863 lines
44 KiB
Plaintext
863 lines
44 KiB
Plaintext
==Phrack Inc.==
|
|
|
|
Volume Four, Issue Forty-One, File 11 of 13
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN Phrack World News PWN
|
|
PWN PWN
|
|
PWN Issue 41 / Part 1 of 3 PWN
|
|
PWN PWN
|
|
PWN Compiled by Datastream Cowboy PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
|
|
Reports of "Raid" on 2600 Washington Meeting November 9, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Barbara E. McMullen & John F. McMullen (Newsbytes)
|
|
|
|
WASHINGTON, D.C. -- The publisher of a well-known hacker magazine claims a
|
|
recent meeting attended by those interested in the issues his magazine raises
|
|
was disrupted by threats of arrest by security and Arlington, Virginia police
|
|
officers.
|
|
|
|
Eric Corley, also known as "Emmanuel Goldstein," editor and publisher of "2600
|
|
Magazine: The Hacker Quarterly," told Newsbytes that the meeting was held
|
|
November 6th at the Pentagon City Mall outside Washington, DC was disrupted and
|
|
material was confiscated in the raid.
|
|
|
|
2600 Magazine promotes monthly meetings of hackers, press, and other interested
|
|
parties throughout the country. The meetings are held in public locations on
|
|
the first Friday evening of the month and the groups often contact each other
|
|
by telephone during the meetings.
|
|
|
|
Corley told Newsbytes that meetings were held that evening in New York,
|
|
Washington, Philadelphia, Cambridge, St. Louis, Chicago, Los Angeles and San
|
|
Francisco. Corley said, "While I am sure that meetings have been observed by
|
|
law enforcement agencies, this is the only time that we have been harassed. It
|
|
is definitely a freedom of speech issue."
|
|
|
|
According to Craig Neidorf, who was present at the meeting and was distributing
|
|
applications for membership in Computer Professionals For Social Responsibility
|
|
(CPSR), "I saw the security officers focusing on us. Then they started to come
|
|
toward us from a number of directions under what seemed to be the direction of
|
|
a person with a walkie-talkie on a balcony. When they approached, I left the
|
|
group and observed the security personnel encircling the group of about 30
|
|
gatherers. The group was mainly composed of high school and college students.
|
|
The guards demanded to search the knapsacks and bags of the gatherers. They
|
|
confiscated material, including CPSR applications, a copy of Mondo 2000 (a
|
|
magazine), and other material."
|
|
|
|
He adds that the guards also confiscated film "from a person trying to take
|
|
pictures of the guards. When a hacker called "HackRat" attempted to copy down
|
|
the names of the guards, they took his pencil and paper."
|
|
|
|
Neidorf continued, "I left to go outside and rejoined the group when they were
|
|
ejected from the mall. The guards continued challenging the group and told
|
|
them that they would be arrested if they returned. When one of the people
|
|
began to take pictures of the guards, the apparent supervisor became excited
|
|
and threatening but did not confiscate the film."
|
|
|
|
Neidorf also said, "I think that the raid was planned. They hit right about
|
|
6:00 and they identified our group as "hackers" and said that they knew that
|
|
this group met every month."
|
|
|
|
Neidorf's story was supported by a Washington "hacker" called "Inhuman," who
|
|
told Newsbytes, "I arrived at the meeting late and saw the group being detained
|
|
by the guards. I walked along with the group as they were being ushered out
|
|
and when I asked a person who seemed to be in authority his name, he pointed at
|
|
a badge with his name written in script on it. I couldn't make out the name
|
|
and, when I mentioned that to the person, he said 'If you can't read it, too
|
|
bad.' I did read his name, 'C. Thomas,' from another badge."
|
|
|
|
Inhuman also told Newsbytes that he was told by a number of people that the
|
|
guards said that they were "acting on behalf of the Secret Service." He added,
|
|
"I was also told that there were two police officers from the Arlington County
|
|
Police present but I did not see them."
|
|
|
|
Another attendee, Doug Luce, reports, "I also got to the DC meeting very late;
|
|
7:45 or so. It seemed like a coordinated harassment episode, not geared toward
|
|
busting anyone, but designed to get people riled up, and maybe not come back to
|
|
the mall."
|
|
|
|
Luce adds that he overheard a conversation between someone who had brought a
|
|
keyboard to sell. The person, he said, was harassed by security forces, one of
|
|
whom said, "You aren't selling anything in my mall without a vendors permit!"
|
|
|
|
Possible Secret Service involvement was supported by a 19 year-old college
|
|
student known as the "Lithium Bandit," who told Newsbytes, "I got to the mall
|
|
about 6:15 and saw the group being detained by approximately 5 Arlington County
|
|
police and 5 security guards. When I walked over to see what was going on, a
|
|
security guard asked me for an ID and I refused to show it, saying that I was
|
|
about to leave. The guard said that I couldn't leave and told me that I had to
|
|
see a police officer. When I did, the officer demanded ID and, when I once
|
|
again refused, he informed me that I could be detained for up to 10 hours for
|
|
refusing to produce identification. I gave in and produced my school ID which
|
|
the police gave to the security people who copied down my name and social
|
|
security number."
|
|
|
|
Lithium Bandit continued, "When I asked the police what was behind this action,
|
|
I was told that they couldn't answer but that 'the Secret Service is involved
|
|
and we are within our rights doing this."
