[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]

..[ Phrack Magazine ]..
.:: Phrack World News ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ]
Current issue : #43 | Release date : 1993-07-01 | Editor : Erik Bloodaxe
IntroductionDatastream Cowboy
Phrack Loopback Part IPhrack Staff
Phrack Loopback Part II / EditorialPhrack Staff
Line Noise Part IPhrack Staff
Line Noise Part IIPhrack Staff
Phrack Pro-Phile on Doctor WhoDoctor Who
Conference News Part Ivarious
Conference News Part IIvarious
How To Hack Blackjack (Part I)Lex Luthor
How To Hack Blackjack (Part II)Lex Luthor
Help for Verifying Novell SecurityPhrack Staff
My Bust (Part I)Robert Clark
My Bust (Part II)Robert Clark
Playing Hide and Seek, Unix StylePhrack Accident
Physical Access and Theft of PBX SystemsCodec
Guide to the 5ESSFirm G.R.A.S.P.
Cellular InfoMadjus
LODCOM BBS Archive Informationunknown
LODCOM Sample Messagesunknown
Step By Step Guide To Stealing a CamaroSpy Ace
Acronyms Part IFirm G.R.A.S.P.
Acronyms Part IIFirm G.R.A.S.P.
Acronyms Part IIIFirm G.R.A.S.P.
Acronyms Part IVFirm G.R.A.S.P.
Acronyms Part VFirm G.R.A.S.P.
International Scenevarious
Phrack World NewsDatastream Cowboy
Title : Phrack World News
Author : Datastream Cowboy
                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 27 of 27

              PWN                                             PWN
              PWN              Phrack World News              PWN
              PWN                                             PWN
              PWN        Compiled by Datastream Cowboy        PWN
              PWN                                             PWN

New Yorker Admits Cracking                              July 3, 1993
(From AP Newswire Sources)

 Twenty-one-year-old Mark Abene of New York, known as "Phiber Optik" in
 the underground computing community, has pleaded guilty to charges he
 participated in a group that broke into computers used by phone companies
 and credit reporting services.

 The Reuter News Service says Abene was the last of the five young men
 indicted in the huge 1991 computer break-in scheme to admit committing the
 crimes. The group called itself "MOD," an acronym used for "Masters of
 Disaster" and "Masters of Deception."

 Abene pleaded guilty to one count of conspiracy and one count of
 unlawful access to computers. He faces a possible maximum prison term of
 10 years and fine of $500,000.


China Executes Computer Intruder                        April 26, 1993
(From AP Newswire Sources)

 A man accused of invading a computer and embezzling some
 $192,000 has been executed in China.

 Shi Biao, an accountant at the Agricultural Bank of China's Jilin
 branch, was accused of forging deposit slips from Aug. 1 to
 Nov. 18, 1991.

 The crime was the first case of bank embezzlement via
 computer in China.  Authorities became aware of the plot
 when Shi and his alleged accomplice, Yu Lixin, tried to wire
 part of the money to Shenzhen in southern China.


Teen Takes the A Train --- Literally                    May 13, 1993
(From AP Newswire sources)

 A 16 year old 10th grader successfully conveyed passengers on a NYC 10 car
 subway train for 2.5 hours until he went around a curve too quickly and
 could not reset the emergency brakes. Keron Thomas dressed as a NY subway
 train engineer impersonated Regoberto Sabio, a REAL subway motorman, while he
 was on vacation and even obtained Sabio's "pass number".

 Thomas was a Subway enthusiast who hung around train stations and areas
 where subway motormen and other subway workers hang out. A NYC subway
 spokesman was quoted as saying "Buffs like to watch...pretty soon they
 figure out how" [to run the train]. "This guy really knew what he was doing".

 Thomas was charged with criminal trespassing, criminal impersonation, and
 reckless endangerment.


