Title : Phrack World News XXVII Part 1
Author : Knight Lightning
==Phrack Inc.==
Volume Three, Issue 27, File 10 of 12
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
PWN PWN
PWN P h r a c k W o r l d N e w s PWN
PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN
PWN Issue XXVII/Part 1 PWN
PWN PWN
PWN June 20, 1989 PWN
PWN PWN
PWN Created, Written, and Edited PWN
PWN by Knight Lightning PWN
PWN PWN
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
Welcome to Issue XXVII of Phrack World News!
This issue features articles on SouthernNet's hacker scam, the Florida
probation sex incident, bulletin boards in Argentina, fax attacks, computer
security, other hacking occurrences, as well as more articles and new
information about Kevin David Mitnick (aka Condor), Robert Tappan Morris, Karl
Koch (Hagbard Celine, one of Clifford Stoll's "Wily Hackers"), TRW and Social
Security Administration, the National Crime Information (NCIC) "Super
Database," and many other fun stories.
Because of our temporary exile from Bitnet, this will be the last regular issue
of Phrack World News until next Fall. Next issue expect to see the full
write-up on the details and fun events of SummerCon '89. It is only two days
away as of this writing (it kinda begins on Thursday evening for some of us)
and it looks to be the best SummerCon ever!
A very special thanks goes to Delta Master, Hatchet Molly, and The Mad Hacker
who all assisted with this issue's PWN by submitting articles. Hatchet Molly
will be serving as a collection agent for Phrack Inc. during the summer. Be
sure to forward any news articles to him that seem relevant to PWN and he will
get them to me (eventually). He can be reached on the wide area networks at;
(Hatchet Molly)
TK0GRM2@NIU.BITNET
TK0GRM2%NIU.BITNET@CUNYVM.CUNY.EDU
One other thing to mention here is a special hello to one of our government
readers... Peter Edmond Yee of NASA's Ames Research Center. He had recently
remarked that he "had access to Phrack!" I wonder if he thought that Phrack
Inc. was top secret or hard to get? Still if he wanted it that badly, Taran
King and I thought, "Why not make it easier on him and just send it to his
network address?" We did :-)))
:Knight Lightning
"The Real Future Is Behind You... And It's Only The Beginning!"
_______________________________________________________________________________
Mitnick Plea Bargain Rejected By Judge As Too Lenient April 25, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Excerpts from Kim Murphy (Los Angeles Times)
"Mr. Mitnick, you have been engaging in this conduct
for too long, and no one has actually punished you.
This is the last time you are going to do this."
Reportedly U.S. District Judge Mariana Pfaelzer unexpectedly rejected the plea
bargain of Kevin Mitnick, the hacker once called "as dangerous with a keyboard
as a bank robber with a gun." Pfaelzer declared that Mitnick deserves more
time behind bars.
As reported in recent issues of Phrack World News, "Mitnick pleaded guilty to
one count of computer fraud and one count of possessing unauthorized
long-distance telephone codes... Mitnick faces one year in prison. Under a
plea agreement with the government, he must also submit to three years'
supervision by probation officers after his release from prison."
On April 24, 1989 Judge Pfaelzer said, "Mr. Mitnick, you have been engaging in
this conduct for too long, and no one has actually punished you. This is the
last time you are going to do this." She said a confidential pre-sentence
report recommended that she exceed even the 18-month maximum prison term called
for under mandatory new federal sentencing guidelines. The judge's action
voids Mitnick's guilty plea.
Both prosecuting and defense attorneys were surprised. Mitnick's attorney said
he did not know whether his client would agree to a guilty plea carrying a
longer prison term. This could make it harder to bring charges against
Mitnick's alleged associates. If Mitnick is brought to trial, testimony from
at least one of his associates would be required to convict him, and they would
not appear as witnesses without receiving immunity from prosecution.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Computer Hacker Working On Another Plea Bargain May 6, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Excerpts from the Los Angeles Herald Examiner
Attorneys said yesterday they are negotiating a second plea bargain for
computer hacker Kevin Mitnick, whose first offer to plead guilty was scuttled
by a judge because it called for too little time in prison.