|
|
|
|
The boy says he and others later went to the Arlington police station to get
|
|
more information and were told only that there was a report of the use of a
|
|
stolen credit card and two officers were sent to investigate. "They later
|
|
admitted that it was 5 (officers). While I was detained, I heard no mention of
|
|
a credit card and there was no one arrested."
|
|
Marc Rotenberg, director of CPSR's Washington office, told Newsbytes, "I have
|
|
really no details on the incident yet, but I am very concerned about the
|
|
reports. Confiscation of CPSR applications, if true, is outrageous. I will
|
|
find out more facts on Monday."
|
|
|
|
Newsbytes was told by the Pentagon City Mall office that any information
|
|
concerning the action would have to come from the director of security, Al
|
|
Johnson, who was not available until Monday. The Arlington Country Police
|
|
referred Newsbytes to a "press briefing recording" which had not been updated
|
|
since the morning before the incident.
|
|
|
|
Corley told Newsbytes, "There have been no reports of misbehavior by any of
|
|
these people. They were obviously singled out because they were hackers. It's
|
|
as if they were being singled out as an ethnic group. I admire the way the
|
|
group responded -- in a courteous fashion. But it is inexcusable that it
|
|
happened. I will be at the next Washington meeting to insure that it doesn't
|
|
happen again."
|
|
|
|
The manager of one of New York state's largest malls provided background
|
|
information to Newsbytes on the rights of malls to police those on mall
|
|
property, saying, "The primary purpose of a mall is to sell. The interior of
|
|
the mall is private property and is subject to the regulations of the mall.
|
|
The only requirement is that the regulations be enforced in an even-handed
|
|
manner. I do not allow political activities in my mall so I could not make an
|
|
exception for Democrats. We do allow community groups to meet but they must
|
|
request space at least two weeks before the meeting and must have proper
|
|
insurance. Our regulations also say that groups of more than 4 may not
|
|
congregate in the mall."
|
|
|
|
The spokeswoman added that mall security can ask for identification from those
|
|
who violate regulations and that they may be barred from the mall for a period
|
|
of 6 months.
|
|
|
|
She added, "Some people feel that mall atriums and food courts are public
|
|
space. They are not and the industry is united on this. If the malls were to
|
|
receive tax benefits for the common space and public service in snow removal
|
|
and the like, it could possibly be a public area but malls are taxed on the
|
|
entire space and are totally private property, subject to their own
|
|
regulations. If a group of 20 or more congregated in my mall, they would be
|
|
asked to leave."
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Confusion About Secret Service Role In 2600 Washington Raid November 7, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Barbara E. McMullen & John F. McMullen (Newsbytes)
|
|
|
|
WASHINGTON, D.C.-- In the aftermath of an action on Friday, November 6th by
|
|
members of the Pentagon City Mall Police and police from Arlington County,
|
|
Virginia in which those attending a 2600 meeting at the mall were ordered from
|
|
the premises, conflicting stories continue to appear.
|
|
|
|
Attendees at the meeting have contended to Newsbytes that members of the mall
|
|
police told them that they were "acting on behalf of the Secret Service." They
|
|
also maintain that the mall police confiscated material from knapsacks and took
|
|
film from someone attempting to photograph the action and a list of the names
|
|
of security officers that one attendee was attempting to compile.
|
|
|
|
Al Johnson, chief of security for the mall, denied these allegations to
|
|
Newsbytes, saying "No one said that we were acting on behalf of the Secret
|
|
Service. We were merely enforcing our regulations. While the group was not
|
|
disruptive, it had pulled tables together and was having a meeting in our food
|
|
court area. The food court is for people eating and is not for meetings. We
|
|
therefore asked the people to leave."
|
|
|
|
Johnson denied that security personnel took away any film or lists and further
|
|
said "We did not confiscate any material. The group refused to own up to who
|
|
owned material on the tables and in the vicinity so we collected it as lost
|
|
material. If it turns out that anything did belong to any of those people,
|
|
they are welcome to come in and, after making proper identification, take the
|
|
material."
|
|
|
|
In a conversation early on November 9th, Robert Rasor, Secret Service agent-in-
|
|
charge of computer crime investigations, told Newsbytes that having mall
|
|
security forces represent the Secret Service is not something that was done
|
|
and, that to his knowledge, the Secret Service had no involvement with any
|
|
Pentagon City mall actions on the previous Friday.
|
|
|
|
A Newsbytes call to the Arlington County police was returned by a Detective
|
|
Nuneville who said that her instructions were to refer all questions concerning
|
|
the matter to agent David Adams of the Secret Service. She told Newsbytes that
|
|
Adams would be providing all information concerning the involvement of both the
|
|
Arlington Police and the Secret Service in the incident.
|
|
|
|
Adams told Newsbytes "The mall police were not acting as agents for the Secret
|
|
Service. Beyond that, I can not confirm or deny that there is an ongoing
|
|
investigation."
|
|
|
|
Adams also told Newsbytes that "While I cannot speak for the Arlington police,
|
|
I understand that their involvement was due to an incident unrelated to the
|
|
investigation."
|
|
|
|
Marc Rotenberg, director of the Washington office of Computer Professionals for
|
|
Social Responsibility (CPSR), told Newsbytes "CPSR has reason to believe that
|
|
the detention of people at the Pentagon City Mall last Friday was undertaken at
|
|
the behest of the Secret Service, which is a federal agency. If that is the
|
|
case, then there was an illegal search of people at the mall. There was no
|
|
warrant and no indication of probable illegal activity. This raises
|
|
constitutional issues. We have undertaken the filing of a Freedom of
|
|
Information Act (FOIA) request to determine the scope, involvement and purpose
|
|
of the Secret Service in this action."
