[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: PWN ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ] [ 71 ]
Current issue : #42 | Release date : 1993-03-01 | Editor : Erik Bloodaxe
IntroductionErik Bloodaxe
Phrack Loopback / Editorial Page / Line NoisePhrack Staff
Phrack Pro-Phile on Lord DigitalLord Digital
Packet Switched Network SecurityChris Goggans
Tymnet Diagnostic ToolsProfessor Falken
A User's Guide to XRAYNOD
Useful Commands for the TP3010 Debug PortG. Tenet
Sprintnet Directory Part ISkylar
Sprintnet Directory Part IISkylar
Sprintnet Directory Part IIISkylar
Guide to EncryptionThe Racketeer
The Freedom Of Information Act and YouVince Niel
HoHoConvarious
PWNDatastream Cowboy
Title : PWN
Author : Datastream Cowboy
                              ==Phrack Magazine==

                  Volume Four, Issue Forty-Two, File 14 of 14

              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
              PWN                                             PWN
              PWN              Phrack World News              PWN
              PWN                                             PWN
              PWN        Compiled by Datastream Cowboy        PWN
              PWN                                             PWN
              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


              STEVE JACKSON GAMES v. UNITED STATES SECRET SERVICE

 Rights To Be Tested In Computer Trial                         January 20, 1993
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 by Joe Abernathy (The Houston Chronicle)(Page A13)
 *Reprinted With Permission*

                        Summary Judgment Denied In Case

AUSTIN -- A judge Tuesday denied plaintiff lawyers' request for summary
judgment in a case brought against the U.S. Secret Service to set the bounds of
constitutional protections for electronic publishing and electronic mail.

U.S. District Judge Sam Sparks acted after hearing complicated arguments
regarding application of 1st and 4th Amendment principles in  computer-based
communications and publishing.  The case will go to trial at 9 a.m. today.

"Uncontested facts show the government violated the Privacy Protection Act and
the Electronic Communications Privacy Act," said Pete Kennedy, attorney for
Steve Jackson Games, an Austin game company that brought the lawsuit.

Mark W. Batten, attorney for the Department of Justice, which is defending the
Secret Service, declined to comment on the proceedings.

Steve Jackson's company, which publishes fantasy role-playing games -- not
computer games -- was raided by the Secret Service on March 1, 1990, during a
nationwide sweep of suspected criminal  computer hackers.

Agents seized several computers and related hardware from the company and from
the Austin home of Steve Jackson employee Loyd Blankenship.  Taken from the
game publisher was an electronic bulletin board used to play-test games before
they were printed and exchange electronic mail with customers and free-lance
writers.

Another seized computer contained the text of the company's work in progress,
GURPS Cyberpunk, which was being prepared for the printers.

Blankenship's purported membership in the Legion of Doom -- a group of computer
hackers from Austin, Houston and New York -- led the Secret Service to Steve
Jackson's door.

Neither Jackson nor his company was suspected of wrongdoing.

The game publisher is named in two paragraphs of the 42-paragraph affidavit
requesting the 1990 search warrant, which targeted Blankenship -- a fact
Kennedy cited in seeking summary judgment.

Kennedy presented evidence that the original Secret Service affidavit for the
warrant used to raid Steve Jackson Games contained false statements.
Supporting documentation showed that Bellcore expert Henry Kluepfel disputes
statements attributed to him that accounted for the only link between Steve
Jackson Games and the suspicion Blankenship was engaged in illegal activity.

Batten came away visibly shaken from questioning by Sparks, and later had a
tense exchange with Kennedy outside the courtroom.

The lawsuit contends the government violated 1st Amendment principles by
denying the free speech and public assembly of callers to Jackson's bulletin
board system, Illuminati.  This portion of the complaint was brought under the
Privacy Protection Act, which also covers the seized Cyberpunk manuscripts --
if the judge rules that such a book, stored electronically prior to
publication, is entitled to the same protections as a printed work.
The government lawyers argued the Privacy Protection Act applies only to
journalistic organizations -- an argument Sparks didn't seem to buy.

