1004 lines
46 KiB
Plaintext
1004 lines
46 KiB
Plaintext
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
= =
|
|
- WELCOME TO THE ELEVENTH ISSUE OF -
|
|
= =
|
|
- -=>PHANTASY<=- -
|
|
= =
|
|
- A PUBLICATION AND NEWSLETTER OF -
|
|
= =
|
|
- THE -
|
|
= INTERNATIONAL =
|
|
- INFORMATION -
|
|
= RETRIEVAL =
|
|
- GUILD -
|
|
= =
|
|
- Hacking,Phreaking,Anarchy,Survivalism,Commentary -
|
|
= =
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Volume Number Three,Issue Number Eleven Dated 11/06/92
|
|
Editor is Mercenary : mercenar@works.UUCP
|
|
|
|
Article Submissions: The Mercenary/IIRG
|
|
862 Farmington Avenue
|
|
Suite 306
|
|
Bristol,Ct 06010
|
|
|
|
IIRG World Headquarters BBS: Dark Shadows
|
|
19.2/9600 Baud HST
|
|
24 Hours a Day
|
|
1.2 Gigs Online
|
|
2 Nodes
|
|
(203)-628-9660
|
|
|
|
Table of Discontents:
|
|
|
|
|
|
[1] More Pump-Con Bust Info
|
|
By: Anonymous
|
|
|
|
[2] Caller ID Availability
|
|
By: Mercenary
|
|
|
|
[3] Crystal Source
|
|
By: Saint Anarchy
|
|
|
|
[4] FOR THE PEOPLE
|
|
Supplied By: Bulletin Boards Across the Country
|
|
Edited by: Mercenary
|
|
|
|
1. DIGITAL TO CLOSE TWO MANUFACTURING FACILITIES
|
|
2. FBI EAVESDROPPING PLAN DRAWS INDUSTRY FIRE
|
|
3. PUMP-CON BUST RUMORS FLY
|
|
4. RESPONSE TO PUMP-CON RUMORS
|
|
|
|
[5] The Rumor Mill (Unconfirmed rumors from the Underground)
|
|
Edited By: Mercenary
|
|
|
|
1. Ronald Pinz (Victim Or Rat Fink)
|
|
2. Berlin Busts Reported
|
|
3. WINDYCON
|
|
|
|
[6] PHANTASY TIDBITS: News and Views of Interest
|
|
|
|
1. Police Officials Cited For Searching Private Records
|
|
2. Call for Papers - The Third International Virus Conference
|
|
3. Landmark Software Decision
|
|
4. Sixth International Computer Security & Virus Conference
|
|
|
|
[7] Listing of IIRG Distribution Sites
|
|
|
|
[8] Listing of PHANTASY Distribution Sites
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
OFFICIAL DISLAIMER...
|
|
|
|
All information in PHANTASY is from USER contributed material
|
|
The Publishers and Editors of PHANTASY and THE IIRG disclaim
|
|
any liability from any damages of any type that the reader or
|
|
user of such information contained within this newsletter may encounter
|
|
from the use of said information. All files are brought to you for
|
|
entertainment purposes only! We also assume all information infringes
|
|
no copyrights and hereby disclaim any liability.
|
|
|
|
PHANTASY is (C) 1990 by The IIRG
|
|
IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [1]:
|
|
********** PUMPCON BUSTED!!! ***********
|
|
10/31/92
|
|
written by someone who was there
|
|
who wishes to remain anonymous
|
|
|
|
NOTICE: The word "Hacker" is used frequently throughout this file - it is
|
|
to be interperated as "a computer literate person", and NOT as
|
|
"someone who engages in illegal activities using a computer".
|
|
|
|
Friday, October 30, Pumpcon began, at the Courtyard of the Marriott, in
|
|
Greenburgh, NY. All in all, about 30 hackers showed up, and had a great time.
|
|
At least until the evening of Oct. 31st, when 8-10 members of the Greenburgh
|
|
police force showed up and raided the Con. At the time of the raid, there were
|
|
between 20 and 25 hackers in the hotel. 3 of the 4 rooms rented by Con
|
|
attendees were raided. All the occupants of these rooms were taken to a
|
|
conference room, and then another hotel room (255) where they were held
|
|
approximately 6-8 hours for questioning.
|
|
|
|
The police all came in unmarked police cars, and parked on all 4 sides of the
|
|
hotel. No one noticed they were there, until they were standing in the hall
|
|
where all 4 rooms were located. The officers stood in the hall outside the
|
|
doors, but did not enter the rooms right away. They waited about five
|
|
minutes, for some unknown reason, which was just enough time for them to be
|
|
noticed by the hackers in at least one of the rooms. Unfortunately, there was
|
|
no way the hackers in one room could warn the other rooms - the fone lines were
|
|
busy, and the cops in the hall kinda left the "walk down and tell 'em in
|
|
person" option out.
|
|
|
|
The police produced copies of a search warrant to search rooms 246, 233, and
|
|
237. Room 246 was the one where everyone was hanging out; it was pretty much
|
|
THE room. It was where the computers were located, and where most of the Con
|
|
attendees were 99% of the time. The other two rooms were rented by attendees
|
|
of the con, and were simply used for sleeping quarters.
|
|
|
|
Before too long, the police entered the rooms, and began rounding up people.
|
|
My recollection of this time period is a bit faint, and I don't remember all
|
|
the minute details. All I know is that we all ended up in a conference room,
|
|
and then room 255.
