| ==Phrack Magazine== |
|
|
| Volume Six, Issue Forty-Seven, File 22 of 22 |
|
|
| PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN |
| PWN PWN |
| PWN Phrack World News PWN |
| PWN PWN |
| PWN Compiled by Datastream Cowboy PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
|
|
| 3 Residents Investigated In Theft Of Phone Card Numbers Oct 10, 1994 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Russ Britt (Los Angeles Daily News) |
|
|
| Three Los Angeles residents have come under investigation in connection with |
| the theft of 100,000 telephone calling card numbers used to make $50 million |
| worth of long distance calls, officials said. |
|
|
| The Secret Service searched the suspects' residences over the past two weeks |
| and found computer disks containing calling card codes, said Jim Bauer, |
| special agent-in-charge of he Los Angeles office. |
|
|
| Ivy J. Lay, an MCI switch engineer based in Charlotte, N.C., was arrested |
| last week in North Carolina on suspicion of devising computer software to hold |
| calling card numbers from carriers that route calls through MCI's equipment, |
| the Secret Service said. |
|
|
| Lay is suspected of supplying thousands cards of calling codes to accomplices |
| in Los Angeles for $3 to $5 a number, Bauer said. The accomplices are |
| suspected of reselling the numbers to dealers in various cites, who then sold |
| them to buyers in Europe, Bauer said. |
|
|
| European participants would purchase the numbers to make calls to the United |
| States to pirate computer software via electronic bulletin boards. |
|
|
| ------------------------------------------------------------------------------- |
|
|
| Revealed: how hacker penetrated the heart of British intelligence Nov 24, 1994 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Tim Kelsey (The Independent) p. 1 |
|
|
| [ In typical British style, The Independent boasts 3 FULL pages on the |
| story of how a "hacker" broke into British Telecom's databases and pulled |
| information regarding sensitive numbers for the Royal Family and |
| MI 5 & 6. |
|
|
| Reportedly, information was sent anonymously to a reporter named Steve |
| Fleming over the Internet by a "hacker" who got a job as a temp at BT |
| and used their computers to gather the information. (I heard that Fleming |
| later admitted that "he" was actually the supposed "hacker.") |
|
|
| This is news? This is like saying, "Employees at Microsoft gained access to |
| proprietary Microsoft source code," or "CAD Engineers at Ford gained |
| access to super-secret Mustang designs." Get real. ] |
|
|
| ------------------------------------------------------------------------------- |
|
|
| Telecom admits security failings Nov 29, 1994 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Tim Kelsey (The Independent) p. 1 |
|
|
| [ In typical British style, senior officials at BT attempted to save face |
| by stating that sensitive information such as the file of Royal Family |
| and Intelligence services phone numbers and addresses (currently floating |
| around the Internet) was safe from prying eyes, but could indeed be accessed |
| by BT employees. Uh, yeah. ] |
|
|
| ------------------------------------------------------------------------------- |
| Phreak Out! Dec 1994 |
| ~~~~~~~~~~~ |
| by Steve Gold (Internet and Comms Today) p. 44 |
|
|
| [ A valiant attempt by England's Internet & Comms Today (my favorite |
| Internet-related magazine--by far) to cover the Hack/Phreak scene |
| in the UK, with a few tidbits about us here in the states. Not |
| 100% accurate, but hell, it beats the living shit out of anything |
| ever printed by any US mainstream mag. ] |
|
|
| ------------------------------------------------------------------------------- |
|
|
| Hack To The Future Dec 1994 |
| ~~~~~~~~~~~~~~~~~~ |
| by Emily Benedek (Details) p. 52 |
|
|
| Hacking Vegas Jan 1995 |
| ~~~~~~~~~~~~~ |
| by Damien Thorn (Nuts & Volts) p. 99 |
|
|
| [ A review of HOPE, and a review of DefCon. One from a techie magazine whose |
| other articles included: Build a Telephone Bug, Telephone Inside Wiring |
| Maintenance, Boat GPS on Land and Sea and Killer Serial Communications; |
| the other from a magazine that usually smells more fragrant than Vogue, and |
| whose other articles included: The Madonna Complex, Brother From Another |
| Planet, Confessions of a Cyber-Lesbian and various fashion pictorials. |
| One written by someone who has been in the hack scene since OSUNY ran on an |
| Ohio-Scientific and the other written by a silly girlie who flitted around |
| HOPE taking pictures of everyone with a polaroid. You get the idea. ] |
|
|
| ------------------------------------------------------------------------------- |
|
|
| Hackers Take Revenge on the Author of New Book on Cyberspace Wars Dec 5, 1994 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Jared Sandberg (The Wall Street Journal) p. B5 |
