[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]

..[ Phrack Magazine ]..
.:: Phrack World News XXIV ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ]
Current issue : #24 | Release date : 1989-02-25 | Editor : Taran King
Phrack Inc. XXIV IndexKnight Lightning & Taran King
Phrack Pro-Phile XXIV Featuring Chanda LeirTaran King
Limbo To Infinity; Chapter Three of FTSagaKnight Lightning
Frontiers; Chapter Four of FTSagaKnight Lightning
Control Office Administration Of Enhanced 911 ServiceThe Eavesdropper
Glossary Terminology For Enhanced 911 ServiceThe Eavesdropper
Advanced Bitnet ProceduresVaxBuster
Special Area Codesunknown
Lifting Ma Bell's Cloak Of SecrecyVaxCat
Network ProgressionDedicated Link
Phrack World News XXIVKnight Lightning
Phrack World News XXIVKnight Lightning
Phrack World News XXIVKnight Lightning
Title : Phrack World News XXIV
Author : Knight Lightning
                                ==Phrack Inc.==

                     Volume Two, Issue 24, File 13 of 13

            PWN                                                 PWN
            PWN        P h r a c k   W o r l d   N e w s        PWN
            PWN        ~~~~~~~~~~~   ~~~~~~~~~   ~~~~~~~        PWN
            PWN                Issue XXIV/Part 3                PWN
            PWN                                                 PWN
            PWN                February 25, 1989                PWN
            PWN                                                 PWN
            PWN          Created, Written, and Edited           PWN
            PWN               by Knight Lightning               PWN
            PWN                                                 PWN

The Judas Contract Fulfilled!                                  January 24, 1989
    "...the other thing that made me mad was that I consider myself, at
     least I used to consider myself, a person who was pretty careful
     about who I trust, basically nobody had my home number, and few
     people even knew where I really lived..."

                                                 -The Disk Jockey

The following story, as told by The Disk Jockey, is a prime example of the
dangers that exist in the phreak/hack community when sharing trust with those
who have made The Judas Contract.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Let me briefly explain how I got caught...

A hacker named Compaq was busted after someone turned him in for using Sprint
codes.  While executing the search warrant, the state police noticed that he
had an excessive amount of computer equipment which had origins that Compaq
could not explain.

After checking around (I imagine checking serial numbers that Compaq had not
removed), the police found that the equipment was obtained illegally.  Compaq
then proceeded to tell the police that I, Doug Nelson (as he thought my name
was) had brought them to him (true).

Meanwhile, Compaq was talking to me and he told me that he was keeping his
mouth shut the entire time.  Keep in mind that I had been talking to this guy
for quite a long time previously and thought that I knew him quite well.  I
felt that I was quite a preceptive person.

As time went by, little did I know, Compaq was having meetings again and again
with the state police as well as the Federal Bureau of Investigation (FBI)
concerning finding out who I was.  He gave them a complete description of me,
and where I (correctly) went to school, but again, he was SURE my name was
Douglas Nelson, and since my phone had previously been in that name, he felt
assured that he was correct.  The Police checked with Illinois and couldn't
find license plates or a driver's license in that name.  He had remembered
seeing Illinois license plates on my car.

They were stuck until Compaq had a wonderful:  He and I had went out to dinner
and over the course of conversation, I mentioned something about living in
Bloomfield Hills, Michigan.

After telling the state police this information, they wrote to Bloomfield Hills
and gave a description and asked for any pictures in their files that fit that

The problem was that several years ago, some friends and I were arrested for
joyriding in a friend's snowmobile while he was on vacation.  The neighbors
didn't know us and called the police.  Charges were dropped, but our prints and
pictures were on file.

Bloomfield Hills sent back 12 pictures, which, according to the police report,
"Kent L. Gormat (Compaq) without hesitation identified picture 3 as the
individual he knows as Douglas Nelson.  This individuals name was in fact

A warrant was issued for me and served shortly afterwards by state, local and
federal authorities at 1:47 AM on June 27, 1988.

Lucky me to have such a great pal.  In the 6 months that I was in prison, my
parents lived 400 miles away and couldn't visit me, my girlfriend could come
visit me once a month at best, since she was so far away, and Compaq, who lived
a whole 10 miles away, never came to see me once.  This made me rather angry as
I figured this "friend" had a lot of explaining to do.

