[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: PWN/Part02 ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ] [ 71 ]
Current issue : #34 | Release date : 1991-10-13 | Editor : Dispater
Introduction to Phrack 34Dispater & Crimson Death
Phrack LoopbackPhrack Staff
Phrack Prophile of The Disk JockeyThe Disk Jockey & Dispater
The AT&T Mail GatewayRobert Alien
The Complete Guide to Hacking WWIVInhuman
Hacking Voice Mail SystemsNight Ranger
An Introduction to MILNETBrigadier General Swipe
TCP/IP: A Tutorial Part 2 of 2The Not
Advanced Modem-Oriented BBS SecurityDead Cow & Laughing Gas
PWN/Part01Dispater
PWN/Part02Dispater
Title : PWN/Part02
Author : Dispater
                               ==Phrack Inc.==

                Volume Three, Issue Thirty-four, File #11 of 11

              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
              PWN                                             PWN
              PWN             Phrack World News               PWN
              PWN                                             PWN
              PWN           Issue XXXIV,  Part Two            PWN
              PWN                                             PWN
              PWN            Compiled by Dispater             PWN
              PWN                                             PWN
              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN

Mind Rape or Media Rape?
~~~~~~~~~~~~~~~~~~~~~~~
Special Thanks: Night Ranger

Thursday September 26, 1991  was no ordinary day for Mind Rape, a young Arizona
State college student.  When he finally made it home that day, he found his home
had been raided by the feds.  'They took EVERYTHING! Including my Metallica
tape!' he told me.  After talking to him for quite a while I learned a lot, not
just about his bust but about hacking in general.  He instructed me not to say
anything specifically on the advice of his lawyer and the EFF, but he did want
me to let the real reason he was busted be known - His electronic newsletter
entitled NSA (for National Security Anarchists).  Mind Rape has some very
important views on hacking that the government doesn't want others to hear.
Some of these views were contained in his newest and soon to be released
newsletter NSA issue number five, which was confiscated of course.  He was also
working on a book about hacker's philosophy, which was taken too.  He has not
yet been charged but in the eyes of the media he is already been tried and
found guilty.  It is unfortunate the general public gets its information from
news reports like the following because, as you can see, they can be quite
misleading.  Hopefully once Mind Rape gets everything straight he will continue
to write his book, after all it is his constitutional right to do so, and I
think it be quite informative to both the hackers of the nineties and the
outside world.

The following is a transcript of a news report covering his story...

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

     Male Announcer: That student is Donald _____ of Phoenix.  Officials of
LDL Long Distance believe he's one of around 20 hackers who've been ripping off
their company for fun and profit.  In tonight's Night Team Report we'll see how
this kind of thievery adds up.  The nation's telephone companies loose more
than a billion dollars a year to hackers.  Mark Nighten (sp?) a security
director for LDL Long Distance.  Last month he was poring through records like
these which convinced him to believe that someone was making hundreds of
computer generated phone calls to his company's 1-800 access line trying to get
customer's calling card codes.  He went to the Phoenix Police.  They got a
search warrant and traced the calls to a house near 18th Drive near Union
Hills.  Police went there last month and came away with a computer, software
and a list of phone codes, all belonging to 19 year old Donald _____ an ASU
student.   With nighten suspects _____ is just one of 20 hacker on his network
who can make thousands of dollars worth of calls which would wind up on other
people's phone bills.

     Mark: You can see the magnitude of this.  Off of one authorization code
you could have 10, maybe 150 other people...

     Male Announcer: Lemme ask ya...How bad are you getting ripped off here?

     Mark: We've had to have somebody on this 24 hours a day.  We've been
getting killed.

     Male Announcer: Hackers often sell the codes they steal to other students.
So that hundreds of students and Arizona State University and University of
Arizona also could be ripping of the company.  Students at Arizona State
University told me today that they have not herd of LDL's troubles, but they
confirmed that stolen phone codes do have a way of getting around.

     I iz a College Student: Someone hears...ya know...about the interest and
someone else knows somebody...ya know...and they tell you and you talk to
them and...ya know...it's not overly expensive or anything like that.

     Male Announcer: Dr. Dan Kneer of Arizona State University's School
of Business is a nationally recognized expert on computer crime.  [who?]  He
contends that hacking is mushrooming.

     Dr. Dan: The problem that I see is that these people philosophically
don't see this as a crime.  For most of them this is an intellectual challenge.

     Male Announcer: That challenge led Dutch students to break into a United
States Army Computer during operation desert storm.  And as this Japanese
documentary shows, it led hackers in a New York City to use payphones to commit
big time rip-offs.  Now it's important to point out that Donald ______, that
Arizona State University student, has not yet been charged with any crime and
if he is charged he is innocent until proven guilty.

     Female announcer: What is the penalty for hacking?

     Male Announcer: Just for getting into a system when you're not supposed to
can be up to a year and a half in prison.   But if there is criminal intent to
steal, to rip-off that system, the penalty can be as high as 10 years in jail
and a $150,000.00 fine.

