1 line
81 KiB
Plaintext
1 line
81 KiB
Plaintext
|
||
___________ __ __ ___________
|
||
/\ ________\ /\ \ /\ \ /\ _______ \
|
||
\ \ \_______/ \ \ \ \ \ \ \ \ \_____/\ \
|
||
\ \ \_________ \ \ \____\_\ \ \ \ \____\_\ \
|
||
\ \_________ \ \ \ _______ \ \ \ _______ \
|
||
\/________/\ \ \ \ \_____/\ \ \ \ \_____/\ \
|
||
_______\_\ \ \ \ \ \ \ \ \ \ \ \ \ \
|
||
/\___________\ \ \_\ \ \_\ \ \_\ \ \_\
|
||
\/___________/ \/_/ \/_/ \/_/ \/_/
|
||
|
||
S W E D I S H H A C K E R S A S S O C I A T I O N
|
||
|
||
Presents
|
||
|
||
<---------------------------------------------------------------------------->
|
||
Released Editor: Mr Big
|
||
Annual Year Protocol #4
|
||
28-Feb-92 (c) 1992
|
||
<---------------------------------------------------------------------------->
|
||
|
||
|
||
|
||
---------
|
||
- Index -
|
||
---------
|
||
|
||
Introduction.............................................
|
||
Voice of the Editor......................................
|
||
Voice of the Members in S.H.A............................
|
||
Inside story at court - S.H.A. member stands trial.......
|
||
New S.H.A. board.........................................
|
||
Royal Institute Of Technology............................
|
||
S.H.A. Member busted.....................................
|
||
Operation Sundevil, by Knight Lightning (guest writer)...
|
||
Cray II Attacked by S.H.A................................
|
||
Milnet and Goverment computers attacked by S.H.A.........
|
||
Guidelines for System Operators..........................
|
||
FSF/MIT Closing down the shop............................
|
||
Short World Wide news....................................
|
||
Blue Boxing..............................................
|
||
Carding today............................................
|
||
S.H.A's rules and advices for other hackers..............
|
||
Demoralized Youth, by Tormentor (guest writer)...........
|
||
S.H.A. Official Summer Party 1991........................
|
||
Prof of S.H.A. Hacking Activities........................
|
||
S.H.A. Body Guards.......................................
|
||
Investigation of S.H.A...................................
|
||
Back Chat................................................
|
||
Messages to System Operators.............................
|
||
The Future...............................................
|
||
Releases 1992............................................
|
||
How to contact S.H.A.....................................
|
||
Editors final note.......................................
|
||
Disclaimer...............................................
|
||
|
||
|
||
|
||
----------------
|
||
- Introduction -
|
||
----------------
|
||
|
||
Welcome to another annual year report from the only true hacking group
|
||
in Sweden today, The Swedish Hackers Association.
|
||
|
||
In this public release we have not included any detailed information about
|
||
any attacks made by members of S.H.A. since the Police and other goverment
|
||
agencies will receive this file in one way or another. Sorry if this cause
|
||
any trouble, but we have our reasons and we are not interested in busting
|
||
invidual members in S.H.A. Thank YOU for your cooperation.
|
||
|
||
All companys and goverment agencies are welcome to contact us for
|
||
assistance and help with their computer security.
|
||
|
||
The following persons have been involved in the creation of this 4th
|
||
protocol, and to whom we are gratefull to. Thank you and keep up the
|
||
good work.
|
||
|
||
Mr Big - S.H.A.
|
||
Lixom Bah - S.H.A.
|
||
Phearless - S.H.A.
|
||
The Chief - S.H.A.
|
||
D.O.C. - S.H.A.
|
||
Tormentor - Guest Writer, Demoralized Youth
|
||
Knight Lightning - Guest Writer
|
||
|
||
Note: No handles of members in S.H.A. are public and only those who are
|
||
writers and editors have their handles published in this file,
|
||
since they are already known to the public and the Swedish Police.
|
||
|
||
|
||
|
||
-----------------------
|
||
- Voice of the Editor -
|
||
-----------------------
|
||
|
||
Yet another year of interesting events has passed away. I can still remember
|
||
how it was one year ago; chaos and disorder, could the 3rd protocol be
|
||
released in time? and so on. Imagine, we have already released 4 annual year
|
||
protocols. 4 years of full documented hacking activity in Sweden by the very
|
||
best hackers ever existed in our country. Let it stay that way.
|
||
|
||
Our protocols used to be released in January/February each year, but this
|
||
time we have waited to release the material due to a trial against one of
|
||
our members. (we don't want to support the prosecutor with more information,
|
||
do we?). One of the main issues in this protocol will be the trial which was
|
||
held the 8th of January 1992. That should be included in the 5th protocol,
|
||
but we just couldn't wait ONE YEAR to publish it.
|
||
|
||
Another thing that has happend during the year is the bust of a couple of
|
||
SHA members. The "main" bust was at the 3rd of May 1991, when a small part
|
||
of our group were visiting the Royal Institute of Technology.
|
||
This resulted in some police searches at our houses one month later, and we
|
||
were brought for interrogation.
|
||
|
||
From a hacking point of view, 1991 has been a successful year of penetrated
|
||
computers, long nights and a lot of new knowledge.
|
||
|
||
The Swedish Police is currently investigating the organization S.H.A.
|
||
(we have indications that points in that direction. More about this
|
||
later) Because of that, we have to be very careful about what we write in
|
||
this stupid file. We have even thought of cancel this release but has
|
||
finally reached the decicion to continue, and take the consequences.
|
||
We have written it so nothing can be held against anyone in SHA in court,
|
||
(that's why you might find it a little bit odd.)
|
||
|
||
This whole protocol wasn't written overnight at the end of 1991.
|
||
We have been writing and re-writing it time after time during this year
|
||
until we decided that THIS is what we want to release to the public.
|
||
|
||
We will try to cover everything from real system hacking news to intervjues
|
||
with some of the virus creators in Sweden.
|
||
|
||
A major drawback for SHA was in the summer 1991 when the Swedish police
|
||
raided one of our members place and confiscated his computer system which
|
||
where hosting one of our bulletin boards we where running.
|
||
|
||
Tragic but not a disaster.
|
||
|
||
|
||
Atlast, I would like to say:
|
||
|
||
- All events and people in this file are all fiction and creation of our
|
||
fantasies and any matching with real people and events are only
|
||
coinsident as any other story or fiction.
|
||
|
||
But I'm sorry that I can't. All stuff are true and all events have taken
|
||
place. Anyway, nothing in this file can be tied to any invidual members
|
||
of S.H.A. and S.H.A. as an organization can not be blamed for actions taken
|
||
by invidual members of S.H.A.
|
||
|
||
This protocol are also distributed as a paper magazine in about 5000 copies.
|
||
So if the goverment are trying to seize our equipment used for the
|
||
production of this protocol, they are violating federal laws about press
|
||
freedom and freedom of speech.
|
||
|
||
|
||
So basically:
|
||
|
||
- Goverment agencies, you are shit out of luck.
|
||
|
||
We hope you will enjoy this protocol, and find it interesting.
|
||
|
||
If you haven't read any of our previous protocols. (1989, 1990 and 1991)
|
||
I suggest you try to get hold of some copies. The same goes for our other
|
||
releases about Hacking, Phreaking and Carding.
|
||
|
||
|
||
|
||
|
||
----------------------------------
|
||
- Voice of the members in S.H.A. -
|
||
----------------------------------
|
||
|
||
Here have the members in S.H.A. their "freedom of speech". They can write
|
||
anonymously or by their handles, it is up to them. But I guess they will
|
||
write anonymously. Who can blame them? <grin>
|
||
/Ed
|
||
|
||
|
||
--> Written by a anonymous member who do not want to be busted
|
||
|
||
Another year has passed with great hacking events. Many new computer systems
|
||
and operating systems have been penetrated. One slight drawback has been the
|
||
interest the police is giving S.H.A., but lucky as some people are,
|
||
(read me), they are not near of knowing all the people in S.H.A. and has
|
||
only those that are already known. Mouhaha, what suckers, they can't even
|
||
put two and two together. Anyway, maybe the luck will change, but until then
|
||
I will continue to make progress in the hacking field of experience.
|
||
I have even discovered that VMS is a great OS and not as secured as Digital
|
||
Equipment are trying to tell every one. And one neat feature with VMS is
|
||
that many goverment and military computers are running under VMS since it
|
||
is secured!! Mouhaha... they should know better. Anyway, I hope that you
|
||
hackers out there also have had a very good year. See ya on IRC.
|
||
|
||
|
||
|
||
--> Written by a anonymous member who do not want to be busted
|
||
|
||
I would just like to say this to the persons who are currently involved
|
||
in monitoring us and documenting our lives.
|
||
|
||
- Fuck with us and we will fuck with all the computers we can find, and
|
||
we will create total chaos and disorder.
|
||
|
||
This is not a threat, would I make threats? no, I just make promisses.
|
||
Anyway, I hope that you hackers out there reading this protocol will have
|
||
a great year without interference from goverment agencies. FUCK THEM!
|
||
|
||
|
||
|
||
--> Written by a anonymous member who do not want to be busted
|
||
|
||
I can still remember those warm days in May when I spent most of my time
|
||
on IRC, day and nights. I can remember the days in August as if it was
|
||
yesterday. Breaking into system after system, and roaming around on the
|
||
internet.
|
||
|
||
NASA was an easy target and some of their computers were successfully
|
||
penetrated and NASA Security began to scream.
|
||
|
||
Security? What a joke! It almost seems that no one out there have learned
|
||
enough to secure their system. I adore SunOS since new holes are found
|
||
every day, mouhahaha. Many system operators are stupid and don't know how
|
||
to handle a system to secure it. They do almost every mistake a system
|
||
operator can do, from having accounts without password to standard accounts.
|
||
Are only hackers reading DDN bulletins and CERT bug reports?
