==Phrack Inc.== Volume Three, Issue 27, File 12 of 12 PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN P h r a c k W o r l d N e w s PWN PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN PWN Issue XXVII/Part 3 PWN PWN PWN PWN June 20, 1989 PWN PWN PWN PWN Created, Written, and Edited PWN PWN by Knight Lightning PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN One of Cliff Stoll's "Wily Hackers" Is Dead (Suicide?) June 5, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ According to West German publications, the "Wily Hacker" Karl Koch, of Hannover, West Germany, died Friday, June 3, probably by suicide. His body was found burnt (with gasoline) to death, in a forest near Celle (a West German town near Hannover where he committed his hacks, as had been observed by German Post). Koch was one of the 2 hackers who confessed their role in the KGB hack to the public prosecutors, therewith bringing the case to public attention. As German newspapers report, he probably suffered from a psychic disease: He thought he was permanently observed by alien beings named Illimunates' which tried to kill him. Probably, he had internalized the role of "Captain Hagbard" (his pseudonym in the hacking scene), taken from a U.S. book, who (like him) suffered from supervision by the Illuminates. Police officials evidently think that Koch committed suicide (though it is believed, that there are "some circumstances" which may also support other theories; no precise information about such moments are reported). According to German police experts, Karl Koch's role in the KGB case as in daily life can properly be understood when reading this unknown book. Information Provided by Klaus Brunnstein (University of Hamburg) [Illuminates... KGB... whatever... -KL] - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Illuminatus! June 14, 1989 ~~~~~~~~~~~~ The book in question is believed to be "Illuminatus!" by Harold Shea and Robert Anton Wilson. The book is a spoof on conspiracy theories, and suggests that many and probably all human institutions are just fronts for a small group of "enlightened ones," who are themselves a front for the Time dwarves from Reticuli Zeta, or perhaps Atlantean Adepts, remnants of Crowley's Golden Dawn, or even more likely the Lloigor of H.P. Lovecraft's Cthulhu Mythos. A leading character in this book is named Hagbard Celine. "Illuminatus!" is a fun read if you like psychedelia and paranoia. It also seems to have influenced a lot of subsequent work, most notably Adams' "Hitchhiker's Guide to the Galaxy." It is easy to see how an unbalanced mind, taking it literally, could be completely absorbed. In fact "Illuminatus!" seems as if it was written with the intent of just this sort of programming, referring to it as "Operation Mindfuck." This is probably not a real danger for the vast majority of sane adults, but it may, tragically, have been the case here. Or perhaps, no disrespect intended, Koch may in the course of various hacks really have discovered too much about the Illuminati. After all, they are supposed to be the secret power behind the KGB :-) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - For more information on Clifford Stoll and the Wily Hackers of West Germany, please see: "Who Is Clifford Stoll?" (No Date) Phrack World News issue XXII/Part 1 "A Message From Clifford Stoll" (1/10/89) Phrack World News issue XXIII/Part 2 And the following articles all found in Phrack World News issue XXV/Part 2: "German Hackers Break Into Los Alamos and NASA" (3/2/89) "Computer Espionage: Three 'Wily Hackers' Arrested" (3/2/89) "Computer Spy Ring Sold Top Secrets To Russia" (3/3/89) "KGB Computer Break-Ins Alleged In West Germany" (3/3/89) "News From The KGB/Wily Hackers" (3/7/89) _______________________________________________________________________________ Sex Put On Probation By Mystery Hacker June 13, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Ft. Lauderdale News and Sun-Sentinel "Yes, you sound very sexy, but I really need a probation officer." DELRAY BEACH, Fla. -- Callers trying to dial a probation office in Delray Beach, Fla on Monday, June 12, heard a smorgasbord of sex talk from a panting woman named Tina instead. Southern Bell telephone officials said a computer hacker reprogrammed their equipment over the weekend, routing overflow calls intended for the local probation office to a New York-based phone sex line. "People are calling the Department of Corrections and getting some kind of sex palace," said Thomas Salgluff, a spokesman for the Palm Beach County probation office. Southern Bell officials said it was the first time their switching equipment has been reprogrammed by an outside computer intruder. Southern Bell provides local telephone service in Florida, Georgia, North Carolina, and South Carolina. "We're very alarmed," said Southern Bell spokesman Buck Passmore. He said such a feat would require someone with considerable computer knowledge. The implications of such a computer breach are considerable. Intercepting corporate communications, uncovering unlisted phone numbers, and