AOH :: P41-13.TXT

PWN/Part 3



                                ==Phrack Inc.==

                  Volume Four, Issue Forty-One, File 13 of 13

              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
              PWN                                             PWN
              PWN              Phrack World News              PWN
              PWN                                             PWN
              PWN           Issue 41 / Part 3 of 3            PWN
              PWN                                             PWN
              PWN        Compiled by Datastream Cowboy        PWN
              PWN                                             PWN
              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


 Boy, 15, Arrested After 911 Paralyzed By Computer Hacker       October 7, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 by Caroline Mallan (The Toronto Star)(Page A22)

A 15-year-old boy has been arrested after a hacker pulling computer pranks
paralyzed Metro's emergency 911 service.

Police with Metro's major crime unit investigated the origin of countless calls
placed to the 911 service from mid-July through last month.

The calls were routed to emergency services in the Etobicoke area, said
Detective Willie Johnston, who led the investigation.

Phony medical emergency calls were reported and police, fire and ambulance
crews were dispatched on false alarms.  On one occasion, the computer hacker
managed to tie up the entire 911 service in Metro -- making it unavailable for
true emergencies.

Police were not sure last night how long the system was shut down for but
Johnston said the period was considerable.

Staff Sergeant Mike Sale warned hackers that phony calls can be traced.

"A criminal abuse of the 911 emergency system will result in a criminal
investigation and will result in an arrest," Sale said, adding police had only
been investigating this hacker for a few weeks before they came up with a
suspect.

Bell Canada investigators helped police to trace the origin of the calls and
officers yesterday arrested a teen while he was in his Grade 11 class at a
North York high school.

Two computers were seized from the boy's home and will be sent to Ottawa to be
analyzed.

Johnston said police are concerned that other hackers may also be able to halt
the 911 service, since the computer technology used was fairly basic, although
the process of rerouting the calls from a home to the Etobicoke emergency lines
was very complex.

The calls went via computer modem through two separate phone systems in major
U.S. cities before being sent back to Canada, Johnston explained.

The suspect, who cannot be named under the Young Offenders Act, is charged with
theft of telecommunications, 24 counts of mischief and 10 counts of conveying
false messages.

He was released from custody and will appear in North York youth court November
6, police said.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Police Say They've Got Hackers' Number                         October 8, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 by John Deverell (The Toronto Star)(Page A8)

      Hackers, take note.  Metro police and Ma Bell are going to get you.

A young North York computer freak accused of launching 10 false medical alerts
to 911 this summer may have learned -- the hard way -- that his telephone
tricks weren't beating the pros.

Police arrived with a search warrant at the home of the 15-year-old, arrested
him and carted away his computer.

He's charged with 10 counts of conveying false messages, 24 counts of mischief,
and theft of telecommunications.

Inspector Bill Holdridge, of 911 emergency services, said the false alarms in
July and August never posed any technical problem to his switchboard but
resulted in wild goose chases for the police, fire and ambulance services.

"Those resources weren't available for real alarms, which could have been a
serious problem," Holdridge said.

The 911 service, quartered at 590 Jarvis Street, gets about 7,000 calls a day,
of which 30% warrant some kind of emergency response.

Normally, a computerized tracing system takes only seconds to provide the
address and number of the telephone from which a call originates -- unless the
point of origin has been somehow disguised.

Apparently the 911 prankster got into the telephone system illegally and routed
his calls through several U.S. networks before bringing them back to Toronto.

Detective Willie Johnston said the boy's parents were stunned when police
arrived.  "They really didn't have a clue what was going on," said Johnston.

The false emergencies reported were nowhere near the accused boy's home.
"Without condoning it, you could understand it if he were sitting around the
corner watching the flashing lights," said Johnston.  "But they were miles
away. It defies logic."

Neither Johnston nor Holdridge would explain how they and Bell security finally
traced the false alarms. "That might just make other hackers try to figure out
another way," Holdridge said.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Hackers Targeted 911 Systems, Police Say                      October 10, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 Taken from United Press International

Authorities expect to make more arrests after penetrating a loose network of
computer hackers called the "Legion of Doom" they say tapped into corporate
phone lines to call 911 systems nationwide with the intent of disrupting
emergency services.

Prosecutors from Virginia, New Jersey and Maryland -- in conjunction with
investigators from two telephone companies -- traced some of the hackers and
closed in on three homes in two states.

