| ==Phrack Magazine== |
|
|
| Volume Six, Issue Forty-Seven, File 2 of 22 |
|
|
| ***************************************************************************** |
|
|
| Phrack Loopback |
|
|
| ----------------------------------------------------------------------------- |
|
|
| G'Day, |
|
|
| You dont know who i am, and i appreciated that but i hope your read my little |
| note here and take it into consideration. |
|
|
| Ive been into the Australian Hacking Scene (if there is such a thing :-) |
| for only about 2years, but recenlty opened a h/p bbs here in Australia. |
| What i am writing and asking is if it is possilbe to place kinda an add of |
| some description in the next issue of phrack, something to the lines of:- |
|
|
| H/P bbs recently opened in Australia - JeSteRs BBS +61-7-ASK-AROUND |
|
|
| If your looking for some form of donation $$ just let me know, if your |
| wondering is his guy a fed or something, mail DATA KING and speak to him, he |
| was one of the bbs first users and as you know he has written in the Int |
| Scene for the last too issues, but wont be in Issue #47 or i would have asked |
| him to place the advertisment in this report. |
|
|
| Regards, Jesta |
|
|
| [Cool! Nice to see there's BBSs still popping up overseas. It would be |
| nice if I had the number...hell, I'd even call... but oh well, |
| I suppose I (and all the Phrack readers) will just have to "ASK-AROUND"] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Hi Erikb, |
|
|
| Last week you said you'd accept a bbs ad .. well here it is. |
| If you'd publish it in phrack i'd be most grateful! |
|
|
| A Gnu BBS! |
| 1000's h/p Related texts |
| Phrack, CoTNo, B0W, cDc, NiA, CuD, Risks,Sphear,SCAM!,NeuroCactus |
| Conferences covering Unix/VMS/System Security/Phreaking |
| And absolutely no mention of "The Information Super Highway" anywhere! |
| +617-855-2923 |
|
|
| tnx, |
| badbird |
|
|
| [I said I'd print the ad...and now I have.] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| ATTN: ALL COMPUTER WHIZ KIDZ..... I DESPARATELY NEED YOUR HELP!!! |
|
|
|
|
| Retired R.C.M.P officer formerly involved with priority levels of |
| electronic surveillance has informed me that my residential telephone |
| appears to have been compromised at a point other than inside or |
| immediately outside my residence. |
|
|
| After an intensive evaluation of the premises his conclusion was that |
| remote manipulation of the telephone company switch where my circuit |
| could be victim was the problem. |
|
|
| The main focus of this exercise is to show how one can infiltrate a |
| telephone company's network; remotely manipulate the company's switch; |
| process long distance calling;make it appear that the calls originated |
| from a particular site and then "fooling" the company's billing |
| mechanisms to invoice that particular location. |
|
|
| Is this physically possible? Bell Canada categorically denies this |
| possibility. I need proof! How is it done? |
| Please advise as soon as possible. |
|
|
| I'd sincerely appreciate any help, advise and/or information anyone out |
| there can offer in this particular situation. |
|
|
| Please leave a way to get in touch! If you prefer to remain unknown, |
| thanks a million, and rest assured that I WILL RESPECT and PROTECT you |
| anonimity. |
|
|
| Regards, |
|
|
| John P. Marinelli jmarinel@freenet.niagara.com |
|
|
| [My take on this is that with relative ease, someone could establish |
| call forwarding on a line, make it active to some remote location, and |
| call the original number numerous times, causing the owner of the |
| hacked line to be billed for all the calls to the forwarded location. |
|
|
| If anyone knows how to do this, STEP BY STEP on a DMS-100, please, |
| contact Mr. Marinelli to help him out with his court case. I don't |
| know a whole lot about NT equipment, so I don't know the |
| specifics of how this may have happened, only the generalities. |
|
|
| Wouldn't it be nice to have the Underground "HELP" someone out |
| for a change?] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| y0, Black Flag here... heres the info you told me to mail you about the |
| GRaP/H (Gainesville Regional Association of Phreakers and Hackers) meetingz |
|
|
| Gainesville, FL |
| 1st + 3rd Saturday of the month, 4pm - ??? |
| meet in The Loop on 13th Street |
| Black Flag will be casually carrying a 2600 |
| look around, you'll see him. |
|
|
| [Well, looks like the Florida Hackers have a new place to congregate. |
| And so do the Florida FBI Field Offices. :) ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| I was wondering where I could find any virus authoring tools for the PC, |
| Unix, or VMS. |
|
|
|
|
| [You can find Nowhere Man's Virus Creation ToolKit on BBSs around the |
| globe. Have you looked??? I've never heard of UNIX or VMS virus tools. |
| Do you know something I don't? Do you know how a virus works? ] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
| Chris, found something you might like. Here's an ad from the latest |
| PHOENIX SYSTEMS catalog: |
|
|
| THE CALLER ID BLOCKER FIRST TIME AVAILABLE IN THE U.S. |
|
|
| By April, 1995 all telephone companies must deliver callers name and |
| telephone number to the caller ID system. The law prohibits any telephone |
| company from offering customers an option to permanently disable their line |
| from the ID system. |
|
|
| This means that even if you have an unlisted number, everyone you call will |
| now have your telephone number and name. Big brother is now one watching, |
| now he has your name and number. No more anonymous calls to the IRS, city |
| hall, real estate agents, car dealers, health department or anyone. Many |
| business professionals use their home telephone to return calls. Do you |
| want your patients and clients to have access to your home telephone number? |
|
|
| We are proud to bring you the unique ANONYMOUS 100. It installs on any |
| telephone in seconds and completely KILLS THE EFFECTS OF "CALLER ID"! Yes, |
| you can have your privacy back. The ANONYMOUS 100 is FCC approved and |
| carries a one year guarantee. |
|
|
| #1276...............................................................$69.95 |
|
|
| Is it just me, or is this a load of bullshit? Didn't CA and TX both pass |
| laws to make CLID illegal in those states? I know that before MA would |
| allow it in the state, they told the telco that line blocking had to be |
| offered free (and it is, on per/call and permanent basis). Did the feds |
| pass this new law while I was sleeping, or is this company just playing on |
| paranoia (not the first time) and trying to make a buck? |
|
|
| Eric |
