442 lines
25 KiB
Plaintext
442 lines
25 KiB
Plaintext
==Phrack Inc.==
|
|
|
|
Volume Two, Issue 22, File 3 of 12
|
|
|
|
<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
|
|
<> <>
|
|
<> The Judas Contract <>
|
|
<> ~~~~~~~~~~~~~~~~~~ <>
|
|
<> Part Two Of The Vicious Circle Trilogy <>
|
|
<> <>
|
|
<> An Exploration of The Quisling Syndrome <>
|
|
<> and <>
|
|
<> A Look At The Insurrection Of Security Into The Community <>
|
|
<> <>
|
|
<> Presented by Knight Lightning <>
|
|
<> August 7, 1988 <>
|
|
<> <>
|
|
<><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><>
|
|
|
|
|
|
The Quisling Syndrome
|
|
~~~~~~~~~~~~~~~~~~~~~
|
|
Definition: Quisling - (Kwiz/lin) (1) n. Vidkun Quisling (1887 - 1945),
|
|
Norwegian politician who betrayed
|
|
his country to the Nazis and became
|
|
its puppet ruler.
|
|
|
|
(2) n. A traitor.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
The "Quisling" Syndrome is rapidly becoming a common occurrence in the less
|
|
than legal realms of the modem community. In general it starts out with a
|
|
phreaker or hacker that is either very foolish or inexperienced. He somehow
|
|
manages to get caught or busted for something and is scared beyond belief about
|
|
the consequences of his actions. At this point, the law enforcement agency(s)
|
|
realize that this one bust alone is worthless, especially since the person
|
|
busted is probably someone who does not know much to begin with and would be a
|
|
much better asset if he could assist them in grabbing other more experienced
|
|
and dangerous hackers and phreaks. In exchange for these services the Judas
|
|
will have his charges dropped or reduced and considering the more than likely
|
|
parential pressure these Judases will receive, the contract will be fulfilled.
|
|
|
|
Example; Taken from Phrack World News Issue XV;
|
|
|
|
[This exceprt has been edited for this presentation. -KL]
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Mad Hatter; Informant? July 31, 1987
|
|
~~~~~~~~~~~~~~~~~~~~~~
|
|
We at Phrack Inc. have uncovered a significant amount of information that has
|
|
led us to the belief that Mad Hatter is an informant for some law enforcement
|
|
organization.
|
|
|
|
MH had also brought down several disks for the purpose of copying Phantasie
|
|
Realm. Please note; PR was an IBM program and MH has an apple.
|
|
|
|
Control C told us that when he went to pick MH up at the bus terminal, he
|
|
watched the bus pull in and saw everyone who disembarked. Suddenly Mad Hatter
|
|
was there, but not from the bus he was supposed to have come in on. In
|
|
addition to this, he had baking soda wraped in a five dollar bill that he tried
|
|
to pass off as cocaine. Perhaps to make us think he was cool or something.
|
|
|
|
MH constantly tried to get left behind at ^C's apartment for unknown reasons.
|
|
He also was seen at a neighbor's apartment making unauthorized calls into the
|
|
city of Chicago. When asked who he called, his reply was "Don't worry about
|
|
it." MH had absolutely no money with him during PartyCon (and incidentally ate
|
|
everything in ^C's refrigerator) and yet he insisted that although he had taken
|
|
the bus down and had return trip tickets for the bus, that he would fly back
|
|
home. How was this going to be achieved? He had no money and even if he could
|
|
get a refund for the bus tickets, he would still be over $200 short. When
|
|
asked how he was going to do this, his reply was "Don't worry about it."
|
|
|
|
On Saturday night while on the way to the Hard Rock Cafe, Mad Hatter asked
|
|
Control C for the location of his computer system and other items 4 times.
|
|
This is information that Hatter did not need to know, but perhaps a SS agent or
|
|
someone could use very nicely.
|
|
|
|
When Phrack Inc. discovered that Dan The Operator was an FBI informant and made
|
|
the news public, several people were criticizing him on Free World II Private.