A 23-year-old Newark, New Jersey man was arrested early on October 9th.  He
faces several charges, including fraud.  Other arrests are expected in two
Maryland locations.

The suspect, known by several aliases and identified by authorities only as
Maverick, told investigators the group's intent was "to attempt to penetrate
the 911 computer systems and infect them with viruses to cause havoc," said
Captain James Bourque of the Chesterfield County police in Virginia.

The probe is just beginning, according to Bourque.  "Quite honestly, I think
it's only the tip of the iceberg," he said.

The hackers first penetrate the phone lines of large companies or pay phones,
then use those connections to call 911 lines, Bourque said.  The hackers
usually make conference calls to other 911 services in other cities, tying up
communications in several locations simultaneously.

"One time we were linked up with Toronto and Los Angeles jurisdictions,"
Bourque said.  "And none of us could disconnect."

Sometimes as many five hackers would be on the line and would make false calls
for help.  Communications officers, unable to stop the calls, would have to
listen, then try to persuade the officers in other locales "that the call
wasn't real," Bourque said.

"Obviously, there's a real potential for disastrous consequences," he said.

One phone bill charged to a company in Minnesota indicated the scope of the
problem.  The company discovered in a 30-day period that it had been charged
with more than $100,000 in phone calls generated by the hackers, according to
Bourque.

"I'm sure there are a multitude of other jurisdictions across the country
having the same problems," Bourque said.

People identifying themselves as members of the "Legion of Doom" -- which also
is the name of a pro wresting team -- have called a Richmond, Virginia
television station and ABC in New York in an attempt to get publicity, Bourque
said.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 More On 911 "Legion Of Doom" Hacking Case                     October 20, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 by Barbara E. McMullen & John F. McMullen (Newsbytes)

NEW YORK CITY -- In a discussion with Newsbytes, Sgt. Kurt Leonard of the
Chesterfield County, Virginia Police Department has disclosed further
information concerning the on-going investigation of alleged 911 disruption
throughout the eastern seaboard of the United States by individuals purporting
to be members of the hacker group "The Legion of Doom" (LOD).

Leonard identified the individual arrested in Newark, New Jersey, previously
referred to only as "Maverick," as Scott Maverick, 23.  Maverick has been
charged with terroristic threats, obstruction of a government function, and
illegal access to a computer.  He is presently out on bail.

Leonard said that David Pluchino, 22, was charged to the same counts as
Maverick and an additional count of the possession of burglary tools.  Leonard
said that Pluchino, the subject of a 1990 Secret Service "search and seizure"
action under the still on-going "Operation SunDevil" investigation," possessed
information linking him with members of the Legion of Doom.

The Legion of Doom connection has become the subject of controversy within the
online community.  Although Maverick has been quoted as saying that he is a
member of the group and that the group's intent was "to attempt to penetrate
the 911 computer systems and inflect them with viruses to cause havoc," members
of the group have disavowed any connection with those arrested.

"Lex Luthor," one of the original members of the group, told Newsbytes when the
initial report of the arrests became public: "As far as I am concerned the LOD
has been dead for a couple of years, never to be revived.  Maverick was never
in LOD.  There have been 2 lists of members (one in Phrack and another in the
LOD tj) and those lists are the final word on membership."

He added, "We obviously cannot prevent copy-cats from saying they are in LOD. 
When there was an LOD, our goals were to explore and leave systems as we found
them.  The goals were to expose security flaws so they could be fixed before
REAL criminals and vandals such as this Maverick character could do damage.  If
this Maverick character did indeed disrupt E911 service he should be not only
be charged with computer trespassing but also attempted murder.  911 is serious
business."

Lex Luthor's comments, made before the names of the arrested were released,
were echoed by Chris Goggans, aka "Erik Bloodaxe," and Mark Abene, aka "Phiber
Optik," both ex-LOD members, and by Craig Neidorf who chronicled the membership
of LOD in his electronic publication "Phrack."

When the names of the arrested became public, Newsbytes again contacted Lex
Luthor to see if the names were familiar.  Luthor replied: "Can't add anything,
I never heard of them."

Phiber Optik, a New York resident, told Newsbytes that he remembered Pluchino
as a person that ran a computer "chat" system called "Interchat" based in New
Jersey.  "They never were LOD members and Pluchino was not known as a computer
hacker.  It sounds as though they were LOD wanabees who are now, by going to
jail, going to get the attention they desire," he said.