|
|
|
|
2600 meetings are held on the evening of the first Friday of each month in
|
|
public places and malls in New York City, Washington, Philadelphia, Cambridge,
|
|
St. Louis, Chicago, Los Angeles and San Francisco. They are promoted by 2600
|
|
Magazine: The Hacker Quarterly and are attended by a variety of persons
|
|
interested in telecommunications and so-called "hacker issues". The New York
|
|
meeting, the oldest of its kind, is regularly attended by Eric Corley a/k/a
|
|
Emmanuel Goldstein, editor and publisher of 2600, hackers, journalists,
|
|
corporate communications professionals and other interested parties. It is
|
|
known to have been the subject of surveillance at various times by law
|
|
enforcement agencies conducting investigations into allegations of computer
|
|
crime.
|
|
|
|
Corley told Newsbytes "While I'm sure that meetings have been observed by law
|
|
enforcement agencies, this is the only time that we have been harassed. It's
|
|
definitely a freedom of speech issue." Corley also that he plans to be at the
|
|
December meeting in Washington "to insure that it doesn't happen again."
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Conflicting Stories In 2600 Raid; CRSR Files FOIA November 11, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Barbara E. McMullen & John F. McMullen (Newsbytes)
|
|
|
|
WASHINGTON, D.C. -- In the on-going investigation of possible Secret Service
|
|
involvement in the Friday, November 6th ejection of attendees at a "2600
|
|
meeting" from the premises of the Pentagon City Mall, diametrically opposed
|
|
statements have come from the same source.
|
|
|
|
Al Johnson, chief of security for the Pentagon City Mall told Newsbytes on
|
|
Monday, November 9th "No one said that we were acting on behalf of the Secret
|
|
Service. We were merely enforcing our regulations. While the group was not
|
|
disruptive, it had pulled tables together and was having a meeting in our food
|
|
court area. The food court is for people eating and is not for meetings. We
|
|
therefore asked the people to leave."
|
|
|
|
On the same day, Johnson was quoted was quoted in a Communications Daily
|
|
article by Brock Meeks as saying "As far as I'm concerned, we're out of this.
|
|
The Secret Service, the FBI, they're the ones that ramrodded this whole thing."
|
|
|
|
Newsbytes contacted Meeks to discuss the discrepancies in the stories and were
|
|
informed that the conversation with Johnson had been taped and was available
|
|
for review. The Newsbytes reporter listened to the tape (and reviewed a
|
|
transcript). On the tape, Johnson was clearly heard to make the statement
|
|
quoted by Meeks.
|
|
|
|
He also said "maybe you outta call the Secret Service, they're handling this
|
|
whole thing. We, we were just here", and, in response to a Meeks question
|
|
about a Secret Service contact, "Ah.. you know, I don't have a contact person.
|
|
These people were working on their own, undercover, we never got any names, but
|
|
they definitely, we saw identification, they were here."
|
|
|
|
Newsbytes contacted Johnson again on the morning of Wednesday, November 11 and
|
|
asked him once again whether there was any Secret Service involvement in the
|
|
action. Johnson said "No, I told you that they were not involved." When it was
|
|
mentioned that there was a story in Communications Daily, quoting him to the
|
|
contrary, Johnson said "I never told Meeks that. There was no Secret Service
|
|
involvement"
|
|
|
|
Informed of the possible existence of a tape quoting him to the contrary.
|
|
Johnson said "Meeks taped me? He can't do that. I'll show him that I'm not
|
|
fooling around. I'll have him arrested."
|
|
|
|
Johnson also said "He asked me if the Secret Service was involved; I just told
|
|
him that, if he thought they were, he should call them and ask them."
|
|
|
|
Then Johnson again told Newsbytes that the incident was "just a mall problem.
|
|
There were too many people congregating."
|
|
|
|
[NOTE: Newsbytes stands by its accurate reporting of Johnson's statements. It
|
|
also affirms that the story by Meeks accurately reflects the material taped
|
|
during his interview]
|
|
|
|
In a related matter, Marc Rotenberg, director of the Washington office of
|
|
Computer Professionals For Social Responsibility (CPSR) has announced that CPSR
|
|
has filed a Freedom of Information Act (FOIA) request with the Secret Service
|
|
asking for information concerning Secret Service involvement in the incident.
|
|
|
|
Rotenberg told Newsbytes that the Secret Service has 10 days to respond to the
|
|
request. He also said that CPSR "is exploring other legal options in this
|
|
matter."
|
|
|
|
The Secret Service, in earlier conversations with Newsbytes, has denied that
|
|
the mall security was working on its behalf.
|
|
|
|
In the incident itself, a group attending the informal meeting was disbanded
|
|
and, according to attendees, had property confiscated. They also contend that
|
|
security guards took film from someone photographing the confiscation as well
|
|
as a list that someone was making of the guard's names. In his November 9th
|
|
conversation with Newsbytes, Johnson denied that security personnel took away
|
|
any film or lists and further said "We did not confiscate any material. The
|
|
group refused to own up to who owned material on the tables and in the vicinity
|
|
so we collected it as lost material. If it turns out that anything did belong
|
|
to any of those people, they are welcome to come in and, after making proper
|
|
identification, take the material."
|
|
|
|
2600 meetings are promoted by 2600 Magazine: The Hacker Quarterly and are held
|
|
on the evening of the first Friday of each month in public places and malls in
|
|
New York City, Washington, Philadelphia, Cambridge, St. Louis, Chicago, Los
|
|
Angeles and San Francisco. They are regularly attended by a variety of persons
|
|
interested in telecommunications and so-called "hacker issues".
