1003 lines
47 KiB
Plaintext
1003 lines
47 KiB
Plaintext
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
= =
|
||
- WELCOME TO THE ELEVENTH ISSUE OF -
|
||
= =
|
||
- -=>PHANTASY<=- -
|
||
= =
|
||
- A PUBLICATION AND NEWSLETTER OF -
|
||
= =
|
||
- THE -
|
||
= INTERNATIONAL =
|
||
- INFORMATION -
|
||
= RETRIEVAL =
|
||
- GUILD -
|
||
= =
|
||
- Hacking,Phreaking,Anarchy,Survivalism,Commentary -
|
||
= =
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Volume Number Three,Issue Number Eleven Dated 11/06/92
|
||
Editor is Mercenary : mercenar@works.UUCP
|
||
|
||
Article Submissions: The Mercenary/IIRG
|
||
862 Farmington Avenue
|
||
Suite 306
|
||
Bristol,Ct 06010
|
||
|
||
IIRG World Headquarters BBS: Dark Shadows
|
||
19.2/9600 Baud HST
|
||
24 Hours a Day
|
||
1.2 Gigs Online
|
||
2 Nodes
|
||
(203)-628-9660
|
||
|
||
Table of Discontents:
|
||
|
||
|
||
[1] More Pump-Con Bust Info
|
||
By: Anonymous
|
||
|
||
[2] Caller ID Availability
|
||
By: Mercenary
|
||
|
||
[3] Crystal Source
|
||
By: Saint Anarchy
|
||
|
||
[4] FOR THE PEOPLE
|
||
Supplied By: Bulletin Boards Across the Country
|
||
Edited by: Mercenary
|
||
|
||
1. DIGITAL TO CLOSE TWO MANUFACTURING FACILITIES
|
||
2. FBI EAVESDROPPING PLAN DRAWS INDUSTRY FIRE
|
||
3. PUMP-CON BUST RUMORS FLY
|
||
4. RESPONSE TO PUMP-CON RUMORS
|
||
|
||
[5] The Rumor Mill (Unconfirmed rumors from the Underground)
|
||
Edited By: Mercenary
|
||
|
||
1. Ronald Pinz (Victim Or Rat Fink)
|
||
2. Berlin Busts Reported
|
||
3. WINDYCON
|
||
|
||
[6] PHANTASY TIDBITS: News and Views of Interest
|
||
|
||
1. Police Officials Cited For Searching Private Records
|
||
2. Call for Papers - The Third International Virus Conference
|
||
3. Landmark Software Decision
|
||
4. Sixth International Computer Security & Virus Conference
|
||
|
||
[7] Listing of IIRG Distribution Sites
|
||
|
||
[8] Listing of PHANTASY Distribution Sites
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
OFFICIAL DISLAIMER...
|
||
|
||
All information in PHANTASY is from USER contributed material
|
||
The Publishers and Editors of PHANTASY and THE IIRG disclaim
|
||
any liability from any damages of any type that the reader or
|
||
user of such information contained within this newsletter may encounter
|
||
from the use of said information. All files are brought to you for
|
||
entertainment purposes only! We also assume all information infringes
|
||
no copyrights and hereby disclaim any liability.
|
||
|
||
PHANTASY is (C) 1990 by The IIRG
|
||
IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [1]:
|
||
********** PUMPCON BUSTED!!! ***********
|
||
10/31/92
|
||
written by someone who was there
|
||
who wishes to remain anonymous
|
||
|
||
NOTICE: The word "Hacker" is used frequently throughout this file - it is
|
||
to be interperated as "a computer literate person", and NOT as
|
||
"someone who engages in illegal activities using a computer".
|
||
|
||
Friday, October 30, Pumpcon began, at the Courtyard of the Marriott, in
|
||
Greenburgh, NY. All in all, about 30 hackers showed up, and had a great time.
|
||
At least until the evening of Oct. 31st, when 8-10 members of the Greenburgh
|
||
police force showed up and raided the Con. At the time of the raid, there were
|
||
between 20 and 25 hackers in the hotel. 3 of the 4 rooms rented by Con
|
||
attendees were raided. All the occupants of these rooms were taken to a
|
||
conference room, and then another hotel room (255) where they were held
|
||
approximately 6-8 hours for questioning.
|
||
|
||
The police all came in unmarked police cars, and parked on all 4 sides of the
|
||
hotel. No one noticed they were there, until they were standing in the hall
|
||
where all 4 rooms were located. The officers stood in the hall outside the
|
||
doors, but did not enter the rooms right away. They waited about five
|
||
minutes, for some unknown reason, which was just enough time for them to be
|
||
noticed by the hackers in at least one of the rooms. Unfortunately, there was
|
||
no way the hackers in one room could warn the other rooms - the fone lines were
|
||
busy, and the cops in the hall kinda left the "walk down and tell 'em in
|
||
person" option out.
|
||
|
||
The police produced copies of a search warrant to search rooms 246, 233, and
|
||
237. Room 246 was the one where everyone was hanging out; it was pretty much
|
||
THE room. It was where the computers were located, and where most of the Con
|
||
attendees were 99% of the time. The other two rooms were rented by attendees
|
||
of the con, and were simply used for sleeping quarters.
|
||
|
||
Before too long, the police entered the rooms, and began rounding up people.
|
||
My recollection of this time period is a bit faint, and I don't remember all
|
||
the minute details. All I know is that we all ended up in a conference room,
|
||
and then room 255.
