768 lines
41 KiB
Text
768 lines
41 KiB
Text
|
==Phrack Inc.==
|
||
|
|
||
|
Volume Four, Issue Forty-One, File 13 of 13
|
||
|
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
PWN PWN
|
||
|
PWN Phrack World News PWN
|
||
|
PWN PWN
|
||
|
PWN Issue 41 / Part 3 of 3 PWN
|
||
|
PWN PWN
|
||
|
PWN Compiled by Datastream Cowboy PWN
|
||
|
PWN PWN
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
|
||
|
|
||
|
Boy, 15, Arrested After 911 Paralyzed By Computer Hacker October 7, 1992
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Caroline Mallan (The Toronto Star)(Page A22)
|
||
|
|
||
|
A 15-year-old boy has been arrested after a hacker pulling computer pranks
|
||
|
paralyzed Metro's emergency 911 service.
|
||
|
|
||
|
Police with Metro's major crime unit investigated the origin of countless calls
|
||
|
placed to the 911 service from mid-July through last month.
|
||
|
|
||
|
The calls were routed to emergency services in the Etobicoke area, said
|
||
|
Detective Willie Johnston, who led the investigation.
|
||
|
|
||
|
Phony medical emergency calls were reported and police, fire and ambulance
|
||
|
crews were dispatched on false alarms. On one occasion, the computer hacker
|
||
|
managed to tie up the entire 911 service in Metro -- making it unavailable for
|
||
|
true emergencies.
|
||
|
|
||
|
Police were not sure last night how long the system was shut down for but
|
||
|
Johnston said the period was considerable.
|
||
|
|
||
|
Staff Sergeant Mike Sale warned hackers that phony calls can be traced.
|
||
|
|
||
|
"A criminal abuse of the 911 emergency system will result in a criminal
|
||
|
investigation and will result in an arrest," Sale said, adding police had only
|
||
|
been investigating this hacker for a few weeks before they came up with a
|
||
|
suspect.
|
||
|
|
||
|
Bell Canada investigators helped police to trace the origin of the calls and
|
||
|
officers yesterday arrested a teen while he was in his Grade 11 class at a
|
||
|
North York high school.
|
||
|
|
||
|
Two computers were seized from the boy's home and will be sent to Ottawa to be
|
||
|
analyzed.
|
||
|
|
||
|
Johnston said police are concerned that other hackers may also be able to halt
|
||
|
the 911 service, since the computer technology used was fairly basic, although
|
||
|
the process of rerouting the calls from a home to the Etobicoke emergency lines
|
||
|
was very complex.
|
||
|
|
||
|
The calls went via computer modem through two separate phone systems in major
|
||
|
U.S. cities before being sent back to Canada, Johnston explained.
|
||
|
|
||
|
The suspect, who cannot be named under the Young Offenders Act, is charged with
|
||
|
theft of telecommunications, 24 counts of mischief and 10 counts of conveying
|
||
|
false messages.
|
||
|
|
||
|
He was released from custody and will appear in North York youth court November
|
||
|
6, police said.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Police Say They've Got Hackers' Number October 8, 1992
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by John Deverell (The Toronto Star)(Page A8)
|
||
|
|
||
|
Hackers, take note. Metro police and Ma Bell are going to get you.
|
||
|
|
||
|
A young North York computer freak accused of launching 10 false medical alerts
|
||
|
to 911 this summer may have learned -- the hard way -- that his telephone
|
||
|
tricks weren't beating the pros.
|
||
|
|
||
|
Police arrived with a search warrant at the home of the 15-year-old, arrested
|
||
|
him and carted away his computer.
|
||
|
|
||
|
He's charged with 10 counts of conveying false messages, 24 counts of mischief,
|
||
|
and theft of telecommunications.
|
||
|
|
||
|
Inspector Bill Holdridge, of 911 emergency services, said the false alarms in
|
||
|
July and August never posed any technical problem to his switchboard but
|
||
|
resulted in wild goose chases for the police, fire and ambulance services.
|
||
|
|
||
|
"Those resources weren't available for real alarms, which could have been a
|
||
|
serious problem," Holdridge said.
|
||
|
|
||
|
The 911 service, quartered at 590 Jarvis Street, gets about 7,000 calls a day,
|
||
|
of which 30% warrant some kind of emergency response.
|
||
|
|
||
|
Normally, a computerized tracing system takes only seconds to provide the
|
||
|
address and number of the telephone from which a call originates -- unless the
|
||
|
point of origin has been somehow disguised.
|
||
|
|
||
|
Apparently the 911 prankster got into the telephone system illegally and routed
|
||
|
his calls through several U.S. networks before bringing them back to Toronto.
|
||
|
|
||
|
Detective Willie Johnston said the boy's parents were stunned when police
|
||
|
arrived. "They really didn't have a clue what was going on," said Johnston.
|
||
|
|
||
|
The false emergencies reported were nowhere near the accused boy's home.
|
||
|
"Without condoning it, you could understand it if he were sitting around the
|
||
|
corner watching the flashing lights," said Johnston. "But they were miles
|
||
|
away. It defies logic."