Banks React To Scheme That Used Phony ATM               May 13, 1993
(From AP Newswire Sources)

 At least three people are believed to be involved in an ATM scam that is
 thought to have netted roughly $ 60,000. The fraud was perpetrated by
 obtaining a real ATM machine (theorized to have been stolen from a warehouse)
 and placing it in a Connecticut shopping mall.

 When people attempted to use the machine, they received a message that the
 machine wasn't working correctly and gave back the card.  Little did they
 know that their bank account number and PIN code was recorded.  The fake
 machine was in place for about 2 weeks. It was removed and the thieves
 began making withdrawals.

 The Secret Service thinks the scammers recorded anywhere from 2000 to 3000
 account numbers/pin codes but did not get a chance to counterfeit
 and withdraw money except from a few hundred accounts before it
 became too dangerous to continue


Hacker Gets Jail Time                                   June 5, 1993
(Newsday) (Page 13)

 A Brooklyn College film student, who was part of a group that allegedly broke
 into computer systems operated by major telephone companies, was sentenced
 yesterday to 1 year and 1 day in prison.

 John Lee, 21, of Bedford Stuyvesant, also was sentenced to 200 hours of
 community service, which Manhattan Federal District Court Judge Richard Owen
 recommended he spend teaching others to use computers.  Lee had pled guilty
 December 3, 1992, to a conspiracy charge involving computer tampering, fraud
 and illegal wiretapping.


Hacker Gets Prison Term For Phone Computer Tampering    June 4, 1993
by Gail Appleson (The Reuter Business Report)

 NEW YORK -- A computer hacker known as "Corrupt" who was part of a group that
 broke into computer systems operated by major telephone companies was
 sentenced Friday to one year and one day in prison.

 The defendant, John Lee, 21, of New York had pleaded guilty December 3, 1992
 to a conspiracy charge involving computer tampering, fraud and illegal

 The indictment alleges the defendants broke into computer switching systems
 operated by Southwestern Bell, New York Telephone, Pacific Bell, U.S. West
 and Martin Marietta Electronics Information and Missile Group.

 Southwestern Bell allegedly lost $370,000 because of the crimes.

 The defendants also allegedly tampered with systems owned by the nation's
 largest credit reporting companies including TRW, Trans Union and Information
 America.  They allegedly obtained 176 TRW credit reports on various

 The indictment alleged the group broke into the computers "to enhance their
 image and prestige among other computer hackers and to harass and intimidate
 rival hackers and other people they did not like."

Professional Computer Hackers First To Land In Jail Under New Law  June 4, 1993
by Nicholas Hills (The Vancouver Sunds)(Page A11)

LONDON -- In Brussels, they were celebrated as the two young men who broke the
gaudy secrets of EC president Jacques Delors' expense accounts.

In Sweden, they were known as the Eight-Legged Groove Machine, bringing down
part of the country's telephone network, forcing a highly publicized apology
from a government minister who said the chaos was all due to a 'technical

They also broke into various European defense ministry networks, academic
systems at Hull University and the financial records of the leading London
bankers, S.G. Warburg.

No, these weren't two happy-go-lucky burglars; but rather, professional
computer hackers, aged 24 and 22, who made legal as well as technological
history by being the first offenders of this new trade to be jailed for their
crimes under new British law.

Neil Woods and Karl Strickland have gone to prison for six months each for
penetrating  computer  systems in 15 different countries.  The ease with which
they conducted this exercise, and their attitude that they were simply engaging
in "intellectual joyriding," has confirmed the worst fears of legal and
technological experts that computer hacking in Europe, at least, has become a
virtually uncontrollable virus.

The case became a cause celebre because of what had happened months before in
another courtroom where a teenage computer addict who had hacked into the White
House system, the EC, and even the Tokyo Zoo -- using a $400 birthday present
from his mother -- had walked free because a jury accepted, basically, that a
computer had taken over his mind.

The case of 19-year-old Paul Bedworth, who began hacking at the age of 14, and
is now studying "artificial intelligence" at Edinburgh University, provides an
insight into why hackers have turned the new computer world into an equivalent
state of delirium tremens.