The lawsuit also contends 4th Amendment principles providing against
unreasonable search and seizure were violated, on grounds the Electronic
Communications Privacy Act specifies protection for publishers.

The Justice Department contends electronic mail does not enjoy constitutional
protections.

"They (users of Illuminati) had no expectation of privacy in their electronic
mail messages," Batten said.  The basis of the argument is that Illuminati's
callers were not sending communications to others, but rather "revealing" them
to a third party, Steve Jackson, thus negating their expectation of privacy.
_______________________________________________________________________________

 Computer Case Opens; Agent Admits Errors                      January 27, 1993
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 by Joe Abernathy (The Houston Chronicle)(Page A11)
 *Reprinted With Permission*

AUSTIN -- Plaintiff's attorneys wrested two embarrassing admissions from the
U.S. Secret Service on the opening day of a federal civil lawsuit designed to
establish constitutional protections for electronic publishing and electronic
mail.

Special Agent Timothy Folly of Chicago admitted that crucial statements were
erroneous in an affidavit he used to obtain warrants in a 1990 crackdown on
computer crime.

Foley also conceded that the Secret Service's special training for computer
crime investigators overlooks any mention of a law that limits search-and-
seizure at publishing operations.

The case before U.S. District Judge Sam Sparks was brought by Steve Jackson
Games, an Austin game publisher, with the support of electronic civil rights
activists who contend that federal agents have overstepped constitutional
bounds in their investigations of computer crime.

Jackson supporters already have committed more than $200,000 to the litigation,
which seeks $2 million in damages from the Secret Service and other defendants
in connection with a March 1990 raid on Jackson Games.

Plaintiffs hope to establish that First Amendment protections of the printed
word extend to electronic information and to guarantee privacy protections for
users of computer bulletin board systems, such as one called Illuminati that
was taken in the raid.

Steve Jackson's attorney, Jim George of Austin, focused on those issues in
questioning Foley about the seizure of the personal computer on which
Illuminati ran and another PC which contained the manuscript of a pending
Jackson Games book release, "GURPS Cyberpunk."

"At the Secret Service computer crime school, were you, as the agent in charge
of this investigation, made aware of special rules for searching a publishing
company?"  George asked Foley.  He was referring to the Privacy Protection Act,
which states that police may not seize a work in progress from a publisher.  It
does not specify what physical form such a work must take.

Foley responded that the Secret Service does not teach its agents about those
rules.

Earlier, Foley admitted that his affidavit seeking court approval to raid
Jackson Games contained an error.

During the raid -- one of several dozen staged that day around the country in
an investigation called Operation Sun Devil -- agents were seeking copies of a
document hackers had taken from the computer system of BellSouth.

No criminal charges have been filed against Jackson, his company, or others
targeted in several Austin raids.  The alleged membership of Jackson employee
Loyd Blankenship in the Legion of Doom hacker's group -- which was believed
responsible for the BellSouth break-in -- lead agents to raid Jackson Games at
the same time that Blankenship's Austin home was raided.

Foley's affidavit stated that Bell investigator Henry Kluepfel had logged on to
the Illuminati bulletin board and found possible evidence of a link between
Jackson Games and the Legion of Doom.

But George produced a statement from Kluepfel, who works for Bellcore, formerly
AT&T Bell Labs, disputing statements attributed to him in the affidavit.  Foley
acknowledged that part of the affidavit was erroneous.

The U.S. Department of Justice, which is defending the Secret Service, contends
that only traditional journalistic organizations enjoy the protections of the
Privacy Protection Act and that users of electronic mail have no reasonable
expectation of privacy.
_______________________________________________________________________________

 Judge Rebukes Secret Service For Austin Raid                  January 29, 1993
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 by Joe Abernathy (The Houston Chronicle)(Page A21)
 *Reprinted With Permission*

AUSTIN -- A federal judge lambasted the U.S. Secret Service Thursday for
failing to investigate properly before it seized equipment from three Austin
locations in a 1990 crackdown on computer crime.