|
||
|
|
||
|
Neither Johnston nor Holdridge would explain how they and Bell security finally
|
||
|
traced the false alarms. "That might just make other hackers try to figure out
|
||
|
another way," Holdridge said.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Hackers Targeted 911 Systems, Police Say October 10, 1992
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
Taken from United Press International
|
||
|
|
||
|
Authorities expect to make more arrests after penetrating a loose network of
|
||
|
computer hackers called the "Legion of Doom" they say tapped into corporate
|
||
|
phone lines to call 911 systems nationwide with the intent of disrupting
|
||
|
emergency services.
|
||
|
|
||
|
Prosecutors from Virginia, New Jersey and Maryland -- in conjunction with
|
||
|
investigators from two telephone companies -- traced some of the hackers and
|
||
|
closed in on three homes in two states.
|
||
|
|
||
|
A 23-year-old Newark, New Jersey man was arrested early on October 9th. He
|
||
|
faces several charges, including fraud. Other arrests are expected in two
|
||
|
Maryland locations.
|
||
|
|
||
|
The suspect, known by several aliases and identified by authorities only as
|
||
|
Maverick, told investigators the group's intent was "to attempt to penetrate
|
||
|
the 911 computer systems and infect them with viruses to cause havoc," said
|
||
|
Captain James Bourque of the Chesterfield County police in Virginia.
|
||
|
|
||
|
The probe is just beginning, according to Bourque. "Quite honestly, I think
|
||
|
it's only the tip of the iceberg," he said.
|
||
|
|
||
|
The hackers first penetrate the phone lines of large companies or pay phones,
|
||
|
then use those connections to call 911 lines, Bourque said. The hackers
|
||
|
usually make conference calls to other 911 services in other cities, tying up
|
||
|
communications in several locations simultaneously.
|
||
|
|
||
|
"One time we were linked up with Toronto and Los Angeles jurisdictions,"
|
||
|
Bourque said. "And none of us could disconnect."
|
||
|
|
||
|
Sometimes as many five hackers would be on the line and would make false calls
|
||
|
for help. Communications officers, unable to stop the calls, would have to
|
||
|
listen, then try to persuade the officers in other locales "that the call
|
||
|
wasn't real," Bourque said.
|
||
|
|
||
|
"Obviously, there's a real potential for disastrous consequences," he said.
|
||
|
|
||
|
One phone bill charged to a company in Minnesota indicated the scope of the
|
||
|
problem. The company discovered in a 30-day period that it had been charged
|
||
|
with more than $100,000 in phone calls generated by the hackers, according to
|
||
|
Bourque.
|
||
|
|
||
|
"I'm sure there are a multitude of other jurisdictions across the country
|
||
|
having the same problems," Bourque said.
|
||
|
|
||
|
People identifying themselves as members of the "Legion of Doom" -- which also
|
||
|
is the name of a pro wresting team -- have called a Richmond, Virginia
|
||
|
television station and ABC in New York in an attempt to get publicity, Bourque
|
||
|
said.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
More On 911 "Legion Of Doom" Hacking Case October 20, 1992
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Barbara E. McMullen & John F. McMullen (Newsbytes)
|
||
|
|
||
|
NEW YORK CITY -- In a discussion with Newsbytes, Sgt. Kurt Leonard of the
|
||
|
Chesterfield County, Virginia Police Department has disclosed further
|
||
|
information concerning the on-going investigation of alleged 911 disruption
|
||
|
throughout the eastern seaboard of the United States by individuals purporting
|
||
|
to be members of the hacker group "The Legion of Doom" (LOD).
|
||
|
|
||
|
Leonard identified the individual arrested in Newark, New Jersey, previously
|
||
|
referred to only as "Maverick," as Scott Maverick, 23. Maverick has been
|
||
|
charged with terroristic threats, obstruction of a government function, and
|
||
|
illegal access to a computer. He is presently out on bail.
|
||
|
|
||
|
Leonard said that David Pluchino, 22, was charged to the same counts as
|
||
|
Maverick and an additional count of the possession of burglary tools. Leonard
|
||
|
said that Pluchino, the subject of a 1990 Secret Service "search and seizure"
|
||
|
action under the still on-going "Operation SunDevil" investigation," possessed
|
||
|
information linking him with members of the Legion of Doom.
|
||
|
|
||
|
The Legion of Doom connection has become the subject of controversy within the
|
||
|
online community. Although Maverick has been quoted as saying that he is a
|
||
|
member of the group and that the group's intent was "to attempt to penetrate
|
||
|
the 911 computer systems and inflect them with viruses to cause havoc," members
|
||
|
of the group have disavowed any connection with those arrested.
|
||
|
|
||
|
"Lex Luthor," one of the original members of the group, told Newsbytes when the
|
||
|
initial report of the arrests became public: "As far as I am concerned the LOD
|
||
|
has been dead for a couple of years, never to be revived. Maverick was never
|
||
|
in LOD. There have been 2 lists of members (one in Phrack and another in the
|
||
|
LOD tj) and those lists are the final word on membership."
|
||
|
|
||
|
He added, "We obviously cannot prevent copy-cats from saying they are in LOD.
|
||
|
When there was an LOD, our goals were to explore and leave systems as we found
|
||
|
them. The goals were to expose security flaws so they could be fixed before
|
||
|
REAL criminals and vandals such as this Maverick character could do damage. If
|
||
|
this Maverick character did indeed disrupt E911 service he should be not only
|
||
|
be charged with computer trespassing but also attempted murder. 911 is serious
|
||
|
business."
