| ==Phrack Inc.== |
|
|
| Volume Four, Issue Forty-One, File 13 of 13 |
|
|
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN PWN |
| PWN Phrack World News PWN |
| PWN PWN |
| PWN Issue 41 / Part 3 of 3 PWN |
| PWN PWN |
| PWN Compiled by Datastream Cowboy PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
|
|
| Boy, 15, Arrested After 911 Paralyzed By Computer Hacker October 7, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Caroline Mallan (The Toronto Star)(Page A22) |
|
|
| A 15-year-old boy has been arrested after a hacker pulling computer pranks |
| paralyzed Metro's emergency 911 service. |
|
|
| Police with Metro's major crime unit investigated the origin of countless calls |
| placed to the 911 service from mid-July through last month. |
|
|
| The calls were routed to emergency services in the Etobicoke area, said |
| Detective Willie Johnston, who led the investigation. |
|
|
| Phony medical emergency calls were reported and police, fire and ambulance |
| crews were dispatched on false alarms. On one occasion, the computer hacker |
| managed to tie up the entire 911 service in Metro -- making it unavailable for |
| true emergencies. |
|
|
| Police were not sure last night how long the system was shut down for but |
| Johnston said the period was considerable. |
|
|
| Staff Sergeant Mike Sale warned hackers that phony calls can be traced. |
|
|
| "A criminal abuse of the 911 emergency system will result in a criminal |
| investigation and will result in an arrest," Sale said, adding police had only |
| been investigating this hacker for a few weeks before they came up with a |
| suspect. |
|
|
| Bell Canada investigators helped police to trace the origin of the calls and |
| officers yesterday arrested a teen while he was in his Grade 11 class at a |
| North York high school. |
|
|
| Two computers were seized from the boy's home and will be sent to Ottawa to be |
| analyzed. |
|
|
| Johnston said police are concerned that other hackers may also be able to halt |
| the 911 service, since the computer technology used was fairly basic, although |
| the process of rerouting the calls from a home to the Etobicoke emergency lines |
| was very complex. |
|
|
| The calls went via computer modem through two separate phone systems in major |
| U.S. cities before being sent back to Canada, Johnston explained. |
|
|
| The suspect, who cannot be named under the Young Offenders Act, is charged with |
| theft of telecommunications, 24 counts of mischief and 10 counts of conveying |
| false messages. |
|
|
| He was released from custody and will appear in North York youth court November |
| 6, police said. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Police Say They've Got Hackers' Number October 8, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by John Deverell (The Toronto Star)(Page A8) |
|
|
| Hackers, take note. Metro police and Ma Bell are going to get you. |
|
|
| A young North York computer freak accused of launching 10 false medical alerts |
| to 911 this summer may have learned -- the hard way -- that his telephone |
| tricks weren't beating the pros. |
|
|
| Police arrived with a search warrant at the home of the 15-year-old, arrested |
| him and carted away his computer. |
|
|
| He's charged with 10 counts of conveying false messages, 24 counts of mischief, |
| and theft of telecommunications. |
|
|
| Inspector Bill Holdridge, of 911 emergency services, said the false alarms in |
| July and August never posed any technical problem to his switchboard but |
| resulted in wild goose chases for the police, fire and ambulance services. |
|
|
| "Those resources weren't available for real alarms, which could have been a |
| serious problem," Holdridge said. |
|
|
| The 911 service, quartered at 590 Jarvis Street, gets about 7,000 calls a day, |
| of which 30% warrant some kind of emergency response. |
|
|
| Normally, a computerized tracing system takes only seconds to provide the |
| address and number of the telephone from which a call originates -- unless the |
| point of origin has been somehow disguised. |
|
|
| Apparently the 911 prankster got into the telephone system illegally and routed |
| his calls through several U.S. networks before bringing them back to Toronto. |
|
|
| Detective Willie Johnston said the boy's parents were stunned when police |
| arrived. "They really didn't have a clue what was going on," said Johnston. |
|
|
| The false emergencies reported were nowhere near the accused boy's home. |
| "Without condoning it, you could understand it if he were sitting around the |
| corner watching the flashing lights," said Johnston. "But they were miles |
| away. It defies logic." |
|
|
| Neither Johnston nor Holdridge would explain how they and Bell security finally |
| traced the false alarms. "That might just make other hackers try to figure out |
| another way," Holdridge said. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Hackers Targeted 911 Systems, Police Say October 10, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| Taken from United Press International |
|
|
| Authorities expect to make more arrests after penetrating a loose network of |
| computer hackers called the "Legion of Doom" they say tapped into corporate |
| phone lines to call 911 systems nationwide with the intent of disrupting |
| emergency services. |
|
|