Mitnick, 25, of Panorama City, California offered in March to serve one year in
prison and to plead guilty to computer fraud and possessing unauthorized
long-distance telephone codes.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Mitnick Update May 10, 1989
~~~~~~~~~~~~~~
Excerpts taken from the Los Angeles Times
When last we heard about Kevin Mitnick, the hacker once called "as dangerous
with a keyboard as a bank robber with a gun," the judge, Judge Mariana
Pfaelzer, had rejected a plea bargain as too lenient, saying Mitnick deserved
more than the agreed one year of jail time [see above articles].
According to more recent information, Mitnick has now reached a new agreement,
with no agreed-upon prison sentence. He pleaded guilty to stealing a DEC
security program and illegal possession of 16 long-distance telephone codes
belonging to MCI Telecommunications Corp. The two charges carry a maximum of
15 years and a $500,000 fine. The government agreed to lift telephone
restrictions placed on Mitnick since he was jailed in December, 1988.
At DEC's request, Mitnick will help the firm identify and fix holes in its
security software to protect itself from other hackers. He will also cooperate
in the government's probe of Leonard DiCicco, a fellow hacker. (DiCicco is the
"friend" who turned Mitnick in.)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Kenneth Siani Speaks Out About Kevin Mitnick May 23, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Kevin Mitnick, the hacker "so dangerous that he can't even be allowed to use a
phone." "He could ruin your life with his keyboard." "Armed with a keyboard
and considered dangerous."
These are some of the things that have been said about this person. All of
this media hype would be fine if it just sold newspapers. But it has done much
more then just sell a few papers. It has influenced those that will ultimately
decide his fate. I myself do not know the man, but I have talked to others
that do. Including one of the persons that investigated Mitnick. From all I
have heard about him, I think he is a slime ball! But even a slime ball should
not be railroaded into a prison sentence that others of equal or greater guilt
have avoided.
I personally feel the man is just a criminal, like the guy that robs a 7/11, no
better but certainly not any worse. Unfortunately he is thought of as some
kind of a "SUPER HACKER." The head of Los Angeles Police Dept's Computer Crime
Unit is quoted as saying, "Mitnick is several levels above what you would
characterize as a computer hacker."
No disrespect intended, but a statement like this from the head of a computer
crime unit indicates his ignorance on the ability of hackers and phone phreaks.
Sure he did things like access and perhaps even altered Police Department
criminal records, credit records at TRW Corp, and Pacific Telephone,
disconnecting phones of people he didn't like etc. But what is not understood
by most people outside of the hack/phreak world is that these things are VERY
EASY TO DO AND ARE DONE ALL THE TIME. In the hack/phreak community such
manipulation of computer and phone systems is all to easy. I see nothing
special about his ability to do this. The only thing special about Kevin
Mitnick is that he is not a "novice" hacker like most of the thirteen year old
kids that get busted for hacking/phreaking. It has been a number of years
since an "advanced" hacker has been arrested. Not since the days of the Inner
Circle gang have law enforcement authorities had to deal with a hacker working
at this level of ability. As a general rule, advanced hackers do not get
caught because of there activity but rather it is almost always others that
turn them in. It is therefore easy to understand why his abilities are
perceived as being extraordinary when in fact they are not.
Because of all the media hype this case has received I'm afraid that:
1.) He will not be treated fairly. He will be judged as a much greater threat
to society then others that have committed similar crimes.
2.) He will become some kind of folk hero. A Jesse James with a keyboard.
This will only cause other to follow in his footsteps.
I'm not defending him or the things he has done in any sense. All I'm saying
is let's be fair. Judge the man by the facts, not the headlines.
Disclaimer: The views expressed here are my own.
Kenneth Siani, Sr. Security Specialist, Information Systems Div., NYMA Inc.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
If you are looking for other articles about Kevin David Mitnick aka Condor
please refer to;
"Pacific Bell Means Business" (10/06/88) PWN XXI. . .Part 1
"Dangerous Hacker Is Captured" (No Date ) PWN XXII . .Part 1
"Ex-Computer Whiz Kid Held On New Fraud Counts" (12/16/88) PWN XXII . .Part 1
"Dangerous Keyboard Artist" (12/20/88) PWN XXII . .Part 1
"Armed With A Keyboard And Considered Dangerous"(12/28/88) PWN XXIII. .Part 1
"Dark Side Hacker Seen As Electronic Terrorist" (01/08/89) PWN XXIII. .Part 1
"Mitnick Plea Bargains" (03/16/89) PWN XXV. . .Part 1
_______________________________________________________________________________
Computer Intrusion Network in Detroit May 25, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Taken from the San Jose Mercury News (Knight-Ridder News Service)
DETROIT -- Secret Service agents smashed what they described as a costly,
sophisticated computer intrusion network on Wednesday, May 24, and were
surprised to discover it made up largely of teen-agers.
