home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker Chronicles 1
/
HACKER1.ISO
/
phrk2
/
news2.p15
< prev
next >
Wrap
Text File
|
1992-09-26
|
23KB
|
464 lines
PWN ^*^ PWN ^*^ PWN { Final Issue } PWN ^*^ PWN ^*^ PWN
^*^ ^*^
PWN Phrack World News PWN
^*^ Issue XV: Part Two ^*^
PWN PWN
^*^ Created, Written, and Edited ^*^
PWN by Knight Lightning PWN
^*^ ^*^
PWN ^*^ PWN ^*^ PWN { Final Issue } PWN ^*^ PWN ^*^ PWN
Crisis On Infinite Hackers July 27, 1987
~~~~~~~~~~~~~~~~~~~~~~~~~~
It all started on Tuesday, July 21, 1987. Taran King received a
call from a girl who was contacting him on the behalf of Delta-
Master. From there, we received all sorts of reports about
busted hackers all across the country.
Among 15-18 others, Bill From RNOC, Eric NYC, Solid State, Oryan
QUEST, Mark Gerardo, The Rebel, and Delta-Master have been busted
by the United States Secret Service. There are rumored to be
several more members of the more "elite" community busted as
well, but since we can neither disprove or prove the validity of
these rumors, I have chosen not to name them at this time.
One of the offshoots of this investigation is the end of The Lost
City of Atlantis and The Lineman's treason against the community
he once helped to bring about. In Pennsylvainia, 9 people were
busted for credit card fraud. When asked where they learned how
to perform the art in which they had been caught, they all
responded with the reply of text files from The Lost City Of
Atlantis.
So, the Secret Service decided to give The Lineman a visit.
Lineman, age 16 (a minor) had no charges against him, but he
panicked anyway and turned over the bulletin board, all g-philes,
and the complete userlog to the Secret Service. This included
information from the "Club Board." The final outcome of this
action is still on its way. In the meantime, many hackers are
preparing for the worst.
However, with the exception of Bill From RNOC, most hackers
travel plans to PartyCon '87 went as expected and we had a great
time. I feel that it was a necessary escape for many of the
people that thought their world was coming to an end.
The following are two articles that appeared in the San Francisco
Examiner.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Secret Service Smash Two Hacker's Rings July 23, 1987
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"Computer Break-Ins At Stanford Linked To Nationwide
Crackdown"
By John Markoff of the Examiner Staff
United States Secret Service agents and local law enforcement
authorities are breaking up two nationwide computer crime rings
by arresting at least nine "hackers" in Pennsylania and serving
search warrents in California and New York on a group known as
the "Pink Floyd Gang."
Authorities said the two rings had illegally entered corporate
and university computer systems and stolen millions of dollars
through illegal phone charges and credit card purchases.
A series of computer break-ins at Stanford University that began
September 1, 1986, and were reported in The Examiner on October
3, 1986 started the first investigation, which mushroomed into
one of the largest computer crime investigations in history.
[Give me a break Markoff, your paper has nothing to do with the
current wave of busts and the Stanford University incidents only
pertain to 3 hackers out in California. I always hate it when
reporters make up material in their news broadcasts. -KL]
As many as 17 arrests and searches have taken place in
California, New York, Oregon, Maryland, and Pennsylvania. More
arrests are expected, Secret Service officals said. In Mount
Lebanon, Pa., nine high school students were arrested Tuesday and
charged with using their home computers to gain access to credit
card accounts at stores, police there said.
Eight boys and one girl between of ages 14 and 17 illegally
obtained everything from clothes to skateboards, Pennsylvania
authorities told the Associated Press on Thursday.
Daniel Mayer of the Secret Service in Pittsburg said arrests of
juveniles and adults implicated in the ring were also expected
following the completion of investigations in Dallas and San
Antonio, Texas; Omaha, Nebraska; Augusta, Georgia; Fresno and Los
Angeles, California; New York City, New York; Newark, New Jersey;
and Toledo, Ohio.
John Maxfield, a Detroit computer security expert who is familar
with the case, said the California-New York group was involved in
more serious activities. [A. There is no California-New York
group and there is no Pink Floyd Gang. B. Maxfield knows very
little of what really goes on in the computer underworld and
the newspapers shouldn't be this dependent on his word. -KL]
"The two groups may have overlapped on some of the bulletin
boards - everybody is in touch with everybody - but the New York
and San Francisco stuff is heavier," he said. "It goes beyond
simple credit card theft. They where touching major
corporations."
The first ring was discovered in September, when a hacker using
the password "P. Floyd" began illegally gaining access to
computers on the Stanford University campus.