|
|
Mad Hatter on the other hand, stood up for Noah and said that he was still his
|
|
friend despite what had happened. Then later when he realized that people were
|
|
questioning his legitimacy, his original posts were deleted and he started
|
|
saying how much he wanted to kill Dan The Operator and that he hated him.
|
|
|
|
Mad Hatter already has admitted to knowing that Dan The Operator was an FBI
|
|
informant prior to SummerCon '87. He says the reason he didn't tell anyone is
|
|
because he assumed we already knew.
|
|
|
|
A few things to add;
|
|
|
|
^*^ Some time ago, Mad Hatter was contacted by AT&T because of an illegal
|
|
Alliance Teleconference that he was responsible for. There was no bust.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Could this AT&T investigation have been the starting point for Mad Hatter's
|
|
treason against the phreak/hack community? Is there more to it than that?
|
|
We may never know the full truth behind this, however we do know that Mad
|
|
Hatter was not the only one to know Dan The Operator's secret prior to
|
|
SummerCon '87. The Executioner (who had close ties to TMC Security employees
|
|
in Omaha, Nebraska) was fully aware of Dan The Operator's motives and
|
|
intentions in the modem world.
|
|
|
|
There does not always have to be a bust involved for a phreak/hacker to turn
|
|
Judas, sometimes fear and panic can be a more powerful motivator to become a
|
|
Quisling.
|
|
|
|
Example; Taken From Phrack World News Issue XV;
|
|
|
|
[This exceprt has been edited for this presentation. -KL]
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Crisis On Infinite Hackers July 27, 1987
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
It all started on Tuesday, July 21, 1987. Among 30-40 others, Bill From RNOC,
|
|
Eric NYC, Solid State, Oryan QUEST, Mark Gerardo, The Rebel, and Delta-Master
|
|
have been busted by the United States Secret Service. There are rumored to be
|
|
several more members of the more "elite" community busted as well, but since we
|
|
can neither disprove or prove the validity of these rumors, I have chosen not
|
|
to name them at this time.
|
|
|
|
One of the offshoots of this investigation is the end of The Lost City of
|
|
Atlantis and The Lineman's treason against the community he once helped to
|
|
bring about. In Pennsylvainia, 9 people were busted for credit card fraud.
|
|
When asked where they learned how to perform the art in which they had been
|
|
caught, they all responded with the reply of text files from The Lost City Of
|
|
Atlantis.
|
|
|
|
So, the Secret Service decided to give The Lineman a visit. Lineman, age 16 (a
|
|
minor) had no charges against him, but he panicked anyway and turned over the
|
|
bulletin board, all g-philes, and the complete userlog to the Secret Service.
|
|
This included information from the "Club Board." The final outcome of this
|
|
action is still on its way. In the meantime, many hackers are preparing for
|
|
the worst.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
The results and consequences from The Lineman's actions were far more severe
|
|
than they originally appeared. It is highly speculated that The Lineman was in
|
|
possesion on a very large directory of phreaks/hackers/pirates that he had
|
|
recently acquired. That list is now in the hands of the government and the
|
|
Communications Fraud Control Association (as well as in the files of all of the
|
|
individual security departments of CFCA members). I've seen it and more.
|
|
|
|
The Lineman was able to acquire this list because one phreak stole it from
|
|
another and then began to trade it to his friends and to others for information
|
|
and passwords, etc. and what happened from there is such an over exposure and
|
|
lack of CONTROL that it fell into the wrong and dangerous hands. Acts such as
|
|
this will with out a doubt eventually lead all of us towards entropy.
|
|
|
|
Captain Caveman, also known as Shawn of Phreakers Quest, began work to help TMC
|
|
after he was set up by Scan Man during the summer of 1986.
|
|
|
|
However, being busted or feeling panic are still not the only motivations for
|
|
becoming a Judas. John Maxfield, one of today's best known security
|
|
consultants, was once a hacker under the handle(s) of Cable Pair and Uncle Tom.
|
|
He was a member of the Detroit based Corrupt Computing and the original Inner
|
|
Circle until he was contacted by the FBI and decided that it would be more fun
|
|
to bust hackers than be one.
|
|
|
|
The following is an excerpt from Phrack World News Issue V;
|
|
|
|
[This article has been edited for this presentation. -KL]
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Computer Kids, Or Criminals?
