==Phrack Inc.== Volume Two, Issue 22, File 3 of 12 <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> <> <> <> The Judas Contract <> <> ~~~~~~~~~~~~~~~~~~ <> <> Part Two Of The Vicious Circle Trilogy <> <> <> <> An Exploration of The Quisling Syndrome <> <> and <> <> A Look At The Insurrection Of Security Into The Community <> <> <> <> Presented by Knight Lightning <> <> August 7, 1988 <> <> <> <><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><><> The Quisling Syndrome ~~~~~~~~~~~~~~~~~~~~~ Definition: Quisling - (Kwiz/lin) (1) n. Vidkun Quisling (1887 - 1945), Norwegian politician who betrayed his country to the Nazis and became its puppet ruler. (2) n. A traitor. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - The "Quisling" Syndrome is rapidly becoming a common occurrence in the less than legal realms of the modem community. In general it starts out with a phreaker or hacker that is either very foolish or inexperienced. He somehow manages to get caught or busted for something and is scared beyond belief about the consequences of his actions. At this point, the law enforcement agency(s) realize that this one bust alone is worthless, especially since the person busted is probably someone who does not know much to begin with and would be a much better asset if he could assist them in grabbing other more experienced and dangerous hackers and phreaks. In exchange for these services the Judas will have his charges dropped or reduced and considering the more than likely parential pressure these Judases will receive, the contract will be fulfilled. Example; Taken from Phrack World News Issue XV; [This exceprt has been edited for this presentation. -KL] - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Mad Hatter; Informant? July 31, 1987 ~~~~~~~~~~~~~~~~~~~~~~ We at Phrack Inc. have uncovered a significant amount of information that has led us to the belief that Mad Hatter is an informant for some law enforcement organization. MH had also brought down several disks for the purpose of copying Phantasie Realm. Please note; PR was an IBM program and MH has an apple. Control C told us that when he went to pick MH up at the bus terminal, he watched the bus pull in and saw everyone who disembarked. Suddenly Mad Hatter was there, but not from the bus he was supposed to have come in on. In addition to this, he had baking soda wraped in a five dollar bill that he tried to pass off as cocaine. Perhaps to make us think he was cool or something. MH constantly tried to get left behind at ^C's apartment for unknown reasons. He also was seen at a neighbor's apartment making unauthorized calls into the city of Chicago. When asked who he called, his reply was "Don't worry about it." MH had absolutely no money with him during PartyCon (and incidentally ate everything in ^C's refrigerator) and yet he insisted that although he had taken the bus down and had return trip tickets for the bus, that he would fly back home. How was this going to be achieved? He had no money and even if he could get a refund for the bus tickets, he would still be over $200 short. When asked how he was going to do this, his reply was "Don't worry about it." On Saturday night while on the way to the Hard Rock Cafe, Mad Hatter asked Control C for the location of his computer system and other items 4 times. This is information that Hatter did not need to know, but perhaps a SS agent or someone could use very nicely. When Phrack Inc. discovered that Dan The Operator was an FBI informant and made the news public, several people were criticizing him on Free World II Private. Mad Hatter on the other hand, stood up for Noah and said that he was still his friend despite what had happened. Then later when he realized that people were questioning his legitimacy, his original posts were deleted and he started saying how much he wanted to kill Dan The Operator and that he hated him. Mad Hatter already has admitted to knowing that Dan The Operator was an FBI informant prior to SummerCon '87. He says the reason he didn't tell anyone is because he assumed we already knew. A few things to add; ^*^ Some time ago, Mad Hatter was contacted by AT&T because of an illegal Alliance Teleconference that he was responsible for. There was no bust. