[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]

..[ Phrack Magazine ]..
.:: Phrack World News XXIX Part 3 ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ]
Current issue : #29 | Release date : 1989-11-17 | Editor : Taran King
Phrack Inc. XXIX IndexKnight Lightning & Taran King
Phrack Pro-Phile XXIX on Emmanuel GoldsteinPhrack Staff
Introduction to the Internet Protocols II: Chapter Nine of the FTSKnight Lightning
Network Miscellany IITaran King
Covert PathsSynthecide & Cyber Neuron Limited
Bank Information compiledLegion of Doom
How We Got Rich Through Electronic Fund TransferLegion of Doom
The Myth and Reality About EavesdroppingPhone Phanatic
Blocking of Long-Distance Calls...Jim Schmickley
Phrack World News XXIX Part 1Knight Lightning
Phrack World News XXIX Part 2Knight Lightning
Phrack World News XXIX Part 3Knight Lightning
Title : Phrack World News XXIX Part 3
Author : Knight Lightning
                                ==Phrack Inc.==

                    Volume Three, Issue 29, File #12 of 12

            PWN                                                 PWN
            PWN        P h r a c k   W o r l d   N e w s        PWN
            PWN        ~~~~~~~~~~~   ~~~~~~~~~   ~~~~~~~        PWN
            PWN                Issue XXIX/Part 3                PWN
            PWN                                                 PWN
            PWN                November 17, 1989                PWN
            PWN                                                 PWN
            PWN          Created, Written, and Edited           PWN
            PWN               by Knight Lightning               PWN
            PWN                                                 PWN

The Cuckoo's Egg                                               October 18, 1989
by By Christopher Lehmann-Haupt (New York Times)

            "Tracking a Spy Through the Maze of Computer Espionage"

It all begins with a 75-cent discrepancy in the computer complex's accounting
system.  Clifford Stoll, the new man in the office, is assigned to reconcile
the shortfall.

Although an astronomer by training, Stoll has recently seen his grant money run
dry and so has been transferred from the Keck Observatory at the Lawrence
Berkeley Lab down to the computer center in the basement of the same building.
No wizard at computers, he thinks he can pick things up fast enough to get by.
So he sets out to look for the 75 cents.

He quickly discovers that no glitch in the accounting programs has occurred.
No, what seems to have happened is that an unfamiliar user named Hunter briefly
logged on to the system, burning up 75-cents worth of time.  Since there is no
account record for Hunter, Stoll erases him from the system.  The problem is
solved, or so it seems.

But almost immediately, an operator from Maryland on the same network that the
Lawrence Berkeley Lab uses complains that someone from Stoll's lab is trying to
break into his computer.  When Stoll checks the time of the attempt, he
discovers that the account of someone named Joe Sventek, who is known to be in
England for the year, has been used.  So he guesses that the user calling
himself Hunter has somehow activated Sventek's account.  But who is this hacker
(as Stoll begins to refer to him), where is he operating from and how is he
getting into the system?

Next Stoll sets up systems to alert him every time the hacker comes on line and
monitor his activities without his being aware of it.  He watches as the hacker
tries to lay cuckoo's eggs in the system's nest, by which of course he means
programs for other users to feed -- for instance, a program that could decoy
other users into giving the hacker their secret passwords.  He watches as the
hacker invades other computer systems on the networks the Lawrence Berkeley Lab
employs, some of them belonging to military installations and contractors.

The mystery grows.  Telephone traces gradually establish that the hacker is not
a local operator, is not on the West Coast and may not even be in North
America.  But of the various three-letter organizations that Stoll appeals to
for help -- among them the FBI, the CIA and even the National Security Agency
-- none will investigate, at least in an official capacity.

By now a reader is so wrapped up in Stoll's breezily written account of his
true adventure in "The Cuckoo's Egg:  Tracking a Spy Through the Maze of
Computer Espionage" that he is happy to overlook certain drawbacks in the
narrative -- most conspicuously the lack of consistently lucid technical talk
and the author's dithering over whether appealing for help to the likes of the
FBI and CIA is selling out to the enemy, a qualm left over from the 1960s
mentality that still afflicts him and his friends.

The only truly annoying aspect of the book is that an endpaper diagram gives
away the location of the computer spy.  Readers are advised not to look at the
endpapers, which do little but spoil the suspense.

