387 lines
22 KiB
Plaintext
387 lines
22 KiB
Plaintext
==Phrack Inc.==
|
|
|
|
Volume Three, Issue 27, File 12 of 12
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN P h r a c k W o r l d N e w s PWN
|
|
PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN
|
|
PWN Issue XXVII/Part 3 PWN
|
|
PWN PWN
|
|
PWN June 20, 1989 PWN
|
|
PWN PWN
|
|
PWN Created, Written, and Edited PWN
|
|
PWN by Knight Lightning PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
|
|
One of Cliff Stoll's "Wily Hackers" Is Dead (Suicide?) June 5, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
According to West German publications, the "Wily Hacker" Karl Koch, of
|
|
Hannover, West Germany, died Friday, June 3, probably by suicide. His body was
|
|
found burnt (with gasoline) to death, in a forest near Celle (a West German
|
|
town near Hannover where he committed his hacks, as had been observed by German
|
|
Post).
|
|
|
|
Koch was one of the 2 hackers who confessed their role in the KGB hack to the
|
|
public prosecutors, therewith bringing the case to public attention. As German
|
|
newspapers report, he probably suffered from a psychic disease: He thought he
|
|
was permanently observed by alien beings named Illimunates' which tried to kill
|
|
him. Probably, he had internalized the role of "Captain Hagbard" (his
|
|
pseudonym in the hacking scene), taken from a U.S. book, who (like him)
|
|
suffered from supervision by the Illuminates. Police officials evidently think
|
|
that Koch committed suicide (though it is believed, that there are "some
|
|
circumstances" which may also support other theories; no precise information
|
|
about such moments are reported).
|
|
|
|
According to German police experts, Karl Koch's role in the KGB case as in
|
|
daily life can properly be understood when reading this unknown book.
|
|
|
|
Information Provided by Klaus Brunnstein
|
|
(University of Hamburg)
|
|
|
|
[Illuminates... KGB... whatever... -KL]
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Illuminatus! June 14, 1989
|
|
~~~~~~~~~~~~
|
|
The book in question is believed to be "Illuminatus!" by Harold Shea and Robert
|
|
Anton Wilson. The book is a spoof on conspiracy theories, and suggests that
|
|
many and probably all human institutions are just fronts for a small group of
|
|
"enlightened ones," who are themselves a front for the Time dwarves from
|
|
Reticuli Zeta, or perhaps Atlantean Adepts, remnants of Crowley's Golden Dawn,
|
|
or even more likely the Lloigor of H.P. Lovecraft's Cthulhu Mythos. A leading
|
|
character in this book is named Hagbard Celine.
|
|
|
|
"Illuminatus!" is a fun read if you like psychedelia and paranoia. It also
|
|
seems to have influenced a lot of subsequent work, most notably Adams'
|
|
"Hitchhiker's Guide to the Galaxy." It is easy to see how an unbalanced mind,
|
|
taking it literally, could be completely absorbed. In fact "Illuminatus!"
|
|
seems as if it was written with the intent of just this sort of programming,
|
|
referring to it as "Operation Mindfuck."
|
|
|
|
This is probably not a real danger for the vast majority of sane adults, but it
|
|
may, tragically, have been the case here. Or perhaps, no disrespect intended,
|
|
Koch may in the course of various hacks really have discovered too much about
|
|
the Illuminati. After all, they are supposed to be the secret power behind the
|
|
KGB :-)
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
For more information on Clifford Stoll and the Wily Hackers of West Germany,
|
|
please see:
|
|
|
|
"Who Is Clifford Stoll?" (No Date) Phrack World News issue XXII/Part 1
|
|
"A Message From Clifford Stoll" (1/10/89) Phrack World News issue XXIII/Part 2
|
|
|
|
And the following articles all found in Phrack World News issue XXV/Part 2:
|
|
|
|
"German Hackers Break Into Los Alamos and NASA" (3/2/89)
|
|
"Computer Espionage: Three 'Wily Hackers' Arrested" (3/2/89)
|
|
"Computer Spy Ring Sold Top Secrets To Russia" (3/3/89)
|
|
"KGB Computer Break-Ins Alleged In West Germany" (3/3/89)
|
|
"News From The KGB/Wily Hackers" (3/7/89)
|
|
_______________________________________________________________________________
|
|
|
|
Sex Put On Probation By Mystery Hacker June 13, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Ft. Lauderdale News and Sun-Sentinel
|
|
|
|
"Yes, you sound very sexy, but I really need a probation officer."