|
|
_______________________________________________________________________________
|
|
|
|
Secret Service Grabs Computers In College Raid December 17, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Joe Abernathy (The Houston Chronicle)(Page A37)
|
|
|
|
The Secret Service has raided a dorm room at Texas Tech University, seizing the
|
|
computers of two Houston-area students who allegedly used an international
|
|
computer network to steal computer software.
|
|
|
|
Agents refused to release the names of the two area men and a third man, a
|
|
former Tech student from Austin, who were not arrested in the late-morning raid
|
|
Monday at the university in Lubbock. Their cases will be presented to a grand
|
|
jury in January.
|
|
|
|
The three, in their early 20s, are expected to be charged with computer crime,
|
|
interstate transport of stolen property and copyright infringements.
|
|
|
|
"The university detected it," said Agent R. David Freriks of the Secret Service
|
|
office in Dallas, which handled the case. He said Texas Tech computer system
|
|
operators noticed personal credit information mixed in with the software
|
|
mysteriously filling up their data storage devices.
|
|
|
|
The former student admitted pirating at least $6,000 worth of games and
|
|
programs this summer, Freriks said.
|
|
|
|
The raid is the first to fall under a much broader felony definition of
|
|
computer software piracy that could affect many Americans.
|
|
|
|
Agents allege the three used the Internet computer network, which connects up
|
|
to 15 million people in more than 40 nations, to make contacts with whom they
|
|
could trade pirated software. The software was transferred over the network,
|
|
into Texas Tech's computers and eventually into their personal computers.
|
|
|
|
The Software Publishers Association, a software industry group chartered to
|
|
fight piracy, contends the industry lost $1.2 billion in sales in 1991 to
|
|
pirates.
|
|
|
|
Although these figures are widely questioned for their accuracy, piracy is
|
|
widespread among Houston's 450-plus computer bulletin boards, and even more so
|
|
on the global Internet.
|
|
|
|
"There are a lot of underground sites on the Internet run by university system
|
|
administrators, and they have tons of pirated software available to download --
|
|
gigabytes of software," said Scott Chasin, a former computer hacker who is now
|
|
a computer security consultant.
|
|
|
|
Freriks said the investigation falls under a revision of the copyright laws
|
|
that allows felony charges to be brought against anyone who trades more than 10
|
|
pieces of copyrighted software -- a threshold that would cover many millions of
|
|
Americans who may trade copies of computer programs with their friends.
|
|
|
|
"The ink is barely dry on the amendment, and you've already got law enforcement
|
|
in there, guns blazing, because somebody's got a dozen copies of stolen
|
|
software," said Marc Rotenberg, director of Computer Professionals for Social
|
|
Responsibility, in Washington.
|
|
|
|
"That was a bad provision when it was passed, and was considered bad for
|
|
precisely this reason, giving a justification for over-reaching by law
|
|
enforcement."
|
|
|
|
Freriks said the raid also involved one of the first uses of an expanded right
|
|
to confiscate computers used in crime.
|
|
|
|
"Our biggest complaint has been that you catch 'em and slap 'em on the wrist,
|
|
and then give the smoking gun back," he said.
|
|
|
|
"So they've changed the law so that we now have forfeiture authority."
|
|
|
|
The Secret Service already has been under fire for what is seen by civil
|
|
libertarians as an overly casual use of such authority, which many believe has
|
|
mutated from an investigative tool into a de facto punishment without adequate
|
|
court supervision.
|
|
|
|
_______________________________________________________________________________
|
|
|
|
Hacker Taps Into Freeway Call Box -- 11,733 Times October 23, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Jeffrey A. Perlman (Los Angeles Times)(Page A3)
|
|
|
|
SANTA ANA, CA -- An enterprising hacker reached out and touched someone 11,733
|
|
times in August -- from a freeway emergency call box in Orange County.
|
|
|
|
A computer that monitors the county's emergency call boxes attributed 25,875
|
|
minutes of calls to the mysterious caller who telephoned people in countries
|
|
across the globe, according to a staff report prepared for the Orange County
|
|
Transportation Authority.
|
|
|
|
"This is well over the average of roughly 10 calls per call box," the report
|
|
noted.
|
|
|
|
About 1,150 bright yellow call boxes have been placed along Orange County's
|
|
freeways to connect stranded motorists to the California Highway Patrol. But
|
|
the caller charged all his calls to a single box on the shoulder of the Orange
|
|
(57) Freeway.
|
|
|
|
The hacker apparently matched the individual electronic serial number for the
|
|
call box to its telephone number. It took an investigation by the transit
|
|
authority, and three cellular communications firms to unravel the mystery, the
|
|
report stated.
|
|
|
|
Officials with the transit authority's emergency call box program were not
|
|
available to comment on the cost of the phone calls or to say how they would be
|
|
paid.
|
|
|
|
But the report assured that "action has been taken to correct this problem. It
|
|
should be noted that this is the first incident of this type in the five-year
|
|
history of the program."
