==Phrack Inc.== Volume Three, Issue 27, File 11 of 12 PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN P h r a c k W o r l d N e w s PWN PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN PWN Issue XXVII/Part 2 PWN PWN PWN PWN June 20, 1989 PWN PWN PWN PWN Created, Written, and Edited PWN PWN by Knight Lightning PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN Robert T. Morris Suspended From Cornell May 25, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Taken from the New York Times Cornell University has suspended the graduate student identified by school officials as the author of "the Internet worm." In a May 16th letter to Robert Tappan Moris, age 23, the dean of the Cornell University Graduate School said a university panel had found him guilty of violating the school's Code of Academic Integrity. He will be suspended until the beginning of the fall semester of 1990, and then could reapply. No criminal charges have been filed against Morris. A federal grand jury this year forwarded its recommendations to the Justice Department, which has not taken any action. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Justice Department Wary in Computer Case May 28, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Matthew Spina (Syracuse Herald-American) "Is Washington Fearful Of Losing A Landmark Trial?" Some computer experts theorize that the Justice Department, afraid of bungling what could become a landmark computer case, still doesn't know how to treat the Cornell student whose computer worm slithered nationwide in November, 1988. A further concern in Washington: A trial in the case might embarrass the Department of Defense if its scientists are asked to detail how their computers were among the thousands crippled by the worm. For several months, the decision on how to charge 23-year-old Robert T. Morris, Jr. had been before Mark Richard, a deputy assistant attorney general. Within the last few weeks, Richard made a decision that now is being reviewed by an assistant attorney general, according to a computer professional who has been talking with the Justice Department. "I thought we would have heard something from Washington by now," said Andrew Baxtoer, the assistant U.S. attorney who in November and December presented the case to a grand jury in Syracuse. The grand jury's report was sent on the the Justice Department, which refuses to comment publicly on the matter because Morris has not been indicted. "Within the next two weeks I assume that a decision will be made," said one official. "If they decide to begin an expensive trial, they have to make sure they win so as not to damage future attempts to prosecute under that law," said Eugene H. Spafford, an assistant professor at Purdue University whose analysis of the worm has helped federal investigators. "If they decide not to prosecute, and the total thing that happens is he gets suspended (from Cornell), I will be outraged." So far, Cornell has taken the only disciplinary measure against Morris, suspending him for the 1989-90 academic year. But the graduate student left the computer science department early in November, the day after the worm spread out of a computer in Upson Hall. Morris, a computer science graduate student, has been called the author of a rogue computer program, called a worm, that was spread from a Cornell University computer. The program was designed to reproduce and infect any computer linked to the Internet, a network shared by colleges, research centers and military institutions. However, experts say an error caused the program to replicate out of control, sending thousands of copies into thousands of computers. If Morris is to be charged with a felony, prosecutors would then have to show he intended to destroy or extract information. Proving that would be difficult since the program neither destroyed nor removed information from any computer. To convict Morris on most lesser charges, prosecutors would have to show he intended to harm computers. Prosecutors also could use a misdemeanor charge requiring them to prove only that Morris gained access to a federal government computer. The worm did reach computers at the Army Ballistics Research Laboratory and NASA's Langley Research Center, among others. Some computer experts wonder, though, if Defense Department officials will be reluctant to testify publicly about how their computers were penetrated -- even those computers holding non-classified information. In February, at a computer convention in San Diego, Defense Department computer experts detailed some security improvements made to the network since November, but then refused to release copies of their presentation to people at the seminar. The FBI -- which enforces the Computer Fraud and Abuse Act of 1986 -- and some people in the computer industry are pushing for a vigorous prosecution to display a strong case against computer hacking. Others in the industry, including some of Morris' friends from Harvard University and Cornell, urge leniency because he was trying to demonstrate security flaws with computers. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Other articles about Robert Tappan Morris, Jr. and the Internet Worm are; "Computer Network Disrupted By 'Virus'" (11/03/88) PWN XXII/Part 2 "Virus Attack" (11/06/88) PWN XXII/Part 2 "The Computer Jam: How It Came About" (11/08/88) PWN XXII/Part 2 "US Is Moving To Restrict {...} Virus" (11/11/88) PWN XXII/Part 2 * "FBI Studies Possible Charges In Virus" (11/12/88) PWN XXII/Part 2 "Big Guns Take Aim At Virus" (11/21/88) PWN XXII/Part 3 "Congressman Plan Hearings On Virus" (11/27/88) PWN XXII/Part 3 "Pentagon Severs Military {...} Virus" (11/30/88) PWN XXII/Part 3 * "Networks Of Computers At Risk From Invaders" (12/03/88) PWN XXII/Part 4 * "Computer Virus Eradication Act of 1988" (12/05/88) PWN XXII/Part 4 * "Breaking Into Computers {...}, Pure and Simple" (12/04/88) PWN XXIV/Part 1 * "Cornell Panel Concludes Morris {...} Virus" (04/06/89) PWN XXVI/Part 1 * - Indicates that the article was not directly related to Robert Morris, but did discuss him as well as the Internet Worm incident. _______________________________________________________________________________ SouthernNet's Anti-Hacker Psychological Con Game April 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ WARNING! Your call is being intercepted! Error: Setting may not be changed by callers. Welcome to: S o u t h e r n N e t I n c. You have reached the SouthernNet Fraud Department, the authorization code you are attempting to use is not valid. Hacking and illegal use of codes are violations of state and federal laws. We are currently conducting an investigaion for code abuse in your area and we are coordinating the investigation with law enforcement authorities. Persons identified hacking or abusing codes will be prosecuted to the full extent of the law. I'll see you soon, Hacker Tracker - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Hold for additional information: Hacker Tracker is unavailable right now; however, you may avoid possible arrest and/or prosecution by calling Hacker Tracker in person. You may contact Mr. Tracker between the hours of 9:00 AM and 5:00 PM Eastern Standard Time, Monday - Friday, simply by dialing the access number you have just used and code number 101010 or 011010 if the access you have used requires a seven digit code. Just hold the line for 10 seconds and your call will automatically be routed to Mr. Tracker at no charge to you. This is *NOT* a trick and it will be the intention of SouthernNet Inc. to settle this matter without involving law enforcement authorities if you cooperate with our fraud department 100%. It will certainly be to your advantage to contact Mr. Tracker as this will reflect your own decision to assist and avoid prosecution by our company!!! I'll be expecting your call. Hacker Tracker Hold a sec... Engaging Auto Page for Hacker Tracker... 50 seconds till disconnect 40 seconds till disconnect 30 seconds till disconnect 20 seconds till disconnect 10 seconds till disconnect 5 seconds till disconnect NO CARRIER [Do you think anyone believed this and actually called "Hacker Tracker?" -KL] _______________________________________________________________________________ What's Happening: Computer Security Up June 4, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Taken from Gannett Westchester Newspapers [Comments in brackets from Delta-Master] High-tech companies are spending 64% more [than they previously spent] on computer security, according to a recent survey conducted by the National Center for Computer Crime Data in Los Angeles. The group surveyed 3,500 law enforcement agencies and computer security experts about computer crime. The prosecution rate is also up -- 6.4% in 1988 from only 2.4% during 1987. Contrary to popular image, computer hackers aren't always young boys. The study found that 32% of those arrested for computer crimes were female, while only 14% were under 21. The study said 45% of hackers were 25 to 30 years old. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Comments from Delta-Master ~~~~~~~~~~~~~~~~~~~~~~~~~~ I do not know about you people, but the public's confusion about hackers starts to bother me when they make errors. Seriously, I know of only a few hackers over the age of 21. The fact that the newspapers also equate the thug-like computer criminals with the mastermind-criminal type hacker (you guys) is also pretty annoying, wouldn't you agree? One key phrase you must note: "32% OF THOSE ARRESTED." Oh well, such are the mistakes of newspapers. _______________________________________________________________________________ Public Service Commission Bans Operator Companies April 24, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By Jerri Stroud (St. Louis Post-Dispatch) The Missouri Public Service Commission voted 4-1 last week to ban providers of so-called alternative operator