|
||
|
|
||
|
Lex Luthor's comments, made before the names of the arrested were released,
|
||
|
were echoed by Chris Goggans, aka "Erik Bloodaxe," and Mark Abene, aka "Phiber
|
||
|
Optik," both ex-LOD members, and by Craig Neidorf who chronicled the membership
|
||
|
of LOD in his electronic publication "Phrack."
|
||
|
|
||
|
When the names of the arrested became public, Newsbytes again contacted Lex
|
||
|
Luthor to see if the names were familiar. Luthor replied: "Can't add anything,
|
||
|
I never heard of them."
|
||
|
|
||
|
Phiber Optik, a New York resident, told Newsbytes that he remembered Pluchino
|
||
|
as a person that ran a computer "chat" system called "Interchat" based in New
|
||
|
Jersey. "They never were LOD members and Pluchino was not known as a computer
|
||
|
hacker. It sounds as though they were LOD wanabees who are now, by going to
|
||
|
jail, going to get the attention they desire," he said.
|
||
|
|
||
|
A law enforcement official, familiar with the SunDevil investigation of
|
||
|
Pluchino, agreed with Phiber, saying, "There was no indication of any
|
||
|
connection with the Legion of Doom." The official, speaking under the
|
||
|
condition of anonymity, also told Newsbytes that the SunDevil investigation of
|
||
|
Pluchino is still proceeding and, as such, no comment can be made.
|
||
|
|
||
|
Leonard also told Newsbytes that the investigation has been a joint effort of
|
||
|
New Jersey, Maryland, and Virginia police departments and said that, in
|
||
|
conjunction with the October 9th 2:00 AM arrests of Pluchino and Maverick, a
|
||
|
simultaneous "search and seizure" operation was carried out at the Hanover,
|
||
|
Maryland home of Zohar Shif, aka "Zeke," a 23 year-old who had also been the
|
||
|
subject of a SunDevil search and seizure.
|
||
|
|
||
|
Leonard also said that, in addition to computers taken from Pluchino, material
|
||
|
was found "establishing a link to the Legion of Doom." Told of the comments by
|
||
|
LOD members that the group did not exist anymore, Leonard said "While the
|
||
|
original members may have gone on to other things, these people say they are
|
||
|
the LOD and some of them have direct connection to LOD members and have LOD
|
||
|
materials."
|
||
|
|
||
|
Asked by Newsbytes to comment on Leonard's comments, Phiber Optik said "The
|
||
|
material he's referring to is probably text files that have been floating
|
||
|
around BBS's for years, Just because someone has downloaded the files certainly
|
||
|
doesn't mean that they are or ever were connected with LOD."
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Complaints On Toll Fraud Aired at FCC En Banc Hearing October 13, 1992
|
||
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Art Brodsky (Communications Daily)(Page 1)
|
||
|
|
||
|
Customers of PBX manufacturers told the Federal Communications Commission (FCC)
|
||
|
they shouldn't be liable for toll fraud losses incurred because vendors never
|
||
|
told them of capabilities of their equipment that left companies open to
|
||
|
electronic theft. Their case was buttressed by one of country's leading toll-
|
||
|
fraud investigators, who told day-long en banc hearing that customers shouldn't
|
||
|
have to pay if they're victimized. Donald Delaney of the New York State Police
|
||
|
said toll fraud "is the only crime I know where the victims are held liable."
|
||
|
Toll fraud losses have been estimated to run into billions of dollars.
|
||
|
|
||
|
Commission's look at toll fraud came in context of what FCC can do to prevent
|
||
|
or lessen problem. Comr. Marshall said Commission's job would be to apportion
|
||
|
liability between vendors and customers. Comr. Duggan, who has been leader on
|
||
|
issue at Commission, said toll fraud was "hidden degenerative disease on the
|
||
|
body of business." He focused on insurance solution to problem, along with
|
||
|
sharing of liability. There are cases pending at FCC filed by AT&T customers
|
||
|
that deal with sharing of liability, and whether common carriers are protected
|
||
|
by tariffs from paying customers for losses. Witnesses told Commission it was
|
||
|
hard to find any law enforcement agency interested in problem, from local
|
||
|
police to FBI, in addition to difficulties with vendors. U.S. Secret Service
|
||
|
has statutory responsibility over toll fraud, said attorney William Cook, who
|
||
|
testified in afternoon session. There was general agreement that more customer
|
||
|
education was needed to prevent fraud, policy endorsed by Northern Telecom,
|
||
|
which has active customer education program.
|
||
|
|
||
|
AT&T came in for particular criticism in morning session as users said company
|
||
|
was insensitive to toll fraud problems. Thomas Mara, executive vice-president
|
||
|
Leucadia National Corp., whose company suffered $300,000 in toll fraud, said he
|
||
|
"had a hell of a time getting anybody at AT&T to pay attention" to problems his
|
||
|
company was encountering. Mara said his company saw level of 800 calls rise to
|
||
|
10,448 from 100. He said AT&T was supposed to notify users if there was any
|
||
|
"dramatic increase in volume, yet we were not notified of a thousandfold
|
||
|
increase in 800 number usage nor were we informed of an increase from a few
|
||
|
hours a month in international calls to thousands of hours by AT&T, only after
|
||
|
receiving our bills." Investigation found that 800 number connecting Rolm
|
||
|
switch to company's voice mail was hackers' entry method, Mara said.