|
|
| [Well Eric, it looks to me that this is a nifty little box that waits for |
| voltage drop and immediately dials *67 before giving you a dialtone. |
| Woo Woo! $69.95! It certainly is worth that to me to not have to dial |
| 3 digits before I make a call. All that wear and tear ruins the |
| fingers for typing. PFFFT.... |
|
|
| About Caller-ID, well, it's legal just about every place I know of. |
| I'm sure there are a feel hold-outs, but offering per-line blocking for |
| individuals worried about privacy satisfied most Public Utility |
| Commissions. In fact, I think April 1 was the date that all Interconnects |
| were supposed to be upgraded to support the transfer of CLID information |
| over long distance calls. I don't think this has been turned on everywhere, |
| but the software is supposed to be in place. |
|
|
| *67. Don't dial from home without it.] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| This message serves a multifold purpose: |
|
|
| (these response/comments are in referance to Phrack Issue 46 - Sept 20 1994) |
|
|
| A) |
|
|
| A question was brought up concerning a Moterola Flip Phone and the user |
| inability to gain access to the programing documentation. I happen to |
| own (legally) a Motorola Flip Phone that I will assume to be the same and |
| I was not given the documentation either, though I have not tried asking |
| for it. I will call Motorola and ask for *my* rightful copy and foreward |
| my results (if I gain access) to phrack for proper distribution amoung |
| appropriate channels. If I do not gain access, I would appriciate to |
| hear from anyone who has (this should not be limited to simply the M. |
| Flip Phone, I have interests in all areas). |
|
|
| B) |
|
|
| Later in that issue (Sept 20, 1994) a list of university and colege |
| dialups were provided... I live in the 218/701 (right on the border) and |
| have a collection of them for addition to the list if you (or anyone |
| else) should so desire. I would post them now, but I have limited time |
| and have to dig to find them. I also have some numbers that some readers |
| may find of interest. |
|
|
| C) |
|
|
| My living in the 218/701 is the main reason for my writting. I used to |
| live 612 and knew a lot of people in the area, but now I am stuck here in |
| a little shit town (pop. 7000) where the cloest thing to a computer is |
| made by John Deere. I need to find someone in the 218 or 701 to work |
| with or meet... if you know anyone...??? The closest BBS is long |
| distance and even then it's crap... I would like to start my own, but who |
| the fuck would call? Who the fuck would I invite? My old H/P friends in |
| 612 would, but I don't need the heat as they would all go through 950's |
| or some other method... I think you understand. |
|
|
| any help would be greatly appreciated By the way I could also use some |
| 218/701 ANAC or CN/A... any help here? |
|
|
| Aesop |
|
|
| [In order: |
|
|
| a) Good luck with Moto. You'll need it. |
| b) Yes, I really still need your university dialups. Issue 48 will |
| have a much more complete list (I hope!) |
| c) If anyone knows any bbs'es in those area codes, please send |
| them in so I can pass along the info. |
|
|
| Other) For CNA information, just call your business office. They ALWAYS |
| help. Especially if you mention that CNA didn't have a current |
| record. :) ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| To whom it may concern at phrack, I would like to subscribe to Phrack. I |
| didn't use PGP because :- |
|
|
| i. I never had any real need to |
| ii. I came across the document below while dinking around with gopher. I |
| would pretty much guess phrack knows about it already. If you do know about |
| it, could you tell me another way to ensure my mail privacy? |
|
|
| Thank you. |
|
|
| Xombi. |
|
|
| ---------------------BEGIN E-MAIL DOCUMENT--------------------- |
|
|
| This section is from the document '/email-lists/Funny'. |
|
|
| A lot of people think that PGP encryption is unbreakable and that the |
| NSA/FBI/CIA/MJ12 cannot read their mail. This is wrong, and it can be a |
| deadly mistake. In Idaho, a left-wing activist by the name of Craig Steingold |
| was arrested _one day_ before he and others wee to stage a protest at |
| government buildings; the police had a copy of a message sent by Steingold |
| to another activist, a message which had been encrypted with PGP and sent |
| through E-mail. |
|
|
| Since version 2.1, PGP ("Pretty Good Privacy") has been rigged to |
| allow the NSA to easily break encoded messages. Early in 1992, the author, |
| Paul Zimmerman, was arrested by Government agents. He was told that he |
| would be set up for trafficking narcotics unless he complied. The Government |
| agency's demands were simple: He was to put a virtually undetectable |
| trapdoor, designed by the NSA, into all future releases of PGP, and to |
| tell no-one. |
|
|
| After reading this, you may think of using an earlier version of |
| PGP. However, any version found on an FTP site or bulletin board has been |
| doctored. Only use copies acquired before 1992, and do NOT use a recent |
| compiler to compile them. Virtually ALL popular compilers have been |
| modified to insert the trapdoor (consisting of a few trivial changes) into |
| any version of PGP prior to 2.1. Members of the boards of Novell, Microsoft, |
| Borland, AT&T and other companies were persuaded into giving the order for |
| the modification (each ot these companies' boards contains at least one |
| Trilateral Commission member or Bilderberg Committee attendant). |
|
|
| It took the agency more to modify GNU C, but eventually they did it. |
| The Free Software Foundation was threatened with "an IRS investigation", |
| in other words, with being forced out of business, unless they complied. The |
| result is that all versions of GCC on the FTP sites and all versions above |
| 2.2.3, contain code to modify PGP and insert the trapdoor. Recompiling GCC |
| with itself will not help; the code is inserted by the compiler into |
| itself. Recompiling with another compiler may help, as long as the compiler |
| is older than from 1992. |
|
|
|
|
| [Well, uh, gee, I think the fact that this document came from |
| /email-lists/Funny speaks for itself. I'm satisfied with PGP |
| for security, but then again, I don't have a lot of information that |
| I'm so petrified that I need to keep it encrypted, or that I send |
| out in email that I don't care if anyone sees. |
|
|
| To put aside some of your fears, I personally feel that PGP is ok. |
| If the trilateral commission wants your info, they will beat it out |