|
||
Sometimes I wonder. Gee, I've even found systems that have security holes
|
||
that was exploited back in 1986. Jesus! What are they thinking? Well, if
|
||
they are that stupied, they have to face the consequences. BTW, try they
|
||
following for testing the security: "rm /* -rf" If they have configured
|
||
the system incorrectly a catastophy would be the result. <grin>
|
||
|
||
|
||
|
||
--> Written by a anonymous member who do not want to be busted
|
||
|
||
1991 - The year that passed without notice
|
||
|
||
A Personal View
|
||
|
||
If you were to place 1991 in the scale of Hacking events, it must come last.
|
||
Last year was one of the most dull years for me. I compare it with the year
|
||
1990, and find that the first months of 1991 were pretty good, and then
|
||
everything went down the drain. No news, no new hackers, nothing interesting
|
||
happened. Then we had the internal divergent opinions that led to one thing
|
||
or another which you might already know. But still nothing new in the
|
||
hacking field.
|
||
|
||
I'm not sure what I'm supposed to write in this, the 4th S.H.A. Protocol,
|
||
but I'll try to make it somewhat filled with different opinions, views or
|
||
whatever I can come up with. Because it hasn't been a very productive year
|
||
for me in the hacking scene, I don't have very much to write about.
|
||
|
||
I feel there's enough textfiles about hacking and phreaking today, and too
|
||
many "new" groups who copy old material and release it as new. The old and
|
||
known groups, like Phrack and NIA are good enough for me. Also, these "new"
|
||
groups seem to be semi-eLiTe groups (recognized by the 'z's and the "k00l"
|
||
and "warez" words mixed with the old "new" material.)
|
||
|
||
No, let's support the old and known groups, and tell these "new" ones to
|
||
stick to their warezz trading unless they're NOT eLiTe d00dzz, if so,
|
||
support them! Well, that's about if from me. Not very interesting, I know,
|
||
but it's what I could come up with today. I know this 4th protocol will be
|
||
great, and I greet everyone working with/for it.
|
||
|
||
|
||
|
||
--> Written by a anonymous member who do not want to be busted
|
||
|
||
As said in the introduction and by the editor, this year has been a
|
||
successful one with new experience and new knowledge. Some tragic events
|
||
took place in the summer of 1991 when some SHA members were busted in
|
||
Stockholm, Sweden. The police is still investigating the organization
|
||
S.H.A., and therefore we have decided to exclude details which might be
|
||
held against us in court. After an eventually trial, all information will
|
||
be released. We promise. We have kept detailed log-books, date by date, so
|
||
there will be a hell of a release after an eventually trial. We have also
|
||
thought of writing a book, but that's just one of our 1000 projects...
|
||
|
||
New computer security systems has been a real challenge, and every system
|
||
has its weaknesses. The only way of getting a secure system is to chop the
|
||
Ethernet cable, but who wants to do that? They have to live with unsecure
|
||
systems as long as the S.H.A. is alive on the nets..
|
||
|
||
The newspapers have gone mad, and write everything except the truth about
|
||
hacking (read SHA). What they need is a lesson of professional journalism.
|
||
Just lucky they haven't recieved the police report yet. (where they state
|
||
that we, SHA, have broken into NASA). If the newspapers starts to write
|
||
about that, I bet they will missunderstand it and say that we were about to
|
||
start the World War III with help of weather satellites and so on...
|
||
(which isn't THAT far from the truth :-))
|
||
|
||
I feel that I have to throw some dirt at the Swedish Police Department.
|
||
Three of the most incompetent investigators when it's about computer fraud
|
||
are currently investigating and interrogating innocent citizens (read SHA).
|
||
A big fuck should go to S.K. who writes police reports from his fantasy.
|
||
If you listen to the tape and write what we say at the interrogations, and
|
||
stop writing fantasy stories in the reports, you wouldn't have a chance to
|
||
convince the prosecutor that you 'needed' search warrants to raid our
|
||
places. FUCK YOU.
|
||
|
||
The last report from you that I read was a big nasty bestseller.
|
||
When I crosschecked it with the interrogated person, it showed up to be
|
||
50% fiction and creations from your mind. But I guess you are not alone
|
||
to be so rotten in the Swedish Police Department.
|
||
|
||
(I guess I will regret this at the next interrogation, but it's worth it.)
|
||
|
||
Enough with bullshit from me, I'll leave the rest of this protocol to you.
|
||
|
||
|
||
|
||
--> Written by a anonymous member who do not want to be busted
|
||
|
||
Hello again folks. Another year has passed, and there's been happening a
|
||
shit load of things I tell you. What we see now, officially, is computer
|
||
systems are getting harder and harder to penetrate... that's true, but is
|
||
it impossible now?? Hahaha... I wouldn't think so if I were you.
|
||
I would like to compare the new security routines like this; a burglar is
|
||
loose in a town, but he only breaks in to yellow houses. And what does the
|
||
police do to stop him? The smartest way? (i.e. try to catch the criminal)?
|
||
no... they paint all the houses in the town in some other color than
|
||
yellow... with known results, the burglar chooses houses with another color,
|
||
and this goes on and on...
|
||
I find it Quite funny to watch system managers "improve" their systems...
|
||
and you're still on it... After the so-called improvements. Some system
|
||
managers try so hard, that you almost feel pity for them when it really
|
||
hasn't improved their security, after several attempts.
|
||
|
||
Ok, let's stop it here and see what types of system managers there are out
|
||
there on those nets...
|
||
|
||
|
||
* "The Toughie"
|
||
Hehe, this is a real baddie. He'll do anything to kick you off the system.
|
||
It's been cases when he has kicked out the wrong users.. (how we laughed!)
|
||
And other times when he kicks you off and off, but you always manage to
|
||
come back. You can't "trust" this guy, he'll feed you to the lions as soon
|
||
as he gets your ass booked. You'll probably face 3 extra years in jail if
|
||
this person is the attorney in your trial.
|
||
|
||
* "The Blind Man"
|
||
This is the, without doubts, the most common system manager. You can use
|
||
all the computers on his whole net without him noticing... and matching
|
||
passwords in 20 background jobs? No problem, just execute them and logout!
|
||
Login again, and have your 20 result files served to you on a silver
|
||
plate. And the poor bastard will never know they even existed.
|
||
|
||
* "The Smartass"
|
||
He can easily be mistaken for "The Blind Man", but you can try to find it
|
||
out by uploading some real scary-ass files about you're going to ruin
|
||
their whole fucking network, and keep it in you own directory, only
|
||
readable for your user. If you're kicked off the system short after that,
|
||
it wasn't "The Blind Man", it was this guy. But don't fool yourself...
|
||
even if you have a detailed file on how you're going to d-d-destroy their
|
||
system, and you still don't get kicked out... He might take the chance of
|
||
risking to restore the system, just to have your ass where he wants it.
|
||
(In court...)
|
||
|
||
* "Mr Panic"
|
||
Hey, this guy is quite familiar too. He's the one who tells the media,
|
||
the military, the local computer squad, the cops.. everything he can think
|
||
of, just as soon as he detects you. He don't risk ANYTHING... He's
|
||
possessed with the manic thought that HE let a 11 year old HACKER into HIS
|
||
system!! (his safe, safe, hypersafe system!)
|
||
Nooo.. it will never happen!! HAHA... Poor man...
|
||
The "Mr Panic" reaction is also usual when the system authorities is a
|
||
quite big group of people... they usually come to the conclusion that
|
||
WE WANT A CLEAN SYSTEM! haha... well they can give it a try atleast.
|
||
This "Mr Panic" person seem to be quite rare in the other countries than
|
||
Sweden, but There he/they are very common.
|
||
|
||
Ok, now you should have a quite bright picture of what kind of system
|
||
managers you might find out there... A very rare, almost diseased kind of
|
||
system manager is though "Mr Nice Guy"... The only sysmgr you can trust
|
||
really. What happens when he discovers you on his system is that he watches
|
||
you for a while, and when he notice you're a "nice" kind hacker (well you
|
||
are nice, aren't you?!! :) ). He'll either try to talk to you or just email
|
||
you if that doesn't succeed. He will not try to get your ass in jail, just
|
||
know what you were up to on his system. If you get him to "like" you (if
|
||
now a sysmgr can like a hacker) you might even be given an account, to use
|
||
for "friendly" activity (i.e. no matching jobs, only programming/storage for
|
||
example...). But the chance that you will find a sysmgr like this is about
|
||
1 to 2000 I'd guess...
|
||
|
||
No goddamn it... read this fourth protocol from us in S.H.A. Special
|
||
greetings to S. K.; you're a nice guy deep inside, we know it, just try to
|
||
show it Once atleast.
|
||
|
||
Signing off in early 1992,
|
||
|
||
Anonymous user
|
||
|
||
|
||
--> Written by a anonymous member who do not want to be busted
|
||
|
||
Yeah! Another year! Another hacking season! What can I say? It has been
|
||
a great year for all of us (almost anyway). So, what have happend under
|
||
1991? Well, alot of things that will be covered in this file, but for me
|
||
personally, I just have had some problems with the Telecom who thinks that
|
||
I ought to pay them $10.000 for phonecalls. Well, I think they can forgett
|
||
that. Which (normal?) person would call for that amount under a period of
|
||
three months? Well, I hope it get to court and then they will loose since
|
||
they judge will see how impossible it is, I mean, I would have to be
|
||
connected many hours every day to the States to reach that amount. Well, I
|
||
don't complain since I havn't been busted yet, but who knows. Ohh.. just
|
||
one more thing.. Greetings to all hackers and specially those in S.H.A.
|
||
Have fun and take it easy. It is a dangerous world we are living in.
|
||
|
||
|
||
|
||
---------------------------
|
||
- Inside story from Court -
|
||
---------------------------
|
||
|
||
One of our members have stand trial in a carding case. This guy was BRUTALY
|
||
busted in October 1990 when he was about to lay his hands on computer
|
||
equipment worth over $50000. The police raided the place, cuffed him and
|
||
threw him into a car and drove straight into the Police HQ in Stockholm,
|
||
where he spent 46 hours in an isolated cell. He wasn't even allowed to make
|
||
any phonecalls. That's brutal. (and probably against the law).
|
||
|
||
While he was doing nothing in his cell, the police searched his house twice.
|
||
Imagine his room before and after a search by the Federal Police. Right.