|
|
|
|
A few hackers who had been out driving around during the time of the bust
|
|
returned a few hours later, and when they were seen by police, they were
|
|
immediately taken to 255 and questioned. (They were walking down the
|
|
hall, when a cop appeared, and told them to step into a room) The cops asked
|
|
them if they were hackers, and when they didn't answer, one police officer
|
|
reached into the coat pocket of one of the people, and produced an auto
|
|
dialer. This in itself was enough to send the three to room 255, where the
|
|
rest of the hackers were being held for questioning. My question to you -
|
|
isn't that just a bit illegal? Bodily search without probable cause OR a
|
|
warrant? Ooops - I'm forgetting - we're HACKERS! We're ALL BAD! We're
|
|
ALWAYS breaking the law. We don't have RIGHTS!
|
|
|
|
Room 255 was packed. No one was allowed to smoke, and everyone was nervous
|
|
as hell. One by one people were called to be interviewed, with some
|
|
interviews lasting 5 minutes, others lasting 30 or 45 minutes. Some people
|
|
were sleeping, others were conversing, and still others were shaking, and
|
|
looked like they were about to puke at any second. Even though the situation
|
|
was quite serious, a few joked around, saying things like "So guys, I guess
|
|
PumpCon '93 won't be held here, eh?".
|
|
|
|
No one knew who was going to be arrested, or when they would be released.
|
|
The 2 cops in the room with them were actually pretty cool, and answered any
|
|
questions they could to the best of their knowledge. They weren't the guys
|
|
in charge of the investigation; they were simply there to make sure we didn't
|
|
leave. Of course, as friendly as they seemed, they were still cops...
|
|
|
|
All the people who were detained were held until between 5:45 and 6:30am.
|
|
Four hackers were arrested, 1 because 2 of the rooms were registered in his
|
|
name, a second because he signed for the rooms, and the others for previous
|
|
crimes, apparently. No one knows as of yet. As of this message, no news
|
|
on what will become of those arrested is known. They have not yet been
|
|
arraigned. The other hackers were all searched, questioned, and then released
|
|
pending further investigation. Those under the age of 18 had their parents
|
|
notified.
|
|
|
|
To my knowledge, there were no federal investigators there at the time of the
|
|
bust. However, people kept mentioning the FBI and the Secret Service, and it
|
|
is very possible that they will be called in to investigate. Actually, it's
|
|
more than just possible, it's almost guaranteed. The police said that
|
|
although most of those detained were released, there will most likely be more
|
|
arrests in the near future, as more is learned about the alleged illegal
|
|
doings.
|
|
|
|
3 computers (2 Amigas, and 1 AT&T dumb term) were confiscated, along with
|
|
anything which looked like it could have been involved in phone fraud. For
|
|
some odd reason, although Auto Dialers were listed on the search warrant, not
|
|
all of them were confiscated. I acutally don't know if ANY were, I do know
|
|
that not ALL were. ;)
|
|
|
|
In one of the rooms, there were about 2 dozen computer magazines which were
|
|
apparently confiscated, although the warrant did not specify that magazines
|
|
could be taken. But, when you're busting HACKERS, I suppose you can take what
|
|
you want. After all, hackers are evil geniuses, and don't have the same rights
|
|
as NORMAL criminals do.
|
|
|
|
As of yet, the actual charges against the hackers are not known. The raid
|
|
apparently stemmed because the hackers were ALLEGEDLY using stolen calling card
|
|
numbers and/or access codes to obtain free phone calls. One of these card
|
|
numbers or codes was rummored to have tripped a flag at AT&T, which alerted
|
|
security personel that something was possibly wrong.
|
|
|
|
This assumption about the calling card fraud is made because the police
|
|
confiscated any calling card found during their searches, and some of the
|
|
questions they asked the detained centered entirely around calling card
|
|
theft and use. A few other questions asked me were "Do you know what
|
|
computer systems were accessed?", "Do you refer to each other with handles?",
|
|
"Who was primarily responsible for this meeting?", and "Where did you hear
|
|
about this meeting?"
|
|
|
|
My interview lasted only about 10 minutes, and it started at about 5:50am.
|
|
Everyone was dead tired, and the cops wanted to get everything over with
|
|
as fast as possible so they could get some sleep. After the interviews were
|
|
over, everyone left, to wait and see what the next few days will bring.
|
|
|
|
I am releasing this file now, to prevent any rumors from starting, and to try
|
|
to make the outside world aware of what happened during PumpCon. I have
|
|
left out any specific incidences and references to specific people as a
|
|
precaution, since the investigation is only beginning. We were hoping to write
|
|
a file of all the attendees of PumpCon, to share with the world the names of
|
|
those who were there. However, as you can obviously see, that would be highly
|
|
stupid. For anyone who WAS there who is reading this, rest assured that the
|
|
running list of names which was kept made a very tasteless dinner for the one
|
|
who had it in his pocket.
|
|
|
|
Oh, BTW, one of the cops who was apparently in charge made a comment to me...
|
|
he said "You can post a message on the boards telling your friends to stay
|
|
out of Greenburgh". Well boys, you heard him - PumpCon '93 will be held in
|
|
Greenburgh, at the Courtyard Marriott....
|
|
|
|
|
|
*--------------*
|
|
|
|
The following is a word for word copy of the search warrant issued to each
|
|
person who was detained and questioned. No spelling errors were corrected,
|
|
but I probably made a few when I typed this in. Oh well.
|
|
|
|
|
|
TOWN of GREENBURGH POLICE DEPARTMENT
|
|
WESTCHESTER COUNTY, NEW YORK
|
|
ORDER OF SEARCH AND SEIZURE
|
|
-----
|
|
|
|
( signed here by Det. Hugh F. Gallagher #103)
|
|
----------------------------------------------
|
|
|
|
JUSTICE COURT, TOWN OF GREENBURGH
|
|
WESTCHESTER COUNTY, NEW YORK ORDER
|
|
-----
|
|
IN THE MATTER OF Room 233, 237, & 246 Westchester Marriott Courtyard
|
|
THE APPLICATION FOR AN ORDER OF SEARCH AND SEIZURE OF: (Specify)
|
|
|
|
Computers Disketts Computer Printers
|
|
Computer Terminals Auto Dialers Disketts
|
|
Calling Card Computer Systems & Wire
|
|
Computer Printouts Disk Drives
|
|
Modems Hand Written Notes About Credit Co.
