[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: Phrack World News VI Part 2 ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ]
Current issue : #7 | Release date : 1986-09-25 | Editor : Taran King
Intro/IndexTaran King
Phrack Pro-Phile of Scan ManTaran King
Hacker's ManifestoThe Mentor
Hacking Chilton's CredimaticRyche
Hacking RSTS Part 1The Seker
How to Make TNTThe Radical Rocker
Trojan Horses in UnixShooting Shark
Phrack World News VI Part 1Knight Lightning
Phrack World News VI Part 2Knight Lightning
Phrack World News VI Part 3Knight Lightning
Title : Phrack World News VI Part 2
Author : Knight Lightning
                                ==Phrack Inc.==

                      Volume One, Issue 7, Phile 9 of 10

PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
PWN                                                                         PWN
PWN                      *^=-> Phrack World News <-=^*                      PWN
PWN                                                                         PWN
PWN                             Issue VI/Part 2                             PWN
PWN                                                                         PWN
PWN                         Compiled and Written by                         PWN
PWN                                                                         PWN
PWN                            Knight Lightning                             PWN
PWN                                                                         PWN
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN

U.S. Telecom Retiring Uninet                                       May 26, 1986
----------------------------
                            "Uninet is coming down"

Reston, Va. - U.S. Telecom Data Communications Company, Uninet Packet Switching
Network will be retired as a result of the proposed merger of the company with
GTE Telenet Communications Corporation.

The move came to light last week as a joint transition study team completed a
plan detailing how the two companies will be merged.  The merger is a result of
a joint venture spawned by the two companies parents, GTE Corporation and
United Talecommunications Inc.

The packet switches and related equipment which make up Uninet will be sold
where possible, but a good deal of the equipment is likely to be discarded, a
spokesman for the joint venture said.

Under the plan, the capacity of GTE Telenet Packet Switching Network will be
increased to handle additional traffic resulting from transference of U.S.
Telecom customers to Telenet, according to the spokesman.

The study groups considered integrating Uninet and Telenet because the external
interfaces of each network are compatible but the internal protocols each
network uses for functions such as networks management are substantially
different and any attempt toward integration would require a massive
development effort, spokesman said.

Moving Uninet's traffic to Telenet is far cheaper.  Telenet currently supports
six times as much traffic as Uninet, which means Telenet's capacity must only
be incremented by one sixth.

Uninet will be phased out over a 120 day transition period, to begin when the
joint venture is approved.  The merger plan calls for all personnel of U.S.
Telecom and GTE Telenet to be offered jobs with U.S. Sprint (now called U.S.
Sprint, not Sprint/U.S. Telecom company since recent merger).  The new company
is headquartered in Reston, Virginia where GTE Telenet is currently
headquartered.  Submitted by Scan Man to Phrack Inc. From Communications Week,
May 26 Issue
_______________________________________________________________________________

                                 P-80 Newsfile
                                 -------------
Computer Crime Bill Amended                                        May 14, 1986
----------------------------
After three years of Congressional hearings, the U.S. House of Representatives
is finally getting ready to act on a computer crime bill, but like everything
else in Congress many different people have input, and the focus and scope of
pending computer crime bills have changed in important ways during the past few
months.

When bills are altered significantly, they are often written as "clean bills"
and given new numbers.  Computer crime measures are changing so fast it is
difficult to keep track of them.

What started out as The Counterfeit Access Device and Computer Fraud Act (HR
1001) became late last month The Computer Fraud and Abuse Act (HR 4562) which,
although it has retained the same title, is now dubbed HR 4718 following the
addition of some minor amendments.

The new bill, sponsored by Rep. William Hughes (D-N.J.), is very similar to the
old one, however, and would impose severe penalties for illegally accessing
government and financial computers and crack down on illegal computer bulletin
board systems.

For more information on HR 4718, check the menu for bills in the US House of
Representatives in the Legislation Database.

                    Information Provided by Cathryn Conroy
-------------------------------------------------------------------------------
House Committee Approves New Computer Crime Bill                   May 14, 1986
------------------------------------------------
The House Judiciary Committee has approved and sent to the full House a new
computer crime bill that would impose severe penalties for illegally accessing
government and financial computers and crack down on illegal computer bulletin
board systems.

The bill (HR 4718), sponsored by Rep. William Hughes (D-N.J.), was passed by
voice vote with no objection. It is aimed at closing loopholes in existing law
and at helping to eliminate the "national malaise" of computer crime, Hughes
said.

The bill "will enable us to much more effectively deal with the emerging
computer criminal in our society," said Hughes, who chairs the House crime
subcommittee.