Bedworth and two young friends caused thousands of dollars worth of damage to
computer systems in Britain and abroad. They were charged with criminal
conspiracy under the Computer Misuse Act of 1990.

Bedworth never did deny computer hacking at his trial, and did not give
evidence in his defense.  He simply said through his lawyer that there could
not have been any criminal intent because of his "pathological obsession" with

A jury of eight men and three women unanimously acquitted him.

Until the passage of the Computer Misuse Act in 1990, hacking was legal in
Britain.  Bedworth may have been found not guilty, but his activities were so
widespread that the authorities' investigation involved eight different British
police forces, and others from as far afield as Finland and Singapore.  It
produced so much evidence - mostly on disk - that if it had been printed out on
ordinary laser printer paper, it is estimated that the material would have
reached a height of 42 meters.

The police were devastated by the verdict, but are now feeling somewhat better
after the conviction of Woods and Strickland.

The pair, using the nicknames of Pad and Gandalf, would spend up to six hours a
day at their  computers,  boasting about "smashing" databases.


Computers Turned My Boy Into A Robot                    March 18, 1993
By Martin Phillips (Daily Mirror)(Page 1)

 Connie Bedworth said she was powerless to control the "monster" as he
 glued himself to the screen nearly 24 hours as day.  "He didn't want
 to eat or sleep--he just couldn't bear to be away from it, " she said.

 A jury decided Paul Bedworth, now 19, was so "hooked" he could not stop
 himself hacking in to companies' systems -- allegedly costing them
 thousands of dollars.


Hot For The Fingertips: An Internet Meeting Of Minds    May 23, 1993
by Frank Bajak (Associated Press)

 NEW YORK -- Somewhere in the ether and silicon that unite two workstations 11
 floors above lower Broadway, denizens of the cyberpunk milieu are feverishly
 debating whether anyone in government can be trusted.

 This is the 12-by-20-foot bare-walled home of MindVox, today's recreation hall
 for the new lost generation's telecomputing crowd.  You can enter by phone
 line or directly off Internet.

 Patrick Kroupa and Bruce Fancher are the proprietors, self-described former
 Legion of Doom telephone hackers who cut the cord with computing for a time
 after mid-1980s teen-age shenanigans.

 Kroupa is a towering 25-year-old high school dropout in a black leather jacket,
 with long hair gathered under a gray bandanna, three earrings and a hearty

 Fancher is 22 and more businesslike, but equally in love with this dream he
 left Tufts University for.

 They've invested more than $80,000 into Mindvox, which went fully operational
 in November and has more than 2,000 users, who pay $15 to $20 a month plus
 telephone charges.

 MindVox aspires to be a younger, harder-edged alternative to the WELL, a
 fertile 8-year-old watering hole for the mind in Sausalito, California, with
 more than 7,000 users, including scores of computer age luminaries.

 One popular feature is a round-table discussion on computer theft and security
 hosted by a U.S. Treasury agent.  The latest hot topic is the ease of breaking
 into a new flavor of local access network.


Hi Girlz, See You In Cyberspace                         May 1993
by Margie (Sassy Magazine) (Page 79)

 [Margie hits the net via Mindvox.  Along the way she discovers
  flame wars, sexism, and a noted lack of females online.  This
  is her story.  :) ]


Hacker Accused of Rigging Radio Contests                April 22, 1993
By Don Clark (San Francisco Chronicle)

 A notorious hacker was charged yesterday with using computers to
 rig promotional contest at three Los Angeles radio stations, in
 a scheme that allegedly netted two Porsches, $20,000 in cash and
 at least two trips to Hawaii.

 Kevin Lee Poulsen, now awaiting trial on earlier federal charges,
 is accused of conspiring with two other hackers to seize control of
 incoming phone lines at the radio stations.  By making sure that only
 their calls got through, the conspirators were assured of winning the
 contests, federal prosecutors said.