tampering with billing information are all plausible consequences of computer security breaches at the the phone company. Hackers have invaded Southern Bell in the past, but they have never reprogrammed a telephone link, Passmore said. Security technicians from Southern Bell and AT&T are trying to trace the source of the computer breach, Passmore said. _______________________________________________________________________________ Hacking For A Competitive Edge May 12, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Taken from the Los Angeles Times Two former Tampa, FLA TV news managers have been charged with illegally tapping into phone lines and computers at another station to gain a news edge over their competitors. Former new director Terry Cole and assistant news director Michael Shapiro at WTSP-TV have been charged with 17 counts of computer hacking and conspiracy in the theft of information from WTVT-TV through computer phone lines, authorities said. Their arraignment was set for May 19. If convicted, each could face a maximum prison sentence of 85 years. The two were fired from WTSP when the station learned of the alleged thefts. The break-ins began in November, 1988, but were not noticed until January 12, 1989, when WTVT's morning news producer noticed that files were missing, authorities said. Computer experts determined that an intruder had rifled the files. Authorities said Shapiro knew WTVT's security system thoroughly because he had helped set it up while working there as an assignment manager before being hired away from WTVT in October. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - TV News Executives Fired After Hacking Charges From Rival ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Tampa, Fla. -- A Florida television station fired two news executives in the wake of reports that one of them allegedly penetrated a rival station's computer system and stole sensitive information. WTSP-TV (Channel 10), an ABC affiliate in St. Petersburg, announced that it had fired Assistant News Director Michael Shapiro and News Director Terry Cole. Shapiro was arrested on February 7th on felony charges for allegedly breaking into a computer system at WTVT-TV (Channel 13) on at least six occasions in January. He was once employed by WTVT as an assistant manager and was responsible for administering the station's computer systems. Law enforcement officials seized from Shapiro's home a personal computer, 200 floppy disks and an operating manual and user guide for software used at the rival station. He has been charged with 14 felony counts under Florida Statute 815, which covers computer-related crimes. Each count carries a maximum sentence sentence of 15 years and a $10,000 fine. Vince Barresi, WSTP's vice-president and general manager, refused to comment on the two firings. However, in a prepared statement, he said that he told viewers during an 11 PM newscast last Tuesday that the station acted to "avoid any questions about the objective way we do our business in keeping the public informed." Cole, who hired Shapiro last September, has not been charged by Florida law enforcement officials. He was fired, according to one source, because as director of the news room operations, he is held ultimately for the actions of news staffers. Shapiro and Cole were unavailable for comment. [Another story that discussed this case was "Television Editor Charged In Raid On Rival's Files" (February 8, 1989). It appeared in Phrack World News Issue XXIV/Part 2. -KL] _______________________________________________________________________________ National Crime Information Center Leads To Repeat False Arrest May 14, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by James Rainey (Los Angeles Times) Mix ups with the databases at the NCIC have caused Roberto Perales Hernandez to be jailed twice in the last three years as a suspect in a 1985 Chicago residential burglary. The authorities confused him with another Roberto Hernandez due to a single entry in the FBI's National Crime Information Center computer. The two Roberto Hernandezes are the same height, about the same weight, have brown hair, brown eyes, tattoos on their left arms, share the same birthday, and report Social Security numbers which differ by only one digit! The falsely imprisoned man has filed suit charging the Hawthorne, California Police Department, Los Angeles County, and the state of California with false imprisonment, infliction of emotional distress, and civil rights violations stemming from the most recent arrest last year. He had previously received a $7,000 settlement from the county for holding him 12 days in 1986 before realizing he was the wrong man. In the latest incident, he was held for seven days then freed with no explanation. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Another False Incarceration May 18, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~ In his testimony on May 18, 1989 to the Subcommittee on Civil and Constitutional Rights of the Committee on the Judiciary of the U.S. House of Representatives, relating to the National Crime Information Center, David D. Redell cited another case of false incarceration concerning Roberto Perales Hernandez as well as various cases noted earlier -- such as that of Terry Dean Rogan [see below]: "Only last week, a case in California demonstrated the potential benefit of easy access to stored images. Joseph O. Robertson had been arrested, extradited, charged, and sent to a state mental facility for 17 months. During that entire time, mug shots and fingerprints were already on file showing clearly that he was the wrong man, but no one had taken the trouble to check them." - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - These articles show clear examples of the damage and problems caused by this "super" database. People like William Bayse (Federal Bureau of Investigation's Director For Technical Services) and William Sessions (Director of the FBI) either fail to realize this or perhaps they just do not care (as long as something similar does not happen to them). For those of you who are interested in looking into this further, the first article about this NCIC database was; "'Big Brotherish' Data Base Assailed," (November 21, 1988). It appeared in Phrack World News Issue XXII/Part 3. Another incident similar to the cases mentioned above concerned Richard Lawrence Sklar, a political science professor at the University of California at Los Angeles. He was mistaken by the computer for a fugitive wanted in a real estate scam in Arizona. Before the FBI figured out that they had the incorrect person, Sklar, age 58, spent two days being strip searched, herded from one holding pen to another, and handcuffed to gang members and other violent offenders. For more details on this case and the case concerning Terry Dean Rogan, please refer to "FBI National Crime Information Center Data Bank," (February 13, 1989) which appeared in Phrack World News Issue XXIV/Part 2 (as well as the Washington Post). _______________________________________________________________________________ TRW and Social Security Administration May 12, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The credit bureau of TRW has been working with the Social Security Administration to verify its database of 140 million names and Social Security numbers. In order to cover the cost, TRW is paying the Social Security Administration $1 million, while Social Security Administration will provide a matching $1 million. Since the Social Security Administration is asking for a budget increase for their computer and telecommunications systems, several legislators are outraged by the fact they they are spending $1 million for this non-government project. Claiming that the project is "as far away from the mission of the Social Security Administration as anything I have ever come across," Senator David Pryor (D-Ark) questioned the competence and credibility of Social Security Administration Commissioner Dorcas R. Hardy and asked for an investigation by the HHS inspector general. In addition, several lawmakers such as Dale Bumpers (D-Ark) believe the project to be a violation of civil liberties. Said Bumpers, "I don't like any public institution releasing an individual's private information." The American Law Division of the Congressional Research Service has already concluded that the project is a violation of the Privacy Act of 1974. [A related article, "Verifying Social Security Numbers," (April 11, 1989) appeared in Phrack World News Issue XXVI/Part 3 (as well as the New York Times on the same date). -KL] _______________________________________________________________________________ Phrack World News XXVII Quicknotes ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 1. The current name assigned to the new network being created by the merger of BITNET and CSNET is ONENET. ------------------------------------------------------------------------------- 2. NPA 903 Assigned to NE Texas (May 10, 1989) -- It was just announced that those portions of 214 outside Dallas will be changed to 903 in the Fall of 1990. With 708 assigned to Chicago, 903 assigned to Texas, and 908 assigned to New Jersey, only 909 and 917 remain to be assigned before the format changes. ------------------------------------------------------------------------------- 3. Details On New Area Code 510 (June 6, 1989) -- The press release from Pacific Bell, quoted in the San Francisco Chronicle, gives the phase-in dates for the new NPA 510. Inception is scheduled for October 7, 1991, with a four-month grace period when NPA 415 will still work for the affected numbers. Final cutover is scheduled for January 27, 1992. NPA 510 will encompass Alameda and Contra Costa counties, which currently have 842,388 customers out of the current 2,005,687 customers in NPA 415. ------------------------------------------------------------------------------- 4. New Jersey Area Code To Be Split (April 27, 1989) -- The split is not supposed to occur until 1991. The new NPA will be 908 and it will basically cover the southern "half" of the current 201 area. The affected counties will be