|
|
|
|
DELRAY BEACH, Fla. -- Callers trying to dial a probation office in Delray
|
|
Beach, Fla on Monday, June 12, heard a smorgasbord of sex talk from a panting
|
|
woman named Tina instead.
|
|
|
|
Southern Bell telephone officials said a computer hacker reprogrammed their
|
|
equipment over the weekend, routing overflow calls intended for the local
|
|
probation office to a New York-based phone sex line.
|
|
|
|
"People are calling the Department of Corrections and getting some kind of sex
|
|
palace," said Thomas Salgluff, a spokesman for the Palm Beach County probation
|
|
office.
|
|
|
|
Southern Bell officials said it was the first time their switching equipment has
|
|
been reprogrammed by an outside computer intruder. Southern Bell provides
|
|
local telephone service in Florida, Georgia, North Carolina, and South
|
|
Carolina.
|
|
|
|
"We're very alarmed," said Southern Bell spokesman Buck Passmore. He said such
|
|
a feat would require someone with considerable computer knowledge.
|
|
|
|
The implications of such a computer breach are considerable. Intercepting
|
|
corporate communications, uncovering unlisted phone numbers, and tampering with
|
|
billing information are all plausible consequences of computer security
|
|
breaches at the the phone company.
|
|
|
|
Hackers have invaded Southern Bell in the past, but they have never
|
|
reprogrammed a telephone link, Passmore said.
|
|
|
|
Security technicians from Southern Bell and AT&T are trying to trace the source
|
|
of the computer breach, Passmore said.
|
|
_______________________________________________________________________________
|
|
|
|
Hacking For A Competitive Edge May 12, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Taken from the Los Angeles Times
|
|
|
|
Two former Tampa, FLA TV news managers have been charged with illegally tapping
|
|
into phone lines and computers at another station to gain a news edge over
|
|
their competitors. Former new director Terry Cole and assistant news director
|
|
Michael Shapiro at WTSP-TV have been charged with 17 counts of computer hacking
|
|
and conspiracy in the theft of information from WTVT-TV through computer phone
|
|
lines, authorities said. Their arraignment was set for May 19.
|
|
|
|
If convicted, each could face a maximum prison sentence of 85 years. The two
|
|
were fired from WTSP when the station learned of the alleged thefts. The
|
|
break-ins began in November, 1988, but were not noticed until January 12, 1989,
|
|
when WTVT's morning news producer noticed that files were missing, authorities
|
|
said.
|
|
|
|
Computer experts determined that an intruder had rifled the files. Authorities
|
|
said Shapiro knew WTVT's security system thoroughly because he had helped set
|
|
it up while working there as an assignment manager before being hired away from
|
|
WTVT in October.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
TV News Executives Fired After Hacking Charges From Rival
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Tampa, Fla. -- A Florida television station fired two news executives in the
|
|
wake of reports that one of them allegedly penetrated a rival station's
|
|
computer system and stole sensitive information.
|
|
|
|
WTSP-TV (Channel 10), an ABC affiliate in St. Petersburg, announced that it had
|
|
fired Assistant News Director Michael Shapiro and News Director Terry Cole.
|
|
|
|
Shapiro was arrested on February 7th on felony charges for allegedly breaking
|
|
into a computer system at WTVT-TV (Channel 13) on at least six occasions in
|
|
January. He was once employed by WTVT as an assistant manager and was
|
|
responsible for administering the station's computer systems.
|
|
|
|
Law enforcement officials seized from Shapiro's home a personal computer, 200
|
|
floppy disks and an operating manual and user guide for software used at the
|
|
rival station.
|
|
|
|
He has been charged with 14 felony counts under Florida Statute 815, which
|
|
covers computer-related crimes. Each count carries a maximum sentence sentence
|
|
of 15 years and a $10,000 fine.
