home *** CD-ROM | disk | FTP | other *** search
-
- PWN ^*^ PWN ^*^ PWN { Final Issue } PWN ^*^ PWN ^*^ PWN
- ^*^ ^*^
- PWN Phrack World News PWN
- ^*^ Issue XV: Part Two ^*^
- PWN PWN
- ^*^ Created, Written, and Edited ^*^
- PWN by Knight Lightning PWN
- ^*^ ^*^
- PWN ^*^ PWN ^*^ PWN { Final Issue } PWN ^*^ PWN ^*^ PWN
-
- Crisis On Infinite Hackers July 27, 1987
- ~~~~~~~~~~~~~~~~~~~~~~~~~~
- It all started on Tuesday, July 21, 1987. Taran King received a
- call from a girl who was contacting him on the behalf of Delta-
- Master. From there, we received all sorts of reports about
- busted hackers all across the country.
-
- Among 15-18 others, Bill From RNOC, Eric NYC, Solid State, Oryan
- QUEST, Mark Gerardo, The Rebel, and Delta-Master have been busted
- by the United States Secret Service. There are rumored to be
- several more members of the more "elite" community busted as
- well, but since we can neither disprove or prove the validity of
- these rumors, I have chosen not to name them at this time.
-
- One of the offshoots of this investigation is the end of The Lost
- City of Atlantis and The Lineman's treason against the community
- he once helped to bring about. In Pennsylvainia, 9 people were
- busted for credit card fraud. When asked where they learned how
- to perform the art in which they had been caught, they all
- responded with the reply of text files from The Lost City Of
- Atlantis.
-
- So, the Secret Service decided to give The Lineman a visit.
- Lineman, age 16 (a minor) had no charges against him, but he
- panicked anyway and turned over the bulletin board, all g-philes,
- and the complete userlog to the Secret Service. This included
- information from the "Club Board." The final outcome of this
- action is still on its way. In the meantime, many hackers are
- preparing for the worst.
-
- However, with the exception of Bill From RNOC, most hackers
- travel plans to PartyCon '87 went as expected and we had a great
- time. I feel that it was a necessary escape for many of the
- people that thought their world was coming to an end.
-
- The following are two articles that appeared in the San Francisco
- Examiner.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- Secret Service Smash Two Hacker's Rings July 23, 1987
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- "Computer Break-Ins At Stanford Linked To Nationwide
- Crackdown"
-
- By John Markoff of the Examiner Staff
-
- United States Secret Service agents and local law enforcement
- authorities are breaking up two nationwide computer crime rings
- by arresting at least nine "hackers" in Pennsylania and serving
- search warrents in California and New York on a group known as
- the "Pink Floyd Gang."
-
- Authorities said the two rings had illegally entered corporate
- and university computer systems and stolen millions of dollars
- through illegal phone charges and credit card purchases.
-
- A series of computer break-ins at Stanford University that began
- September 1, 1986, and were reported in The Examiner on October
- 3, 1986 started the first investigation, which mushroomed into
- one of the largest computer crime investigations in history.
- [Give me a break Markoff, your paper has nothing to do with the
- current wave of busts and the Stanford University incidents only
- pertain to 3 hackers out in California. I always hate it when
- reporters make up material in their news broadcasts. -KL]
-
- As many as 17 arrests and searches have taken place in
- California, New York, Oregon, Maryland, and Pennsylvania. More
- arrests are expected, Secret Service officals said. In Mount
- Lebanon, Pa., nine high school students were arrested Tuesday and
- charged with using their home computers to gain access to credit
- card accounts at stores, police there said.
-
- Eight boys and one girl between of ages 14 and 17 illegally
- obtained everything from clothes to skateboards, Pennsylvania
- authorities told the Associated Press on Thursday.
-
- Daniel Mayer of the Secret Service in Pittsburg said arrests of
- juveniles and adults implicated in the ring were also expected
- following the completion of investigations in Dallas and San
- Antonio, Texas; Omaha, Nebraska; Augusta, Georgia; Fresno and Los
- Angeles, California; New York City, New York; Newark, New Jersey;
- and Toledo, Ohio.