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
John Maxfield is a computer security consultant who lives in a downriver
|
|
suburb. Maxfield spends most of his working hours scanning BBSs, and is known
|
|
by computer crime experts as a hacker tracker. His investigative work scanning
|
|
boards has resulted in more prosecutions of computer hackers than anyone else
|
|
in the field, say sources familiar with his work. Maxfield, who accepts death
|
|
threats and other scare tactics as part of the job, says the trick is knowing
|
|
the enemy. Next to his monstrous, homemade computer system, Maxfield boasts
|
|
the only file on computer hackers that exists. [Not true any longer -KL] It
|
|
contains several thousand aliases used by hackers, many followed by their real
|
|
names and home phone numbers. All of it is the result of four years of steady
|
|
hacker-tracking, says Maxfield. "I've achieved what most hackers would dearly
|
|
love to achieve," said Maxfield. "Hacking the hacker is the ultimate hack."
|
|
|
|
Maxfield estimates there are currently 50,000 hackers operating in the computer
|
|
underground and close to 1,000 underground bulletin boards. Of these, he
|
|
estimates about 200 bulletin boards are "nasty," posting credit card numbers,
|
|
phone numbers of Fortune 500 corporations, regional phone companies, banks, and
|
|
even authored tutorials on how to make bombs and explosives. One growing camp
|
|
of serious hackers is college students, who typically started hacking at 14 and
|
|
are now into drug trafficking, mainly LSD and cocaine, said Maxfield.
|
|
|
|
Maxfield's operation is called BoardScan. He is paid by major corporations and
|
|
institutions to gather and provide them with pertinent intelligence about the
|
|
computer underground. Maxfield also relies on reformed hackers. Letters of
|
|
thanks from VISA and McDonald's decorate a wall in his office along with an
|
|
autographed photo of Scottie, the engineer on Star Trek's Starship Enterprise.
|
|
|
|
Often he contacts potential clients about business. "More often I call them
|
|
and say, I've detected a hacker in your system," said Maxfield. "At that
|
|
point, they're firmly entrenched. Once the hackers get into your computer,
|
|
you're in trouble. It's analogous to having roaches or mice in the walls of
|
|
your house. They don't make their presence known at first. But one day you
|
|
open the refrigerator door and a handful of roaches drop out."
|
|
|
|
Prior to tracking hackers, Maxfield worked for 20-odd years in the hardware end
|
|
of the business, installing and repairing computers and phone systems. When
|
|
the FBI recruited him a few years back to work undercover as a hacker and phone
|
|
phreak, Maxfield concluded fighting hacker crime must be his mission in life.
|
|
|
|
"So I became the hacker I was always afraid I would become," he said. Maxfield
|
|
believes the hacker problem is growing more serious. He estimates there were
|
|
just 400 to 500 hackers in 1982. Every two years, he says, the numbers
|
|
increase by a factor of 10. Another worrisome trend to emerge recently is the
|
|
presence of adult computer hackers. Some adults in the computer underground
|
|
pose as Fagans, a character from a Charles Dickens novel who ran a crime ring
|
|
of young boys, luring young hackers to their underground crime rings.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
John Freeman Maxfield's BoardScan is also known as the Semco Computer Club and
|
|
Universial Export, the latter coming from the company name used by the British
|
|
government in Ian Flemming's James Bond novels and subsequent motion pictures.
|
|
|
|
Another Judas hacker who went on to become a security consultant is the
|
|
infamous Ian Arthur Murphy of I.A.M. Security. Perhaps he is better known as
|
|
Captain Zap.
