| ==Phrack Magazine== |
|
|
| Volume Four, Issue Forty-Three, File 27 of 27 |
|
|
| PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN |
| PWN PWN |
| PWN Phrack World News PWN |
| PWN PWN |
| PWN Compiled by Datastream Cowboy PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
|
|
| New Yorker Admits Cracking July 3, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| (From AP Newswire Sources) |
|
|
| Twenty-one-year-old Mark Abene of New York, known as "Phiber Optik" in |
| the underground computing community, has pleaded guilty to charges he |
| participated in a group that broke into computers used by phone companies |
| and credit reporting services. |
|
|
| The Reuter News Service says Abene was the last of the five young men |
| indicted in the huge 1991 computer break-in scheme to admit committing the |
| crimes. The group called itself "MOD," an acronym used for "Masters of |
| Disaster" and "Masters of Deception." |
|
|
| Abene pleaded guilty to one count of conspiracy and one count of |
| unlawful access to computers. He faces a possible maximum prison term of |
| 10 years and fine of $500,000. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| China Executes Computer Intruder April 26, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| (From AP Newswire Sources) |
|
|
| A man accused of invading a computer and embezzling some |
| $192,000 has been executed in China. |
|
|
| Shi Biao, an accountant at the Agricultural Bank of China's Jilin |
| branch, was accused of forging deposit slips from Aug. 1 to |
| Nov. 18, 1991. |
|
|
| The crime was the first case of bank embezzlement via |
| computer in China. Authorities became aware of the plot |
| when Shi and his alleged accomplice, Yu Lixin, tried to wire |
| part of the money to Shenzhen in southern China. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Teen Takes the A Train --- Literally May 13, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| (From AP Newswire sources) |
|
|
| A 16 year old 10th grader successfully conveyed passengers on a NYC 10 car |
| subway train for 2.5 hours until he went around a curve too quickly and |
| could not reset the emergency brakes. Keron Thomas dressed as a NY subway |
| train engineer impersonated Regoberto Sabio, a REAL subway motorman, while he |
| was on vacation and even obtained Sabio's "pass number". |
|
|
| Thomas was a Subway enthusiast who hung around train stations and areas |
| where subway motormen and other subway workers hang out. A NYC subway |
| spokesman was quoted as saying "Buffs like to watch...pretty soon they |
| figure out how" [to run the train]. "This guy really knew what he was doing". |
|
|
| Thomas was charged with criminal trespassing, criminal impersonation, and |
| reckless endangerment. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Banks React To Scheme That Used Phony ATM May 13, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| (From AP Newswire Sources) |
|
|
| At least three people are believed to be involved in an ATM scam that is |
| thought to have netted roughly $ 60,000. The fraud was perpetrated by |
| obtaining a real ATM machine (theorized to have been stolen from a warehouse) |
| and placing it in a Connecticut shopping mall. |
|
|
| When people attempted to use the machine, they received a message that the |
| machine wasn't working correctly and gave back the card. Little did they |
| know that their bank account number and PIN code was recorded. The fake |
| machine was in place for about 2 weeks. It was removed and the thieves |
| began making withdrawals. |
|
|
| The Secret Service thinks the scammers recorded anywhere from 2000 to 3000 |
| account numbers/pin codes but did not get a chance to counterfeit |
| and withdraw money except from a few hundred accounts before it |
| became too dangerous to continue |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Hacker Gets Jail Time June 5, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~ |
| (Newsday) (Page 13) |
|
|
| A Brooklyn College film student, who was part of a group that allegedly broke |
| into computer systems operated by major telephone companies, was sentenced |
| yesterday to 1 year and 1 day in prison. |
|
|
| John Lee, 21, of Bedford Stuyvesant, also was sentenced to 200 hours of |
| community service, which Manhattan Federal District Court Judge Richard Owen |
| recommended he spend teaching others to use computers. Lee had pled guilty |
| December 3, 1992, to a conspiracy charge involving computer tampering, fraud |
| and illegal wiretapping. |
|
|
| _______________________________________________________________________________ |