Warren, Hunterdon, Middlesex, Union, Monmouth and Ocean, and the southwest corner of Morris). Counties remaining in 201 will be Sussex, Passaic, Bergen, Essex, Hudson, and the majority of Morris. New Jersey Bell will also start requiring area codes on calls into New York and Pennsylvania that have been considered part of New Jersey local calling areas. This will apparently take effect October 2 and free up about 25 exchanges. Information from the Asbury Park Press. [This last line somewhat contradicts the first line as far as the dates are concerned. More information as we get it. -- KL.] ------------------------------------------------------------------------------- 5. New Area Codes For London (April 27, 1989) -- British Telecom has announced that the area code for London is to be changed on May 6th, 1990, due to the increased number of lines needed in the capital. The existing code is 01-, and the new codes to be introduced are 071- for the centre of the city and 081- for the suburbs. A list was published in the Evening Standard, showing which exchanges will fall in which area. ------------------------------------------------------------------------------- 6. Member Learns The Hard Way: American Express Is Watching (May 4, 1989) -- This article taken from the San Jose Mercury News describes how American Express called a member to voice their concern that he might not be able to pay his recent bill. American Express was able to access his checking account and find that he had less than what was owed to them. His card was temporarily "deactivated" after the member refused to give any financial information except that he would pay up the bill with cash when it came in. Apparently, the card application, in finer print, declares that "[American Express reserves] the right to access accounts to ascertain whether you are able to pay the balance." After some arguments with the company, the member comments that "I learned a lesson: My life is not as private as I thought." ------------------------------------------------------------------------------- 7. Southwestern Bell's QuickSource (April 24, 1989) -- Southwestern Bell Telephone Company is running a one year trial (March 1989 89 - March 1990) of two information services: QuickSource (audiotex) and Sourceline (videotext). The latter requires a terminal of some type, but the former only requires a touch-tone phone for access. The QuickSource number is 323-2000, but cannot be accessed via 1+713+; SWBTCo has blocked access to "the Houston metro area served by SWBTCo," according to the script the woman reads to you when ask for help (713-865-5777; not blocked). The help desk will send you a free QuickSource directory though. ------------------------------------------------------------------------------- 8. Telemail, MCI, AT&T Mail Interconnection (May 16, 1989) -- U.S. Sprint's subsidiary, Telenet has announced an interconnection agreement between Telemail, Telenet's electronic mail product, MCI Mail, and AT&T Mail. The new arrangement, scheduled to be in effect later this summer, will allow the 300,000 worldwide users of Telemail, the 100,000 users of MCI Mail and the 50,000 users of AT&T Mail to conveniently send email messages to each other. ------------------------------------------------------------------------------- 9. Illinois Bell Knocked Out For Four Hours! (May 18,1989) -- Service to over 40,000 Illinois Bell subscribers in the northwest suburbs of Chicago was disrupted for about four hours because of problems with the computer in the switching center. Phones were either dead or inoperative for incoming and outgoing calls between 9:30 a.m. and 1:40 p.m. because of a software glitch at the central office in Hoffman Estates, IL. Most of the disruption occurred in Hoffman Estates, Schaumburg, Arlington Heights, Hanover Park, and Streamwood, IL. The exact nature of the problem was not discussed by the Bell spokesman who reported that the outage had been corrected. Apparently the backup system which is supposed to kick in also failed. ------------------------------------------------------------------------------- 10. SRI Attacked By Kamikaze Squirrels (May 29, 1989) -- It seems that the Data Defense Network SRI's "no-single-point-of-failure" power system failed at the hands, or rather the paws, of a squirrel. The power was off for approximately 9 hours and they experienced no hardware problems. This was at least the third time that a squirrel has done SRI in. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 11. New York Telephone Freebies (June 10, 1989)(San Francisco Chronicle, p. 2.) -- 24 pay phones along the Long Island Expressway were in fact free phones because of a programming/database screw-up. They were being heavily used for long distance calls by those who had discovered the oversight, including many to Pakistan (Police found 15 Pakistani men using the phones when they went to investigate after a shooting). There were no estimates on the unrecovered cost of the phone calls. _______________________________________________________________________________ *** END ***