|
||
Not a single thing was left. Everything was taken as 'evidence' in one way
|
||
or another. After several interrogations with both the Federal Police and
|
||
the Swedish Special Branch (Sweden's Secret Service) he was released.
|
||
|
||
He was busted the 23rd of October 1990, and was released from federal
|
||
custody the 25th of October 1990. Over a year has gone, without really
|
||
knowing IF, or WHEN the trial would be held. Jail or not?
|
||
It's trial of your mental health.
|
||
|
||
It took the swedish police 1 year and 2 months to clear the mess up, and
|
||
our member was fully cooperating with them. The magic date was set to the
|
||
8th of January 1992. The trial. He was prosecuted for:
|
||
|
||
Felony creditcard fraud, $100.000
|
||
Forgery.
|
||
Illegal possesion of guns.
|
||
|
||
Sitting inside that courtroom with 2 attorneys, an idiot as prosecutor,
|
||
and a couple of lawyers wasn't as fun as he thought it would be.
|
||
What's worse then a non understanding prosecutor that just want to nail
|
||
you as hard as he can, and can't realize the facts. But he was a straight
|
||
businessman. The attorneys and he made a deal, and the SHA member got away
|
||
with a 2 year conditional sentence, and a $600 fine.
|
||
|
||
We in S.H.A. has released a detailed textfile about the bust. Get a copy
|
||
if you want to read more about it. It's VERY detailed. It even includes what
|
||
he had for breakfast in his cell..
|
||
|
||
|
||
|
||
--------------------
|
||
- New S.H.A. board -
|
||
--------------------
|
||
|
||
A new S.H.A. board has opened in Sweden with the name Project Athena at
|
||
number +46-8-LEGEND (Sorry: No phone numbers listed in public version.)
|
||
|
||
Inquires about the new board can be addressed to us through our mail
|
||
address listed later in this file under "How to contact S.H.A.". Be sure to
|
||
include a return address and board number where we can reach you or your
|
||
voice number.
|
||
|
||
Government agencies are also welcome to request access to our boards
|
||
worldwide, and will receive access after complete checking from our side.
|
||
|
||
|
||
Our current Headsites and distribution sites are as follow:
|
||
|
||
Project Athena S.H.A. World Headsite (+46) ########
|
||
Interpol II S.H.A. World Headsite (+46) NEW-NUMBER
|
||
|
||
(No phonenumbers are published in the public edition)
|
||
|
||
Note: Interpol II has changed phonenumber due to much publicity
|
||
from the police and the Special Branch.
|
||
|
||
|
||
|
||
---------------------------------
|
||
- Royal Institute Of Technology -
|
||
---------------------------------
|
||
|
||
One quiet evening in early May 1991, some persons were sitting peacefully in
|
||
a terminal-room at the Royal Institute of Technology. Suddenly the door was
|
||
kicked in and 8 cops and 2 system operators rushed in. Charges for
|
||
trespassing and illegal attempts/access to a computer system was pressed
|
||
against them.
|
||
|
||
The police is still investigating this case, and therefor we can't give
|
||
you any nasty details about what happend and why they were charged.
|
||
But a story that have circulated in some major newspapers in sweden is:
|
||
|
||
"A night in May, 5 hackers were busted when they physically visited a
|
||
terminal room at the Royal Institute of Technology (Numerical Analysis
|
||
Department). The youngsters were not students of the University, but they
|
||
used the terminals to enter other computer systems/networks all around
|
||
the globe."
|
||
|
||
That is the OFFICIAL story that circulates in the press, and does not
|
||
neccecary mean that it is really what happend. All of the arrested persons
|
||
denies that they did any illegal that evening in the room.
|
||
|
||
A more detailed report about what happend will be released after an
|
||
eventually trial.
|
||
|
||
|
||
|
||
-------------------------
|
||
- S.H.A. Member busted -
|
||
-------------------------
|
||
|
||
I suddenly woke up one morning by the noise of my doorbell. Riing, Riing.
|
||
Who the fuck can it be 09:00 AM? I didn't expect anyone. I tripped on my
|
||
toes towards the door. Riiing, Riing. I looked out through the "door eye".
|
||
Outside my door were three men standing. NO friends of mine. I don't think
|
||
they wanted to sell a vacuum cleaner to me. Almost panic. What were THEY
|
||
doing here? Where they cops? Had they traced my phonecall last night or
|
||
WHAT? I didn't have the time to think about that now. Act fast, or they
|
||
will probably kick my door in.
|
||
|
||
I got dressed very quickly. Then I threw some clothes in a bag and grabbed
|
||
my laptop computer on the way to the balcony. I closed the balcony door and
|
||
tied it hard with a piece of rope to keep it closed, while I was away. Then
|
||
I looked down. Jesus, would I still be alive if I jumped? Well, just one
|
||
way to find out. I quickly threw the bag out and then I took the laptop on
|
||
my back and jumped. I landed on my knees over my laptop. Any broken bones?
|
||
No. Great! Got up and ran away.
|
||
|
||
Later that evening I decided to go back home. First I had to hide the laptop
|
||
if the police still would be there, so I had a friend to look after it. When
|
||
I got home, I had prepaired myself to find my apartment upside down. Raided
|
||
by some idiots from the police. I opened the door, and what did I see?
|
||
None had been inside it since I left it. Strange. (well, not really, we are
|
||
dealing with the SWEDISH police..). Well, so far, so good. I fell asleep.
|
||
It had been a hard and exciting day.
|
||
|
||
08.00 AM, next morning:
|
||
|
||
Riing. Riing. The doorbell. SHIT! Rushed up from the bed and looked out
|
||
through the "door eye" just to find my three friends from yesterday standing
|
||
there again. Well, I quickly got dressed. Should I escape, or should I let
|
||
them examine the apartment? They would do it sooner or later anyway. I can't
|
||
hide forever. This time I was prepared. After a couple of second I decided
|
||
to open the door.
|
||
|
||
The three men outside showed me their Police ID's and one of them asked me;
|
||
"Do you mind if we come in and speak with you". What could I say?
|
||
"Ok, let's sit down and talk in my living room. Can I take a shower first?".
|
||
Sure they said. So I went into my bedroom and switched my computer off.
|
||
Then I went into the bathroom to take a shower and clean myself up.
|
||
|
||
When I got back, they where in my bedroom and had turned my computer on.
|
||
Just to be greeted with;
|
||
|
||
SECURITY SYSTEM
|
||
|
||
Please login:
|
||
|
||
HA! If they managed to hack THAT, I would recommend them for the Nobel Prize
|
||
of password guessing. Ofcourse they asked me to login. "Sure, can you look
|
||
away while I enter the password?", I said. "No", they said, so I stepped
|
||
back and told them "Well, login yourself then...". They looked puzzled.
|
||
"Why not tell us the password? You can easily change it later.". Did they
|
||
think I was born yesterday? If I told them the password, what would keep
|
||
them from taking my computer and have full access to it? So, I just
|
||
repeated myself and told them to login. They got angry and switched off the
|
||
system, and started to tear the equipment apart. SUCKERS! They didn't know
|
||
how to handle this kind of stuff. "Carefully!!" I said (delicate equipment).
|
||
They didn't listen. I even offered me to carry the stuff to the car. They
|
||
just told me to stay away. They brought me for interrogation that morning.
|
||
|
||
After I had spent some hours at the swedish police HQ, a guy come and asked;
|
||
"Have you changed your mind? Would you like to login to the computer now?"
|
||
"Nope. I won't. I think you were very rude some hours ago".
|
||
|
||
Apparently they hadn't managed to force the security system. This was good
|
||
news. I called an attorney which showed up and the whole thing was over
|
||
after some minutes.
|
||
|
||
I was 'released' at lunchtime. Time to make some important calls to avoid a
|
||
dissaster. (Well, it was a kind of a disaster already, but the damage could
|
||
be limited)
|
||
|
||
|
||
Ed's note:
|
||
Later on, we have found out that the University is a real chicken. One
|
||
month after the five hackers were busted at the Royal Institute of
|
||
Technology, they installed Kerberos (security package) on their Unix
|
||
machines. The day after that, they let the police bust this person. I
|
||
guess the university think they have secure machines at the moment, and
|
||
we'll let 'em think so for a while, until we have decided what to do with
|
||
their network. Wipe it or not. (S.H.A. opinium and not nessecary mine)
|
||
/ Ed
|
||
|
||
|
||
Conclusion:
|
||
At this moment, we reccomend everyone to install atleast some kind of
|
||
security system. S.H.A. is currently developing new software that will
|
||
guaranteed keep the cops out of your computer system.
|
||
|
||
|
||
|
||
--------------------------------------------
|
||
- Operation Sun-Devil, by Knight Lightning -
|
||
--------------------------------------------
|
||
|
||
On May 7-8, 1990, the United States Secret Service executed its response to
|
||
an investigation that had been two years in the making. It was Operation
|
||
Sun-Devil and it was designed to take out computer hackers and
|
||
telecommunications hobbyists across the United States, whether by raided
|
||
them directly or scaring them by raiding others. The Secret Service claimed
|
||
that they were going after criminals, and perhaps they were. Now almost two
|
||
years later, there have been very few criminal indictments brought, despite
|
||
the raids of 27 homes in 13 cities:
|
||
|
||
Chicago, IL
|
||
Cincinnati, OH
|
||
Detroit, MI
|
||
Los Angeles, CA
|
||
Miami, FL
|
||
Newark, NJ
|
||
New York City, NY
|
||
Phoenix, AZ
|
||
Pittsburgh,.PA
|
||
Plano, TX
|
||
Richmond, VA
|
||
San Diego, CA
|
||
San Jose, CA
|
||
|
||
There were a few prosecutions of Sun-Devil defendants made in the State of
|
||
Arizona by state officials and there was a prosecution in Pittsburgh, also
|
||
by state officials. The first United States government conviction took
|
||
place this past week in San Diego, CA. The offense -- possession of 15 or
|
||
more calling card numbers, a violation of United States Code, Title 18,
|
||
Section 1029.