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Ring May Be Responsible For Freeway Call Box Scam October 24, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Jodi Wilgoren (Los Angeles Times)(Page B4)
|
|
|
|
"Officials Believe A Hacker Sold Information to Others;
|
|
LA Cellular Will Pay For The Excess Calls."
|
|
|
|
COSTA MESA, CA -- As soon as he saw the August bill for Orange County's freeway
|
|
call boxes, analyst Dana McClure guessed something was awry.
|
|
|
|
There are typically about 12,000 calls a month from the 1,150 yellow boxes that
|
|
dot the county's freeways. But in August, there were nearly that many
|
|
registered to a single box on the Orange Freeway a half-mile north of Lambert
|
|
Road in Brea.
|
|
|
|
"This one stood out, like 'Whoa!'" said McClure, who analyzes the monthly
|
|
computer billing tapes for the Orange County Transportation Authority. "It
|
|
kicked out as an error because the number of minutes was so far over what it is
|
|
supposed to be."
|
|
|
|
With help from experts at LA Cellular, which provides the telephone service for
|
|
the boxes, and GTE Cellular, which maintains the phones, McClure and OCTA
|
|
officials determined that the calls -- 11,733 of them totaling 25,875 minutes
|
|
for a charge of about $1,600 -- were made because the hacker learned the code
|
|
and telephone number for the call boxes.
|
|
|
|
Because of the number of calls in just one month's time, officials believe
|
|
there are many culprits, perhaps a ring of people who bought the numbers from
|
|
the person who cracked the system.
|
|
|
|
You'd have to talk day and night for 17 or 18 days to do that; it'd be
|
|
fantastic to be able to make that many calls," said Lee Johnson of GTE
|
|
Cellular.
|
|
|
|
As with all cases in which customers prove they did not make the calls on their
|
|
bills, LA Cellular will pick up the tab, company spokeswoman Gail Pomerantz
|
|
said. Despite the amount of time involved, the bill was only $1,600, according
|
|
to OCTA spokeswoman Elaine Beno, because the county gets a special emergency
|
|
service rate for the call box lines.
|
|
|
|
The OCTA will not spend time and money investigating who made the calls;
|
|
however, it has adjusted the system to prevent further fraud. Jim Goode of LA
|
|
Cellular said such abuses are rare among cellular subscribers, and that such
|
|
have never before been tracked to freeway call boxes.
|
|
|
|
The call boxes contain solar cellular phones programmed to dial directly to the
|
|
California Highway Patrol or a to a GTE Cellular maintenance line. The calls
|
|
on the August bill included 800 numbers and 411 information calls and hundreds
|
|
of calls to financial firms in New York, Chicago and Los Angeles. That calls
|
|
were placed to these outside lines indicates that the intruders made the
|
|
connections from another cellular phone rather than from the call box itself.
|
|
Each cellular phone is assigned a seven-digit Mobile Identification Number that
|
|
functions like a phone number, and a 10- or 11-digit Electronic Service Number
|
|
unique to that particular phone (similar to the vehicle identification number
|
|
assigned every automobile). By reprogramming another cellular phone with the
|
|
MIN and ESN of the call box phone, a hacker could charge all sorts of calls to
|
|
the OCTA.
|
|
|
|
"That's not legally allowable, and it's not an easy thing to do," McClure said,
|
|
explaining that the numbers are kept secret and that reprogramming a cellular
|
|
phone could wreck it. "Most people don't know how to do that, but there are
|
|
some."
|
|
|
|
Everyone involved with the call box system is confident that the problem has
|
|
been solved, but officials are mum as to how they blocked potential cellular
|
|
banditry.
|
|
|
|
"I don't think we can tell you what we did to fix it because we don't want it
|
|
to happen again," Beno said with a laugh.
|
|
_______________________________________________________________________________
|
|
|
|
FBI Probes Possible Boeing Computer Hacker November 6, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
Taken from Reuters
|
|
|
|
SEATTLE -- Federal authorities said Friday they were investigating the
|
|
possibility that a hacker had breached security and invaded a Unix-based
|
|
computer system at the aerospace giant Boeing Co.
|
|
|
|
The Federal Bureau of Investigation confirmed the probe after a Seattle radio
|
|
station reported it received a facsimile of a Boeing memorandum warning
|
|
employees the security of one of its computer networks may have been violated.
|
|
|
|
The memo, which had been sent from inside Boeing, said passwords may have been
|
|
compromised, a reporter for the KIRO station told Reuters.
|
|
|
|
KIRO declined to release a copy of the memorandum or to further identify its
|
|
source.
|
|
|
|
The memorandum said the problem involved computers using Unix, the open-ended
|
|
operating system used often in engineering work.
|
|
|
|
Sherry Nebel, a spokeswoman at Boeing's corporate headquarters, declined
|
|
comment on the memorandum or the alleged breach of security and referred all
|
|
calls to the FBI.
|
|
|
|
An FBI spokesman said the agency was in touch with the company and would
|
|
discuss with it possible breaches of federal law.
|
|
|
|
No information was immediately available on what type of computer systems may
|
|
have been violated at Boeing, the world's largest commercial aircraft
|
|
manufacturer.
|
|
|
|
The company, in addition, acts as a defense contractor and its business
|
|
includes work on the B-2 stealth bomber, NASA's space station and the "Star
|
|
Wars" project.
|
|
|
|
Boeing is a major user of computer technology and runs a computer services
|
|
group valued at $1 billion.
|
|
|
|
Much of the company's engineering work is conducted using computer -aided
|
|
design (CAD) capabilities. Boeing currently is pioneering a computerized
|
|
technique which uses 2,000 computer terminals to design its new 777 twinjet.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
FBI Expands Boeing Computer Hacker Probe November 9, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Samuel Perry (Reuters)
|
|
|
|
SEATTLE -- Federal authorities expanded their investigation of a computer
|
|
hacker or hackers suspected of having invaded a computer system at aerospace
|
|
giant and defense contractor Boeing Co.