A law enforcement official, familiar with the SunDevil investigation of
Pluchino, agreed with Phiber, saying, "There was no indication of any
connection with the Legion of Doom."  The official, speaking under the
condition of anonymity, also told Newsbytes that the SunDevil investigation of
Pluchino is still proceeding and, as such, no comment can be made.

Leonard also told Newsbytes that the investigation has been a joint effort of
New Jersey, Maryland, and Virginia police departments and said that, in
conjunction with the October 9th 2:00 AM arrests of Pluchino and Maverick, a
simultaneous "search and seizure" operation was carried out at the Hanover,
Maryland home of Zohar Shif, aka "Zeke," a 23 year-old who had also been the
subject of a SunDevil search and seizure.

Leonard also said that, in addition to computers taken from Pluchino, material
was found "establishing a link to the Legion of Doom."  Told of the comments by
LOD members that the group did not exist anymore, Leonard said "While the
original members may have gone on to other things, these people say they are
the LOD and some of them have direct connection to LOD members and have LOD
materials."

Asked by Newsbytes to comment on Leonard's comments, Phiber Optik said "The
material he's referring to is probably text files that have been floating
around BBS's for years, Just because someone has downloaded the files certainly
doesn't mean that they are or ever were connected with LOD."
_______________________________________________________________________________

 Complaints On Toll Fraud Aired at FCC En Banc Hearing         October 13, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 by Art Brodsky (Communications Daily)(Page 1)

Customers of PBX manufacturers told the Federal Communications Commission (FCC)
they shouldn't be liable for toll fraud losses incurred because vendors never
told them of capabilities of their equipment that left companies open to
electronic theft.  Their case was buttressed by one of country's leading toll-
fraud investigators, who told day-long en banc hearing that customers shouldn't
have to pay if they're victimized.  Donald Delaney of the New York State Police
said toll fraud "is the only crime I know where the victims are held liable." 
Toll fraud losses have been estimated to run into billions of dollars.

Commission's look at toll fraud came in context of what FCC can do to prevent
or lessen problem.  Comr. Marshall said Commission's job would be to apportion
liability between vendors and customers.  Comr. Duggan, who has been leader on
issue at Commission, said toll fraud was "hidden degenerative disease on the
body of business."  He focused on insurance solution to problem, along with
sharing of liability.  There are cases pending at FCC filed by AT&T customers
that deal with sharing of liability, and whether common carriers are protected
by tariffs from paying customers for losses.  Witnesses told Commission it was
hard to find any law enforcement agency interested in problem, from local
police to FBI, in addition to difficulties with vendors.  U.S. Secret Service
has statutory responsibility over toll fraud, said attorney William Cook, who
testified in afternoon session.  There was general agreement that more customer
education was needed to prevent fraud, policy endorsed by Northern Telecom,
which has active customer education program.

AT&T came in for particular criticism in morning session as users said company
was insensitive to toll fraud problems.  Thomas Mara, executive vice-president
Leucadia National Corp., whose company suffered $300,000 in toll fraud, said he
"had a hell of a time getting anybody at AT&T to pay attention" to problems his
company was encountering.  Mara said his company saw level of 800 calls rise to
10,448 from 100.  He said AT&T was supposed to notify users if there was any
"dramatic increase in volume, yet we were not notified of a thousandfold
increase in 800 number usage nor were we informed of an increase from a few
hours a month in international calls to thousands of hours by AT&T, only after
receiving our bills."  Investigation found that 800 number connecting Rolm
switch to company's voice mail was hackers' entry method, Mara said.

Clearly angry with AT&T, Mara said he has "a feeling they use it as a profit
center."  Lawrence Gessini, telecommunications director for Agway Corp. of
Syracuse, agreed, saying: "Toll fraud should not become a rationale for higher
profits for carriers."  He told FCC that new programs introduced by long
distance carriers won't solve problem because of constraints, limitations and
expense.

Speaking for International Communications Association (ICA) user group, Gessini
said problems occur because new technologies allow more types of fraud and
because "old tariff concepts" that limit common carrier liability "distort
market incentives."  Vendors, he said, are "generally lackadaisical and are
slow to correct even known problems in their hardware, firmware and software,"
and give low priority to complaints.  ICA advocated 5 principles including FCC
inquiry into fraud, creation of advisory committee and willingness of
Commission to protect users.