|
|
|
|
The following excerpt is from The Wall Street Journal;
|
|
|
|
[This article has been edited for this presentation. -KL]
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
It Takes A Hacker To Catch A Hacker As Well As A Thief November 3, 1987
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Dennis Kneale (Staff Reporter Of The Wall Street Journal)
|
|
|
|
"Computer Hacker Ian [Arthur] Murphy Prowls A Night
|
|
Beat Tracking Down Other Hackers Who Pirate Data"
|
|
|
|
Capt. Zap actually Ian A. Murphy, is well-known as one of the first
|
|
convicted computer-hacker thieves. He has since reformed -- he swears it --
|
|
and has been resurrected as a consultant, working the other side of the law.
|
|
|
|
CRIME CREDENTIALS
|
|
Other consultants, many of them graying military vets, try to flush out
|
|
illicit hackers. But few boast the distinction of being a real hacker -- and
|
|
one with a felony among his credentials. Capt. Zap is more comfortable at the
|
|
screen than in a conversation. Asked to name his closest friend, he shakes his
|
|
head and throws up his hands. He has none. "I don't like people," he says.
|
|
"They're dreadful."
|
|
"He's legendary in the hacking world and has access to what's going on.
|
|
That's a very valuable commodity to us," says Robert P. Campbell of Advanced
|
|
Information Management in Woodbridge, Va., Mr. Murphy's mentor, who has hired
|
|
him for consulting jobs. The 30-year-old Mr. Murphy is well-connected into his
|
|
nocturnal netherworld. Every night till 4 a.m., he walks a beat through some
|
|
of the hundreds of electronic bulletin boards where hackers swap tales and
|
|
techniques of computer break-ins.
|
|
It is very busy these nights. On the Stonehenge bulletin board, "The
|
|
Marauder" has put up a phone number for Citibank's checking and credit-card
|
|
records, advising, "Give it a call." On another board, Mr. Murphy finds a
|
|
primer for rookie "hacklings," written by "The Knights Of Shadow." On yet
|
|
another he sifts out network codes for the Defense Department's research
|
|
agency.
|
|
He watches the boards for clients and warns when a system is under attack.
|
|
For a fee of $800 a day and up, his firm, IAM/Secure Data Systems Inc., will
|
|
test the security of a data base by trying to break in, investigate how the
|
|
security was breached, eavesdrop on anyone you want, and do anything else that
|
|
strikes his fancy as nerd vs. spy. He says his clients have included Monsanto
|
|
Co., United Airlines, General Foods Corp., and Peat Marwick. Some probably
|
|
don't know he worked for them. His felony rap -- not to mention his caustic
|
|
style -- forces him to work often under a more established consultant. "Ian
|
|
hasn't grown up yet, but he's technically a brilliant kid," says Lindsey L.
|
|
Baird, an Army veteran whose firm, Info-Systems Safeguards in Morristown, New
|
|
Jersey has hired Capt. Zap.
|
|
Mr. Murphy's electronic voyeurism started early, At age 14, he would
|
|
sneak into the backyard to tap into the phone switch box and listen to
|
|
neighbor's calls. (He still eavesdrops now and then.) He quit highschool at
|
|
age 17. By 19 he was impersonating a student and sneaking into the computer
|
|
center Temple University to play computer games.
|
|
|
|
EASY TRANSITION
|
|
From there it was an easy transition to Capt. Zap's role of breaking in
|
|
and peeking at academic records, credit ratings, a Pentagon list of the sites
|
|
of missiles aimed at the U.S., and other verboten verbiage. He even left his
|
|
resume inside Bell of Pennsylvania's computer, asking for a job.
|
|
The electronic tinkering got him into trouble in 1981. Federal agents
|
|
swarmed around his parent's home in the wealthy suburb of Gladwyne, Pa. They
|
|
seized a computer and left an arrest warrant. Capt. Zap was in a ring of eight
|
|
hackers who ran up $212,000 in long-distance calls by using a "blue box" that
|
|
mimics phone-company gear. They also ordered $200,000 in hardware by charging
|
|
it to stolen credit-card numbers and using false mail drops and bogus purchase
|
|
orders. Mr. Murphy was the leader because "I had the most contempt" for
|
|
authority, he says.
