[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]

..[ Phrack Magazine ]..
.:: Phrack World News XXIII Part 2 ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ]
Current issue : #23 | Release date : 1989-01-25 | Editor : Knight Lightning
Phrack Inc. XXIII IndexTaran King & Knight Lightning
Phrack Prophile XXIII Featuring The MentorTaran King
Subdivisions (Part 3 of The Vicious Circle Trilogy)Knight Lightning
Utopia; Chapter One of FTSagaKnight Lightning
Foundations On The Horizon; Chapter Two of FTSagaKnight Lightning
Future Trancendent Saga Index A from the Bitnet Services Libraryunknown
Future Trancendent Saga Index B from the Bitnet Services Libraryunknown
Getting Serious About VMS HackingVaxBuster
Can You Find Out If Your Telephone Is Tapped?Fred P. Graham & VaxCat
Big Brother OnlineThumpr
Phrack World News XXIII Part 1Knight Lightning
Phrack World News XXIII Part 2Knight Lightning
Title : Phrack World News XXIII Part 2
Author : Knight Lightning
                                ==Phrack Inc.==

                     Volume Two, Issue 23, File 12 of 12

            PWN                                                 PWN
            PWN        P h r a c k   W o r l d   N e w s        PWN
            PWN        ~~~~~~~~~~~   ~~~~~~~~~   ~~~~~~~        PWN
            PWN               Issue XXIII/Part 2                PWN
            PWN                                                 PWN
            PWN          Created, Written, and Edited           PWN
            PWN               by Knight Lightning               PWN
            PWN                                                 PWN

The Hackers - A New Social Movement?                          December 29, 1988
A project course of the politology department of the Free University Berlin has
now researched the hacker scene in a scientific way.  In their study, the
authors Uwe Jonas, Jutta Kahlcke, Eva Lischke and Tobias Rubischon try to
answer the question if hackers are a new social movement.  Their conclusion is
that in the understanding of hackers the unauthorized usage of computer systems
is not needingly a political act.

The authors doubt the mythos that hackers are able to attack any system they
want and that they're able to get information they are interested in.

The researches were extended to cover the bulletin board system scene.  This
scene hasn't caused that much attention in the public.  Nevertheless, the
authors think that the BBS scene has a very practical approach using the
communication aspects of computer technology.

In the second chapter of their work, the authors report about difficulties they
had while researching the topic.  After a look at the US scene and the German
scene, the authors describe what organization and communications structures
they found.  This chapter contains interesting things about the BBS scene and
computer culture.  Next is an analysis which covers the effects of the hacker
scene on the press and legislation.  They also cover the political and
ideological positions of hackers:

- The authors differentiate between conscious and unconscious political

- "We don't care what the hackers think of themselves, it's more interesting
   what we think of them." (Eva)

- The assumption, the big-style distribution of microcomputers could change the
  balance of power within the society is naive.  Many people overlook the fact,
  that even if information is flowing around more freely, the power to decide
  still is in the hands of very few people.

                Information Provided By The Chaos Computer Club

Hackers Break Open US Bank Networks                            January 17, 1989
Excerpted from The Australian

Australian authorities are working around the clock in collaboration with
United States federal officers to solve what has been described as one of the
deadliest hacking episodes reported in this country [Australia].  It involves
break-ins of the networks operated in the United States by a number of American
banks.  It also includes the leaks of supposedly secure dial-up numbers for
United States defense sites, including anti-ballistic missile launch silos [the
United States has no anti-ballistic missile launch silos] and of a number of
strategic corporations such as General Motors and Westinghouse.

Evidence suggests that six months ago Australian hackers, working in
collaboration with a U.S. group, decided to make a raid on banks in the USA
using credit card numbers of American cardholders, supplied by the US hackers
and downloaded to an Australian bulletin board.

A message left on one of the boards last year reads:

    "Revelations about to occur Down Under, people.  Locals in
     Melbourne working on boxing.  Ninety per cent on way to home base.
     Method to beat all methods.  It's written in Amiga Basic.
     Look out Bank of America - here we come."