-
- John Maxfield, a Detroit computer security expert who is familar
- with the case, said the California-New York group was involved in
- more serious activities. [A. There is no California-New York
- group and there is no Pink Floyd Gang. B. Maxfield knows very
- little of what really goes on in the computer underworld and
- the newspapers shouldn't be this dependent on his word. -KL]
-
- "The two groups may have overlapped on some of the bulletin
- boards - everybody is in touch with everybody - but the New York
- and San Francisco stuff is heavier," he said. "It goes beyond
- simple credit card theft. They where touching major
- corporations."
-
- The first ring was discovered in September, when a hacker using
- the password "P. Floyd" began illegally gaining access to
- computers on the Stanford University campus.
-
- The name Pink Floyd is frequently used by the underground culture
- of "malicious" computer hackers who use modems to break into
- remote computer systems. It has become an anthem for hackers and
- refers to a song by rock group Pink Floyd called "The Wall."
- [Actually, Mr. Markoff, the name P. Floyd was entered because it
- would look like a regular username. There is no Pink Floyd Gang
- or any hacker under that alias. Tell me, did you make this stuff
- up yourself or did you have help? -KL]
-
- Secret Service agents said the computer break-ins, performed by
- juveniles and adults, has raised national security concerns
- because of the defense-related and high-tech information
- contained in the systems they entered.
-
- "You're talking about a sensitive issue, the Stanford computers
- have national security information in them," said Richard McDrew,
- special agent in charge for the U.S. Secret Service in San
- Francisco. "We're trying to determine exactly what was gotten
- and how it was used."
-
- McDrew said local Secret Service agents were still working on the
- case Thursday and that more arrests were likely.
-
- A computer security expert in San Diego said that one of the
- hackers who had gained access to the Stanford computers used a
- government network to try to access a computer at the Los Alamos,
- New Mexico, nuclear test site.
-
- In the Bay Area Tuesday, Secret Service agents served warrents on
- two juveniles in Burlingame and Kentfield, but no arrests were
- made. McDrew said agents in his office had been in touch with
- Southern California Secret Service agents but that no arrests had
- been made there yet.
-
- Illegal purchases of goods and services made by the Midwest ring
- were "in the millions," according to officer John Michalec of the
- Mount Lebanon, Pa., police department. [Excuse me, but isn't
- Pennsylvainia just a little far North East to be called the
- midwest? -KL]
-
- Both groups illegally used private long-distance lines such as
- MCI to mask their location from investigators. [No, that isn't
- really the reason, it was to get out of paying for long distance
- service. -KL]
-
- The New York-California ring [Again, there is no New York-
- California ring, its a nationwide loosely affiliated group with
- boundries limited only by the phone lines. -KL] specialized in
- breaking into computers that ran the AT&T UNIX operationg system,
- according to computer crime experts familar with the events.
-
- The network of hackers were informal, computer security experts
- said. Members of the rings used computer bulletin boards in
- homes to stay in contact with each other, Maxfield said.
-
- By logging into the clandestine bulletin board systems, the
- hackers were able to exchange information, such as illegally
- obtained telephone and other credit cards and computer passwords.
-
- "In terms of what they were doing, they were into every computer
- system in the country," he said. "They definately were in to all
- the credit bureaus. It's not just the phone companies - they
- where into everything."
-
- He said the Secret Service arrests had created a great fear in
- the underground network of hackers who heard about the arrests in
- recent days.
-
- "One guy called me last night, and he said, `I'm sitting by my
- bed with my door unlocked so they won't knock it down. I've
- thrown away all my notes. Will they still arrest me?,'" Maxfield
- said. [Gosh, he must have been out of CONTROL.]
-
- Computer crime experts said they consider these rings of
- "malicious" hackers to be one of the most dangerous yet.