Geoffrey Williams, industry consultant and telecommunications manager for
IOMEGA Corp., said AT&T has been "most notable" for asking for restitution,
while Sprint and MCI are more lenient.  MCI doesn't charge users for first
hacking incident, he said, but after that users are on their own.

AT&T defended itself in afternoon session, when International Collections Dist.
Manager Peter Coulter rejected users' accusations, saying company had increased
customer education program "dramatically" since last year.  He insisted that
AT&T is "very concerned" by toll fraud: "Contrary to what some people want to
believe, no long distance carrier is making a profit off toll fraud."  He said
AT&T had 6,000 customers attend equipment security seminars in 1991, but that
number had been exceeded in first 6 months of 1992.  He said results of
increased education program were "only preliminary" but his group was receiving
"a lot more accommodations" than complaints from customers.

Coulter, while never admitting that company should shoulder any financial
liability, admitted that "things are different now" as to how AT&T approaches
toll fraud problem.  He said that within AT&T it used to be hardware division
vs. service division.  "The hardware guys said it was a service problem, the
service guys said it was the hardware's fault," Coulter said.  But now both
divisions are "working together on the problem . . . we're talking to each
other."

Delaney of N.Y. state police gave the FCC a picture of the toll fraud situation
dominated by as few as 15 practitioners, most of whom gain illegal entry to
telephone systems simply by dialing numbers for hours on end.  Those so-called
"finger hackers," rather than computer hackers, are responsible for 90% of
fraud, he said, telling Commission that equipment vendors should be held
accountable for fraud.  Most fraudulent calls go to Pakistan, Colombia and
Dominican Republic, he said.

Delaney pointed out practical objection to further vendor education problem,
telling commissioners that for vendor to engage in education would also be to
admit there could be problem with equipment security, something sales people
don't want to do.  He said some customers had been sold systems and didn't know
they had capability for remote access -- means used by hackers to gain entry.
_______________________________________________________________________________