| of you with sticks, with the help of several multi-jurisdictional |
| task-forces for Federal law enforcement, while you are under the influence |
| of incredibly terrifying and long-lasting hallucinogenic drugs. |
|
|
| Don't worry.] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
| Here is a BBS Ad for your next issue: |
|
|
| BBS Name: The King's Domain |
| Sysop: Ex-Nihilo |
| Speeds: 1200-14,400 |
| BBS Type: Remote Access 2.02+ |
| Phone #: 208-466-1679 |
|
|
| THe BBS has a good selction of "Hood" files... (hacking/phreaking/anarchy) |
| journals such as cDc, Phrack, ATI and more... also a good selection of |
| BBS files which include Doors and Utilities... primarily RA accessories, |
| but not exclusively... supports rip graphics and is online 24 hrs a day |
|
|
| [Yet another ad! Is this the rebirth of BBS-dom?] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| [Editor's Note: I got a letter asking me about how to credit card |
| merchandise. I replied that I didn't agree with carding, and that |
| if the reader really wanted something, he/she should get a job and buy it. |
| This is the response I got.] |
|
|
|
|
| What the fuck? All I wanted was a fucking decent reply. Get a job, huh? |
| You know, I thought if you were to talk to one of these supposed |
| "computer hackers" you could get some usefull information. Get a job, that |
| rich coming from someone like you. |
|
|
| When there's something you want...take it...without using your money. |
|
|
| Maybe sometime I'll be able to takl to a hacker not some fucking |
| hypocritical computer geek |
| |
|
|
| [Editor's Note: I replied to this letter by stating that carding had nothing |
| to do with hacking, that it was out and out stealing, and although |
| we had published articles about it in Phrack, I wasn't going to help anyone |
| do it, and that he/she should try to contact the authors of various |
| carding articles directly. This is the response that got.] |
|
|
| Come on now "Chris", you can do better than that, can't you? |
| Stealing? Who's the thief here, eh? See, when I wake up in the morning, |
| I don't have to worry about secret service, police, or any sort |
| of military shit being in my apartment. I don't get busted for doing stupid |
| things like stealing phone calls off fucking 900 numbers. I think I |
| know exactly why you don't card anything - because you're too fucking stupid |
| or don't even have the balls to do it. Fuck, you'd expect someone like |
| yourself to have different views about being a thief. Well, I guess it |
| takes a certain kind of person to hack into shit like you, but why this |
| person would start flame wars and otherwise just be a total fuckup, I don't |
| know. Or, maybe it's just the singular person I'm talking too, yeah, that's |
| probably i...there probably are other, BETTER, hackers who aren't as |
| fucking arrogant as you. |
|
|
| Well, have fun with your hands and PLAYGIRL's, you fucking little punk-ass |
| faggot. |
|
|
| And tell your mother that I won't let this affect our relationship. |
|
|
| Punk |
|
|
| aj276@freenet3.carleton.ca |
|
|
| [This is the future of the computer underground??] |
|
|
| ----------------------------------------------------------------------------- |
|
|
|
|
| BBS AD: |
|
|
| System is called CyberSphincter (playing off of the current word trend of |
| cyber). The number is 717-788-7435. The NUP is 0-DAY-WAR3Z!!! |
| Modem speeds of 14.4 and lower, with no ANSI. Sysop is Ha Ha Ha. |
|
|
| It's running renegade (we know it can be hacked and I've done it already), |
| but we seem to believe in honor among thieves, so try to control yourself on |
| that. |
|
|
| -=strata=- |
|
|
| [ANOTHER AD!] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Hey Erik B... |
|
|
| I'm the remote sysop at the Digital Fallou BBS in 516. Just recently, |
| we've been getting a rash of ld callers. A day or two ago, a guy with |
| the handle "Digi-Hacker" applied. His application looked good, execpt that |
| he stated his alter handle was "Eric Bloodaxe" and that he was the editor |
| of Phrack. Now, any lame ass could just "say" that, and we don't want any |
| liars on board. :) So we decided to go right to you thru email. Did you |
| apply? If so, cool. If this isn't you, that guy is gonna most assuredly |
| be deleted.. |
|
|
| [Well, I hate to say it, but I don't have time to do much of anything |
| anymore. I certainly don't call bbses with any regularity. I |
| do have accounts on SECTEC and UPT, but that's it. I may call some |
| in the future, but for the most part I don't have any time. If someone |
| calls up a bulletin board and applies as "Erik Bloodaxe" it isn't me. |
| (Anyone saying they are Eric Bloodaxe MOST CERTAINLY isn't me. :) ) |
|
|
| Anyone running BBSes may want to take note of this, so they don't get |
| swindled into giving "elite" access to some pretender. You can |
| always email phrack@well.com and ask me if I have applied to your |
| bbs. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Chris, |
|
|
| I know you don't know me, but I figured you of all people could help me, |
| and give me an answer quickly. |
|
|
| I just got my phone bill, and on the last page is a page from some |
| company calling themselves Long Distance Billing Co., Inc. It has |
| one call "Billed on behalf of Northstar Communication" It is a call from |
| somewhere in FL, for 13 minutes, costing 51.87. I called LD Inc, and they |
| said the call was a collect call made from Northstar Comm, and that |
| my only recourse was to write a letter to Northstar. Needless to say, I |
| did not accept the collect call, I don't know anyone in 813. I called |
| NYNEX, and they said I should write to Northstar and LD INC, but didn't |
| seem to know anything about either company. They guy I talked to said it |
| was real strange that LD INC didn't give me a number to call at |
| Northstar, since most of this type of thing is handled by phone. I'm |
| beginning to wonder exactly how relieable this LD INC company is, who |
| Northstar is, and most of all who called and how the hell the call was |
| supposedly accepted by my phone. This is all the info I know: |
|
|
| BILLED ON BEHALF OF NORTHSTAR COMMUNICATION |
|
|
| 1. SEP 18 923PM COL CLEARWATER FL 813-524-5111 NC 13:00 51.87 |
|
|
| --From my phone bill |
|
|
| Northstar Communication |
| 3665 East Bay Drive |
| Suite 204-192 |
| Largo, FL 34641 |
|
|
| --From LD INC |
|
|
| Long Distance Billing Co., Inc. |
|
|
| 1-800-748-4309 |
|
|
| --From NYNE phone bill. |
|
|
| If you can think of anything I can do, I;d be really greatful. I don't |
| have $50 to throw away on a call I never got, and I don't have the |