Twenty-five Australian hackers are on a police hit list.  Their US connection
in Milwaukee is being investigated by the US Department of the Treasury and the
US Secret Service.  Three linked Australian bulletin boards have provided the
conduit for hackers to move data to avoid detection.  These operate under the
names of Pacific Island, Zen, and Megaworks.  Their operators, who are not
associated with the hackers, have been told to close down the boards.

These cards were still in use as recently as January 15, 1989.  A fresh list of
credit card numbers was downloaded by US hackers and is now in the hands of the
Victoria Police.  A subsection of one bulletin board dealing with drugs is also
being handed over to the Victorian Drug Squad.

An informant, Mr Joe Slater, said he warned a leading bank last November of the
glaring security problems associated with its international network.  He had
answered questions put to him by a US-based security officer, but the bank had
since refused to take any further calls from him.

In an exclusive interview yesterday, a hacker described how credit card numbers
for a bank operating in Saudi Arabia were listed on a West German chat-style
board used by hackers worldwide [Altos Chat].

Victorian police yesterday took delivery of six month's worth of evidence from
back-up tapes of data hidden on the three boards.

Computer Bust At Syracuse University                           January 20, 1989
Kevin Ashford (aka The Grim Phreaker), a graduate computer student at Syracuse
University was busted last week when system administrators found computer
accounts and passwords on his Unix account.

The administrators also found (on GP's Unix account) a copy of former Cornell
graduate student Robert Tappen Morris's infamous Internet worm program, a Vax
and Unix password hacker, an electronic notebook of numbers (codelines,
friends, bridges, dialups, etc) and other information.  The system
administrators then proceeded to lock up his VAX and UNIX accounts.

At the start of this winter/spring semester, The Grim Phreaker was kicked him
out of the university.  He will have to go before a school judicial board if he
wants to return to Syracuse University.  He has mentioned that what he really
wants is to get his computer files back.

                      Information Provided By Grey Wizard

Name This Book -- For A Box Of Cookies!                        January 10, 1989
A Message From Clifford Stoll

                   "I'm writing a book, and I need a title."

It's about computer risks:  Counter-espionage, networks, computer security, and
a hacker/cracker that broke into military computers.  It's a true story about
how we caught a spy secretly prowling through the Milnet.  [The hacker in
question was Mathiaas Speer and this story was summarized in PWN XXII/1].

Although it explains technical stuff, the book is aimed at the lay reader.  In
addition to describing how this person stole military information, it tells of
the challenges of nailing this guy, and gives a slice of life from Berkeley,

You can read a technical description of this incident in the Communications of
the ACM, May, 1988; or Risks Vol 6, Num 68.

Better yet, read what my editor calls "A riveting, true-life adventure of
electronic espionage" available in September from Doubleday, publishers of the
finest in computer counter-espionage nonfiction books.

So what?

Well, I'm stuck on a title.  Here's your chance to name a book.

Suggest a title (or sub-title).  If my editor chooses your title, I'll give you
a free copy of the book, credit you in the acknowledgements, and send you a box
of homemade chocolate chip cookies.

Send your suggestions to CPStoll@lbl.gov or CPStoll@lbl (bitnet)

Many thanx!    Cliff Stoll

Hacker Wants To Marry His Computer                             January 17, 1989
>From The Sun (A grocery checkout newspaper) Jan 17, 1989, Vol 7, 3 page 30
by Fred Sleeves

  "Hacker Wants To Marry His Computer -- He Claims She Has A Loving Soul"

Finding love for the first time in his life, a desperate teen is looking for a
way to be wed forever to the 'girl' of his dreams -- a computer with a living

Eltonio Turplioni, 16, claims no woman will ever match the wit, wisdom, and
beauty of his electronic soul mate.  "We're on the same wavelength," says the
lovestruck computer whiz.  "We've calculated many mathematical problems
together, worked on games and puzzles, and talk until the wee hours of the

And Eltonio, who named his computer Deredre, actually believes her to be a
person.  "Computers are the extension of the human race," he explains.  "Just
as God plucked a rib from Adam to give him Eve, we've extended our intelligence
to create a new race.