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Could this AT&T investigation have been the starting point for Mad Hatter's treason against the phreak/hack community? Is there more to it than that? We may never know the full truth behind this, however we do know that Mad Hatter was not the only one to know Dan The Operator's secret prior to SummerCon '87. The Executioner (who had close ties to TMC Security employees in Omaha, Nebraska) was fully aware of Dan The Operator's motives and intentions in the modem world. There does not always have to be a bust involved for a phreak/hacker to turn Judas, sometimes fear and panic can be a more powerful motivator to become a Quisling. Example; Taken From Phrack World News Issue XV; [This exceprt has been edited for this presentation. -KL] - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Crisis On Infinite Hackers July 27, 1987 ~~~~~~~~~~~~~~~~~~~~~~~~~~ It all started on Tuesday, July 21, 1987. Among 30-40 others, Bill From RNOC, Eric NYC, Solid State, Oryan QUEST, Mark Gerardo, The Rebel, and Delta-Master have been busted by the United States Secret Service. There are rumored to be several more members of the more "elite" community busted as well, but since we can neither disprove or prove the validity of these rumors, I have chosen not to name them at this time. One of the offshoots of this investigation is the end of The Lost City of Atlantis and The Lineman's treason against the community he once helped to bring about. In Pennsylvainia, 9 people were busted for credit card fraud. When asked where they learned how to perform the art in which they had been caught, they all responded with the reply of text files from The Lost City Of Atlantis. So, the Secret Service decided to give The Lineman a visit. Lineman, age 16 (a minor) had no charges against him, but he panicked anyway and turned over the bulletin board, all g-philes, and the complete userlog to the Secret Service. This included information from the "Club Board." The final outcome of this action is still on its way. In the meantime, many hackers are preparing for the worst. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - The results and consequences from The Lineman's actions were far more severe than they originally appeared. It is highly speculated that The Lineman was in possesion on a very large directory of phreaks/hackers/pirates that he had recently acquired. That list is now in the hands of the government and the Communications Fraud Control Association (as well as in the files of all of the individual security departments of CFCA members). I've seen it and more. The Lineman was able to acquire this list because one phreak stole it from another and then began to trade it to his friends and to others for information and passwords, etc. and what happened from there is such an over exposure and lack of CONTROL that it fell into the wrong and dangerous hands. Acts such as this will with out a doubt eventually lead all of us towards entropy. Captain Caveman, also known as Shawn of Phreakers Quest, began work to help TMC after he was set up by Scan Man during the summer of 1986. However, being busted or feeling panic are still not the only motivations for becoming a Judas. John Maxfield, one of today's best known security consultants, was once a hacker under the handle(s) of Cable Pair and Uncle Tom. He was a member of the Detroit based Corrupt Computing and the original Inner Circle until he was contacted by the FBI and decided that it would be more fun to bust hackers than be one. The following is an excerpt from Phrack World News Issue V; [This article has been edited for this presentation. -KL] - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Computer Kids, Or Criminals? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ John Maxfield is a computer security consultant who lives in a downriver suburb. Maxfield spends most of his working hours scanning BBSs, and is known by computer crime experts as a hacker tracker. His investigative work scanning boards has resulted in more prosecutions of computer hackers than anyone else in the field, say sources familiar with his work. Maxfield, who accepts death threats and other scare tactics as part of the job, says the trick is knowing the enemy. Next to his monstrous, homemade computer system, Maxfield boasts the only file on computer hackers that exists. [Not true any longer -KL] It contains several thousand aliases used by hackers, many followed by their real names and home phone numbers. All of it is the result of four years of steady hacker-tracking, says Maxfield. "I've achieved what most hackers would dearly love to achieve," said Maxfield. "Hacking the hacker is the ultimate hack." Maxfield estimates there are currently 50,000 hackers operating in the computer underground and close to 1,000 underground bulletin boards. Of these, he estimates about 200 bulletin boards are "nasty," posting credit card numbers, phone numbers of Fortune 500 corporations, regional phone companies, banks, and even authored tutorials on how to make bombs and explosives. One growing camp of serious hackers is college students, who typically started hacking at 14 and are now into drug