-
- "It's one of the most serious (crime rings), because they are
- part of an elite worldwide culture of malicious hackers," said
- Donn Parker, a computer crime expert at SRI International, in
- Menlo Park. [Excuse me Donn, but please explain how a hacker can
- be malicious.]
-
- McDrew said both juveniles and adults around the nation were
- involved and that the investigations were being coordinated by
- the Washington D.C., Secret Service; Fraud Division.
-
- Computer scientists who tracked the original Stanford break-ins
- said hackers had used telephone connections to break into
- computers at Stanford University, Lawrence Berkeley Laboratory,
- the University of Illinois, Massachusetts Institute of
- Technology, Mitre Corporation in Reston, Virginia, and at least
- three Silicon Valley corporations.
-
- In several cases the hackers actually spoke with Stanford
- University officals while he was breaking into their systems.
-
- Lester Earnest, associate chairman of the Stanford University
- computer science department, said Wednesday that such break-ins
- were frequent and that computer security experts had closed
- loopholes the hackers had used to enter Stanfords computers.
- [Only until more hackers find more loopholes in your system. -KL]
-
- Typed by Elric Of Immyr
- Special Thanks to Sir Francis Drake
- - = - = - = - = - = - = - = - = - = - =- ^ -= - = - = - = - = - =
- Hackers Offer Their Side of the Story July 24, 1987
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- By John Markoff of the Examiner Staff
-
- Computer "hackers" consider themselves an elite group with
- extraodinary skills at breaking into corporate and university
- computer systems, accoording to experts and sources familiar with
- this underground network.
-
- One computer crime expert has refered to them as the "Pink Floyd
- Gang" because several members have used the password "P. Floyd"
- while breaking into computer systems around the country.
-
- The hackers themselves disdain the term and say that they prefer
- to be known as simply as "the Community" - a reference to their
- loose coorperative federation. [Now this is total bullshit, it
- must have come from Oryan QUEST. The way I see it is that its
- the Phreak/Hack World, or the Modem World, because it is a
- seperate pocket community inside America and the world. -KL]
-
- Thursday evening after a story about the Secret Service arrests
- and warrants appeared in The Examiner, several hackers who say
- they belong to the Community called the paper to give their side
- of the story.
-
- The caller asked to remain anonymous. Based on information they
- provided, the callers were obviously well-versed in the workings
- of the underground network.
-
- [Oryan Quest said,] "I can get into the telephone system
- computers," said one hacker. "Let's say I don't like you. I can
- turn your telephone off or I can turn your phone into a pay phone
- so it asks you to deposit 20 cents before making a call, or I can
- turn a pay phone into a free phone."
-
- The individuals "meet" electronically on computer bulletin
- boards. These are personal computers systems running special
- software programs that permit callers to exchange information via
- telephone and modem.
-
- According to the caller, they use colorful electronic aliases to
- mask their true identities: names like Icarus 212, Ninja NYC,
- Control C, Delta-Master, DEAD LOOP, and Silver Spy.
-
- One caller said that many members of the Community are young
- computer programmers who were self-taught experts in the AT&T
- UNIX operation system. (An operating system is a special program
- that does basic computer housekeeping chores).
-
- He said the Community had become adept at breaking into systems
- that run the UNIX operation system and had targeted AT&T
- computers, which where were vulnerable to the attacks.
-
- Computers security experts say UNIX is more vulnerable to
- hackers' attacks then other computer operating systems because it
- was orignally designed for academic and experimental use.
-
- Another caller said the popular image of hackers as nerds who
- "never see the light of day" was inaccurate. "I go out for sports
- at school and I'm considered a jock," he said. [And after
- school, Oryan QUEST is considered a "loser" bagger at a local
- supermarket. -KL]
-
- One caller said that several months ago a major "phone phreak"
- convention had taken place in St. Louis, where hackers and phone
- phreaks had gathered and exchanged data on breaking into systems.