|
||
|
||
A few months ago, a civil liberties group here in the United States called
|
||
Computer Professionals for Social Responsibility (CPSR) filed a request with
|
||
the government for information about Operation Sun-Devil under the Freedom
|
||
of Information Act (FOIA). The government's response has raised new
|
||
questions about the scope and conduct of the Sun Devil investigation.
|
||
|
||
The documents disclosed to CPSR reveal that the Secret Service monitored
|
||
communications sent across the Internet. The materials released through the
|
||
FOIA include copies of many electronic newsletters, digests, and Usenet
|
||
groups including:
|
||
|
||
comp.org.eff.talk
|
||
comp.sys.att
|
||
Computer Underground Digest (alt.society.cu-digest)
|
||
Effector Online
|
||
Legion of Doom Technical Journals
|
||
Phrack Newsletter
|
||
Telecom Digest (comp.dcom.telecom)
|
||
|
||
Currently, there is no clear policy for the monitoring of network
|
||
communications by law enforcement agents. A 1982 memorandum prepared for
|
||
the FBI by the Department of Justice indicated that the FBI would consider
|
||
monitoring on a case by case basis. That document was released as a result
|
||
of a separate CPSR lawsuit against the FBI.
|
||
|
||
Additionally, CPSR has found papers that show Bell Labs in New Jersey passed
|
||
copies of Telecom Digest to the Secret Service.
|
||
|
||
The material (approximately 2500 pages) also suggests that the Secret
|
||
Service's seizure of computer bulletin boards and other systems during
|
||
Operation Sun Devil may have violated the Electronic Communications Privacy
|
||
Act of 1986 and the Privacy Protection Act of 1980.
|
||
|
||
Two sets of logs from a computer bulletin board in Virginia show that the
|
||
Secret Service obtained messages in the Spring of 1989 by use of the system
|
||
administrator's account. It is unclear how the Secret Service obtained
|
||
system administrator access. It is possible that the Secret Service
|
||
accessed this system without authorization. The more likely explanation is
|
||
that the agency obtained the cooperation of the system administrator.
|
||
Another possibility is that this may have been a bulletin board set up by
|
||
the Secret Service for a sting operation. Such a bulletin board was
|
||
established for an undercover investigation involving pedophiles.
|
||
|
||
The documents we received also include references to the video taping of
|
||
SummerCon, a computer hackers conference that took place in St. Louis in
|
||
1988. The Secret Service employed an informant who posed as a hacker to
|
||
attend the conference and placed hidden cameras to tape the participants.
|
||
The documents also show that the Secret Service established a computer
|
||
database to keep track of suspected computer hackers. This database
|
||
contains records of names, aliases, addresses, phone numbers, known
|
||
associates, a list of activities, and various articles associated with each
|
||
individual.
|
||
|
||
CPSR is continuing its efforts to obtain government documentation concerning
|
||
computer crime investigations conducted by the Secret Service.
|
||
These efforts include the litigation of several FOIA lawsuits and attempts
|
||
to locate individuals targeted by federal agencies in the course of such
|
||
investigations.
|
||
|
||
|
||
|
||
|
||
------------------------------
|
||
- Cray II Attacked by S.H.A. -
|
||
------------------------------
|
||
|
||
In February 1991 the S.H.A. gained access to a Cray II connected to a
|
||
NASA network through a major security flaw.
|
||
|
||
- Since we hacked a rather closed network, there were no problems to gain
|
||
access to the supercomputers. We found some interesting info on the Crays,
|
||
(well, rather it's front-ends) but we had most benefits of its processor
|
||
speed. Some weeks later they discovered the hack, and closed down the
|
||
shop. The supercomputer was re-hacked in Novermber/December 1991, and at
|
||
this time we have installed backdoors for future use.
|
||
|
||
Unfortunately as with all of this information, we can't give you any
|
||
details. If we did that, it would be used against us in court. But if
|
||
you thinks it's interesting, take contact with us at Project Athena, or
|
||
at any other board. You can even find us at IRC. (which is monitored to
|
||
the limit..)
|
||
|
||
|
||
|
||
------------------------------------------------------
|
||
- Milnet and Government computers attacked by S.H.A. -
|
||
------------------------------------------------------
|
||
|
||
Many computers on the DDN (milnet) have been visited by members from S.H.A.
|
||
|
||
No details about the attacks made by members of S.H.A. are discussed in
|
||
the public version of this 4th Annual Protocol.
|
||
|
||
- Among the computers that where successfully penetrated, we can mention
|
||
one computer belonging to US Navy in Italy. Since the lack of security
|
||
we could easily gain root access to a Laboratory computer with
|
||
research material and other US Military stuff. The computer where also
|
||
trusted to other computers, so we could easily go further from there.
|
||
Even since the system lacked some real security it where no "fire wall"
|
||
as we first thought when we struck the computer.
|
||
|
||
|
||
S.H.A. also gained access to an Aerospace research network with a dozen
|
||
of trusted computers connected. Also connected to the research network was
|
||
three supercomputers in the CRAY series.
|
||
|
||
- We got almost 90% of all accounts on this network. It almost seemed to
|
||
be public stuff, even if they did some research for US Air Force. It where
|
||
no classified research, as far as we could tell.
|
||
|
||
|
||
One of the worst security vulnerabilities I have ever seen in my whole
|
||
hacker career was found at a US Navy Network. We could easily, without any
|
||
trouble, gain access to several dozens of US Navy military computers
|
||
stationed at places such as Norfolk, San Diego, Jacksonville, Washington,
|
||
Pensacola, Cherry Point, Alameda, Pearl Harbor, Italy, Japan, Spain,
|
||
Phillipines, Guam. Rather interesting information was found on these
|
||
computers.
|
||
|
||
A VAX/VMS network at the Argonne National Laboratory isn't more secure then
|
||
my refridgerator. SYSTEM access could be hacked within seconds.
|
||
|
||
The same goes for the Defence Logistic Agency in the US. Shame on you.
|
||
|
||
|
||
Totaly eightyfour US Goverment computers on eleven networks where
|
||
successfully penetrated by members of S.H.A. and root access where gained
|
||
to a dozen of them in the year of 1991.
|
||
|
||
|
||
|
||
-----------------------------------
|
||
- Guidelines for System Operators -
|
||
-----------------------------------
|
||
|
||
It was after I came in contact with a system operator at Uppsala University,
|
||
that I got totaly hysteric. How stupid could one get?
|
||
|
||
Let's take it from the beginning..
|
||
We, a couple of hackers, used the university's machines. The operators
|
||
didn't even notice us when we were active. One night we contacted the
|
||
operator that was currently logged in, and told him what we were up to.
|
||
He didn't like our existens, and tried to threw us out. Ofcourse he didn't
|
||
manage that. (Even due to the fact that they deactivated nearly every damn
|
||
account at the Computer Science Department). A week later, one of the places
|
||
we routed our Internet traffic through was disconnected from the network.
|
||
Tragic but not a disaster.
|
||
|
||
Why do we tell you this bullshit? Well. First of all. WE DON'T like this
|
||
system operator's attitude. Instead of asking us how we got into their net,
|
||
(and will always do), he threw us out, as if we where some kind of morons
|
||
that would destroy everything we touched.
|
||
|
||
THIS is the problem out there. System Operators trying to throw out the
|
||
hackers and starts sceaming after the FBI as soon they see any mysterious
|
||
activity in the log files. He MUST have realised that we would be back after
|
||
some minutes.. but why did he do that?
|
||
|
||
You better ask him yourself: bjorn@oslo.docs.uu.se
|
||
|
||
|
||
Some guidelines for system operators:
|
||
|
||
- Do not scream after the police when you have discovered a hacker in
|
||
your system. (unless you see him destroy information)
|
||
Most hackers are friendly creatures which will move to another system
|
||
when you have noticed them that YOU know what they are up to.
|
||
If the hackers won't move from the system, threats don't lead anywhere.
|
||
(most hackers are able to wipe your whole network if he whished to, and
|
||
will do if you starts to threathen him with the FBI and so on.)
|
||
Insted we suggest you make a deal with them. Offer them a legal account
|
||
on the system. In return you want them to fix all security bugs etc.
|
||
and leave a report to you.
|
||
|
||
The FSF project at MIT is an excellent example. They had guest accounts
|
||
on their machines, and was overloaded with hackers from all over the
|
||
world. A lot of hackers, including S.H.A. had root access on their
|
||
machines. Did they go down? Nope. why?
|
||
If you can get root access on a machine, you often has experience, and
|
||
realises that damaging the system won't do any good. It's just a waste
|
||
of time. Almost everything will be re-installed with backups etc.
|
||
MIT was aware of the high percent hackers on their machines, but didn't
|
||
want to argue. Maybe they realise what the whole thing is about.
|
||
|
||
|
||
- Don't play the role as god. You will ALWAYS be an easy target.
|
||
|
||
|
||
|
||
---------------------------------
|
||
- FSF/MIT Closing down the shop -
|
||
---------------------------------
|
||
|
||
One day in April 1991 the Massachusetts Institute of Technology got visited
|
||
by some guys from the FBI. The guest accounts at the FSF machines had been
|
||
used for over a year to break into computers worldwide, and especially
|
||
systems linked to the MILNet (DDN). Another day in the same month, same
|
||
year, the guest accounts at the FSF machines had been removed. The official
|
||
explanation was that the drives were the guest accounts were stored had
|
||
crashed.
|
||
|
||
The year before, in 1990, a letter was sent between the system operators:
|
||
|
||
-----------------------------------------------------------------------------
|
||
From: tower@ai.mit.edu (Leonard H. Tower Jr.)
|
||
Date: Thu, 30 Aug 90 18:06:26 EDT
|
||
To: rms, gjs, hal, bob
|
||
Subject: MIT is getting concerned about crackers on the FSF machines
|
||
|
||
|
||
(I'll leave it to one of you to decide what to tell our programmers
|
||
and employees about all this. I see no reason to start a lot of
|
||
not very productive discussion on fsf-hq.)
|
||
|
||
Jeff Schiller (bob: Jeff works for MIT's Network group and is well
|
||
connected) just called me to discuss the crackers on the FSF machines
|
||
using the password-less guest account and the rms/rms account.