|
||
|
||
A few hackers who had been out driving around during the time of the bust
|
||
returned a few hours later, and when they were seen by police, they were
|
||
immediately taken to 255 and questioned. (They were walking down the
|
||
hall, when a cop appeared, and told them to step into a room) The cops asked
|
||
them if they were hackers, and when they didn't answer, one police officer
|
||
reached into the coat pocket of one of the people, and produced an auto
|
||
dialer. This in itself was enough to send the three to room 255, where the
|
||
rest of the hackers were being held for questioning. My question to you -
|
||
isn't that just a bit illegal? Bodily search without probable cause OR a
|
||
warrant? Ooops - I'm forgetting - we're HACKERS! We're ALL BAD! We're
|
||
ALWAYS breaking the law. We don't have RIGHTS!
|
||
|
||
Room 255 was packed. No one was allowed to smoke, and everyone was nervous
|
||
as hell. One by one people were called to be interviewed, with some
|
||
interviews lasting 5 minutes, others lasting 30 or 45 minutes. Some people
|
||
were sleeping, others were conversing, and still others were shaking, and
|
||
looked like they were about to puke at any second. Even though the situation
|
||
was quite serious, a few joked around, saying things like "So guys, I guess
|
||
PumpCon '93 won't be held here, eh?".
|
||
|
||
No one knew who was going to be arrested, or when they would be released.
|
||
The 2 cops in the room with them were actually pretty cool, and answered any
|
||
questions they could to the best of their knowledge. They weren't the guys
|
||
in charge of the investigation; they were simply there to make sure we didn't
|
||
leave. Of course, as friendly as they seemed, they were still cops...
|
||
|
||
All the people who were detained were held until between 5:45 and 6:30am.
|
||
Four hackers were arrested, 1 because 2 of the rooms were registered in his
|
||
name, a second because he signed for the rooms, and the others for previous
|
||
crimes, apparently. No one knows as of yet. As of this message, no news
|
||
on what will become of those arrested is known. They have not yet been
|
||
arraigned. The other hackers were all searched, questioned, and then released
|
||
pending further investigation. Those under the age of 18 had their parents
|
||
notified.
|
||
|
||
To my knowledge, there were no federal investigators there at the time of the
|
||
bust. However, people kept mentioning the FBI and the Secret Service, and it
|
||
is very possible that they will be called in to investigate. Actually, it's
|
||
more than just possible, it's almost guaranteed. The police said that
|
||
although most of those detained were released, there will most likely be more
|
||
arrests in the near future, as more is learned about the alleged illegal
|
||
doings.
|
||
|
||
3 computers (2 Amigas, and 1 AT&T dumb term) were confiscated, along with
|
||
anything which looked like it could have been involved in phone fraud. For
|
||
some odd reason, although Auto Dialers were listed on the search warrant, not
|
||
all of them were confiscated. I acutally don't know if ANY were, I do know
|
||
that not ALL were. ;)
|
||
|
||
In one of the rooms, there were about 2 dozen computer magazines which were
|
||
apparently confiscated, although the warrant did not specify that magazines
|
||
could be taken. But, when you're busting HACKERS, I suppose you can take what
|
||
you want. After all, hackers are evil geniuses, and don't have the same rights
|
||
as NORMAL criminals do.
|
||
|
||
As of yet, the actual charges against the hackers are not known. The raid
|
||
apparently stemmed because the hackers were ALLEGEDLY using stolen calling card
|
||
numbers and/or access codes to obtain free phone calls. One of these card
|
||
numbers or codes was rummored to have tripped a flag at AT&T, which alerted
|
||
security personel that something was possibly wrong.
|
||
|
||
This assumption about the calling card fraud is made because the police
|
||
confiscated any calling card found during their searches, and some of the
|
||
questions they asked the detained centered entirely around calling card
|
||
theft and use. A few other questions asked me were "Do you know what
|
||
computer systems were accessed?", "Do you refer to each other with handles?",
|
||
"Who was primarily responsible for this meeting?", and "Where did you hear
|
||
about this meeting?"
|
||
|
||
My interview lasted only about 10 minutes, and it started at about 5:50am.
|
||
Everyone was dead tired, and the cops wanted to get everything over with
|
||
as fast as possible so they could get some sleep. After the interviews were
|
||
over, everyone left, to wait and see what the next few days will bring.
|
||
|
||
I am releasing this file now, to prevent any rumors from starting, and to try
|
||
to make the outside world aware of what happened during PumpCon. I have
|
||
left out any specific incidences and references to specific people as a
|
||
precaution, since the investigation is only beginning. We were hoping to write
|
||
a file of all the attendees of PumpCon, to share with the world the names of
|
||
those who were there. However, as you can obviously see, that would be highly
|
||
stupid. For anyone who WAS there who is reading this, rest assured that the
|
||
running list of names which was kept made a very tasteless dinner for the one
|
||
who had it in his pocket.
|
||
|
||
Oh, BTW, one of the cops who was apparently in charge made a comment to me...
|
||
he said "You can post a message on the boards telling your friends to stay
|
||
out of Greenburgh". Well boys, you heard him - PumpCon '93 will be held in
|
||
Greenburgh, at the Courtyard Marriott....
|
||
|
||
|
||
*--------------*
|
||
|
||
The following is a word for word copy of the search warrant issued to each
|
||
person who was detained and questioned. No spelling errors were corrected,
|
||
but I probably made a few when I typed this in. Oh well.
|
||
|
||
|
||
TOWN of GREENBURGH POLICE DEPARTMENT
|
||
WESTCHESTER COUNTY, NEW YORK
|
||
ORDER OF SEARCH AND SEIZURE
|
||
-----
|
||
|
||
( signed here by Det. Hugh F. Gallagher #103)
|
||
----------------------------------------------
|
||
|
||
JUSTICE COURT, TOWN OF GREENBURGH
|
||
WESTCHESTER COUNTY, NEW YORK ORDER
|
||
-----
|
||
IN THE MATTER OF Room 233, 237, & 246 Westchester Marriott Courtyard
|
||
THE APPLICATION FOR AN ORDER OF SEARCH AND SEIZURE OF: (Specify)
|
||
|
||
Computers Disketts Computer Printers
|
||
Computer Terminals Auto Dialers Disketts
|
||
Calling Card Computer Systems & Wire
|
||
Computer Printouts Disk Drives
|
||
Modems Hand Written Notes About Credit Co.