The name Pink Floyd is frequently used by the underground culture
of "malicious" computer hackers who use modems to break into
remote computer systems. It has become an anthem for hackers and
refers to a song by rock group Pink Floyd called "The Wall."
[Actually, Mr. Markoff, the name P. Floyd was entered because it
would look like a regular username. There is no Pink Floyd Gang
or any hacker under that alias. Tell me, did you make this stuff
up yourself or did you have help? -KL]
Secret Service agents said the computer break-ins, performed by
juveniles and adults, has raised national security concerns
because of the defense-related and high-tech information
contained in the systems they entered.
"You're talking about a sensitive issue, the Stanford computers
have national security information in them," said Richard McDrew,
special agent in charge for the U.S. Secret Service in San
Francisco. "We're trying to determine exactly what was gotten
and how it was used."
McDrew said local Secret Service agents were still working on the
case Thursday and that more arrests were likely.
A computer security expert in San Diego said that one of the
hackers who had gained access to the Stanford computers used a
government network to try to access a computer at the Los Alamos,
New Mexico, nuclear test site.
In the Bay Area Tuesday, Secret Service agents served warrents on
two juveniles in Burlingame and Kentfield, but no arrests were
made. McDrew said agents in his office had been in touch with
Southern California Secret Service agents but that no arrests had
been made there yet.
Illegal purchases of goods and services made by the Midwest ring
were "in the millions," according to officer John Michalec of the
Mount Lebanon, Pa., police department. [Excuse me, but isn't
Pennsylvainia just a little far North East to be called the
midwest? -KL]
Both groups illegally used private long-distance lines such as
MCI to mask their location from investigators. [No, that isn't
really the reason, it was to get out of paying for long distance
service. -KL]
The New York-California ring [Again, there is no New York-
California ring, its a nationwide loosely affiliated group with
boundries limited only by the phone lines. -KL] specialized in
breaking into computers that ran the AT&T UNIX operationg system,
according to computer crime experts familar with the events.
The network of hackers were informal, computer security experts
said. Members of the rings used computer bulletin boards in
homes to stay in contact with each other, Maxfield said.
By logging into the clandestine bulletin board systems, the
hackers were able to exchange information, such as illegally
obtained telephone and other credit cards and computer passwords.
"In terms of what they were doing, they were into every computer
system in the country," he said. "They definately were in to all
the credit bureaus. It's not just the phone companies - they
where into everything."
He said the Secret Service arrests had created a great fear in
the underground network of hackers who heard about the arrests in
recent days.
"One guy called me last night, and he said, `I'm sitting by my
bed with my door unlocked so they won't knock it down. I've
thrown away all my notes. Will they still arrest me?,'" Maxfield
said. [Gosh, he must have been out of CONTROL.]
Computer crime experts said they consider these rings of
"malicious" hackers to be one of the most dangerous yet.
"It's one of the most serious (crime rings), because they are
part of an elite worldwide culture of malicious hackers," said
Donn Parker, a computer crime expert at SRI International, in
Menlo Park. [Excuse me Donn, but please explain how a hacker can
be malicious.]
McDrew said both juveniles and adults around the nation were
involved and that the investigations were being coordinated by
the Washington D.C., Secret Service; Fraud Division.
Computer scientists who tracked the original Stanford break-ins
said hackers had used telephone connections to break into
computers at Stanford University, Lawrence Berkeley Laboratory,
the University of Illinois, Massachusetts Institute of
Technology, Mitre Corporation in Reston, Virginia, and at least
three Silicon Valley corporations.
In several cases the hackers actually spoke with Stanford
University officals while he was breaking into their systems.
Lester Earnest, associate chairman of the Stanford University
computer science department, said Wednesday that such break-ins
were frequent and that computer security experts had closed
loopholes the hackers had used to enter Stanfords computers.
[Only until more hackers find more loopholes in your system. -KL]
Typed by Elric Of Immyr
Special Thanks to Sir Francis Drake
- = - = - = - = - = - = - = - = - = - =- ^ -= - = - = - = - = - =
Hackers Offer Their Side of the Story July 24, 1987
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By John Markoff of the Examiner Staff
Computer "hackers" consider themselves an elite group with
extraodinary skills at breaking into corporate and university
computer systems, accoording to experts and sources familiar with
this underground network.
One computer crime expert has refered to them as the "Pink Floyd
Gang" because several members have used the password "P. Floyd"
while breaking into computer systems around the country.