|
||
|
||
He and Jim Bruce (bob: he's ~VP for computing at MIT) are having a
|
||
meeting with the FBI at 6pm today. The FBI is involved because the
|
||
crackers are `attacking' MILnet hosts.
|
||
|
||
I told jis that that's really MILNET's problem, and they might
|
||
consider finally turning the mailbridges on for real.
|
||
|
||
I told jis that most of the guest users were using the FSF machines
|
||
for useful activities and not cracking.
|
||
|
||
I advised jis that FSF was monitoring the activity and reasoning with
|
||
crackers as FSF found them. (Not having talked with rms or cutter
|
||
lately, I don't know how successful that's been. But it appears there
|
||
are still more crackers needing conversion.)
|
||
|
||
He was sympathetic to rms' feeling about guest accounts and letting
|
||
FSF use it machines as it wishes, but was also concerned about MIT
|
||
position and response on this.
|
||
|
||
He mentioned that disconnecting FSF from the Internet was not yet
|
||
being considered. (Translation of jis-speak: `MIT' might have to
|
||
disconnect FSF to solve this problem).
|
||
|
||
He mentioned that the FBI wanted to monitor the incoming calls to
|
||
terminus, but that wasn't feasible with the way that MIT connected
|
||
with NE Telephone. He also mentioned that this interface could be
|
||
changed to make such monitoring possible.
|
||
|
||
I suggested he talk further with rms and gjs about it.
|
||
|
||
I'm available for consultation or a board meeting. Call home ###-####
|
||
and work ###-####, my schedule is weird.
|
||
|
||
Providing access to randoms is peripheral to FSF's goals. I'm not
|
||
sure how much time and effort we should expend on this. Perhaps we
|
||
should provide a guest machine that doesn't allow outgoing network
|
||
service with the exception of mail and ftp (not trivial to do).
|
||
|
||
-len
|
||
-----------------------------------------------------------------------------
|
||
|
||
|
||
The FBI was already involved in this affair in August 1990, and the result
|
||
was that MIT had to throw out all guests from the FSF machines and blamed
|
||
the action on "the drives has crashed".
|
||
|
||
Crashed? Hardly.. Some months later, in the fall 1991 we could read about
|
||
some dutch hackers that had hacked several military installations including
|
||
some Pentagon systems. I know there were alot of dutch hackers at the FSF-
|
||
machines. Take a look at this article:
|
||
|
||
|
||
"(IDG NEWS) Dutch hackers broke into Pentagons computer system at atleast
|
||
34 occations during April and May this year (1991). At some occations the
|
||
dutch hackers changed and copied data, related to military operations in
|
||
the Gulf War. This was confirmed by Jack Brock at the General Accounting
|
||
Office (GAO) during a hering in the senate last week. (sometime in the fall
|
||
1991). The dutch hackers managed to get access to some sensitive information
|
||
concerning troop movements, technical data about certain weaponsystems,
|
||
according to what the GAO chief stated under the hering. The hackers broke
|
||
into Pentagons computer system via the international INTERNET network."
|
||
|
||
|
||
Was it because FSFs machines had been used to hack Pentagon that FBI closed
|
||
them down? MIT & FBI had alot of hackers under control on those machines.
|
||
Closing down the guest machines resulted in that hackers routed their
|
||
traffic thru other systems. And FBI lost control of them.
|
||
|
||
|
||
|
||
-------------------------
|
||
- Short World Wide news -
|
||
-------------------------
|
||
|
||
Worldwide news. Where to start? We could mention the little bastard
|
||
in Israel who claims he has hacked the Pentagon. True or not?
|
||
Pentagon hasn't confirmed it, but we believe he has done it.
|
||
The Israelian newspaper Yedhiot Ahronot told the world that this guy
|
||
had hacked pentagon and some US Army hosts in the US. He had been able
|
||
to read top secret information about the Patriot missile during the war,
|
||
It's not sure if the 18 year old student will be prosecuted.
|
||
|
||
|
||
Two israelian professors has released a Cryptanalysis of the Full 16-round
|
||
DES. Very interesting reading. Now NSA can flush themselves down the toilet.
|
||
The document is referred as Technical Report #708 at Technion in Israel.
|
||
|
||
|
||
Two dutch hackers has been busted. (THAT's something. The law in the
|
||
Netherlands does not forbid hacking. You can only be prosecuted if you have
|
||
destroyed anything in the system you have hacked.). These guys were
|
||
prosecuted because they tried to cover their tracks by modify the
|
||
systemlogs. If they hadn't messed up with the logs, they hadn't been busted.
|
||
(That's from what I've heard)
|
||
|
||
|
||
Some hackers in the United Kingdom (UK) has been busted. The english police
|
||
had recorded all DATA and VOICE traffic from/to the hacker's residence. All
|
||
material will be used as evidence in a trial. Tough luck..
|
||
More info on this comming up during the year in releases from the S.H.A.
|
||
|
||
|
||
|
||
|
||
---------------
|
||
- Blue Boxing -
|
||
---------------
|
||
|
||
Blue Boxing has finaly reached Sweden this summer. It all started with
|
||
a Blue Boxing program for the Amiga where released, that gave every computer
|
||
geek the oppertunity to Blue Box. There are even losers who dosen't have
|
||
a modem, that are Blue Boxing to other countries through toll-free numbers
|
||
and back to Sweden for free long distance calls. They don't even know how
|
||
Blue Boxing works, or why?
|
||
|
||
Hopefully, the Swedish Telecom will start to investigate these frauds,
|
||
and it will result in a new dimension in computer busts... and the geeks
|
||
will regret their stupidity when they get billed for all their calls and
|
||
when the SWAT team kicks down their door.
|
||
|
||
That is what we wish, but we thinks that the Swedish Telecom dosen't bother
|
||
since they are not loosing money on this, since their customers have to
|
||
pay for the calls. But if to many customers complain, maybe, the Swedish
|
||
Telecom might get intrerested in busting these clowns. And all this might
|
||
result in that the police dosen't have the time to investigate our little
|
||
$100.000 credit card fraud and our so called illegal entering into computer
|
||
systems world wide.
|
||
|
||
|
||
Just a little note:
|
||
|
||
Since Blue Boxing have been around in the States for about two decades,
|
||
I suggest that you don't think that the Swedish Telco are geeks...
|
||
Since they are in cooperation with AT&T and other phonecompanies
|
||
worldwide, they should know to put two and two together about this shit.
|
||
|
||
And we all know what the Swedish Telco feels about losing THEIR money,
|
||
don't we?
|
||
|
||
|
||
|
||
-----------------
|
||
- Carding today -
|
||
-----------------
|
||
|
||
Where is carding today? Is it still easy to card in Sweden? Well, let me
|
||
say this; When the first real carding case in Sweden, May 1990, where
|
||
discovered and a group of young computer geeks where busted, the press
|
||
started to write about the case and told every one how they could do it.
|
||
The press even told every one how you could get creditcards, and a S.H.A.
|
||
board was pointed out to be one of the main sources for illegal information.
|
||
The computer geeks also said that they got their information from a S.H.A.
|
||
board in the interrogation with the police. The press stated how bad
|
||
security the creditcard companys had and how easy it was to order on
|
||
someones elses creditcard. Both VISA and Mastercard went public to the press
|
||
and hold a communication and said that they would have changed their
|
||
routines within two years so it would be impossible to order on peoples
|
||
creditcards. They would change their routines for how new creditcards where
|
||
calculated and no carbon copies would be included in the billing notes.
|
||
A year ago they hadn't changed their routines and one of our members got
|
||
busted for carding for about $100.000. Today, nothing have changed and
|
||
computer clowns are still carding from USA and Europe. VISA and MasterCard
|
||
are loosing big money on this. We have many possitive indications of how
|
||
big the business for carding is here in Sweden and someone have mentioned
|
||
that computer geeks are carding for about $100.000 to $1.000.000.
|
||
And that the telecom companys are loosing something between $1.000.000 to
|
||
$10.000.000 every year on computer geeks who are using calling cards or
|
||
on phreaking. And this for Sweden only!
|
||
|
||
|
||
|
||
|
||
------------------------------------------------
|
||
- S.H.A's rules and advices for other hackers -
|
||
------------------------------------------------
|
||
|
||
This is what we think you out there should follow when breaking every
|
||
computer related law your country may or may not have...
|
||
|
||
- Never confirm or deny anything. It is up to others to prove that
|
||
you've done something.
|
||
|
||
- Never destroy or change information on systems that you have access
|
||
to. It gives you a bad reputation.
|
||
|
||
- Do not confirm names of members in your group nor the number of them,
|
||
since you shouldn't help the police in any way at all.
|
||
|
||
- Do not spread accounts to people outside your own group, and keep
|
||
such things within your group only.
|
||
|
||
- Do not install backdoors on systems you have secured, and don't abuse
|
||
systems, like using them for illegal access to other computers.
|
||
|
||
Now... back to reality. The S.H.A. does not have a policy really, concerning
|
||
how we should be doing things, nor forbid our members to do anything they
|
||
feel like. The group S.H.A. is really formed to keep up the information flow
|
||
in a higher tempo than usual in our business, and of course, you feel safer
|
||
when you got some people you can trust, ask, or supply with information.
|
||
So, there are no rules for S.H.A., we do as we like. I.e. :
|
||
|
||
- Never crash systems
|
||
[Exception: Unless the operator running it threw the cops on you, if so,
|
||
fuck it up as much as possible]
|
||
|
||
- Never trade accounts
|
||
[Exception: Unless you're getting more for your account than the other
|
||
part is.
|
||
[Exception2: There are always exceptions]]
|
||
|
||
- Never go to the press
|
||
[Exception: Unless you'll make loads of $$$ on the deal]
|
||
|
||
- Don't sell your "stolen" information
|
||
[Exception: Unless you're payed well, and will stay alive after the
|
||
next money/information exchange.