|
||
" " " " Computer Service.
|
||
______________________________________________________________________X
|
||
|
||
IN THE NAME OF THE PEOPLE OF THE STATE OF NEW YORK
|
||
|
||
TO: ANY POLICE OFFICER OF THE TOWN OF GREENBURGH POLICE DEPARTMENT
|
||
|
||
PROOF by affidavit having been made before me this day by Det.H.Gallagher #103
|
||
____________(Affiant) of the Town of Greenburgh Police Department that certain
|
||
property, which is (stolen/unlawfully possessed, used to commit an
|
||
offense...) and which constitutes evidence and tends to demonstrate that an
|
||
offense has been committed and that a particular person participated in the
|
||
commission of an offense will be found at the location captioned above.
|
||
|
||
YOU ARE THEREFORE COMMANDED,
|
||
|
||
** (Between the hours of 6:AM - 9:00 PM / AT ANY TIME OF DAY OR NIGHT) **
|
||
** (WITHOUT GIVING NOTICE OF YOUR AUTHORITY AND PURPOSE)**
|
||
|
||
TO MAKE A SEARCH of the above described (location/person)** for the following
|
||
property: (describe fully)
|
||
|
||
Room # 233, 237, & 246 of the West. Marriott Courtyard
|
||
and all its occupants as listed on this attached affidavit.
|
||
>><< Suspects name was written here >><<
|
||
|
||
AND if any such property is found, you are hereby directed to seize the same
|
||
and without unnecessary delay, return it to the court, together with this
|
||
warrant and a written inventory of such property subscribed and sworn by you.
|
||
|
||
THIS COURT DIRECTS THAT this SEARCH WARRANT and ORDER issued this 1 day of
|
||
NOV. 1992 is valid and must be executed no more than ten (10) days after the
|
||
date of issuance.
|
||
|
||
<< illegible justice's name here >>
|
||
_____________________________________
|
||
Justice Name Signature
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [2]: Caller Id Availability
|
||
By: Mercenary
|
||
|
||
Whose Got caller Id,
|
||
|
||
Im sick and tired of reading messages about who does and who doesn't, so its
|
||
time to set the record straight.
|
||
|
||
Now here we go, these are the states that have up and running Caller Id
|
||
Service,
|
||
|
||
ALABAMA INDIANA MAINE NORTH DAKOTA VERMONT
|
||
DELEWARE IOWA MICHIGAN NEBRASKA WEST VIRGINIA
|
||
FLORIDA KENTUCKY MINNESOTA OKLAHOMA
|
||
GEORGIA LOUISIANA NEVADA SOUTH CAROLINA
|
||
IDAHO MASSACHUSETTS NEW JERSEY TENNESSEE
|
||
ILLINOIS MARYLAND NORTH CAROLINA VIRGINIA
|
||
|
||
|
||
Service is currently pending in these states,
|
||
|
||
CALIFORNIA NEW YORK WASHINGTON WYOMING
|
||
CONNECTICUT OREGON WISCONSIN
|
||
|
||
NO Service is available in,
|
||
|
||
ARIZONA TEXAS NEW MEXICO COLORADO MISSOURI
|
||
ARKANSAS OHIO PENNSYLVANIA NEW HAMPSHIRE KANSAS
|
||
MINNESOTA UTAH SOUTH DAKOTA MONTANA ALASKA
|
||
HAWAII
|
||
RHODE ISLAND
|
||
|
||
|
||
Now for the truth on Caller Id Operation,
|
||
|
||
1. A Caller Id phone or box will show the information for every call WHERE
|
||
THE INFORMATION IS AVAILABLE, If the the call comes from another area,
|
||
where Caller ID has not yet been approved, or from an area that is not
|
||
connected to your area's service, the display will read "OUT OF AREA".
|
||
|
||
|
||
2. If a caller pays for the block-out service and prevents information from
|
||
being transmitted, "PRIVATE" will appear on the display.
|
||
|
||
|
||
I hope this sets the record straight....
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [3]: Crystal Source
|
||
By: Saint Anarchy
|
||
|
||
For those of you trying to modify a Rat Shack (Radio Shack) auto-dialer
|
||
Part Number: 43-141, from the Sanctuary Phile or Similar text file
|
||
floating around.
|
||
A good source for the 6.5536 MHz Crystal is the Digi-Key Corporation
|
||
call them at 1-800-344-4539 (1-800-DIGI-KEY).
|
||
The crystal can be found in catalog #926 on page 116, Digi-Key Part Number
|
||
X018, Pricing is as follows...
|
||
|
||
1 - 1.51
|
||
10 - 12.60
|
||
100 - 100.80
|
||
|
||
Hope this helps those of you I've seen on the boards looking for a source
|
||
of this crystal,
|
||
|
||
Saint Anarchy/IIRG
|
||
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [4]: FOR THE PEOPLE
|
||
Supplied By: Bulletin Boards Across the Country
|
||
Edited by: Mercenary
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
Part 1:
|
||
DIGITAL TO CLOSE TWO MANUFACTURING FACILITIES
|
||
|
||
|
||
DIGITAL EQUIPMENT CORPORATION ANNOUNCES
|
||
ITS INTENTION TO CLOSE MANUFACTURING FACILITIES
|
||
IN SPRINGFIELD, MASSACHUSETTS AND BURLINGTON, VERMONT
|
||
|
||
|
||
|
||
MAYNARD, Mass. -- October 29, 1992 -- Digital Equipment Corporation
|
||
informed its employees today that it intends to close its
|
||
manufacturing facilities in Springfield, Massachusetts and
|
||
Burlington, Vermont. There will continue to be Sales and Services
|
||
facilities in both cities.