The computer systems of more than 20 companies including the Michigan
Department of Treasury, Home Box Office cable television services, [and RCA]
were infiltrated, according to agents serving search warrants across the
country.
Federal officials said the infiltrations by the network represented fraud of
$200,000 to $1.5 million in appropriated goods, telephone and computer time.
Agents expected to arrest some adults when they swept down on eight people who
allegedly ran the network in several states. Instead, they found only one
adult, in Chicago. The rest were teen-agers as young as 14: Two in Columbus,
Ohio; two in Boston, Massachusetts; two in Sterling Heights, Michigan [The
Outsider and The Untouchable]; and one in Atlanta, Georgia. Agents expected to
make another arrest in Los Angeles.
Officials said at least 55 other people nationwide made use of the network's
information.
In Sterling Heights, Secret Service agents pulled two eighth-grader boys, both
14, out of school and questioned them in the presence of their parents, who
apparently were unaware of their activities. James Huse, special agent in
charge of the U.S. Secret Service office in Detroit, said the youths admitted
involvement in the scheme.
He said the eight-graders, because they are juveniles, cannot be charged under
federal law and will be dealt with by local juvenile authorities.
Authorities believe the mastermind is Lynn Doucett, 35, of Chicago. She was
arrested Wednesday, May 24, and is cooperating with authorities, Huse said.
Doucett, who was convicted in Canada of telecommunications fraud, supports
herself and two children through her computer intrusion activities, which
include using stolen or counterfeit credit cards for cash advances or money
orders, according to an affidavit filed in U.S. District Court.
If convicted, she faces up to 10 years in prison and a $250,000 fine.
Special Thanks to Jedi For Additional Information
_______________________________________________________________________________
HR 1504 -- Beeper Abuse Prevention Act May 22, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
"Pagers Don't Commit Crimes, Congressmen Do."
The fools in congress assembled are at it again. Three years in jail for
selling a pager to a minor? If you didn't believe when Abbie Hoffman said that
the drug hysteria was just an excuse for more control of the citizens, think
again.
In USA Today was a "face-off" on the issues. According to this article,
Representative Kweisi Mfume (D-Md) says the following:
"The drug business is using the latest technology to promote its
deadly trade. One such advance, the paging device, or beeper, is
now appearing in classrooms and schoolyards. I have introduced the
Beeper Abuse Prevention Act to curtail the use of beepers by young
people who deal drugs. It would require the Federal Communications
Commission to prescribe regulations that would restrict the
possession and use of paging devices by persons under age 21.
Law officers say dealers and suppliers send coded messages via
beeper to youths in school. The codes translate into messages like
"meet me at our regular place after class to pick up the drugs."
Drug traffickers are even using 800 numbers now available with
regional paging services. A supplier could actually conduct a
transaction in Baltimore from Miami, for example.
My bill, H.R. 1504, would require any person selling or renting
paging devices to verify the identification and age of every
customer; encourage parents and businesses to take more
responsibility in their children's or employees' activities; make
it unlawful for a person to knowingly and willfully rent, sell or
use paging devices in violation of rules prescrived by the FCC
(there are provisions for stiff fines and up to three-year prison
terms for adults who illegally provide beepers to youths); and
require parents or businesses who allow the use of beepers to state
that intention with and affidavit at the time of purchase."
He goes on to say that he recognizes that there are legitimate uses of beepers,
but we can no longer stand by and watch drugs flow into our neighborhoods. The
opposite side is taken by Lynn Scarlett, from Santa Monica, CA. She asks what
beepers have to do with the drug trade, and regulating their use will not put a
dent it it. She also says that there is little evidence that gun control keeps
guns out of the hands of gangsters, and it will take a good dose of wizardry to
keep beepers away from bad guys. She finishes with:
"The logic of the Beeper Abuse Prevention Act opens the door for
laws to make us sign promises that we won't, we swear, use these
things for illicit acts when we buy them. De Tocqueville, that
eminent observer of our nation, warned that our loss of freedom
would sneak in through passage of quiet, seemingly innocuous and
well-intended laws -- laws like H.R. 1504.
