| ==Phrack Magazine== |
|
|
| Volume Four, Issue Forty-Two, File 14 of 14 |
|
|
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN PWN |
| PWN Phrack World News PWN |
| PWN PWN |
| PWN Compiled by Datastream Cowboy PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
|
|
| STEVE JACKSON GAMES v. UNITED STATES SECRET SERVICE |
|
|
| Rights To Be Tested In Computer Trial January 20, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Joe Abernathy (The Houston Chronicle)(Page A13) |
| *Reprinted With Permission* |
|
|
| Summary Judgment Denied In Case |
|
|
| AUSTIN -- A judge Tuesday denied plaintiff lawyers' request for summary |
| judgment in a case brought against the U.S. Secret Service to set the bounds of |
| constitutional protections for electronic publishing and electronic mail. |
|
|
| U.S. District Judge Sam Sparks acted after hearing complicated arguments |
| regarding application of 1st and 4th Amendment principles in computer-based |
| communications and publishing. The case will go to trial at 9 a.m. today. |
|
|
| "Uncontested facts show the government violated the Privacy Protection Act and |
| the Electronic Communications Privacy Act," said Pete Kennedy, attorney for |
| Steve Jackson Games, an Austin game company that brought the lawsuit. |
|
|
| Mark W. Batten, attorney for the Department of Justice, which is defending the |
| Secret Service, declined to comment on the proceedings. |
|
|
| Steve Jackson's company, which publishes fantasy role-playing games -- not |
| computer games -- was raided by the Secret Service on March 1, 1990, during a |
| nationwide sweep of suspected criminal computer hackers. |
|
|
| Agents seized several computers and related hardware from the company and from |
| the Austin home of Steve Jackson employee Loyd Blankenship. Taken from the |
| game publisher was an electronic bulletin board used to play-test games before |
| they were printed and exchange electronic mail with customers and free-lance |
| writers. |
|
|
| Another seized computer contained the text of the company's work in progress, |
| GURPS Cyberpunk, which was being prepared for the printers. |
|
|
| Blankenship's purported membership in the Legion of Doom -- a group of computer |
| hackers from Austin, Houston and New York -- led the Secret Service to Steve |
| Jackson's door. |
|
|
| Neither Jackson nor his company was suspected of wrongdoing. |
|
|
| The game publisher is named in two paragraphs of the 42-paragraph affidavit |
| requesting the 1990 search warrant, which targeted Blankenship -- a fact |
| Kennedy cited in seeking summary judgment. |
|
|
| Kennedy presented evidence that the original Secret Service affidavit for the |
| warrant used to raid Steve Jackson Games contained false statements. |
| Supporting documentation showed that Bellcore expert Henry Kluepfel disputes |
| statements attributed to him that accounted for the only link between Steve |
| Jackson Games and the suspicion Blankenship was engaged in illegal activity. |
|
|
| Batten came away visibly shaken from questioning by Sparks, and later had a |
| tense exchange with Kennedy outside the courtroom. |
|
|
| The lawsuit contends the government violated 1st Amendment principles by |
| denying the free speech and public assembly of callers to Jackson's bulletin |
| board system, Illuminati. This portion of the complaint was brought under the |
| Privacy Protection Act, which also covers the seized Cyberpunk manuscripts -- |
| if the judge rules that such a book, stored electronically prior to |
| publication, is entitled to the same protections as a printed work. |
| The government lawyers argued the Privacy Protection Act applies only to |
| journalistic organizations -- an argument Sparks didn't seem to buy. |
|
|
| The lawsuit also contends 4th Amendment principles providing against |
| unreasonable search and seizure were violated, on grounds the Electronic |
| Communications Privacy Act specifies protection for publishers. |
|
|
| The Justice Department contends electronic mail does not enjoy constitutional |
| protections. |
|
|
| "They (users of Illuminati) had no expectation of privacy in their electronic |
| mail messages," Batten said. The basis of the argument is that Illuminati's |
| callers were not sending communications to others, but rather "revealing" them |
| to a third party, Steve Jackson, thus negating their expectation of privacy. |
| _______________________________________________________________________________ |
|
|
| Computer Case Opens; Agent Admits Errors January 27, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Joe Abernathy (The Houston Chronicle)(Page A11) |
| *Reprinted With Permission* |
|
|
| AUSTIN -- Plaintiff's attorneys wrested two embarrassing admissions from the |
| U.S. Secret Service on the opening day of a federal civil lawsuit designed to |