|
|
|
|
Vince Barresi, WSTP's vice-president and general manager, refused to comment on
|
|
the two firings. However, in a prepared statement, he said that he told
|
|
viewers during an 11 PM newscast last Tuesday that the station acted to "avoid
|
|
any questions about the objective way we do our business in keeping the public
|
|
informed."
|
|
|
|
Cole, who hired Shapiro last September, has not been charged by Florida law
|
|
enforcement officials. He was fired, according to one source, because as
|
|
director of the news room operations, he is held ultimately for the actions of
|
|
news staffers. Shapiro and Cole were unavailable for comment.
|
|
|
|
[Another story that discussed this case was "Television Editor Charged In Raid
|
|
On Rival's Files" (February 8, 1989). It appeared in Phrack World News Issue
|
|
XXIV/Part 2. -KL]
|
|
_______________________________________________________________________________
|
|
|
|
National Crime Information Center Leads To Repeat False Arrest May 14, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by James Rainey (Los Angeles Times)
|
|
|
|
Mix ups with the databases at the NCIC have caused Roberto Perales Hernandez to
|
|
be jailed twice in the last three years as a suspect in a 1985 Chicago
|
|
residential burglary. The authorities confused him with another Roberto
|
|
Hernandez due to a single entry in the FBI's National Crime Information Center
|
|
computer.
|
|
|
|
The two Roberto Hernandezes are the same height, about the same weight, have
|
|
brown hair, brown eyes, tattoos on their left arms, share the same birthday,
|
|
and report Social Security numbers which differ by only one digit!
|
|
|
|
The falsely imprisoned man has filed suit charging the Hawthorne, California
|
|
Police Department, Los Angeles County, and the state of California with false
|
|
imprisonment, infliction of emotional distress, and civil rights violations
|
|
stemming from the most recent arrest last year.
|
|
|
|
He had previously received a $7,000 settlement from the county for holding him
|
|
12 days in 1986 before realizing he was the wrong man. In the latest incident,
|
|
he was held for seven days then freed with no explanation.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Another False Incarceration May 18, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
In his testimony on May 18, 1989 to the Subcommittee on Civil and
|
|
Constitutional Rights of the Committee on the Judiciary of the U.S. House of
|
|
Representatives, relating to the National Crime Information Center, David D.
|
|
Redell cited another case of false incarceration concerning Roberto Perales
|
|
Hernandez as well as various cases noted earlier -- such as that of Terry Dean
|
|
Rogan [see below]:
|
|
|
|
"Only last week, a case in California demonstrated the potential
|
|
benefit of easy access to stored images. Joseph O. Robertson had
|
|
been arrested, extradited, charged, and sent to a state mental
|
|
facility for 17 months. During that entire time, mug shots and
|
|
fingerprints were already on file showing clearly that he was the
|
|
wrong man, but no one had taken the trouble to check them."
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
These articles show clear examples of the damage and problems caused by this
|
|
"super" database. People like William Bayse (Federal Bureau of Investigation's
|
|
Director For Technical Services) and William Sessions (Director of the FBI)
|
|
either fail to realize this or perhaps they just do not care (as long as
|
|
something similar does not happen to them).
|
|
|
|
For those of you who are interested in looking into this further, the first
|
|
article about this NCIC database was; "'Big Brotherish' Data Base Assailed,"
|
|
(November 21, 1988). It appeared in Phrack World News Issue XXII/Part 3.
|
|
|
|
Another incident similar to the cases mentioned above concerned Richard
|
|
Lawrence Sklar, a political science professor at the University of California
|
|
at Los Angeles. He was mistaken by the computer for a fugitive wanted in a
|
|
real estate scam in Arizona. Before the FBI figured out that they had the
|
|
incorrect person, Sklar, age 58, spent two days being strip searched, herded
|
|
from one holding pen to another, and handcuffed to gang members and other
|
|
violent offenders. For more details on this case and the case concerning Terry
|
|
Dean Rogan, please refer to "FBI National Crime Information Center Data Bank,"
|
|
(February 13, 1989) which appeared in Phrack World News Issue XXIV/Part 2 (as
|
|
well as the Washington Post).