|
|
| In his forthcoming book writer Joshua Quittner chronicles the bizarre but |
| true tale of a Hatfield-and-McCoys feud in the nether world of computer |
| hackers. |
|
|
| Now the hackers have extracted revenge for Mr. Quittner's attention, taking |
| control of his phone line and voice mail and bombarding his on-line account |
| with thousands of messages. |
|
|
| "I don't believe I've ever been hacked to this degree," says Mr. Quittner, |
| whose book, written with wife Michelle Slatalla, was excerpted in the |
| latest issue of Wired magazine, apparently prompting the attack. |
|
|
| "People in MOD and LOD are very unhappy about the story," Mr. Quittner says. |
| "That is what I believe prompted the whole thing." |
|
|
| ------------------------------------------------------------------------------- |
|
|
| Terror On The Internet Dec 1994 |
| ~~~~~~~~~~~~~~~~~~~~~~ |
| By Philip Elmer-Dewitt (Time) |
|
|
| Thanksgiving weekend was quiet in the Long Island, New York, home of Michelle |
| Slatalla and Josh Quittner. Too quiet. |
|
|
| "We'd been hacked," says Quittner, who writes about computers, and |
| hackers, for the newspaper Newsday, and will start writing for TIME in |
| January. Not only had someone jammed his Internet mailbox with thousands of |
| unwanted pieces of E-mail, finally shutting down his Internet access |
| altogether, but the couple's telephone had been reprogrammed to forward |
| incoming calls to an out-of-state number, where friends and relatives heard |
| a recorded greeting laced with obscenities. "What's really strange," says |
| Quittner, "is that nobody who phoned, including my editor and my |
| mother, thought anything of it. They just left their messages and hung up." |
|
|
| It gets stranger. In order to send Quittner that mail bomb, the electronic |
| equivalent of dumping a truckload of garbage on a neighbor's front lawn, |
| someone, operating by remote control, had broken into computers at IBM, |
| Sprint and a small Internet service provider called the Pipeline, seized |
| command of the machines at the supervisory, or "root", level, and |
| installed a program that fired off E-mail messages every few seconds. |
|
|
| Adding intrigue to insult, the message turned out to be a manifesto that |
| railed against "capitalist pig" corporations and accused those companies |
| of turning the Internet into an "overflowing cesspool of greed." It was |
| signed by something called the Internet Liberation Front, and it ended like |
| this: "Just a friendly warning corporate America; we have already stolen |
| your proprietary source code. We have already pillaged your million dollar |
| research data. And if you would like to avoid financial ruin, get the |
| ((expletive deleted)) out of Dodge. Happy Thanksgiving Day turkeys." |
|
|
| It read like an Internet nightmare come true, a poison arrow designed to |
| strike fear in the heart of all the corporate information managers who had |
| hooked their companies up to the information superhighway only to discover |
| that they may have opened the gate to trespassers. Is the I.L.F. for real? |
| Is there really a terrorist group intent on bringing the world's largest |
| computer network to its knees? |
|
|
| That's what is so odd about the so-called Internet Liberation Front. While |
| it claims to hate the "big boys" of the telecommunications industry and |
| their dread firewalls, the group's targets include a pair of journalists and |
| a small, regional Internet provider. "It doesn't make any sense to me," |
| says Gene Spafford, a computer-security expert at Purdue University. |
| "I'm more inclined to think it's a grudge against Josh Quittner." |
|
|
| That is probably what it was. Quittner and Slatalla had just finished a book |
| about the rivalry between a gang of computer hackers called the Masters |
| of Deception and their archenemies, the Legion of Doom, an excerpt of |
| which appears in the current issue of Wired magazine. And as it turns out, |
| Wired was mail-bombed the same day Quittner was, with some 3,000 copies |
| of the same nasty message from the I.L.F. Speculation on the Net at week's |
| end was that the attacks may have been the work of the Masters of Deception, |
| some of whom have actually served prison time for vandalizing the computers |
| and telephone systems of people who offend them. |
|
|
| ------------------------------------------------------------------------------- |
|
|
| The Phreak Show Feb 5, 1995 |
| ~~~~~~~~~~~~~~~ |
| By G. Pascal Zachary (Mercury News) |
|
|
| "Masters of Deception" provides an important account of this hidden hacker |
| world. Though often invoked by the mass media, the arcana of hacking have |
| rarely been so deftly described as in this fast-paced book. Comprised of |