|
|
" " " " Computer Service.
|
|
______________________________________________________________________X
|
|
|
|
IN THE NAME OF THE PEOPLE OF THE STATE OF NEW YORK
|
|
|
|
TO: ANY POLICE OFFICER OF THE TOWN OF GREENBURGH POLICE DEPARTMENT
|
|
|
|
PROOF by affidavit having been made before me this day by Det.H.Gallagher #103
|
|
____________(Affiant) of the Town of Greenburgh Police Department that certain
|
|
property, which is (stolen/unlawfully possessed, used to commit an
|
|
offense...) and which constitutes evidence and tends to demonstrate that an
|
|
offense has been committed and that a particular person participated in the
|
|
commission of an offense will be found at the location captioned above.
|
|
|
|
YOU ARE THEREFORE COMMANDED,
|
|
|
|
** (Between the hours of 6:AM - 9:00 PM / AT ANY TIME OF DAY OR NIGHT) **
|
|
** (WITHOUT GIVING NOTICE OF YOUR AUTHORITY AND PURPOSE)**
|
|
|
|
TO MAKE A SEARCH of the above described (location/person)** for the following
|
|
property: (describe fully)
|
|
|
|
Room # 233, 237, & 246 of the West. Marriott Courtyard
|
|
and all its occupants as listed on this attached affidavit.
|
|
>><< Suspects name was written here >><<
|
|
|
|
AND if any such property is found, you are hereby directed to seize the same
|
|
and without unnecessary delay, return it to the court, together with this
|
|
warrant and a written inventory of such property subscribed and sworn by you.
|
|
|
|
THIS COURT DIRECTS THAT this SEARCH WARRANT and ORDER issued this 1 day of
|
|
NOV. 1992 is valid and must be executed no more than ten (10) days after the
|
|
date of issuance.
|
|
|
|
<< illegible justice's name here >>
|
|
_____________________________________
|
|
Justice Name Signature
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [2]: Caller Id Availability
|
|
By: Mercenary
|
|
|
|
Whose Got caller Id,
|
|
|
|
Im sick and tired of reading messages about who does and who doesn't, so its
|
|
time to set the record straight.
|
|
|
|
Now here we go, these are the states that have up and running Caller Id
|
|
Service,
|
|
|
|
ALABAMA INDIANA MAINE NORTH DAKOTA VERMONT
|
|
DELEWARE IOWA MICHIGAN NEBRASKA WEST VIRGINIA
|
|
FLORIDA KENTUCKY MINNESOTA OKLAHOMA
|
|
GEORGIA LOUISIANA NEVADA SOUTH CAROLINA
|
|
IDAHO MASSACHUSETTS NEW JERSEY TENNESSEE
|
|
ILLINOIS MARYLAND NORTH CAROLINA VIRGINIA
|
|
|
|
|
|
Service is currently pending in these states,
|
|
|
|
CALIFORNIA NEW YORK WASHINGTON WYOMING
|
|
CONNECTICUT OREGON WISCONSIN
|
|
|
|
NO Service is available in,
|
|
|
|
ARIZONA TEXAS NEW MEXICO COLORADO MISSOURI
|
|
ARKANSAS OHIO PENNSYLVANIA NEW HAMPSHIRE KANSAS
|
|
MINNESOTA UTAH SOUTH DAKOTA MONTANA ALASKA
|
|
HAWAII
|
|
RHODE ISLAND
|
|
|
|
|
|
Now for the truth on Caller Id Operation,
|
|
|
|
1. A Caller Id phone or box will show the information for every call WHERE
|
|
THE INFORMATION IS AVAILABLE, If the the call comes from another area,
|
|
where Caller ID has not yet been approved, or from an area that is not
|
|
connected to your area's service, the display will read "OUT OF AREA".
|
|
|
|
|
|
2. If a caller pays for the block-out service and prevents information from
|
|
being transmitted, "PRIVATE" will appear on the display.
|
|
|
|
|
|
I hope this sets the record straight....
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [3]: Crystal Source
|
|
By: Saint Anarchy
|
|
|
|
For those of you trying to modify a Rat Shack (Radio Shack) auto-dialer
|
|
Part Number: 43-141, from the Sanctuary Phile or Similar text file
|
|
floating around.
|
|
A good source for the 6.5536 MHz Crystal is the Digi-Key Corporation
|
|
call them at 1-800-344-4539 (1-800-DIGI-KEY).
|
|
The crystal can be found in catalog #926 on page 116, Digi-Key Part Number
|
|
X018, Pricing is as follows...
|
|
|
|
1 - 1.51
|
|
10 - 12.60
|
|
100 - 100.80
|
|
|
|
Hope this helps those of you I've seen on the boards looking for a source
|
|
of this crystal,
|
|
|
|
Saint Anarchy/IIRG
|
|
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [4]: FOR THE PEOPLE
|
|
Supplied By: Bulletin Boards Across the Country
|
|
Edited by: Mercenary
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Part 1:
|
|
DIGITAL TO CLOSE TWO MANUFACTURING FACILITIES
|
|
|
|
|
|
DIGITAL EQUIPMENT CORPORATION ANNOUNCES
|
|
ITS INTENTION TO CLOSE MANUFACTURING FACILITIES
|
|
IN SPRINGFIELD, MASSACHUSETTS AND BURLINGTON, VERMONT
|
|
|
|
|
|
|
|
MAYNARD, Mass. -- October 29, 1992 -- Digital Equipment Corporation
|
|
informed its employees today that it intends to close its
|
|
manufacturing facilities in Springfield, Massachusetts and
|
|
Burlington, Vermont. There will continue to be Sales and Services
|
|
facilities in both cities.