|
|
|
|
FBI spokesman Dave Hill said the investigation was expanded after the agency
|
|
discovered similar infiltrations of computer records belonging to the U.S.
|
|
District Court in Seattle and another government agency.
|
|
|
|
"We're trying to determine if the same individuals are involved here," he said,
|
|
adding more than one suspect may be involved and the purpose of the intrusion
|
|
was unclear.
|
|
|
|
"We don't think this was an espionage case," Hill said, adding federal agents
|
|
were looking into violations of U.S. law barring breaking into a computer of
|
|
federal interest, but that no government classified data was believed to be
|
|
compromised.
|
|
|
|
"I'm not sure what their motivation is," he told Reuters.
|
|
|
|
The FBI confirmed the investigation after a Seattle radio station reported it
|
|
received a facsimile of a Boeing memorandum warning employees that the security
|
|
of one of its computer networks may have been violated.
|
|
|
|
A news reporter at KIRO Radio, which declined to release the facsimile, said
|
|
it was sent by someone within Boeing and that it said many passwords may have
|
|
been compromised.
|
|
|
|
Boeing's corporate headquarters has declined to comment on the matter,
|
|
referring all calls to the FBI.
|
|
|
|
The huge aerospace company, which is the world's largest maker of commercial
|
|
jetliners, relies heavily on computer processing to design and manufacture its
|
|
products. Its data processing arm operates $1.6 billion of computer equipment.
|
|
|
|
No information was disclosed on what system at Boeing had been compromised.
|
|
But one computer industry official said it could include "applications
|
|
involving some competitive situations in the aerospace industry.
|
|
|
|
The company is a defense contractor or subcontractor on major U.S. military
|
|
programs, such as the B-2 stealth bomber, the advanced tactical fighter,
|
|
helicopters, the NASA space station and the "Star Wars" missile defense system.
|
|
|
|
Recently, Boeing has pioneered the unprecedented use of computer-aided design
|
|
capabilities in engineering its new 777 twinjet. The design of the 777 is now
|
|
mostly complete as Boeing prepares for final assembly beginning next year.
|
|
|
|
That system, which uses three-dimensional graphics to replace a draftsman's
|
|
pencil and paper, includes 2,000 terminals that can tap into data from around
|
|
the world.
|
|
_______________________________________________________________________________
|
|
|
|
Hacker Breaches NOAA Net August 3, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Kevin Power (Government Computer News)(Page 10)
|
|
|
|
As a recent breach of the National Oceanic and Atmospheric Administration's
|
|
(NOAA) link to the Internet shows, the network not only benefits scientists but
|
|
also attracts unwanted attention from hackers.
|
|
|
|
NOAA officials said an intruder in May accessed the agency's TCP/IP network,
|
|
seeking to obtain access to the Internet. The breach occurred on the National
|
|
Weather Service headquarters' dial-in communications server in Silver Spring,
|
|
Maryland, said Harold Whitt, a senior telecommunications engineer with NOAA.
|
|
|
|
Cygnus Support, a Palo Alto, California, software company, alerted NOAA
|
|
officials to the local area network security breach when Cygnus found that an
|
|
outsider had accessed one of its servers from the NOAA modem pool and had
|
|
attempted several long-distance phone calls.
|
|
|
|
NOAA and Cygnus officials concluded that the perpetrator was searching for an
|
|
Internet host, possibly to locate a games publisher, Whitt said. Fortunately,
|
|
the hacker did no damage to NOAA's data files, he said.
|
|
|
|
Whitt said intruders using a modem pool to tap into external networks are
|
|
always a security concern. But organizations with Internet access seem to be
|
|
hacker favorites, he said. "There's a lot of need for Internet security,"
|
|
Whitt said.
|
|
|
|
"You have to make sure you monitor the usage of the TCP/IP network and the
|
|
administration of the local host. It's a common problem, but in our case we're
|
|
more vulnerable because of tremendous Internet access," Whitt said.
|
|
|
|
Whitt said NOAA's first response was to terminate all dial-in services
|
|
temporarily and change all the numbers.
|
|
|
|
Whitt said he also considered installing a caller-identification device for the
|
|
new lines. But the phone companies have limited capabilities to investigate
|
|
random incidents, he said.
|
|
|
|
"It's very difficult to isolate problems at the protocol level," Whitt said.
|
|
"We targeted the calls geographically to the Midwest.
|
|
|
|
"But once you get into the Internet and have an understanding of TCP/IP, you
|
|
can just about go anywhere," Whitt said.
|
|
|
|
NOAA, a Commerce Department agency, has since instituted stronger password
|
|
controls and installed a commercial dial-back security system, Defender from
|
|
Digital Pathways Inc. of Mountain View, California.
|
|
|
|
Whitt said the new system requires users to undergo password validation at dial
|
|
time and calls back users to synchronize modems and log calls. Despite these
|
|
corrective measures, Reed Phillips, Commerce's IRM director, said the NOAA
|
|
incident underlies the axiom that networks always should be considered
|
|
insecure.
|
|
|
|
At the recent annual conference of the Federation of Government Information
|
|
Processing Councils in New Orleans, Phillips said the government is struggling
|
|
to transmit more information electronically and still maintain control over the
|
|
data.
|
|
|
|
Phillips said agencies are plagued by user complacency, a lack of
|
|
organizational control, viruses, LAN failures and increasing demands for
|
|
electronic commerce. "I'm amazed that there are managers who believe their
|
|
electronic-mail systems are secure," Phillps said. "We provide a great deal of
|
|
security, but it can be interrupted.