| precocious New York City high schoolers, the all-male "Masters of Deception" |
| (MOD) gang are the digital equivalent of the 1950s motorcyclists who roar |
| into an unsuspecting town and upset things for reasons they can't even explain. |
|
|
| At times funny and touching and other times pathetic and disturbing, the |
| portrait of MOD never quite reaches a crescendo. The authors, journalists |
| Michelle Slatalla of Newsday and Joshua Quittner of Time, fail to convey |
| the inner lives of the MOD. The tale, though narrated in the MOD's |
| inarticulate, super-cynical lingo and packed with their computer stunts, |
| doesn't convey a sense of what makes these talented oddballs tick. |
|
|
| Too often the authors fawn all over their heroes. In "Masters of Deception," |
| every hacker is a carefree genius, benign and childlike, seeking only to |
| cavort happily in an electronic Garden of Eden, where there are no trespassing |
| prohibitions and where no one buys or sells information. |
|
|
| Come on. Phiber and phriends are neither criminals nor martyrs. The issue of |
| rights and responsibilities in cyberspace is a lot more complicated than |
| that. Rules and creativity can co-exist; so can freedom and privacy. If |
| that's so hard to accept, a full 25 years after the birth of the |
| Internet, maybe it's time to finally get rid of the image of the hacker |
| as noble savage. It just gets in the way. |
|
|
| ------------------------------------------------------------------------------- |
|
|
| Hacking Out A Living Dec 8, 1994 |
| ~~~~~~~~~~~~~~~~~~~~ |
| by Danny Bradbury (Computing) p. 30 |
|
|
| There's nothing like getting it from the horse's mouth, and that's exactly |
| what IT business users, anxious about security, did when they went to a recent |
| conference given by ex-hacker, Chris Goggans. |
|
|
| [ Yeah, so it's a blatant-plug for me. I'm the editor. I can do that. |
| (This was from one of the seminars I put on in Europe) ] |
|
|
| ------------------------------------------------------------------------------- |
|
|
| Policing Cyberspace Jan 23, 1995 |
| ~~~~~~~~~~~~~~~~~~~ |
| by Vic Sussman (US News & World Report) p. 54 |
|
|
| [ Yet another of the ever-growing articles about high-tech cops. Yes, those |
| dashing upholder of law and order, who bravely put their very lives |
| on the line to keep America free from teenagers using your calling card. |
|
|
| Not that I wouldn't have much respect for our High-Tech-Crimefighters, if |
| you could ever show me one. Every High-Tech Crime Unit I've ever seen |
| didn't have any high-tech skills at all...they just investigated low-tech |
| crimes involving high-tech items (ie. theft of computers, chips, etc.) |
| Not that this isn't big crime, its just not high tech. Would they |
| investigate the theft of my Nientendo? If these self-styled cyber-cops |
| were faced with a real problem, such as the theft of CAD files or illegal |
| wire-transfers, they'd just move out of the way and let the Feds handle |
| it. Let's not kid ourselves. ] |
|
|
| ------------------------------------------------------------------------------- |
|
|
| Hacker Homecoming Jan 23, 1995 |
| ~~~~~~~~~~~~~~~~~ |
| by Joshua Quitter (Newsweek) p. 61 |
|
|
| The Return of the Guru Jan 23, 1995 |
| ~~~~~~~~~~~~~~~~~~~~~~ |
| by Jennifer Tanaka and Adam Rogers (Time) p. 8 |
|
|
| [ Two articles about Mark "Phiber Optik" Abene's homecoming party. |
| Amazing. Just a few years earlier, Comsec was (I think) the first |
| group of hackers to make Time & Newsweek on the same date. |
| Now, all someone has to do is get out of jail and they score a similar |
| coup. Fluff stories to fill unsold ad space. ] |
|
|
| ------------------------------------------------------------------------------- |
|
|
| Data Network Is Found Open To New Threat Jan 23, 1995 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by John Markoff (New York Times) p. A1 |
|
|
| A Federal computer security agency has discovered that unknown intruders |
| have developed a new way to break into computer systems, and the agency |
| plans on Monday to advise users how to guard against the problem. |
|
|
| The first known attack using the new technique took place on Dec. 25 |
| against the computer of a well-known computer security expert at the |
| San Deigo Supercomputer Center. An unknown individual or group took |
| over his computer for more then a day and electronically stole a large |
| number of security programs he had developed. |
|
|
| The flaw, which has been known as a theoretical possibility to computer |
| experts for more than a decade, but has never been demonstrated before, |
| is creating alarm among security experts now because of the series of |
| break-ins and attacks in recent weeks. |
|
|
| The weakness, which was previously reported in technical papers by |
| AT&T researchers, was detailed in a talk given by Tsutomo Shimomura, |
