==Phrack Magazine== Volume Four, Issue Forty-Three, File 27 of 27 PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN PWN PWN PWN Phrack World News PWN PWN PWN PWN Compiled by Datastream Cowboy PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN New Yorker Admits Cracking July 3, 1993 ~~~~~~~~~~~~~~~~~~~~~~~~~~ (From AP Newswire Sources) Twenty-one-year-old Mark Abene of New York, known as "Phiber Optik" in the underground computing community, has pleaded guilty to charges he participated in a group that broke into computers used by phone companies and credit reporting services. The Reuter News Service says Abene was the last of the five young men indicted in the huge 1991 computer break-in scheme to admit committing the crimes. The group called itself "MOD," an acronym used for "Masters of Disaster" and "Masters of Deception." Abene pleaded guilty to one count of conspiracy and one count of unlawful access to computers. He faces a possible maximum prison term of 10 years and fine of $500,000. ----------------------------------------------------------------------------- China Executes Computer Intruder April 26, 1993 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ (From AP Newswire Sources) A man accused of invading a computer and embezzling some $192,000 has been executed in China. Shi Biao, an accountant at the Agricultural Bank of China's Jilin branch, was accused of forging deposit slips from Aug. 1 to Nov. 18, 1991. The crime was the first case of bank embezzlement via computer in China. Authorities became aware of the plot when Shi and his alleged accomplice, Yu Lixin, tried to wire part of the money to Shenzhen in southern China. ----------------------------------------------------------------------------- Teen Takes the A Train --- Literally May 13, 1993 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ (From AP Newswire sources) A 16 year old 10th grader successfully conveyed passengers on a NYC 10 car subway train for 2.5 hours until he went around a curve too quickly and could not reset the emergency brakes. Keron Thomas dressed as a NY subway train engineer impersonated Regoberto Sabio, a REAL subway motorman, while he was on vacation and even obtained Sabio's "pass number". Thomas was a Subway enthusiast who hung around train stations and areas where subway motormen and other subway workers hang out. A NYC subway spokesman was quoted as saying "Buffs like to watch...pretty soon they figure out how" [to run the train]. "This guy really knew what he was doing". Thomas was charged with criminal trespassing, criminal impersonation, and reckless endangerment. ----------------------------------------------------------------------------- Banks React To Scheme That Used Phony ATM May 13, 1993 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ (From AP Newswire Sources) At least three people are believed to be involved in an ATM scam that is thought to have netted roughly $ 60,000. The fraud was perpetrated by obtaining a real ATM machine (theorized to have been stolen from a warehouse) and placing it in a Connecticut shopping mall. When people attempted to use the machine, they received a message that the machine wasn't working correctly and gave back the card. Little did they know that their bank account number and PIN code was recorded. The fake machine was in place for about 2 weeks. It was removed and the thieves began making withdrawals. The Secret Service thinks the scammers recorded anywhere from 2000 to 3000 account numbers/pin codes but did not get a chance to counterfeit and withdraw money except from a few hundred accounts before it became too dangerous to continue ----------------------------------------------------------------------------- Hacker Gets Jail Time June 5, 1993 ~~~~~~~~~~~~~~~~~~~~~ (Newsday) (Page 13) A Brooklyn College film student, who was part of a group that allegedly broke into computer systems operated by major telephone companies, was sentenced yesterday to 1 year and 1 day in prison. John Lee, 21, of Bedford Stuyvesant, also was sentenced to 200 hours of community service, which Manhattan Federal District Court Judge Richard Owen recommended he spend teaching others to use computers. Lee had pled guilty December 3, 1992, to a conspiracy charge involving computer tampering, fraud and illegal wiretapping. _______________________________________________________________________________ Hacker Gets Prison Term For Phone Computer Tampering June 4, 1993 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Gail Appleson (The Reuter Business Report) NEW YORK -- A computer hacker known as "Corrupt" who was part of a group that broke into computer systems operated by major telephone companies was sentenced Friday to one year and one day in prison. The defendant, John Lee, 21, of New York had pleaded guilty December 3, 1992 to a conspiracy charge involving computer tampering, fraud and illegal wiretapping. The indictment alleges the defendants broke into computer switching systems operated by Southwestern Bell, New York Telephone, Pacific Bell, U.S. West and Martin Marietta Electronics Information and Missile Group. Southwestern Bell allegedly lost $370,000 because of the crimes. The defendants also allegedly tampered with systems owned by the nation's largest credit reporting companies including TRW, Trans Union and Information America. They allegedly obtained 176 TRW credit reports on various individuals. The