| Prosecutors from Virginia, New Jersey and Maryland -- in conjunction with |
| investigators from two telephone companies -- traced some of the hackers and |
| closed in on three homes in two states. |
|
|
| A 23-year-old Newark, New Jersey man was arrested early on October 9th. He |
| faces several charges, including fraud. Other arrests are expected in two |
| Maryland locations. |
|
|
| The suspect, known by several aliases and identified by authorities only as |
| Maverick, told investigators the group's intent was "to attempt to penetrate |
| the 911 computer systems and infect them with viruses to cause havoc," said |
| Captain James Bourque of the Chesterfield County police in Virginia. |
|
|
| The probe is just beginning, according to Bourque. "Quite honestly, I think |
| it's only the tip of the iceberg," he said. |
|
|
| The hackers first penetrate the phone lines of large companies or pay phones, |
| then use those connections to call 911 lines, Bourque said. The hackers |
| usually make conference calls to other 911 services in other cities, tying up |
| communications in several locations simultaneously. |
|
|
| "One time we were linked up with Toronto and Los Angeles jurisdictions," |
| Bourque said. "And none of us could disconnect." |
|
|
| Sometimes as many five hackers would be on the line and would make false calls |
| for help. Communications officers, unable to stop the calls, would have to |
| listen, then try to persuade the officers in other locales "that the call |
| wasn't real," Bourque said. |
|
|
| "Obviously, there's a real potential for disastrous consequences," he said. |
|
|
| One phone bill charged to a company in Minnesota indicated the scope of the |
| problem. The company discovered in a 30-day period that it had been charged |
| with more than $100,000 in phone calls generated by the hackers, according to |
| Bourque. |
|
|
| "I'm sure there are a multitude of other jurisdictions across the country |
| having the same problems," Bourque said. |
|
|
| People identifying themselves as members of the "Legion of Doom" -- which also |
| is the name of a pro wresting team -- have called a Richmond, Virginia |
| television station and ABC in New York in an attempt to get publicity, Bourque |
| said. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| More On 911 "Legion Of Doom" Hacking Case October 20, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Barbara E. McMullen & John F. McMullen (Newsbytes) |
|
|
| NEW YORK CITY -- In a discussion with Newsbytes, Sgt. Kurt Leonard of the |
| Chesterfield County, Virginia Police Department has disclosed further |
| information concerning the on-going investigation of alleged 911 disruption |
| throughout the eastern seaboard of the United States by individuals purporting |
| to be members of the hacker group "The Legion of Doom" (LOD). |
|
|
| Leonard identified the individual arrested in Newark, New Jersey, previously |
| referred to only as "Maverick," as Scott Maverick, 23. Maverick has been |
| charged with terroristic threats, obstruction of a government function, and |
| illegal access to a computer. He is presently out on bail. |
|
|
| Leonard said that David Pluchino, 22, was charged to the same counts as |
| Maverick and an additional count of the possession of burglary tools. Leonard |
| said that Pluchino, the subject of a 1990 Secret Service "search and seizure" |
| action under the still on-going "Operation SunDevil" investigation," possessed |
| information linking him with members of the Legion of Doom. |
|
|
| The Legion of Doom connection has become the subject of controversy within the |
| online community. Although Maverick has been quoted as saying that he is a |
| member of the group and that the group's intent was "to attempt to penetrate |
| the 911 computer systems and inflect them with viruses to cause havoc," members |
| of the group have disavowed any connection with those arrested. |
|
|
| "Lex Luthor," one of the original members of the group, told Newsbytes when the |
| initial report of the arrests became public: "As far as I am concerned the LOD |
| has been dead for a couple of years, never to be revived. Maverick was never |
| in LOD. There have been 2 lists of members (one in Phrack and another in the |
| LOD tj) and those lists are the final word on membership." |
|
|
| He added, "We obviously cannot prevent copy-cats from saying they are in LOD. |
| When there was an LOD, our goals were to explore and leave systems as we found |
| them. The goals were to expose security flaws so they could be fixed before |
| REAL criminals and vandals such as this Maverick character could do damage. If |
| this Maverick character did indeed disrupt E911 service he should be not only |
| be charged with computer trespassing but also attempted murder. 911 is serious |
| business." |
|
|
| Lex Luthor's comments, made before the names of the arrested were released, |
| were echoed by Chris Goggans, aka "Erik Bloodaxe," and Mark Abene, aka "Phiber |
| Optik," both ex-LOD members, and by Craig Neidorf who chronicled the membership |
| of LOD in his electronic publication "Phrack." |
|
|
| When the names of the arrested became public, Newsbytes again contacted Lex |
| Luthor to see if the names were familiar. Luthor replied: "Can't add anything, |
| I never heard of them." |
|
|