_______________________________________________________________________________

Computer Hacker Gets Probation                              September 26, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Special Thanks: Flaming Carrot (Pittsburgh Post-Gazette)

     A Mt. Lebanon woman who was able to make thousands of free long-distance
telephone calls by breaking into voice mail boxes with a touch tone telephone
has been placed on 10 years probation.  Last Friday, Common Pleas Judge Robert
E. Dauer ordered Andrea Gerulis, 20, of Castle Shannon Boulevard to make
restitution of $4,300 to Magee Womens Hospital and $2,516 to Pittsburgh
Cellular Telephone Co.

     Gerulis, a Mt. Lebanon High School graduate, was a computer hacker who
entered telephone computer systems illegally so that she could make telephone
calls without paying for the service.  Mt. Lebanon police Detective John L.
Michalec posed as a computer hacker and spent nine months investigating her
activities, which were done by dialing codes on a touch-tone telephone.

     After a non-jury trial in May, Dauer convicted her of two counts of theft
of services and two counts of unlawful use of computers.  Assistant District
Attorney Thaddeus A. Dutkowski recommended probation because he didn't want
Gerulis to go to jail, where she could teach inmates how to commit crimes with
a telephone.  If she were incarcerated, she would have the largest classroom
environment she could hope for, Dutkowski said.

     Dauer agreed that inmates already know too much about committing crimes
with telephones.  Gerulis told Dauer that she was sorry for what she did, that
when she started, she was doing it for fun.  She was also ordered to continue
psychological counseling.
_______________________________________________________________________________

More Archaic Government Regulations Proposed
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Special Thanks: Stainless Steal Provider (New York Times)

     The federal government said Thursday that it would introduce a standard
for authenticating electronic data later this summer, but the announcement
prompted an angry reaction from one of the leading private providers of software
that protects computer data.

     The company, RSA Data Security Inc. of Redwood City, Calif., said the
government had failed to address fears about the possibility of a secret "trap
door," which would permit intelligence and law-enforcement agencies to look at
private data.

    The issue of providing special mechanisms to permit government access to
private information has caused a growing public debate recently.

    Earlier this year an anti-terrorism bill introduced in Congress called on
the computer and telecommunication industries to permit federal agencies to
look at private data.  But the statement was later dropped from the bill after
extensive public opposition.

    Government officials said that it would be possible for technical experts
to examine the standard when it is released this summer and they could decide
for themselves whether there were any shortcomings in the design of the
standard.

    "It will be openly published and people can inspect it to their heart's
content," said James H. Burrows, head of the computer systems laboratory at the
National Institute of Standards and Technology.

    He added that the new standard was not intended to encrypt computer data,
and that the government would continue to rely on an earlier technology known
as the Data Encryption Standard to actually hide information from potential
electronic eavesdroppers.

    Burrows said there was a project under way to develop a successor to that
standard, but that it was years away from completion.
______________________________________________________________________________

Computer Whiz Accused Of Illegal Access and Mischief        September 25, 1991
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Peter G. Chronis (The Denver Post Page 1 "NASA vs. Hobbyist")

     An Aurora computer hobbyist who allegedly used a personal computer and his
home phone to penetrate NASA computers hacked off Uncle Sam enough to be
indicted on seven federal counts yesterday.  Richard G. Wittman, 24, the
alleged "hacker," was accused of two felonies, including gaining unauthorized
access to NASA computers to alter, damage, or destroy information, and five
misdemeanor counts of interfering with the government's operation of the
computers.  Wittman allegedly got into the NASA system on March 7, June 11,
June 19, June 28, July 25, July 30, and Aug. 2, 1.

     Bob Pence, FBI chief in Denver, said Wittman used a personal computer in
his home and gained access to the NASA systems over telephone lines. The
investigation, which took more than a year, concluded that Wittman accessed the
NASA computer system and agency computers at the Marshall Space flight Center in
Huntsville, Alabama, and the Goddard Space Flight Center in Greenbelt,
Maryland.

     The NASA computers are linked to a system called Telenet, which allows
qualified people to access government data bases.  A user name and password
are required to reach the NASA computers.  Federal sources declined to reveal
more information because the complex case involves "sensitive material."

     Wittman, a high-school graduate, apparently hadn't worked in the computer
industry and held a series of odd jobs.  The felony counts against him each
carry a possible five-year prison term and $250,000 fine.
_______________________________________________________________________________

Security Increases
~~~~~~~~~~~~~~~~~
Special Thanks: Stainless Steal Provider (New York Times)

     The foundation was started by Richard Stallman, who was awarded a MacArthur
Foundation fellowship in 1.  While mainstream software companies
have prohibited users from freely copying their programs, Stallman, who is
widely respected for developing computer languages and software editing tools,
has argued that information is not the same as other commodities and should be
shared without cost.