|
|
The process for the plant closings, which will affect
|
|
approximately 320 employees in Springfield and 350 in Burlington,
|
|
will be a gradual reduction of the workforce over the course of six
|
|
months. It is expected that the process will be complete by April of
|
|
1993.
|
|
The details for closing the plants were outlined today to
|
|
employees in group meetings. Digital will offer the affected
|
|
employees a number of benefits including a financial support package
|
|
based on years of service to the corporation; continuation of
|
|
medical, dental and life insurance for a specified period; and
|
|
professional outplacement assistance.
|
|
Edward B. McDonough, vice president, Manufacturing and
|
|
Logistics for Digital, said, "The computer industry has been going
|
|
through a period in which technology has advanced by orders of
|
|
magnitude, increasing the efficiency with which products can be
|
|
manufactured.
|
|
|
|
"The movement of computing power to semiconductors; the shift
|
|
in demand to high-volume, low-margin commodity products; and the
|
|
decreased demand caused by a soft worldwide economy has left
|
|
Digital, and other companies in our industry, with excess worldwide
|
|
manufacturing capacity. For over three years, the corporation has
|
|
been restructuring its manufacturing function to adjust to the new
|
|
capacity needs by eliminating redundancies and divesting in areas
|
|
where we cannot clearly differentiate ourselves in the market."
|
|
McDonough continued, "Manufacturing will remain a core
|
|
competency for Digital. Our goal is to position manufacturing
|
|
capacity to best serve our customers worldwide and to optimize the
|
|
utilization of our assets. It is on the basis of this strategic
|
|
intent -- and not an issue of quality of work -- that the decision
|
|
was made to close the Springfield and Burlington plants. Both plants
|
|
and their employees have held an important place in Digital's
|
|
history."
|
|
The disposition of the two sites, which are owned by Digital,
|
|
has not yet been determined. The corporation is currently working
|
|
with state and local governments, as well as outside organizations,
|
|
to find external alternatives for the plants.
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
Part 2:
|
|
FBI EAVESDROPPING PLAN DRAWS INDUSTRY FIRE
|
|
|
|
By Steve Higgins
|
|
|
|
A broad flank of computer industry and public policy groups is
|
|
rallying in a renewed attempt to thwart an FBI proposal to limit the
|
|
security of electronic communications.
|
|
The U.S. Congress adjourned last month without considering a bill embodying
|
|
the FBI's so called "Digital Telephony Proposal," which seeks to force
|
|
vendors and end users of communications equipment to ensure the FBI's
|
|
ability to tap their communications networks.
|
|
"But they will probably do it next year," said David Banisar, a policy
|
|
analyst for Computer Professionals for Social Responsibility (CPSR)
|
|
in Washington.
|
|
That likelihood has generated a round of vehement opposition from an
|
|
unlikely consortium: industry vendors including IBM and Sun Microsystems
|
|
Inc., professional groups such as the Electronic Frontier Foundation and the
|
|
CPSR, and watchdog organizations including the American Civil Liberties
|
|
Union.
|
|
If the proposal becomes law, "it will require that every system from
|
|
AppleTalk LANs up have multiple, redundant systems to let the FBI tap
|
|
them," Banisar said.
|
|
In its proposal, the FBI suggests levying daily fines on vendors and
|
|
users of equipment that do not comply.
|
|
"We have to have the technical capability, or we are out of the business
|
|
of wiretapping," said Keir Boyd, deputy assistant director of the FBI's
|
|
technical services division in Washington. "We are not willing to back
|
|
off on the compulsory part."
|
|
Those opposed say the FBI's plan would cost U.S. industry money by
|
|
requiring that vendors and users retool existing products. The opponents
|
|
also say that the plan would hinder U.S. competitiveness by preventing
|
|
American companies from developing advanced communications equipment
|
|
and that it would pave the way for groups other than the FBI to tap
|
|
private communications.
|
|
"We are moving [to] a society where E-mail communications and video
|
|
conferencing are the norm," said. Whitfield Diffy, a cryptography engineer
|
|
at Sun in Mountain View, Calif.
|
|
Diffy said that if the FBI proposal is passed, privacy will be virtually
|
|
non-existent and "democratic government and free life could be swept
|
|
away."
|
|
All that, members of the opposition say, is not worth the value of the
|
|
estimated 600 to 800 wiretaps that the FBI conducts each year.'
|
|
Next year, the rhetoric is likely to rise as Sen. Patrick Leahy (D-VT)
|
|
and Rep. Jack Brooks (D-Texas) formally consider the proposal for inclusion
|
|
in a congressional bill .
|
|
But, for its part, the CPSR isn't waiting until the next Congress to take
|
|
action. The group recently filed a request under the Freedom of Information
|
|
Act for the FBI's reasoning behind the proposal.
|
|
Meanwhile, CPSR and other members of the consortium are still talking to
|
|
the FBI to head off what they consider an extreme proposal.
|
|
"We always offer to be helpful, to see if there are any less Draconian
|
|
solutions," said John Podesta, a consultant at the Electronic Frontier
|
|
Foundation, a lobbying group of industry professionals in Washington, who
|
|
said meetings with the FBI are "always cooperative."
|
|
But, Podesta added," [the FBI] still always seems to say,'We won't back
|
|
off of this legislation.' There will be a fight next year."