|
||
[Exception2: No risk no fun]]
|
||
|
||
- Obey given rules
|
||
[Exception: If they suck, make your own rules]
|
||
|
||
Call it computer anarchy, we call it computer freedom. The rules follow a
|
||
single red line; If you get treated nice, be nice back. If they fuck you,
|
||
put a bullet in their head.
|
||
|
||
|
||
|
||
|
||
-----------------------------------
|
||
- Demoralized Youth, by Tormentor -
|
||
-----------------------------------
|
||
|
||
Tormentor, an young anarchist causing chaos and disorder with short program
|
||
routines. One of his first viruses, called Tormentor -d, was one of the most
|
||
debated ones in the fall 1991. I've got no idea how many computers his
|
||
viruses has infected and crashed. I have no guess of how much the value of
|
||
the crashed programs is. I just know one thing - he's a pain in the ass for
|
||
most of the people, so therefor we have asked him to write for this 4th
|
||
protocol. We have asked him to write about the current virus scenario in
|
||
Sweden and about the future and about his projects.
|
||
/Ed
|
||
|
||
|
||
|
||
|
||
Demoralized Youth, by Tormentor
|
||
|
||
This the story about the virus-spreading in Sweden.
|
||
The virus spreading in Sweden have been very rare, not to say the virus
|
||
writing! There where only ONE virus written in Sweden untill the end of 1991
|
||
and that was a Boot-sector-virus which isn't too hard to make. But this has
|
||
not kept some moral-chake-spreading people to call themselves
|
||
'Virus-Researches' and building up a echo-net and start a company called
|
||
Virus-Help-Center. This was rather strange to me since I've never heard
|
||
about someone who had been 'attacked' by a virus. (NOW I have heard of a
|
||
couple..) Before the end of 1991, no Swedish BBS had to be afraid of beeing
|
||
infected by virus. Then in November, something happend..
|
||
|
||
Now to the story...
|
||
|
||
I can just tell the story from my point of view, and if someone out there in
|
||
Sweden may think:'Well wasn't I a part in this?', contact me for appologize.
|
||
|
||
Well it started in late August 1991. I was looking for virus on almost all
|
||
boards (I even asked for it on Vir_NET). Then - WOAH!
|
||
I had received mail from another guy on a Elite-board! And he had virus..
|
||
It was the guy that would change his handle a number of times in the future,
|
||
but now he calls himself HiTMAN, and here is what the letter was saying:
|
||
|
||
'Hey, Yez, I have a couple of virus... maybe wanna exchange?'
|
||
|
||
My hands was sweating, I had meet a sympathizer! We made contact and
|
||
exchanged virus (before that I just had the 1701-virus) and it was then all
|
||
started. In the same week, I made contact with WiPER, also a Great
|
||
sympathizer. And after some week of debugging and testing, he contact me
|
||
again. Now he had found some 13-years old kid that was leeching virus from
|
||
Bulgaria, And this kid was a real virus-collector! We got about a hundred
|
||
virus from him and Puh!
|
||
This was too much. After that, WiPER started a virus-area on his board, and
|
||
the ball was rolling...
|
||
|
||
Then, a couple of weeks later, I started to write virus. But since I was
|
||
quite new on this, I didn't start from scratch. No, I modified an old virus
|
||
called 'Murphy'. When I got the first version ready, I was starting to
|
||
spread it like a maniac all over Gothenburgs PD-BBSes.
|
||
|
||
Now afterwards, I regret some misstakes I did:
|
||
|
||
* It was just Scan that didn't found it.
|
||
* It was some bugs in it ( the dates where garbled )
|
||
* AND IT DIDN'T CONTAIN ANY DESTRUCTIVE MECHANISM!!!!
|
||
|
||
I fixed it and started to spread it again. Some weeks later, HiTMAN called
|
||
me up and gave me some clips from fido_net. And the geeks where talking
|
||
about my virus!! This was not expected, and when I read it, I thougt:
|
||
'Gee, fun!' And we started to spread it like hell. And the following weeks
|
||
was a fight: They posted a scan-strain, I changed the virus to avoid that
|
||
strain and so on.
|
||
|
||
But after they released their 5th killer for The Tormentor-virus (as they
|
||
called it) I got tired (or in fact: There was to much scanstrains
|
||
circulating!) So I let the virus retire with, according to Virus Help
|
||
Center, 400 reported infections. (and X number of HD-Nukes?) Now I study
|
||
other viruses, and tries to write own from scratch. But it's hard, specially
|
||
when there are so much good techniques already used (Dark Avenger is one of
|
||
the lead-inventors!)
|
||
|
||
The virusboards.
|
||
|
||
Yes, what's the scene in Sweden for the moment? Well, WiPERS virusboard is
|
||
down, but a couple of other is started. WiPER was the first, but I have
|
||
heard about a S.H.A site that had a virusarea before him. (but not public!)
|
||
Then I think iNNER CiRCLE was next to start a board, and after that
|
||
'The Smell of Fear' and 'The Home of The Pirates' started virus-conferances.
|
||
But even if there is a couple of virusboards in Sweden, the activity is not
|
||
so huge, or, we are just too few that working on it. So I hope that will
|
||
change, it's a scary thought that we are so few destructive minds in Sweden.
|
||
We also have contacts with several other VirBoards abroad in Bulgaria,
|
||
Finland, England and USA to name a few. We also have contact with virus
|
||
writers abroad (Like Charlie in Norway). And if you wanna join us, contact
|
||
any virboard in Sweden.
|
||
|
||
The Future.
|
||
|
||
Well for the moment I have many projects on. I've working on an own virus
|
||
that puts the virus-code in the middle of files (thanx DAv for the tip!) and
|
||
I'm working very hard to make Self-mutating virus. And WiPER and HiTMAN is
|
||
also working on own viruses (and who knows if there are other maniacs
|
||
working on virus in Sweden?). Now we (at least I) thinks about starting a
|
||
Virus-Network that connects all virus-writers and distributers.
|
||
Think about it: Every time one releases a virus, the whole world will be
|
||
attacked with it the same night. (That is the dream I'm dreaming every
|
||
night!) Well, I also think we will have some problems in the future, like
|
||
new laws against virus (probably only for spreading, and that will be hard
|
||
to prove!), better security on public-bbs (like phone tracing etc.) and
|
||
Hardwareprotection.
|
||
I also thinks that the virus writing will increase and maybe be as big as
|
||
the demo writing... (but that is just a wish from my sick mind!)
|
||
Then I think the viruses will be a lot more destructive, for example:
|
||
|
||
* Making small changes in data (like switching numbers)
|
||
* Calling expensive numbers while no-activity.
|
||
* Monitoring the system and saving the changes and keyboard-strokes.
|
||
* Maybe even Call up the author and transfer Data from the victim!
|
||
|
||
Also, in the future I think we are going to see the death of SCAN-programs,
|
||
not just for the increasing Scan-time, but since the Self-mutating viruses
|
||
has come to stay and they need algorithms to find them. The CRC-programs is
|
||
always a good solution, but since you have to power the system down to use
|
||
it, I don't think all will accept it.. But it's the only solution!
|
||
Well I feel quite proud when I think that we are responsible for the all the
|
||
time-wasting and uncomfortable procedures all lamers have to do, to avoid
|
||
virus (and sometimes it's not enough!).
|
||
|
||
So contact us, and join the Demoralized Youth!
|
||
|
||
Remember: It's not illegal to make virus, and who the hell can prove that
|
||
you knew that THAT file had virus?!?!?!?
|
||
|
||
Epilogue.
|
||
---------
|
||
Well, just after I finnished this text, we tried to reach Mikael Larsson on
|
||
Swedish Virus Help Center for a comment, but unfortunatly he wasn't home,
|
||
so I had to talk with his 'not-so-smart-in-fact-very-stupid' brother.
|
||
Since he also works at the AntiVirus company I thought he had something to
|
||
say about the future.. I was wrong!
|
||
But he seemed quite interrested in buying unknown viruses, the only problem
|
||
was that he rather bought them from Bulgaria since the people in Bulgaria
|
||
were so poor... (damn humanist!)
|
||
I feel really sorry for those AV-guys, they working full-time to stop the
|
||
virus writing and spreading, but if they would succeed (just a thought!),
|
||
they would lose their jobs! But we have two Anti-virus companys in Sweden,
|
||
maybe the other company is more patriotic and will buy viruses from me...?
|
||
|
||
Anyhow, now I must go on with my viruses. It has been requested a new
|
||
mutation of Pogue that Scanv86 doesn't recognize. And maybe I work on the
|
||
Trojan called Scanv87, just to be released in 2 weeks...
|
||
|
||
So that's all from me for the moment, and remember:
|
||
|
||
SCAN /D = DISASTER!
|
||
|
||
/TORMENTOR
|
||
|
||
Demoralized Youth, Sweden
|
||
|
||
|
||
|
||
-------------------------------------
|
||
- S.H.A. Official Summer Party 1991 -
|
||
-------------------------------------
|
||
|
||
A summer day in July we had a S.H.A. Barbecue party for two days.
|
||
Almost 80% of all members in S.H.A. where present. The party where held at a
|
||
secret address. The place where choosen with care, since we didn't want any
|
||
"non S.H.A." people to show up and cause any trouble.
|
||
|
||
|
||
A point of view from a S.H.A. member:
|
||
|
||
It was sunny and hot as hell, about 35 degrees Celsius. Not a bloody cloud
|
||
in the sky. And as a precaution to not pass out during my trip I decided
|
||
to put on my shorts, Levis' was out of the question.
|
||
|
||
Great... first I had stand in line for fucking half an hour to get a
|
||
train ticket, just because the ticket bitch was talking on the phone...
|
||
|
||
I guess, I don't have to mention that the place was NOT air conditioned,
|
||
nor doors or windows were open... Biggest sauna I've ever seen I tell you.
|
||
Finally arriving to the Central Station some hours later, I got picked
|
||
up in a private limousine. (Ehrm.. let's pretend it was a limousine)
|
||
The truth is that some members came to pick me up...
|
||
|
||
We drove to the secret place where the party where held, and a lot of other
|
||
persons were waiting...
|
||
|
||
Lots of Coke (Not the one you sniff), chips and food have been bought
|
||
earlier and we started to fix some drinks with big icecubes. We had to
|
||
wait for the sun to settle down, so we could step outside and fix the food.