As you can see I am out of prison now, but I will be on probation until
December 15, 1989.
                                                 -The Disk Jockey

Bogus Frequent Flyer Scheme                                   February 13, 1989
>From Associated Press

An airline ticket agent piled up 1.7 million bonus air miles via computer
without leaving the ground, then sold the credits for more than $20,000,
according to a published report.

Ralf Kwaschni, age 28, was arrested Sunday when he arrived for work at Kennedy
International Airport and was charged with computer tampering and grand
larceny, authorities said.

Kwaschni, a ticket agent for Lufthansa Airlines, used to work for American
Airlines.  Police said he used his computer access code to create 18 fake
American Airline Advantage Accounts - racking up 1.7 million bonus air miles,
according to the newspaper.

All 18 accounts, five in Kwaschni's name and 13 under fake ones, listed the
same post office box, according to the newspaper.

Instead of exchanging the bonus miles for all the free travel, Kwaschni sold
some of them for $22,500 to brokers, who used the credits to get a couple of
first class, round trip tickets from New York to Australia, two more between
London and Bermuda, and one between New York and Paris.  It is legal to sell
personal bonus miles to brokers Port Authority Detective Charles Schmidt said.

Kwaschni would create accounts under common last names.  When a person with one
of the names was aboard an American flight and did not have an Advantage
account, the passengers name would be eliminated from the flight list and
replaced with one from the fake accounts.

"As the plane was pulling away from the gate, this guy was literally wiping out
passengers," Schmidt said.

Massive Counterfeit ATM Card Scheme Foiled                    February 11, 1989
By Douglas Frantz (Los Angeles Times)

The U.S. Secret Service foiled a scheme to use more than 7,700 counterfeit ATM
cards to obtain cash from Bank of America automated tellers.  After a
month-long investigation with an informant, five people were arrested and
charged with violating federal fraud statutes.

"Seized in the raid were 1,884 completed counterfeit cards, 4,900 partially
completed cards, and a machine to encode the cards with Bank Of America account
information, including highly secret personal identification numbers for

The alleged mastermind, Mark Koenig, is a computer programmer for Applied
Communications, Inc. of Omaha, a subsidiary of U.S. West.  He was temporarily
working under contract for a subsidiary of GTE Corporation, which handles the
company's 286 ATMs at stores in California.  Koenig had access to account
information for cards used at the GTE ATMs.  According to a taped conversation,
Koenig said he had transferred the BofA account information to his home
computer.  He took only Bank Of America information "to make it look like an
inside job" at the bank.  The encoding machine was from his office.

Koenig and confederates planned to spread out across the country over six days
around the President's Day weekend, and withdraw cash.  They were to wear
disguises because some ATMs have hidden cameras.  Three "test" cards had been
used successfully, but only a small amount was taken in the tests, according to
the Secret Service.

The prosecuting US attorney estimated that losses to the bank would have been
between $7 and $14 million.  Bank Of America has sent letters to 7,000
customers explaining that they will receive new cards.

STARLINK - An Alternative To PC Pursuit                        January 24, 1989
STARLINK is an alternative to PC Pursuit.  You can call 91 cities in 28 states
during off-peak hours (7pm-6am and all weekend) for $1.50 per hour.  All
connections through the Tymnet network are 2400 bps (1200 bps works too) with
no surcharge and there are no maximum hours or other limitations.

There is a one time charge of $50 to signup and a $10 per month account
maintenance fee.  High volume users may elect to pay a $25 per month
maintenance fee and $1.00 per hour charge.

The service is operated by Galaxy Telecomm in Virginia Beach, VA and users may
sign up for the service by modem at 804-495-INFO.  You will get 30 minutes free
access time after signing up.

This is a service of Galaxy and not TYMNET.  Galaxy buys large blocks of hours
from TYMNET.  To find out what your local access number is you can call TYMNET
at (800) 336-0149 24 hours per day.  Don't ask them questions about rates,
etc., as they don't know.  Call Galaxy instead.

Galaxy says they will soon have their own 800 number for signups and

The following is a listing of the major cities covered.  There are others that
are a local call from the ones listed.