| establish constitutional protections for electronic publishing and electronic |
| mail. |
|
|
| Special Agent Timothy Folly of Chicago admitted that crucial statements were |
| erroneous in an affidavit he used to obtain warrants in a 1990 crackdown on |
| computer crime. |
|
|
| Foley also conceded that the Secret Service's special training for computer |
| crime investigators overlooks any mention of a law that limits search-and- |
| seizure at publishing operations. |
|
|
| The case before U.S. District Judge Sam Sparks was brought by Steve Jackson |
| Games, an Austin game publisher, with the support of electronic civil rights |
| activists who contend that federal agents have overstepped constitutional |
| bounds in their investigations of computer crime. |
|
|
| Jackson supporters already have committed more than $200,000 to the litigation, |
| which seeks $2 million in damages from the Secret Service and other defendants |
| in connection with a March 1990 raid on Jackson Games. |
|
|
| Plaintiffs hope to establish that First Amendment protections of the printed |
| word extend to electronic information and to guarantee privacy protections for |
| users of computer bulletin board systems, such as one called Illuminati that |
| was taken in the raid. |
|
|
| Steve Jackson's attorney, Jim George of Austin, focused on those issues in |
| questioning Foley about the seizure of the personal computer on which |
| Illuminati ran and another PC which contained the manuscript of a pending |
| Jackson Games book release, "GURPS Cyberpunk." |
|
|
| "At the Secret Service computer crime school, were you, as the agent in charge |
| of this investigation, made aware of special rules for searching a publishing |
| company?" George asked Foley. He was referring to the Privacy Protection Act, |
| which states that police may not seize a work in progress from a publisher. It |
| does not specify what physical form such a work must take. |
|
|
| Foley responded that the Secret Service does not teach its agents about those |
| rules. |
|
|
| Earlier, Foley admitted that his affidavit seeking court approval to raid |
| Jackson Games contained an error. |
|
|
| During the raid -- one of several dozen staged that day around the country in |
| an investigation called Operation Sun Devil -- agents were seeking copies of a |
| document hackers had taken from the computer system of BellSouth. |
|
|
| No criminal charges have been filed against Jackson, his company, or others |
| targeted in several Austin raids. The alleged membership of Jackson employee |
| Loyd Blankenship in the Legion of Doom hacker's group -- which was believed |
| responsible for the BellSouth break-in -- lead agents to raid Jackson Games at |
| the same time that Blankenship's Austin home was raided. |
|
|
| Foley's affidavit stated that Bell investigator Henry Kluepfel had logged on to |
| the Illuminati bulletin board and found possible evidence of a link between |
| Jackson Games and the Legion of Doom. |
|
|
| But George produced a statement from Kluepfel, who works for Bellcore, formerly |
| AT&T Bell Labs, disputing statements attributed to him in the affidavit. Foley |
| acknowledged that part of the affidavit was erroneous. |
|
|
| The U.S. Department of Justice, which is defending the Secret Service, contends |
| that only traditional journalistic organizations enjoy the protections of the |
| Privacy Protection Act and that users of electronic mail have no reasonable |
| expectation of privacy. |
| _______________________________________________________________________________ |
|
|
| Judge Rebukes Secret Service For Austin Raid January 29, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Joe Abernathy (The Houston Chronicle)(Page A21) |
| *Reprinted With Permission* |
|
|
| AUSTIN -- A federal judge lambasted the U.S. Secret Service Thursday for |
| failing to investigate properly before it seized equipment from three Austin |
| locations in a 1990 crackdown on computer crime. |
|
|
| U.S. District Judge Sam Sparks' comments came on the final day of trial in a |
| lawsuit brought by Steve Jackson Games, an Austin publisher, with the support |
| of national computer rights activists. |
|
|
| The judge did not say when he will issue a formal ruling in the case. In |
| addition to seeking $ 2 million in damages from the Secret Service and other |
| defendants, Jackson hopes to establish privacy and freedom of the press |
| protections for electronic information. |
|
|
| In a packed courtroom Thursday morning, Sparks dressed down Secret Service |
| Special Agent Timothy Foley of Chicago, who was in charge of the March 1, 1990, |
| raid on Jackson, one of his employees and a third Austin man. No criminal |
| charges have been filed in connection with the raids. |