|
||
Meanwhile we eat chips so that we didn't starve.
|
||
|
||
Later we sat down and hacked for some hour or two. Mostly we went through
|
||
all our hacks we had done so far that year.
|
||
|
||
In the middle of the night we wanted some heavy action, so we went out and
|
||
lit a big bomb in the neighbourhood. We almost got blown into pieces...
|
||
(Lixom' wanted to throw the bomb into a neighbour's livingroom. But we
|
||
didn't want to ruin the great party, or wanted to spent the rest of the
|
||
night in federal custody).
|
||
|
||
Later in the night we watched some movies (yeah even porno) until 5 am in
|
||
the morning then we started to hack again and document some of the party.
|
||
|
||
|
||
|
||
THE S.H.A. BQ TIPS (or: Survive your own cooking)
|
||
|
||
You'll need:
|
||
* A BQ device
|
||
* One piece of animal flesh per person
|
||
* Lotsa BQ spices, and BQ oil
|
||
|
||
First you must put some nice pieces of wooden coal into the BQ device,
|
||
pour lightning-fluid all over it, wait some seconds, and then set
|
||
fire to it (taking cover is optional). Soon you'll have the best glowing
|
||
coal you've ever seen in your grill.
|
||
|
||
Now, just take the steak, and flatten it with something. Perhaps with
|
||
the back of a knife or just your fist.
|
||
|
||
Then put on all spices, and the oil (lots of oil...) and you,
|
||
remember; spice and oil _both_ sides of the steak.
|
||
|
||
When the meat now is on the edge from brown, turning black, take a
|
||
knife and cut through it, if it's bloody or too red, let it stay in
|
||
the grill for some more minutes.
|
||
|
||
Now, if the steak seems good enough to eat, eat it. Serve with
|
||
cremated fries, "potatoe sallad" and not to forget, a Tomatoe.
|
||
|
||
Now drink Coke with ice cubes swimming around in your glass.
|
||
AND! most important; Eat outdoors!! Why? There's no mosquitos in the
|
||
house.
|
||
|
||
|
||
|
||
-------------------------------------
|
||
- Prof of S.H.A. Hacking Activities -
|
||
-------------------------------------
|
||
|
||
|
||
Maybe you think we are just making the whole thing up?
|
||
We will give you some examples of our activities:
|
||
|
||
|
||
This /etc/motd was found on a NASA computer we hacked in August 1991.
|
||
Unfortunately they discovered our little breakin' and tightend security, but
|
||
we re-hacked the computer and could read the following;
|
||
|
||
|
||
COMPUTER SECURITY WARNING NOTICE
|
||
WARNING WARNING WARNING
|
||
*****************************************************************************
|
||
THIS COMPUTER IS OPERATED BY/FOR THE U.S. GOVERNMENT. UNAUTHORIZED ACCESS TO
|
||
AND/OR USE OF THIS COMPUTER SYSTEM IS A VIOLATION OF LAW AND PUNISHABLE UNDER
|
||
THE PROVISIONS OF 18 USC 1029, 18 USC 1030, AND OTHER APPLICABLE STATUTES.
|
||
*****************************************************************************
|
||
WARNING WARNING WARNING
|
||
|
||
=============================================================================
|
||
Security Reminder: DO NOT LEAVE A TERMINAL LOGGED INTO A COMPUTER UNATTENDED!
|
||
=============================================================================
|
||
|
||
=============================================================================
|
||
Hacker Attack: NASA Security reported that a Swedish Hacker
|
||
gained access to XXXXX on 8/2. We assume all TAB passwd files
|
||
have been compromised and are taking appropriate steps.
|
||
=============================================================================
|
||
A number of hackers are still attempting to penetrate
|
||
various LaRC computers. We are taking appropriate steps.
|
||
Report any suspicious activity to sysop.
|
||
=============================================================================
|
||
|
||
So if you don't believe us. Call NASA Security and ask what happend at
|
||
NASA Langley Research Center at the 2nd of August 1991.
|
||
(By the way. Ask them what happend in March at the AMES/NAS supercomputer
|
||
network.. one of their CRAYs had some mysterious jobs running, hehe)
|
||
|
||
The Pentagon has also been successfully penetrated, but we have decided
|
||
NOT to release any information about what we have done there yet. We are
|
||
not finished with the system. Hopefully you can read more about it, in
|
||
a release in June 1992. (If not Pentagon confirms it before, or the
|
||
newspapers starts to write about it..)
|
||
|
||
|
||
|
||
|
||
----------------------
|
||
- S.H.A. Body Guards -
|
||
----------------------
|
||
|
||
It was an ordinary summerday in July 1991. I was driving home from work as
|
||
I always do. I parked my car just outside the stairway leading to my
|
||
apartment at the 1st floor. I carried up some computer equipment to my flat,
|
||
left it there, and went back to my car to park it propertly.
|
||
When I reached the car, I suddenly saw two men comming out from MY stairway.
|
||
THEY behaved strange. Well, I jumped into the car, and drove 30 metres along
|
||
the street to my parking-lot. I turned right, parked it, and went out from
|
||
the car. Now, the two men who was sitting in their car by this time, turned
|
||
their heads and stared at me as if I was some kind of alien. huh. I didn't
|
||
like this situation.
|
||
|
||
They seemed to be surprised that I had parked my car and was walking towards
|
||
my apartment again. I grabbed a pen and a piece of paper and took a note of
|
||
their licence plate. Might become useful sometime. (which turned out to be
|
||
right). I was totaly puzzled. 2 men comming out from MY stairway. I hadn't
|
||
seen these guys before (age 35-40). I hadn't even heard them comming from
|
||
the stairs above. No door slammed - NOTHING. Where they waiting for me
|
||
there? Got even more puzzled.
|
||
|
||
Some days later I had dinner with some other members of the S.H.A. at our
|
||
usual restaurant in Stockholm. We discussed what had happend and we came to
|
||
the conclusion that 'they' maybe wanted to catch up a tail when leaving the
|
||
flat. But why? Why did they want to follow me? Or had they been inside by
|
||
apartment when I arrived?
|
||
|
||
The evening went on as usual, lots of beer and laughs. But at the end
|
||
of that night, we decided to check the licence number with the public car
|
||
register where all cars are registered. Said and done. We called;
|
||
|
||
Ring. Ring.
|
||
|
||
- Welcome to the car register, our business hours are.. bla .. bla..
|
||
|
||
Damn. An answering machine. The police. Doesn't the police have some
|
||
terminals connected to the car register 24h/day? Ofcourse. We called a local
|
||
police station.
|
||
|
||
Ring. Ring.
|
||
|
||
- Solna Police Station, answered a male voice
|
||
- Hello. I wonder if you could check a car licence number for me...
|
||
- Sure. What's the number?
|
||
- NWW 007
|
||
- Hold on. He started to tap on his keyboard, and after a while he said:
|
||
"A Ford Scorpio?"
|
||
- Yeah. A red one. (I guess he was just checking some details..)
|
||
- Why do you want to check this car?, he said.
|
||
|
||
Uhh. Why does he ask that? They never ask such questions. Better make up a
|
||
lie, fast!.
|
||
|
||
- Uhm.. I can't move my car since the owner of that car has parked it
|
||
infront of me. Did it sound believable? Hardly..
|
||
|
||
- Ok, he laughed. It's a civil car registrered to the Swedish Police Dept.
|
||
|
||
OUCH! A police car outside my apartment. 2 police men in my stairway.
|
||
Does not sound good at all. Jesus. We almost paniced that night.
|
||
Standing inside that phoneboot that evening getting this information was
|
||
horrible. They could bust us any second now.
|
||
|
||
We rushed into the car and drove away. In a bag we had several printouts
|
||
from some hacks, large passwordlist to NASA computers, a NOT-TO-BE-RELEASED
|
||
version of this 4th protocol etc. None of us could bring this stuff back
|
||
to our flats. Just one way to solve the problem;
|
||
|
||
We drove up on the interstate, pulled down the windows and began to tear
|
||
the papers into pieces and threw them out of the window. If the cops managed
|
||
to get this puzzle together, then I would turn my self in and confess.
|
||
I guess we were extremly paranoid that evening..
|
||
|
||
|
||
At the 4th of January 1992 we had one of our regular SHA dinners at "our"
|
||
restaurant in Stockholm. We discussed our latest hacks and so on.
|
||
|
||
I guess we were under surveillance that evening..
|
||
...some strange things happend.
|
||
|
||
After we had finished our little neat dinner we moved to the car, and
|
||
drove into Stockholm City were we did nothing. What we didn't knew at
|
||
that time was that a car was following us. We discovered it by pure luck.
|
||
We took a note of the licence plate, and stopped at the nearest phonebooth.
|
||
|
||
One of us jumped out, rushed to the phone and dialed a local police station.
|
||
|
||
Ring, Ring.
|
||
|
||
- Vallingby Police Station, a female voice answered.
|
||
- Hello. I want to check a car licence number.
|
||
- Ok. What's the number?
|
||
- It's MSR 769
|
||
|
||
She starts to tap on the keyboard, and suddenly she says:
|
||
|
||
- A 87'?
|
||
- Uhh. I don't really know. It's a blue Ford Sierra.
|
||
- Ahh. Could you hold on for a second.
|
||
- Sure.
|
||
|
||
She put me on hold.. I waited 30 seconds. I waited one minute. I waited
|
||
1 and 1/2 minute. I waited 2 minutes. Then I threw the phone and started
|
||
running like hell towards the car.
|
||
|
||
- SHIT! I shouted. Get out of this place. NOW!!
|
||
|
||
It was like an action movie :-). Shit. Why did she put me on hold?
|
||
She had all the information on her terminal when she asked me if it was
|
||
a 87' model. Huh. Scary.
|
||
|
||
We drove some blocks away and stopped at another phonebooth. I jumped out
|
||
and dialed another police station..
|
||
|
||
Ring. Ring.
|
||
|
||
- Solna Police Station, a male voice answered
|
||
- I want to check a car licence number, NOW! I shouted. I was excited.