Unfortunately, the narrative, too, eventually helps dissipate the story's
tension.  The officials who finally take over the hunt from Stoll are so
reluctant to tell him what is happening that all the suspense he has created
simply evaporates.  Even Stoll seems to lose interest in the identity of his
mysterious antagonist, judging by the limp and haphazard way he finally does
give us the news.

Instead of building his story, he allows himself to be distracted by a banal
domestic drama centering on his decision to stop being afraid of emotional
commitment and marry the woman he has been living with for seven years.  And he
continues limply to debate the need of the state to defend the security of
communications networks against wanton vandalism, as if there were room for
serious discussion of the question.

Still, nothing can expunge the excitement of the first two-thirds of "The
Cuckoo's Egg," particularly those moments when the author hears his portable
beeper going off and bicycles to his lab to read the latest printout of the
hacker's activities.

Nothing can relieve our discouragement at the bureaucratic runaround that Stoll
got.  Had a million dollars worth of damage occurred? the FBI kept asking him.

"Well, not exactly," he would reply.  Then there was nothing the FBI could do.

And so it dishearteningly went, although some points should be conceded.
Certain individuals in government agencies were extremely helpful to Stoll.

The entire issue of computer-network security was after all a new and
unexplored field.  And the agencies that the author was asking for help
probably knew more about the security threat than they were willing to tell

Finally, nothing can diminish the sense of the strange new world Stoll has
evoked in "The Cuckoo's Egg" -- a world in which trust and open communication
will determine the quality of the future.  Whether such values will prevail
will prove a drama of momentous significance.  Even if this book finally
dissipates that drama, its very presence makes these pages worth dipping into.

Digital's Hip To The Standards Thing                           October 10, 1989
NEW YORK -- During a creative session at a major public relations firm to
formulate a new corporate message for Digital Equipment Corporation that
reflects the company's new direction promoting and supporting computing
industry standards, the shopworn phrase "Digital has it now" was replaced by a
new tag line that is more contemporary and tied to DEC's adherence to

                            DECrap by Rapmaster Ken
                    "Digital's Hip to the Standards Thing"

                     I heard some news just the other day
                It sounded kinda strange and I said, "No way!"
                   But I heard it again from another source
                 It mighta made sense and I said, "Of course!"

                    Now computer biz has a lotta confusion
                 'Cause operating systems abound in profusion.
                But there's a whole new wave in data processing
                Now that Digital's hip to the standards thing.

                     Digital's hip to the standards thing!
                     Digital's hip to the standards thing!

                         Way back when a long time ago
                           IBM owned the whole show.
                   But other dudes saw this proprietary mess
                And formed committees to find out what's best.

             Some went their own way and built their own software
         But users were perturbed, "It's just a different nightmare."
                  So they got together to look over the picks
                     Put down their money on good 'ol UNIX

                     Digital's hip to the standards thing!
                     Digital's hip to the standards thing!

                  Now Digital always kept their users in mind
                    And pushed VMS as the best of the kind.
                   A lotta folks agreed but kept askin' for
                      UNIX support, "We gotta have more!"

                  Soon DEC saw the light and decided to give
                UNIX to the masses, (sorta live and let live).
                  So DEC's ridin' the wave ahead of the rest
               On a backplane boogie board on top of the crest.

                  No doubt about it DEC's sprouted its wings
                 'Cause Digital's hip to the standards thing.

                     Digital's hip to the standards thing!
                     Digital's hip to the standards thing!

Hacker Publications                                           November 12, 1989
Here is a general overview of a pair of the more popular hardcopy hacker

2600 Magazine:  The Hacker Quarterly
Volume Six, Number Three
Autumn, 1989

The cover on this issue features a scene from the Galactic Hackers Convention
that took place in Amsterdam, Switzerland, last August.  Although it is not
explicitly stated or implied, it would appear that the comic illustration
portrays the hacker "Shatter" being run over by a bus bearing the label "2600

The articles featured in this issue include:

The Nynex Strike
Grade "A" Hacking:  What Is UAPC? by The Plague
Galactic Hacker Party (GHP)
British Telecom's Guilty Conscience
The Death Of COSMOS?
What's Going On
     -  Technological Marvels
             o  U.S. Sprint Billing Problems
             o  U.S. Sprint Voicecards
             o  Other Voiceprints
             o  Surveillance
     -  Hacker Spies (Chaos Computer Club, KGB Hackers discussed)
     -  Nynex Bigotry (Gay And Lesbian Organizations)
     -  Dial-It News (Pacific Bell 900 Services)
     -  Payphone Choices (AT&T, Sprint, MCI, AOS)
     -  Overseas Access (AT&T Calls To Vietnam)
     -  News From The U.K.
             o  Directory Assistance Operators
             o  British Telecom To Buy Tymnet From McDonnel Douglas
             o  Chat Lines Banned
     -  One Less Choice (The Source and Compuserve)
     -  Privacy?  What's That?
             o  Bulletin Board User Information
             o  Illegal Aliens Database
             o  Scotland Yard Database
             o  Wiretapping
             o  Bell of Pennsylvania (giving out confidential information)
             o  Personal Smart Card
     -  Hackers In Trouble
             o  Kevin Mitnick
             o  Robert Morris
     -  Hacker Fun
             o  Friday The 13th Virus
             o  Speed Limit Alterations
             o  Delray Beach Probation Office
     -  Telco Literature (FON Line Newsletter)
     -  Calling Card Tutorials
     -  Another Telco Ripoff (C&P Telephone)
     -  Technology Marches Back
             o  French Computer Mixup
             o  New York Telephone Repairman Sent On Wild Goose Chases
     -  And Finally (Bejing Phone Calls)
The Secrets of 4TEL
     -  Moblie Telephone Info
     -  A Southern ANI
     -  ROLM Horrors
     -  A Nagging Question (by The Apple Worm)
     -  A Request
     -  Another Request (by THOR <claims the Disk Jockey story was a lie>)
     -  The Call-Waiting Phone Tap (Alternative Inphormation)
     -  Interesting Numbers (1-800-EAT-SHIT, 800, 900 numbers)
     -  UNIX Hacking (Unix security, hacking, TCP/IP)
     -  Intelligent Payphones
     -  Retarded Payphones
REMOBS by The Infidel
Gee... GTE Telcos by Silent Switchman and Mr. Ed
Voice Mail Hacking... by Aristotle
Punching Pay Phones by Micro Surgeon/West Coast Phreaks
Touch-Tone Frequencies
2600 Marketplace
Carrier Access Codes
Lair of the INTERNET Worm by Dark OverLord
Timely Telephone Tips (from a Defense Department Phone Book)

There were also plenty of other interesting small articles, pictures, and
stories about hackers, telephones, computers and much more.  All in all, this
is the best issue of 2600 Magazine I have read in several issues (despite the
fact that some of the material had appeared in Phrack Inc., LOD/H TJs, and/or
Telecom Digest previously).  Let's hope they continue to be as good.

Are you interested in 2600 Magazine?

2600 (ISSN 0749-3851) is published quarterly by 2600 Enterprises Inc.,
7 Strong's Lane, NY 11733.  Second class postage permit paid at Setauket, New

Copyright (c) 1989, 2600 Enterprises, Inc.
Yearly subscriptions:  U.S. and Canada -- $18 individual, $45 corporate.
Overseas -- $30 individual, $65 corporate.
Back issues available for 1984, 1985, 1986, 1987, 1988 at $25 per year, $30 per
year overseas.

Address all subscription correspondence to:

                         2600 Subscription Department
                                 P.O. Box 752
                      Middle Island, New York  11953-0752

                        2600 Office Line:  516-751-2600
                        2600 FAX Line:     516-751-2608

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

TAP Magazine
Issue 94

The new TAP Magazine is a smaller publication in comparison to 2600.  The
"outer" cover of this newsletter was a "warning" from The Predat0r concerning
the nature of the material inside.  The true or "inner" cover of the newsletter
had the following:

          The Information You've Requested Of TAP Publishing Society
                 A Unit Of The Technological Advancement Party


"...a family of people dedicated to the advancement of home computer systems
and electronic technology, the study and duplication of related communication
networks and the subsequent utilization of one's own ingenuity in today's
fast-paced world of creative logic."