Rep. Bill McCollum (R-Fla.), the ranking Republican on the crime subcommittee,
added his support for the bill. He said it is time the nation began cracking
down on computer criminals.

"We demand privacy, yet we glorify those that break into computers," McCollum
said, citing films and television shows that have painted a sympathetic
portrait of computer criminals.

The committee agreed to a single amendment to the bill -- one that would extend
the list of computer systems protected by the measure to include those run by
the brokers and dealers regulated by the Securities and Exchange Commission.
McCollum, who sponsored the amendment, said the brokers and dealers provide
some of the same services as banks and should receive equal protection against
computer trespassers.

The bill was reported out unanimously from the crime subcommittee. Hughes said
an identical companion measure is moving through the Senate and that he expects
the bill will become law before the end of the 99th Congress in December.
Hughes and McCollum agreed that the bill will help eliminate another glaring
example of the failure of existing federal law to keep pace with technological
advances.

"For the most part," he said, "our laws are rooted in the concept of property
crimes, where someone trespasses into or steals another person's property.
"With computer crimes, the trespassing or theft is done electronically, not
physically," he added.  "Although the losses are often just as great or even
greater than property crime, our laws are not current enough to keep pace with
the changing technology used by the criminals."

Hughes was the author of the nation's first computer crime law in 1984. That
bill established a new federal crime for unauthorized access to classified
information in government computers and a misdemeanor for accessing any federal
computer or computer containing financial or credit information.  The new
measure would establish a:

-:- New felony for trespassing into federal interest computers, those run by or
    for the federal government, banks or states. Offenders would face five-year
    prison terms.

-:- Second felony for "maliciously trespassing" into a federal interest
    computer and causing more than $1,000 in damage.

-:- New category of federal misdemeanors involving the use of illegal BBSes to
    post private information, such as credit card data, phone account
    information and passwords.

"We need to establish clear guidelines for protecting the information stored in
computers and for cracking down on those who knowingly put computers to
criminal of malicious use," Hughes said.

                       Information Provided by J. S. Orr
-------------------------------------------------------------------------------
Access To Government Computers Clarified                           June 9, 1986
----------------------------------------
Sen. Charles McC. Mathias (R- Md.) has introduced a bill in the U.S. Senate
that would amend Section 1030 of Title 18 of the United States Code with the
purpose of clarifying coverage with respect to access to computers operated for
or on behalf of the federal government.

The legislation would clearly impose penalties on anyone who modified,
destroyed or prevented use of information in a government computer system or
who used or disclosed individually identifiable information in such a computer.
The bill has been referred to the Senate Committee on The Judiciary.  No
subcommittee has yet been assigned.

                    Information Provided by Cathryn Conroy
_______________________________________________________________________________

Tap Interviews II...by Dead Lord                                  July 14, 1986
--------------------------------
The infamous Dead Lord is back and this time with an anonymous rag file that he
entitled Tap Interviews II to start people thinking that the Infiltrator had
written it.  Lets look at this file in parts.

First Dead Lord starts out by saying that he is Infiltrator and then changes
his mind and becomes Sharp Razor (who is supposedly in prison).  His first
interview was an imaginary exchange of words between him and Lex Luthor of the
Legion Of Doom.  The interview also was used to rag on Infiltrator by the way
it was presented.

Dead Lord then decided to interview Executive Hacker of Chief Executive
Officers (CEO).  The funny part about this interview is that Executive Hacker
is another handle used by Dead Lord.  The only rag mentioned was that Executive
Hacker didn't know that Ultima IV had been released and that there were only
two members in CEO.  Dead Lord then goes on to say, "LOD is a group of
egotistical fools..."

Then started the straight rags without the interview crap.  This is where ole
Dead Lord gives his opinion on eFerything.  For the first few paragraphs he
rags on The Doctor, SpecElite, pirates in general, Monty Python, and The Flying
Circus BBS.

Then he starts giving descriptions of the people who attend the weekly TAP
meetings:

  "Cheshire is a tired old man, Broadway Hacker, who is an obnoxious slob
   anyway, stopped going, the "950 codes kids" Ninja NYC and his pals have
   mostly moved on, though Ninja NYC still attends.  Ninja NYC is, at 17 years
   old, a complete criminal, the guy has stolen everything you can think of..."

  "Two Sigmund Frauds also attend (they are partners) one is a skinny asshole
   who has an earing and the other I never spoke to, but he is he one who
   supposedly does all the BBS calling.  There is also some friend of Ninja's
   who works for Northern Telcom."