- [Actually, what they are refering to is SummerCon '87, which was
- sponsored by Phrack Inc., Metal Shop Private, and TeleComputist
- Newsletter. Full details of this can be found in Phrack World
- News Issue 14, Part 2. There was no trading of the information
- stated in this article. -KL]
-
- He said that until the recent Secret Service arrests, many
- hackers had been acting bolder, but the arrests would change
- things; "Now you're going to see everyone go underground."
-
- Another caller said that many of the underground bulletin boards
- had disappeared since the arrests began. "It's finished, all the
- major boards in the country are down now," he said. [In a sense
- it is an ending to a lot of good "legendary" bulletin boards
- (like Metal Shop Private), but there will always be more to fill
- the void. -KL]
-
- Typed by Elric Of Immyr
- Special Thanks To Sir Francis Drake
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- On Monday, July 27, 1987 Cable News Network (CNN) showed actual
- footage of some of the recovered merchandise from the California
- hackers' busts. Among the items was a TRS-80 Color Computer and
- an IBM compatible, both belonging to Oryan QUEST. The CNN report
- was basically similar to the above news stories.
-
- Information Provided by Forest Ranger
-
- In conclusion, this wave of busts has indeed hurt the phreak/hack
- world, but it has not destroyed it. It will not be long before
- new hackers come to take the place of those that were busted.
- The majority of the "good" boards that are down, are down for
- reasons not affected by the busts and for every board that goes
- down, two more will spring up to take its place.
-
- :Knight Lightning
- ________________________________________________________________
-
- Mad Hatter; Informant? July 31, 1987
- ~~~~~~~~~~~~~~~~~~~~~~
- We at Phrack Inc. have uncovered a significant amount of
- information that has led us to the belief that Mad Hatter is an
- informant for some law enforcement organization.
-
- When Taran, Shades, Forest Ranger, and I arrived at Control C's
- in Chicago, Mad Hatter had already searched the place and had
- found some papers that could only have done ^C harm. We
- destroyed this information and thought everything was ok.
- However, as it turns out, we searched MH's bags and found a
- duplicate set of this information and the general hypothesis was
- they he intended to leave it behind as incriminating evidence.
-
- MH had also brought down several disks for the purpose of copying
- Phantasie Realm. Please note; PR was an IBM program and MH has
- an apple.
-
- Control C told us that when he went to pick MH up at the bus
- terminal, he watched the bus pull in and saw everyone who
- disembarked. Suddenly Mad Hatter was there, but not from the bus
- he was supposed to have come in on. In addition to this, he had
- baking soda wraped in a five dollar bill that he tried to pass
- off as cocaine. Perhaps to make us think he was cool or
- something.
-
- MH constantly tried to get left behind at ^C's apartment for
- unknown reasons. He also was seen at a neighbor's apartment
- making unauthorized calls into the city of Chicago. When asked
- who he called, his reply was "Don't worry about it." MH had
- absolutely no money with him during PartyCon (and incidentily ate
- everything in ^C's refrigerator) and yet he insisted that
- although he had taken the bus down and had return trip tickets
- for the bus, that he would fly back home. How was this going to
- be achieved? He had no money and even if he could get a refund
- for the bus tickets, he would still be over $200 short. When
- asked how he was going to do this, his reply was "Don't worry
- about it."
-
- On Saturday night while on the way to the Hard Rock Cafe, Mad
- Hatter asked Control C for the location of his computer system
- and other items 4 times. This is information that Hatter did not
- need to know, but perhaps a SS agent or someone could use very
- nicely.
-
- When Phrack Inc. discovered that Dan The Operator was an FBI
- informant and made the news public, several people were
- criticizing him on Free World II Private. Mad Hatter on the other
- hand, stood up for Noah and said that he was still his friend
- despite what had happened. Then later when he realized that
- people were questioning his legitimacy, his original posts were
- deleted and he started saying how much he wanted to kill Dan The
- Operator and that he hated him.
-
- Mad Hatter already has admitted to knowing that Dan The Operator
- was an FBI informant prior to SummerCon '87. He says the reason
- he didn't tell anyone is because he assumed we already knew.