| resources you do to try and figure out who the hell these people are. |
|
|
| [It looks to me like you got fucked by someone in Florida using a COCOT |
| payphone. It's kind of odd that NYNEX couldn't help you more...but anyway, |
| I wouldn't pay it. |
|
|
| What I suspect happened was that somsone used one of those handy COCOT |
| services where the operators are incredibly stupid and allow calls |
| to be accepted when the "calling party" says "YES" to allow a 3rd party or |
| collect call, rather than the party being called. This happened to me at |
| my previous work extension by New Yorkers using the ENCORE service (even |
| though all our lines were listed to refuse 3rd party and collect calls.)] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| I've been having some trouble with the law, so all my notes are stashed at |
| a friend's casa at the moment. Can you recommend a good lawyer to defend me |
| for allegedly hacking some government computers? I've got a good crim def |
| guy working with me right now assisting me guring questioning from Special |
| Agents, but I will need someone that has experience if I get indicted. |
|
|
| [If you are facing computer crime charges, you are definately in |
| a world of hurt. There are very few computer crime-savvy lawyers |
| practicing in the World. The only thing I can suggest is that |
| you call EFF, CPSR or EPIC and ask them if they know of any |
| lawyers in your area that they can refer you to. None of these |
| groups will help you directly, except under EXTREME circumstances, and |
| only if you have been falsely accused, or have had rights violated. |
| If you are guilty, and the cops have any evidence, you are going to be |
| convicted. |
|
|
| Remember Baretta? "If you can't do the time, then don't do the crime."] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
| Dear Chris, |
|
|
| You probably don't remember me, but we corresponded about 3 years |
| ago as part of my PhD research. I was at Edinburgh University |
| at the time and am not at UMIST in Manchester (British equivalent of MIT). |
|
|
| The reson I'm writing is that I was awarded my PhD last March, and for one |
| reason and another I've been sidetracked into a completely different field |
| of research - the British National Health Service and the various ways |
| computers are being used in it. |
|
|
| I tried getting a publisher interested in the thesis, but with little luck. |
| I also sent it to Jim and Gordon at CuD on disk for them to stick it on |
| archive, but they had problems with the formatting of it and don't seem to |
| have got round to archiving i. |
|
|
| If you're interested I'd be quite happy to send a couple of disks to you |
| and you can spread it around as you want. It just seems a shame for the people |
| on the net not to get a look at it. It's dressed up in airy-fairy sociological |
| language - but there's still lots in it that I think would be of interest to |
| people on the net. I saw your interview in CuD, and I agree with you about |
| most of the books written on the CU. Mine has its faults but it's got less |
| biographical data and more issue-oriented stuff. |
|
|
| Anyway, get in touch and let me know if I can find a good home for my magnum |
| opus. |
|
|
| Take care and a belated thanks for all the time you spent in helping me with |
| the PhD. |
|
|
| Best Wishes, |
|
|
| Paul Taylor |
| School of Management |
| UMIST |
|
|
| [Paul: |
|
|
| Congrats on your PHD, and continued success at UMIST! |
| I'm putting your thesis up on the Phrack WWW page so that more |
| people can get a look at it! |
|
|
| Thanks for sending it!] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| I read your article on hacking the French among other foreign governments. |
| Sounds pretty fun, just for kicks the other night I did a search of all the |
| computers I could get at in China. One of them was a national power grid |
| computer. Sounds like it could be fun to play with huh? The "They Might Kill |
| Us" part will tend to turn some people off, but not me. |
|
|
| [WOW! A National Power Grid Computer! In China! Gee. How many times |
| have you seen Sneakers? Take the tape out of your VCR, slowly run |
| a rare-earth magnet over it and set it on fire. |
|
|
| On the other hand, if you were at least partally serious about the |
| hacking for America, keep your eyes open.] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
| Erikb, |
|
|
| Regarding your article in Phrack 46, we here in Columbus would |
| just like to say that everything except for the Krack Baby's phone number, |
| which long since went down, and the Free Net template, is total and utter |
| bullshit. The Columbus 2600 meetings were NOT started by Fungal Mutoid, he |
| is just responsible for a much larger turnout since about September (94), and |
| whoever wrote that has obviously not been to a Columbus meeting recently. |
| The Columbus 2600's have been here for quite a while, but bacause the H/P |
| scene consists of 15 people AT THE MOST, many of which haven't the time to |
| attend, the turnout is almost always low. I believe the most that have ever |
| shown up to a meeting is 10, which dwindled to 8 or so before the |
| meeting was officially half-over. Nobody knows who wrote the article which |
| you printed, although no one has been able to contact Fungal Mutoid to ask him. |
| Just thought we'd clear a few things up, and to those that don't give two |
| flying shits, we're sorry to have to bring this into a E-mag as great as |
| this. |
|
|
| Sincerely, |
|
|
| H.P. Hovercraft and |
| the Columbus H/P Gang |
|
|
| [Thanks for the letter. Like I always say, I can only report and print what |
| I'm told or what is sent to me. I don't live anywhere but Austin, TX, so |
| I don't know the intimacies of other areas. Thanks for sending in your |
| comments though!] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Haiku |
|
|
| Operator hi |
| who is it that sets my phone |
| on redial and tone |
|
|
| gives me rest in times |
| great stress lays its head on my |
| leads me into joy |
|
|
| cosmos and mizar |
| give evidence and homage |
| to your greatness, why |
|
|
| logon/password |
| on your very first try shall |
| succeed, as always |
|
|
| oh, A T and T |
| while great, holds non to the great |
| power that NYNEX |
|
|
| gives access to in |
| glee, awaitnig, cautiously, |
| for signs of entry |
|
|
| illicitly thus |
| strives to maintain control of |
| the ESS switch, |
|
|
| not comprehending |
| that control is simply gained |
| by a single call |
|
|
| to some stupid yet |
| revered operator who |
| believes you in charge |
|
|
| gives out system pass |