indictment alleged the group broke into the computers "to enhance their image and prestige among other computer hackers and to harass and intimidate rival hackers and other people they did not like." _______________________________________________________________________________ Professional Computer Hackers First To Land In Jail Under New Law June 4, 1993 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Nicholas Hills (The Vancouver Sunds)(Page A11) LONDON -- In Brussels, they were celebrated as the two young men who broke the gaudy secrets of EC president Jacques Delors' expense accounts. In Sweden, they were known as the Eight-Legged Groove Machine, bringing down part of the country's telephone network, forcing a highly publicized apology from a government minister who said the chaos was all due to a 'technical fault'. They also broke into various European defense ministry networks, academic systems at Hull University and the financial records of the leading London bankers, S.G. Warburg. No, these weren't two happy-go-lucky burglars; but rather, professional computer hackers, aged 24 and 22, who made legal as well as technological history by being the first offenders of this new trade to be jailed for their crimes under new British law. Neil Woods and Karl Strickland have gone to prison for six months each for penetrating computer systems in 15 different countries. The ease with which they conducted this exercise, and their attitude that they were simply engaging in "intellectual joyriding," has confirmed the worst fears of legal and technological experts that computer hacking in Europe, at least, has become a virtually uncontrollable virus. The case became a cause celebre because of what had happened months before in another courtroom where a teenage computer addict who had hacked into the White House system, the EC, and even the Tokyo Zoo -- using a $400 birthday present from his mother -- had walked free because a jury accepted, basically, that a computer had taken over his mind. The case of 19-year-old Paul Bedworth, who began hacking at the age of 14, and is now studying "artificial intelligence" at Edinburgh University, provides an insight into why hackers have turned the new computer world into an equivalent state of delirium tremens. Bedworth and two young friends caused thousands of dollars worth of damage to computer systems in Britain and abroad. They were charged with criminal conspiracy under the Computer Misuse Act of 1990. Bedworth never did deny computer hacking at his trial, and did not give evidence in his defense. He simply said through his lawyer that there could not have been any criminal intent because of his "pathological obsession" with computers. A jury of eight men and three women unanimously acquitted him. Until the passage of the Computer Misuse Act in 1990, hacking was legal in Britain. Bedworth may have been found not guilty, but his activities were so widespread that the authorities' investigation involved eight different British police forces, and others from as far afield as Finland and Singapore. It produced so much evidence - mostly on disk - that if it had been printed out on ordinary laser printer paper, it is estimated that the material would have reached a height of 42 meters. The police were devastated by the verdict, but are now feeling somewhat better after the conviction of Woods and Strickland. The pair, using the nicknames of Pad and Gandalf, would spend up to six hours a day at their computers, boasting about "smashing" databases. ----------------------------------------------------------------------------- Computers Turned My Boy Into A Robot March 18, 1993 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By Martin Phillips (Daily Mirror)(Page 1) Connie Bedworth said she was powerless to control the "monster" as he glued himself to the screen nearly 24 hours as day. "He didn't want to eat or sleep--he just couldn't bear to be away from it, " she said. A jury decided Paul Bedworth, now 19, was so "hooked" he could not stop himself hacking in to companies' systems -- allegedly costing them thousands of dollars. ----------------------------------------------------------------------------- Hot For The Fingertips: An Internet Meeting Of Minds May 23, 1993 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Frank Bajak (Associated Press) NEW YORK -- Somewhere in the ether and silicon that unite two workstations 11 floors above lower Broadway, denizens of the cyberpunk milieu are feverishly debating whether anyone in government can be trusted. This is the 12-by-20-foot bare-walled home of MindVox, today's recreation hall for the new lost generation's telecomputing crowd. You can enter by phone line or directly off Internet. Patrick Kroupa and Bruce Fancher are the proprietors, self-described former Legion of Doom telephone hackers who cut the cord with computing for a time after mid-1980s teen-age shenanigans. Kroupa is a towering 25-year-old high school dropout in a black leather jacket, with long hair gathered under a gray bandanna, three earrings and a hearty laugh. Fancher is 22 and more businesslike, but equally in love with this dream he left Tufts University for. They've invested more than $80,000 into Mindvox, which went fully operational in November and has more than 2,000 users, who pay $15 to $20 a month plus telephone charges. MindVox aspires to be a younger, harder-edged alternative to the