|
|
|
|
"Security always gets hits hard in the budget. But the good news is vendors
|
|
recognize our needs and are coming out with cheaper security tools," Phillips
|
|
said.
|
|
|
|
Phillips said the NOAA attack shows that agencies must safeguard a network's
|
|
physical points because LANs present more security problems than centralized
|
|
systems.
|
|
|
|
"The perpetrator can dial in via a modem using the common services provided by
|
|
the telephone company, and the perpetrator risks no personal physical harm. By
|
|
gaining access to a single system on the network the perpetrator is then able
|
|
to propagate his access rights to multiple systems on the network," Phillips
|
|
said.
|
|
|
|
"In many LAN environments a user need only log on the network once and all
|
|
subsequent access is assumed to be authorized for the entire LAN. It then
|
|
becomes virtually impossible for a network manager or security manager to track
|
|
events of a perpetrator," he said.
|
|
_______________________________________________________________________________
|
|
|
|
Hackers Scan Airwaves For Conversations August 17, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by Mark Lewyn (The Washington Post)(Page A1)
|
|
|
|
"Eavesdroppers Tap Into Private Calls."
|
|
|
|
On the first day of the Soviet coup against Mikhail Gorbachev in August 1991,
|
|
Vice President Quayle placed a call to Senator John C. Danforth (R-Mo.) and
|
|
assessed the tense, unfolding drama.
|
|
|
|
It turned out not to be a private conversation.
|
|
|
|
At the time, Quayle was aboard a government jet, flying to Washington from
|
|
California. As he passed over Amarillo, Texas his conversation, transmitted
|
|
from the plane to Danforth's phone, was picked up by an eavesdropper using
|
|
electronic "scanning" gear that searches the airwaves for radio or wireless
|
|
telephone transmissions and then locks onto them.
|
|
|
|
The conversation contained no state secrets -- the vice president observed that
|
|
Gorbachev was all but irrelevant and Boris Yeltsin had become the man to watch.
|
|
But it remains a prized catch among the many conversations overhead over many
|
|
years by one of a steadily growing fraternity of amateur electronics
|
|
eavesdroppers who listen in on all sorts of over-the-air transmissions, ranging
|
|
from Air Force One communications to cordless car-phone talk.
|
|
|
|
One such snoop overheard a March 1990 call placed by Peter Lynch, a well-known
|
|
mutual fund executive in Boston, discussing his forthcoming resignation, an
|
|
event that later startled financial circles. Another electronic listener
|
|
overheard the chairman of Popeye's Fried Chicken disclose plans for a 1988
|
|
takeover bid for rival Church's Fried Chicken.
|
|
|
|
Calls by President Bush and a number of Cabinet officers have been intercepted.
|
|
The recordings of car-phone calls made by Virginia Governor L. Douglas Wilder
|
|
(D), intercepted by a Virginia Beach restaurant owner and shared with Senator
|
|
Charles S. Robb (D-Va.), became a cause ce'le'bre in Virginia politics.
|
|
|
|
Any uncoded call that travels via airwaves, rather than wire, can be picked up,
|
|
thus the possibilities have multiplied steadily with the growth of cellular
|
|
phones in cars and cordless phones in homes and offices. About 41 percent of
|
|
U.S. households have cordless phones and the number is expected to grow by
|
|
nearly 16 million this year, according to the Washington-based Electronics
|
|
Industry Association.
|
|
|
|
There are 7.5 million cellular phone subscribers, a technology that passes
|
|
phone calls over the air through a city from one transmission "cell" to the
|
|
next. About 1,500 commercial airliners now have air-to-ground phones -- roughly
|
|
half the U.S. fleet.
|
|
|
|
So fast-growing is this new form of electronic hacking that it has its own
|
|
magazines, such as Monitoring Times. "The bulk of the people doing this aren't
|
|
doing it maliciously," said the magazine's editor, Robert Grove, who said he
|
|
has been questioned several times by federal agents, curious about hackers'
|
|
monitoring activities.
|
|
|
|
But some experts fear the potential for mischief. The threat to business from
|
|
electronic eavesdropping is "substantial," said Thomas S. Birney III, president
|
|
of Cellular Security Group, a Massachusetts-based consulting group.
|
|
|
|
Air Force One and other military and government aircraft have secure satellite
|
|
phone links for sensitive conversations with the ground, but because these are
|
|
expensive to use and sometimes not operating, some calls travel over open
|
|
frequencies. Specific frequencies, such as those used by the president's
|
|
plane, are publicly available and are often listed in "scanners" publications
|
|
and computer bulletin boards.
|
|
|
|
Bush, for example, was accidentally overheard by a newspaper reporter in 1990
|
|
while talking about the buildup prior to the Persian Gulf War with Senator
|
|
Robert Byrd (D-W.Va.). The reporter, from the Daily Times in Gloucester,
|
|
Massachusetts quickly began taking notes and the next day, quoted Bush in his
|
|
story under the headline, "Bush Graces City Airspace."
|
|
|
|
The vice president's chief of staff, William Kristol, was overheard castigating
|
|
one staff aide as a "jerk" for trying to reach him at home.
|
|
|
|
Some eavesdroppers may be stepping over the legal line, particularly if they
|
|
tape record such conversations.
|
|
|
|
The Electronic Communications Privacy Act prohibits intentional monitoring,
|
|
taping or distribution of the content of most electronic, wire or private oral
|
|
communications. Cellular phone calls are explicitly protected under this act.