| with some small feat of trick'ry |
| PAD to PAD, too, works |
|
|
| sounding of the baud |
| with modem and coupler |
| connection is made |
|
|
| who is to question |
| the incidence of this fault |
| or acknowledge it |
|
|
| security's words |
| false threats followed by arrest |
| on illegal grounds |
|
|
| hackers, phreakers grieve |
| free the unjustly accused |
| give them freedom to |
|
|
| ROAM with cellular |
| phones place to place with no charge |
| test the system's worth |
|
|
| find holes, detect bugs |
| run systems by remote, yea, |
| to explore, to seek, |
|
|
| to find a network |
| of free bits and bytes unharmed-- |
| innocently seen. |
|
|
| who doesn't know that |
| Bell or Sprint or MCI |
| would never approve-- |
|
|
| believe in 'puter crime, |
| toll fraud, "access devices," |
| free calls to Denmark |
|
|
| Information is |
| power is imperative |
| proprietary |
|
|
| please, spare me the grief |
| accusations being thrown |
| of phone co. crashes |
|
|
| are fiction unleashed |
| to the ignorant public |
| eye to make blame, fear |
|
|
| all phr/ackers, but all |
| have had their days and faded |
| into the past, why |
|
|
| must ignorant block |
| the free flow of knowledge found |
| angry sysops abound |
|
|
| secret service rais |
| hoisting games, computers, phones |
| never to be re- |
|
|
| turned hackers, phreakers |
| working for government, spies, |
| lies, deception, all |
|
|
| to walk free while friends |
| spend years in jail for simply |
| battling for some change |
|
|
| knowledge is NOT free |
| equipment costing milliions, |
| simply cannot pay |
|
|
| the cost for systems |
| of signal switching; no on e |
| wants to harm, just try |
|
|
| to use our knowledge |
| in a constructive way and |
| look around for things |
|
|
| which further know-how |
| of packet switching, ANI, |
| proctor tests and tones |
|
|
| which make little sense |
| and why is it there, what are |
| all the test lines for? |
|
|
| central office trash |
| provides some clues, while phone calls |
| get angry response |
|
|
| to inquiries re: |
| loops and lack of barriers, |
| COCOT carriers |
|
|
| who overcharge cause |
| frustraton, must be helped |
| end overbilling |
|
|
| unfairness is only |
| people not understanding |
| nor comprehending |
|
|
| that what we do is |
| NOT always fraud, vengeance or |
| deceitful reasons |
|
|
| bu for love of the |
| systems, curiosity's |
| overwhealming need |
|
|
| to be met and to |
| feel accomplished, proud, to |
| do and know something |
|
|
| WELL crackers abound |
| pirates do multiply, spread |
| wavez of warez cross coasts |
|
|
| and foreign countries |
| virus creators seeking |
| escape, growth, freedom |
|
|
| not for destruction |
| but for change, to press limits |
| to find that which makes |
|
|
| us whole, complete, and |
| accomplished at crossing |
| the barriers that |
|
|
| bound conventional |
| people in dead-end jobs with |
| little self-esteem. |
|
|
| hacking, phreaking, it |
| is an art form, and a quest |
| for endless reaches |
|
|
| to seek, to explore, to |
| realize and accomplish, to |
| take chances and live |
|
|
| not for rules and laws |
| but for what things should be but |
| will not come to pass. |
|
|
|
|
| --kyra |
|
|
| [Uh oh, we're getting pretty literary here. I can see it now: |
|
|
| Phrack Magazine. For the Sensitive Hack/Phreak. |
|
|
| Interesing poem tho...] |
|
|
|
|
| ----------------------------------------------------------------------------- |
|
|
| Dear Editor of Phrack Magazine; |
| Ok Erik (mr. editor), there is also a poem that I have written for Wei. |
|
|
| "Thinking of Ding Wei" |
| (C) 1994, 1995 Oliver Richman. |
|
|
| Come here, let me tell you something, |
| How I hide my love for Wei Ding: |
| By forgetting all my thinking! |
|
|
| When in my mind Wei's heart I see.. |
| I want to tell her "wo ai ni", |
| So her and I will always be. |
|
|
| Her mind is pure, like pretty Jade.. |
| She makes me want to give her aid. |
| I know that her love will not fade. |
|
|
| My patience tries to move the sea. |
| But can I deny you and me? |
| I want our hearts to set us free. |
|
|
| I really love you, dear Ding Wei, |
| I think about you every day. |
| Tell me, what more can I say? |
|
|
| [What's this? Another Poem? A tribute of Love for some chick named Wei? |
| Holy Lord. We need to get some codes or credit cards or something in here |
| to offset this burst of "Heartfelt Emotive Print." ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| the other day upon the stair |
| i met a man who wasn't there |
| he wasn't there again today |
| i think he's from the CIA |
|
|
|
|
| [NOW THIS IS MY KIND OF POETRY! SHORT, SIMPLE, AND FUNNY. |
| WHATEVER HAPPENED TO BENNETT CERF???] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| As a former AOLite and definite wannabe, and having d/l the log of |
| the Rushkoff/Sirius hypechat, I could tell from the beginning that it |
| would be just as you reviewed _Cyberia_ as being. Every other word |
| Rushkoff used was Cyberia or Cyberians. As lueless and vulnerable to hype |
| as I was, I couldn't help but stand back and listen to all the shit with a |
| grin. In the same not, I ran into David Brin on AOL as well, and managed |
| to get a correspondence goig with him. He was on discussing all the |
| research he did on the "Net" and about the papers he was delivering, and, |
| most importantly (of course), his upcoming BOOK about the Internet and |
| privacy. At the time, still under the glossy spell of Wired (which I still |
| find interesting) and the hype, I was eager to offer him an interview |
| proposal, which I would have published in Wired if at all possible. |
|
|
| Dr. Brin knew less than *I* did about the Internet. I can sum up most of |
| these people's vocabularies in one word: "BLAH." They may as well |
| reiterate that syllable ad infinitum--it amounts to the same thing. |
|
|
| [WOW! |
|
|
| Hey Cyber-guy, thanks for the super-cyber email. As we cruise along this |
| InfoBanh, exiting in Cyberia, it takes a diligent cyberian like you |
| to keep things in check! |
|
|
| Sorry bout that. I was overcome with a minor brain malfunction that |
| reduced my IQ to that of Douglas Rushkoff. Doesn't it all make you want |
| to puke? |
|
|
| I heard that yesterday on the soap opera "Loving" some character was hacking |
| into food companies to steal recipes. A month or so back, on "All My |
| Children" (The only soap I watch...but I'm embarrassed to say I watch it |
| religiously), Charlie & Cecily were dorking around on the Internet, and |
| sent each other email after reading notes they each left on alt.personals. |
