trashing Yields Big Rewards July 20, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Anonymous |
|
|
| A few days ago, I was faced with a decision about what to do that fine evening: |
| Try and make amends with my girlfriend or go dumpster diving down at the Bell |
| Central Office. Well I guess I am a true lamer since I opted for the telco, |
| but my choice did not go unrewarded as I found a nice little treasure. |
|
|
| The building is a old 1940's brick place with almost no security whatsoever, |
| not even a guard on Sunday nights. So, it was no problem to jump the barbed |
| wire fence that surrounded the truck lot where the dumpster was located. After |
| rooting around through the dumpster for something worth my while, I came across |
| a medium sized box that apparently had been used by one of the employees for |
| moving since written on the were the words "pots and pans, kitchen." |
|
|
| Naturally intrigued by this strange box in a telco dumpster, I opened it and |
| found quite a surprise! There, staring up at me, was a binder with a label |
| stuck on it that read "Phrack 23." Inside I found the entire collection of |
| Phrack 1-39, Informatik 1-4, and LOD/H Technical Journals 1 and 2 (apparently |
| they were too cheap to print out the rest). They were poorly printed on a |
| laser printer (or well printed on a ink jet), but they were much better than |
| the cheesy job I had done printing out mine. :-) |
|
|
| Apparently someone at the telco is a phreaker that infiltrated the ranks of |
| South Central Bell or they have been reading up on the latest and greatest in |
| the phreaker/hacker community. |
|
|
| Perhaps not as valuable as a list of COSMOS passwords or dialups, but still it |
| was quite a find. |
| _______________________________________________________________________________ |
|
|
| Anonymous Mail On IBM VM Systems? |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Date: Tue, 28 Apr 92 14:54:58 EST |
| From: Apollo |
| Subject: Anonymous Mail |
| To: Phrack Staff |
|
|
| Dear Phrack Staff, |
| I was reading a past Phrack issue and noticed that you can send anonymous |
| mail from a UNIX system. I know that there is a way to send it from a VM |
| system. However, the people at my node don't want anonymous mail sent, so they |
| do not tell us how it's done. Can someone PLEASE tell me how I can send |
| anonymous mail via a VM system? |
|
|
| -- Apollo -- |
|
|
| From: Mind Mage |
| Subject: Anonymous Mail |
| To: Apollo |
|
|
| I assume that you know you can telnet to any VM system on the Internet and send |
| anonymous mail using port 25 and a commands that are very similar to that of |
| the UNIX SMTP. |
|
|
| If you want to send it from your particular system, you can try telneting to |
| port 25 of your own machine and doing it from there. |
|
|
| Mind Mage |
| _______________________________________________________________________________ |
|
|
| WWIV Link Hack |
| ~~~~~~~~~~~~~~ |
| By Mr. Bigg (Rebel-*-Jedi) |
|
|
| Not that many people care but here is a nice little trick I happened to come |
| across and feel like sharing. |
|
|
| Hack for WWIV Systems Using Multi-Net v1.0 Mod |
| Usually used for LinkNet |
|
|
| Main Login: @-!NETWORK!-@ |
| Link Login: 1 (or whoever is sysop) |
| //edit config.dat |
| find system password in file |
| abort editing |
| //dos |
| enter system password |
|
|
|
|
| Viola, access to Dos :) |
|
|
| Lamely enough there is no password. Check for users when using this mod. |
| _______________________________________________________________________________ |
|
|
| The Day Bell System Died |
| ~~~~~~~~~~~~~~~~~~~~~~~~ |
| Sung to the tune of American Pie (with apologies to Don McLean) |
|
|
| Long, long, time ago, |
| I can still remember, |
| When the local calls were "free". |
| And I knew if I paid my bill, |
| And never wished them any ill, |
| That the phone company would let me be... |
|
|
| But Uncle Sam said he knew better, |
| Split 'em up, for all and ever! |
| We'll foster competition: |
| It's good capital-ism! |
|
|
| I can't remember if I cried, |
| When my phone bill first tripled in size. |
| But something touched me deep inside, |
| The day... Bell System... died. |
|
|
| And we were singing... |
|
|
| Bye, bye, Ma Bell, why did you die? |
| We get static from Sprint and echo from MCI, |
| "Our local calls have us in hock!" we all cry. |
| Oh Ma Bell why did you have to die? |
| Ma Bell why did you have to die? |
|
|
| Is your office Step by Step, |