 Hanging Up On Hackers                                         October 12, 1992
 ~~~~~~~~~~~~~~~~~~~~~
 by Miriam Leuchter (Crain's New York Business)(Page 21)

            "Thieves tap phone systems, but business cuts the line."

Ron Hanley suspected a technical glitch when his company's telephone bill
listed an unusually large number of calls lasting four seconds to its 800-
number from New York City.  But the executive at Dataproducts New England in
Wallingford, Connecticut didn't lose sleep over the problem -- until he got a
call two months later from the security department at American Telephone &
Telegraph Co.

Dataproducts had been hacked.  Two days after that, Mr. Hanley got a bill
confirming the bad news:  In one 24-hour period, street-corner phone users in
New York had made some 2,000 calls to the Caribbean on the company's line,
ringing up about $50,000 in tolls.

Dataproducts is not alone.  Estimates of the cost of telecommunications fraud
in the United States each year run from $1 billion to as much as $9 billion. 
According to John J. Haugh, editor of Toll Fraud and Telabuse and chairman of a
Portland, Oregon consulting firm, losses reached $4 billion in 1991 and are
expected to climb 30% in 1992.

Some 35,000 businesses and other users -- such as foundations and government
agencies -- will be hit this year.  In the first six months, Mr. Haugh says,
more than 900 New York City companies were victims of telephone-related fraud.

"If you have a PBX system or calling cards or voice mail, you are vulnerable,
exceedingly vulnerable," says Peggy Snyder, executive director of the
Communications Fraud Control Association, a national information clearinghouse
based in Washington.  "As technology gets more user-friendly, the opportunity
to commit a crime is much greater."

Armed with computers, modems and sometimes automatic dialers or random-number
generating software, high-technology thieves can use your telephone system as
if it is their own -- without having to pay the tolls.  The series of very
short calls Mr. Hanley spotted on one phone bill should have tipped off his
800-number service provider -- which he had alerted when he spotted the pattern
-- that hackers were trying to break into his system.

Who are these hackers -- a term used to describe someone who uses a telephone
or computer to obtain unauthorized access to other computers?  Many are
teenagers or young adults out to demonstrate their computer skills and make
some mischief.  Five young New Yorkers are awaiting trial in federal court on
unauthorized access and interception of electronic communications charges in
one widely publicized telephone fraud case.

A much smaller proportion are more serious criminals: drug dealers, money
launderers and the like, who don't want their calls traced.  In one case, Ms.
Snyder cites a prostitution ring that employed unused voice mail extensions at
one company to leave and receive messages from clients.

Many hackers have connections to call-sell operators who set up shop at phone
booths, primarily in poorer immigrant neighborhoods in cities from New York to
Los Angeles.  For a flat fee -- the going rate is $10, according to one source
-- callers can phone anywhere in the world and talk as long as they want.  The
hawker at the phone booth pockets the cash and someone else pays the bill.

Perhaps 15 to 20 so-called finger hackers (who crack authorization codes by
hand dialing) distribute information to call-sell operators at thousands of
locations in New York.  According to Don Delaney, a senior investigator for the
New York State Police, the bulk of such calls from phone booths in the city go
to the Dominican Republic, Pakistan and Colombia.

Hackers may use more than technical skill to gain the access they want.
Sometimes they practice "social engineering" -- talking a company's employees
into divulging information about the telephone system.  Or they manage a
credible imitation of an employee, pretending to be an employee.

In one of the latest schemes, a fraudulent caller gets into a company's system
and asks the switchboard operator to connect him with an outside operator.  The
switchboard assumes the caller is an employee who wants to make a personal call
on his own calling card.

Instead, he uses a stolen or hacked calling card number.  The fraud goes
undetected until the card's owner reports the unauthorized use to his long-
distance carrier.  If the cardholder refuses to pay the charges, the phone
company traces the calls to the business from which they were placed.  Because
it looks as if the call came from the company, it is often held liable for the
charge.

In another new twist, a hacker gains access to an unused voice mail extension
at a company, or takes over someone's line at night or while the regular user
is on vacation.  He changes the recorded announcement to say, "Operator, this
number will accept all collect and third-party calls."  Then the hacker -- or
anyone else -- can telephone anywhere in the world and bill the charges to that
extension.

Sometimes the fraud is much more organized and sophisticated, however.  Robert
Rasor, special agent in charge of the financial crime division of the U.S.
Secret Service, gives an example of a three-way calling scheme in which hackers
tap into a phone system in the United States and set up a separate network that
allows people in other countries to call each other directly.  "The
Palestinians are one of the more prominent groups" running these sorts of
fraud, he says.

But no matter who the end user is, businesses like Dataproducts end up footing
the bill.  Personal users are generally not held liable for the unauthorized
use of their calling card numbers.  Under current regulation, a business is
responsible for all calls that go through its equipment, whether or not those
calls originated at the company.

This hard fact rankles Mr. Hanley.  "It's totally frustrating and almost
unbelievable that you're responsible for this bill.  It's really frightening
for any company."

Dataproducts's liability was relatively small compared with the $168,000
average Mr. Haugh calculated in a study he made last year.  It could have been
worse yet.

"The largest case I've ever seen in the metropolitan region was a company that
lost almost $1 million within 30 days," says Alan Brill, managing director of
the New York corporate security firm Kroll Associates Inc.

"It was a double whammy, because even though their long-distance carrier saw a
suspicious pattern of calls and blocked access to those area codes, the company
didn't know its PBX system would automatically switch to another carrier if
calls couldn't go through," Mr. Brill says.  "So the company got a bill for
$300,000 from its primary carrier and a $600,000 bill from the secondary
carrier."

Both AT&T and Sprint Corp. offer service plans that limit liability to $25,000
per fraud episode for their business customers.  Mr. Brill advises companies to
evaluate the cost-effectiveness of these plans in great detail, because in
order to be eligible for coverage companies must take certain steps to minimize
their risk.  "If you reduce your risk significantly, you may not need the
coverage," he says.

The plans require customers to respond to a problem in as little as two hours
after notification of unauthorized calls.  Doing so will stem your losses in
any event.  "You also have to think about how you're staffed," adds Mr. Brill. 
"Can you act that fast?"
_______________________________________________________________________________

 PWN Quicknotes
 ~~~~~~~~~~~~~~

1.  HACKER PARTY BUSTED (by Robert Burg, Gannett, 11/3/92) -- "PumpCon Popped!"
    -- WHITE PLAINS, New York -- Police say a Halloween party they broke up
    Sunday (11/1/92) was more than just a rowdy party - it also was a computer
    hacker party.

    Three men were charged with unauthorized use of a computer and attempting
    computer trespass.  A fourth man was arrested on an outstanding warrant
    involving violating probation on a charge of computer fraud in Arizona,
    Greenburgh Detective Lt. Cornelius Sullivan said.