|
|
| The world is coming to an end.] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Yo erikb: |
|
|
| yo dewd. eye am so paranoid, my t33th are rattling. |
| what dewd eye dew? |
| yew are the god of the internet. |
| how dew eye stop the paranoia? |
| please print answer in next phrack. |
| thanx. |
| m0fo |
|
|
| [Your Acid will wear off in a few hours. Don't worry. Enjoy it. |
| The CIA does. |
|
|
| If it doesn't go away in a few days, there are some nice men in |
| white lab coats who will be glad to help you out. |
|
|
| How do you stop the paranoia? Your answer: Thorazine!] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| This is Nemo Kowalski speaking (aka Paolo Bevilacqua). |
| I just discovered Phrack at the young age of 31. ;-) |
| Well, I like it a lot, at least like I enjoyed doing real |
| things here in Europe, alone and with DTE222, years ago. |
| I'm going to write something about the first anti-hacker operation |
| in Italy, "Hacker Hunter," in which, incidentally, I got busted. |
| Do you think your some of the old stories from altger and Itapac |
| can be of interest to your readers? |
|
|
| To Robert Clark: |
|
|
| I read "My Bust" and I liked it. I'm not a native english speaker, |
| but I think it was well-written, plus principally, I felt a pleasant |
| "reader sharing writer's experiences" sensation that can separate a good |
| reading from pure BS. This is expecially true since I've been busted here |
| in Italy, and I've learned that things are more similar around the |
| western world than I would have thought. |
|
|
| The only thing I can't share is your Seattle experience. Maybe the dichotomy |
| good druge/bad drugs has a different meaning for you? |
|
|
| Respect, |
|
|
| Nemo |
|
|
| [Nemo: |
|
|
| Please write as much or as little as you like about the busts in |
| Italy! We have an article this issue about Italy, but any further |
| insights into your experiences, esspecially regarding how busts |
| are carried out in other countries would be greatly appreciated by |
| our readers! |
|
|
| I look forward to reading whatever you can put together!] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Chris, |
|
|
| As a relative neophyte to hacking, one of the problems I come up with a |
| lot is identifying systems I locate scanning. So, I was wondering if Phrack, |
| or any other zine, had ever published a concise guide to clues to |
| help identify unknown systems. If so, could you please let me know what |
| mag, and what issue. |
|
|
| One last thing, are there any internet sites with info of interest to hackers? |
| I know about eff.org and freeside.com and a few others, but nothing really |
| intriguing...any suggestions? |
|
|
| [You will find a good start to identifying strange systems, and in |
| locating sites of interest to hackers in the #Hack FAQ we've printed |
| in this issue. ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| For Phrack news, Darkman was busted in Winnipeg City, Canada, for various |
| reasons, but since I knew him personally I wanted to add my two cents. |
| For the record, he was busted for warez and porn as well as hacking into the |
| UoManitoba, and I heard his wife left him because he spent too much time |
| pirating on IRC. He was about 38. He could read fluently in Russign, and |
| I remember one night we discovered some secret KGB documents from the 50's, |
| real science fiction thriller stuff, and he read it to me. |
|
|
| Akalabeth |
|
|
| [It's a drag that your friend was busted, and knowing the Canadian |
| government, the porn part was probably pretty minor shit in a worldly |
| sense. |
|
|
| I'm kinda intrugued by the "KGB Documents" you found. Uh, were these on |
| the net? Did you have a cyrillic character set loaded? How did you |
| read these documents? Were they on paper? |
|
|
| SEND THEM TO PHRACK! :) ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Top 10 Reasons Why I Should Get My Subscription FREE: |
|
|
| (1) I'm a programmer/Analyst for an electric utility company in Texas |
| (ahh, come on - I'm a fellow Texan!) |
|
|
| (2) I've read Phrack for years (loyalty scores points - right?) |
|
|
| (3) I've been involved with compuers since GOD created the PC |
| (I began in late 70's-early 80's). |
|
|
| (4) I'm *not* a narc (shh, don't tell anybody.) |
|
|
| (5) I *may* have a record (but if I do, it's for minor kind of stuff - |
| I'm basically a nice guy). |
|
|
| (6) I don't like the telephone company (you have to admit they're amusing |
| though.) |
|
|
| (7) I know how to get around on the 'net (can't you tell - I have an AOL |
| account <g>.) |
|
|
| (8) I'm a good source of info regarding all types of mainframe and PC |
| programming. |
|
|
| (9) PLEASE.... |
|
|
| (10) I'll quit writing dumb letters and trying to be funny. |
|
|
| [David Letterman is in the background throwing up as I'm typing |
|
|
| Don't quit your day job...but I'll send you Phrack anyway. :) ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
| Hey Chris, |
|
|
| I just read your thing in Phrack abou the US being attacked by our so |
| called "allies" and I agree with you 110%! I do believe that we should start |
| some sort of CyberArmy to fight back. I don't think that our government |
| would mind, unless we crashed an economy that they were involved with or |
| something, but hell, they fuck with us, let's fuck with them. And you were |
| saying about phone costs, isn't it possible to just telnet or something over |
| there? And why stop at fighting back against our information agressors, why |
| not fight back against other countries that our government is too chickenshit |
| to fight against? Cuba comes to mind. Well, I hope you reply or something, I |
| really like Phrack, I try to get it whenever I can manage, but I don't |
| have an internet address where I can get files. Keep up the good work. |
|
|
| [Yet another volunteer for the US Cyber Corp! By God, I'll have |
| an army yet. :) ] |
|
|
| ----------------------------------------------------------------------------- |
|
|
|
|
| ==Phrack Magazine== |
|
|
| Volume Six, Issue Forty-Seven, File 2a of 23 |
|
|
| ***************************************************************************** |
|
|
| Phrack Editorial |
|
|
| What you are about to read is pure speculation on my part. Do not take |
| this to be 100% fact, since most of it is hypothesis. But it sure will |
| make you think twice. "Ever get the feeling you're being cheated?" |
|
|
| ----------------------------------------------------------------------------- |
|
|
| So...Mitnick was busted. |
|
|
| There certainly are some really odd things regarding the whole mess, |