| a computer security expert at the San Deigo Supercomputer Center, at a |
| California computer security seminar sponsored by researchers at the |
| University of California at Davis two weeks ago. |
|
|
| Mr. Shimomura's computer was taken over by an unknown attacker who then |
| copied documents and programs to computers at the University of Rochester |
| where they were illegally hidden on school computers. |
|
|
| ------------------------------------------------------------------------------- |
|
|
| A Most-Wanted Cyberthief Is Caught In His Own Web Feb 16, 1995 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by John Markoff (New York Times) p. A1 |
|
|
| After a search of more than two years, a team of FBI agents early this |
| morning captured a 31-year-old computer expert accused of a long crime |
| spree that includes the theft of thousands of data files and at least |
| 20,000 credit card numbers from computer systems around the nation. |
|
|
| Federal officials say Mr. Mitnick's confidence in his hacking skills may |
| have been his undoing. On Christmas Day, he broke into the home computer |
| of a computer security expert, Tsutomo Shimomura, a researcher at the |
| federally financed San Deigo Supercomputer Center. |
|
|
| Mr. Shimomura then made a crusade of tracking down the intruder, an obsession |
| that led to today's arrest. |
|
|
| It was Mr. Shimomura, working from a monitoring post in San Jose, California, |
| who determined last Saturday that Mr. Mitnick was operating through a computer |
| modem connected to a cellular telephone somewhere near Raleigh, N.C. |
|
|
| "He was a challenge for law enforcement, but in the end he was caught by his |
| own obsession," said Kathleen Cunningham, a deputy marshal for the United |
| States Marshals Service who has pursued Mr. Mitnick for several years. |
|
|
| ------------------------------------------------------------------------------- |
|
|
| Computer Users Beware: Hackers Are Everywhere |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Michelle V. Rafter (Reuters News Sources) |
|
|
| System Operators Regroup In Wake Of Hacker Arrest |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Elizabeth Weise (AP News Sources) |
|
|
| Computer Hacker Seen As No Slacker |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Paul Hefner (New York Times) |
|
|
| Kevin Mitnick's Digital Obsession |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Josh Quittner (Time) |
|
|
| A Superhacker Meets His Match |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Katie Hafner (Newsweek) |
|
|
| Cracks In The Net |
| ~~~~~~~~~~~~~~~~~ |
| by Josh Quittner (Time) |
|
|
| Undetected Theft Of Credit-Card Data Raises Concern About Online Security |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Jared Sandberg (The Wall Street Journal) |
|
|
| [Just a sampling of the scores of Mitnick articles that inundated the |
| news media within hours of his arrest in North Carolina. JUMP ON THE |
| MITNICK BANDWAGON! GET THEM COLUMN INCHES! WOO WOO!] |
|
|
| ------------------------------------------------------------------------------- |
|
|
| Hollywood Gets Into Cyberspace With Geek Movies |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Therese Poletti (Reuters News Sources) |
|
|
| With dramatic tales like the capture last week of a shadowy computer hacker |
| wanted around the world, Hollywood studios are scrambling to cash in on |
| the growing interest in cyberspace. |
|
|
| "They are all looking at computer-related movies because computers are |
| hot," said Bishop Kheen, a Paul Kagan analyst. "They are all reviewing |
| scripts or have budgets for them. "We are going to see a rash of these |
| kinds of movies." |
|
|
| Experts say it remains to be seen what kind of box office draw can be |
| expected from techie movies such as one that might be based on the hunt for |
| Mitnick. But the recent surge of interest in the Internet, the high-profile |
| criminal cases, and romanticized images of hackers may fuel their popularity. |
|
|
| "I think it's a limited market, although given the media's insatiable |
| appetite for Internet hype, these movies might do well," said Kevin |
| Benjamin, analyst with Robertson Stephens. |
|
|
| TriStar Pictures and Columbia Pictures, both divisions of Sony Corp., are |
| developing movies based on technology or computer crime, executives said. |
|
|
| TriStar is working on a movie called "Johnny Mnemonic," based on a science |
| fiction story by William Gibson, about a futuristic high-tech "data courier" |
| with confidential information stored in a memory chip implanted in his head. |
|
|
| Sony also has plans for a CD-ROM game tied to the movie, also called |
| "Johnny Mnemonic," developed by Sony Imagesoft, a division of Sony |
| Electronic Publishing. |
|
|
