home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker Chronicles 1
/
HACKER1.ISO
/
phrk3
/
phrack31.8
< prev
next >
Wrap
Text File
|
1992-09-26
|
13KB
|
390 lines
==Phrack Inc.==
Volume Three, Issue Thirty-one, Phile #8 or 10
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
PWN Phrack World News PWN
PWN Issue XXXI, Part One PWN
PWN Compiled by Phreak_Accident PWN
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
Operation "Sun-Devil"
=====================
May 9th and 10th brought on two day thats would be marked in every hackers
history book. The reason we assume these days will be important to many, is
that maybe it's time we opened are eyes and saw the witch hunt currently in
progress.
In less than 48 hours, 150 Secret Service men and other law officials
served 30 search warrents in 14 cities around the nation (This thing was hudge).
Operation "Sun-Devil" (As the Attorney General in Phoenix called it), was
a success on their part. "The investigation though is not over, and there are
more warrents to be executed.", said Jim Folwer of L.A's Secret Service.
Any details of the investigation are not being given out at this time.
The Asst. Attorney General of Pheonix told Phrack Inc. that there were other
problems involving the investigation and that it was an ongoing investigation
for the last TWO years.
It is my understanding that Gail Thackeray and the Secret Service are not,
taking this lightly. She told Phrack inc. that they are not distinquishing
pirates, hackers, or phreakers. Basically, it's any kid with a modem that calls
a BBS with an alias. Yes, we are the witches, and we are being
hunted.
The following are Two news releases obtianed via fax through the U.S.
Secret Service for Phrack Inc.
N E W S R E L E A S E
FOR IMMEDIATE RELEASE CONTACT: Gail Thackeray
------------------------ Assitant Attorney General
May 9, 1990 @ 11:00 A.M. (602) 542-4266
Attorney General Bob Corbin announced today that in
connection with an eighteen-month joint investigation into
computer crime conducted with the United States Secret
Service and the United States Attorney's office, the Arizona
Attorney General's office has executed seven search warrants
in which computers, electronic bulletin boards, telephone
test equipment and records have been seized.
The Organized Crime and Racketeering Division
investigation involved complaints by Arizona and out of state
victims of substantial financial losses resulting from credit
card fraud and theft of long distance telephone and data
communications services, and by victims of attacks on
computer systems operated by government agencies, private
corporations, telephone companies, financial institutions,
credit bureaus, and a hospital.
The Arizona Attorney General's office received
information and technical assistance from the Glendale,
Arizona Police Department's Computer Crime Unit, and from
many private sector sources, including Bellcore (Bell
Communications Research), American Express, Communications
carriers U.S. Sprint, AT&T, MCI, Com Systems, MidAmerican
Communications, LDL Communications, and Shared Use Network.
Without the cooperation of these companies and of numerous
federal, state and local law enforcement agencies around the
country, this investigation would have been impossible.
The privacy of our citizens and the health of our
economy depend upon secure, reliable computer systems.
Computer fraud and attempts to compromise senstitive public
and private computer systems will not be tolerated.
Individuals who commit these offenses in Arizona can expect
to be prosecuted.
.end.
P R E S S R E L E A S E
FOR IMMEDIATE RELEASE Contact: Wendy Harnagel
Wednesday, May 9, 1990 United States Attorney's Office
---------------------- (602) 379-3011
PHOENIX -- Stephen M. McNamee, United States Attorney
District of Arizona, Robert K. Corbin, Attorney General for
the State of Arizona, and Henry R. Potosky, Acting Special
Agent in Charge of the United States Secret Service Office in
Phoenix, today announced that approximately twenty-seven
search warrants were executed on Monday and Tuesday, May 7
and 8, 1990, in various cities across the nation by 150
Secret Service agents along with state and local law
enforcement officials. The warrants were issued as a part of
Operation Sundevil, which was a two year investigation into
alleged illegal computer hacking activities.
The United States Secret Service, in cooperation with
the United States Attorney's Office, and the Attorney General
for the State of Arizona, established an operation utilizing
sophisticated investigative techniques, targeting computer
hackers who were alleged to have trafficked in and abuse
stolen credit card numbers, unauthorized long distance
dialing codes, and who conduct unauthorized access and damage
to computers. While the total amount of losses cannot be
calculated at this time, it is estimated that the losses may
run into the millions of dollars. For example, the
unauthorized accessing of long distance telephone credit
cards have resulted in uncollectible charges. The same is
true of the use of stolen credit card numbers. Individuals
are able to utilize the charge accounts to purchase items for
which no payment is made.
Federal search warrants were executed in the following
cities:
Chicago, IL
Cincinatti, OH
Detroit, MI
Los Angeles, CA
Miami, FL
Newark, NJ
New York, NY
Phoenix, AZ
Pittsburgh, PA
Plano, TX
Richmond, VA
San Diego, CA
San Jose, CA
Unlawful computer hacking imperils the health and
welfare of individuals, corporations and government agencies
in the United States who rely on computers and telephones to
communicate.
Technical and expert assistance was provided to the
United States Secret Service by telecommunication companies
including Pac Bel, AT&T, Bellcore, Bell South, MCI, U.S.