|
|
| Hacker Gets Prison Term For Phone Computer Tampering June 4, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Gail Appleson (The Reuter Business Report) |
|
|
| NEW YORK -- A computer hacker known as "Corrupt" who was part of a group that |
| broke into computer systems operated by major telephone companies was |
| sentenced Friday to one year and one day in prison. |
|
|
| The defendant, John Lee, 21, of New York had pleaded guilty December 3, 1992 |
| to a conspiracy charge involving computer tampering, fraud and illegal |
| wiretapping. |
|
|
| The indictment alleges the defendants broke into computer switching systems |
| operated by Southwestern Bell, New York Telephone, Pacific Bell, U.S. West |
| and Martin Marietta Electronics Information and Missile Group. |
|
|
| Southwestern Bell allegedly lost $370,000 because of the crimes. |
|
|
| The defendants also allegedly tampered with systems owned by the nation's |
| largest credit reporting companies including TRW, Trans Union and Information |
| America. They allegedly obtained 176 TRW credit reports on various |
| individuals. |
|
|
| The indictment alleged the group broke into the computers "to enhance their |
| image and prestige among other computer hackers and to harass and intimidate |
| rival hackers and other people they did not like." |
| _______________________________________________________________________________ |
|
|
| Professional Computer Hackers First To Land In Jail Under New Law June 4, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Nicholas Hills (The Vancouver Sunds)(Page A11) |
|
|
| LONDON -- In Brussels, they were celebrated as the two young men who broke the |
| gaudy secrets of EC president Jacques Delors' expense accounts. |
|
|
| In Sweden, they were known as the Eight-Legged Groove Machine, bringing down |
| part of the country's telephone network, forcing a highly publicized apology |
| from a government minister who said the chaos was all due to a 'technical |
| fault'. |
|
|
| They also broke into various European defense ministry networks, academic |
| systems at Hull University and the financial records of the leading London |
| bankers, S.G. Warburg. |
|
|
| No, these weren't two happy-go-lucky burglars; but rather, professional |
| computer hackers, aged 24 and 22, who made legal as well as technological |
| history by being the first offenders of this new trade to be jailed for their |
| crimes under new British law. |
|
|
| Neil Woods and Karl Strickland have gone to prison for six months each for |
| penetrating computer systems in 15 different countries. The ease with which |
| they conducted this exercise, and their attitude that they were simply engaging |
| in "intellectual joyriding," has confirmed the worst fears of legal and |
| technological experts that computer hacking in Europe, at least, has become a |
| virtually uncontrollable virus. |
|
|
| The case became a cause celebre because of what had happened months before in |
| another courtroom where a teenage computer addict who had hacked into the White |
| House system, the EC, and even the Tokyo Zoo -- using a $400 birthday present |
| from his mother -- had walked free because a jury accepted, basically, that a |
| computer had taken over his mind. |
|
|
| The case of 19-year-old Paul Bedworth, who began hacking at the age of 14, and |
| is now studying "artificial intelligence" at Edinburgh University, provides an |
| insight into why hackers have turned the new computer world into an equivalent |
| state of delirium tremens. |
|
|
| Bedworth and two young friends caused thousands of dollars worth of damage to |
| computer systems in Britain and abroad. They were charged with criminal |
| conspiracy under the Computer Misuse Act of 1990. |
|
|
| Bedworth never did deny computer hacking at his trial, and did not give |
| evidence in his defense. He simply said through his lawyer that there could |
| not have been any criminal intent because of his "pathological obsession" with |
| computers. |
|
|
| A jury of eight men and three women unanimously acquitted him. |
|
|
| Until the passage of the Computer Misuse Act in 1990, hacking was legal in |
| Britain. Bedworth may have been found not guilty, but his activities were so |
| widespread that the authorities' investigation involved eight different British |
| police forces, and others from as far afield as Finland and Singapore. It |
| produced so much evidence - mostly on disk - that if it had been printed out on |
| ordinary laser printer paper, it is estimated that the material would have |
| reached a height of 42 meters. |
|
|