    Security officers at the Westchester Marriott contacted police after
    noticing an unusual number of people entering and leaving one room.  Police
    said that when they arrived, there were 21 people inside and computers
    hooked up to telephone lines.  Police said they also found telephone credit
    cards that did not belong to any of the people present.

    The three charged with unauthorized use of a computer and attempted
    computer trespass were Randy Sigman, 40, of Newington, Connecticut; Ronald
    G. Pinz, 21, of Wallingford, Connecticut and Byron Woodard, 18, of
    Woonsocket, Rhode Island.

    They were being held at the Westchester County Jail in Valhalla pending
    arraignment.

    The man charged on the warrant, Jason Brittain, 22, of Tucson, Arizona, was
    being held without bail pending arraignment.

    The Westchester County District Attorney frauds division seized the
    computer hardware, software, and other electrical equipment.

    Sullivan said the party-goers heard about the party through computer
    bulletin boards.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

2.  COMPUTER ACCESS ARRESTS IN NEW YORK (Barbara E. McMullen & John F.
    McMullen, Newsbytes, 11/3/92) -- GREENBURGH, NEW YORK -- The Greenburgh,
    New York Police Department has announced the arrest of three individuals,
    Randy P. Sigman, 40; Ronald G. Pinz, Jr, 21; and Byron J. Woodard, 18 for
    the alleged crimes of Unauthorized Use Of A Computer and Attempted Computer
    Trespass, both misdemeanors.  Also arrested was Jason A. Brittain, 22 in
    satisfaction of a State of Arizona Fugitive From Justice warrant.

    The arrests took place in the midst of an "OctoberCon" or "PumpCon" party
    billed as a "hacker get-together" at the Marriott Courtyard Hotel in
    Greenburgh.  The arrests were made at approximately 4:00 AM on Sunday
    morning, November 1st.  The three defendants arrested for computer crimes
    were granted $1,000 bail and will be arraigned on Friday, November 6th.

    Newsbytes sources said that the get together, which had attracted up to
    sixty people, had dwindled to approximately twenty-five when, at 10:00
    Saturday night, the police, in response to noise complaints arrived and
    allegedly found computers in use accessing systems over telephone lines.
    The police held the twenty-five for questioning and called in Westchester
    County Assistant District Attorney Kenneth Citarella, a prosecutor versed
    in computer crime, for assistance. During the questioning period, the
    information on Brittain as a fugitive from Arizona was obtained and at 4:00
    the three alleged criminal trespassers and Brittain were charged.

    Both Lt. DeCarlo of the Greenburgh police and Citarella told Newsbytes
    that the investigation is continuing and that no further information is
    available at this time.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

3.  U.S. PRISON SENTENCE FOR COMPUTER HACKER (New York Law Journal, 10/15/92,
    Page 7) -- A Brooklyn man was sentenced yesterday to eight months in prison
    for buying passwords from a computer hacker group known as the "masters of
    deception" [MOD] for resale to others seeking access to confidential credit
    reports.

    Morton Rosenfeld, 21, received the sentence in federal court in Manhattan
    after pleading guilty in June to obtaining the unauthorized access devices
    to computer data bases operated by TRW Information Services and other
    credit reporting companies.

    The sentence, imposed by Southern District Judge Shirley Wohl Kram, is
    believed to be among few prison terms levied for computer-related offenses.

    Meanwhile, charges are pending against Mr. Rosenfeld's alleged source: the
    five members of the masters of deception, young men in their teens and
    20's.  The five were accused in July of breaking into computer systems run
    by credit reporting services, telephone companies and educational
    institutions.

    For more information about the indictment and case against MOD, see ALL the
    articles in PWN 40-2.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

4.  2ND ONLINE LEGAL GUIDE RELEASED (by Barbara E. McMullen & John F. McMullen,
    Newsbytes, 10/13/92) -- NEW YORK CITY -- PC Information Group has announced
    the release of SysLaw, Second Edition: The Legal Guide for Online Service
    Providers by attorneys Lance Rose and Jonathan Wallace.

    According to the company, "Syslaw provides BBS sysops, network moderators
    and other online service providers with basic information on their rights
    and responsibilities, in a form that non-lawyers can easily understand."

    Subjects covered by the book include the First Amendment, copyrights and
    trademarks, the user agreement, negligence, privacy, criminal law, searches
    and seizures, viruses and adult materials.  The company claims that SysLaw
    not only explains the laws, but that it gives detailed advice enabling
    system operators to create the desired balance of user services, freedom,
    and protection from risk on their systems."