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Part 3:
|
|
PUMP-CON BUST RUMORS FLY
|
|
|
|
Actually, here is what I heard about Pumpcon:
|
|
|
|
They had multiple terminals set up hacking cards and systems. The manager
|
|
came to the door and told Randy that there was a noise complaint.
|
|
Just as Randy was starting to talk to the manager, the Feds, AT&T security
|
|
and various other organizations busted into the room.
|
|
They Rounded up 35 people, some of which are still in jail because they
|
|
couldn't make bail. The case is a now federal one, having been turned over
|
|
to the FBI.
|
|
I've also heard that AT&T and the FBI want to turn this case into an example.
|
|
It is already high profile in the NY/CT area from what I understand, and
|
|
those out on bail have already received messages from reporters.
|
|
It would seem to me that the noise complaint was just bullshit to get them
|
|
to open up the door.
|
|
Now the question that comes to mind is how did the FBI, AT&T security and
|
|
everyone else coordinate so quickly and bust this hotel room?
|
|
Well, speculation is (as always) that someone dropped a very big dime on
|
|
Pumpcon.
|
|
There is also speculation on who did it. Right now the leader in
|
|
the polls is No Name Brand.
|
|
NNB has friends in Metromedia and AT&T security.
|
|
Keep in mind that he was busted not too long ago and returned to hacking in
|
|
record time.
|
|
His excuse for not showing up?
|
|
According to him, his ride (Orion) screwed him over and left him.
|
|
Another possibility kicked around was that Phiber did it to receive a break
|
|
on his upcomming sentencing but most people aren't going for this one.
|
|
Most are going the NNB route.
|
|
Randy's phone is tapped.
|
|
Night Ranger reportedly got away (he and Spicoli supposedly carded their
|
|
room and $110 worth of pizza).
|
|
All this info is second generation from Randy S. Hacker. Believe what you
|
|
want, make your own conclusions.
|
|
Thirty five people...they didn't have enough cells for them all and
|
|
supposedly questioned them for 10 hours. In my opinion, someone dropped a
|
|
dime on them. It is also my opinion that NNB was that person.
|
|
He is just the type of self-serving, vindictive, egotistical little fuck
|
|
to pull a stunt like that.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Part 4:
|
|
RESPONSE TO PUMP-CON RUMORS
|
|
|
|
THESE RUMORS ARE NOT TRUE!!!!
|
|
|
|
Yes, there were computers there. NO! they WERE NOT set up to hack cards and
|
|
systems!
|
|
People were playing games on them, and a few people were calling out at
|
|
various times. The FBI was **NOT** there. AT&T security WAS there though.
|
|
The case has NOT been turned over to the feds - it's still a local thing,
|
|
and will hopefully stay that way. Only 4 people were arrested, 3 of whom are
|
|
out on bail, 1 had an outstanding warrant and was being shipped back to his
|
|
home state. He had no bail set. I talked to Randy myself, just got off the
|
|
phone with him.
|
|
He set me straight on a LOT of things. There are a LOT of places where the
|
|
cops possibly screwed up, which may help the defense. No one knows as of yet.
|
|
The charges are apparently are "Illegal use of a computer" and "Computer
|
|
trespass". There may be more charges added at a later time, and there may be
|
|
charges dropped. It's too early to tell. AT&T said there was an 800 system
|
|
in GA which was hacked "by SOMEONE in that room" and that apparently set off
|
|
flags all over. *I* personally know of NO such thing, OR system,and neither
|
|
did a few others I talked to. I DO know for sure that whatever was done, it
|
|
wasn't Randy's fault; I didn't once see him behind a terminal. I believe to
|
|
that it was a setup - PumpCon was HIGHLY announced, and there were a few who
|
|
could have benefitted from "ratting" on it.
|
|
I don't know who those people are, nor will I point any fingers.
|
|
But I guarantee you the person, if any, who set up PumpCon will wish someday
|
|
that he hadn't. Anyway, I wanted to post this to clear up the rumors that
|
|
are starting. I know I can't control them all, but some of this shitis
|
|
getting WAY out of hand.
|
|
|
|
246
|
|
+ 233
|
|
+ 237
|
|
----------
|
|
103
|
|
|
|
(PumpCon addition.... 3 rooms = 1 badge #)
|
|
|
|
The Bash... The Bullshit...The Bust... PumpCon '92.
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [5] The Rumor Mill (Unconfirmed rumors from the Underground)
|
|
Edited By: Mercenary
|
|
|
|
Part (1) : RONALD PINZ (VICTIM or RAT FINK)
|
|
|
|
In Phantasy Magazines Issue #9 Rumor Mill section, an anonymous user
|
|
found this file pertaining to Robert Pinz and has drawn these
|
|
unvalidated (as of yet) conclusions,
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
The Following information, (EDITED) has been circulating up in the New England
|
|
area of operations. The file has been validated as legal as the individual
|
|
named is known to have turned in The Purgatory BBS for having semi-legal
|
|
posted material.
|
|
|
|
Real name : Ron Pinz (Ronald Pinz)
|
|
Handles Used : IXOM
|
|
Past Handles : Dr. Disk,Bazooka Bill
|
|
Sex : Male
|
|
Age : 21
|
|
Birthdate : 06/28/71
|
|
Phone Numbers : 203-(EDITED)
|
|
: 203-(EDITED)
|
|
Address : (Edited)
|
|
City/State : Wallingford, Ct.
|
|
Zip code : 06492
|
|
|
|
Biography:
|
|
|
|
After being thrown out of the military service for computer hacking while
|
|
on duty, Its believed that Ronald is now trying to court favors from AT&T
|
|
for a $50,000 job in New Jersey by turning in phreakers and hackers.