|
|
| "The Secret Service didn't do a good job in this case," Sparks said. "We know |
| no investigation took place. Nobody ever gave any concern as to whether |
| (legal) statutes were involved. We know there was damage (to Jackson)." |
|
|
| The Secret Service has seized dozens of computers since the nationwide |
| crackdown began in 1990, but Jackson, a science fiction magazine and game book |
| publisher, is the first to challenge the practice. A computer seized at |
| Jackson Games contained the manuscript for a pending book, and Jackson alleges, |
| among other things, that the seizure violated the Privacy Protection Act, which |
| prohibits seizure of publishers' works in progress. |
|
|
| Agents testified that they were not trained in that law at the special Secret |
| Service school on computer crime. |
|
|
| Sparks grew visibly angry when testimony showed that Jackson never was |
| suspected of a crime, that agents did no research to establish a criminal |
| connection between the firm and the suspected illegal activities of an |
| employee, and that they did not determine that the company was a publisher. |
|
|
| "How long would it have taken you, Mr. Foley, to find out what Steve Jackson |
| Games did, what it was? " asked Sparks. "An hour? |
|
|
| "Was there any reason why, on March 2, you could not return to Steve Jackson |
| Games a copy, in floppy disk form, of everything taken? |
|
|
| "Did you read the article in Business Week magazine where it had a picture of |
| Steve Jackson -- a law-abiding, tax-paying citizen -- saying he was a computer |
| crime suspect? |
|
|
| "Did it ever occur to you, Mr. Foley, that seizing this material could harm |
| Steve Jackson economically? " |
|
|
| Foley replied, "No, sir," but the judge offered his own answer: |
|
|
| "You actually did; you just had no idea anybody would actually go out and hire |
| a lawyer and sue you." |
|
|
| The judge's rebuke apparently convinced the government to close its defense |
| after the testimony from Foley, only one of several government witnesses on |
| hand. Justice Department attorney Mark Battan entered subdued testimony |
| seeking to limit the award of monetary damages. |
|
|
| The judge's comments came after cross-examination of Foley by Pete Kennedy, |
| Jackson's attorney. |
|
|
| Sparks questioned Foley about the raid, focusing on holes in the search |
| warrant, why Jackson was not allowed to copy his work in progress after it was |
| seized, and why his computers were not returned after the Secret Service |
| analyzed them. |
|
|
| "The examination took seven days, but you didn't give Steve Jackson's computers |
| back for three months. Why?" asked Sparks. |
|
|
| "So here you are, with three computers, 300 floppy disks, an owner who was |
| asking for it back, his attorney calling you, and what I want to know is why |
| copies of everything couldn't be given back in days. Not months. Days. |
|
|
| "That's what makes you mad about this case." |
|
|
| Besides alleging that the seizure violated the Privacy Protection Act, Jackson |
| alleged that since one of the computers was being used to run a bulletin board |
| system containing private electronic mail, the seizure violated the Electronic |
| Communications Privacy Act. |
|
|
| Justice Department attorneys have refused comment on the case, but contended in |
| court papers that Jackson Games is a manufacturer, and that only journalistic |
| organizations can call upon the Privacy Protection Act. |
|
|
| The government said that seizure of an electronic bulletin board system does |
| not constitute interception of electronic mail. |
|
|
| The Electronic Frontier Foundation committed more than $200,000 to the Jackson |
| suit. The EFF was founded by Mitchell Kapor of Lotus Technology amid a |
| computer civil liberties movement sparked in large part by the Secret Service |
| computer crime crackdown that included the Austin raids. |
|
|
| "The dressing down of the Secret Service for their behavior is a major |
| vindication of what we've been saying all along, which is that there were |
| outrageous actions taken against Steve Jackson that hurt his business and sent |
| a chilling effect to everyone using bulletin boards, and that there were larger |
| principles at stake," said Kapor, contacted at his Cambridge, Massachusetts |
| office. |
|
|
| Shari Steele, who attended the trial as counsel for the EFF, said, "We're very |
| happy with the way the case came out. That session with the judge and Tim |
| Foley is what a lawyer dreams about." |
| _______________________________________________________________________________ |
|
|
| Going Undercover In The Computer Underworld January 26, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Ralph Blumenthal (The New York Times)(Page B1) |
|
|