| Columbia Pictures has a movie in development called "The Net," starring |
| Sandra Bullock, who played opposite Reeves in "Speed." Bullock plays a |
| reclusive systems analyst who accidentally taps into a classified program and |
| becomes involved in a murder plot. Sony Imagesoft has not yet decided whether |
| it will develop a CD-ROM game version of "The Net." |
|
|
| MGM/United Artists is said to be working on a movie called "Hackers," |
| about a group of young computer buffs framed for a crime and trying to |
| protect their innocence. An MGM/UA spokeswoman did not return calls seeking |
| comment. |
|
|
| Disney is also said to be working on a movie called f2f, (face to face), about |
| a serial killer who tracks his victims on an online service. Disney also did |
| not return calls. |
|
|
| Bruce Fancher, once a member of the Legion of Doom hacker gang, worked as a |
| consultant for "Hackers." He said, much to his dismay, hackers are becoming |
| more popular and increasingly seen as romantic rebels against society. |
|
|
| "I've never met one that had political motivation. That is really something |
| projected on them by the mainstream media," Fancher said. |
|
|
| ------------------------------------------------------------------------------- |
|
|
| Film, Multimedia Project In The Works On Hacker Kevin Mitnick Mar 8, 1995 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Greg Evans (Variety) |
|
|
| Miramax Films will produce a film and a multimedia project based on the |
| hunt for accused cyber felon Kevin Mitnick, the computer criminal who |
| captured the attention of the New York Times, the FBI and Hollywood. |
|
|
| Less than a month after Mitnick's capture made the front page of Feb. 16's |
| Times, Miramax has purchased the worldwide film and interactive rights to |
| the hacker's tale. |
|
|
| Rights were bought for an undisclosed amount from computer security expert |
| Tsutomu Shimomura, who led the two-year pursuit of Mitnick, and reporter |
| John Markoff, who penned the Times' article. |
|
|
| Markoff will turn his article into a book, which will be developed into a |
| script. "Catching Kevin: The Pursuit and Capture of America's Most Wanted |
| Computer Criminal" will be published later this year by Miramax's sister |
| company, Hyperion Books (both companies are owned by the Walt Disney Co.). |
|
|
| Miramax also plans to work with Shimomura to develop an interactive |
| project, most likely a CD-ROM, based on "Catching Kevin," according to |
| Scott Greenstein, Miramax's senior VP of motion pictures, music, new media |
| and publishing. He represented Miramax in the deal. |
|
|
| No director has been attached to the film project yet, although the company |
| is expected to make "Kevin" a high priority. |
|
|
| The story attracted considerable studio attention. In a statement, Shimomura |
| said he went with Miramax "based on their track record." |
|
|
| Shimomura and Markoff were repped by literary and software agent John Brockman |
| and Creative Artists Agency's Dan Adler and Sally Willcox. |
|
|
| ------------------------------------------------------------------------------- |
|
|
| Hack-Happy Hollywood Mar 1995 |
| ~~~~~~~~~~~~~~~~~~~~ |
| (AP News Sources) |
|
|
| Not since the heyday of Freddy Krueger and Jason Voorhees has hacking been |
| so in demand in Hollywood. |
|
|
| Only this time, it's computer hackers, and the market is becoming glutted |
| with projects. In fact, many studio buyers were reluctant to go after the |
| screen rights to the story of computer expert Tsutomu Shimomura, who tracked |
| down the notorious cyber-felon Kevin Mitnick. |
|
|
| The rights were linked to a New York Times article by John Markoff, who's |
| turning the story into a book. |
|
|
| But Miramax wasn't daunted by any competing projects, and snapped up the |
| rights. |
|
|
| "We're talking about a ton of projects that all face the same dilemma: How |
| many compelling ways can you shoot a person typing on a computer terminal?" |
| said one buyer, who felt the swarm of projects in development could face |
| meltdown if the first few films malfunction. |
|
|
| The first test will come late summer when United Artists opens "Hackers," |
| the Iain Softley-directed actioner about a gang of eggheads whose hacking |
| makes them prime suspects in a criminal conspiracy. |
|
|
| Columbia is currently in production on "The Net," with Sandra Bullock as |
| an agoraphobic computer expert who's placed in danger when she stumbles onto |
| secret files. |
|
|
| Touchstone has "The Last Hacker," which is closest in spirit to the Miramax |
| project. It's the story of hackmeister Kevin Lee Poulson, who faces a hundred |
| years in prison for national security breaches and was so skilled he disabled |
| the phones of KIIS-FM to be the 102nd (and Porsche-winning) caller. He was |