  "There is some young guy with a French accent who always smiles, and some
   middle aged fag who is always talking.  Then there is MARK!  Ye Mark, though
   he tries to be friendly, people try to stay away.  He works at a Camera..."
   "He is slightly (very) unbalanced mentally, and always very confused.  He is
   teased constantly but tolerated."

  "There are also a few less important people, such as "Sid" some greasy kid
   who is proud to have had a $1700+ fone bill because he thought he was using
   a diverter.  Right now, they are generally a motley bunch.  Also they get
   kicked out of restaurants frequently now, and are down to meeting at Burger
   King.  <SIGH>  How pitiful..."

After all of the above bullshit, he talks about Lord Digital, his "cult," and
his adventures with Paul Muad'Dib.  Dead Lord still had more to say though, he
decided to bring up Monty Python again as well as Phrack, TWCB, Stronghold
East, Private Sector, and 2600 Magazine.  All of what he had to say was
completely bogus and Dead Lord claimed to be a member of Metal Shop Private,
although he called it Metal Shop Elite, which is untrue.  Fact is he was never
a member, not even on the old MSP.  He also claims that he has submitted
articles for Phrack, but was turned down because they were original files. Best
bet is that whatever he was writing, he didn't know what he was talking about.

Some notes to Dead Lord, as far as why Taran King was in the hospital; First
off it was a psychiatric ward not a "hospital".  Second, why don't you go and
read PWN 5-1 for the real story of what happened.  Third, the cosysop of
Stronghold East is not the Slayer, it is Slave Driver.

The truth is that both MSP and SE refused to let Dead Lord on and he holds a
grudge.  He then went on to say that both 2600 Magazine and Private Sector
sucked and that they always have.  Of course I am sure that Dead Lord could
easily put out a better magazine then either/or 2600 and Phrack Inc., and he of
course has shown that he can run a better BBS than Private Sector or Metal Shop
Private.  He ragged on several other bulletin boards such as Inner View and
Speed Demon Elite.

After all of that he comes back to the subject of Legion of Doom, starts on
Tribunal of Knowledge, and the says why Chief Executive Officers is better.

  "LOD's main claim to fame is that Lex Luthor types up shitloads of manuals
   and plasters LOD all over them.  Getting published in 2600 every other month
   probably helps also."

  "Another emerging group CEO, isn't as ridiculous as LOD, I mean the members
   [all two of them] know a lot, and write intelligent stuff..."

  "Executive Hacker and Corporate Criminal, not much of a group even if these 2
   do stack up better than the entire LOD."

His last rags were on Adventurer's Tavern and Disk Rigger.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Most of you by now are probably wondering how we tracked him down.  Well for
starters Dead Lord made it a lot easier on us by deciding to mention that he
lived in NYC.  He also talked a lot about others in the NYC area.  Dead Lord is
a member of Draco Tavern.  Dead Lord was refused access to Metal Shop Private
and Stronghold East.  Dead Lord's file was refused for Phrack Inc.  The
clincher however was in finding that Dead Lord was actually Executive Hacker,
and I'm sure that many of you noticed that CEO, the group the Executive Hacker
belongs to, was highlighted and not ragged on.

Some other interesting things about Dead Lord include that fact that he started
a rumor in New York City, that Taran King had appeared on a talk show dealing
with hackers and the he is responsible for giving out Sigmund Fraud's and Ninja
NYC's numbers to Daniel Zigmond and he probably has given him other numbers as
well.

It has been said that Dead Lord's phone number has been disconnected by outside
sources several times in the past and that the entire TAP Meeting attendees
group is out to cause him major physical damage.
_______________________________________________________________________________

Quicknotes
----------
MOB RULES was indited on five counts of wire fraud by the secret service, the
charges dated back to 1984.  This is supposedly part of the reason that the
Marauder took down Twilight Zone, but this is pure rumor.
-------------------------------------------------------------------------------
More talk about Broadway Hacker being a REAL fed or fed informant has sprung
up.  We at PWN are looking for factual evidence that this is true.
-------------------------------------------------------------------------------
Night Stalker, sysop of the Underground, was busted for something dealing with
Transference of Funds.  It is unknown as to if Dan Pasquale had anything to do
with this bust.  Credit Card numbers were frequently found here as well.  His
phone line is being tapped and he cannot really discuss his bust to much.  He
is also under constant surveillance wherever he goes.  Look for a full story
in Phrack World News VII.
-------------------------------------------------------------------------------
The rumor that Carrier Culprit was busted is untrue, but he did receive a call
from AT&T Security, regarding Alliance Teleconferencing Services.
_______________________________________________________________________________
[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2021, Phrack Magazine.