|
|
_______________________________________________________________________________
|
|
|
|
TRW and Social Security Administration May 12, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
The credit bureau of TRW has been working with the Social Security
|
|
Administration to verify its database of 140 million names and Social Security
|
|
numbers. In order to cover the cost, TRW is paying the Social Security
|
|
Administration $1 million, while Social Security Administration will provide a
|
|
matching $1 million.
|
|
|
|
Since the Social Security Administration is asking for a budget increase for
|
|
their computer and telecommunications systems, several legislators are outraged
|
|
by the fact they they are spending $1 million for this non-government project.
|
|
Claiming that the project is "as far away from the mission of the Social
|
|
Security Administration as anything I have ever come across," Senator David
|
|
Pryor (D-Ark) questioned the competence and credibility of Social Security
|
|
Administration Commissioner Dorcas R. Hardy and asked for an investigation by
|
|
the HHS inspector general.
|
|
|
|
In addition, several lawmakers such as Dale Bumpers (D-Ark) believe the project
|
|
to be a violation of civil liberties. Said Bumpers, "I don't like any public
|
|
institution releasing an individual's private information." The American Law
|
|
Division of the Congressional Research Service has already concluded that the
|
|
project is a violation of the Privacy Act of 1974.
|
|
|
|
[A related article, "Verifying Social Security Numbers," (April 11, 1989)
|
|
appeared in Phrack World News Issue XXVI/Part 3 (as well as the New York Times
|
|
on the same date). -KL]
|
|
_______________________________________________________________________________
|
|
|
|
Phrack World News XXVII Quicknotes
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
1. The current name assigned to the new network being created by the merger
|
|
of BITNET and CSNET is ONENET.
|
|
-------------------------------------------------------------------------------
|
|
2. NPA 903 Assigned to NE Texas (May 10, 1989) -- It was just announced that
|
|
those portions of 214 outside Dallas will be changed to 903 in the Fall of
|
|
1990.
|
|
|
|
With 708 assigned to Chicago, 903 assigned to Texas, and 908 assigned to
|
|
New Jersey, only 909 and 917 remain to be assigned before the format
|
|
changes.
|
|
-------------------------------------------------------------------------------
|
|
3. Details On New Area Code 510 (June 6, 1989) -- The press release from
|
|
Pacific Bell, quoted in the San Francisco Chronicle, gives the phase-in
|
|
dates for the new NPA 510.
|
|
|
|
Inception is scheduled for October 7, 1991, with a four-month grace period
|
|
when NPA 415 will still work for the affected numbers. Final cutover is
|
|
scheduled for January 27, 1992.
|
|
|
|
NPA 510 will encompass Alameda and Contra Costa counties, which currently
|
|
have 842,388 customers out of the current 2,005,687 customers in NPA 415.
|
|
-------------------------------------------------------------------------------
|
|
4. New Jersey Area Code To Be Split (April 27, 1989) -- The split is not
|
|
supposed to occur until 1991. The new NPA will be 908 and it will basically
|
|
cover the southern "half" of the current 201 area. The affected counties
|
|
will be Warren, Hunterdon, Middlesex, Union, Monmouth and Ocean, and the
|
|
southwest corner of Morris). Counties remaining in 201 will be Sussex,
|
|
Passaic, Bergen, Essex, Hudson, and the majority of Morris.
|
|
|
|
New Jersey Bell will also start requiring area codes on calls into New York
|
|
and Pennsylvania that have been considered part of New Jersey local calling
|
|
areas. This will apparently take effect October 2 and free up about 25
|
|
exchanges. Information from the Asbury Park Press.
|
|
|
|
[This last line somewhat contradicts the first line as far as the
|
|
dates are concerned. More information as we get it. -- KL.]
|
|
-------------------------------------------------------------------------------
|
|
5. New Area Codes For London (April 27, 1989) -- British Telecom has announced
|
|
that the area code for London is to be changed on May 6th, 1990, due to the
|
|
increased number of lines needed in the capital.