U.S. District Judge Sam Sparks' comments came on the final day of trial in a
lawsuit brought by Steve Jackson Games, an Austin publisher, with the support
of national computer rights activists.

The judge did not say when he will issue a formal ruling in the case.  In
addition to seeking $ 2 million in damages from the Secret Service and other
defendants, Jackson hopes to establish privacy and freedom of the press
protections for electronic information.

In a packed courtroom Thursday morning, Sparks dressed down Secret Service
Special Agent Timothy Foley of Chicago, who was in charge of the March 1, 1990,
raid on Jackson, one of his employees and a third Austin man.  No criminal
charges have been filed in connection with the raids.

"The Secret Service didn't do a good job in this case," Sparks said.  "We know
no investigation took place.  Nobody ever gave any concern as to whether
(legal) statutes were involved.  We know there was damage (to Jackson)."

The Secret Service has seized dozens of computers since the nationwide
crackdown began in 1990, but Jackson, a science fiction magazine and game book
publisher, is the first to challenge the practice.  A computer seized at
Jackson Games contained the manuscript for a pending book, and Jackson alleges,
among other things, that the seizure violated the Privacy Protection Act, which
prohibits seizure of publishers' works in progress.

Agents testified that they were not trained in that law at the special Secret
Service school on computer crime.

Sparks grew visibly angry when testimony showed that Jackson never was
suspected of a crime, that agents did no research to establish a criminal
connection between the firm and the suspected illegal activities of an
employee, and that they did not determine that the company was a publisher.

"How long would it have taken you, Mr. Foley, to find out what Steve Jackson
Games  did, what it was? " asked Sparks.  "An hour?

"Was there any reason why, on March 2, you could not return to Steve Jackson
Games a copy, in floppy disk form, of everything taken?

"Did you read the article in Business Week magazine where it had a picture of
Steve Jackson -- a law-abiding, tax-paying citizen -- saying he was a computer
crime suspect?

"Did it ever occur to you, Mr. Foley, that seizing this material could harm
Steve Jackson economically? "

Foley replied, "No, sir," but the judge offered his own answer:

"You actually did; you just had no idea anybody would actually go out and hire
a lawyer and sue you."

The judge's rebuke apparently convinced the government to close its defense
after the testimony from Foley, only one of several government witnesses on
hand.  Justice Department attorney Mark Battan entered subdued testimony
seeking to limit the award of monetary damages.

The judge's comments came after cross-examination of Foley by Pete Kennedy,
Jackson's attorney.

Sparks questioned Foley about the raid, focusing on holes in the search
warrant, why Jackson was not allowed to copy his work in progress after it was
seized, and why his computers were not returned after the Secret Service
analyzed them.

"The examination took seven days, but you didn't give Steve Jackson's computers
back for three months.  Why?" asked Sparks.

"So here you are, with three computers, 300 floppy disks, an owner who was
asking for it back, his attorney calling you, and what I want to know is why
copies of everything couldn't be given back in days.  Not months.  Days.

"That's what makes you mad about this case."

Besides alleging that the seizure violated the Privacy Protection Act, Jackson
alleged that since one of the computers was being used to run a bulletin board
system containing private electronic mail, the seizure violated the Electronic
Communications Privacy Act.

Justice Department attorneys have refused comment on the case, but contended in
court papers that Jackson Games is a manufacturer, and that only journalistic
organizations can call upon the Privacy Protection Act.

The government said that seizure of an electronic bulletin board system does
not constitute interception of electronic mail.

The Electronic Frontier Foundation committed more than $200,000 to the Jackson
suit.  The EFF was founded by Mitchell Kapor of Lotus Technology amid a
computer civil liberties movement sparked in large part by the Secret Service
computer crime crackdown that included the Austin raids.

"The dressing down of the Secret Service for their behavior is a major
vindication of what we've been saying all along, which is that there were
outrageous actions taken against Steve Jackson that hurt his business and sent
a chilling effect to everyone using bulletin boards, and that there were larger
principles at stake," said Kapor, contacted at his Cambridge, Massachusetts
office.