    Co-author Lance Rose told Newsbytes: "In the four years since the
    publication of the first edition, the electronic community has become
    alerted to the first amendment dimensions of the on-line community."

    "The first amendment has profound implications to the on-line community
    both to liberate providers and users of on-line systems and to protect them
    from undue legal harassment.  There has, in the last few years, been a lot
    of law enforcement activity effecting bulletin board systems, including the
    Steve Jackson and Craig Neidorf/Phrack cases," he said.

    Rose continued, "The new edition incorporates these new developments as
    well as containing new information concerning on-line property rights, user
    agreements, sysop liabilities, viruses and adult material contained on
    online systems."

    SysLaw is available from PC Information Group, 1126 East Broadway, Winona,
    MN  55987 (800-321-8285 or 507-452-2824) at a price of $34.95 plus $3.00
    shipping and (if applicable) sales tax.

    Press Contact:  Brian Blackledge, PC Information Group, 800-321-8285

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

5.  YET ANOTHER BOOK ABOUT THE COMPUTER UNDERGROUND (The Daily Telegraph,
    12/14/92, Page 25) -- Approaching Zero: Data Crime and the Computer
    Underworld by Bryan Clough and Paul Mungo (Faber & Faber, L14.99) -- A look
    at the world of Fry Guy, Control C, Captain Zap and other hackers to blame
    for the viruses, logic bombs and Trojan horses in the world's personal
    computer networks.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

6.  HONOR STUDENT NABBED IN COMPUTER FRAUD (The Washington Times, 11/9/92, Page
    A6) -- BROOKSVILLE, FLA.-- Three high school honor students have been
    accused of stealing tens of thousands of dollars worth of long-distance
    calls as computer hackers.

    Brian McGrogan, 16, and Edmund Padgett, 17, who were charged as adults, and
    a 15-year-old allegedly tapped private telephone systems and dialed into an
    international hacking network.  One company's loss was $36,000.

    "These are very sharp, intelligent kids," Hernando County sheriff's Captain
    Richard Nugent said after the arrests.  "It's a game to them.  It's a
    sport."

    Some calls were made to computer bulletin boards in the United Kingdom,
    Germany and Canada, where a loose network of hackers allegedly shared
    information about how to obtain computer data and access information.
    Arrests in the case also were made in New York and Virginia, Captain Nugent
    said.

    The two older boys were booked on charges of organized fraud and violation
    of intellectual property.  The third boy was released to his parents.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

7.  A CORDLESS PHONE THAT CAN THWART EAVESDROPPERS (Business Week, 8/3/92) --
    To industrial spies and other snoops, the millions of cordless phones in
    use are goldmines of information.  Conversations can be plucked out of the
    air by means of a police type scanner, and with increasing ease.  The
    latest no-cord technologies offers clearer sound and longer ranges -- up to
    half a mile.  That's because the new phones broadcast signals at 900 MHz,
    or 20 times the frequency of current models.

    Cincinnati Microwave, Inc. (the radar detector people) figures executives
    and consumers will pay a small premium for cordless privacy.  The company
    has developed a phone, to be marketed in October by its Escort division for
    about $300, that thwarts eavesdroppers with "spread spectrum" technology,
    which is similar to the encryption method that the military uses in secure
    radios.  The signals between the handset and base unit are digitized,
    making them unintelligible to humans, and the transmission randomly hops
    among various frequencies within the 900 MHz spectrum.  To keep the cost
    down to the range of other 900 MHz models, Cincinnati Microwave has
    developed special microchips that keep the handset and base in sync.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

8.  NEW AREA CODE -- As of November 1, 1992, a new 210 area code is serving 152
    communities in the San Antonio and Rio Grande Valley areas.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

9.  FOR SALE: PHONE-PHREAKING TOOLS (Brigid McMenamin, Forbes, 8/3/92, Page 64)
    -- From his remote outpost in Alamogordo, New Mexico, John Williams makes a
    nice living telling hackers how to rip off phone and computer systems.

    Williams says he brings in about $200,000 a year publishing books on
    everything from credit card scams and cracking automated teller machines to
    electronic shoplifting, cellular phone phreaking and voice mailbox hacking,
    each costing $29 to $39, and each complete with precise instructions.  He
    even sells Robofones, which save hackers from doing a lot of dialing while
    they steal access codes.