|
||
|
|
||
|
Clearly angry with AT&T, Mara said he has "a feeling they use it as a profit
|
||
|
center." Lawrence Gessini, telecommunications director for Agway Corp. of
|
||
|
Syracuse, agreed, saying: "Toll fraud should not become a rationale for higher
|
||
|
profits for carriers." He told FCC that new programs introduced by long
|
||
|
distance carriers won't solve problem because of constraints, limitations and
|
||
|
expense.
|
||
|
|
||
|
Speaking for International Communications Association (ICA) user group, Gessini
|
||
|
said problems occur because new technologies allow more types of fraud and
|
||
|
because "old tariff concepts" that limit common carrier liability "distort
|
||
|
market incentives." Vendors, he said, are "generally lackadaisical and are
|
||
|
slow to correct even known problems in their hardware, firmware and software,"
|
||
|
and give low priority to complaints. ICA advocated 5 principles including FCC
|
||
|
inquiry into fraud, creation of advisory committee and willingness of
|
||
|
Commission to protect users.
|
||
|
|
||
|
Geoffrey Williams, industry consultant and telecommunications manager for
|
||
|
IOMEGA Corp., said AT&T has been "most notable" for asking for restitution,
|
||
|
while Sprint and MCI are more lenient. MCI doesn't charge users for first
|
||
|
hacking incident, he said, but after that users are on their own.
|
||
|
|
||
|
AT&T defended itself in afternoon session, when International Collections Dist.
|
||
|
Manager Peter Coulter rejected users' accusations, saying company had increased
|
||
|
customer education program "dramatically" since last year. He insisted that
|
||
|
AT&T is "very concerned" by toll fraud: "Contrary to what some people want to
|
||
|
believe, no long distance carrier is making a profit off toll fraud." He said
|
||
|
AT&T had 6,000 customers attend equipment security seminars in 1991, but that
|
||
|
number had been exceeded in first 6 months of 1992. He said results of
|
||
|
increased education program were "only preliminary" but his group was receiving
|
||
|
"a lot more accommodations" than complaints from customers.
|
||
|
|
||
|
Coulter, while never admitting that company should shoulder any financial
|
||
|
liability, admitted that "things are different now" as to how AT&T approaches
|
||
|
toll fraud problem. He said that within AT&T it used to be hardware division
|
||
|
vs. service division. "The hardware guys said it was a service problem, the
|
||
|
service guys said it was the hardware's fault," Coulter said. But now both
|
||
|
divisions are "working together on the problem . . . we're talking to each
|
||
|
other."
|
||
|
|
||
|
Delaney of N.Y. state police gave the FCC a picture of the toll fraud situation
|
||
|
dominated by as few as 15 practitioners, most of whom gain illegal entry to
|
||
|
telephone systems simply by dialing numbers for hours on end. Those so-called
|
||
|
"finger hackers," rather than computer hackers, are responsible for 90% of
|
||
|
fraud, he said, telling Commission that equipment vendors should be held
|
||
|
accountable for fraud. Most fraudulent calls go to Pakistan, Colombia and
|
||
|
Dominican Republic, he said.
|
||
|
|
||
|
Delaney pointed out practical objection to further vendor education problem,
|
||
|
telling commissioners that for vendor to engage in education would also be to
|
||
|
admit there could be problem with equipment security, something sales people
|
||
|
don't want to do. He said some customers had been sold systems and didn't know
|
||
|
they had capability for remote access -- means used by hackers to gain entry.
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
Hanging Up On Hackers October 12, 1992
|
||
|
~~~~~~~~~~~~~~~~~~~~~
|
||
|
by Miriam Leuchter (Crain's New York Business)(Page 21)
|
||
|
|
||
|
"Thieves tap phone systems, but business cuts the line."
|
||
|
|
||
|
Ron Hanley suspected a technical glitch when his company's telephone bill
|
||
|
listed an unusually large number of calls lasting four seconds to its 800-
|
||
|
number from New York City. But the executive at Dataproducts New England in
|
||
|
Wallingford, Connecticut didn't lose sleep over the problem -- until he got a
|
||
|
call two months later from the security department at American Telephone &
|
||
|
Telegraph Co.
|
||
|
|
||
|
Dataproducts had been hacked. Two days after that, Mr. Hanley got a bill
|
||
|
confirming the bad news: In one 24-hour period, street-corner phone users in
|
||
|
New York had made some 2,000 calls to the Caribbean on the company's line,
|
||
|
ringing up about $50,000 in tolls.
|
||
|
|
||
|
Dataproducts is not alone. Estimates of the cost of telecommunications fraud
|
||
|
in the United States each year run from $1 billion to as much as $9 billion.
|
||
|
According to John J. Haugh, editor of Toll Fraud and Telabuse and chairman of a
|
||
|
Portland, Oregon consulting firm, losses reached $4 billion in 1991 and are
|
||
|
expected to climb 30% in 1992.
|
||
|
|
||
|
Some 35,000 businesses and other users -- such as foundations and government
|
||
|
agencies -- will be hit this year. In the first six months, Mr. Haugh says,
|
||
|
more than 900 New York City companies were victims of telephone-related fraud.
|
||
|
|
||
|
"If you have a PBX system or calling cards or voice mail, you are vulnerable,
|
||
|
exceedingly vulnerable," says Peggy Snyder, executive director of the
|
||
|
Communications Fraud Control Association, a national information clearinghouse
|
||
|
based in Washington. "As technology gets more user-friendly, the opportunity
|
||
|
to commit a crime is much greater."