|
|
|
|
The existing code is 01-, and the new codes to be introduced are 071- for
|
|
the centre of the city and 081- for the suburbs. A list was published in
|
|
the Evening Standard, showing which exchanges will fall in which area.
|
|
-------------------------------------------------------------------------------
|
|
6. Member Learns The Hard Way: American Express Is Watching (May 4, 1989) --
|
|
This article taken from the San Jose Mercury News describes how American
|
|
Express called a member to voice their concern that he might not be able to
|
|
pay his recent bill. American Express was able to access his checking
|
|
account and find that he had less than what was owed to them. His card was
|
|
temporarily "deactivated" after the member refused to give any financial
|
|
information except that he would pay up the bill with cash when it came in.
|
|
|
|
Apparently, the card application, in finer print, declares that "[American
|
|
Express reserves] the right to access accounts to ascertain whether you are
|
|
able to pay the balance." After some arguments with the company, the
|
|
member comments that "I learned a lesson: My life is not as private as I
|
|
thought."
|
|
-------------------------------------------------------------------------------
|
|
7. Southwestern Bell's QuickSource (April 24, 1989) -- Southwestern Bell
|
|
Telephone Company is running a one year trial (March 1989 89 - March 1990)
|
|
of two information services: QuickSource (audiotex) and Sourceline
|
|
(videotext). The latter requires a terminal of some type, but the former
|
|
only requires a touch-tone phone for access. The QuickSource number is
|
|
323-2000, but cannot be accessed via 1+713+; SWBTCo has blocked access to
|
|
"the Houston metro area served by SWBTCo," according to the script the
|
|
woman reads to you when ask for help (713-865-5777; not blocked). The help
|
|
desk will send you a free QuickSource directory though.
|
|
-------------------------------------------------------------------------------
|
|
8. Telemail, MCI, AT&T Mail Interconnection (May 16, 1989) -- U.S. Sprint's
|
|
subsidiary, Telenet has announced an interconnection agreement between
|
|
Telemail, Telenet's electronic mail product, MCI Mail, and AT&T Mail.
|
|
|
|
The new arrangement, scheduled to be in effect later this summer, will
|
|
allow the 300,000 worldwide users of Telemail, the 100,000 users of MCI
|
|
Mail and the 50,000 users of AT&T Mail to conveniently send email messages
|
|
to each other.
|
|
-------------------------------------------------------------------------------
|
|
9. Illinois Bell Knocked Out For Four Hours! (May 18,1989) -- Service to over
|
|
40,000 Illinois Bell subscribers in the northwest suburbs of Chicago was
|
|
disrupted for about four hours because of problems with the computer in the
|
|
switching center.
|
|
|
|
Phones were either dead or inoperative for incoming and outgoing calls
|
|
between 9:30 a.m. and 1:40 p.m. because of a software glitch at the central
|
|
office in Hoffman Estates, IL. Most of the disruption occurred in Hoffman
|
|
Estates, Schaumburg, Arlington Heights, Hanover Park, and Streamwood, IL.
|
|
|
|
The exact nature of the problem was not discussed by the Bell spokesman who
|
|
reported that the outage had been corrected. Apparently the backup system
|
|
which is supposed to kick in also failed.
|
|
-------------------------------------------------------------------------------
|
|
10. SRI Attacked By Kamikaze Squirrels (May 29, 1989) -- It seems that the Data
|
|
Defense Network SRI's "no-single-point-of-failure" power system failed at
|
|
the hands, or rather the paws, of a squirrel. The power was off for
|
|
approximately 9 hours and they experienced no hardware problems. This was
|
|
at least the third time that a squirrel has done SRI in.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
11. New York Telephone Freebies (June 10, 1989)(San Francisco Chronicle, p. 2.)
|
|
-- 24 pay phones along the Long Island Expressway were in fact free phones
|
|
because of a programming/database screw-up. They were being heavily used
|
|
for long distance calls by those who had discovered the oversight,
|
|
including many to Pakistan (Police found 15 Pakistani men using the phones
|
|
when they went to investigate after a shooting). There were no estimates
|
|
on the unrecovered cost of the phone calls.
|
|
_______________________________________________________________________________
|
|
|
|
*** END ***
|
|
|