Shari Steele, who attended the trial as counsel for the EFF, said, "We're very
happy with the way the case came out.  That session with the judge and Tim
Foley is what a lawyer dreams about."
_______________________________________________________________________________

 Going Undercover In The Computer Underworld                   January 26, 1993
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 by Ralph Blumenthal (The New York Times)(Page B1)

  [A 36-year old law enforcement officer from the East Coast masquerades
  as "Phrakr Trakr" throughout the nation's computer bulletin boards.
  As the organizer of the High-Tech Crime Network, he has educated other
  officers in over 28 states in the use of computer communications.
  Their goal is to penetrate some 3000 underground bbses where computer
  criminals trade in stolen information, child pornography and bomb
  making instructions.

  "I want to make more cops aware of high-tech crime," he said.  "The
  victims are everybody.  We all end up paying for it."]
_______________________________________________________________________________

 Hackers Breaking Into UC Computers                            January 23, 1993
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 by T. Christian Miller (The San Francisco Chronicle)(Page A20)

 [According to the University of California, hackers have been breaking
  into the DOD and NASA through UC computer systems.  The investigation
  links over 100 computer hackers who have reportedly penetrated
  computers at UC Davis, UC Berkeley, NYU, FSU, and CSU.  The FBI stated
  that the investigation reached as far as Finland and Czechoslovakia
  but did not comment on any arrests.

  University officials have asked all users to change to more complex
  passwords by April 1.]

_______________________________________________________________________________

 Feds Sued Over Hacker Raid At Mall                            February 5, 1993
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 by Joe Abernathy (The Houston Chronicle)(Page A5)

 [A lawsuit was filed 2-4-93 in the Washington, D.C. federal court to
  force the secret service to disclose its involvement in the disruption
  of a meeting of computer hackers last year.  The meeting, a monthly
  gathering of readers of "2600 Magazine" at the Pentagon City Mall was
  disrupted on November 6, 1992, when mall security and Arlington County
  Police questioned and searched the attendees.

  The suit was filed by the Computer Professionals for Social
  Responsibility.  "If this was a Secret Service operation, it raises
  serious constitutional questions," said Marc Rotenberg, director of
  CPSR.

  The Secret Service declined to comment on the matter.]

----------


[New Info in 2600 Case - from email sent by CPSR]

     One month after being sued under the Freedom of Information
Act (FOIA), the Secret Service has officially acknowledged that
it possesses "information relating to the breakup of a meeting
of individuals at the Pentagon City Mall in Arlington, Virginia."
The admission, contained in a letter to Computer Professionals for
Social Responsibility (CPSR), confirms widespread suspicions that
the agency played a role in the detention and search of
individuals affiliated with "2600" Magazine at the suburban
Washington mall on November 6, 1992.

     CPSR filed suit against the Secret Service on February 4
after the agency failed to respond to the organization's FOIA
request within the statutory time limit.  In its recent response,
the Secret Service released copies of three news clippings
concerning the Pentagon City incident but withheld other
information "because the documents in the requested file contain
information compiled for law enforcement purposes."  While the
agency asserts that it possesses no "documentation created by the
Secret Service chronicling, reporting, or describing the breakup
of the meeting," it does admit to possessing "information provided
to the Secret Service by a confidential source which is
information relating to the breakup of [the] meeting."  Federal
agencies classify other law enforcement agencies and corporate
entities, as well as individuals, as "confidential sources."

     The propriety of the Secret Service's decision to withhold
the material will be determined in CPSR's pending federal lawsuit.
A copy of the agency's letter is reprinted below.