The articles in this issue of TAP included:

TAP RAP:  News From The TAP Staff by Aristotle
Small Tags Protect Big Stores (continued from TAP 93)
Ozone (concerning American Telephone & Telegraph's plans for 1994)
Telephone Wires In New York In 1890
Mercury Fulminate by Dark OverLord
How To Hack Stamps
Hoffman Worked To Help All Of Mankind
Police Raid 3 Jefferson Homes In Search For Computer Hackers by Calvin Miller
SummerCon '89 by Aristotle (includes a copy of the official SummerCon '89
              poster and button, although an error stating that the poster was
              shown at 1/2 size when in reality, the original was 8 1/2" by

There were a few other interesting "tid bits" of information scattered
throughout the four loose pages including the new TAP logo (that was made to
resemble CompuTel) and other pictures.

The staff at TAP also included a postcard that contained a reader's survey.  It
asked all sorts of questions about how the reader liked certain aspects of the
publication... I found the idea to be potentially productive in improving the
quality of the newsletter all around.

The cost of TAP is rather cheap... it is free.  For an issue send a self
addressed stamped envelope to:

                                P.O. Box 20264
                       Louisville, Kentucky  40220-0264

:Knight Lightning

Phrack World News QuickNotes
1.  911 Improvement Surcharge in Chicago (October 16, 1989) -- Monday morning,
    October 16, Chicago Mayor Richard M. Daley announced that he would submit
    to the city council a plan to increase city telephone taxes by 95 cents per
    line per month, earmarked for improvements to 911 service.  Currently there
    is no such flat charge, simply a percentage tax rate on local telephone

    Daley's spokespeople commented that 911 service here has been a mess for
    years, and that many of the suburbs charge $1.00 per line per month, so 95
    cents should not be unreasonable.  There were no details about what is
    currently wrong or about what specific improvements Daley has in mind.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2.  Hacker Caught by Caller-ID (October 9, 1989) -- MIS Week reported the
    apprehension of a 15-year old hacker who used his Amiga personal computer
    to tap into two minicomputers at Grumman.  The youngster was from
    Levittown, Long Island and stumbled into the computer by using a random
    dialing device attached to his computer.  Grumman security was able to
    detect the intrusions, and the computer's recording of the boy's telephone
    number led police to his home.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
3.  14-Year-Old Cracks TRW Credit For Major Fraud (October 18, 1989) -- A
    14-year-old Fresno, California boy obtained secret "access codes" to the
    files of TRW Credit from a bboard and used them to pose as a company or
    employer seeking a credit history on an individual whose name he picked
    randomly from the phone book.  From the histories, he obtained credit card
    numbers which he then used to charge at least $11,000 in mail-order
    merchandise (shipped to a rented storeroom) and make false applications for
    additional cards.  He also shared his findings on computer bulletin boards.

    Police began investigating when TRW noticed an unusual number of credit
    check requests coming from a single source, later found to be the youth's
    home telephone number.  The high school freshman, whose name was not
    released, was arrested at his home last week and later released to his
    parents.  His computer was confiscated and he faces felony charges that
    amount to theft through the fraudulent use of a computer.

    "Here is a 14-year-old boy with a $200 computer in his bedroom and now he
    has shared his data with countless other hackers all over the nation," said
    Fresno Detective Frank Clark, who investigated the case.  "The potential
    (for abuse of the information) is incredible."  Excerpts provided by
    Jennifer Warren (Los Angeles Times)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4.  Computer Virus Countermeasures Article (October 25, 1989) -- Readers of
    Phrack Inc. might be interested in an interesting article in the October
    1989 issue of DEFENSE ELECTRONICS, page 75, entitled "Computer Virus
    Countermeasures -- A New Type Of Electronic Warfare," by Dr. Myron L.
    Cramer and Stephen R. Pratt.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
5.  Computer Viruses Attack China (November 6, 1989) -- The Ministry of Public
    Safety of People's Republic of China found this summer that one tenth of
    the computers in China had been contaminated by three types of computer
    virus:  "Small Ball," "Marijuana," and "Shell."  The most serious damage
    was found in the National Statistical System, in which "Small Ball" spread
    in 21 provinces.  In Wuhan University, viruses were found in *ALL* personal

    In China, three hundred thousand computers (including personal computers)
    are in operation.  Due to a premature law system the reproduction of
    software is not regulated, so that computer viruses can easily be
    propagated.  Ministry of Public Safety now provides "vaccines" against
    them.  Fortunately, those viruses did not give fatal damage to data.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6.  More Phone-Card Fraud (October 31, 1989) -- Two men were convicted by Tokyo
    District Court on Monday, October 30, for tampering with Nippon Telephone
    and Telegraph calling cards to increase the number of calls they could
    make.  The court ruled that they violated the Securities Transaction Law.