| The police were devastated by the verdict, but are now feeling somewhat better |
| after the conviction of Woods and Strickland. |
|
|
| The pair, using the nicknames of Pad and Gandalf, would spend up to six hours a |
| day at their computers, boasting about "smashing" databases. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Computers Turned My Boy Into A Robot March 18, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Martin Phillips (Daily Mirror)(Page 1) |
|
|
| Connie Bedworth said she was powerless to control the "monster" as he |
| glued himself to the screen nearly 24 hours as day. "He didn't want |
| to eat or sleep--he just couldn't bear to be away from it, " she said. |
|
|
| A jury decided Paul Bedworth, now 19, was so "hooked" he could not stop |
| himself hacking in to companies' systems -- allegedly costing them |
| thousands of dollars. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Hot For The Fingertips: An Internet Meeting Of Minds May 23, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Frank Bajak (Associated Press) |
|
|
| NEW YORK -- Somewhere in the ether and silicon that unite two workstations 11 |
| floors above lower Broadway, denizens of the cyberpunk milieu are feverishly |
| debating whether anyone in government can be trusted. |
|
|
| This is the 12-by-20-foot bare-walled home of MindVox, today's recreation hall |
| for the new lost generation's telecomputing crowd. You can enter by phone |
| line or directly off Internet. |
|
|
| Patrick Kroupa and Bruce Fancher are the proprietors, self-described former |
| Legion of Doom telephone hackers who cut the cord with computing for a time |
| after mid-1980s teen-age shenanigans. |
|
|
| Kroupa is a towering 25-year-old high school dropout in a black leather jacket, |
| with long hair gathered under a gray bandanna, three earrings and a hearty |
| laugh. |
|
|
| Fancher is 22 and more businesslike, but equally in love with this dream he |
| left Tufts University for. |
|
|
| They've invested more than $80,000 into Mindvox, which went fully operational |
| in November and has more than 2,000 users, who pay $15 to $20 a month plus |
| telephone charges. |
|
|
| MindVox aspires to be a younger, harder-edged alternative to the WELL, a |
| fertile 8-year-old watering hole for the mind in Sausalito, California, with |
| more than 7,000 users, including scores of computer age luminaries. |
|
|
| One popular feature is a round-table discussion on computer theft and security |
| hosted by a U.S. Treasury agent. The latest hot topic is the ease of breaking |
| into a new flavor of local access network. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Hi Girlz, See You In Cyberspace May 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Margie (Sassy Magazine) (Page 79) |
|
|
| [Margie hits the net via Mindvox. Along the way she discovers |
| flame wars, sexism, and a noted lack of females online. This |
| is her story. :) ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Hacker Accused of Rigging Radio Contests April 22, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Don Clark (San Francisco Chronicle) |
|
|
| A notorious hacker was charged yesterday with using computers to |
| rig promotional contest at three Los Angeles radio stations, in |
| a scheme that allegedly netted two Porsches, $20,000 in cash and |
| at least two trips to Hawaii. |
|
|
| Kevin Lee Poulsen, now awaiting trial on earlier federal charges, |
| is accused of conspiring with two other hackers to seize control of |
| incoming phone lines at the radio stations. By making sure that only |
| their calls got through, the conspirators were assured of winning the |
| contests, federal prosecutors said. |
|
|
| A new 19-count federal indictment filed in Los Angeles charges |
| that Poulsen also set up his own wire taps and hacked into computers |
| owned by California Department of Motor Vehicles and Pacific Bell. |
| Through the latter, he obtained information about the undercover |
| businesses and wiretaps run by the FBI, the indictment states. |
|
|
| Poulsen, 27, is accused of committing the crimes during 17 |
| months on the lam from earlier charges of telecommunications and |
| computers fraud filed in San Jose. He was arrested in April 1991 |
| and is now in the federal Correctional Institution in Dublin. In |
| December, prosecutors added an espionage charge against him for his |
| alleged theft of a classified military document. |
|
|
| The indictment announced yesterday adds additional charges of |
| computer and mail fraud, money laundering, interception of wire |
| communications and obstruction of justice. |
|
|