| [A 36-year old law enforcement officer from the East Coast masquerades |
| as "Phrakr Trakr" throughout the nation's computer bulletin boards. |
| As the organizer of the High-Tech Crime Network, he has educated other |
| officers in over 28 states in the use of computer communications. |
| Their goal is to penetrate some 3000 underground bbses where computer |
| criminals trade in stolen information, child pornography and bomb |
| making instructions. |
|
|
| "I want to make more cops aware of high-tech crime," he said. "The |
| victims are everybody. We all end up paying for it."] |
| _______________________________________________________________________________ |
|
|
| Hackers Breaking Into UC Computers January 23, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by T. Christian Miller (The San Francisco Chronicle)(Page A20) |
|
|
| [According to the University of California, hackers have been breaking |
| into the DOD and NASA through UC computer systems. The investigation |
| links over 100 computer hackers who have reportedly penetrated |
| computers at UC Davis, UC Berkeley, NYU, FSU, and CSU. The FBI stated |
| that the investigation reached as far as Finland and Czechoslovakia |
| but did not comment on any arrests. |
|
|
| University officials have asked all users to change to more complex |
| passwords by April 1.] |
|
|
| _______________________________________________________________________________ |
|
|
| Feds Sued Over Hacker Raid At Mall February 5, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Joe Abernathy (The Houston Chronicle)(Page A5) |
|
|
| [A lawsuit was filed 2-4-93 in the Washington, D.C. federal court to |
| force the secret service to disclose its involvement in the disruption |
| of a meeting of computer hackers last year. The meeting, a monthly |
| gathering of readers of "2600 Magazine" at the Pentagon City Mall was |
| disrupted on November 6, 1992, when mall security and Arlington County |
| Police questioned and searched the attendees. |
|
|
| The suit was filed by the Computer Professionals for Social |
| Responsibility. "If this was a Secret Service operation, it raises |
| serious constitutional questions," said Marc Rotenberg, director of |
| CPSR. |
|
|
| The Secret Service declined to comment on the matter.] |
|
|
| ---------- |
|
|
|
|
| [New Info in 2600 Case - from email sent by CPSR] |
|
|
| One month after being sued under the Freedom of Information |
| Act (FOIA), the Secret Service has officially acknowledged that |
| it possesses "information relating to the breakup of a meeting |
| of individuals at the Pentagon City Mall in Arlington, Virginia." |
| The admission, contained in a letter to Computer Professionals for |
| Social Responsibility (CPSR), confirms widespread suspicions that |
| the agency played a role in the detention and search of |
| individuals affiliated with "2600" Magazine at the suburban |
| Washington mall on November 6, 1992. |
|
|
| CPSR filed suit against the Secret Service on February 4 |
| after the agency failed to respond to the organization's FOIA |
| request within the statutory time limit. In its recent response, |
| the Secret Service released copies of three news clippings |
| concerning the Pentagon City incident but withheld other |
| information "because the documents in the requested file contain |
| information compiled for law enforcement purposes." While the |
| agency asserts that it possesses no "documentation created by the |
| Secret Service chronicling, reporting, or describing the breakup |
| of the meeting," it does admit to possessing "information provided |
| to the Secret Service by a confidential source which is |
| information relating to the breakup of [the] meeting." Federal |
| agencies classify other law enforcement agencies and corporate |
| entities, as well as individuals, as "confidential sources." |
|
|
| The propriety of the Secret Service's decision to withhold |
| the material will be determined in CPSR's pending federal lawsuit. |
| A copy of the agency's letter is reprinted below. |
|
|
| David L. Sobel dsobel@washofc.cpsr.org |
| Legal Counsel (202) 544-9240 (voice) |
| CPSR Washington Office (202) 547-5481 (fax) |
|
|
| ************************************************ |
|
|
|
|
| DEPARTMENT OF THE TREASURY |
| UNITED STATES SECRET SERVICE |
|
|
| MAR 5 1993 |
|
|
| 920508 |
|
|
|
|
| David L. Sobel |
| Legal Counsel |
| Computer Professionals for |
| Social Responsibility |
| 666 Pennsylvania Avenue, S.E. |
| Suite 303 |
| Washington, D.C. 20003 |
|
|
| Dear Mr. Sobel: |
|
|
| This is in response to your Freedom of Information Act (FOIA) |
| request for access to "copies of all records related to the |
| breakup of a meeting of individuals affiliated with "2600 |
| Magazine" at the Pentagon City Mall in Arlington, Virginia on |