| Phiber Optik, a New York resident, told Newsbytes that he remembered Pluchino |
| as a person that ran a computer "chat" system called "Interchat" based in New |
| Jersey. "They never were LOD members and Pluchino was not known as a computer |
| hacker. It sounds as though they were LOD wanabees who are now, by going to |
| jail, going to get the attention they desire," he said. |
|
|
| A law enforcement official, familiar with the SunDevil investigation of |
| Pluchino, agreed with Phiber, saying, "There was no indication of any |
| connection with the Legion of Doom." The official, speaking under the |
| condition of anonymity, also told Newsbytes that the SunDevil investigation of |
| Pluchino is still proceeding and, as such, no comment can be made. |
|
|
| Leonard also told Newsbytes that the investigation has been a joint effort of |
| New Jersey, Maryland, and Virginia police departments and said that, in |
| conjunction with the October 9th 2:00 AM arrests of Pluchino and Maverick, a |
| simultaneous "search and seizure" operation was carried out at the Hanover, |
| Maryland home of Zohar Shif, aka "Zeke," a 23 year-old who had also been the |
| subject of a SunDevil search and seizure. |
|
|
| Leonard also said that, in addition to computers taken from Pluchino, material |
| was found "establishing a link to the Legion of Doom." Told of the comments by |
| LOD members that the group did not exist anymore, Leonard said "While the |
| original members may have gone on to other things, these people say they are |
| the LOD and some of them have direct connection to LOD members and have LOD |
| materials." |
|
|
| Asked by Newsbytes to comment on Leonard's comments, Phiber Optik said "The |
| material he's referring to is probably text files that have been floating |
| around BBS's for years, Just because someone has downloaded the files certainly |
| doesn't mean that they are or ever were connected with LOD." |
| _______________________________________________________________________________ |
|
|
| Complaints On Toll Fraud Aired at FCC En Banc Hearing October 13, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Art Brodsky (Communications Daily)(Page 1) |
|
|
| Customers of PBX manufacturers told the Federal Communications Commission (FCC) |
| they shouldn't be liable for toll fraud losses incurred because vendors never |
| told them of capabilities of their equipment that left companies open to |
| electronic theft. Their case was buttressed by one of country's leading toll- |
| fraud investigators, who told day-long en banc hearing that customers shouldn't |
| have to pay if they're victimized. Donald Delaney of the New York State Police |
| said toll fraud "is the only crime I know where the victims are held liable." |
| Toll fraud losses have been estimated to run into billions of dollars. |
|
|
| Commission's look at toll fraud came in context of what FCC can do to prevent |
| or lessen problem. Comr. Marshall said Commission's job would be to apportion |
| liability between vendors and customers. Comr. Duggan, who has been leader on |
| issue at Commission, said toll fraud was "hidden degenerative disease on the |
| body of business." He focused on insurance solution to problem, along with |
| sharing of liability. There are cases pending at FCC filed by AT&T customers |
| that deal with sharing of liability, and whether common carriers are protected |
| by tariffs from paying customers for losses. Witnesses told Commission it was |
| hard to find any law enforcement agency interested in problem, from local |
| police to FBI, in addition to difficulties with vendors. U.S. Secret Service |
| has statutory responsibility over toll fraud, said attorney William Cook, who |
| testified in afternoon session. There was general agreement that more customer |
| education was needed to prevent fraud, policy endorsed by Northern Telecom, |
| which has active customer education program. |
|
|
| AT&T came in for particular criticism in morning session as users said company |
| was insensitive to toll fraud problems. Thomas Mara, executive vice-president |
| Leucadia National Corp., whose company suffered $300,000 in toll fraud, said he |
| "had a hell of a time getting anybody at AT&T to pay attention" to problems his |
| company was encountering. Mara said his company saw level of 800 calls rise to |
| 10,448 from 100. He said AT&T was supposed to notify users if there was any |
| "dramatic increase in volume, yet we were not notified of a thousandfold |
| increase in 800 number usage nor were we informed of an increase from a few |
| hours a month in international calls to thousands of hours by AT&T, only after |
| receiving our bills." Investigation found that 800 number connecting Rolm |
| switch to company's voice mail was hackers' entry method, Mara said. |
|
|
| Clearly angry with AT&T, Mara said he has "a feeling they use it as a profit |
| center." Lawrence Gessini, telecommunications director for Agway Corp. of |
| Syracuse, agreed, saying: "Toll fraud should not become a rationale for higher |
| profits for carriers." He told FCC that new programs introduced by long |
| distance carriers won't solve problem because of constraints, limitations and |
| expense. |
|
|
| Speaking for International Communications Association (ICA) user group, Gessini |
| said problems occur because new technologies allow more types of fraud and |