| Ronald Mark Austin and Justin Tanner Peterson have pleaded guilty |
| to conspiracy and violating computer crime laws and have agreed to |
| help against Poulsen. Both are Los Angeles residents. |
|
|
| Poulsen and Austin have made headlines together before. As |
| teenagers in Los Angeles, the two computer prodigies allegedly broke |
| into a Pentagon-organized computer network that links researchers and |
| defense contractors around the country. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| SPA Tracks Software Pirates on Internet March 22, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Shawn Willett (InfoWorld)(Page 12) |
|
|
| The Software Publishers Association has begun investigating reports of |
| widespread piracy on the Internet, a loose amalgam of thousands of computer |
| networks. |
|
|
| The Internet, which began as a Unix-oriented, university-based communi- |
| cations network, now reaches into corporate and government sites in 110 |
| countries and is growing at a rapid pace. |
|
|
| The software theft, according to Andrew Patrizio, an editor at the |
| _Software Industry Bulletin_, has been found on certain channels, particularly |
| the warez channel. |
|
|
| "People are openly talking about pirating software; there seems to be no |
| one there to monitor it", Patrizio said. |
|
|
| A major problem with the Internet is that the "sites" from where the |
| software is being illegally downloaded can physically be located in countries |
| that do not have strong antipiracy laws, such as Italy or the former Soviet |
| Union. The Internet also has no central administrator or system operator. |
|
|
| "Policing the entire Internet would be a job", said Peter Beruk, |
| litigation manager for the SPA, in Washington. "My feeling would be to target |
| specific sections that are offering a lot of commercial software free for the |
| download", he said. |
|
|
| --------------------------------------------------------------------------- |
|
|
| Socialite's Son Will Have To Pay $15,000 To |
| Get His Impounded 1991 BMW Back March 23, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By John Makeig (Houston Chronicle)(Page 14A) |
|
|
| Kenyon Shulman, son of Houston socialite Carolyn Farb will have to pay |
| 15 thousand dollars to get back his 1991 BMW 325i after being impounded |
| when Houston police found 400 doses of the drug ecstasy in its trunk. |
|
|
| This is just the latest brush with authorities for Shulman who in 1988 |
| was raided by Harris County authorities for using his personal computer |
| to crack AT&T codes to make free long distance calls. |
|
|
| -------------------------------------------------------------------------- |
|
|
| Austin Man Gets 10 Years For Computer Theft, Sales May 6, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Jim Phillips (Austin American Statesman)(Page B3) |
|
|
| Jason Copson, who was arrested in July under his alias Scott Edward Berry, |
| has been sentenced to 10 years on each of four charges of burglary and |
| one count of assault. The charges will run concurrently. Copson still |
| faces charges in Maryland and Virginia where he served a prison term and |
| was serving probation for dealing in stolen goods. Police arrested Copson |
| and Christopher Lamprecht on July 9 during a sting in which the men tried to |
| sell computer chips stolen from Advanced Micro Devices. |
|
|
| --------------------------------------------------------------------------- |
| Treasury Told Computer Virus Secrets June 19, 1993 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By: Joel Garreau (Washington Post) (Page A01) |
|
|
| For more than a year, computer virus programs that can wreak havoc with |
| computer systems throughout the world were made available by a U.S. government |
| agency to anyone with a home computer and a modem, officials acknowledged this |
| week. |
|
|
| At least 1,000 computer users called a Treasury Department telephone number, |
| spokesmen said, and had access to the virus codes by tapping into the |
| department's Automated Information System bulletin board before it was muzzled |
| last month. |
|
|
| The bulletin board, run by a security branch of the Bureau of Public Debt in |
| Parkersburg, W.Va., is aimed at professionals whose job it is to combat such |
| malicious destroyers of computer files as "The Internet Worm," "Satan's Little |
| Helper" and "Dark Avenger's Mutation Engine." But nothing blocked anyone else |
| from gaining access to the information. |
|
|
| Before the practice was challenged by anonymous whistleblowers, the bulletin |
| board offered "recompilable disassembled virus source code"-that is, programs |