_______________________________________________________________________________
Computer Threat Research Association (UK) March 31, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
For those of you interested an umbrella organization has been established in
the United Kingdom to coordinate information on, and research into, all aspects
of computer security. In the first instance one of the organization's primary
concerns will be combatting the threat posed by computer viruses by acting as a
clearing house for virus information and control software.
Below is a copy of an initial letter mailed to prospective members:
The Computer Threat Research Association
The computer threat research association, CoTra is a non-profit making
organization that exists to research, analyze, publicize and find solutions
for threats to the integrity and reliability of computer systems.
The issue that caused the formation of CoTra was the rise of the computer
virus. This problem has since become surrounded by fear, uncertainty and
doubt. To the average user, the computer virus and its implications are a
worry of an unknown scale. To a few unfortunates whose systems have become
victims, it is a critical issue.
The key advantage of CoTra membership will be access to advice and information.
Advice will be provided through publications, an electronic conference (a
closed conference for CoTra's members has been created on the Compulink CIX
system) as well as other channels such as general postings direct to members
when a new virus is discovered.
CoTra membership will be available on a student, full or corporate member
basis. All software that is held by CoTra that enhances system reliability,
such as virus detection and removal software, will be available to all members.
It is intended to establish discounts with suppliers of reliability tools and
services. A library of virus sources and executables and other dangerous
research material will be made available to members who have a demonstrable
need.
A register of consultants who have specific skills in the systems reliability
field will be published by CoTra and reviews of reliability enhancing software
will be produced.
Your support of CoTra will ensure that you have the earliest and most accurate
information about potential threats to your computer systems.
CoTra, The Computer Threat Research Association,
c/o 144 Sheerstock, Haddenham, Bucks. HP17 8EX
_______________________________________________________________________________
Strange Customs Service Clock Department May 1, 1989
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Written by Vanessa Jo Grimm (Goverment Computer News)(Page 6)
The U.S. attorney for Washington is reviewing an allegation that a Customs
Service official violated the Computer Security Act [PL 100-235 presumably] by
altering a computer's internal clock.
Treasury Department Inspector General Michael R. Hill referred the allegation
to the prosecutor after an investigation into year-end spending by Custom
officials at the close of Fiscal Year 1988. The allegation involves an
official who may have authorized altering the date maintained by the computers
that the agency uses for procurement documents, according to Maurice S. Moody,
the Inspector General's audit director for Financial Management Service.
Moody recently told the House Ways and Means Subcommittee on Oversight the
computers are part of the agency's Automated Commercial System. He declined to
provide Government Computer News with more details.
Allegedly the computer clock was rolled back during the first three days of
October of 1988 so that $41.8 million in procurement obligations would be dated
in September against fiscal year 1988 appropriations, Moody said.
An inspector general report issued in late February concluded Customs had not
violated any procurement laws. The inspector general's investigation is
continuing, however.
"Doesn't $41.8 million worth of procurement on the last day of the fiscal year
bother anybody?" asked Rep. Richard T. Shulze (R-Pa). The purchases did bother
the inspector general, Moody said, and this concern led to getting the United
State attorney attorney. "This problem is endemic in the federal government,"
he said. "Year-end spending is very common."
William F. Riley, Customs controller, said he knew about the rollback, but he
and Deputy Commissioner Michael H. Lane refused to say who authorized the
action... Subcommittee members continued to press Riley and Lane. "Is the
person still at Customs?" asked subcommittee chairman J. J. Pickle (D-Texas).
He is working full time and in the position he was at the time," Lane answered.
Rep. Beryl F. Anthony, Jr. (D-Ark) asked how Riley became aware of the
rollback. "He (the official who authorized the rollback) told me that it was
going to be done," Riley said.
Rep. Pickle suggested that a high ranking official would have to authorize such
an action, but Counsel advised Lane not to reply. He did say neither he nor
Commissioner von Raab had made the decision.
The balance of the article deals with the actions of Linda Gibbs, who became
aware of the incident and reported it to the inspector general after being
unable to stop the action. Gibbs also alleged that the action was intended to
use available year-end money to cover cost overrun on a contract with Northrop
Corp. She also alleged that she had been reassigned and given no new duties.
_______________________________________________________________________________