|
||
- Ok. Take it easy. What's number?
|
||
- It's MSR 769.
|
||
|
||
He tapped for some seconds on his keyboard.. and finally he asks:
|
||
|
||
- A Ford Sierra?
|
||
- Yepp. A blue one.
|
||
- It's registered to the Swedish Police Department
|
||
- Thanks..
|
||
|
||
Hung up and rushed to the car. Hysteria among the other members..
|
||
|
||
Huh. The first station I called didn't want to tell me it was a policecar.
|
||
Why did she put me on hold? I guess they were tracing the call, and wanted
|
||
to catch me standing in the phonebooth. But it isn't illegal to check a car
|
||
licence plate... unless they have something to hide or fear.
|
||
|
||
|
||
|
||
What's the conclusion of all this?
|
||
|
||
a) We have a fanclub
|
||
b) We have a couple of body guards protecting us 24h / day.
|
||
c) The Swedish Police are really idiots following after us.
|
||
|
||
|
||
|
||
---------------------------
|
||
- Investigation of S.H.A. -
|
||
---------------------------
|
||
|
||
The Police are currently investigating S.H.A. and our activities.
|
||
|
||
We have very strong indications that some of us are under surveillance
|
||
24 hours/day. They are also monitoring our calls, both voice and data.
|
||
|
||
As a anonymous source said (well connected in the law enforcment);
|
||
|
||
- The Swedish police computer crime division are currently fully engaged
|
||
in tracking down a hacker group in Stockholm, Sweden.
|
||
|
||
And we have notice strange behaviour around our houses, with suspicious
|
||
cars and od behaviour of certain people.
|
||
|
||
We have also strong indications that our houses have been searched when
|
||
we have been away from home. And also some of our accounts on hacker boards
|
||
have been used by other people without our knowledge.
|
||
|
||
We might be paranoid, but all events taken together proves that we are not!
|
||
|
||
|
||
|
||
-------------
|
||
- Back Chat -
|
||
-------------
|
||
|
||
Rumours. What's life without them? A LOT BETTER!
|
||
|
||
Anyway, here are some rumours we have picked up.
|
||
|
||
Some months ago a rumor was floating around in the 'elite' world that some
|
||
Swedish 'elite-d00dz' had been busted for BlueBoxing here in Sweden.
|
||
As always with these kind of roumors, you should take 'em with a spoon of
|
||
salt. Sad but true - nothing serious has happend. (These damn 'elite-d00dz'
|
||
thinks they are phreakers. *sigh*) (Oct 1991)
|
||
|
||
Some youngsters in Lulea, Sweden got busted for carding for about $10.000.
|
||
These guys quited carding when the S.H.A. member got busted. 6 months later
|
||
the police knocked at their doors and searched their houses. This resulted
|
||
in a few prosecutions.
|
||
|
||
A couple of students from Linkoping, Sweden got charged for using a X25
|
||
NUI belonged to the Linkoping University Library. The university started an
|
||
investigation when they received their phonebill, which where $10.000 higher
|
||
than normaly. And the next one where even worse, $20.000 higher than normaly.
|
||
After they had found that some students where using their X25 accounts they
|
||
filed a complaint to the police.
|
||
|
||
A swedish sucker at the Virus Help Center has started to scream for the
|
||
police as soon he sees a new virus in Sweden. For example, he is trying to
|
||
nail Tormentor, one of our guest writers which is the author of the
|
||
Tormentor -d virus. Rumors says he has tracked down a swedish virus
|
||
programmer/spreader and called the police. (Nov/Dec 1991)
|
||
|
||
Rumors says a smaller disaster will occur when some members of S.H.A. goes
|
||
to trial for charges concerning illegal accessing a computer system.
|
||
|
||
Rumors says the FBI snatched the drives at FSF/MIT, and that they did NOT
|
||
crash as the official explanation was. (April 1991)
|
||
|
||
Rumors says Timewasters (hackergroup from Holland) penetrated a couple of
|
||
pentagon computers and installed several backdoors. (Jack Brock at the GAO
|
||
has confirmed that dutch hackers have broken into Pentagon computers.)
|
||
|
||
|
||
|
||
--------------------------------
|
||
- Messages to System Operators -
|
||
--------------------------------
|
||
|
||
To mention some swedish hacking acitivity, here goes some messages to
|
||
system operators of each system, which they will understand:
|
||
|
||
|
||
"Now is the question, Who is Marc Lundgren?" Gottcha SICS
|
||
"I'll be back - be sure of that" Gottcha Bjorn Knutson, UU
|
||
"What happend with ASEAs VAX machines? :-)" Gottcha ASEA Brown Boweri
|
||
"Please send us 'last | grep peace'" Gottcha Dimension AB
|
||
"Found our trojans?" Gottcha S-E-Bank
|
||
"We don't know how far they have come" Gottcha SMHI
|
||
"Nice phonebill, eh?" Gottcha OPIAB
|
||
"Afraid of calling the police?" Gottcha DATEMA
|
||
"Got any complaints from the DDN (milnet)?" Gottcha KTH/NADA
|
||
"Don't say we didn't warn you." Gottcha FOA
|
||
|
||
|
||
|
||
|
||
--------------
|
||
- The Future -
|
||
--------------
|
||
|
||
We hope that the Swedish police will realize that no one will gain in
|
||
the investigation of S.H.A. and only a catastrophy will occur.
|
||
They should use their resources for better cases, i.e. finding people
|
||
who commits murder or are raping young girls.
|
||
|
||
So to those guys involved in tracking us down, we would like to say:
|
||
|
||
- Up yours! Prove that we done anything illegal or stay off our back!
|
||
|
||
Anyway, we are not looking to far ahead in the future since we have too
|
||
many variables that can change. We just plan for the next week, but we
|
||
hope that 1992 will be a great year for all of you hackers out there in
|
||
the whole wide world.
|
||
|
||
|
||
|
||
-----------------
|
||
- Releases 1992 -
|
||
-----------------
|
||
|
||
We plan to release the following under 1992 and hopefully many more stuff,
|
||
even if we can not guarantee that we do release all the stuff.
|
||
|
||
- S.H.A. Annual Year Report '92.
|
||
|
||
- A complete Internet hacker/scanner program.
|
||
|
||
- A neat Unix program that will totaly hide you from system managers.
|
||
|
||
- Sourcecode for several unix backdoors.
|
||
|
||
- Security System for your personal computer.
|
||
|
||
- Textfile "VMS to Internet Encyclopedia"
|
||
(Follow up to the Unix to Internet Encyclopedia).
|
||
|
||
- Textfile "How to card and get caught" by Lixom Bah
|
||
Everything from how to card, to what happend me when I got busted, and
|
||
the consequences for you, and your whole life.
|
||
|
||
|
||
|
||
-------------------------
|
||
- How to contact S.H.A. -
|
||
-------------------------
|
||
|
||
This was all for this time. Hopefully the S.H.A. will still be alive in
|
||
February 1993 so we can release our 5th protocol. But don't count on that,
|
||
the Swedish Police is giving us a very hard time here..
|
||
|
||
We are interested in join venture with other good H/P groups so that more
|
||
proffessional articles and files can be released to a wider public.
|
||
|
||
If you feel that you want to contribute to our protocols in one way or
|
||
another, you can contact us at the following addresses and phonenumbers.
|
||
If you feel that you want to give us critic, don't hesitate to contact us..
|
||
|
||
If you want to be included in our mailing list, please state so and you will
|
||
automaticly receive all our releases.
|
||
|
||
|
||
Internet : sha@darkside.com
|
||
FidoNet : 2:201/610 username sha
|
||
V.M.B. : +46-8-730 24 02 Box #9999
|
||
|
||
|
||
Note: Federal goverments are also welcome to contact us for assistance.
|
||
We have nothing to hide from goverment agencies.
|
||
|
||
The above addresses are untraceable, so don't even bother...
|
||
|
||
|
||
|
||
----------------------
|
||
- Editors final note -
|
||
----------------------
|
||
|
||
Another year have passed and a new one is on it's way. I hope the new
|
||
year will be another good year for all of the hackers out there.
|
||
|
||
I will end this 4th protocol with some wellknown words;
|
||
|
||
BE PARANOID - YOU ARE DOING SOMETHING ILLEGAL!
|
||
|
||
|
||
I would like to thank all those people who have helped us creating this
|
||
fourth protocol which I hope you have enjoyed, and special thanks goes to:
|
||
|
||
Tormentor for "Demoralized Youth"
|
||
Knight Lightning for "Operation Sundevil"
|
||
|
||
|
||
I would also like to thank all those other guys in S.H.A. that has not
|
||
been mentioned but have contributed to this file. Thanks!
|
||
|
||
And to all you hackers out there... thank you for reading this file!
|
||
|
||
I would also like to thank the Swedish Police for their
|
||
interests in S.H.A. and for reading most of our files,
|
||
We need more dedicated fans like them. Thank YOU!
|
||
|
||
|
||
|
||
--------------
|
||
- Disclaimer -
|
||
--------------
|
||
|
||
The material in this document is NOT ment to encourage hacking, cracking
|
||
or illegal entering to computer systems. The Swedish Hackers
|
||
Association can NOT be blamed for any abuse caused by it.
|
||
The Swedish Hackers Association is formed only
|
||
to inform the public what hackers and hacking
|
||
really mean, and to report all hacking
|
||
news and events to the readers.
|
||
|
||
<---------------------------------------------------------------------------->
|
||
ALL MATERIAL IN THIS DOCUMENT ARE COPYRIGHTED (c) 1992 BY S.H.A.
|
||
USE OF THIS DOCUMENT WITHOUT S.H.A. PERMISSION IS STRICTLY PROHIBITED
|
||
UNDERGROUND BOARDS ACCEPTED BY S.H.A. ARE ALLOWED TO USE ALL S.H.A. FILES
|
||
<---------------------------------------------------------------------------->
|
||
&
|
||
.H.A. ARE ALLOWED TO USE ALL S.H.A. FILES
|
||
<---------------------------------------------------------------------------
|
||
.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
...
|
||
g |