|
||
|
|
||
|
Armed with computers, modems and sometimes automatic dialers or random-number
|
||
|
generating software, high-technology thieves can use your telephone system as
|
||
|
if it is their own -- without having to pay the tolls. The series of very
|
||
|
short calls Mr. Hanley spotted on one phone bill should have tipped off his
|
||
|
800-number service provider -- which he had alerted when he spotted the pattern
|
||
|
-- that hackers were trying to break into his system.
|
||
|
|
||
|
Who are these hackers -- a term used to describe someone who uses a telephone
|
||
|
or computer to obtain unauthorized access to other computers? Many are
|
||
|
teenagers or young adults out to demonstrate their computer skills and make
|
||
|
some mischief. Five young New Yorkers are awaiting trial in federal court on
|
||
|
unauthorized access and interception of electronic communications charges in
|
||
|
one widely publicized telephone fraud case.
|
||
|
|
||
|
A much smaller proportion are more serious criminals: drug dealers, money
|
||
|
launderers and the like, who don't want their calls traced. In one case, Ms.
|
||
|
Snyder cites a prostitution ring that employed unused voice mail extensions at
|
||
|
one company to leave and receive messages from clients.
|
||
|
|
||
|
Many hackers have connections to call-sell operators who set up shop at phone
|
||
|
booths, primarily in poorer immigrant neighborhoods in cities from New York to
|
||
|
Los Angeles. For a flat fee -- the going rate is $10, according to one source
|
||
|
-- callers can phone anywhere in the world and talk as long as they want. The
|
||
|
hawker at the phone booth pockets the cash and someone else pays the bill.
|
||
|
|
||
|
Perhaps 15 to 20 so-called finger hackers (who crack authorization codes by
|
||
|
hand dialing) distribute information to call-sell operators at thousands of
|
||
|
locations in New York. According to Don Delaney, a senior investigator for the
|
||
|
New York State Police, the bulk of such calls from phone booths in the city go
|
||
|
to the Dominican Republic, Pakistan and Colombia.
|
||
|
|
||
|
Hackers may use more than technical skill to gain the access they want.
|
||
|
Sometimes they practice "social engineering" -- talking a company's employees
|
||
|
into divulging information about the telephone system. Or they manage a
|
||
|
credible imitation of an employee, pretending to be an employee.
|
||
|
|
||
|
In one of the latest schemes, a fraudulent caller gets into a company's system
|
||
|
and asks the switchboard operator to connect him with an outside operator. The
|
||
|
switchboard assumes the caller is an employee who wants to make a personal call
|
||
|
on his own calling card.
|
||
|
|
||
|
Instead, he uses a stolen or hacked calling card number. The fraud goes
|
||
|
undetected until the card's owner reports the unauthorized use to his long-
|
||
|
distance carrier. If the cardholder refuses to pay the charges, the phone
|
||
|
company traces the calls to the business from which they were placed. Because
|
||
|
it looks as if the call came from the company, it is often held liable for the
|
||
|
charge.
|
||
|
|
||
|
In another new twist, a hacker gains access to an unused voice mail extension
|
||
|
at a company, or takes over someone's line at night or while the regular user
|
||
|
is on vacation. He changes the recorded announcement to say, "Operator, this
|
||
|
number will accept all collect and third-party calls." Then the hacker -- or
|
||
|
anyone else -- can telephone anywhere in the world and bill the charges to that
|
||
|
extension.
|
||
|
|
||
|
Sometimes the fraud is much more organized and sophisticated, however. Robert
|
||
|
Rasor, special agent in charge of the financial crime division of the U.S.
|
||
|
Secret Service, gives an example of a three-way calling scheme in which hackers
|
||
|
tap into a phone system in the United States and set up a separate network that
|
||
|
allows people in other countries to call each other directly. "The
|
||
|
Palestinians are one of the more prominent groups" running these sorts of
|
||
|
fraud, he says.
|
||
|
|
||
|
But no matter who the end user is, businesses like Dataproducts end up footing
|
||
|
the bill. Personal users are generally not held liable for the unauthorized
|
||
|
use of their calling card numbers. Under current regulation, a business is
|
||
|
responsible for all calls that go through its equipment, whether or not those
|
||
|
calls originated at the company.
|
||
|
|
||
|
This hard fact rankles Mr. Hanley. "It's totally frustrating and almost
|
||
|
unbelievable that you're responsible for this bill. It's really frightening
|
||
|
for any company."
|
||
|
|
||
|
Dataproducts's liability was relatively small compared with the $168,000
|
||
|
average Mr. Haugh calculated in a study he made last year. It could have been
|
||
|
worse yet.
|
||
|
|
||
|
"The largest case I've ever seen in the metropolitan region was a company that
|
||
|
lost almost $1 million within 30 days," says Alan Brill, managing director of
|
||
|
the New York corporate security firm Kroll Associates Inc.
|
||
|
|
||
|
"It was a double whammy, because even though their long-distance carrier saw a
|
||
|
suspicious pattern of calls and blocked access to those area codes, the company
|
||
|
didn't know its PBX system would automatically switch to another carrier if
|
||
|
calls couldn't go through," Mr. Brill says. "So the company got a bill for
|
||
|
$300,000 from its primary carrier and a $600,000 bill from the secondary
|
||
|
carrier."