David L. Sobel                               [email protected]
Legal Counsel                                (202) 544-9240 (voice)
CPSR Washington Office                       (202) 547-5481 (fax)

************************************************


                    DEPARTMENT OF THE TREASURY
                   UNITED STATES SECRET SERVICE

                                    MAR 5 1993

                                    920508


David L. Sobel
Legal Counsel
Computer Professionals for
Social Responsibility
666 Pennsylvania Avenue, S.E.
Suite 303
Washington, D.C.  20003

Dear Mr. Sobel:

This is in response to your Freedom of Information Act (FOIA)
request for access to "copies of all records related to the
breakup of a meeting of individuals affiliated with "2600
Magazine" at the Pentagon City Mall in Arlington, Virginia on
November 6, 1992."

Enclosed, please find copies of materials which are responsive to
your request and are being released to you in their entirety.

Other information has been withheld because the documents in the
requested file contain information compiled for law enforcement
purposes.  Pursuant to Title 5, United States Code, Section
552(b)(7)(A); (C); and (D), the information has been exempted
since disclosure could reasonably be expected to interfere with
enforcement proceedings; could reasonably be expected to
constitute an unwarranted invasion of personal privacy to other
persons; and could reasonably be expected to disclose the
identity of a confidential source and/or information furnished by
a confidential source.  The citations of the above exemptions are
not to be construed as the only exemptions that are available
under the Freedom of Information Act.

In regard to this matter it is, however, noted that your FOIA
request is somewhat vague and very broadly written.  Please be
advised, that the information being withheld consists of
information provided to the Secret Service by a confidential
source which is information relating to the breakup of a meeting
of individuals at the Pentagon City Mall in Arlington, Virginia,
and, therefore, appears to be responsive to your request as it
was written. If, however, the information you are seeking is
information concerning the Secret Service's involvement in the
breakup of this meeting, such as any type of documentation
created by the Secret service chronicling, reporting, or
describing the breakup of the meeting, please be advised that no
such information exists.

If you disagree with our determination, you have the right of
administrative appeal within 35 days by writing to Freedom of
Information Appeal, Deputy Director, U. S. Secret Service,
1800 G Street, N.W., Washington, D.C. 20223.  If you choose to
file an administrative appeal, please explain the basis of your
appeal.

                                    Sincerely,

                                    /Sig/
                                    Melvin E. Laska
                                    ATSAIC
                                    Freedom of Information &
                                    Privacy Acts Officer

Enclosure

*******************************************

For more information, refer to Phrack World News, Issue 41/1:

 Reports of "Raid" on 2600 Washington Meeting                  November 9, 1992
 Confusion About Secret Service Role In 2600 Washington Raid   November 7, 1992
 Conflicting Stories In 2600 Raid; CRSR Files FOIA            November 11, 1992
_______________________________________________________________________________