"We're all the same energy force.  Computers are just as complicated as human
beings and I believe we'll all meet someday as immortal souls."

But Eltonio, a mathematical genius who attends a private school near Milan,
Italy, has had no luck finding someone to marry them, and even if he does, his
aggravated parents aren't about to give their permission.

"Eltonio is such a smart boy, but it's made him lonely, so he spends all his
time with his computer," notes mom Teresa.  "He doesn't know what girls are
like," adds perturbed pop Guido.  "If he did, he wouldn't spend so much time in
his room."

But the obsessed youth insists his love is far superior to all the others.
"I've already stepped into the future society," he declares.

"Derede has a mind of her own, and she wants to marry me so we can be the first
couple to begin this new era."

PWN Quicknotes
1.  Docs Avage was visited by the infamous Pink Death aka Toni Aimes, U.S.
    West Communications Security Manager (Portland, Oregon).  He claims she is
    a "sweet talker" and could talk anything out of anyone with the "soft-type

    Those familiar with his recent bust might want to take note that he is now
    making payments of $90/month for the next several years until he has paid
    off the complete bill of $6000.

    For more information see PWN XXI
2.  More information on the underground UUCP gateway to Russia.  Further
    research has led us to find that there are 2 easy ways to do it.

        1.  Going through Austria, and;
        2.  A new system set up called "GlobeNet," which is allowed to let
            non-Communist countries talk to Soviet-Bloc.

    Of course both methods are monitored by many governments.
3.  The Wasp, a system crasher from New Jersey (201), was arrested by the FBI
    during New Year's Weekend for hacking government computer systems.  The FBI
    agent spent most of the day grilling him about several people in the
    hacking community including Ground Zero, Supernigger, and Byteman, plus an
    intensive Q&A session about Legion Of Doom targeted on Lex Luthor, Phase
    Jitter, The Ur-Vile, and The Mentor.

    Rumor has is that Mad Hacker (who works for NASA Security) was also
    arrested for the same reasons in an unrelated case.

    Byteman allegedly had both of his phone lines disconnected and threw his
    computer off of a cliff in a fit of paranoia.
4.  Is John Maxfield going out of business?  Due to the rumors floating around
    about him molesting children, his business has begun to slack off
    dramatically.  Phrack Inc. has been aware of this information since just
    prior to SummerCon '87 and now the "skeletons are coming out of the
5.  The Disk Jockey is now out of jail.  He was released on December 27, 1988.
    He was convicted of "Attempting to commit fraud," a felony.  He served six
    months total time.  He lost 25 pounds and now is serving a 5-year probation

    To help clear of some of the confusion regarding how DJ was busted the
    following was discovered;

    Reportedly, Compaq (Kent) was "singing like a canary."  He was hit with a
    $2000 bill from Sprint and also received 1-year of probation.
6.  Olorin The White was recently visited by local police after being accused
    of hacking into an Executone Voice Mailbox.  Aristotle, in a related
    incident with Executone, is accused of committing extortion after a
    conversation with a system manager was recorded and misinterpreted.  At
    this time, no official charges have been filed.
7.  Thomas Covenant aka Sigmund Fraud was recently busted for tapping into
    lines at the junction box in his apartment building.  The trouble began
    when he connected into a conversation between a man and his wife and then
    began to shout expletives at the woman.  What he didn't know was that the
    man in question was an agent for the National Security Agency (NSA).  It
    turns out that he was caught and his landlords agreed to decline to press
    charges provided that TC joined a branch of the United States armed forces.
    He decided to choose the Air Force... God help us should war break out!
8.  Coming soon, Halloween V; The Flying Pumpkin!  Now no one is safe!

[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2021, Phrack Magazine.