| especially with regards to the "investigating" being done by |
| a certain heretofore unheralded "security" professional and |
| a certain reporter. |
|
|
| One of the first oddities was the way the Mitnick saga suddenly |
| reappeared in the popular media. In February, and seemingly out of |
| nowhere, the ever diligent John Markoff entered the scene with the |
| a groundbreaking story. (Of course this is meant to be sarcastic as |
| hell.) Markoff's story dealt with a near miss by federal authorities |
| trying to apprehend Mr. Mitnick in Seattle about 5 months prior. |
|
|
| Now, if nothing else happened in the whole Mitnick saga, I never would |
| have given this a second thought, but in light of what followed, |
| it really does seem odd. Why would someone write about a subject that |
| is extremely dated of no current newsworthiness? "Our top story tonight: |
| Generalissimo Francisco Franco is still dead." |
|
|
| To be fair, I guess Markoff has had a hard on for Mitnick for ages. |
| Word always was that Mitnick didn't really like the treatment he got |
| in Markoff's book "Cyberpunk" and had been kinda screwing with him for |
| several years. (Gee, self-proclaimed techie-journalist writes something |
| untrue about computer hackers and gets harassed...who would have thought.) |
| So it really isn't that odd that Markoff would be trying to stay abreast |
| of Mitnick-related info, but it certainly is odd that he would wait |
| months and months after the fact to write something up. |
|
|
| But wait, a scant month and a half later, Mitnick gets busted! Not |
| just busted, but tracked down and caught through the efforts of a |
| computer security dude who had been hacked by Mitnick. Breaking the |
| story was none other than our faithful cyber-newshawk, John Markoff. |
|
|
| "Tsutomo Shimomura, born to an American mother and a Japanese father, |
| thus becan life as he was destined to live it...going in several |
| directions at once. A brilliant neurosurgeon, this restless young man |
| grew quickly dissatisfied with a life devoted solely to medicine. |
| He roamed the planet studying martial arts and particle physics, |
| colelcting around him a most eccentric group of friends, those |
| hard-rocking scientists The Hong Kong Cavaliers. |
|
|
| "And now, with his astounding jet car ready for a bold assault on the |
| dimension barrier, Tsutomo faces the greatest challenge of his turbulent |
| life... |
|
|
| "...while high above Earth, an alien spacecraft keeps a nervous watch on |
| Team Shimomura's every move..." |
|
|
| Wait a minute...that's Buckaroo Banzai. But the similarities are almost |
| eerie. Security dude by day, hacker tracker by night, ski patrol |
| rescue guy, links to the NSA! WOWOW! What an incredible guy! What an |
| amazing story! |
|
|
| But wait! Let's take a closer look at all of this bullshit, before it |
| becomes so thick all we can see is tinted brown. |
|
|
| Shimomura was supposedly hacked on Christmas Eve by Kevin Mitnick, which |
| set him off on a tirade to track down the guy who hacked his system. |
| Supposedly numerous IP tools were taken as well as "millions of dollars |
| worth of cellular source code." |
|
|
| First off, Shimomura's TAP is available via ftp. Modified versions of this |
| have been floating around for a while. I suppose it's safe to assume that |
| perhaps Tsutomo had modified it himself with further modifications (perhaps |
| even some of the IP/localhost spoofs that the X-consortium guys were |
| playing with, or maybe other tricks like denial of service and source-routing |
| tricks...I don't really know, I don't have any such thing authored by |
| Shimomura.) |
|
|
| Secondly, what is all this cellular source code? And why did Shimomura have |
| it? Could it be that this is really just some kind of smokescreen to make |
| it seem like Mitnick did something bad? For those of you who don't know, |
| Tsutomo is friends with Mark Lottor (yes, the OKI experimenter, and CTEK |
| manufacturer.). They have been friends for some time, but I don't know |
| how long. Lottor used to be roommates with, lo and behold, Kevin Poulsen! |
| Yes, that Kevin Poulsen...the guy who before Mitnick was the "computer |
| criminal de jour." Poulsen and Mitnick were no strangers. |
|
|
| It wouldn't be too much of a stretch of the imagination to think that |
| those files were really ROM dumps from phones that Lottor had given |
| Shimomura. It also wouldn't be too much of a stretch to imagine that |
| Mitnick knew Tsutomo, and decided to go poke around, pissing off |
| Tsutomo who knew that he'd been violated by SOMEONE HE ACTUALLY KNEW! |
| (It sure does piss me off much more to get fucked over by someone I know |
| rather than a complete stranger.) |
|
|
| Woah. If any of that is true, what strange bedfellows we have. But wait, |
| it gets better... |
|
|
| Enter John Markoff. Markoff and Tsutomo have obviously known each other for |
| a while. I don't know where they met...but I know they were together |
| at Defcon, maybe at Hope, and probably at the Tahoe Hacker's conference |
| a few years back. (I'd have to go back and look over the group |
| photos to be certain.) |
|
|
| Markoff already has a stake in the Mitnick story, since it was his book, |
| "Cyberpunk" that really gave ol' Kevin some coverage. Now, if Markoff knew |
| that Mitnick had hacked Tsutomo (from Tsutomo's own mouth), then certainly |
| any journalist worth his salt would see possibilities. Gee, what a great |
| concept! A colorful computer security guy tracks down one of the world's |
| most wanted hackers! What a great story! Remember that Stoll Guy? |
|
|
| But in order to get the book publishers really hot, it would take some more |
| press to rejuvinate interest in the Mitnick story. So the first story, |
| months after the fact, is printed. |
|
|
| Meanwhile, Tsutomo is supposedly tracking down Mitnick. |
|
|
| How does one track down a hacker? The legal (and really annoyingly hard way) |
| is to work with other system administrators and establish a trail via |
| tcp connects and eventually back to a dialup, then work with phone companies |
| to establish a trap and trace (which usually takes two or three calls) and |
| then working with local police to get a warrant. Somehow Tsutomo seemingly |
| managed to avoid all this hassle and get a lot done by himself. How? |
| Well, the Air Force OSI managed to track down the British Datastream Cowboy |
| by hacking into the systems he was hacking into the Air Force from. This is |
| the easy way. Hmmm. |
|
|
| I know with a good degree of certainty that Markoff's and Tsutomo's little |