| also accused of disabling the phones of "Unsolved Mysteries" when he was |
| profiled. |
|
|
| Simpson/Bruckheimer is developing "f2f," about a serial killer who surfs |
| the Internet for victims. |
|
|
| Numerous other projects are in various stages of development, including |
| MGM's "The Undressing of Sophie Dean" and the Bregman/Baer project |
| "Phreaking," about a pair of hackers framed for a series of homicidal |
| computer stunts by a psychotic hacker. |
|
|
| ------------------------------------------------------------------------------- |
|
|
| A Devil Of A Problem Mar 21, 1995 |
| ~~~~~~~~~~~~~~~~~~~~ |
| by David Bank (Knight-Ridder) |
|
|
| Satan is coming to the Internet and might create havoc for computer networks |
| around the world. |
|
|
| The devilish software, due for release April 5, probes for hidden flaws |
| in computer networks that make them vulnerable to intruders. The tool could |
| be used by mischievous pranksters or serious espionage agents to attack and |
| penetrate the computer networks of large corporations, small businesses or even |
| military and government installations. |
|
|
| None of the potential problems has swayed the authors of the program, Dan |
| Farmer, the "network security czar" of Silicon Graphics Inc. in Mountain |
| View, California, and Wietse Venema, his Dutch collaborator. |
|
|
| "Unfortunately, this is going to cause some serious damage to some people," |
| said Farmer, who demonstrated the software this month in his San Francisco |
| apartment. "I'm certainly advocating responsible use, but I'm not so |
| naive to think it won't be abused." |
|
|
| "It's an extremely dangerous tool," said Donn Parker, a veteran computer |
| security consultant with SRI International in Menlo Park, California. "I |
| think we're on the verge of seeing the Internet completely wrecked in a sea |
| of information anarchy." |
|
|
| Parker advocates destroying every copy of Satan. "It shouldn't even be |
| around on researcher's disks," he said. |
|
|
| ------------------------------------------------------------------------------- |
|
|
| Satan Claims Its First Victim Apr 7, 1995 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| by Dwight Silverman (Houston Chronicle) |
|
|
| The cold hand of Satan knocked on the electronic door of Phoenix Data Systems |
| Wednesday night, forcing the Clear Lake-based Internet access provider to |
| temporarily shut down some computers. |
|
|
| "These guys can come in and literally take control, get super-user status on |
| our systems," said Bill Holbert, Phoenix's owner. "This is not your |
| average piece of shareware." |
|
|
| The attack began about 9 p.m. Wednesday, he said. Technicians watched for a |
| while and then turned off the machines at Phoenix that provide "shell" |
| accounts, which allow direct access to a computer's operating system. |
|
|
| The system was back up Thursday afternoon after some security modifications, |
| he said. |
|
|
| "It actually taught us a few things," Holbert said. "I've begun to believe |
| that no computer network is secure." |
|
|
| ------------------------------------------------------------------------------- |
|
|
| Fraud-free Phones Feb 13, 1995 |
| ~~~~~~~~~~~~~~~~~ |
| by Kirk Ladendorf (Austin American Statesman) p. D1 |
|
|
| Texas Instruments' Austin-based Telecom Systems business came up with an |
| answer to cellular crime: a voice-authorization service. |
|
|
| The technology, which TI showed off at the Wireless '95 Convention & |
| Exposition in New Orleans this month, was adapted from a service devised |
| for long-distance telephone companies, including Sprint. |
|
|
| TI says its voice-recognition systems can verify the identity of cellular |
| phone users by reading and comparing their "voice prints," the unique sound |
| patterns made by their speech. |
|
|
| The TI software uses a statistical technique called Hidden Markov Modeling |
| that determines the best option within a range of choices as it interprets a |
| voice sample. |
|
|
| If the verification is too strict, the system will reject bona fide users |
| when their voice patterns vary too much from the computer's comparison sample. |
| If the standard is too lenient, it might approve other users whose voice |
| patterns are similar to that of the authentic user. |
|
|
| The system is not foolproof, TI officials said, but beating it requires far |
| more time, effort, expense and electronics know-how than most cellular |
| pirates are willing to invest. |
|
|
| ------------------------------------------------------------------------------- |
|
|
| Nynex Recommends Cellular Phone Customers Use A Password Feb 9, 1995 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Aaron Zitner (The Boston Globe) |
|
|
| Nynex Corp. is asking cellular telephone customers to dial an extra four |