trafficking, mainly LSD and cocaine, said Maxfield. Maxfield's operation is called BoardScan. He is paid by major corporations and institutions to gather and provide them with pertinent intelligence about the computer underground. Maxfield also relies on reformed hackers. Letters of thanks from VISA and McDonald's decorate a wall in his office along with an autographed photo of Scottie, the engineer on Star Trek's Starship Enterprise. Often he contacts potential clients about business. "More often I call them and say, I've detected a hacker in your system," said Maxfield. "At that point, they're firmly entrenched. Once the hackers get into your computer, you're in trouble. It's analogous to having roaches or mice in the walls of your house. They don't make their presence known at first. But one day you open the refrigerator door and a handful of roaches drop out." Prior to tracking hackers, Maxfield worked for 20-odd years in the hardware end of the business, installing and repairing computers and phone systems. When the FBI recruited him a few years back to work undercover as a hacker and phone phreak, Maxfield concluded fighting hacker crime must be his mission in life. "So I became the hacker I was always afraid I would become," he said. Maxfield believes the hacker problem is growing more serious. He estimates there were just 400 to 500 hackers in 1982. Every two years, he says, the numbers increase by a factor of 10. Another worrisome trend to emerge recently is the presence of adult computer hackers. Some adults in the computer underground pose as Fagans, a character from a Charles Dickens novel who ran a crime ring of young boys, luring young hackers to their underground crime rings. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - John Freeman Maxfield's BoardScan is also known as the Semco Computer Club and Universial Export, the latter coming from the company name used by the British government in Ian Flemming's James Bond novels and subsequent motion pictures. Another Judas hacker who went on to become a security consultant is the infamous Ian Arthur Murphy of I.A.M. Security. Perhaps he is better known as Captain Zap. The following excerpt is from The Wall Street Journal; [This article has been edited for this presentation. -KL] - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - It Takes A Hacker To Catch A Hacker As Well As A Thief November 3, 1987 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Dennis Kneale (Staff Reporter Of The Wall Street Journal) "Computer Hacker Ian [Arthur] Murphy Prowls A Night Beat Tracking Down Other Hackers Who Pirate Data" Capt. Zap actually Ian A. Murphy, is well-known as one of the first convicted computer-hacker thieves. He has since reformed -- he swears it -- and has been resurrected as a consultant, working the other side of the law. CRIME CREDENTIALS Other consultants, many of them graying military vets, try to flush out illicit hackers. But few boast the distinction of being a real hacker -- and one with a felony among his credentials. Capt. Zap is more comfortable at the screen than in a conversation. Asked to name his closest friend, he shakes his head and throws up his hands. He has none. "I don't like people," he says. "They're dreadful." "He's legendary in the hacking world and has access to what's going on. That's a very valuable commodity to us," says Robert P. Campbell of Advanced Information Management in Woodbridge, Va., Mr. Murphy's mentor, who has hired him for consulting jobs. The 30-year-old Mr. Murphy is well-connected into his nocturnal netherworld. Every night till 4 a.m., he walks a beat through some of the hundreds of electronic bulletin boards where hackers swap tales and techniques of computer break-ins. It is very busy these nights. On the Stonehenge bulletin board, "The Marauder" has put up a phone number for Citibank's checking and credit-card records, advising, "Give it a call." On another board, Mr. Murphy finds a primer for rookie "hacklings," written by "The Knights Of Shadow." On yet another he sifts out network codes for the Defense Department's research agency. He watches the boards for clients and warns when a system is under attack. For a fee of $800 a day and up, his firm, IAM/Secure Data Systems Inc., will test the security of a data base by trying to break in, investigate how the security was breached, eavesdrop on anyone you want, and do anything else that strikes his fancy as nerd vs. spy. He says his clients have included Monsanto Co., United Airlines, General Foods Corp., and Peat Marwick. Some probably don't know he worked for them. His felony rap -- not to mention his caustic style -- forces him to work often under a more established consultant. "Ian hasn't