|
|
It is already officially confirmed that Ron has turned in one BBS and
|
|
is now setting sites on other BBS's. Its too bad he doesn't know about
|
|
AT&T's policy of not hiring hackers as they figure that an ex-hacker
|
|
employee cannot be trusted,we urge you to delete him from your system
|
|
if you have any files that are not public domain.
|
|
|
|
-------------------------------------------------------------------------------
|
|
I (EDITED), find it most interesting that this phile was circulating right
|
|
before the Pump-Con Arrests, because in CUD 4.55 we find,
|
|
-------------------------------------------------------------------------------
|
|
|
|
Date: Tue, 03 Nov 92 03:00:44 EST
|
|
From: mcmullen@MINDVOX.PHANTOM.COM(John F. McMullen)
|
|
Subject: File 4--Computer Access Arrests In NY (NEWSBYTES reprint ((CR))
|
|
|
|
GREENBURGH, NEW YORK, U.S.A., 1992 NOV 3 (NB) -- The Greenburgh, New
|
|
York Police Department has announced the arrest of three individuals,
|
|
Randy P. Sigman, 40; Ronald G. Pinz, Jr, 21; and Byron J. Woodard, 18
|
|
for the alleged crimes of Unauthorized Use Of A computer and Attempted
|
|
Computer Trespass, both misdemeanors. Also arrested was Jason A.
|
|
Britain, 22 in satisfaction of a State of Arizona Fugitive From
|
|
Justice warrant.
|
|
|
|
The arrests took place in the midst of an "OctoberCon" or "PumpCon"
|
|
party billed as a "hacker get-together" at the Marriott Courtyard
|
|
Hotel in Greenburgh. . The arrests were made at approximately 4:00 AM
|
|
on Sunday morning, November 1st. The three defendants arrested for
|
|
computer crimes were granted $1,000 bail and will be arraigned on
|
|
Friday, November 6th.
|
|
|
|
Newsbytes sources said that the get together, which had attracted up
|
|
to sixty people, had dwindled to approximately twenty-five when, at
|
|
10:00 Saturday night, the police, in response to noise complaints
|
|
arrived and allegedly found computers in use accessing systems over
|
|
telephone lines. The police held the twenty-five for questioning and
|
|
called in Westchester County Assistant District Attorney Kenneth
|
|
Citarella, a prosecutor versed in computer crime, for assistance.
|
|
During the questioning period, the information on Britain as a
|
|
fugitive from Arizona was obtained and at 4:00 the three alleged
|
|
criminal trespassers and Britain were charged.
|
|
|
|
Both Lt. DeCarlo of the Greenburgh police and Citarella told Newsbytes
|
|
that the investigation is continuing and that no further information
|
|
is available at this time.
|
|
|
|
(Barbara E. McMullen & John F. McMullen/19921103)
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Now we find that Ronald Pinz has been arrested at Pump-Con, what better way
|
|
than to court favors from AT&T than to attend a hackers conference, let
|
|
people incriminate themselves and than have the police barge in an arrest
|
|
you and the others. Ive heard AT&T security was there, Now doesnt that make
|
|
you folks out there wonder? Lets see what happens to Mr. Pinz in court.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Part (2) : BERLIN BUSTS REPORTED
|
|
|
|
|
|
Bad news from Berlin, on Wed. Oct 25th,twelve mailboxes,25 machines,and
|
|
some thousand floppies were seized. People are charged for distributing
|
|
pirated software. The local DA refuses to give further information.
|
|
But the real thing is, some sysops couldnt resist to keep track of TOO
|
|
MUCH INFORMATION, not only names,telephone numbers,and addresses, but even
|
|
precise logs of who downloaded which software.
|
|
Authorties are believed to be planning on prosecuting users who downloaded
|
|
copyrighted materials.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Part (3) : WINDYCON
|
|
|
|
To: All
|
|
Subject: come hither
|
|
|
|
This weekend only, at the Woodfielf Hyatt in Schaemburg..
|
|
|
|
WINDYCON!!!!
|
|
|
|
See all manners of various freaks..a must see...
|
|
|
|
We, the prestigous, will be there, feel free to attend..
|
|
|
|
Cecil Adams
|
|
Board Pariah
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [6]: PHANTASY TIDBITS: News and Views of Interest
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Part 1: Police Officials Cited for Searching Private Computer Records
|
|
|
|
Los Angeles (AP, 30 Oct 1992) More than 45 police officials have been
|
|
cited since 1989 for using department computers to check the backgrounds
|
|
of baby sitters,house sitters, and others for personal reasons.
|
|
"Its a very serious problem", Police Commissioner Ann Reiss Lane Said
|
|
The citations came to light after a civilian Police Commission investigator
|
|
was suspended 10 days for using department computers without permission to
|
|
get confidential data on White Supremacist Tom Metzger and actor Arnold
|
|
Schwarzenegger.
|
|
The union representing Robert Bauman appealed the suspension and submitted
|
|
records showing that more than 45 department employees had been disciplined
|
|
in the last three years for illegal computer use.
|
|
Most recieved suspensions of two or three days or verbal reprimands.
|
|
As an example, Lane said Thursday, an officer might use the computer to check
|
|
the background of an individual about to marry one of the officers relatives.
|
|
Bauman's 1--day suspension without pay was upheld last week by the Civil
|
|
Service Commission. Bauman, a 23-year civilian employee, said he already
|
|
has served the suspension and was back at work. Bauman a permit processor
|
|
routinely uses police computers to check the criminal records,police files,
|
|
and tax records of people apply for police permits for massage parlors, gun
|
|
stores and pawn shops.
|
|
He said he gathered information on Metzger because he is a part-time
|
|
historian who does research on right-and left-wing political groups.
|
|
Bauman said he tapped into Schwarzeneggers files because a co-worker
|
|
was curious about the actor.