| because "old tariff concepts" that limit common carrier liability "distort |
| market incentives." Vendors, he said, are "generally lackadaisical and are |
| slow to correct even known problems in their hardware, firmware and software," |
| and give low priority to complaints. ICA advocated 5 principles including FCC |
| inquiry into fraud, creation of advisory committee and willingness of |
| Commission to protect users. |
|
|
| Geoffrey Williams, industry consultant and telecommunications manager for |
| IOMEGA Corp., said AT&T has been "most notable" for asking for restitution, |
| while Sprint and MCI are more lenient. MCI doesn't charge users for first |
| hacking incident, he said, but after that users are on their own. |
|
|
| AT&T defended itself in afternoon session, when International Collections Dist. |
| Manager Peter Coulter rejected users' accusations, saying company had increased |
| customer education program "dramatically" since last year. He insisted that |
| AT&T is "very concerned" by toll fraud: "Contrary to what some people want to |
| believe, no long distance carrier is making a profit off toll fraud." He said |
| AT&T had 6,000 customers attend equipment security seminars in 1991, but that |
| number had been exceeded in first 6 months of 1992. He said results of |
| increased education program were "only preliminary" but his group was receiving |
| "a lot more accommodations" than complaints from customers. |
|
|
| Coulter, while never admitting that company should shoulder any financial |
| liability, admitted that "things are different now" as to how AT&T approaches |
| toll fraud problem. He said that within AT&T it used to be hardware division |
| vs. service division. "The hardware guys said it was a service problem, the |
| service guys said it was the hardware's fault," Coulter said. But now both |
| divisions are "working together on the problem . . . we're talking to each |
| other." |
|
|
| Delaney of N.Y. state police gave the FCC a picture of the toll fraud situation |
| dominated by as few as 15 practitioners, most of whom gain illegal entry to |
| telephone systems simply by dialing numbers for hours on end. Those so-called |
| "finger hackers," rather than computer hackers, are responsible for 90% of |
| fraud, he said, telling Commission that equipment vendors should be held |
| accountable for fraud. Most fraudulent calls go to Pakistan, Colombia and |
| Dominican Republic, he said. |
|
|
| Delaney pointed out practical objection to further vendor education problem, |
| telling commissioners that for vendor to engage in education would also be to |
| admit there could be problem with equipment security, something sales people |
| don't want to do. He said some customers had been sold systems and didn't know |
| they had capability for remote access -- means used by hackers to gain entry. |
| _______________________________________________________________________________ |
|
|
| Hanging Up On Hackers October 12, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~ |
| by Miriam Leuchter (Crain's New York Business)(Page 21) |
|
|
| "Thieves tap phone systems, but business cuts the line." |
|
|
| Ron Hanley suspected a technical glitch when his company's telephone bill |
| listed an unusually large number of calls lasting four seconds to its 800- |
| number from New York City. But the executive at Dataproducts New England in |
| Wallingford, Connecticut didn't lose sleep over the problem -- until he got a |
| call two months later from the security department at American Telephone & |
| Telegraph Co. |
|
|
| Dataproducts had been hacked. Two days after that, Mr. Hanley got a bill |
| confirming the bad news: In one 24-hour period, street-corner phone users in |
| New York had made some 2,000 calls to the Caribbean on the company's line, |
| ringing up about $50,000 in tolls. |
|
|
| Dataproducts is not alone. Estimates of the cost of telecommunications fraud |
| in the United States each year run from $1 billion to as much as $9 billion. |
| According to John J. Haugh, editor of Toll Fraud and Telabuse and chairman of a |
| Portland, Oregon consulting firm, losses reached $4 billion in 1991 and are |
| expected to climb 30% in 1992. |
|
|
| Some 35,000 businesses and other users -- such as foundations and government |
| agencies -- will be hit this year. In the first six months, Mr. Haugh says, |
| more than 900 New York City companies were victims of telephone-related fraud. |
|
|
| "If you have a PBX system or calling cards or voice mail, you are vulnerable, |
| exceedingly vulnerable," says Peggy Snyder, executive director of the |
| Communications Fraud Control Association, a national information clearinghouse |
| based in Washington. "As technology gets more user-friendly, the opportunity |
| to commit a crime is much greater." |
|
|
| Armed with computers, modems and sometimes automatic dialers or random-number |
| generating software, high-technology thieves can use your telephone system as |
| if it is their own -- without having to pay the tolls. The series of very |
| short calls Mr. Hanley spotted on one phone bill should have tipped off his |
| 800-number service provider -- which he had alerted when he spotted the pattern |
| -- that hackers were trying to break into his system. |
|
|