| Or have you gotten some Crossbar yet? |
| Everybody used to ask... |
| Oh, is TSPS coming soon? |
| IDDD will be a boon! |
| And, I hope to get a Touch-Tone phone, real soon... |
|
|
| The color phones are really neat, |
| And direct dialing can't be beat! |
| My area code is "low": |
| The prestige way to go! |
|
|
| Oh, they just raised phone booths to a dime! |
| Well, I suppose it's about time. |
| I remember how the payphones chimed, |
| The day... Bell System... died. |
|
|
| And we were singing... |
|
|
| Bye, bye, Ma Bell, why did you die? |
| We get static from Sprint and echo from MCI, |
| "Our local calls have us in hock!" we all cry. |
| Oh Ma Bell why did you have to die? |
| Ma Bell why did you have to die? |
|
|
| Back then we were all at one rate, |
| Phone installs didn't cause debate, |
| About who'd put which wire where... |
| Installers came right out to you, |
| No "phone stores" with their ballyhoo, |
| And 411 was free, seemed very fair! |
|
|
| But FCC wanted it seems, |
| To let others skim long-distance creams, |
| No matter 'bout the locals, |
| They're mostly all just yokels! |
|
|
| And so one day it came to pass, |
| That the great Bell System did collapse, |
| In rubble now, we all do mass, |
| The day... Bell System... died. |
|
|
| So bye, bye, Ma Bell, why did you die? |
| We get static from Sprint and echo from MCI, |
| "Our local calls have us in hock!" we all cry. |
| Oh Ma Bell why did you have to die? |
| Ma Bell why did you have to die? |
|
|
| I drove on out to Murray Hill, |
| To see Bell Labs, some time to kill, |
| But the sign there said the Labs were gone. |
| I went back to my old CO, |
| Where I'd had my phone lines, years ago, |
| But it was empty, dark, and ever so forlorn... |
|
|
| No relays pulsed, |
| No data crooned, |
| No MF tones did play their tunes, |
| There wasn't a word spoken, |
| All carrier paths were broken... |
|
|
| And so that's how it all occurred, |
| Microwave horns just nests for birds, |
| Everything became so absurd, |
| The day... Bell System... died. |
|
|
| So bye, bye, Ma Bell, why did you die? |
| We get static from Sprint and echo from MCI, |
| "Our local calls have us in hock!" we all cry. |
| Oh Ma Bell why did you have to die? |
| Ma Bell why did you have to die? |
|
|
| We were singing: |
|
|
| Bye, bye, Ma Bell, why did you die? |
| We get static from Sprint and echo from MCI, |
| "Our local calls have us in hock!" we all cry. |
| Oh Ma Bell why did you have to die? |
| _______________________________________________________________________________ |
|
|
| The 1992 Consumer Electronics Show |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Sarlo |
|
|
| The Consumer Electronic Show is the annual event held in Chicago, Illinois, |
| that gives a sneak peek at the electronic products to come to market, as well |
| as products that are currently on the market. |
|
|
| The show is usually closed to the public. This year however, for a MEASLY $10 |
| fee, the common shmoe can waltz his ignorant ass right up to the door, get a |
| green stamp on his hand, and walk up to several displays, oohing and ahhhing, |
| and gape like landed fish at the wonderous booths set up by various |
| participating companies such as AT&T, most major bell companies, IBM, Prodigy, |
| dozens of cellular manufacturers, Nintendo, Sega, and more software producers |
| than I really have the patience to list. |
|
|
| I take a taxi to the McCormick center, a convention haven, and enter through |
| the underground entrance. I walk down the nondescript hallway, noting that for |
| a center that is supposed to be housing the latest in the future technology, |
| nothing was that awe-inspiring. Expecting a lame show with shoddy video |
| graphics, I purchased my ticket, got my hand stamped and entered the doors. |
|
|
| Into an enormous room, filling my senses with an array of Lights and Sound. |
| You could almost smell the silicon as I made my way down the aisle displaying |
| the giant Phillips Digital Compact Cassettes screen. Not being a huge fan of |
| stereo equipment, I head over to the Sharp Electronics Display. It was a turn |
| in the right direction, as it brought me face to face with one of the clearest |
| and, per the name, sharpest video displays I have seen in my life. Their LCD |
| big-screen televisions, displaying a aquarium scene. Even close up, distortion |
| of the images were at a minimum. Along the north wall, a smaller, gutted |