| manipulated to reveal their inner workings. The board also made available |
| hundreds of "hackers' tools"-the cybernetic equivalent of safecracking aids. |
| They included "password cracker" software-various programs that generate huge |
| volumes of letters and numbers until they find the combination that a computer |
| is programmed to recognize as authorizing access to its contents-and "war |
| dialers," which call a vast array of telephone numbers and record those hooked |
| to a computer. |
|
|
| The information was intended to educate computer security personnel, |
| according to Treasury spokesmen. "Until you understand how penetration is done, |
| you can't secure your system," said Kim Clancy, the bulletin board's operator. |
|
|
| The explosion of computer bulletin boards-dial-up systems that allow users |
| to trade any product that can be expressed in machine-readable zeros and |
| ones-has also added to the ease of virus transmission, computer analysts say. |
| "I am Bulgarian and my country is known as the home of many productive virus |
| writers, but at least our government has never officially distributed viruses," |
| wrote Vesselin Vladimirov Bontchev of the Virus Test Center of the University |
| of Hamburg, Germany. |
|
|
| At first, the AIS bulletin board contained only routine security alert |
| postings. But then operator Clancy "began to get underground hacker files and |
| post them on her board," said Bruce Sterling, author of "The Hacker Crackdown: |
| Law and Disorder on the Electronic Frontier." "She amassed a truly impressive |
| collection of underground stuff. If you don't read it, you don't know what's |
| going to hit you." |
|
|
| Clancy, 30, who is a former Air Force bomb-squad member, is highly regarded |
| in the computer security world. Sterling, one of the nation's foremost writers |
| about the computer underground, called her "probably the best there is in the |
| federal government who's not military or NSA (National Security Agency). |
| Probably better than most CIA." |
|
|
| Clancy, meanwhile, is staying in touch with the underground. In fact, this |
| week, she said, she was "testing a product for some hackers." Before it goes |
| into production, she will review it to find potential bugs. It is a new war |
| dialer called "Tone-Loc." "It's an extremely good tool. Saves me a lot of |
| trouble. It enables me to run a hack against my own phone system faster" to |
| determine points of vulnerability. |
|
|
| ----------------------------------------------------------------------------- |
|
|
| [AGENT STEAL -- WORKING WITH THE FEDS] |
|
|
|
|
| IN THE UNITED STATES DISTRICT COURT |
|
|
| FOR THE NORTHERN DISTRICT OF TEXAS |
|
|
| DALLAS DIVISION |
| ----------------------------------- |
|
|
| THE UNITED STATES OF AMERICA * |
| * |
| V. * CRIMINAL NO. 3-91-194-T |
| * (FILED UNDER SEAL) |
| JUSTIN TANNER PETERSEN (1) * |
|
|
| JOINT MOTION TO SEAL |
|
|
| COMES NOW the United States of America, by its United |
|
|
| States Attorney, at the request of the defendant, and hereby |
|
|
| requests that this Honorable Court seal the record in this case. |
|
|
| In support thereof, the United States states the following: |
|
|
| 1. The case is currently being transferred to the |
|
|
| Middle District of California for plea and disposition pursuant |
|
|
| to Federal Rule of Criminal Procedure 20; |
|
|
| 2. The defendant is released on bond by the United |
|
|
| States District Court for the Middle District of California; |
|
|
| 3. The defendant, acting in an undercover capacity, |
|
|
| currently is cooperating with the United States in the |
|
|
| investigation of other persons in California; and |
|
|
| 4. The United States believes that the disclosure of |
|
|
| the file in this case could jeopardize the aforesaid |
|
|
| investigation and possibly the life of the defendant. |
|
|
| Consequently, the United States requests that this Honorable |
|
|
| Court seal the record in this case. |
|
|
| Respectfully submitted, |
| MARVIN COLLINS |
| United States Attorney |
|
|
|
|
|
|
| LEONARD A. SENEROTE |
| Assistant United States Attorney |
| Texas State Bar No. 18024700 |
| 1100 Commerce Street, Room 16G28 |
| Dallas, Texas 75242-1699 |
| (214) 767-0951 |
|
|
| CERTIFICATE OF CONFERENCE |
|
|
| The defendant joins in this motion. |
|
|
|
|
|
|
| LEONARD A. SENEROTE |
| Assistant United States Attorney |
|
|
|
|
| [The entire file of information gathered from the courts regarding |
| Agent Steal is available from Phrack for $5.00 + $2 postage] |
| ------------------------------------------------------------------------- |
|
|