Sprint, Mid-American, Southwestern Bell, NYNEX, U.S. West,
and by the many corporate victims. All are to be commended
for their efforts for their efforts in researching intrusions
and documenting losses.
McNamee and Corbin expressed concern that the improper
and alleged illegal use of computers may become the White
Collar crime of the 1990's. McNamee and Corbin reiterated
that the state and federal government will vigorously pursue
criminal violations of statutes under their jurisdiction.
Three individuals were arrested yesterday in other
jurisdictions on collateral or independent state charges.
The investigations surrounding the activities of Operation
Sundevil are continuing.
The investigations are being conducted by agents of the
United States Secret Service and Assistant United States
Attoryney Tim Holtzen, District of Arizona, and Assistant
Arizona Attorney General Gail Thackery.
.end.
_______________________________________________________________________________
Virus mania
===========
Robert T. Morris started it all. Who cares, it's over and done with.
Never the less, it's being dragged out in every national paper. It's old news
so we won't cover it here, but we will tell you about something the Army has up
its sleeve.
Army is Looking for a Few Good Viruses
By Rory J. O'conner
Knight-Ridder Newspapers
______________________________________
The U.S. Army is looking for help to develop the seeds of a new-age germ
warfare: It wants business to help it turn computer "viruses" into military
weapons.
Experts predict the viruses, if sucessfully developed, could be used to
wreak havoc on the increasing number of computers in the battlefield. The
destructive computer programs which have increasingly damaged commercial and
research computer systems in the past four years, could be used to disrupt
military communications and feed misleading data to enemy commanders.
The viruses could aslo be used to alter the programming of crucial
communications satellites serving combat units, the experts said.
The Army is soliciting bids from small businesses to determine the
feasibility of using computer viruses in warefare. And it is willing to pay up
to $550,000 to a company that comes up with a plan for creating the programs -
and figures out how to use military radio systems to introduce them into enemy
computers.
A computer virus is a kind of program designed to disrupt normal operation
of a computer system or damage data ont hat system by altering or destroying
it. The rogue programs are most effective when introduced secretly into the
computer system of an unsuspecting user and when their damage is subtle or
hidden fromt he user for some time.
Viruses are also self-duplicating and can spread undetected from an
infected computer to other computer systems they contact.
So far, more than 60 computer viruses have been identified, most of them
attacking poorly guarded personal computers used by businesses, universities
and inividuals. The Army's virus would have to be more sophisticated than
those programs.
But some detractors of the concept say the Army could wind up with the
same problem it has with biological weapons: Creating destructive elements
that might get loose and cause widespread damage to its own forces as well as
civilians.
"This stuff is very dangerous, and most people involved in creating
viruses are not aware of the threat," said a Bay Area virus expert who asked ot
to be named. "You can't spread anthrax around the world and not have it come
back around to you. And the enemy is using the same kind of computers and
software that we are."
Many experts who are fighting the explosion in virus activity by amateur
programmers are especially angry at government efforts to develop the programs
for the military. Some say it is particulary troubling in light of the
sentencing of Robert T. Morris Jr. (Ed -Ick), convicted in federal court of
sending a similar program through a government sponsored network in 1988.
"It bothers me that the government says in one breath (viruses) are bad
and illegal and then asks for someone to develop them," said Glenn Tenney, a
San Mateco, Calif., programmer and organizer of the annual Computer Hackers
Conference. "If Morris had done the same thing for the Army, they'd have paid
him hundreds of thousands to do it. But he did it on the wrong side and got
punished."
Computer experts say creating a virus to the Army's specifications is
possible with current technology - although some of the Army's requirements
could make developing it more difficult than creating an ordinary personal
computer virus.
First, military computer systems are usually designed with far more
security features than commercial systems, making it much harder for a virus to
enter the systems. Second, the Army is emphasizings the use of radio
communication to inject the virus into enemy systems. Normally, computer
viruses spread through the exchange of floppy disks that contain the rogue
program or along wires connecting several computers. Using complex military
radio signals instead would require expertise that mose programmers don't have.
.end
_______________________________________________________________________________
RIPCO May 8th, 1990
----- -------------
Operation Sun-Devil claimed more than just a few "Codelords" around the
states, it claimed one of the oldest and more popular boards. Nobody knows
when or if RIPCO shall return.
Reportedly, Dr. Ripco was charge on a hand-gun violation after his house
was searched. Phrack inc. can't comment on this.
The following is the exact transcript of the message left on RIPCO's
answering maching after Operation Sun-Devil.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
This is 528-5020.
As you are probably aware, on May 8, the Secret Service conducted a series
of raids across the country. Early news reports indicate these raids
involved people and computers that could be connected with credit card and
long distance toll fraud. Although no arrests or charges were made, Ripco
BBS was confiscated on that morning. It's involvement at this time is
unknown. Since it is unlikely that the system will ever return, I'd just l
say goodbye, and thanks for your support for the last six and a half years.
It's been interesting, to say the least.
Talk to ya later.
{Dr. Ricpo}
*** END OF VOICE MESSAGE ***
_______________________________________________________________________________
Downloaded From P-80 International Information Systems 304-744-2253 12yrs+