WELL, a fertile 8-year-old watering hole for the mind in Sausalito, California, with more than 7,000 users, including scores of computer age luminaries. One popular feature is a round-table discussion on computer theft and security hosted by a U.S. Treasury agent. The latest hot topic is the ease of breaking into a new flavor of local access network. ----------------------------------------------------------------------------- Hi Girlz, See You In Cyberspace May 1993 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Margie (Sassy Magazine) (Page 79) [Margie hits the net via Mindvox. Along the way she discovers flame wars, sexism, and a noted lack of females online. This is her story. :) ] ----------------------------------------------------------------------------- Hacker Accused of Rigging Radio Contests April 22, 1993 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By Don Clark (San Francisco Chronicle) A notorious hacker was charged yesterday with using computers to rig promotional contest at three Los Angeles radio stations, in a scheme that allegedly netted two Porsches, $20,000 in cash and at least two trips to Hawaii. Kevin Lee Poulsen, now awaiting trial on earlier federal charges, is accused of conspiring with two other hackers to seize control of incoming phone lines at the radio stations. By making sure that only their calls got through, the conspirators were assured of winning the contests, federal prosecutors said. A new 19-count federal indictment filed in Los Angeles charges that Poulsen also set up his own wire taps and hacked into computers owned by California Department of Motor Vehicles and Pacific Bell. Through the latter, he obtained information about the undercover businesses and wiretaps run by the FBI, the indictment states. Poulsen, 27, is accused of committing the crimes during 17 months on the lam from earlier charges of telecommunications and computers fraud filed in San Jose. He was arrested in April 1991 and is now in the federal Correctional Institution in Dublin. In December, prosecutors added an espionage charge against him for his alleged theft of a classified military document. The indictment announced yesterday adds additional charges of computer and mail fraud, money laundering, interception of wire communications and obstruction of justice. Ronald Mark Austin and Justin Tanner Peterson have pleaded guilty to conspiracy and violating computer crime laws and have agreed to help against Poulsen. Both are Los Angeles residents. Poulsen and Austin have made headlines together before. As teenagers in Los Angeles, the two computer prodigies allegedly broke into a Pentagon-organized computer network that links researchers and defense contractors around the country. ----------------------------------------------------------------------------- SPA Tracks Software Pirates on Internet March 22, 1993 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By Shawn Willett (InfoWorld)(Page 12) The Software Publishers Association has begun investigating reports of widespread piracy on the Internet, a loose amalgam of thousands of computer networks. The Internet, which began as a Unix-oriented, university-based communi- cations network, now reaches into corporate and government sites in 110 countries and is growing at a rapid pace. The software theft, according to Andrew Patrizio, an editor at the _Software Industry Bulletin_, has been found on certain channels, particularly the warez channel. "People are openly talking about pirating software; there seems to be no one there to monitor it", Patrizio said. A major problem with the Internet is that the "sites" from where the software is being illegally downloaded can physically be located in countries that do not have strong antipiracy laws, such as Italy or the former Soviet Union. The Internet also has no central administrator or system operator. "Policing the entire Internet would be a job", said Peter Beruk, litigation manager for the SPA, in Washington. "My feeling would be to target specific sections that are offering a lot of commercial software free for the download", he said. --------------------------------------------------------------------------- Socialite's Son Will Have To Pay $15,000 To Get His Impounded 1991 BMW Back March 23, 1993 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By John Makeig (Houston Chronicle)(Page 14A) Kenyon Shulman, son of Houston socialite Carolyn Farb will have to pay 15 thousand dollars to get back his 1991 BMW 325i after being impounded when Houston police found 400 doses of the drug ecstasy in its trunk. This is just the latest brush with authorities for Shulman who in 1988 was raided by Harris County authorities for using his personal computer to crack AT&T codes to make free long distance calls. -------------------------------------------------------------------------- Austin Man Gets 10 Years For Computer Theft, Sales May 6, 1993 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By Jim Phillips (Austin American Statesman)(Page B3) Jason Copson, who was arrested in July under his alias Scott Edward Berry, has been sentenced to 10 years on each of four charges of burglary and one count of assault. The charges will run concurrently. Copson still faces charges in Maryland and Virginia where he served a prison term and was serving probation for dealing in stolen goods. Police arrested Copson and Christopher Lamprecht on July 9 