 A new 19-count federal indictment filed in Los Angeles charges
 that Poulsen also set up his own wire taps and hacked into computers
 owned by California Department of Motor Vehicles and Pacific Bell.
 Through the latter, he obtained information about the undercover
 businesses and wiretaps run by the FBI, the indictment states.

 Poulsen, 27, is accused of committing the crimes during 17
 months on the lam from earlier charges of telecommunications and
 computers fraud filed in San Jose.  He was arrested in April 1991
 and is now in the federal Correctional Institution in Dublin.  In
 December, prosecutors added an espionage charge against him for his
 alleged theft of a classified military document.

 The indictment announced yesterday adds additional charges of
 computer and mail fraud, money laundering, interception of wire
 communications and obstruction of justice.

 Ronald Mark Austin and Justin Tanner Peterson have pleaded guilty
 to conspiracy and violating computer crime laws and have agreed to
 help against Poulsen.  Both are Los Angeles residents.

 Poulsen and Austin have made headlines together before.  As
 teenagers in Los Angeles, the two computer prodigies allegedly broke
 into a Pentagon-organized computer network that links researchers and
 defense contractors around the country.


SPA Tracks Software Pirates on Internet                 March 22, 1993
By Shawn Willett (InfoWorld)(Page 12)

 The Software Publishers Association has begun investigating reports of
 widespread piracy on the Internet, a loose amalgam of thousands of computer

 The Internet, which began as a Unix-oriented, university-based communi-
 cations network, now reaches into corporate and government sites in 110
 countries and is growing at a rapid pace.

 The software theft, according to Andrew Patrizio, an editor at the
 _Software Industry Bulletin_, has been found on certain channels, particularly
 the warez channel.

 "People are openly talking about pirating software; there seems to be no
 one there to monitor it", Patrizio said.

 A major problem with the Internet is that the "sites" from where the
 software is being illegally downloaded can physically be located in countries
 that do not have strong antipiracy laws, such as Italy or the former Soviet
 Union.  The Internet also has no central administrator or system operator.

 "Policing the entire Internet would be a job", said Peter Beruk,
 litigation manager for the SPA, in Washington.  "My feeling would be to target
 specific sections that are offering a lot of commercial software free for the
 download", he said.


Socialite's Son Will Have To Pay $15,000 To
Get His Impounded 1991 BMW Back                         March 23, 1993
By John Makeig (Houston Chronicle)(Page 14A)

 Kenyon Shulman, son of Houston socialite Carolyn Farb will have to pay
 15 thousand dollars to get back his 1991 BMW 325i after being impounded
 when Houston police found 400 doses of the drug ecstasy in its trunk.

 This is just the latest brush with authorities for Shulman who in 1988
 was raided by Harris County authorities for using his personal computer
 to crack AT&T codes to make free long distance calls.


Austin Man Gets 10 Years For Computer Theft, Sales      May 6, 1993
By Jim Phillips (Austin American Statesman)(Page B3)

 Jason Copson, who was arrested in July under his alias Scott Edward Berry,
 has been sentenced to 10 years on each of four charges of burglary and
 one count of assault.  The charges will run concurrently.  Copson still
 faces charges in Maryland and Virginia where he served a prison term and
 was serving probation for dealing in stolen goods.  Police arrested Copson
 and Christopher Lamprecht on July 9 during a sting in which the men tried to
 sell computer chips stolen from Advanced Micro Devices.

Treasury Told Computer Virus Secrets                  June 19, 1993
By: Joel Garreau (Washington Post) (Page A01)

 For more than a year, computer virus programs that can wreak havoc with
 computer systems throughout the world were made available by a U.S. government
 agency to anyone with a home computer and a modem, officials acknowledged this

 At least 1,000 computer users called a Treasury Department telephone number,
 spokesmen said, and had access to the virus codes by tapping into the
 department's Automated Information System bulletin board before it was muzzled
 last month.

