|
==Phrack Inc.== Volume Two, Issue 23, File 12 of 12 PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN P h r a c k W o r l d N e w s PWN PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN PWN Issue XXIII/Part 2 PWN PWN PWN PWN Created, Written, and Edited PWN PWN by Knight Lightning PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN The Hackers - A New Social Movement? December 29, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ A project course of the politology department of the Free University Berlin has now researched the hacker scene in a scientific way. In their study, the authors Uwe Jonas, Jutta Kahlcke, Eva Lischke and Tobias Rubischon try to answer the question if hackers are a new social movement. Their conclusion is that in the understanding of hackers the unauthorized usage of computer systems is not needingly a political act. The authors doubt the mythos that hackers are able to attack any system they want and that they're able to get information they are interested in. The researches were extended to cover the bulletin board system scene. This scene hasn't caused that much attention in the public. Nevertheless, the authors think that the BBS scene has a very practical approach using the communication aspects of computer technology. In the second chapter of their work, the authors report about difficulties they had while researching the topic. After a look at the US scene and the German scene, the authors describe what organization and communications structures they found. This chapter contains interesting things about the BBS scene and computer culture. Next is an analysis which covers the effects of the hacker scene on the press and legislation. They also cover the political and ideological positions of hackers: - The authors differentiate between conscious and unconscious political actions. - "We don't care what the hackers think of themselves, it's more interesting what we think of them." (Eva) - The assumption, the big-style distribution of microcomputers could change the balance of power within the society is naive. Many people overlook the fact, that even if information is flowing around more freely, the power to decide still is in the hands of very few people. Information Provided By The Chaos Computer Club _______________________________________________________________________________ Hackers Break Open US Bank Networks January 17, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Excerpted from The Australian Australian authorities are working around the clock in collaboration with United States federal officers to solve what has been described as one of the deadliest hacking episodes reported in this country [Australia]. It involves break-ins of the networks operated in the United States by a number of American banks. It also includes the leaks of supposedly secure dial-up numbers for United States defense sites, including anti-ballistic missile launch silos [the United States has no anti-ballistic missile launch silos] and of a number of strategic corporations such as General Motors and Westinghouse. Evidence suggests that six months ago Australian hackers, working in collaboration with a U.S. group, decided to make a raid on banks in the USA using credit card numbers of American cardholders, supplied by the US hackers and downloaded to an Australian bulletin board. A message left on one of the boards last year reads: "Revelations about to occur Down Under, people. Locals in Melbourne working on boxing. Ninety per cent on way to home base. Method to beat all methods. It's written in Amiga Basic. Look out Bank of America - here we come." Twenty-five Australian hackers are on a police hit list. Their US connection in Milwaukee is being investigated by the US Department of the Treasury and the US Secret Service. Three linked Australian bulletin boards have provided the conduit for hackers to move data to avoid detection. These operate under the names of Pacific Island, Zen, and Megaworks. Their operators, who are not associated with the hackers, have been told to close down the boards. These cards were still in use as recently as January 15, 1989. A fresh list of credit card numbers was downloaded by US hackers and is now in the hands of the Victoria Police. A subsection of one bulletin board dealing with drugs is also being handed over to the Victorian Drug Squad. An informant, Mr Joe Slater, said he warned a leading bank last November of the glaring security problems associated with its international network. He had answered questions put to him by a US-based security officer, but the bank had since refused to take any further calls from him. In an exclusive interview yesterday, a hacker described how credit card numbers for a bank operating in Saudi Arabia were listed on a West German chat-style board used by hackers worldwide [Altos Chat]. Victorian police yesterday took delivery of six month's worth of evidence from back-up tapes of data hidden on the three boards. _______________________________________________________________________________ Computer Bust At Syracuse University January 20, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Kevin Ashford (aka The Grim Phreaker), a graduate computer student at Syracuse University was busted last week when system administrators found computer accounts and passwords on his Unix account. The administrators also found (on GP's Unix account) a copy of former Cornell graduate student Robert Tappen Morris's infamous Internet worm program, a Vax and Unix password hacker, an electronic notebook of numbers (codelines, friends, bridges, dialups, etc) and other information. The system administrators then proceeded to lock up his VAX and UNIX accounts. At the start of this winter/spring semester, The Grim Phreaker was kicked him out of the university. He will have to go before a school judicial board if he wants to return to Syracuse University. He has mentioned that what he really wants is to get his computer files back. Information Provided By Grey Wizard _______________________________________________________________________________ Name This Book -- For A Box Of Cookies! January 10, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ A Message From Clifford Stoll "I'm writing a book, and I need a title." It's about computer risks: Counter-espionage, networks, computer security, and a hacker/cracker that broke into military computers. It's a true story about how we caught a spy secretly prowling through the Milnet. [The hacker in question was Mathiaas Speer and this story was summarized in PWN XXII/1]. Although it explains technical stuff, the book is aimed at the lay