| digits with each phone call in an attempt to foil thieves who steal an |
| estimated $1.3 million in cellular phone services nationwide each day. |
|
|
| Nynex Mobile Communications Co., has been "strongly recommending" since |
| November that all new customers adopt a four-digit personal identification |
| number, or PIN. This week, the company began asking all its customers to use |
| a PIN. |
|
|
| The Cellular Telecommunications Industry Association estimates that "phone |
| thieves" made $482 million in fraudulent calls last year, equal to 3.7 |
| percent of the industry's total billings. Thieves can make calls and bill |
| them to other people by obtaining the regular 10-digit number assigned to a |
| person's cellular phone, as well as a longer electronic serial number that is |
| unique to each phone. |
|
|
| Thieves can snatch those numbers from the air using a specialized scanner, |
| said James Gerace, a spokesman for Nynex Mobile Communications. Even when no |
| calls are being made, cellular phones broadcast the two numbers every 30 |
| seconds or so to notify the cellular system in case of incoming calls, he said. |
|
|
| When customers adopt a PIN, their phone cannot be billed for fraudulent calls |
| unless the thieves also know the PIN, Gerace said. He said the phone broadcasts |
| the PIN at a different frequency than the phone's electronic serial number, |
| making it hard for thieves to steal both numbers with a scanner. |
|
|
| Gerace also noted that customers who become victims of fraud despite |
| using a PIN can merely choose a new number. Victims who do not use a PIN |
| must change their phone number, which requires a visit to a cellular phone |
| store to have the phone reprogrammed, he said. |
|
|
| [ Uh, wait a second. Would you use touch-tone to enter this PIN? Woah. |
| Now that's secure. I've been decoding touch-tone by ear since 1986. |
| What a solution! Way to go NYNEX! ] |
|
|
| ------------------------------------------------------------------------------- |
|
|
| Kemper National Insurance Offers PBX Fraud Feb 3, 1995 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| (Knight-Ridder News Sources) |
|
|
| Kemper National Insurance Cos. now offers inland marine insurance |
| coverage to protect Private Branch Exchange (PBX) systems against toll fraud. |
|
|
| "Traditional business equipment policies companies buy to protect their PBX |
| telephone systems do not cover fraud," a Kemper spokesman said. |
| The Kemper policy covers both the equipment and the calls made illegally |
| through the equipment. |
|
|
| The coverage is for the PBX equipment, loss of business income from missed |
| orders while the PBX system is down, and coverage against calls run up on |
| an insured's phone systems. The toll fraud coverage is an option to the PBX |
| package. |
|
|
| ------------------------------------------------------------------------------- |
|
|
| New Jersey Teen To Pay $25,000 To Microsoft, Novell Feb 6, 1995 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| The Wall Street Journal |
|
|
| Microsoft Corp. and Novell Inc. reached a court-approved settlement with |
| a New Jersey teenager they accused of operating a computer bulletin board |
| that illegally distributed free copies of their copyrighted software programs. |
|
|
| Equipped with a court order, employees of the two companies and federal |
| marshals raided the young man's house in August, seizing his computer |
| equipment and shutting down an operation called the Deadbeat Bulletin Board. |
| Under the settlement announced Friday, the teenager agreed to pay $25,000 to |
| the companies and forfeit the seized computer equipment. In return, the |
| companies agreed to drop a copyright infringement lawsuit brought against |
| him in federal court in New Jersey, and keep his identity a secret. |
|
|
| Redmond-based Microsoft and Novell, Provo, Utah, opted to take action against |
| the New Jersey man under civil copyright infringement laws rather than pursue |
| a criminal case. The teenager had been charging a fee to users of the Deadbeat |
| Bulletin Board, which was one reason the companies sought a cash payment, a |
| Novell spokesperson said. The two software producers previously settled a |
| similar case in Minneapolis, when they also seized the operator's equipment |
| and obtained an undisclosed cash payment. |
|
|
| "About 50 groups are out there engaging in piracy and hacking," said Edward |
| Morin, manager of Novell's antipiracy program. He said they operate with |
| monikers such as Dream Team and Pirates With Attitude. |
|
|
| ------------------------------------------------------------------------------- |
|
|
| Software Piracy Still A Big Problem In China Mar 6, 1995 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Jeffrey Parker (Reuters News Sources) |
|
|
|
|
| Sales of pirated software have reached a fever pitch in Beijing in the week |