|
|
|
|
|
|
IIRG NOTE: Another case of the Police getting there wrists slapped.
|
|
Had this been a hacker he would have been screwed
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Part 2: Subject: Call for Papers - The Third International Virus
|
|
Bulletin Conference
|
|
|
|
Amsterdam, 9th-10th September 1993
|
|
|
|
Call for Papers
|
|
|
|
The International Virus Bulletin Conference is the largest and most
|
|
prestigious annual event to address the computer virus threat in
|
|
Europe. The 1992 conference, held in Edinburgh, attracted over 200
|
|
delegates and 23 speakers, from more than 20 countries.
|
|
|
|
Abstracts of between 200 and 500 words outlining prospective papers
|
|
for presentation at next year's Virus Bulletin conference are duly
|
|
invited from all parties engaged in any capacity in combating the
|
|
computer virus threat.
|
|
|
|
Papers will be selected for their originality and appeal to a diverse
|
|
audience comprising corporate computer security staff, PC support
|
|
specialists, hardware and software developers, government, military,
|
|
public sector and corporate IT managers, researchers and others engaged
|
|
in devising technical and procedural countermeasures.
|
|
|
|
Papers covering the following topics are particularly welcome:
|
|
|
|
* Case studies of genuine virus outbreaks.
|
|
|
|
* Post-attack recovery: tools, techniques and lessons learned.
|
|
|
|
* Evaluation methods and protocols for testing anti-virus software.
|
|
|
|
* Running a virus help desk.
|
|
|
|
* Protecting file servers.
|
|
|
|
* Dealing with viruses in compressed software.
|
|
|
|
* What should be in a virus hunter's toolkit?
|
|
|
|
The conference will be held in two streams: stream one will address the
|
|
management of the virus threat, while stream two will concentrate on
|
|
|
|
The conference will be held in two streams: stream one will address the
|
|
Abstracts should be completed by December 1st 1993 and should be sent to the
|
|
Editor, Virus Bulletin, 21 The Quadrant, Abingdon Science Park, Abingdon,
|
|
Oxon OX14 3YS, UK. Fax +44 (0)235 559935.
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Part 3: Landmark Software Decision
|
|
|
|
Published in the San Francisco Examiner is the following legal decision on
|
|
disassembly of software
|
|
|
|
"In the first binding ruling on the application of copyright law
|
|
to a common process called reverse engineering, a federal appeals
|
|
court said video game maker Accolade Inc. of San Jose could copy a
|
|
video game system's code copyrighted by Redwood City-based Sega
|
|
Enterprises Ltd. in order to design games for the Sega console.
|
|
Reverse engineering is the parctice of taking apart a product to
|
|
see how it works, and using the knowledge to design one's own
|
|
product. During the process, Accolade made a copy of Sega's
|
|
encoded computer program, designed to exclude unlicensed game
|
|
makers, in order to translate the information and extract the key
|
|
to the code. The Ninth Circuit Court of Appeal in San Francisco
|
|
said the copying did not violate Sega's federally protected
|
|
copyright on it's software package. The court said Sega's
|
|
exclusive rights over it's own programs did not entitle it to
|
|
Enterprises Ltd. in order to design games for the Sega console.
|
|
Reverse engineering is the parctice of taking apart a product to
|
|
see how it works, and using the knowledge to design one's own
|
|
product. During the process, Accolade made a copy of Sega's
|
|
encoded computer program, designed to exclude unlicensed game
|
|
makers, in order to translate the information and extract the key
|
|
to the code. The Ninth Circuit Court of Appeal in San Francisco
|
|
said the copying did not violate Sega's federally protected
|
|
copyright on it's software package. The court said Sega's
|
|
exclusive rights over it's own programs did not entitle it to
|
|
prohibit another company from learning how the Sega system worked
|
|
and designing games that would fit it, as long as those games
|
|
did not copy Sega games."
|
|
|
|
-------------------------------------------------------------------------------
|
|
|
|
Part 4: SIXTH INTERNATIONAL COMPUTER SECURITY & VIRUS CONFERENCE
|
|
and Exposition
|
|
|
|
sponsored by DPMA Fin.Ind.Chapter in cooperation with
|
|
ACM-SIGSAC, BCS, CMA, COS, EDPAAph, ISSAny, NUInypc, IEEE Computer Society
|
|
|
|
C A L L F O R P A P E R S
|
|
|
|
Approximately 500 attendees will hear 90 speakers and 53 vendors over 3 days
|
|
Wednesday thru Friday - March 10-12, 1993 - New York Ramada Madison Square
|
|
|
|
YOUR AUDIENCE:
|
|
|
|
Past attendees have represented industry, military
|
|
government, forensic and academic settings -
|
|
creators and users of related software and hardware.
|
|
|
|
They travel from U.S. and many international locations
|
|
and have titles such as MIS Director, Security Analyst,
|
|
Operations Manager, Investigator, Programming Leader
|
|
|
|
TOPICS OF INTEREST INCLUDE (but are not limited to):
|
|
|
|
- prevention, detection, and recovery from viruses,
|
|
crackers, and other unauthorized usage
|
|
- oritinal research in these and related topics
|
|
- survey of products and techniques available
|
|
- particulars of LSN, UNIX, cryptography, military use
|
|
- Computer crime, law, data liability, related contexts
|
|
= US/international sharing of research & techniques
|
|
- case studies of mainframe, pc &/or network security, e.g.,
|
|
- 1992 hurricane, flood, fire disaster recovery
|
|
- recent court decisions
|
|
- security implementation and user awareness in industry
|
|
|
|
PAPER SUBMISSION:
|
|
|
|
Send a draft final paper for receipt by Wednesday, 11/11/92.