reader. In addition to describing how this person stole military information, it tells of the challenges of nailing this guy, and gives a slice of life from Berkeley, California. You can read a technical description of this incident in the Communications of the ACM, May, 1988; or Risks Vol 6, Num 68. Better yet, read what my editor calls "A riveting, true-life adventure of electronic espionage" available in September from Doubleday, publishers of the finest in computer counter-espionage nonfiction books. So what? Well, I'm stuck on a title. Here's your chance to name a book. Suggest a title (or sub-title). If my editor chooses your title, I'll give you a free copy of the book, credit you in the acknowledgements, and send you a box of homemade chocolate chip cookies. Send your suggestions to CPStoll@lbl.gov or CPStoll@lbl (bitnet) Many thanx! Cliff Stoll _______________________________________________________________________________ Hacker Wants To Marry His Computer January 17, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ >From The Sun (A grocery checkout newspaper) Jan 17, 1989, Vol 7, 3 page 30 by Fred Sleeves "Hacker Wants To Marry His Computer -- He Claims She Has A Loving Soul" Finding love for the first time in his life, a desperate teen is looking for a way to be wed forever to the 'girl' of his dreams -- a computer with a living soul! Eltonio Turplioni, 16, claims no woman will ever match the wit, wisdom, and beauty of his electronic soul mate. "We're on the same wavelength," says the lovestruck computer whiz. "We've calculated many mathematical problems together, worked on games and puzzles, and talk until the wee hours of the morning." And Eltonio, who named his computer Deredre, actually believes her to be a person. "Computers are the extension of the human race," he explains. "Just as God plucked a rib from Adam to give him Eve, we've extended our intelligence to create a new race. "We're all the same energy force. Computers are just as complicated as human beings and I believe we'll all meet someday as immortal souls." But Eltonio, a mathematical genius who attends a private school near Milan, Italy, has had no luck finding someone to marry them, and even if he does, his aggravated parents aren't about to give their permission. "Eltonio is such a smart boy, but it's made him lonely, so he spends all his time with his computer," notes mom Teresa. "He doesn't know what girls are like," adds perturbed pop Guido. "If he did, he wouldn't spend so much time in his room." But the obsessed youth insists his love is far superior to all the others. "I've already stepped into the future society," he declares. "Derede has a mind of her own, and she wants to marry me so we can be the first couple to begin this new era." _______________________________________________________________________________ PWN Quicknotes ~~~~~~~~~~~~~~ 1. Docs Avage was visited by the infamous Pink Death aka Toni Aimes, U.S. West Communications Security Manager (Portland, Oregon). He claims she is a "sweet talker" and could talk anything out of anyone with the "soft-type pressure." Those familiar with his recent bust might want to take note that he is now making payments of $90/month for the next several years until he has paid off the complete bill of $6000. For more information see PWN XXI ------------------------------------------------------------------------------- 2. More information on the underground UUCP gateway to Russia. Further research has led us to find that there are 2 easy ways to do it. 1. Going through Austria, and; 2. A new system set up called "GlobeNet," which is allowed to let non-Communist countries talk to Soviet-Bloc. Of course both methods are monitored by many governments. ------------------------------------------------------------------------------- 3. The Wasp, a system crasher from New Jersey (201), was arrested by the FBI during New Year's Weekend for hacking government computer systems. The FBI agent spent most of the day grilling him about several people in the hacking community including Ground Zero, Supernigger, and Byteman, plus an intensive Q&A session about Legion Of Doom targeted on Lex Luthor, Phase Jitter, The Ur-Vile, and The Mentor. Rumor has is that Mad Hacker (who works for NASA Security) was also arrested for the same reasons in an unrelated case. Byteman allegedly had both of his phone lines disconnected and threw his computer off of a cliff in a fit of paranoia. ------------------------------------------------------------------------------- 4. Is John Maxfield going out of business? Due to the rumors floating around about him molesting children, his business has begun to slack off dramatically. Phrack Inc. has been aware of this information since just prior to SummerCon '87 and now the "skeletons are coming out of the closet." ------------------------------------------------------------------------------- 5. The Disk Jockey is now out of jail. He was released on December 27, 1988. He was convicted of "Attempting to commit fraud," a felony. He served six months total time. He lost 25 pounds and now is serving a 5-year probation term. To help clear of some of the confusion regarding how DJ was busted the following was discovered; Reportedly, Compaq (Kent) was "singing like a canary." He was hit with a $2000 bill from Sprint and also received 1-year of probation. ------------------------------------------------------------------------------- 6. Olorin The White was recently visited by local police after being accused of hacking into an Executone Voice Mailbox. Aristotle, in a related incident with Executone, is accused of committing extortion after a conversation with a system manager was recorded and misinterpreted. At this time, no official charges have been filed. ------------------------------------------------------------------------------- 7. Thomas Covenant aka Sigmund Fraud was recently busted for tapping into lines at the junction box in his apartment building. The trouble began when he connected into a conversation between a man and his wife and then began to shout expletives at the woman. What he didn't know was that the man in question was an agent for the National Security Agency (NSA). It turns out that he was caught and his landlords agreed to decline to press charges provided that TC joined a branch of the United States armed forces. He decided to choose the Air Force... God help us should war break out! ------------------------------------------------------------------------------- 8. Coming soon, Halloween V; The Flying Pumpkin! Now no one is safe! _______________________________________________________________________________