|
||
The process for the plant closings, which will affect
|
||
approximately 320 employees in Springfield and 350 in Burlington,
|
||
will be a gradual reduction of the workforce over the course of six
|
||
months. It is expected that the process will be complete by April of
|
||
1993.
|
||
The details for closing the plants were outlined today to
|
||
employees in group meetings. Digital will offer the affected
|
||
employees a number of benefits including a financial support package
|
||
based on years of service to the corporation; continuation of
|
||
medical, dental and life insurance for a specified period; and
|
||
professional outplacement assistance.
|
||
Edward B. McDonough, vice president, Manufacturing and
|
||
Logistics for Digital, said, "The computer industry has been going
|
||
through a period in which technology has advanced by orders of
|
||
magnitude, increasing the efficiency with which products can be
|
||
manufactured.
|
||
|
||
"The movement of computing power to semiconductors; the shift
|
||
in demand to high-volume, low-margin commodity products; and the
|
||
decreased demand caused by a soft worldwide economy has left
|
||
Digital, and other companies in our industry, with excess worldwide
|
||
manufacturing capacity. For over three years, the corporation has
|
||
been restructuring its manufacturing function to adjust to the new
|
||
capacity needs by eliminating redundancies and divesting in areas
|
||
where we cannot clearly differentiate ourselves in the market."
|
||
McDonough continued, "Manufacturing will remain a core
|
||
competency for Digital. Our goal is to position manufacturing
|
||
capacity to best serve our customers worldwide and to optimize the
|
||
utilization of our assets. It is on the basis of this strategic
|
||
intent -- and not an issue of quality of work -- that the decision
|
||
was made to close the Springfield and Burlington plants. Both plants
|
||
and their employees have held an important place in Digital's
|
||
history."
|
||
The disposition of the two sites, which are owned by Digital,
|
||
has not yet been determined. The corporation is currently working
|
||
with state and local governments, as well as outside organizations,
|
||
to find external alternatives for the plants.
|
||
|
||
------------------------------------------------------------------------------
|
||
|
||
Part 2:
|
||
FBI EAVESDROPPING PLAN DRAWS INDUSTRY FIRE
|
||
|
||
By Steve Higgins
|
||
|
||
A broad flank of computer industry and public policy groups is
|
||
rallying in a renewed attempt to thwart an FBI proposal to limit the
|
||
security of electronic communications.
|
||
The U.S. Congress adjourned last month without considering a bill embodying
|
||
the FBI's so called "Digital Telephony Proposal," which seeks to force
|
||
vendors and end users of communications equipment to ensure the FBI's
|
||
ability to tap their communications networks.
|
||
"But they will probably do it next year," said David Banisar, a policy
|
||
analyst for Computer Professionals for Social Responsibility (CPSR)
|
||
in Washington.
|
||
That likelihood has generated a round of vehement opposition from an
|
||
unlikely consortium: industry vendors including IBM and Sun Microsystems
|
||
Inc., professional groups such as the Electronic Frontier Foundation and the
|
||
CPSR, and watchdog organizations including the American Civil Liberties
|
||
Union.
|
||
If the proposal becomes law, "it will require that every system from
|
||
AppleTalk LANs up have multiple, redundant systems to let the FBI tap
|
||
them," Banisar said.
|
||
In its proposal, the FBI suggests levying daily fines on vendors and
|
||
users of equipment that do not comply.
|
||
"We have to have the technical capability, or we are out of the business
|
||
of wiretapping," said Keir Boyd, deputy assistant director of the FBI's
|
||
technical services division in Washington. "We are not willing to back
|
||
off on the compulsory part."
|
||
Those opposed say the FBI's plan would cost U.S. industry money by
|
||
requiring that vendors and users retool existing products. The opponents
|
||
also say that the plan would hinder U.S. competitiveness by preventing
|
||
American companies from developing advanced communications equipment
|
||
and that it would pave the way for groups other than the FBI to tap
|
||
private communications.
|
||
"We are moving [to] a society where E-mail communications and video
|
||
conferencing are the norm," said. Whitfield Diffy, a cryptography engineer
|
||
at Sun in Mountain View, Calif.
|
||
Diffy said that if the FBI proposal is passed, privacy will be virtually
|
||
non-existent and "democratic government and free life could be swept
|
||
away."
|
||
All that, members of the opposition say, is not worth the value of the
|
||
estimated 600 to 800 wiretaps that the FBI conducts each year.'
|
||
Next year, the rhetoric is likely to rise as Sen. Patrick Leahy (D-VT)
|
||
and Rep. Jack Brooks (D-Texas) formally consider the proposal for inclusion
|
||
in a congressional bill .
|
||
But, for its part, the CPSR isn't waiting until the next Congress to take
|
||
action. The group recently filed a request under the Freedom of Information
|
||
Act for the FBI's reasoning behind the proposal.
|
||
Meanwhile, CPSR and other members of the consortium are still talking to
|
||
the FBI to head off what they consider an extreme proposal.
|
||
"We always offer to be helpful, to see if there are any less Draconian
|
||
solutions," said John Podesta, a consultant at the Electronic Frontier
|
||
Foundation, a lobbying group of industry professionals in Washington, who
|
||
said meetings with the FBI are "always cooperative."
|
||
But, Podesta added," [the FBI] still always seems to say,'We won't back
|
||
off of this legislation.' There will be a fight next year."