 The bulletin board, run by a security branch of the Bureau of Public Debt in
 Parkersburg, W.Va., is aimed at professionals whose job it is to combat such
 malicious destroyers of computer files as "The Internet Worm," "Satan's Little
 Helper" and "Dark Avenger's Mutation Engine." But nothing blocked anyone else
 from gaining access to the information.

 Before the practice was challenged by anonymous whistleblowers, the bulletin
 board offered "recompilable disassembled virus source code"-that is, programs
 manipulated to reveal their inner workings. The board also made available
 hundreds of "hackers' tools"-the cybernetic equivalent of safecracking aids.
 They included "password cracker" software-various programs that generate huge
 volumes of letters and numbers until they find the combination that a computer
 is programmed to recognize as authorizing access to its contents-and "war
 dialers," which call a vast array of telephone numbers and record those hooked
 to a computer.

 The information was intended to educate computer security personnel,
 according to Treasury spokesmen. "Until you understand how penetration is done,
 you can't secure your system," said Kim Clancy, the bulletin board's operator.

 The explosion of computer bulletin boards-dial-up systems that allow users
 to trade any product that can be expressed in machine-readable zeros and
 ones-has also added to the ease of virus transmission, computer analysts say.
 "I am Bulgarian and my country is known as the home of many productive virus
 writers, but at least our government has never officially distributed viruses,"
 wrote Vesselin Vladimirov Bontchev of the Virus Test Center of the University
 of Hamburg, Germany.

 At first, the AIS bulletin board contained only routine security alert
 postings. But then operator Clancy "began to get underground hacker files and
 post them on her board," said Bruce Sterling, author of "The Hacker Crackdown:
 Law and Disorder on the Electronic Frontier." "She amassed a truly impressive
 collection of underground stuff. If you don't read it, you don't know what's
 going to hit you."

 Clancy, 30, who is a former Air Force bomb-squad member, is highly regarded
 in the computer security world. Sterling, one of the nation's foremost writers
 about the computer underground, called her "probably the best there is in the
 federal government who's not military or NSA (National Security Agency).
 Probably better than most CIA."

 Clancy, meanwhile, is staying in touch with the underground. In fact, this
 week, she said, she was "testing a product for some hackers." Before it goes
 into production, she will review it to find potential bugs. It is a new war
 dialer called "Tone-Loc." "It's an extremely good tool. Saves me a lot of
 trouble. It enables me to run a hack against my own phone system faster" to
 determine points of vulnerability.





                  DALLAS DIVISION

V.                             * CRIMINAL NO. 3-91-194-T
                               * (FILED UNDER SEAL)


     COMES NOW the United States of America, by its United

States Attorney, at the request of the defendant, and hereby

requests that this Honorable Court seal the record in this case.

In support thereof, the United States states the following:

     1. The case is currently being transferred to the

Middle District of California for plea and disposition pursuant

to Federal Rule of Criminal Procedure 20;

     2. The defendant is released on bond by the United

States District Court for the Middle District of California;

     3. The defendant, acting in an undercover capacity,

currently is cooperating with the United States in the

investigation of other persons in California; and

     4. The United States believes that the disclosure of

the file in this case could jeopardize the aforesaid

investigation and possibly the life of the defendant.

Consequently, the United States requests that this Honorable

Court seal the record in this case.

               Respectfully submitted,
               MARVIN COLLINS
               United States Attorney

               LEONARD A. SENEROTE
               Assistant United States Attorney
               Texas State Bar No. 18024700
               1100 Commerce Street, Room 16G28
               Dallas, Texas 75242-1699
               (214) 767-0951


     The defendant joins in this motion.

               LEONARD A. SENEROTE
               Assistant United States Attorney

[The entire file of information gathered from the courts regarding
 Agent Steal is available from Phrack for $5.00 + $2 postage]
[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2021, Phrack Magazine.