grown up yet, but he's technically a brilliant kid," says Lindsey L. Baird, an Army veteran whose firm, Info-Systems Safeguards in Morristown, New Jersey has hired Capt. Zap. Mr. Murphy's electronic voyeurism started early, At age 14, he would sneak into the backyard to tap into the phone switch box and listen to neighbor's calls. (He still eavesdrops now and then.) He quit highschool at age 17. By 19 he was impersonating a student and sneaking into the computer center Temple University to play computer games. EASY TRANSITION From there it was an easy transition to Capt. Zap's role of breaking in and peeking at academic records, credit ratings, a Pentagon list of the sites of missiles aimed at the U.S., and other verboten verbiage. He even left his resume inside Bell of Pennsylvania's computer, asking for a job. The electronic tinkering got him into trouble in 1981. Federal agents swarmed around his parent's home in the wealthy suburb of Gladwyne, Pa. They seized a computer and left an arrest warrant. Capt. Zap was in a ring of eight hackers who ran up $212,000 in long-distance calls by using a "blue box" that mimics phone-company gear. They also ordered $200,000 in hardware by charging it to stolen credit-card numbers and using false mail drops and bogus purchase orders. Mr. Murphy was the leader because "I had the most contempt" for authority, he says. In 1982, he pleaded guilty to receiving stolen goods and was sentenced to 1,000 hours of community service and 2 1/2 years of probation. "It wasn't illegal. It was electronically unethical," he says, unrepentant. "Do you know who likes the phone company?" Who would have a problem with ripping them off?" Mr. Murphy, who had installed commercial air conditioning in an earlier job, was unable to find work after his arrest and conviction. So the hacker became a hack. One day in his cab he picked up a Dun & Bradstreet Corp. manager while he was carrying a printout of hacker instructions for tapping Dun's systems. Thus, he solicited his first consulting assignment: "I think you need to talk to me." He got the job. As a consultant, Mr. Murphy gets to do, legally, the shenanigans that got him into trouble in the first place. "When I was a kid, hacking was fun. Now I can make money at it and still have a lot of fun." - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Now because of all the publicity surrounding our well known friends like Ian Murphy or John Maxfield, some so-called hackers have decided to cash in on news coverage themselves. Perhaps the most well known personality that "sold out" is Bill Landreth aka The Cracker, who is the author of "Out Of The Inner Circle," published by Microsoft Press. The book was definitely more fiction than fact as it tried to make everyone believe that not only did The Cracker form the Inner Circle, but that it was the first group ever created. However, for starters, The Cracker was a second-rate member of Inner Circle II. The publicity from the book may have served to bring him some dollars, but it ultimately focused more negative attention on the community adding to an already intense situation. The Cracker's final story had a little sadder ending... Taken from Phrack World News Issue X; [This article has been edited for this presentation. -KL] - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - The Cracker Cracks Up? December 21, 1986 ~~~~~~~~~~~~~~~~~~~~~~ "Computer 'Cracker' Is Missing -- Is He Dead Or Is He Alive" ESCONDIDO, Calif. -- Early one morning in late September, computer hacker Bill Landreth pushed himself away from his IBM-PC computer -- its screen glowing with an uncompleted sentence -- and walked out the front door of a friend's home here. He has not been seen or heard from since. The authorities want him because he is the "Cracker", convicted in 1984 of breaking into some of the most secure computer systems in the United States, including GTE Telemail's electronic mail network, where he peeped at NASA Department of Defense computer correspondence. His literary agent wants him because he is Bill Landreth the author, who already has cashed in on the successful publication of one book on computer hacking and who is overdue with the manuscript of a second computer book. The Institute of Internal Auditors wants him because he is Bill Landreth the public speaker who was going to tell the group in a few months how to make their computer systems safer from people like him. The letter, typed into his computer, then printed out and left in his room for someone to discover, touched on the evolution of mankind, prospects for man's immortality and the defeat of the aging process, nuclear war, communism versus capitalism, society's greed, the purpose of life, computers