|
||
|
|
||
|
Both AT&T and Sprint Corp. offer service plans that limit liability to $25,000
|
||
|
per fraud episode for their business customers. Mr. Brill advises companies to
|
||
|
evaluate the cost-effectiveness of these plans in great detail, because in
|
||
|
order to be eligible for coverage companies must take certain steps to minimize
|
||
|
their risk. "If you reduce your risk significantly, you may not need the
|
||
|
coverage," he says.
|
||
|
|
||
|
The plans require customers to respond to a problem in as little as two hours
|
||
|
after notification of unauthorized calls. Doing so will stem your losses in
|
||
|
any event. "You also have to think about how you're staffed," adds Mr. Brill.
|
||
|
"Can you act that fast?"
|
||
|
_______________________________________________________________________________
|
||
|
|
||
|
PWN Quicknotes
|
||
|
~~~~~~~~~~~~~~
|
||
|
|
||
|
1. HACKER PARTY BUSTED (by Robert Burg, Gannett, 11/3/92) -- "PumpCon Popped!"
|
||
|
-- WHITE PLAINS, New York -- Police say a Halloween party they broke up
|
||
|
Sunday (11/1/92) was more than just a rowdy party - it also was a computer
|
||
|
hacker party.
|
||
|
|
||
|
Three men were charged with unauthorized use of a computer and attempting
|
||
|
computer trespass. A fourth man was arrested on an outstanding warrant
|
||
|
involving violating probation on a charge of computer fraud in Arizona,
|
||
|
Greenburgh Detective Lt. Cornelius Sullivan said.
|
||
|
|
||
|
Security officers at the Westchester Marriott contacted police after
|
||
|
noticing an unusual number of people entering and leaving one room. Police
|
||
|
said that when they arrived, there were 21 people inside and computers
|
||
|
hooked up to telephone lines. Police said they also found telephone credit
|
||
|
cards that did not belong to any of the people present.
|
||
|
|
||
|
The three charged with unauthorized use of a computer and attempted
|
||
|
computer trespass were Randy Sigman, 40, of Newington, Connecticut; Ronald
|
||
|
G. Pinz, 21, of Wallingford, Connecticut and Byron Woodard, 18, of
|
||
|
Woonsocket, Rhode Island.
|
||
|
|
||
|
They were being held at the Westchester County Jail in Valhalla pending
|
||
|
arraignment.
|
||
|
|
||
|
The man charged on the warrant, Jason Brittain, 22, of Tucson, Arizona, was
|
||
|
being held without bail pending arraignment.
|
||
|
|
||
|
The Westchester County District Attorney frauds division seized the
|
||
|
computer hardware, software, and other electrical equipment.
|
||
|
|
||
|
Sullivan said the party-goers heard about the party through computer
|
||
|
bulletin boards.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
2. COMPUTER ACCESS ARRESTS IN NEW YORK (Barbara E. McMullen & John F.
|
||
|
McMullen, Newsbytes, 11/3/92) -- GREENBURGH, NEW YORK -- The Greenburgh,
|
||
|
New York Police Department has announced the arrest of three individuals,
|
||
|
Randy P. Sigman, 40; Ronald G. Pinz, Jr, 21; and Byron J. Woodard, 18 for
|
||
|
the alleged crimes of Unauthorized Use Of A Computer and Attempted Computer
|
||
|
Trespass, both misdemeanors. Also arrested was Jason A. Brittain, 22 in
|
||
|
satisfaction of a State of Arizona Fugitive From Justice warrant.
|
||
|
|
||
|
The arrests took place in the midst of an "OctoberCon" or "PumpCon" party
|
||
|
billed as a "hacker get-together" at the Marriott Courtyard Hotel in
|
||
|
Greenburgh. The arrests were made at approximately 4:00 AM on Sunday
|
||
|
morning, November 1st. The three defendants arrested for computer crimes
|
||
|
were granted $1,000 bail and will be arraigned on Friday, November 6th.
|
||
|
|
||
|
Newsbytes sources said that the get together, which had attracted up to
|
||
|
sixty people, had dwindled to approximately twenty-five when, at 10:00
|
||
|
Saturday night, the police, in response to noise complaints arrived and
|
||
|
allegedly found computers in use accessing systems over telephone lines.
|
||
|
The police held the twenty-five for questioning and called in Westchester
|
||
|
County Assistant District Attorney Kenneth Citarella, a prosecutor versed
|
||
|
in computer crime, for assistance. During the questioning period, the
|
||
|
information on Brittain as a fugitive from Arizona was obtained and at 4:00
|
||
|
the three alleged criminal trespassers and Brittain were charged.
|
||
|
|
||
|
Both Lt. DeCarlo of the Greenburgh police and Citarella told Newsbytes
|
||
|
that the investigation is continuing and that no further information is
|
||
|
available at this time.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
3. U.S. PRISON SENTENCE FOR COMPUTER HACKER (New York Law Journal, 10/15/92,
|
||
|
Page 7) -- A Brooklyn man was sentenced yesterday to eight months in prison
|
||
|
for buying passwords from a computer hacker group known as the "masters of
|
||
|
deception" [MOD] for resale to others seeking access to confidential credit
|
||
|
reports.
|
||
|
|
||
|
Morton Rosenfeld, 21, received the sentence in federal court in Manhattan
|
||
|
after pleading guilty in June to obtaining the unauthorized access devices
|
||
|
to computer data bases operated by TRW Information Services and other
|
||
|
credit reporting companies.