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
Part 3:
|
||
PUMP-CON BUST RUMORS FLY
|
||
|
||
Actually, here is what I heard about Pumpcon:
|
||
|
||
They had multiple terminals set up hacking cards and systems. The manager
|
||
came to the door and told Randy that there was a noise complaint.
|
||
Just as Randy was starting to talk to the manager, the Feds, AT&T security
|
||
and various other organizations busted into the room.
|
||
They Rounded up 35 people, some of which are still in jail because they
|
||
couldn't make bail. The case is a now federal one, having been turned over
|
||
to the FBI.
|
||
I've also heard that AT&T and the FBI want to turn this case into an example.
|
||
It is already high profile in the NY/CT area from what I understand, and
|
||
those out on bail have already received messages from reporters.
|
||
It would seem to me that the noise complaint was just bullshit to get them
|
||
to open up the door.
|
||
Now the question that comes to mind is how did the FBI, AT&T security and
|
||
everyone else coordinate so quickly and bust this hotel room?
|
||
Well, speculation is (as always) that someone dropped a very big dime on
|
||
Pumpcon.
|
||
There is also speculation on who did it. Right now the leader in
|
||
the polls is No Name Brand.
|
||
NNB has friends in Metromedia and AT&T security.
|
||
Keep in mind that he was busted not too long ago and returned to hacking in
|
||
record time.
|
||
His excuse for not showing up?
|
||
According to him, his ride (Orion) screwed him over and left him.
|
||
Another possibility kicked around was that Phiber did it to receive a break
|
||
on his upcomming sentencing but most people aren't going for this one.
|
||
Most are going the NNB route.
|
||
Randy's phone is tapped.
|
||
Night Ranger reportedly got away (he and Spicoli supposedly carded their
|
||
room and $110 worth of pizza).
|
||
All this info is second generation from Randy S. Hacker. Believe what you
|
||
want, make your own conclusions.
|
||
Thirty five people...they didn't have enough cells for them all and
|
||
supposedly questioned them for 10 hours. In my opinion, someone dropped a
|
||
dime on them. It is also my opinion that NNB was that person.
|
||
He is just the type of self-serving, vindictive, egotistical little fuck
|
||
to pull a stunt like that.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
Part 4:
|
||
RESPONSE TO PUMP-CON RUMORS
|
||
|
||
THESE RUMORS ARE NOT TRUE!!!!
|
||
|
||
Yes, there were computers there. NO! they WERE NOT set up to hack cards and
|
||
systems!
|
||
People were playing games on them, and a few people were calling out at
|
||
various times. The FBI was **NOT** there. AT&T security WAS there though.
|
||
The case has NOT been turned over to the feds - it's still a local thing,
|
||
and will hopefully stay that way. Only 4 people were arrested, 3 of whom are
|
||
out on bail, 1 had an outstanding warrant and was being shipped back to his
|
||
home state. He had no bail set. I talked to Randy myself, just got off the
|
||
phone with him.
|
||
He set me straight on a LOT of things. There are a LOT of places where the
|
||
cops possibly screwed up, which may help the defense. No one knows as of yet.
|
||
The charges are apparently are "Illegal use of a computer" and "Computer
|
||
trespass". There may be more charges added at a later time, and there may be
|
||
charges dropped. It's too early to tell. AT&T said there was an 800 system
|
||
in GA which was hacked "by SOMEONE in that room" and that apparently set off
|
||
flags all over. *I* personally know of NO such thing, OR system,and neither
|
||
did a few others I talked to. I DO know for sure that whatever was done, it
|
||
wasn't Randy's fault; I didn't once see him behind a terminal. I believe to
|
||
that it was a setup - PumpCon was HIGHLY announced, and there were a few who
|
||
could have benefitted from "ratting" on it.
|
||
I don't know who those people are, nor will I point any fingers.
|
||
But I guarantee you the person, if any, who set up PumpCon will wish someday
|
||
that he hadn't. Anyway, I wanted to post this to clear up the rumors that
|
||
are starting. I know I can't control them all, but some of this shitis
|
||
getting WAY out of hand.
|
||
|
||
246
|
||
+ 233
|
||
+ 237
|
||
----------
|
||
103
|
||
|
||
(PumpCon addition.... 3 rooms = 1 badge #)
|
||
|
||
The Bash... The Bullshit...The Bust... PumpCon '92.
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [5] The Rumor Mill (Unconfirmed rumors from the Underground)
|
||
Edited By: Mercenary
|
||
|
||
Part (1) : RONALD PINZ (VICTIM or RAT FINK)
|
||
|
||
In Phantasy Magazines Issue #9 Rumor Mill section, an anonymous user
|
||
found this file pertaining to Robert Pinz and has drawn these
|
||
unvalidated (as of yet) conclusions,
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
The Following information, (EDITED) has been circulating up in the New England
|
||
area of operations. The file has been validated as legal as the individual
|
||
named is known to have turned in The Purgatory BBS for having semi-legal
|
||
posted material.
|
||
|
||
Real name : Ron Pinz (Ronald Pinz)
|
||
Handles Used : IXOM
|
||
Past Handles : Dr. Disk,Bazooka Bill
|
||
Sex : Male
|
||
Age : 21
|
||
Birthdate : 06/28/71
|
||
Phone Numbers : 203-(EDITED)
|
||
: 203-(EDITED)
|
||
Address : (Edited)
|
||
City/State : Wallingford, Ct.
|
||
Zip code : 06492
|
||
|
||
Biography:
|
||
|
||
After being thrown out of the military service for computer hacking while
|
||
on duty, Its believed that Ronald is now trying to court favors from AT&T
|
||
for a $50,000 job in New Jersey by turning in phreakers and hackers.