during a sting in which the men tried to sell computer chips stolen from Advanced Micro Devices. --------------------------------------------------------------------------- Treasury Told Computer Virus Secrets June 19, 1993 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By: Joel Garreau (Washington Post) (Page A01) For more than a year, computer virus programs that can wreak havoc with computer systems throughout the world were made available by a U.S. government agency to anyone with a home computer and a modem, officials acknowledged this week. At least 1,000 computer users called a Treasury Department telephone number, spokesmen said, and had access to the virus codes by tapping into the department's Automated Information System bulletin board before it was muzzled last month. The bulletin board, run by a security branch of the Bureau of Public Debt in Parkersburg, W.Va., is aimed at professionals whose job it is to combat such malicious destroyers of computer files as "The Internet Worm," "Satan's Little Helper" and "Dark Avenger's Mutation Engine." But nothing blocked anyone else from gaining access to the information. Before the practice was challenged by anonymous whistleblowers, the bulletin board offered "recompilable disassembled virus source code"-that is, programs manipulated to reveal their inner workings. The board also made available hundreds of "hackers' tools"-the cybernetic equivalent of safecracking aids. They included "password cracker" software-various programs that generate huge volumes of letters and numbers until they find the combination that a computer is programmed to recognize as authorizing access to its contents-and "war dialers," which call a vast array of telephone numbers and record those hooked to a computer. The information was intended to educate computer security personnel, according to Treasury spokesmen. "Until you understand how penetration is done, you can't secure your system," said Kim Clancy, the bulletin board's operator. The explosion of computer bulletin boards-dial-up systems that allow users to trade any product that can be expressed in machine-readable zeros and ones-has also added to the ease of virus transmission, computer analysts say. "I am Bulgarian and my country is known as the home of many productive virus writers, but at least our government has never officially distributed viruses," wrote Vesselin Vladimirov Bontchev of the Virus Test Center of the University of Hamburg, Germany. At first, the AIS bulletin board contained only routine security alert postings. But then operator Clancy "began to get underground hacker files and post them on her board," said Bruce Sterling, author of "The Hacker Crackdown: Law and Disorder on the Electronic Frontier." "She amassed a truly impressive collection of underground stuff. If you don't read it, you don't know what's going to hit you." Clancy, 30, who is a former Air Force bomb-squad member, is highly regarded in the computer security world. Sterling, one of the nation's foremost writers about the computer underground, called her "probably the best there is in the federal government who's not military or NSA (National Security Agency). Probably better than most CIA." Clancy, meanwhile, is staying in touch with the underground. In fact, this week, she said, she was "testing a product for some hackers." Before it goes into production, she will review it to find potential bugs. It is a new war dialer called "Tone-Loc." "It's an extremely good tool. Saves me a lot of trouble. It enables me to run a hack against my own phone system faster" to determine points of vulnerability. ----------------------------------------------------------------------------- [AGENT STEAL -- WORKING WITH THE FEDS] IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF TEXAS DALLAS DIVISION ----------------------------------- THE UNITED STATES OF AMERICA * * V. * CRIMINAL NO. 3-91-194-T * (FILED UNDER SEAL) JUSTIN TANNER PETERSEN (1) * JOINT MOTION TO SEAL COMES NOW the United States of America, by its United States Attorney, at the request of the defendant, and hereby requests that this Honorable Court seal the record in this case. In support thereof, the United States states the following: 1. The case is currently being transferred to the Middle District of California for plea and disposition pursuant to Federal Rule of Criminal Procedure 20; 2. The defendant is released on bond by the United States District Court for the Middle District of California; 3. The defendant, acting in an undercover capacity, currently is cooperating with the United States in the investigation of other persons in California; and 4. The United States believes that the disclosure of the file in this case could jeopardize the aforesaid investigation and possibly the life of the defendant. Consequently, the United States requests that this Honorable Court seal the record in this case. Respectfully submitted, MARVIN COLLINS United States Attorney LEONARD A. SENEROTE Assistant United States Attorney Texas State Bar No. 18024700 1100 Commerce Street, Room 16G28 Dallas, Texas 75242-1699 (214) 767-0951 CERTIFICATE OF CONFERENCE The defendant joins in this motion. LEONARD A. SENEROTE Assistant United States Attorney [The entire file of information gathered from the courts regarding Agent Steal is available from Phrack for $5.00 + $2 postage] -------------------------------------------------------------------------