|
|
Local laws often also prohibit such activity. However, some lawyers said that
|
|
under federal law, it is legal to intercept cordless telephone conversations as
|
|
well as conversations on an open radio channel.
|
|
|
|
The government rarely prosecutes such cases because such eavesdroppers are
|
|
difficult to catch. Not only that, it is hard to win convictions against
|
|
"listening Toms," lawyers said, because prosecutors must prove the
|
|
eavesdropping was intentional.
|
|
|
|
"Unless they prove intent they are not going to win," said Frank Terranella,
|
|
general counsel for the Association of North American Radio Clubs in Clifton,
|
|
New Jersey. "It's a very tough prosecution for them."
|
|
|
|
To help curb eavesdropping, the House has passed a measure sponsored by Rep.
|
|
Edward J. Markey (D-Mass.), chairman of the House telecommunications and
|
|
finance subcommittee, that would require the Federal Communications Commission
|
|
to outlaw any scanner that could receive cellular frequencies. The bill has
|
|
been sent to the Senate.
|
|
|
|
But there are about 10 million scanners in use, industry experts report, and
|
|
this year sales of scanners and related equipment such as antennas will top
|
|
$100 million.
|
|
|
|
Dedicated scanners, who collect the phone calls of high-ranking government
|
|
officials the way kids collect baseball cards, assemble basements full of
|
|
electronic gear.
|
|
|
|
In one sense, the electronic eavesdroppers are advanced versions of the
|
|
ambulance chasers who monitor police and fire calls with simpler scanning
|
|
equipment and then race to the scene of blazes and accidents for a close look.
|
|
But they also have kinship with the computer hackers who toil at breaking into
|
|
complex computer systems and rummaging around other's files and software
|
|
programs.
|
|
|
|
One New England eavesdropper has four scanners, each one connected to its own
|
|
computer, with a variety of frequencies programmed. When a conversation
|
|
appears on a pre-selected frequency, a computer automatically locks in on the
|
|
frequency to capture it. He also keeps a scanner in his car, for entertainment
|
|
along the road.
|
|
|
|
He justifies his avocation with a seemingly tortured logic. "I'm not going out
|
|
and stealing these signals," he said. "They're coming into my home, right
|
|
through my windows."
|
|
_______________________________________________________________________________
|
|
|
|
Why Cybercrooks Love Cellular December 21, 1989
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
by William G. Flanagan and Brigid McMenamin (Forbes)(Page 189)
|
|
|
|
Cellular phones provide cybercrooks with golden opportunities for telephone
|
|
toll fraud, as many shocked cellular customers are discovering. For example,
|
|
one US West Cellular customer in Albuquerque recently received a hefty
|
|
telephone bill.
|
|
|
|
Total: $20,000.
|
|
|
|
Customers are not held responsible when their phone numbers are ripped off and
|
|
misused. But you may be forced to have your cellular phone number changed.
|
|
The cellular carriers are the big losers -- to the tune of an estimated $300
|
|
million per year in unauthorized calls.
|
|
|
|
How do the crooks get the numbers? There are two common methods: cloning and
|
|
tumbling.
|
|
|
|
Each cellular phone has two numbers -- a mobile identification number (MIN) and
|
|
an electronic serial number (ESN). Every time you make a call, the chip
|
|
transmits both numbers to the local switching office for verification and
|
|
billing.
|
|
|
|
Cloning involves altering the microchip in another cellular phone so that both
|
|
the MIN and ESN numbers match those stolen from a bona fide customer. The
|
|
altering can be done with a personal computer. The MIN and ESN numbers are
|
|
either purchased from insiders or plucked from the airwaves with a legal
|
|
device, about the size of a textbook, that can be plugged into a vehicle's
|
|
cigarette lighter receptacle.
|
|
|
|
Cellular companies are starting to watch for suspicious calling patterns. But
|
|
the cloning may not be detected until the customer gets his bill.
|
|
|
|
The second method -- tumbling -- also involves using a personal computer to
|
|
alter a microchip in a cellular phone so that its numbers change after every
|
|
phone call. Tumbling doesn't require any signal plucking. It takes advantage
|
|
of the fact that cellular companies allow "roaming" -- letting you make calls
|
|
away from your home area.
|
|
|
|
When you use a cellular phone far from your home base, it may take too long for
|
|
the local switching office to verify your MIN and ESN numbers. So the first
|
|
call usually goes through while the verification goes on. If the numbers are
|
|
invalid, no more calls will be permitted by that office on that phone.
|
|
|
|
In 1987 a California hacker figured out how to use his personal computer to
|
|
reprogram the chip in a cellular phone. Authorities say one of his pals
|
|
started selling altered chips and chipped-up phones. Other hackers figured out
|
|
how to make the chips generate new, fake ESN numbers every time the cellular
|
|
phone was used, thereby short-circuiting the verification process. By 1991
|
|
chipped-up, tumbling ESN phones were in use all over the U.S.
|
|
|
|
The cellular carriers hope to scotch the problem of tumbling with instant
|
|
verification. But that won't stop the clones.
|
|
|
|
How do crooks cash in? Drug dealers buy (for up to $ 3,200) or lease (about
|
|
$750 per day) cellular phones with altered chips. So do the "call-sell"
|
|
crooks, who retail long distance calls to immigrants often for less than phone
|
|
companies charge. That's why a victim will get bills for calls all over the
|
|
world, but especially to Colombia, Bolivia and other drug-exporting countries.
|