 Surfing Off The Edge                                          February 8, 1993
 ~~~~~~~~~~~~~~~~~~~~
 by Richard Behar (Time Magazine)(Page 62)

 [This article is so full of crap that I cannot even bring myself
   to include a synopsis of it.  Go to the library and read it
   and laugh.]
_______________________________________________________________________________

 Bulgarian Virus Writer, Scourge in the West, Hero at Home     January 29, 1993
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 by David Briscoe (Associated Press)

 [The Dark Avenger, believed to be a computer programmer in Sophia, has
  drawn the attention of computer crime squads in the US and Europe.  To
  many programmers the Dark Avenger is a computer master to many young
  Bulgarians.  "His work is elegant. ... He helps younger programmers.
  He's a superhero to them," said David Stang director for the
  International Virus Research Center.

  Neither Bulgaria nor the US has laws against the writing of computer
  viruses]
_______________________________________________________________________________

 Computer Security Tips Teach Tots To Take Byte Out Of Crime   February 3, 1993
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 by Michelle Locke (Associated Press)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 Young Students Learn Why Computer Hacking Is Illegal         February 4, 1993
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 by Bill Wallace (San Francisco Chronicle)(Page A22)

 [In an attempt to teach computer crime prevention, children in
  kindergarten through third grade in a Berkeley elementary school are
  being shown a 30 minute presentation on ethics and security.

  The program consists of several skits using puppets to show the
  children various scenarios from eating food near computer systems to
  proper password management.

  In one episode, Gooseberry, a naive computer user, has her files
  erased by Dirty Dan, the malicious hacker, when she neglects to log
  off.

  Philip Chapnick, director of the Computer Security Institute in San
  Francisco, praised the idea.  "One of the major issues in information
  security in companies now is awareness.  Starting the kids early ... I
  think it will pay off," said Chapnick.]
_______________________________________________________________________________

Tracking Hackers - Experts Find Source In Adolescence       February 25, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By Mike Langberg (Knight-Ridder News Service)

[At the National Computer Security Association convention in San
  Francisco, four experts analyzed the psyche of today's hacker.
  The panel decided that hacker bonding came from a missing or defective
  family.  The panel also decided that hackers weren't necessarily
  geniuses, and that a few weeks of study would be enough to begin.

  Panel member Winn Schwartau stated that there should be an end to
  slap-on-the-wrist penalties.  Sending hackers to jail would send a
  clear message to other hackers, according to Schwartau.

  "What strikes me about hackers is their arrogance," said Michael
  Kabay, computer security consultant from Montreal.  "These people seem
  to feel that their own pleasures or resentments are of supreme
  importance and that normal rules of behavior simply don't apply to
  them."]
_______________________________________________________________________________

 Bomb Recipes Just A Keystroke Away                      January 10, 1993
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 by Tracy Gordon Fox (The Hartford Courant)(Page B1)

 [Teenagers gathering information via computer have contributed greatly
  to the fifty percent increase in the number of homemade explosives
  found last year.

  The computer age has brought the recipes for the explosives to the
  fingertips of anyone with a little computer knowledge and a modem.

  One of the first police officers to discover that computers played a
  part in a recent West Hartford, Connecticut, bombing said that
  hackers were loners, who are socially dysfunctional, excel in
  mathematics and science, and are "over motivated in one area."

  The trend has been seen around the country.  The 958 bombing incidents
  reported nationally to the Bureau of Alcohol, Tobacco and Firearms was
  the highest in 15 years.]
_______________________________________________________________________________

 Hackers Hurt Cellular Industry                                January 25, 1993
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 by John Eckhouse (The San Francisco Chronicle)(Page C1)

 [With only a little equipment and technical knowledge, telephone
  pirates can make free calls and eavesdrop on cellular conversations.

  "Technically, eavesdroping is possible, but realistically I don't
  think it can be done," said Justin Jasche chief executive of Cellular One.

  The Cellular Telecommunications Industry Association estimates that
  hackers make about $300 million worth of unauthorized calls a year,
  though others put the figure much higher.]

-------------------------------------------------------------------------------

 Cellular Phreaks and Code Dudes                         February 1993
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 by John Markoff  (Wired)  (page 60)

 [Two hackers, V.T. and N.M. have discovered that celluar phones are
  really just little computers linked by a gigantic cellular network.
  And like most computers, they are programmable.  The hackers have
  discovered that the OKI 900 has a special mode that will turn it into
  a scanner, enabling them to listen in on other cellular conversations.

  The two also discovered that the software stored in the phones ROM
  takes up roughly 40K, leaving over 20K free to add in other features,
  They speculate on the use of the cellular phone and a computer
  to track users through cell sites, and to monitor and decode
  touchtones of voice mail box codes and credit card numbers.

  Said V.T. of the OKI's programmers, "This phone was clearly built by
  hackers."]

-------------------------------------------------------------------------------

 Callers Invited To Talk Sex, Thanks To Hacker's Prank     February 5, 1993
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 (The Vancouver Sun) (Page A-9)

 [For the past two weeks, surprised callers to CTC Payroll Services'
  voice-mail system have been invited to talk sex.  Instead
  of a pleasant, professional salutation, callers hear a man's voice
  suggesting that they engage a variety of intimate activities.

  The prankster is a computer hacker who can re-program the greeting message
  on company telephones.  Company owner Cheryl MacLeod doesn't think the joke
  is very funny and says the hacker is ruining her business.]
_______________________________________________________________________________
[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2024, Phrack Magazine.