|
||
It is already officially confirmed that Ron has turned in one BBS and
|
||
is now setting sites on other BBS's. Its too bad he doesn't know about
|
||
AT&T's policy of not hiring hackers as they figure that an ex-hacker
|
||
employee cannot be trusted,we urge you to delete him from your system
|
||
if you have any files that are not public domain.
|
||
|
||
-------------------------------------------------------------------------------
|
||
I (EDITED), find it most interesting that this phile was circulating right
|
||
before the Pump-Con Arrests, because in CUD 4.55 we find,
|
||
-------------------------------------------------------------------------------
|
||
|
||
Date: Tue, 03 Nov 92 03:00:44 EST
|
||
From: mcmullen@MINDVOX.PHANTOM.COM(John F. McMullen)
|
||
Subject: File 4--Computer Access Arrests In NY (NEWSBYTES reprint ((CR))
|
||
|
||
GREENBURGH, NEW YORK, U.S.A., 1992 NOV 3 (NB) -- The Greenburgh, New
|
||
York Police Department has announced the arrest of three individuals,
|
||
Randy P. Sigman, 40; Ronald G. Pinz, Jr, 21; and Byron J. Woodard, 18
|
||
for the alleged crimes of Unauthorized Use Of A computer and Attempted
|
||
Computer Trespass, both misdemeanors. Also arrested was Jason A.
|
||
Britain, 22 in satisfaction of a State of Arizona Fugitive From
|
||
Justice warrant.
|
||
|
||
The arrests took place in the midst of an "OctoberCon" or "PumpCon"
|
||
party billed as a "hacker get-together" at the Marriott Courtyard
|
||
Hotel in Greenburgh. . The arrests were made at approximately 4:00 AM
|
||
on Sunday morning, November 1st. The three defendants arrested for
|
||
computer crimes were granted $1,000 bail and will be arraigned on
|
||
Friday, November 6th.
|
||
|
||
Newsbytes sources said that the get together, which had attracted up
|
||
to sixty people, had dwindled to approximately twenty-five when, at
|
||
10:00 Saturday night, the police, in response to noise complaints
|
||
arrived and allegedly found computers in use accessing systems over
|
||
telephone lines. The police held the twenty-five for questioning and
|
||
called in Westchester County Assistant District Attorney Kenneth
|
||
Citarella, a prosecutor versed in computer crime, for assistance.
|
||
During the questioning period, the information on Britain as a
|
||
fugitive from Arizona was obtained and at 4:00 the three alleged
|
||
criminal trespassers and Britain were charged.
|
||
|
||
Both Lt. DeCarlo of the Greenburgh police and Citarella told Newsbytes
|
||
that the investigation is continuing and that no further information
|
||
is available at this time.
|
||
|
||
(Barbara E. McMullen & John F. McMullen/19921103)
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
Now we find that Ronald Pinz has been arrested at Pump-Con, what better way
|
||
than to court favors from AT&T than to attend a hackers conference, let
|
||
people incriminate themselves and than have the police barge in an arrest
|
||
you and the others. Ive heard AT&T security was there, Now doesnt that make
|
||
you folks out there wonder? Lets see what happens to Mr. Pinz in court.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
Part (2) : BERLIN BUSTS REPORTED
|
||
|
||
|
||
Bad news from Berlin, on Wed. Oct 25th,twelve mailboxes,25 machines,and
|
||
some thousand floppies were seized. People are charged for distributing
|
||
pirated software. The local DA refuses to give further information.
|
||
But the real thing is, some sysops couldnt resist to keep track of TOO
|
||
MUCH INFORMATION, not only names,telephone numbers,and addresses, but even
|
||
precise logs of who downloaded which software.
|
||
Authorties are believed to be planning on prosecuting users who downloaded
|
||
copyrighted materials.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
Part (3) : WINDYCON
|
||
|
||
To: All
|
||
Subject: come hither
|
||
|
||
This weekend only, at the Woodfielf Hyatt in Schaemburg..
|
||
|
||
WINDYCON!!!!
|
||
|
||
See all manners of various freaks..a must see...
|
||
|
||
We, the prestigous, will be there, feel free to attend..
|
||
|
||
Cecil Adams
|
||
Board Pariah
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [6]: PHANTASY TIDBITS: News and Views of Interest
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
Part 1: Police Officials Cited for Searching Private Computer Records
|
||
|
||
Los Angeles (AP, 30 Oct 1992) More than 45 police officials have been
|
||
cited since 1989 for using department computers to check the backgrounds
|
||
of baby sitters,house sitters, and others for personal reasons.
|
||
"Its a very serious problem", Police Commissioner Ann Reiss Lane Said
|
||
The citations came to light after a civilian Police Commission investigator
|
||
was suspended 10 days for using department computers without permission to
|
||
get confidential data on White Supremacist Tom Metzger and actor Arnold
|
||
Schwarzenegger.
|
||
The union representing Robert Bauman appealed the suspension and submitted
|
||
records showing that more than 45 department employees had been disciplined
|
||
in the last three years for illegal computer use.
|
||
Most recieved suspensions of two or three days or verbal reprimands.
|
||
As an example, Lane said Thursday, an officer might use the computer to check
|
||
the background of an individual about to marry one of the officers relatives.
|
||
Bauman's 1--day suspension without pay was upheld last week by the Civil
|
||
Service Commission. Bauman, a 23-year civilian employee, said he already
|
||
has served the suspension and was back at work. Bauman a permit processor
|
||
routinely uses police computers to check the criminal records,police files,
|
||
and tax records of people apply for police permits for massage parlors, gun
|
||
stores and pawn shops.
|
||
He said he gathered information on Metzger because he is a part-time
|
||
historian who does research on right-and left-wing political groups.
|
||
Bauman said he tapped into Schwarzeneggers files because a co-worker
|
||
was curious about the actor.