services in Missouri because allowing the companies to operate is "not in the public interest." Alternative operator services companies contract with hotels, motels colleges, hospitals, airports, restaurants and other facilities to provide operator assistance to customers using pay telephones or house phones. Consumer groups have complained about price-gouging by the companies nationwide. Mark Wheatley, a lawyer for the Office of Public Council, praised the commission's decision. The Office of Public Council has received numerous complaints about excessive rates and surcharges by alternative operator services companies, said Wheatley. Some alternative operator services companies also have accepted other companies' credit cards without authorization from the companies issuing the cards, he said. "We feel that it's an extremely important decision by the commission." said Wheatley. But he said he expects the companies affected by the ruling to appeal. Lawyers for the alternative operator services companies could not be reached for comment. In it's ruling, the commission said many consumers aren't aware of the rates charged by the alternative operator services companies until they receive "a bill for operator services at prices higher than those to which he is accustomed." Consumer groups say the rates often are twice or three times the rates charged by better-known long-distance companies. Even if an operator service company identifies itself when a consumer makes a call, the commission said many consumers don't understand the significance of the identification. "If the end user is not educated as to the intricacies of using an alternative operator services provider, he does not truly have a meaningful choice..." the commission said. The ruling only affects intrastate calls handled by alternative operator services companies, but it may effectively prevent the companies from providing interstate service as well. The commission specifically denied tariff requests from International Telecharge Inc. and American Operator Services Inc. The commission also directed three other companies -- Teleconnect Inc., Dial US, and Dial USA -- to file new tariffs consistent with the ruling. The ruling allows companies to operate who provide operator services in connection with their business -- long-distance carriers and local telephone companies, for example. But the commission also placed limits on these companies. Under the ruling, operator services companies must: * Identify themselves to the caller as well as to the party being billed by the call (in the case of a collect or third-party call). * Quote rates to the caller or billed party on request, without charge. * Use calling card verification procedures acceptable to the companies issuing the cards. * Post in a prominent position the company's name, detailed complaint procedures and instruction on how to reach the local telephone company operator and other long-distance carriers. * Transfer emergency traffic to the local telephone company or American Telephone & Telegraph Co. until the alternative services provider can show that it can handle emergency calls adequately. _______________________________________________________________________________ Fax Attack May 13, 1989 ~~~~~~~~~~ Taken from The Ann Arbor News "Governor's Attempt To Ban Unsolicited Advertisements Backfires!" HARTFORD, Conn - The great fax attack of 1989 -- an all-out lobbying campaign against a bill banning unsolicited facsimile advertising -- may have backfired when the governor's fax machine was jammed for hours with unwanted messages. Starting Thursday, May 11, and continuing Friday, May 12, Governor William A. O'Neill's fax machine has been beeping constantly, spitting out unwanted messages from angry businesses that advertise by fax. The businesses oppose a bill now awaiting O'Neill's signature that would prohibit them from marketing their products by fax without first obtaining the permission of the recipient. Violators would face a $200 fine. Starting Thursday morning, dozens of Connecticut businesses faxed to O'Neill's office a form letter arguing against the fax ban. The stream of fax messages was so constant (40 came in before 10 AM) that the governor's office turned off the fax machine Thursday (May 11). O'Neill's press secretary, Jon. L. Sandberg, said the governor still hasn't decided whether he will sign the bill. But aides to the governor said the persistent lobbying campaign proved how annoying unwanted messages can be. The inconvenience was compounded because the governor's office was unable to use its fax machine to receive information about spring flooding around the state. _______________________________________________________________________________ NYNEX Announces Info-Look Gateway April 28, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Introducing a new service for accessing information and more... all through your personal computer! Starting in May 1989, New York