| Who are these hackers -- a term used to describe someone who uses a telephone |
| or computer to obtain unauthorized access to other computers? Many are |
| teenagers or young adults out to demonstrate their computer skills and make |
| some mischief. Five young New Yorkers are awaiting trial in federal court on |
| unauthorized access and interception of electronic communications charges in |
| one widely publicized telephone fraud case. |
|
|
| A much smaller proportion are more serious criminals: drug dealers, money |
| launderers and the like, who don't want their calls traced. In one case, Ms. |
| Snyder cites a prostitution ring that employed unused voice mail extensions at |
| one company to leave and receive messages from clients. |
|
|
| Many hackers have connections to call-sell operators who set up shop at phone |
| booths, primarily in poorer immigrant neighborhoods in cities from New York to |
| Los Angeles. For a flat fee -- the going rate is $10, according to one source |
| -- callers can phone anywhere in the world and talk as long as they want. The |
| hawker at the phone booth pockets the cash and someone else pays the bill. |
|
|
| Perhaps 15 to 20 so-called finger hackers (who crack authorization codes by |
| hand dialing) distribute information to call-sell operators at thousands of |
| locations in New York. According to Don Delaney, a senior investigator for the |
| New York State Police, the bulk of such calls from phone booths in the city go |
| to the Dominican Republic, Pakistan and Colombia. |
|
|
| Hackers may use more than technical skill to gain the access they want. |
| Sometimes they practice "social engineering" -- talking a company's employees |
| into divulging information about the telephone system. Or they manage a |
| credible imitation of an employee, pretending to be an employee. |
|
|
| In one of the latest schemes, a fraudulent caller gets into a company's system |
| and asks the switchboard operator to connect him with an outside operator. The |
| switchboard assumes the caller is an employee who wants to make a personal call |
| on his own calling card. |
|
|
| Instead, he uses a stolen or hacked calling card number. The fraud goes |
| undetected until the card's owner reports the unauthorized use to his long- |
| distance carrier. If the cardholder refuses to pay the charges, the phone |
| company traces the calls to the business from which they were placed. Because |
| it looks as if the call came from the company, it is often held liable for the |
| charge. |
|
|
| In another new twist, a hacker gains access to an unused voice mail extension |
| at a company, or takes over someone's line at night or while the regular user |
| is on vacation. He changes the recorded announcement to say, "Operator, this |
| number will accept all collect and third-party calls." Then the hacker -- or |
| anyone else -- can telephone anywhere in the world and bill the charges to that |
| extension. |
|
|
| Sometimes the fraud is much more organized and sophisticated, however. Robert |
| Rasor, special agent in charge of the financial crime division of the U.S. |
| Secret Service, gives an example of a three-way calling scheme in which hackers |
| tap into a phone system in the United States and set up a separate network that |
| allows people in other countries to call each other directly. "The |
| Palestinians are one of the more prominent groups" running these sorts of |
| fraud, he says. |
|
|
| But no matter who the end user is, businesses like Dataproducts end up footing |
| the bill. Personal users are generally not held liable for the unauthorized |
| use of their calling card numbers. Under current regulation, a business is |
| responsible for all calls that go through its equipment, whether or not those |
| calls originated at the company. |
|
|
| This hard fact rankles Mr. Hanley. "It's totally frustrating and almost |
| unbelievable that you're responsible for this bill. It's really frightening |
| for any company." |
|
|
| Dataproducts's liability was relatively small compared with the $168,000 |
| average Mr. Haugh calculated in a study he made last year. It could have been |
| worse yet. |
|
|
| "The largest case I've ever seen in the metropolitan region was a company that |
| lost almost $1 million within 30 days," says Alan Brill, managing director of |
| the New York corporate security firm Kroll Associates Inc. |
|
|
| "It was a double whammy, because even though their long-distance carrier saw a |
| suspicious pattern of calls and blocked access to those area codes, the company |
| didn't know its PBX system would automatically switch to another carrier if |
| calls couldn't go through," Mr. Brill says. "So the company got a bill for |
| $300,000 from its primary carrier and a $600,000 bill from the secondary |
| carrier." |
|
|
| Both AT&T and Sprint Corp. offer service plans that limit liability to $25,000 |
| per fraud episode for their business customers. Mr. Brill advises companies to |
| evaluate the cost-effectiveness of these plans in great detail, because in |
| order to be eligible for coverage companies must take certain steps to minimize |
| their risk. "If you reduce your risk significantly, you may not need the |
| coverage," he says. |
|
|
| The plans require customers to respond to a problem in as little as two hours |