|
|
Address to Judy Brand, Conference Chair, box 6313 FDR Station,
|
|
New York, NY 10150, USA. Please include a small photo and
|
|
introductory bio not exceeding 50 words. Successful submittors
|
|
or co-authors are expected to present in person. Presenters
|
|
receive the Conference Proceedings and complimentary admission.
|
|
|
|
PAPER FORMAT:
|
|
|
|
Send one original and three copies. When making the copies,
|
|
please cover over the author name(s) and other identifying data.
|
|
Each paper goes to three revieweers.
|
|
|
|
Type double spaced, with page# below bottom line (may be
|
|
handwritten): TITLE (caps); Name; Position, Affiliation;
|
|
Telephone, City/State/Zip, Electronic Address (optional).
|
|
|
|
NOTIFICATION:
|
|
|
|
Written and (where practicable) telephoned confirmation will
|
|
be initiated by Monday, 1/13/93, to facilitate low cost travel.
|
|
Those needing earlier notification should attach a note.
|
|
|
|
You may be asked to perform specific revisions to be accepted.
|
|
Nobody can guarantee you a place without an acceptable paper.
|
|
|
|
AT THE CONFERENCE:
|
|
|
|
There are five tracks. Time your presentation to last
|
|
40 minutes and have clear relation to your paper. A committee
|
|
member will preside over your assigned room and adhere to schedule.
|
|
|
|
Don't hesitate to submit a presentation you've given elsewhere
|
|
to a more specialized audience. Most attendees will find it
|
|
please cover over the author name(s) and other identifying data.
|
|
Each paper goes to three revieweers.
|
|
|
|
Type double spaced, with page# below bottom line (may be
|
|
handwritten): TITLE (caps); Name; Position, Affiliation;
|
|
Telephone, City/State/Zip, Electronic Address (optional).
|
|
|
|
NOTIFICATION:
|
|
|
|
Written and (where practicable) telephoned confirmation will
|
|
be initiated by Monday, 1/13/93, to facilitate low cost travel.
|
|
Those needing earlier notification should attach a note.
|
|
|
|
You may be asked to perform specific revisions to be accepted.
|
|
Nobody can guarantee you a place without an acceptable paper.
|
|
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [7]: IIRG Distribution Sites
|
|
(or Gateways to Oblivion)
|
|
|
|
|
|
|
|
////// ////// /////// ////////
|
|
// // // // //
|
|
// // /////// // ////
|
|
// // // // // //
|
|
////// * ////// * // // * /////////
|
|
|
|
|
|
|
|
|
|
IIRG World HQ: Dark Shadows
|
|
19.2/9600 Baud HST
|
|
24 Hours a Day
|
|
1.2 Gigs Online
|
|
Sysop: Anubis
|
|
2 Nodes
|
|
(203)-628-9660
|
|
|
|
|
|
IIRG Distribution Site 1: Wired World BBS
|
|
INC Europe
|
|
TPC Courier (WHQ)
|
|
THP
|
|
IIRG Distribution Site
|
|
Sysop: Digital Justice
|
|
+39-89-254138
|
|
|
|
IIRG Distribution Site 2: Cyberdyne Network Germany
|
|
United Forces
|
|
Sysop: E605
|
|
+49-5341-59004
|
|
+49-5341-54052
|
|
|
|
|
|
IIRG Distribution Site 3: The Sanitarium
|
|
Sysops: Morbid Angel [INC/ACID]
|
|
Spectral Illusion [ACID/RAZOR]
|
|
IIRG Distribution Site
|
|
ACID Member Board
|
|
INC Courier Board
|
|
RAZOR 1911 Courier Board
|
|
VISA World Headquarters
|
|
(817)PRI-VATE
|
|
|
|
IIRG Distribution Site 4: The WareHouse
|
|
(203)-231-8589 14.4
|
|
(203)-231-8588 9600
|
|
OVER A GIG ONLINE
|
|
Sysop: Ionizer
|
|
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|
|
Section [8]: Phantasy Distribution Sites
|
|
|
|
Phantasy's Distribution Site's are continually growing,we apologize if you
|
|
called a board and didn't find the Mag. Network Distribution Sites will
|
|
have the Issues first, we suggest calling one of them if a problem does
|
|
arise.
|
|
|
|
|
|
1. Lightning Systems
|
|
(414) 363-4282
|
|
Sixty Million Bytes OnLine
|
|
USRobotics Dual Standard HST/V.32bis
|
|
2400 thru 14.4k v.32bis/HST
|
|
|
|
2. Sycamore Elite
|
|
19,200-1200 Baud HST, 24 Hours a day
|
|
(815) 895-5573
|
|
|
|
3. The Works BBS at (617-861-8976)
|
|
Largest Text Files BBS in the world, 3500+ text files online.
|
|
2400-300 Baud, 24 Hours a day
|
|
|
|
4. Pipers Pit BBS
|
|
19,200-9600 HST ONLY!!
|
|
24 Hours a Day
|
|
THG Distro Site 1300 Megs
|
|
(203)PRI-VATE [2 Nodes]
|
|
|
|
5. Blitzkrieg BBS TAP Magazine
|
|
(502)-499-8933 P.O. BOX 20264
|
|
Home of TAP MAgazine Louisville,KY. 40250-0264
|
|
|
|
6. The Dickinson Nightlight
|
|
(713)-337-1452
|
|
Der WeltanSchauung Distro Site (World View Magazine)
|
|
Phantasy Distro Site
|
|
|
|
|
|
PHANTASY is also available on:
|
|
|
|
1. RIPCO BBS (312)528-5020
|
|
2. KRACKER BOX (303)438-1481
|
|
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
PHANTASY(C) IIRG 1991,1992
|
|
May Odin Guide Your Way!
|
|
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
|
|