Telephone's INFO-LOOK (tm) Gateway Service can be your link to accessing a variety of information, products and services. The INFO-LOOK Gateway simplifies on-line computer access to a variety of information providers. When you call the Gateway phone number through your modem, you'll be able to scan a menu of information services. The types of information services you may choose from include: Entertainment, business, health, food, news, weather, sports, travel, government, educational and reference information. The services, some interactive, are provided by independent companies. The INFO-LOOK Gateway is easy to use -- even if you're relatively new to using a PC. What you'll need to use the INFO-LOOK Gateway 1. Virtually any type of personal computer. 2. A modem (300, 1200, or 2400 Baud), and communications software. This enables your computer to communicate with other computers via the telephone system. 3. A New York Telephone Calling Card. If you need a New York Telephone Calling Card, (it's FREE), call your service representative whose number appears on page one of your New York Telephone bill. Charges for using the INFO-LOOK Gateway There are ** no ** Gateway enrollment fees and ** no ** monthly subscription charges. In most cases, you will be charged (New York people only): o A local call to reach the INFO-LOOK Gateway. o While you're browsing the Gateway directory of services, or moving between services, you pay $.05 a minute. o Once you connect to a service, the charge is determined by the Service Provider. Some services have a per-minute usage charge. Some services are free. The charges for each service are listed in the Gateway menu. You'll find most charges itemized on your monthly New York Telephone bill. Some Service Providers may decide to bill you separately and directly for use of their services. Call for more information: To get your free INFO-LOOK Gateway information booklet call (toll- free) 1-800-338-2720, Ext. 20, any day from 9 a.m. to 11 p.m. Note: New York Telephone does not provide or control the services offered through the INFO-LOOK Gateway Service. They are provided by independent companies, which are responsible for the content, character, and quality of their services. The predictions run $5 billion now and another $5-10 billion by 1991. [INFO-LOOK is already operating in Bell South and Bell Atlantic.] _______________________________________________________________________________ Pacific Bell Plans Access To Computers June 9, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Taken from Santa Cruz Sentinel (Section B) SAN FRANCISCO (AP) -- Pacific Bell said Thursday it hopes to compete with the popularity of television by offering people easy access to computerized libraries, bulletin boards and the use of electronic mail. PacBell's California On-line -- which will be available to anybody with a personal computer, telephone and calling card -- will be among the first in the nation to use a graphic-based system that simplifies procedures so only a rudimentary familiarity with computers is needed. "It's going to offer our customers a supplement to their current leisure activities... and among other things we've seen (in trials) a lot of people who got away from the TV," said Roger P. Conrad, director of Videotex Gateway Services. "We feel this is a more productive way for people to spend their lives and we think a lot of users are going to agree," he added. Users will pay "info-entrepreneurs" fees based on the time they use various services and will be billed on their monthly telephone statements. Unlike some on-line information services, users do not have to subscribe ahead of time. Conrad said the types of services are limited only by vendors' imaginations. PacBell will make money by selling telecommunication line use to the companies. _______________________________________________________________________________ Bulletin Boards Of Argentina June 5, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Country Code = 54 (Argentina) City Code = 1 (Buenos Aires) This list might be slightly incorrect due to the passage of time. The last update was on December 23, 1986. Name Hours Of Operation ======= Number= ---- Beta 23:00 - 6:30 802-0288 C-Mania 21:00 - 7:00 362-8843 CBM 16:00 - 12:00 90-4988 Century 21 24 hours 632-7070 Cerebruss 24 hours 47-2717 Cerebruss Information ? 48-8300 48-9886 Databank ? 44-9760 Drean Conection ? 953-2523 Los Pinos 13:00 - 19:00 21-0375 Magenta ? 392-0124 Magenta ? 392-0016 Maxes 23:00 - 7:00 542-2695 Mendieta 22:00 - 8:00 654-6999 Pirates Cove 24:00 - 6:00 783-5023 Sanctuary 24:00 - 3:00 641-4608 Soft-work 22:30 - 9:00 88-2065 TCConection 19:00 - 12:00 22-4197 The Connection 24 Hours 82-5780 The Hacker 23:00 - 7:00 748-2005 Tiger ? 784-2226 XCASA ? 611-8136 BBS-IOM 24 Hours 804-3602 Note: The settings for all systems listed above are Even, 7, 1. Contributed by Noli _______________________________________________________________________________