    One man, Kawai, was sentenced to 30 months in prison, and another, Sakaki,
    was given an 18-month suspended sentence.

    Two presiding judges ruled that using falsified telephone cards in pay
    phones is tantamount to using securities.

    However, another judge ruled in a separate case last September that
    tampering with a telephone card does not constitute use of a security, so
    legal observers say it will be up to the Supreme Court.

    According to this most recent s ruling, Kawai changed about 1,600 telephone
    cards, each good for 500-yen worth of telephone calls, into cards worth
    20,000 yen.  He sold the altered cards to acquaintances for as much as
    3,500 yen.

    Sakaki also sold about 320 tampered cards for about 2 million yen.

    One of the presiding judges ruled that using tampered telephone cards on
    public telephones is the same as misleading Nippon Telegraph and
    Telephone Corporation into believing the cards -- false securities -- were
    genuine.  Taken from The Japan Times
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
7.  Computer Virus Hits Japanese Quake Data (October 30, 1989) -- Tokyo; A
    computer virus has destroyed information at the University of Tokyo's
    seismological and ocean research institutes, a university official and
    local reports said yesterday.

    An official of the university's Ocean Reasearch Institute said the virus
    was detected earlier this month in five of the center's 100 computers,
    but was believed to have first infected the computers in September.

    The virus was found only in personal computers being used by researchers
    and not major computer systems, the official said, requesting anonymity.
    He said the damage was not serious.

    He declined to discuss further details, but a report by the Japan
    Broadcasting Corporation said a virus had also been found in the computers
    at the university's Earthquake Research Institute.  Thanks to Associated
    Press news services.  (Related article follows)
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
8.  First Virus Attack On Macintoshes In Japan (November 7, 1989) -- Six Macs
    in University of Tokyo, Japan, were found to have caught viruses.  Since
    Since this September, Professor K. Tamaki, Ocean Research Institute,
    University of Tokyo, has noticed malfunctions on the screen.  In October,
    he applied vaccines "Interferon" and "Virus Clinic" to find his four
    Macintoshes were contaminated by computer viruses, "N Virus" type A and
    type B.  He then found ten softwares were also infected by viruses.  A
    Macintosh of J. Kasahara, Earthquake Research Institute, University of
    Tokyo, was also found to be contaminated by N Virus and Score Virus.  These
    are the first reports of real viruses in Japan.

    Later it was reported that four Macintoshes in Geological Survey of Japan,
    in Tsukuba, were infected by N Virus Type A.  This virus was sent from
    United States together with an editor.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
9.  Hackers Can Tap Into Free Trip (October 1989) -- Attention Hackers:  Here
    is your chance to break into a computer system and walk away with a grand
    prize.  The "hacker challenge" dares any hacker to retrieve a secret
    message stored in a KPMG Peat Marwick computer in Atlanta.

    This challenge is being sponsored by LeeMah DataCom Security Corporation, a
    Hayward, California, consulting firm that helps companies boost computer
    security.  The winner gets an all-expense paid trip for two to either
    Tahiti or St. Moritz, Switzerland.

    Hackers with modems must dial 1-404-827-9584.  Then they must type this
    password: 5336241.

    From there, the hacker is on his own to figure out the various access codes
    and commands needed to retrieve the secret message.

    The winner was announced October 24, 1989 at the Federal Computer Show in
    Washington.  Taken from USA Today.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
10.  Groaning Phone Network Survives Millions Of Calls (October 18, 1989) --
     The nation's telecommunications network was flooded Tuesday (October 17)
     night by an estimated 20 million attempted telephone calls from people
     around the nation concerned about friends and family after the earthquake
     in the bay area.

     Except for brief failures, the system did not break down under the record
     load in the areas damaged by the earthquake.

     AT&T officials said that as many as 140 million long-distance phone calls
     were placed Wednesday (October 18), the highest number for a single day in
     history.  Excerpts thanks to John Markoff (New York Times)


[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2021, Phrack Magazine.