|
|
In 1982, he pleaded guilty to receiving stolen goods and was sentenced to
|
|
1,000 hours of community service and 2 1/2 years of probation. "It wasn't
|
|
illegal. It was electronically unethical," he says, unrepentant. "Do you know
|
|
who likes the phone company?" Who would have a problem with ripping them off?"
|
|
Mr. Murphy, who had installed commercial air conditioning in an earlier
|
|
job, was unable to find work after his arrest and conviction. So the hacker
|
|
became a hack. One day in his cab he picked up a Dun & Bradstreet Corp.
|
|
manager while he was carrying a printout of hacker instructions for tapping
|
|
Dun's systems. Thus, he solicited his first consulting assignment: "I think
|
|
you need to talk to me." He got the job.
|
|
As a consultant, Mr. Murphy gets to do, legally, the shenanigans that got
|
|
him into trouble in the first place. "When I was a kid, hacking was fun. Now
|
|
I can make money at it and still have a lot of fun."
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
Now because of all the publicity surrounding our well known friends like Ian
|
|
Murphy or John Maxfield, some so-called hackers have decided to cash in on news
|
|
coverage themselves.
|
|
|
|
Perhaps the most well known personality that "sold out" is Bill Landreth aka
|
|
The Cracker, who is the author of "Out Of The Inner Circle," published by
|
|
Microsoft Press. The book was definitely more fiction than fact as it tried to
|
|
make everyone believe that not only did The Cracker form the Inner Circle, but
|
|
that it was the first group ever created. However, for starters, The Cracker
|
|
was a second-rate member of Inner Circle II. The publicity from the book may
|
|
have served to bring him some dollars, but it ultimately focused more negative
|
|
attention on the community adding to an already intense situation. The
|
|
Cracker's final story had a little sadder ending...
|
|
|
|
Taken from Phrack World News Issue X;
|
|
|
|
[This article has been edited for this presentation. -KL]
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
The Cracker Cracks Up? December 21, 1986
|
|
~~~~~~~~~~~~~~~~~~~~~~
|
|
"Computer 'Cracker' Is Missing -- Is He Dead Or Is He Alive"
|
|
|
|
ESCONDIDO, Calif. -- Early one morning in late September, computer hacker Bill
|
|
Landreth pushed himself away from his IBM-PC computer -- its screen glowing
|
|
with an uncompleted sentence -- and walked out the front door of a friend's
|
|
home here.
|
|
|
|
He has not been seen or heard from since.
|
|
|
|
The authorities want him because he is the "Cracker", convicted in 1984 of
|
|
breaking into some of the most secure computer systems in the United States,
|
|
including GTE Telemail's electronic mail network, where he peeped at NASA
|
|
Department of Defense computer correspondence.
|
|
|
|
His literary agent wants him because he is Bill Landreth the author, who
|
|
already has cashed in on the successful publication of one book on computer
|
|
hacking and who is overdue with the manuscript of a second computer book.
|
|
|
|
The Institute of Internal Auditors wants him because he is Bill Landreth the
|
|
public speaker who was going to tell the group in a few months how to make
|
|
their computer systems safer from people like him.
|
|
|
|
The letter, typed into his computer, then printed out and left in his room for
|
|
someone to discover, touched on the evolution of mankind, prospects for man's
|
|
immortality and the defeat of the aging process, nuclear war, communism versus
|
|
capitalism, society's greed, the purpose of life, computers becoming more
|
|
creative than man and finally -- suicide.
|
|
|
|
The last page reads:
|
|
|
|
"As I am writing this as of the moment, I am obviously not dead. I do,
|
|
however, plan on being dead before any other humans read this. The idea is
|
|
that I will commit suicide sometime around my 22nd birthday..."
|
|
|
|
The note explained:
|
|
|
|
"I was bored in school, bored traveling around the country, bored getting
|
|
raided by the FBI, bored in prison, bored writing books, bored being bored. I
|
|
will probably be bored dead, but this is my risk to take."