| version of the LCD display was shown, giving electronics buffs a firsthand look |
| at the inner workings of the viewscreens. Turning a corner, I came face to |
| face with their dual-projection wallscreen television. Instead of ghost images |
| and a fuzzy, indistinct picture, I found that it may have very well be the |
| highest quality video projection system I have ever come in contact with. |
|
|
| Cellular Mania |
| ~~~~~~~~~~~~~~ |
| The highlight of the Cellular Phone section was the Motorola Cordless/Cellular |
| display area with a large sign showing the spokesperson for Motorola, the eye- |
| catching slogan above him: |
|
|
| "Cordless Phone Eavesdroppers Are Everywhere." |
|
|
| Immediately catching my interest, I wandered over to check out the smaller |
| print: |
|
|
| "But with my Motorola Secure Clear (tm) Cordless Phone, my private |
| conversations stay private." |
|
|
| Secure Clear, as the literature explains it, is an exclusive technology that |
| assures you that no eavesdroppers will be able to use another cordless phone, |
| scanner or baby monitor to listen to your cordless conversations. |
|
|
| As most of us know, security codes and multi-channels don't always prevent |
| eavesdropping. With the latest technology these days, security codes, one of |
| 65,000 possible codes that are randomly assigned every time you set the handset |
| into the base, keeps someone from using your phone base as an outgoing |
| phoneline. |
|
|
| Using the Auto Channel Scan (ACS), the Secure Clear Cordless Phones |
| automatically skip any channels that register noise or interference. Three |
| guesses what Sarlo is getting himself for Christmas. |
|
|
| For more information on this or any other Motorola product, call their Consumer |
| Products Division at (800)331-6456. |
|
|
| On other notes, Technophone had a wide variety of cellular accessories, |
| including a Desk stand, spare batteries, an in-car charger, a new life of |
| antennae, QuickCharge AC chargers, and a hands-free unit for safe operation in |
| a car. |
|
|
| Omni Cellular had one of their Model "A" V833k Portable Hand-Helds open for a |
| demonstration, giving a static-free conversation with one of the salesmen. |
| Many of the features of this phone were: |
|
|
| o 90 Minutes of Talk Time |
| o 10 hours of Stand-by Time. |
| o and a sturdy design built right here in the USA. |
|
|
| Other features included Auto-Power Shutoff, Electronic Lock, 50 number memory, |
| and signal strength indicator. |
|
|
|
|
| East Building Hipster Hi-Jinx |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Growing bored, I headed over to the map. Searching it, I found, almost |
| literally, my green light. On their illuminated map display, the green section |
| of the map beamed out to me. |
|
|
| "Computers" |
|
|
| Hauling ass to the door, stopping for a quick inspection of my bags by the |
| security guard, I strolled over to the east building (purchasing a way-keen |
| CES-92 T-Shirt along the way), I burst into the building with a renewed vigor. |
|
|
| Right smack-dab in the front of the entrance there is the awful stench of men |
| in business suits and cheap computer services. Right away, I knew I had found |
| the Prodigy display. |
|
|
| With free trials and the salesmen prodding the consumers to subscribe to their |
| system, I decided to take a look. |
|
|
| "Where else can you get such a great service, allowing you access to such a |
| wide variety of things such as an online message service, up-to-date news, an |
| online encyclopedia, and thousands of interesting users, people just like |
| yourselves?" The Online-Conman peddled his wares to the unsuspecting |
| consumers, not only misinforming them as to think that Prodigy is a useful |
| service at all, but to actually have the gall to shove a PS/1 in their faces |
| and tell them it's a quality computer. |
|
|
| "Umm... what about any Public Access Unix Site with an Internet or Usenet |
| feed," I asked. The clod then got on his high-horse and addressed me. |
|
|
| "Perhaps. But most Public Unix's, or bulletin boards, for that matter don't |
| have high-quality graphics to accompany the information." The man had |
| definitely done his homework. But apparently IBM and Sears soaped the man's |
| brains out thoroughly enough to the point where he actually bought the bull |
| that they were forcing down peoples throats. |
|
|
| "Yea," I said. "But most public access sites don't waste a quarter of your |