The hackers themselves disdain the term and say that they prefer
to be known as simply as "the Community" - a reference to their
loose coorperative federation. [Now this is total bullshit, it
must have come from Oryan QUEST. The way I see it is that its
the Phreak/Hack World, or the Modem World, because it is a
seperate pocket community inside America and the world. -KL]
Thursday evening after a story about the Secret Service arrests
and warrants appeared in The Examiner, several hackers who say
they belong to the Community called the paper to give their side
of the story.
The caller asked to remain anonymous. Based on information they
provided, the callers were obviously well-versed in the workings
of the underground network.
[Oryan Quest said,] "I can get into the telephone system
computers," said one hacker. "Let's say I don't like you. I can
turn your telephone off or I can turn your phone into a pay phone
so it asks you to deposit 20 cents before making a call, or I can
turn a pay phone into a free phone."
The individuals "meet" electronically on computer bulletin
boards. These are personal computers systems running special
software programs that permit callers to exchange information via
telephone and modem.
According to the caller, they use colorful electronic aliases to
mask their true identities: names like Icarus 212, Ninja NYC,
Control C, Delta-Master, DEAD LOOP, and Silver Spy.
One caller said that many members of the Community are young
computer programmers who were self-taught experts in the AT&T
UNIX operation system. (An operating system is a special program
that does basic computer housekeeping chores).
He said the Community had become adept at breaking into systems
that run the UNIX operation system and had targeted AT&T
computers, which where were vulnerable to the attacks.
Computers security experts say UNIX is more vulnerable to
hackers' attacks then other computer operating systems because it
was orignally designed for academic and experimental use.
Another caller said the popular image of hackers as nerds who
"never see the light of day" was inaccurate. "I go out for sports
at school and I'm considered a jock," he said. [And after
school, Oryan QUEST is considered a "loser" bagger at a local
supermarket. -KL]
One caller said that several months ago a major "phone phreak"
convention had taken place in St. Louis, where hackers and phone
phreaks had gathered and exchanged data on breaking into systems.
[Actually, what they are refering to is SummerCon '87, which was
sponsored by Phrack Inc., Metal Shop Private, and TeleComputist
Newsletter. Full details of this can be found in Phrack World
News Issue 14, Part 2. There was no trading of the information
stated in this article. -KL]
He said that until the recent Secret Service arrests, many
hackers had been acting bolder, but the arrests would change
things; "Now you're going to see everyone go underground."
Another caller said that many of the underground bulletin boards
had disappeared since the arrests began. "It's finished, all the
major boards in the country are down now," he said. [In a sense
it is an ending to a lot of good "legendary" bulletin boards
(like Metal Shop Private), but there will always be more to fill
the void. -KL]
Typed by Elric Of Immyr
Special Thanks To Sir Francis Drake
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
On Monday, July 27, 1987 Cable News Network (CNN) showed actual
footage of some of the recovered merchandise from the California
hackers' busts. Among the items was a TRS-80 Color Computer and
an IBM compatible, both belonging to Oryan QUEST. The CNN report
was basically similar to the above news stories.
Information Provided by Forest Ranger
In conclusion, this wave of busts has indeed hurt the phreak/hack
world, but it has not destroyed it. It will not be long before
new hackers come to take the place of those that were busted.
The majority of the "good" boards that are down, are down for
reasons not affected by the busts and for every board that goes
down, two more will spring up to take its place.
:Knight Lightning
________________________________________________________________
Mad Hatter; Informant? July 31, 1987
~~~~~~~~~~~~~~~~~~~~~~
We at Phrack Inc. have uncovered a significant amount of
information that has led us to the belief that Mad Hatter is an
informant for some law enforcement organization.
When Taran, Shades, Forest Ranger, and I arrived at Control C's
in Chicago, Mad Hatter had already searched the place and had
found some papers that could only have done ^C harm. We
destroyed this information and thought everything was ok.
However, as it turns out, we searched MH's bags and found a
duplicate set of this information and the general hypothesis was
they he intended to leave it behind as incriminating evidence.
MH had also brought down several disks for the purpose of copying
Phantasie Realm. Please note; PR was an IBM program and MH has
an apple.
Control C told us that when he went to pick MH up at the bus
terminal, he watched the bus pull in and saw everyone who
disembarked. Suddenly Mad Hatter was there, but not from the bus
he was supposed to have come in on. In addition to this, he had
baking soda wraped in a five dollar bill that he tried to pass
off as cocaine. Perhaps to make us think he was cool or
something.
MH constantly tried to get left behind at ^C's apartment for
unknown reasons. He also was seen at a neighbor's apartment
making unauthorized calls into the city of Chicago. When asked
who he called, his reply was "Don't worry about it." MH had
absolutely no money with him during PartyCon (and incidentily ate
everything in ^C's refrigerator) and yet he insisted that
although he had taken the bus down and had return trip tickets
for the bus, that he would fly back home. How was this going to
be achieved? He had no money and even if he could get a refund
for the bus tickets, he would still be over $200 short. When
asked how he was going to do this, his reply was "Don't worry
about it."