|
||
|
|
||
|
The sentence, imposed by Southern District Judge Shirley Wohl Kram, is
|
||
|
believed to be among few prison terms levied for computer-related offenses.
|
||
|
|
||
|
Meanwhile, charges are pending against Mr. Rosenfeld's alleged source: the
|
||
|
five members of the masters of deception, young men in their teens and
|
||
|
20's. The five were accused in July of breaking into computer systems run
|
||
|
by credit reporting services, telephone companies and educational
|
||
|
institutions.
|
||
|
|
||
|
For more information about the indictment and case against MOD, see ALL the
|
||
|
articles in PWN 40-2.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
4. 2ND ONLINE LEGAL GUIDE RELEASED (by Barbara E. McMullen & John F. McMullen,
|
||
|
Newsbytes, 10/13/92) -- NEW YORK CITY -- PC Information Group has announced
|
||
|
the release of SysLaw, Second Edition: The Legal Guide for Online Service
|
||
|
Providers by attorneys Lance Rose and Jonathan Wallace.
|
||
|
|
||
|
According to the company, "Syslaw provides BBS sysops, network moderators
|
||
|
and other online service providers with basic information on their rights
|
||
|
and responsibilities, in a form that non-lawyers can easily understand."
|
||
|
|
||
|
Subjects covered by the book include the First Amendment, copyrights and
|
||
|
trademarks, the user agreement, negligence, privacy, criminal law, searches
|
||
|
and seizures, viruses and adult materials. The company claims that SysLaw
|
||
|
not only explains the laws, but that it gives detailed advice enabling
|
||
|
system operators to create the desired balance of user services, freedom,
|
||
|
and protection from risk on their systems."
|
||
|
|
||
|
Co-author Lance Rose told Newsbytes: "In the four years since the
|
||
|
publication of the first edition, the electronic community has become
|
||
|
alerted to the first amendment dimensions of the on-line community."
|
||
|
|
||
|
"The first amendment has profound implications to the on-line community
|
||
|
both to liberate providers and users of on-line systems and to protect them
|
||
|
from undue legal harassment. There has, in the last few years, been a lot
|
||
|
of law enforcement activity effecting bulletin board systems, including the
|
||
|
Steve Jackson and Craig Neidorf/Phrack cases," he said.
|
||
|
|
||
|
Rose continued, "The new edition incorporates these new developments as
|
||
|
well as containing new information concerning on-line property rights, user
|
||
|
agreements, sysop liabilities, viruses and adult material contained on
|
||
|
online systems."
|
||
|
|
||
|
SysLaw is available from PC Information Group, 1126 East Broadway, Winona,
|
||
|
MN 55987 (800-321-8285 or 507-452-2824) at a price of $34.95 plus $3.00
|
||
|
shipping and (if applicable) sales tax.
|
||
|
|
||
|
Press Contact: Brian Blackledge, PC Information Group, 800-321-8285
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
5. YET ANOTHER BOOK ABOUT THE COMPUTER UNDERGROUND (The Daily Telegraph,
|
||
|
12/14/92, Page 25) -- Approaching Zero: Data Crime and the Computer
|
||
|
Underworld by Bryan Clough and Paul Mungo (Faber & Faber, L14.99) -- A look
|
||
|
at the world of Fry Guy, Control C, Captain Zap and other hackers to blame
|
||
|
for the viruses, logic bombs and Trojan horses in the world's personal
|
||
|
computer networks.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
6. HONOR STUDENT NABBED IN COMPUTER FRAUD (The Washington Times, 11/9/92, Page
|
||
|
A6) -- BROOKSVILLE, FLA.-- Three high school honor students have been
|
||
|
accused of stealing tens of thousands of dollars worth of long-distance
|
||
|
calls as computer hackers.
|
||
|
|
||
|
Brian McGrogan, 16, and Edmund Padgett, 17, who were charged as adults, and
|
||
|
a 15-year-old allegedly tapped private telephone systems and dialed into an
|
||
|
international hacking network. One company's loss was $36,000.
|
||
|
|
||
|
"These are very sharp, intelligent kids," Hernando County sheriff's Captain
|
||
|
Richard Nugent said after the arrests. "It's a game to them. It's a
|
||
|
sport."
|
||
|
|
||
|
Some calls were made to computer bulletin boards in the United Kingdom,
|
||
|
Germany and Canada, where a loose network of hackers allegedly shared
|
||
|
information about how to obtain computer data and access information.
|
||
|
Arrests in the case also were made in New York and Virginia, Captain Nugent
|
||
|
said.
|
||
|
|
||
|
The two older boys were booked on charges of organized fraud and violation
|
||
|
of intellectual property. The third boy was released to his parents.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
7. A CORDLESS PHONE THAT CAN THWART EAVESDROPPERS (Business Week, 8/3/92) --
|
||
|
To industrial spies and other snoops, the millions of cordless phones in
|
||
|
use are goldmines of information. Conversations can be plucked out of the
|
||
|
air by means of a police type scanner, and with increasing ease. The
|
||
|
latest no-cord technologies offers clearer sound and longer ranges -- up to
|
||
|
half a mile. That's because the new phones broadcast signals at 900 MHz,
|
||
|
or 20 times the frequency of current models.