| after notification of unauthorized calls. Doing so will stem your losses in |
| any event. "You also have to think about how you're staffed," adds Mr. Brill. |
| "Can you act that fast?" |
| _______________________________________________________________________________ |
|
|
| PWN Quicknotes |
| ~~~~~~~~~~~~~~ |
|
|
| 1. HACKER PARTY BUSTED (by Robert Burg, Gannett, 11/3/92) -- "PumpCon Popped!" |
| -- WHITE PLAINS, New York -- Police say a Halloween party they broke up |
| Sunday (11/1/92) was more than just a rowdy party - it also was a computer |
| hacker party. |
|
|
| Three men were charged with unauthorized use of a computer and attempting |
| computer trespass. A fourth man was arrested on an outstanding warrant |
| involving violating probation on a charge of computer fraud in Arizona, |
| Greenburgh Detective Lt. Cornelius Sullivan said. |
|
|
| Security officers at the Westchester Marriott contacted police after |
| noticing an unusual number of people entering and leaving one room. Police |
| said that when they arrived, there were 21 people inside and computers |
| hooked up to telephone lines. Police said they also found telephone credit |
| cards that did not belong to any of the people present. |
|
|
| The three charged with unauthorized use of a computer and attempted |
| computer trespass were Randy Sigman, 40, of Newington, Connecticut; Ronald |
| G. Pinz, 21, of Wallingford, Connecticut and Byron Woodard, 18, of |
| Woonsocket, Rhode Island. |
|
|
| They were being held at the Westchester County Jail in Valhalla pending |
| arraignment. |
|
|
| The man charged on the warrant, Jason Brittain, 22, of Tucson, Arizona, was |
| being held without bail pending arraignment. |
|
|
| The Westchester County District Attorney frauds division seized the |
| computer hardware, software, and other electrical equipment. |
|
|
| Sullivan said the party-goers heard about the party through computer |
| bulletin boards. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| 2. COMPUTER ACCESS ARRESTS IN NEW YORK (Barbara E. McMullen & John F. |
| McMullen, Newsbytes, 11/3/92) -- GREENBURGH, NEW YORK -- The Greenburgh, |
| New York Police Department has announced the arrest of three individuals, |
| Randy P. Sigman, 40; Ronald G. Pinz, Jr, 21; and Byron J. Woodard, 18 for |
| the alleged crimes of Unauthorized Use Of A Computer and Attempted Computer |
| Trespass, both misdemeanors. Also arrested was Jason A. Brittain, 22 in |
| satisfaction of a State of Arizona Fugitive From Justice warrant. |
|
|
| The arrests took place in the midst of an "OctoberCon" or "PumpCon" party |
| billed as a "hacker get-together" at the Marriott Courtyard Hotel in |
| Greenburgh. The arrests were made at approximately 4:00 AM on Sunday |
| morning, November 1st. The three defendants arrested for computer crimes |
| were granted $1,000 bail and will be arraigned on Friday, November 6th. |
|
|
| Newsbytes sources said that the get together, which had attracted up to |
| sixty people, had dwindled to approximately twenty-five when, at 10:00 |
| Saturday night, the police, in response to noise complaints arrived and |
| allegedly found computers in use accessing systems over telephone lines. |
| The police held the twenty-five for questioning and called in Westchester |
| County Assistant District Attorney Kenneth Citarella, a prosecutor versed |
| in computer crime, for assistance. During the questioning period, the |
| information on Brittain as a fugitive from Arizona was obtained and at 4:00 |
| the three alleged criminal trespassers and Brittain were charged. |
|
|
| Both Lt. DeCarlo of the Greenburgh police and Citarella told Newsbytes |
| that the investigation is continuing and that no further information is |
| available at this time. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| 3. U.S. PRISON SENTENCE FOR COMPUTER HACKER (New York Law Journal, 10/15/92, |
| Page 7) -- A Brooklyn man was sentenced yesterday to eight months in prison |
| for buying passwords from a computer hacker group known as the "masters of |
| deception" [MOD] for resale to others seeking access to confidential credit |
| reports. |
|
|
| Morton Rosenfeld, 21, received the sentence in federal court in Manhattan |
| after pleading guilty in June to obtaining the unauthorized access devices |
| to computer data bases operated by TRW Information Services and other |
| credit reporting companies. |
|
|
| The sentence, imposed by Southern District Judge Shirley Wohl Kram, is |
| believed to be among few prison terms levied for computer-related offenses. |
|
|
| Meanwhile, charges are pending against Mr. Rosenfeld's alleged source: the |
| five members of the masters of deception, young men in their teens and |
| 20's. The five were accused in July of breaking into computer systems run |
| by credit reporting services, telephone companies and educational |
| institutions. |
|
|
| For more information about the indictment and case against MOD, see ALL the |
| articles in PWN 40-2. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| 4. 2ND ONLINE LEGAL GUIDE RELEASED (by Barbara E. McMullen & John F. McMullen, |
| Newsbytes, 10/13/92) -- NEW YORK CITY -- PC Information Group has announced |
| the release of SysLaw, Second Edition: The Legal Guide for Online Service |
| Providers by attorneys Lance Rose and Jonathan Wallace. |
|
|