| November 6, 1992." |
|
|
| Enclosed, please find copies of materials which are responsive to |
| your request and are being released to you in their entirety. |
|
|
| Other information has been withheld because the documents in the |
| requested file contain information compiled for law enforcement |
| purposes. Pursuant to Title 5, United States Code, Section |
| 552(b)(7)(A); (C); and (D), the information has been exempted |
| since disclosure could reasonably be expected to interfere with |
| enforcement proceedings; could reasonably be expected to |
| constitute an unwarranted invasion of personal privacy to other |
| persons; and could reasonably be expected to disclose the |
| identity of a confidential source and/or information furnished by |
| a confidential source. The citations of the above exemptions are |
| not to be construed as the only exemptions that are available |
| under the Freedom of Information Act. |
|
|
| In regard to this matter it is, however, noted that your FOIA |
| request is somewhat vague and very broadly written. Please be |
| advised, that the information being withheld consists of |
| information provided to the Secret Service by a confidential |
| source which is information relating to the breakup of a meeting |
| of individuals at the Pentagon City Mall in Arlington, Virginia, |
| and, therefore, appears to be responsive to your request as it |
| was written. If, however, the information you are seeking is |
| information concerning the Secret Service's involvement in the |
| breakup of this meeting, such as any type of documentation |
| created by the Secret service chronicling, reporting, or |
| describing the breakup of the meeting, please be advised that no |
| such information exists. |
|
|
| If you disagree with our determination, you have the right of |
| administrative appeal within 35 days by writing to Freedom of |
| Information Appeal, Deputy Director, U. S. Secret Service, |
| 1800 G Street, N.W., Washington, D.C. 20223. If you choose to |
| file an administrative appeal, please explain the basis of your |
| appeal. |
|
|
| Sincerely, |
|
|
| /Sig/ |
| Melvin E. Laska |
| ATSAIC |
| Freedom of Information & |
| Privacy Acts Officer |
|
|
| Enclosure |
|
|
| ******************************************* |
|
|
| For more information, refer to Phrack World News, Issue 41/1: |
|
|
| Reports of "Raid" on 2600 Washington Meeting November 9, 1992 |
| Confusion About Secret Service Role In 2600 Washington Raid November 7, 1992 |
| Conflicting Stories In 2600 Raid; CRSR Files FOIA November 11, 1992 |
| _______________________________________________________________________________ |
|
|
| Surfing Off The Edge February 8, 1993 |
| ~~~~~~~~~~~~~~~~~~~~ |
| by Richard Behar (Time Magazine)(Page 62) |
|
|
| [This article is so full of crap that I cannot even bring myself |
| to include a synopsis of it. Go to the library and read it |
| and laugh.] |
| _______________________________________________________________________________ |
|
|
| Bulgarian Virus Writer, Scourge in the West, Hero at Home January 29, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by David Briscoe (Associated Press) |
|
|
| [The Dark Avenger, believed to be a computer programmer in Sophia, has |
| drawn the attention of computer crime squads in the US and Europe. To |
| many programmers the Dark Avenger is a computer master to many young |
| Bulgarians. "His work is elegant. ... He helps younger programmers. |
| He's a superhero to them," said David Stang director for the |
| International Virus Research Center. |
|
|
| Neither Bulgaria nor the US has laws against the writing of computer |
| viruses] |
| _______________________________________________________________________________ |
|
|
| Computer Security Tips Teach Tots To Take Byte Out Of Crime February 3, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Michelle Locke (Associated Press) |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
| Young Students Learn Why Computer Hacking Is Illegal February 4, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Bill Wallace (San Francisco Chronicle)(Page A22) |
|
|
| [In an attempt to teach computer crime prevention, children in |
| kindergarten through third grade in a Berkeley elementary school are |
| being shown a 30 minute presentation on ethics and security. |
|
|
| The program consists of several skits using puppets to show the |
| children various scenarios from eating food near computer systems to |
| proper password management. |
|
|
| In one episode, Gooseberry, a naive computer user, has her files |
| erased by Dirty Dan, the malicious hacker, when she neglects to log |
| off. |
|
|
| Philip Chapnick, director of the Computer Security Institute in San |
| Francisco, praised the idea. "One of the major issues in information |