     His password has been widely known among network users because he has
refused to keep it secret.  He is bitter about the changes that have
accompanied the coming of age of computer networks.

     Last month, after security was increased at the foundation and many users
were stripped of their guest privileges, Stallman said he considered giving up
his quest.

    In the end, he decided that the cause of creating free software was too
important to abandon, but he said he feels like a pariah.  "Since I won't agree
to have a real password, I will only be able to log in on the 'inside'
 machines,"
he wrote in an electronic message in response to a reporter's query.

    "I still feel partly ashamed of participating in this. I've been forced to
choose between two principles, both of which are so important to me that I
won't accept the loss of either of them."

     Idealists like Stallman and Ted Nelson, the author of the cult classic
 "Computer Lib," hoped that the computer revolution wouldn't be like the
industrial revolution. This time the wealth -- information -- would be free to
everyone and instant communication would break down the barriers between rich
and poor and remake mankind.

     Marvin Minsky, a computer science professor at MIT, said that for 15
years, beginning in 1963, researchers at the school lived in a paradise,
sharing computers and networks before a system of password protection was
installed. Now that has changed.  "It's sad," he said.

    "But Richard Stallman is living in a dream world.  He has this view that
his idea of computer ethics will prevail.  But it's not going to happen this
year or next."

    Instead of finding community on computer networks, many users are now
confronted with virus invasions and information theft, leading to the same
sense of alienation and fear felt by residents of large cities.

   "At first I thought this was Marshall McLuhan's global village coming to
reality," said Neil Harris, a manager at General Electric Information Services
Co., which sets up computer conferences and sells information to about 200,000
members around the world.

   "But it's not that at all. It's a lot of people connecting in hundreds of
small communities based around highly specific interests."

    Steven Levy, who has written about the early days of computing at MIT, said
that the demise of the Free Software Foundation's open door policy was
inevitable.

   "When you pass the plate around in church you don't expect people to steal
from it," he said.  "But sooner or later everyone knows that the plate is
unguarded, and there are always people who don't care about the church.  The
question is how far do you go to protect it?  Do you lock the church or do you
send an armed guard around with the plate?"
______________________________________________________________________________

PWN Quicknotes
~~~~~~~~~~~~~
1.   On June 12, 1991, Sirhackalot's equipment was confiscated by the Southern
     Bell and the FBI without any charges being filed.  Neither the FBI nor
     Southern Bell bothered to explain why they were in his home and taking his
     personal possessions.  Again neither party could tell Sirhackalot what he
     supposedly did to bring both agency's to his doorstep.  Also busted were
     Mr.Doo and The Imortal Phreak.  [Special Thanks: The Marauder (404)]
_______________________________________________________________________________

2.   Bill Cook is no longer an assistant United States Attorney in Chicago.  It
     is unknown how he left his position.  Basic questions go unanswered. Did
     he quit or was fired?  If he was fired, we'd like to know exactly why.
_______________________________________________________________________________

3.   Wanted:  Targets of Operation Sun Devil

     Computer Professionals for Social Responsibility (CPSR) is pursuing a
     lawsuit against the Secret Service seeking the release of information
     concerning Operation Sun Devil.  In recently filed court papers, the
     agency claims that the information cannot be disclosed because, among
     other reasons, disclosure would violate the privacy of those individuals
     who are the targets of the investigation.  This argument can be overcome
     if CPSR obtains signed releases from those individuals.  CPSR is
     requesting the cooperation of anyone who was the subject of a Sun Devil
     raid on or about May 7, 1.  We are prepared to enter into an attorney-
     client relationship with individuals responding to this request, so that
     confidentiality will be assured.

     Please respond ASAP to:

                           David Sobel
                           CPSR Legal Counsel
                           (202) 544-9240
                           [email protected]
_______________________________________________________________________________

4.   Recently Microsoft discovered it was the victim of trespassing.  A
     security guard noticed two people playing volleyball on the premises and
     knew that they did not work for Microsoft.  The officer approached the
     volleyball players and asked them to leave.  The trespassers left.  Later
     someone asked the security guard how he knew that the people playing
     volleyball were not Microsoft employees. He replied, "They had tans."
     [Special Thanks: Psychotic Surfer]
_______________________________________________________________________________


[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2024, Phrack Magazine.