    Isn't what he does illegal?  Perhaps it should be, but it isn't.  Wrapping
    himself in the First Amendment, Williams is a member in good standing of
    the Alamogordo Chamber of Commerce and the New Mexico Better Business
    Bureau.  He thumbs his nose at companies and authorities that would like to
    make him stop selling such secrets.  "We don't promote fraud," he insists.
    "It's all sold for educational purposes only.  If we didn't publish the
    information, it would still be out there."

    But last year Williams got a visit form the Secret Service, which was
    following up on a telephone fraud case in which one of his publications
    figured prominently.

    In Gainsville, Florida, in November 1990, two young men were locked up by
    police for hacking into voice-mail systems and then making calls to 900
    numbers.  One of the pair, known as the Shark, then 20, confessed to the
    crime, but said he was on assignment for Williams' Consumertronics
    publication.  The culprits could have been given five years on the fraud
    charge alone.  But the victim didn't want any publicity, so the state let
    them do 50 hours of community service instead.

    The Secret Service went to talk to Williams.  Williams assured agent James
    Pollard that he'd never told the Shark to do anything illegal.
    Nevertheless, says Williams, the agent implied that Williams and members of
    his family who work for him might be prosecuted for publishing voice-mail
    access codes.

    In the end, no charges were filed against Williams, who admits he has a
    thing against big business, especially the phone companies.  "For decades,
    they financed right-wing regimes in Latin America," he rants.

    It's a crazy world, that of the telephone toll fraudsters.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

10. NEW YORK STATE POLICE DECRIMINALIZE THE WORD "HACKER" (Barbara E. McMullen
    & John F. McMullen, Newsbytes, 10/21/92) -- ALBANY, NEW YORK -- Senior
    investigator Ron Stevens of the New York State Police Computer Unit has
    told Newsbytes that it will be the practice of his unit to avoid the use of
    the term "hacker" in describing those alleged to have committed computer
    crimes.

    Stevens told Newsbytes, "We use the term computer criminal to describe
    those who break the law using computers.  While the lay person may have
    come to understand the meaning of hacker as a computer criminal, the term
    isn't accurate.  The people in the early days of the computer industry
    considered themselves hackers and they made the computer what it is today.
    There are those today who consider themselves hackers and do not commit
    illegal acts."

    Stevens had made similar comments in a recent conversation with Albany BBS
    operator Marty Winter.  Winter told Newsbytes, "'Hacker' is, unfortunately
    an example of the media taking what used to be an honorable term, and using
    it to describe an activity because they (the media) are too lazy or stupid
    to come up with something else.  Who knows, maybe one day 'computer
    delinquent' WILL be used, but I sure ain't gonna hold my breath."

    Stevens, together with investigator Dick Lynch and senior investigator
    Donald Delaney, attended the March 1992 Computers, Freedom and Privacy
    Conference (CFP-2) in Washington, DC and met such industry figures as Glenn
    Tenney, congressional candidate and chairman of the WELL's annual "Hacker
    Conference"; Craig Neidorf, founding editor and publisher of Phrack; Steven
    Levy, author of "Hackers" and the recently published "Artificial Life";
    Bruce Sterling, author of the recently published "The Hacker Crackdown";
    Emmanuel Goldstein, editor and publisher of 2600: The Hacker Quarterly" and
    a number of well-known "hackers."

    Stevens said, "When I came home, I read as much of the literature about the
    subject that I could and came to the conclusion that a hacker is not
    necessarily a computer criminal."

    The use of the term "hacker" to describe those alleged to have committed
    computer crimes has long been an irritant to many in the online community.
    When the July 8th federal indictment of 5 New York City individuals
    contained the definition of computer hacker as "someone who uses a computer
    or a telephone to obtain unauthorized access to other computers," there was
    an outcry on such electronic conferencing system as the WELL (Whole Earth
    'Lectronic Link).  Many of the same people reacted quite favorably to the
    Stevens statement when it was posted on the WELL.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
11.  STEVE JACKSON GAMES TRIAL DATE SET -- Mike Godwin, General Counsel for the
     Electronic Frontier Foundation, announced on December 23rd that the case
     of Steve Jackson Games, et.al. v. The United States Secret Service et. al.
     will go to trial in Austin, Texas on Tuesday, January 19, 1993.
_______________________________________________________________________________

AOH Site layout & design copyright © 2006 AOH