|
||
|
||
|
||
IIRG NOTE: Another case of the Police getting there wrists slapped.
|
||
Had this been a hacker he would have been screwed
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
Part 2: Subject: Call for Papers - The Third International Virus
|
||
Bulletin Conference
|
||
|
||
Amsterdam, 9th-10th September 1993
|
||
|
||
Call for Papers
|
||
|
||
The International Virus Bulletin Conference is the largest and most
|
||
prestigious annual event to address the computer virus threat in
|
||
Europe. The 1992 conference, held in Edinburgh, attracted over 200
|
||
delegates and 23 speakers, from more than 20 countries.
|
||
|
||
Abstracts of between 200 and 500 words outlining prospective papers
|
||
for presentation at next year's Virus Bulletin conference are duly
|
||
invited from all parties engaged in any capacity in combating the
|
||
computer virus threat.
|
||
|
||
Papers will be selected for their originality and appeal to a diverse
|
||
audience comprising corporate computer security staff, PC support
|
||
specialists, hardware and software developers, government, military,
|
||
public sector and corporate IT managers, researchers and others engaged
|
||
in devising technical and procedural countermeasures.
|
||
|
||
Papers covering the following topics are particularly welcome:
|
||
|
||
* Case studies of genuine virus outbreaks.
|
||
|
||
* Post-attack recovery: tools, techniques and lessons learned.
|
||
|
||
* Evaluation methods and protocols for testing anti-virus software.
|
||
|
||
* Running a virus help desk.
|
||
|
||
* Protecting file servers.
|
||
|
||
* Dealing with viruses in compressed software.
|
||
|
||
* What should be in a virus hunter's toolkit?
|
||
|
||
The conference will be held in two streams: stream one will address the
|
||
management of the virus threat, while stream two will concentrate on
|
||
|
||
The conference will be held in two streams: stream one will address the
|
||
Abstracts should be completed by December 1st 1993 and should be sent to the
|
||
Editor, Virus Bulletin, 21 The Quadrant, Abingdon Science Park, Abingdon,
|
||
Oxon OX14 3YS, UK. Fax +44 (0)235 559935.
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
Part 3: Landmark Software Decision
|
||
|
||
Published in the San Francisco Examiner is the following legal decision on
|
||
disassembly of software
|
||
|
||
"In the first binding ruling on the application of copyright law
|
||
to a common process called reverse engineering, a federal appeals
|
||
court said video game maker Accolade Inc. of San Jose could copy a
|
||
video game system's code copyrighted by Redwood City-based Sega
|
||
Enterprises Ltd. in order to design games for the Sega console.
|
||
Reverse engineering is the parctice of taking apart a product to
|
||
see how it works, and using the knowledge to design one's own
|
||
product. During the process, Accolade made a copy of Sega's
|
||
encoded computer program, designed to exclude unlicensed game
|
||
makers, in order to translate the information and extract the key
|
||
to the code. The Ninth Circuit Court of Appeal in San Francisco
|
||
said the copying did not violate Sega's federally protected
|
||
copyright on it's software package. The court said Sega's
|
||
exclusive rights over it's own programs did not entitle it to
|
||
Enterprises Ltd. in order to design games for the Sega console.
|
||
Reverse engineering is the parctice of taking apart a product to
|
||
see how it works, and using the knowledge to design one's own
|
||
product. During the process, Accolade made a copy of Sega's
|
||
encoded computer program, designed to exclude unlicensed game
|
||
makers, in order to translate the information and extract the key
|
||
to the code. The Ninth Circuit Court of Appeal in San Francisco
|
||
said the copying did not violate Sega's federally protected
|
||
copyright on it's software package. The court said Sega's
|
||
exclusive rights over it's own programs did not entitle it to
|
||
prohibit another company from learning how the Sega system worked
|
||
and designing games that would fit it, as long as those games
|
||
did not copy Sega games."
|
||
|
||
-------------------------------------------------------------------------------
|
||
|
||
Part 4: SIXTH INTERNATIONAL COMPUTER SECURITY & VIRUS CONFERENCE
|
||
and Exposition
|
||
|
||
sponsored by DPMA Fin.Ind.Chapter in cooperation with
|
||
ACM-SIGSAC, BCS, CMA, COS, EDPAAph, ISSAny, NUInypc, IEEE Computer Society
|
||
|
||
C A L L F O R P A P E R S
|
||
|
||
Approximately 500 attendees will hear 90 speakers and 53 vendors over 3 days
|
||
Wednesday thru Friday - March 10-12, 1993 - New York Ramada Madison Square
|
||
|
||
YOUR AUDIENCE:
|
||
|
||
Past attendees have represented industry, military
|
||
government, forensic and academic settings -
|
||
creators and users of related software and hardware.
|
||
|
||
They travel from U.S. and many international locations
|
||
and have titles such as MIS Director, Security Analyst,
|
||
Operations Manager, Investigator, Programming Leader
|
||
|
||
TOPICS OF INTEREST INCLUDE (but are not limited to):
|
||
|
||
- prevention, detection, and recovery from viruses,
|
||
crackers, and other unauthorized usage
|
||
- oritinal research in these and related topics
|
||
- survey of products and techniques available
|
||
- particulars of LSN, UNIX, cryptography, military use
|
||
- Computer crime, law, data liability, related contexts
|
||
= US/international sharing of research & techniques
|
||
- case studies of mainframe, pc &/or network security, e.g.,
|
||
- 1992 hurricane, flood, fire disaster recovery
|
||
- recent court decisions
|
||
- security implementation and user awareness in industry
|
||
|
||
PAPER SUBMISSION:
|
||
|
||
Send a draft final paper for receipt by Wednesday, 11/11/92.