On Saturday night while on the way to the Hard Rock Cafe, Mad
Hatter asked Control C for the location of his computer system
and other items 4 times. This is information that Hatter did not
need to know, but perhaps a SS agent or someone could use very
nicely.
When Phrack Inc. discovered that Dan The Operator was an FBI
informant and made the news public, several people were
criticizing him on Free World II Private. Mad Hatter on the other
hand, stood up for Noah and said that he was still his friend
despite what had happened. Then later when he realized that
people were questioning his legitimacy, his original posts were
deleted and he started saying how much he wanted to kill Dan The
Operator and that he hated him.
Mad Hatter already has admitted to knowing that Dan The Operator
was an FBI informant prior to SummerCon '87. He says the reason
he didn't tell anyone is because he assumed we already knew.
A few things to add, some time ago, Mad Hatter was contacted by
AT&T because of an illegal Alliance Teleconference that he was
responsible for. There was no bust. When Mad Hatter first
entered the phreak/hack world, he joined Phreaks Anonymous World
Wide (PAWW), Metalibashers, Inc (MBI), Order of The Rose, and
Cult of The Dead Cow (-cDc-). If you were a fed and you wanted
to become part of the phreak/hack world, wouldn't you try to join
as many groups as possible to spread your name?
This is all I have to say. Don't take my words as fact, and give
Mad Hatter a chance to speak his behalf before you chop off his
head. This by no means as strong as a case as there was aginst
Dan The Operator or Scan Man. Apparently Mad Hatter has a lot of
explaining to do. It should be fun to watch, but keep your ears
open for contridicting stories.
The information in this article has been presented in order to
warn people about the possibility of Mad Hatter being an
informant. All arguements stated in this article are true to the
best of my knowledge and were written without bias. People with
opposing views or information on MH's behalf should voice
themselves. Do not bother to try and buttle to me, because I
won't be around to hear it. Thank you.
:Knight Lightning
________________________________________________________________
PWN Quicknotes
~~~~~~~~~~~~~~
At 11:00 AM on July 8, 1987, The Sensei received a visit from MCI
security and his local police. They confiscated several disks
and a modem. They told him that federal charges were pending and
the Secret Service may become involved shortly. His search and
seizure is because of MCI code hacking. Since then he has
released The Syndicate Report Issue #13, but whether he releases
more issues is yet to be seen.
Information by The Sensei (7/9/87)
----------------------------------------------------------------
Sir Gallahad thought he had been busted by Allnet when a confused
customer contacted him and demanded that he made long distance
phone calls on his code. In reality, there were calls made to his
phone number and the customer had misread his bill.
Information by The Disk Jockey (7/9/87)
-----------------------------------------------------------------
There was a major bust in San Jose, California (408) involving 5
people. The main person busted was the Infomaniak (supposedly a
member of Anarchy, Inc.), Age 19. Another person involved was
Joy Division. Grand Theft charges have been filed and the
outcome remains to be seen. Later The Phantom, Sysop of a San
Jose board (The Shaolin Board) was busted for having codes on his
board and some codes in his wallet [sounds like a drug bust].
Nobody is sure if the busts were connected.
Information by Sir Francis Drake (7/10/87-7/31/87)
---------------------------------------------------------------
Lex Luthor (and The Leftist) announced that the Legion Of Doom
Technical Journals Issue Two should appear within the next week
on Digital Logic's Data Service. Also, with Bill From RNOC out
of action, the chain of command of the Legion Of Doom now falls
to Phantom Phreaker.
Information by Lex Luthor (7/27/87)
________________________________________________________________
at he tried to pass
off as cocaine. Perhaps to make us think he was cool or
something.
MH constantly tried to get left behind at ^C's apartment for
unknown reasons. He also was seen at a neighbor's apartment
making unauthorized calls into the city of Chicago. When asked
who he called, his reply was "Don't worry about it." MH had
absolutely no money with him during PartyCon (and incidentily ate
everything in ^C's refrigerator) and yet he insisted that
although he had taken the bus down and had return trip tickets
for the bus, that he would fly back home. How was this going to
be achieved? He had no money and even if he could get a refund
for the bus tickets, he would still be over $200 short. When
asked how he was going to do this, his reply was "Don't worry
about it."
On Saturday night while on the way to the Hard Rock Cafe, Mad
Hatter asked Control C for the location of his computer system
and other items 4 times. This is information th
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+