| According to the company, "Syslaw provides BBS sysops, network moderators |
| and other online service providers with basic information on their rights |
| and responsibilities, in a form that non-lawyers can easily understand." |
|
|
| Subjects covered by the book include the First Amendment, copyrights and |
| trademarks, the user agreement, negligence, privacy, criminal law, searches |
| and seizures, viruses and adult materials. The company claims that SysLaw |
| not only explains the laws, but that it gives detailed advice enabling |
| system operators to create the desired balance of user services, freedom, |
| and protection from risk on their systems." |
|
|
| Co-author Lance Rose told Newsbytes: "In the four years since the |
| publication of the first edition, the electronic community has become |
| alerted to the first amendment dimensions of the on-line community." |
|
|
| "The first amendment has profound implications to the on-line community |
| both to liberate providers and users of on-line systems and to protect them |
| from undue legal harassment. There has, in the last few years, been a lot |
| of law enforcement activity effecting bulletin board systems, including the |
| Steve Jackson and Craig Neidorf/Phrack cases," he said. |
|
|
| Rose continued, "The new edition incorporates these new developments as |
| well as containing new information concerning on-line property rights, user |
| agreements, sysop liabilities, viruses and adult material contained on |
| online systems." |
|
|
| SysLaw is available from PC Information Group, 1126 East Broadway, Winona, |
| MN 55987 (800-321-8285 or 507-452-2824) at a price of $34.95 plus $3.00 |
| shipping and (if applicable) sales tax. |
|
|
| Press Contact: Brian Blackledge, PC Information Group, 800-321-8285 |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| 5. YET ANOTHER BOOK ABOUT THE COMPUTER UNDERGROUND (The Daily Telegraph, |
| 12/14/92, Page 25) -- Approaching Zero: Data Crime and the Computer |
| Underworld by Bryan Clough and Paul Mungo (Faber & Faber, L14.99) -- A look |
| at the world of Fry Guy, Control C, Captain Zap and other hackers to blame |
| for the viruses, logic bombs and Trojan horses in the world's personal |
| computer networks. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| 6. HONOR STUDENT NABBED IN COMPUTER FRAUD (The Washington Times, 11/9/92, Page |
| A6) -- BROOKSVILLE, FLA.-- Three high school honor students have been |
| accused of stealing tens of thousands of dollars worth of long-distance |
| calls as computer hackers. |
|
|
| Brian McGrogan, 16, and Edmund Padgett, 17, who were charged as adults, and |
| a 15-year-old allegedly tapped private telephone systems and dialed into an |
| international hacking network. One company's loss was $36,000. |
|
|
| "These are very sharp, intelligent kids," Hernando County sheriff's Captain |
| Richard Nugent said after the arrests. "It's a game to them. It's a |
| sport." |
|
|
| Some calls were made to computer bulletin boards in the United Kingdom, |
| Germany and Canada, where a loose network of hackers allegedly shared |
| information about how to obtain computer data and access information. |
| Arrests in the case also were made in New York and Virginia, Captain Nugent |
| said. |
|
|
| The two older boys were booked on charges of organized fraud and violation |
| of intellectual property. The third boy was released to his parents. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| 7. A CORDLESS PHONE THAT CAN THWART EAVESDROPPERS (Business Week, 8/3/92) -- |
| To industrial spies and other snoops, the millions of cordless phones in |
| use are goldmines of information. Conversations can be plucked out of the |
| air by means of a police type scanner, and with increasing ease. The |
| latest no-cord technologies offers clearer sound and longer ranges -- up to |
| half a mile. That's because the new phones broadcast signals at 900 MHz, |
| or 20 times the frequency of current models. |
|
|
| Cincinnati Microwave, Inc. (the radar detector people) figures executives |
| and consumers will pay a small premium for cordless privacy. The company |
| has developed a phone, to be marketed in October by its Escort division for |
| about $300, that thwarts eavesdroppers with "spread spectrum" technology, |
| which is similar to the encryption method that the military uses in secure |
| radios. The signals between the handset and base unit are digitized, |
| making them unintelligible to humans, and the transmission randomly hops |
| among various frequencies within the 900 MHz spectrum. To keep the cost |
| down to the range of other 900 MHz models, Cincinnati Microwave has |
| developed special microchips that keep the handset and base in sync. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| 8. NEW AREA CODE -- As of November 1, 1992, a new 210 area code is serving 152 |
| communities in the San Antonio and Rio Grande Valley areas. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| 9. FOR SALE: PHONE-PHREAKING TOOLS (Brigid McMenamin, Forbes, 8/3/92, Page 64) |
| -- From his remote outpost in Alamogordo, New Mexico, John Williams makes a |
| nice living telling hackers how to rip off phone and computer systems. |
|
|
| Williams says he brings in about $200,000 a year publishing books on |
| everything from credit card scams and cracking automated teller machines to |