| since U.S. and Chinese officials defused a trade war with a broad accord to |
| crush such intellectual property violations. |
|
|
| In the teeming "hacker markets" of the Zhongguancun computer district near |
| Beijing University, there were few signs of any clampdown Monday, the sixth |
| day of a "special enforcement period" mandated by the Feb. 26 Sino-U.S. pact. |
|
|
| "The police came and posted a sign at the door saying software piracy is |
| illegal," said a man selling compact disk readers at bustling Zhongguancun |
| Electronics World. |
|
|
| "But look around you. There's obviously a lot of profit in piracy," he said. |
|
|
| A score of the market's nearly 200 stalls openly sell compact disks loaded |
| with illegal copies of market-leading desktop software titles, mostly the |
| works of U.S. firms. |
|
|
| Cloudy Sky Software Data Exchange Center offers a "super value" CD-ROM for |
| 188 yuan ($22) that brims with 650 megabytes of software from Microsoft, |
| Lotus and other U.S. giants whose retail value is about $20,000, nearly |
| 1,000 times higher. |
|
|
|
|
| ------------------------------------------------------------------------------- |
|
|
| Internet Story Causes Trouble Feb 7, 1995 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| (AP News Sources) |
|
|
| The University of Michigan has refused to reinstate a sophomore suspended |
| last week after he published on the Internet a graphic rape and torture |
| fantasy about a fellow student. |
|
|
| The student's attorney told The Detroit News on Monday that the |
| university is waiting until after a formal hearing to decide if the |
| 20-year-old student is a danger to the community. A closed hearing |
| before a university administrator is scheduled for Thursday. |
|
|
| "Our position is that this is a pure speech matter," said Ann |
| Arbor attorney David Cahill. "He doesn't know the girl and has |
| never approached her. He is not dangerous. ... He just went off |
| half-cocked." |
|
|
| The Jan. 9 story was titled with the female student's last name |
| and detailed her torture, rape and murder while gagged and tied to |
| a chair. |
|
|
| The student also may face federal charges, said FBI Special |
| Agent Gregory Stejskal in Ann Arbor. Congress recently added |
| computer trafficking to anti-pornography laws. |
|
|
| The student was suspended Thursday by a special emergency order |
| from university President James J. Duderstadt. His identification |
| card was seized and he was evicted from his university residence |
| without a hearing. |
|
|
| University spokeswoman Lisa Baker declined to comment. |
|
|
| ------------------------------------------------------------------------------- |
|
|
| Snuff Porn On The Net Feb 12, 1995 |
| ~~~~~~~~~~~~~~~~~~~~~ |
| by Philip Elmer-Dewitt (Time) |
|
|
| Jake Baker doesn't look like the kind of guy who would tie a woman by her |
| hair to a ceiling fan. The slight (5 ft. 6 in., 125 lbs.), quiet, bespectacled |
| sophomore at the University of Michigan is described by classmates as gentle, |
| conscientious and introverted. |
|
|
| But Baker has been doing a little creative writing lately, and his words have |
| landed him in the middle of the latest Internet set-to, one that pits a |
| writer's First Amendment guarantees of free speech against a reader's right |
| to privacy. Now Baker is facing expulsion and a possible sentence of five |
| years on federal charges of sending threats over state lines. |
|
|
| It started in early December, when Baker composed three sexual fantasies and |
| posted them on alt.sex.stories, a newsgroup on the Usenet computer network |
| that is distributed via the Internet. Even by the standards of alt.sex.stories, |
| which is infamous for explicit depictions of all sorts of sex acts, Baker's |
| material is strong stuff. Women (and young girls) in his stories are |
| kidnapped, sodomized, mutilated and left to die by men who exhibit no remorse. |
| Baker even seemed to take pleasure in the behavior of his protagonists and |
| the suffering of their victims. |
|
|
| The story that got Baker in trouble featured, in addition to the ceiling fan, |
| acts performed with superglue, a steel-wire whisk, a metal clamp, a spreader |
| bar, a hot curling iron and, finally, a match. Ordinarily, the story might |
| never have drawn attention outside the voyeuristic world of Usenet sex groups, |
| but Baker gave his fictional victim the name of a real female student in one |
| of his classes. |
|
|
| Democratic Senator James Exon of Nebraska introduced legislation earlier |
| this month calling for two-year prison terms for anyone who sends, or |
| knowingly makes available, obscene material over an electronic medium. |
| "I want to keep the information superhighway from resembling a red-light |
| district," Exon says. |
|
|