| escapades pissed off a great many people within law enforcement, but I don't |
| know exactly why. If they WERE bumbling around stepping on FBI toes |
| during the course of their litle hunt, certainly the FBI would have |
| threatened them with some kind of obstruction of justice sentence if they |
| didn't stop. Did they? |
|
|
| Well before any of this had begun, Mitnick had been hacking other places |
| too. Guess what? He happened to hack CSCNS, where a certain ex-hacker, Scott |
| Chasin, runs the security side of things. I remember well over a year ago |
| talking to Chasin about a hacker who had breeched CNS. Discussing his |
| methods, we thought it must be Grok, back from the netherworld, since he |
| was so skilled. The hacker also made claims of being wireless to avoid |
| being traced. (This also fit into the Grok modus operandi...so we just |
| assumed it was indeed Grok and left it at that.) Chasin told the hacker |
| to get off of CNS, and that he could have an account on crimelab.com, if |
| he would only use it for mail/irc/whatever, but with no hacking, and on |
| the agreement that he would leave CSCNS alone. |
|
|
| The agreement was made, but went sour after only a few weeks when the mystery |
| hacker began going after CSCNS again. The Colorado Springs FBI was called |
| in to open an investigation. This was ages ago, but of course, field agencies |
| rarely talk. |
|
|
| Back in the present, Tsutomo goes to help out at the Well, where |
| a certain admin (pei) was having problems with intruders. This is the |
| same pei who a few months earlier told Winn Schwartau "The Well has no |
| security!" Which Winn reported in his newsletter. (This of course came after |
| Winn's account on the Well was reactvated by an anonymous person who |
| posted several messages about Markoff and signed them "km." DUH!) |
|
|
| So somehow, Tsutomo gets trace information leading back to a cell site in |
| North Carolina. How does a private citizen get this kind of information? |
| Don't ask me! My guess is that the feds said, give us what you know, |
| help us out a bit and don't get in our way. In return, one can surmise |
| that Tsutomo (and Markoff) got to glean more info about the investigation |
| by talking with the feds. |
|
|
| So, Mitnick gets busted, and Tsutomo got to ride around in a car with |
| a Signal Strength Meter and help triangulate Mitnick's cellular activity |
| to his apartment. Woo woo! |
|
|
| After all is said and done, Tsutomo has single handedly captured Mitnick, |
| John Markoff breaks the story on the FRONT PAGE of the New York Times, and |
| every other computer reporter in America continually quotes and |
| paraphrases Markoff's story and research as "God's Own Truth." |
|
|
| Mitnick, on the other hand, gets blamed for: |
|
|
| 1) hacking Tsutomo |
| 2) hacking the Well |
| 3) hacking Netcom to get credit cards |
| 4) hacking CSCNS |
| 5) hacking Janet Reno's Cell Phone |
| 6) hacking motorola |
| 7) conversing with foreign nationals |
| etc.. |
|
|
| Let's look at some these charges: |
|
|
| 1) Mitnick was not the first (or only) to hack Tsutomo. The San Deigo |
| Supercomputer Center is a target for a lot of people. It's a major |
| Internet center, and there are all kinds of goodies there, and the |
| people who work there are smart guys with nice toys. Sorry, but |
| Mitnick is the scapegoat here. |
|
|
| 2) Mitnick was not the first, last, or most recent to hack The Well. |
| Like Pei said, "The Well Has No Security." I know this first hand, |
| since I have an account there. I don't raise a stink about it, |
| because I pay by check, and my email is boring. |
|
|
| 3) Mitnick was not the person who got the Netcom credit card file. |
| That file floated around for quite some time. He might have had |
| a copy of it, but so do countless others. Sorry. Wrong again. |
|
|
| 4) Mitnick was in CNS. He was not the only one. Thanks for playing. |
|
|
| 5) The thought that Mitnick could reprogram a MTSO to reboot upon |
| recognizing a ESN/MIN pair belonging to one specific individual |
| would require that he had hacked the manufacturer of the MTSO, and |
| gotten source code, then hacked the cellular carrier and gotten |
| a full database of ESN/MIN information. Both of these things have |
| been done by others, and Mitnick certainly could have done them too, |
| but I doubt he would have gone to that much trouble to call attention |
| to his actions. |
|
|
| 6) Motorola, like EVERY other big-time computer industry giant has been |
| hacked by countless people. |
|
|
| 7) Mitnick reportedly had dealings with foreign nationals, especially |
| one "Israeli" that set the CIA up in arms. Well, sure, if you get on |
| IRC and hang out, you are probably going to talk to people from other |
| countries. If you hang out on #hack and know your stuff, you will probably |
| end up trading info with someone. But, playing devil's advocate, |
| perhaps the person you might be talking to really isn't a 22 year old |
| Israeli student. Maybe he really is a 40 year old Mossad Katsa working |
| in their computer center. Was Mitnick Jewish? Would he do "whatever |
| it takes to help the plight of Jews worldwide?" Could he have been |
| approached to become one of the scores of sayanim worldwide? Sure. |
| But probably not. He'd be too hard to call on for the favors when they |
| would be needed by Mossad agents. So, I have some doubts about this. |
|
|
| Less than a month after the whole bust went down, Markoff and Tsutomo |
| signed with Miramax Films to produce a film and multimedia project |
| based on their hunt for Mitnick. The deal reportedly went for |
| $750,000. That is a fuckload of money. Markoff also gets to do a book, |
| which in turn will become the screenplay for the movie. (Tsutomo |
| commented that he went with Miramax "based on their track record." |
| Whatever the fuck that means.) |
|
|
| Less than a month and they are signed. |
|
|
| Looks to me like our duo planned for all this. |
|
|
| "Hey Tsutomo, you know, if you went after this joker, I could write a book |
| about your exploits! We stand to make a pretty penny. It would be |
| bigger than the Cuckoo's egg!" |
|
|
| "You know John, that's a damn good idea. Let me see what I can find. |
| Call your agent now, and let's get the ball rolling." |
|
|
| "I'll call him right now, but first let me write this little story to |
| recapture the interest of the public in the whole Mitnick saga. Once that |
| runs, they publishers are sure to bite." |
|
|
| Meanwhile Mitnick becomes the fall guy for the world's ills, and |
| two guys methodically formulate a plot to get rich. It worked! |
|
|
| Way to go, guys. |
|
|
|
|
|
|
|
|