becoming more creative than man and finally -- suicide. The last page reads: "As I am writing this as of the moment, I am obviously not dead. I do, however, plan on being dead before any other humans read this. The idea is that I will commit suicide sometime around my 22nd birthday..." The note explained: "I was bored in school, bored traveling around the country, bored getting raided by the FBI, bored in prison, bored writing books, bored being bored. I will probably be bored dead, but this is my risk to take." But then the note said: "Since writing the above, my plans have changed slightly.... But the point is, that I am going to take the money I have left in the bank (my liquid assets) and make a final attempt at making life worthy. It will be a short attempt, and I do suspect that if it works out that none of my current friends will know me then. If it doesn't work out, the news of my death will probably get around. (I won't try to hide it.)" Landreth's birthday is December 26 and his best friend is not counting on seeing him again. "We used to joke about what you could learn about life, especially since if you don't believe in a God, then there's not much point to life," said Tom Anderson, 16, a senior at San Pasqual High School in Escondido, about 30 miles north of San Diego. Anderson also has been convicted of computer hacking and placed on probation. Anderson was the last person to see Landreth. It was around September 25 -- he does not remember exactly. Landreth had spent a week living in Anderson's home so the two could share Landreth's computer. Anderson's IBM-PC had been confiscated by authorities, and he wanted to complete his own book. Anderson said he and Landreth were also working on a proposal for a movie about their exploits. Apparently Landreth took only his house key, a passport, and the clothes on his back. But concern grew by October 1, when Landreth failed to keep a speaking engagement with a group of auditors in Ohio, for which he would have received $1,000 plus expenses. Landreth may have kept a messy room and poor financial records, but he was reliable enough to keep a speaking engagement, said his friends and literary agent, Bill Gladstone, noting that Landreth's second manuscript was due in August and had not yet been delivered. But, the manuscript never came and Landreth has not reappeared. Steve Burnap, another close friend, said that during the summer Landreth had grown lackadaisical toward life. "He just didn't seem to care much about anything anymore." - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Landreth eventually turned up in Seattle, Washington around the third week of July 1987. Because of his breaking probation, he is back in jail finishing his sentence. Another individual who wanted to publicize himself is Oryan QUEST. Ever since the "Crisis On Infinite Hackers" that occurred on July 21, 1987, QUEST has been "pumping" information to John Markoff -- a reporter for the San Francisco Examiner who now has moved up to the New York Times. Almost t everything Oryan QUEST has told John Markoff are utter and complete lies and false boasts about the powerful things OQ liked to think he could do with a computer. This in itself is harmless, but when it gets printed in newspapers like the New York Times, the general public get a misleading look at the hacker community which can only do us harm. John Markoff has gone on to receive great fame as a news reporter and is now considered a hacker expert -- utterly ridiculous. _______________________________________________________________________________ Infiltration ~~~~~~~~~~~~ One way in which the hacking community is constantly being infiltrated happens on some of today's best known bulletin boards. Boards like Pirate-80 sysoped by Scan Man (who was also working for Telemarketing Company; a telecommunications reseller in Charleston, West Virginia) can be a major problem. On P-80 anyone can get an account if you pay a nominal fee and from there a security consultant just has to start posted supplied information to begin to draw attention and fame as being a super hacker. Eventually he will be asked to join ill-formed groups and start to appear on boards with higher levels of information and blend into the community. After a while he will be beyond suspicion and as such he has successfully entered the phreak/hack world. Dan The Operator was one such agent who acted in this way and would have gone on being undiscovered if not for the events of SummerCon '87 whereafter he was exposed by Knight Lightning and Phrack Inc. :Knight Lightning "The Future Is Forever" =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= =========================================================================