| screen space with worthless advertisements. I wasn't aware that pretty |
| pictures made the news or messages any more informative, either. But I might |
| also point out that they don't charge you a extra amount of money for every |
| message over the 30th one, read your mail or censor your public posts, or, many |
| times, even charge you a fee at all, other than possibly an optional |
| subscription fee, around $50 a YEAR at most, nor do they have small datafiles |
| that collects information from the fat table from the subscribers." As I was |
| speaking, the salesman was trying to interrupt me, finally succeeding at this |
| point. |
|
|
| "Well, I can see you have a lot of questions," the salesman evades rather well. |
| "So I'm sure this gentleman over here will be glad to answer any of your |
| questions, while I can take this lady's question...Yes?" |
|
|
| I was approached by another salesman who asked me what questions I needed |
| answered. I said none, seeing as I didn't have much interest in his system |
| anyhow, and that I was just seeing how good the Prodigy salespeople worked |
| under pressure. He said he would be glad to answer any questions I had, but if |
| I were only there to harass people, to please take it elsewhere. |
|
|
| Then it was off to the various other setups. Magazines were on display and |
| free for the taking here, including Mobile Office, Various Nintendo/Game System |
| magazines, and Audio Equipment. Walking down one of the back isles, I heard a |
| bit of conversation that caught my ears. |
|
|
| Star Trek Straight To Your Home |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| "Computer. Recognize Picard, Jean-Luc. Kitchen Lights ON, Turn ON the VCR and |
| hit RECORD. Close the Curtains, and turn on the Extasy Channel. Prepare to |
| record "Chicks with Dicks." |
| - Jean Luc Picard |
| Stardate 1992.4, 2:45 A.M. |
|
|
| Such a Scenario is something you would think you could find only on Star Trek, |
| right? Wrong. With the Mastervoice, the "Ultimate in Home Automation", the |
| mastervoice is much like your own personal butler, telling the correct time, |
| activating and operating any device in your household, and even with it's own |
| alarm system. All of this, at the command of your voice. |
|
|
| Mastervoice can be designed to be used by up to four people, can be trained in |
| any language. It distinguishes who is speaking, obeys the commands, but also |
| speaks back to you -- in a HUMAN sounding voice. Male or Female. You can add |
| or delete voices from it's recognition systems, you can also create new |
| response words as well. |
|
|
| Featuring control over lights, stereo, TV, coffee maker, heating and cooling |
| systems. It also has a Household Noise Override that allows you to have stupid |
| children racing around your home in an obnoxious manner without disturbing the |
| unit. |
|
|
| Plus, it is also a speakerphone/telephone with stored numbers. At the sound of |
| your voice, it will dial or answer incoming calls and allow you to carry on a |
| conversation without ever having to touch the system. It also interfaces with |
| your PC for memory storage or control operations. |
|
|
| Built in infrared sensor and intrusion detection systems are another highlight |
| of this demonstration. As it recognizes up to four voices, you can assign a |
| password for each voice, being anything from "I am home" to |
| "Supercalafragilisticexpialidoshes". If all fails, it can call the police for |
| you. Nutty as all hell. |
|
|
| Mastervoice operates thru carrier current modules. This model, as one of the |
| top of the line voice-recognition home-use systems, it is up there in the |
| $4,000 plus range, but seeing all the stuff it does, it's well worth the price. |
|
|
| Skipping the Game Module Section (Nintendo/Sega/TurboGraphix/etc) entirely, I |
| ran into an interesting palmtop known as the Psion Series 3, and their new |
| interlink software. Windows Compatable, the palmtop not only has communication |
| software for a link between your PC and Palmtop, but also will support standard |
| Hayes and Hayes compatible modems. Sporting a qwerty style keyboard and a |
| romcard port, 128k and a 40 column screen, the Series 3 may be limited, but |
| provides an acceptable amount of access to other online services. Though for |
| now, a Windows based software package is only available, at the time of this |
| writing, there will be DOS and UNIX compatible packages available to the public |
| in 5 to 6 months. |
|
|