|
||
Address to Judy Brand, Conference Chair, box 6313 FDR Station,
|
||
New York, NY 10150, USA. Please include a small photo and
|
||
introductory bio not exceeding 50 words. Successful submittors
|
||
or co-authors are expected to present in person. Presenters
|
||
receive the Conference Proceedings and complimentary admission.
|
||
|
||
PAPER FORMAT:
|
||
|
||
Send one original and three copies. When making the copies,
|
||
please cover over the author name(s) and other identifying data.
|
||
Each paper goes to three revieweers.
|
||
|
||
Type double spaced, with page# below bottom line (may be
|
||
handwritten): TITLE (caps); Name; Position, Affiliation;
|
||
Telephone, City/State/Zip, Electronic Address (optional).
|
||
|
||
NOTIFICATION:
|
||
|
||
Written and (where practicable) telephoned confirmation will
|
||
be initiated by Monday, 1/13/93, to facilitate low cost travel.
|
||
Those needing earlier notification should attach a note.
|
||
|
||
You may be asked to perform specific revisions to be accepted.
|
||
Nobody can guarantee you a place without an acceptable paper.
|
||
|
||
AT THE CONFERENCE:
|
||
|
||
There are five tracks. Time your presentation to last
|
||
40 minutes and have clear relation to your paper. A committee
|
||
member will preside over your assigned room and adhere to schedule.
|
||
|
||
Don't hesitate to submit a presentation you've given elsewhere
|
||
to a more specialized audience. Most attendees will find it
|
||
please cover over the author name(s) and other identifying data.
|
||
Each paper goes to three revieweers.
|
||
|
||
Type double spaced, with page# below bottom line (may be
|
||
handwritten): TITLE (caps); Name; Position, Affiliation;
|
||
Telephone, City/State/Zip, Electronic Address (optional).
|
||
|
||
NOTIFICATION:
|
||
|
||
Written and (where practicable) telephoned confirmation will
|
||
be initiated by Monday, 1/13/93, to facilitate low cost travel.
|
||
Those needing earlier notification should attach a note.
|
||
|
||
You may be asked to perform specific revisions to be accepted.
|
||
Nobody can guarantee you a place without an acceptable paper.
|
||
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [7]: IIRG Distribution Sites
|
||
(or Gateways to Oblivion)
|
||
|
||
|
||
|
||
////// ////// /////// ////////
|
||
// // // // //
|
||
// // /////// // ////
|
||
// // // // // //
|
||
////// * ////// * // // * /////////
|
||
|
||
|
||
|
||
|
||
IIRG World HQ: Dark Shadows
|
||
19.2/9600 Baud HST
|
||
24 Hours a Day
|
||
1.2 Gigs Online
|
||
Sysop: Anubis
|
||
2 Nodes
|
||
(203)-628-9660
|
||
|
||
|
||
IIRG Distribution Site 1: Wired World BBS
|
||
INC Europe
|
||
TPC Courier (WHQ)
|
||
THP
|
||
IIRG Distribution Site
|
||
Sysop: Digital Justice
|
||
+39-89-254138
|
||
|
||
IIRG Distribution Site 2: Cyberdyne Network Germany
|
||
United Forces
|
||
Sysop: E605
|
||
+49-5341-59004
|
||
+49-5341-54052
|
||
|
||
|
||
IIRG Distribution Site 3: The Sanitarium
|
||
Sysops: Morbid Angel [INC/ACID]
|
||
Spectral Illusion [ACID/RAZOR]
|
||
IIRG Distribution Site
|
||
ACID Member Board
|
||
INC Courier Board
|
||
RAZOR 1911 Courier Board
|
||
VISA World Headquarters
|
||
(817)PRI-VATE
|
||
|
||
IIRG Distribution Site 4: The WareHouse
|
||
(203)-231-8589 14.4
|
||
(203)-231-8588 9600
|
||
OVER A GIG ONLINE
|
||
Sysop: Ionizer
|
||
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
|
||
Section [8]: Phantasy Distribution Sites
|
||
|
||
Phantasy's Distribution Site's are continually growing,we apologize if you
|
||
called a board and didn't find the Mag. Network Distribution Sites will
|
||
have the Issues first, we suggest calling one of them if a problem does
|
||
arise.
|
||
|
||
|
||
1. Lightning Systems
|
||
(414) 363-4282
|
||
Sixty Million Bytes OnLine
|
||
USRobotics Dual Standard HST/V.32bis
|
||
2400 thru 14.4k v.32bis/HST
|
||
|
||
2. Sycamore Elite
|
||
19,200-1200 Baud HST, 24 Hours a day
|
||
(815) 895-5573
|
||
|
||
3. The Works BBS at (617-861-8976)
|
||
Largest Text Files BBS in the world, 3500+ text files online.
|
||
2400-300 Baud, 24 Hours a day
|
||
|
||
4. Pipers Pit BBS
|
||
19,200-9600 HST ONLY!!
|
||
24 Hours a Day
|
||
THG Distro Site 1300 Megs
|
||
(203)PRI-VATE [2 Nodes]
|
||
|
||
5. Blitzkrieg BBS TAP Magazine
|
||
(502)-499-8933 P.O. BOX 20264
|
||
Home of TAP MAgazine Louisville,KY. 40250-0264
|
||
|
||
6. The Dickinson Nightlight
|
||
(713)-337-1452
|
||
Der WeltanSchauung Distro Site (World View Magazine)
|
||
Phantasy Distro Site
|
||
|
||
|
||
PHANTASY is also available on:
|
||
|
||
1. RIPCO BBS (312)528-5020
|
||
2. KRACKER BOX (303)438-1481
|
||
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
|
||
PHANTASY(C) IIRG 1991,1992
|
||
May Odin Guide Your Way!
|
||
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- |