|
|
|
|
But then the note said:
|
|
|
|
"Since writing the above, my plans have changed slightly.... But the point is,
|
|
that I am going to take the money I have left in the bank (my liquid assets)
|
|
and make a final attempt at making life worthy. It will be a short attempt,
|
|
and I do suspect that if it works out that none of my current friends will know
|
|
me then. If it doesn't work out, the news of my death will probably get
|
|
around. (I won't try to hide it.)"
|
|
|
|
Landreth's birthday is December 26 and his best friend is not counting on
|
|
seeing him again.
|
|
|
|
"We used to joke about what you could learn about life, especially since if you
|
|
don't believe in a God, then there's not much point to life," said Tom
|
|
Anderson, 16, a senior at San Pasqual High School in Escondido, about 30 miles
|
|
north of San Diego. Anderson also has been convicted of computer hacking and
|
|
placed on probation.
|
|
|
|
Anderson was the last person to see Landreth. It was around September 25 -- he
|
|
does not remember exactly. Landreth had spent a week living in Anderson's home
|
|
so the two could share Landreth's computer. Anderson's IBM-PC had been
|
|
confiscated by authorities, and he wanted to complete his own book.
|
|
|
|
Anderson said he and Landreth were also working on a proposal for a movie about
|
|
their exploits.
|
|
|
|
Apparently Landreth took only his house key, a passport, and the clothes on his
|
|
back.
|
|
|
|
But concern grew by October 1, when Landreth failed to keep a speaking
|
|
engagement with a group of auditors in Ohio, for which he would have received
|
|
$1,000 plus expenses. Landreth may have kept a messy room and poor financial
|
|
records, but he was reliable enough to keep a speaking engagement, said his
|
|
friends and literary agent, Bill Gladstone, noting that Landreth's second
|
|
manuscript was due in August and had not yet been delivered.
|
|
|
|
But, the manuscript never came and Landreth has not reappeared.
|
|
|
|
Steve Burnap, another close friend, said that during the summer Landreth had
|
|
grown lackadaisical toward life. "He just didn't seem to care much about
|
|
anything anymore."
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
Landreth eventually turned up in Seattle, Washington around the third week of
|
|
July 1987. Because of his breaking probation, he is back in jail finishing his
|
|
sentence.
|
|
|
|
Another individual who wanted to publicize himself is Oryan QUEST. Ever since
|
|
the "Crisis On Infinite Hackers" that occurred on July 21, 1987, QUEST has been
|
|
"pumping" information to John Markoff -- a reporter for the San Francisco
|
|
Examiner who now has moved up to the New York Times. Almost t everything Oryan
|
|
QUEST has told John Markoff are utter and complete lies and false boasts about
|
|
the powerful things OQ liked to think he could do with a computer. This in
|
|
itself is harmless, but when it gets printed in newspapers like the New York
|
|
Times, the general public get a misleading look at the hacker community which
|
|
can only do us harm. John Markoff has gone on to receive great fame as a news
|
|
reporter and is now considered a hacker expert -- utterly ridiculous.
|
|
_______________________________________________________________________________
|
|
|
|
Infiltration
|
|
~~~~~~~~~~~~
|
|
One way in which the hacking community is constantly being infiltrated happens
|
|
on some of today's best known bulletin boards. Boards like Pirate-80 sysoped
|
|
by Scan Man (who was also working for Telemarketing Company; a
|
|
telecommunications reseller in Charleston, West Virginia) can be a major
|
|
problem. On P-80 anyone can get an account if you pay a nominal fee and from
|
|
there a security consultant just has to start posted supplied information to
|
|
begin to draw attention and fame as being a super hacker. Eventually he will
|
|
be asked to join ill-formed groups and start to appear on boards with higher
|
|
levels of information and blend into the community. After a while he will be
|
|
beyond suspicion and as such he has successfully entered the phreak/hack world.
|
|
Dan The Operator was one such agent who acted in this way and would have gone
|
|
on being undiscovered if not for the events of SummerCon '87 whereafter he was
|
|
exposed by Knight Lightning and Phrack Inc.
|
|
|
|
|
|
:Knight Lightning
|
|
|
|
"The Future Is Forever"
|
|
|
|
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|