Eastern Time Zone

Connecticut:  Bloomfield  Hartford  Stamford
Florida: Fort Lauderdale  Jacksonville  Longwood  Miami  Orlando  Tampa
Georgia: Atlanta  Doraville  Marietta  Norcross
Indiana: Indianapolis
Maryland: Baltimore
Massachusetts: Boston  Cambridge
New Jersey: Camden  Englewood Cliffs  Newark  Pennsauken  Princeton  South
New York:  Albany  Buffalo  Melville  New York  Pittsford  Rochester
           White Plains
North Carolina: Charlotte
Ohio:  Akron  Cincinnati  Cleveland  Columbus  Dayton
Pennsylvania: Philadelphia  Pittsburgh
Rhode Island: Providence
Virginia: Alexandria  Arlington  Fairfax  Midlothian  Norfolk  Portsmouth

Central Time Zone

Alabama: Birmingham
Illinois: Chicago  Glen Ellyn
Kansas: Wichita
Michigan: Detroit
Minnesota: Minneapolis  St. Paul
Missouri: Bridgeton  Independence  Kansas City  St. Louis
Nebraska: Omaha
Oklahoma: Oklahoma City  Tulsa
Tennessee: Memphis  Nashville
Texas: Arlington  Dallas  Fort Worth  Houston
Wisconsin:  Brookfield  Milwaukee

Mountain Time Zone

Arizona: Mesa  Phoenix  Tucson
Colorado:  Aurora  Boulder  Denver

Pacific Time Zone

California:  Alhambra  Anaheim  El Segundo  Long Beach  Newport Beach
             Oakland  Pasadena  Pleasanton  Sacramento  San Francisco
             San Jose  Sherman Oaks  Vernon  Walnut Creek
Washington:  Bellevue  Seattle

STARLINK is a service of Galaxy Telecomm Division, GTC, Inc., the publishers of
BBS Telecomputing News, Galaxy Magazine and other electronic publications.

Suspended Sentences For Computer Break-In                     February 20, 1989
>From Personal Computing Weekly

      "Police Officers Sentenced For Misuse Of Police National Computer"

Three police officers hired by private investigators to break into the Police
National Computer received suspended prison sentences at Winchester Crown
Court.  The private investigators also received suspended (prison) sentences,
ranging from four to six months.

The police officers were charged under the Official Secrets Act of conspiring
to obtain confidential information from the Police National Computer at Hendon.

One of the police officers admitted the charge, but the other two and the
private investigators pleaded Not Guilty.

The case arose out of a Television show called "Secret Society" in which
private investigator Stephen Bartlett was recorded telling journalist Duncan
Campbell that he had access to the Police National Computer, the Criminal
Records Office at Scotland Yard and the DHSS (Department of Health & Social

Bartlett said he could provide information on virtually any person on a few
hours.  He said he had the access through certain police officers at
Basingstoke, Hampshire.  Although an investigation proved the Basingstoke
connection to be false, the trail led to other police officers and private
detectives elsewhere.

Most of the information gleaned from the computers was used to determine who
owned certain vehicles, who had a good credit record -- or even who had been in
a certain place at a certain time for people investigating marital infidelity.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Of course, the actions for which the officers and others were sentenced, were
not computer break-ins as such, but rather misuse of legitimate access.

Virus Hoax Caused As Much Panic As The Real Thing             February 20, 1989
>From Popular Computing Weekly

                         "A Virus Is Up And Running"

Michael Banbrook gave his college network managers a scare when he planted a
message saying that a virus was active on the college system.

Banbrook's message appeared whenever a user miskeyed a password; the usual
message would be

                       "You are not an authorized user."

It was replaced by the brief but sinister:

                         "A Virus is up and running."

When the message was discovered by the college network manager, Banbrook was
immediately forbidden access to any computers at the St. Francix Xavier College
at Clapham in South London.

Banbrook, 17, told "Popular Computing Weekly" that he believed the college
has over-reacted and that he had, in fact thrown a spotlight on the college's
lackluster network security.  The college has a 64 node RM Nimbus network
running MS-DOS.

"All any has to do is change a five-line DOS batch file" says Banbrook.
"There is no security at all"

Banbrook admits his motives were not entirely related to enhancing security:
"I was just bored and started doodling and where some people would doodle with
a notepad, I doodle on a keyboard.  I never thought anyone would believe the

Banbrook was suspended from computer science A-level classes and forbidden to
use the college computers for a week before it was discovered that no virus
existed.  Following a meeting between college principal Bryan Scalune and
Banbrook's parents, things are said to be "back to normal."

Phrack World News -- Quicknotes
For those interested in the 312/708 NPA Split, the correct date for this
division is November 11, 1989.  However, permissive dialing will continue until
at least February 9, 1990.
Anyone who is wondering what Robert Morris, Jr. looks like should have a look
at Page 66 in the January 1989 issue of Discover Magazine.

[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2021, Phrack Magazine.