| electronic shoplifting, cellular phone phreaking and voice mailbox hacking, |
| each costing $29 to $39, and each complete with precise instructions. He |
| even sells Robofones, which save hackers from doing a lot of dialing while |
| they steal access codes. |
|
|
| Isn't what he does illegal? Perhaps it should be, but it isn't. Wrapping |
| himself in the First Amendment, Williams is a member in good standing of |
| the Alamogordo Chamber of Commerce and the New Mexico Better Business |
| Bureau. He thumbs his nose at companies and authorities that would like to |
| make him stop selling such secrets. "We don't promote fraud," he insists. |
| "It's all sold for educational purposes only. If we didn't publish the |
| information, it would still be out there." |
|
|
| But last year Williams got a visit form the Secret Service, which was |
| following up on a telephone fraud case in which one of his publications |
| figured prominently. |
|
|
| In Gainsville, Florida, in November 1990, two young men were locked up by |
| police for hacking into voice-mail systems and then making calls to 900 |
| numbers. One of the pair, known as the Shark, then 20, confessed to the |
| crime, but said he was on assignment for Williams' Consumertronics |
| publication. The culprits could have been given five years on the fraud |
| charge alone. But the victim didn't want any publicity, so the state let |
| them do 50 hours of community service instead. |
|
|
| The Secret Service went to talk to Williams. Williams assured agent James |
| Pollard that he'd never told the Shark to do anything illegal. |
| Nevertheless, says Williams, the agent implied that Williams and members of |
| his family who work for him might be prosecuted for publishing voice-mail |
| access codes. |
|
|
| In the end, no charges were filed against Williams, who admits he has a |
| thing against big business, especially the phone companies. "For decades, |
| they financed right-wing regimes in Latin America," he rants. |
|
|
| It's a crazy world, that of the telephone toll fraudsters. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| 10. NEW YORK STATE POLICE DECRIMINALIZE THE WORD "HACKER" (Barbara E. McMullen |
| & John F. McMullen, Newsbytes, 10/21/92) -- ALBANY, NEW YORK -- Senior |
| investigator Ron Stevens of the New York State Police Computer Unit has |
| told Newsbytes that it will be the practice of his unit to avoid the use of |
| the term "hacker" in describing those alleged to have committed computer |
| crimes. |
|
|
| Stevens told Newsbytes, "We use the term computer criminal to describe |
| those who break the law using computers. While the lay person may have |
| come to understand the meaning of hacker as a computer criminal, the term |
| isn't accurate. The people in the early days of the computer industry |
| considered themselves hackers and they made the computer what it is today. |
| There are those today who consider themselves hackers and do not commit |
| illegal acts." |
|
|
| Stevens had made similar comments in a recent conversation with Albany BBS |
| operator Marty Winter. Winter told Newsbytes, "'Hacker' is, unfortunately |
| an example of the media taking what used to be an honorable term, and using |
| it to describe an activity because they (the media) are too lazy or stupid |
| to come up with something else. Who knows, maybe one day 'computer |
| delinquent' WILL be used, but I sure ain't gonna hold my breath." |
|
|
| Stevens, together with investigator Dick Lynch and senior investigator |
| Donald Delaney, attended the March 1992 Computers, Freedom and Privacy |
| Conference (CFP-2) in Washington, DC and met such industry figures as Glenn |
| Tenney, congressional candidate and chairman of the WELL's annual "Hacker |
| Conference"; Craig Neidorf, founding editor and publisher of Phrack; Steven |
| Levy, author of "Hackers" and the recently published "Artificial Life"; |
| Bruce Sterling, author of the recently published "The Hacker Crackdown"; |
| Emmanuel Goldstein, editor and publisher of 2600: The Hacker Quarterly" and |
| a number of well-known "hackers." |
|
|
| Stevens said, "When I came home, I read as much of the literature about the |
| subject that I could and came to the conclusion that a hacker is not |
| necessarily a computer criminal." |
|
|
| The use of the term "hacker" to describe those alleged to have committed |
| computer crimes has long been an irritant to many in the online community. |
| When the July 8th federal indictment of 5 New York City individuals |
| contained the definition of computer hacker as "someone who uses a computer |
| or a telephone to obtain unauthorized access to other computers," there was |
| an outcry on such electronic conferencing system as the WELL (Whole Earth |
| 'Lectronic Link). Many of the same people reacted quite favorably to the |
| Stevens statement when it was posted on the WELL. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
| 11. STEVE JACKSON GAMES TRIAL DATE SET -- Mike Godwin, General Counsel for the |
| Electronic Frontier Foundation, announced on December 23rd that the case |
| of Steve Jackson Games, et.al. v. The United States Secret Service et. al. |
| will go to trial in Austin, Texas on Tuesday, January 19, 1993. |
| _______________________________________________________________________________ |
|
|