-
- A few things to add, some time ago, Mad Hatter was contacted by
- AT&T because of an illegal Alliance Teleconference that he was
- responsible for. There was no bust. When Mad Hatter first
- entered the phreak/hack world, he joined Phreaks Anonymous World
- Wide (PAWW), Metalibashers, Inc (MBI), Order of The Rose, and
- Cult of The Dead Cow (-cDc-). If you were a fed and you wanted
- to become part of the phreak/hack world, wouldn't you try to join
- as many groups as possible to spread your name?
-
- This is all I have to say. Don't take my words as fact, and give
- Mad Hatter a chance to speak his behalf before you chop off his
- head. This by no means as strong as a case as there was aginst
- Dan The Operator or Scan Man. Apparently Mad Hatter has a lot of
- explaining to do. It should be fun to watch, but keep your ears
- open for contridicting stories.
-
- The information in this article has been presented in order to
- warn people about the possibility of Mad Hatter being an
- informant. All arguements stated in this article are true to the
- best of my knowledge and were written without bias. People with
- opposing views or information on MH's behalf should voice
- themselves. Do not bother to try and buttle to me, because I
- won't be around to hear it. Thank you.
-
- :Knight Lightning
- ________________________________________________________________
-
- PWN Quicknotes
- ~~~~~~~~~~~~~~
- At 11:00 AM on July 8, 1987, The Sensei received a visit from MCI
- security and his local police. They confiscated several disks
- and a modem. They told him that federal charges were pending and
- the Secret Service may become involved shortly. His search and
- seizure is because of MCI code hacking. Since then he has
- released The Syndicate Report Issue #13, but whether he releases
- more issues is yet to be seen.
-
- Information by The Sensei (7/9/87)
- ----------------------------------------------------------------
- Sir Gallahad thought he had been busted by Allnet when a confused
- customer contacted him and demanded that he made long distance
- phone calls on his code. In reality, there were calls made to his
- phone number and the customer had misread his bill.
-
- Information by The Disk Jockey (7/9/87)
- -----------------------------------------------------------------
- There was a major bust in San Jose, California (408) involving 5
- people. The main person busted was the Infomaniak (supposedly a
- member of Anarchy, Inc.), Age 19. Another person involved was
- Joy Division. Grand Theft charges have been filed and the
- outcome remains to be seen. Later The Phantom, Sysop of a San
- Jose board (The Shaolin Board) was busted for having codes on his
- board and some codes in his wallet [sounds like a drug bust].
- Nobody is sure if the busts were connected.
-
- Information by Sir Francis Drake (7/10/87-7/31/87)
- ---------------------------------------------------------------
- Lex Luthor (and The Leftist) announced that the Legion Of Doom
- Technical Journals Issue Two should appear within the next week
- on Digital Logic's Data Service. Also, with Bill From RNOC out
- of action, the chain of command of the Legion Of Doom now falls
- to Phantom Phreaker.
-
- Information by Lex Luthor (7/27/87)
- ________________________________________________________________
- at he tried to pass
- off as cocaine. Perhaps to make us think he was cool or
- something.
-
- MH constantly tried to get left behind at ^C's apartment for
- unknown reasons. He also was seen at a neighbor's apartment
- making unauthorized calls into the city of Chicago. When asked
- who he called, his reply was "Don't worry about it." MH had
- absolutely no money with him during PartyCon (and incidentily ate
- everything in ^C's refrigerator) and yet he insisted that
- although he had taken the bus down and had return trip tickets
- for the bus, that he would fly back home. How was this going to
- be achieved? He had no money and even if he could get a refund
- for the bus tickets, he would still be over $200 short. When
- asked how he was going to do this, his reply was "Don't worry
- about it."
-
- On Saturday night while on the way to the Hard Rock Cafe, Mad
- Hatter asked Control C for the location of his computer system
- and other items 4 times. This is information th
- Downloaded From P-80 International Information Systems 304-744-2253 12yrs+
-