| security in companies now is awareness. Starting the kids early ... I |
| think it will pay off," said Chapnick.] |
| _______________________________________________________________________________ |
|
|
| Tracking Hackers - Experts Find Source In Adolescence February 25, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Mike Langberg (Knight-Ridder News Service) |
|
|
| [At the National Computer Security Association convention in San |
| Francisco, four experts analyzed the psyche of today's hacker. |
| The panel decided that hacker bonding came from a missing or defective |
| family. The panel also decided that hackers weren't necessarily |
| geniuses, and that a few weeks of study would be enough to begin. |
|
|
| Panel member Winn Schwartau stated that there should be an end to |
| slap-on-the-wrist penalties. Sending hackers to jail would send a |
| clear message to other hackers, according to Schwartau. |
|
|
| "What strikes me about hackers is their arrogance," said Michael |
| Kabay, computer security consultant from Montreal. "These people seem |
| to feel that their own pleasures or resentments are of supreme |
| importance and that normal rules of behavior simply don't apply to |
| them."] |
| _______________________________________________________________________________ |
|
|
| Bomb Recipes Just A Keystroke Away January 10, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Tracy Gordon Fox (The Hartford Courant)(Page B1) |
|
|
| [Teenagers gathering information via computer have contributed greatly |
| to the fifty percent increase in the number of homemade explosives |
| found last year. |
|
|
| The computer age has brought the recipes for the explosives to the |
| fingertips of anyone with a little computer knowledge and a modem. |
|
|
| One of the first police officers to discover that computers played a |
| part in a recent West Hartford, Connecticut, bombing said that |
| hackers were loners, who are socially dysfunctional, excel in |
| mathematics and science, and are "over motivated in one area." |
|
|
| The trend has been seen around the country. The 958 bombing incidents |
| reported nationally to the Bureau of Alcohol, Tobacco and Firearms was |
| the highest in 15 years.] |
| _______________________________________________________________________________ |
|
|
| Hackers Hurt Cellular Industry January 25, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by John Eckhouse (The San Francisco Chronicle)(Page C1) |
|
|
| [With only a little equipment and technical knowledge, telephone |
| pirates can make free calls and eavesdrop on cellular conversations. |
|
|
| "Technically, eavesdroping is possible, but realistically I don't |
| think it can be done," said Justin Jasche chief executive of Cellular One. |
|
|
| The Cellular Telecommunications Industry Association estimates that |
| hackers make about $300 million worth of unauthorized calls a year, |
| though others put the figure much higher.] |
|
|
| ------------------------------------------------------------------------------- |
|
|
| Cellular Phreaks and Code Dudes February 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by John Markoff (Wired) (page 60) |
|
|
| [Two hackers, V.T. and N.M. have discovered that celluar phones are |
| really just little computers linked by a gigantic cellular network. |
| And like most computers, they are programmable. The hackers have |
| discovered that the OKI 900 has a special mode that will turn it into |
| a scanner, enabling them to listen in on other cellular conversations. |
|
|
| The two also discovered that the software stored in the phones ROM |
| takes up roughly 40K, leaving over 20K free to add in other features, |
| They speculate on the use of the cellular phone and a computer |
| to track users through cell sites, and to monitor and decode |
| touchtones of voice mail box codes and credit card numbers. |
|
|
| Said V.T. of the OKI's programmers, "This phone was clearly built by |
| hackers."] |
|
|
| ------------------------------------------------------------------------------- |
|
|
| Callers Invited To Talk Sex, Thanks To Hacker's Prank February 5, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| (The Vancouver Sun) (Page A-9) |
|
|
| [For the past two weeks, surprised callers to CTC Payroll Services' |
| voice-mail system have been invited to talk sex. Instead |
| of a pleasant, professional salutation, callers hear a man's voice |
| suggesting that they engage a variety of intimate activities. |
|
|
| The prankster is a computer hacker who can re-program the greeting message |
| on company telephones. Company owner Cheryl MacLeod doesn't think the joke |
| is very funny and says the hacker is ruining her business.] |
| _______________________________________________________________________________ |
|
|