|
||
|
|
||
|
Cincinnati Microwave, Inc. (the radar detector people) figures executives
|
||
|
and consumers will pay a small premium for cordless privacy. The company
|
||
|
has developed a phone, to be marketed in October by its Escort division for
|
||
|
about $300, that thwarts eavesdroppers with "spread spectrum" technology,
|
||
|
which is similar to the encryption method that the military uses in secure
|
||
|
radios. The signals between the handset and base unit are digitized,
|
||
|
making them unintelligible to humans, and the transmission randomly hops
|
||
|
among various frequencies within the 900 MHz spectrum. To keep the cost
|
||
|
down to the range of other 900 MHz models, Cincinnati Microwave has
|
||
|
developed special microchips that keep the handset and base in sync.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
8. NEW AREA CODE -- As of November 1, 1992, a new 210 area code is serving 152
|
||
|
communities in the San Antonio and Rio Grande Valley areas.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
9. FOR SALE: PHONE-PHREAKING TOOLS (Brigid McMenamin, Forbes, 8/3/92, Page 64)
|
||
|
-- From his remote outpost in Alamogordo, New Mexico, John Williams makes a
|
||
|
nice living telling hackers how to rip off phone and computer systems.
|
||
|
|
||
|
Williams says he brings in about $200,000 a year publishing books on
|
||
|
everything from credit card scams and cracking automated teller machines to
|
||
|
electronic shoplifting, cellular phone phreaking and voice mailbox hacking,
|
||
|
each costing $29 to $39, and each complete with precise instructions. He
|
||
|
even sells Robofones, which save hackers from doing a lot of dialing while
|
||
|
they steal access codes.
|
||
|
|
||
|
Isn't what he does illegal? Perhaps it should be, but it isn't. Wrapping
|
||
|
himself in the First Amendment, Williams is a member in good standing of
|
||
|
the Alamogordo Chamber of Commerce and the New Mexico Better Business
|
||
|
Bureau. He thumbs his nose at companies and authorities that would like to
|
||
|
make him stop selling such secrets. "We don't promote fraud," he insists.
|
||
|
"It's all sold for educational purposes only. If we didn't publish the
|
||
|
information, it would still be out there."
|
||
|
|
||
|
But last year Williams got a visit form the Secret Service, which was
|
||
|
following up on a telephone fraud case in which one of his publications
|
||
|
figured prominently.
|
||
|
|
||
|
In Gainsville, Florida, in November 1990, two young men were locked up by
|
||
|
police for hacking into voice-mail systems and then making calls to 900
|
||
|
numbers. One of the pair, known as the Shark, then 20, confessed to the
|
||
|
crime, but said he was on assignment for Williams' Consumertronics
|
||
|
publication. The culprits could have been given five years on the fraud
|
||
|
charge alone. But the victim didn't want any publicity, so the state let
|
||
|
them do 50 hours of community service instead.
|
||
|
|
||
|
The Secret Service went to talk to Williams. Williams assured agent James
|
||
|
Pollard that he'd never told the Shark to do anything illegal.
|
||
|
Nevertheless, says Williams, the agent implied that Williams and members of
|
||
|
his family who work for him might be prosecuted for publishing voice-mail
|
||
|
access codes.
|
||
|
|
||
|
In the end, no charges were filed against Williams, who admits he has a
|
||
|
thing against big business, especially the phone companies. "For decades,
|
||
|
they financed right-wing regimes in Latin America," he rants.
|
||
|
|
||
|
It's a crazy world, that of the telephone toll fraudsters.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
10. NEW YORK STATE POLICE DECRIMINALIZE THE WORD "HACKER" (Barbara E. McMullen
|
||
|
& John F. McMullen, Newsbytes, 10/21/92) -- ALBANY, NEW YORK -- Senior
|
||
|
investigator Ron Stevens of the New York State Police Computer Unit has
|
||
|
told Newsbytes that it will be the practice of his unit to avoid the use of
|
||
|
the term "hacker" in describing those alleged to have committed computer
|
||
|
crimes.
|
||
|
|
||
|
Stevens told Newsbytes, "We use the term computer criminal to describe
|
||
|
those who break the law using computers. While the lay person may have
|
||
|
come to understand the meaning of hacker as a computer criminal, the term
|
||
|
isn't accurate. The people in the early days of the computer industry
|
||
|
considered themselves hackers and they made the computer what it is today.
|
||
|
There are those today who consider themselves hackers and do not commit
|
||
|
illegal acts."
|
||
|
|
||
|
Stevens had made similar comments in a recent conversation with Albany BBS
|
||
|
operator Marty Winter. Winter told Newsbytes, "'Hacker' is, unfortunately
|
||
|
an example of the media taking what used to be an honorable term, and using
|
||
|
it to describe an activity because they (the media) are too lazy or stupid
|
||
|
to come up with something else. Who knows, maybe one day 'computer
|
||
|
delinquent' WILL be used, but I sure ain't gonna hold my breath."
|
||
|
|
||
|
Stevens, together with investigator Dick Lynch and senior investigator
|
||
|
Donald Delaney, attended the March 1992 Computers, Freedom and Privacy
|
||
|
Conference (CFP-2) in Washington, DC and met such industry figures as Glenn
|
||
|
Tenney, congressional candidate and chairman of the WELL's annual "Hacker
|
||
|
Conference"; Craig Neidorf, founding editor and publisher of Phrack; Steven
|
||
|
Levy, author of "Hackers" and the recently published "Artificial Life";
|
||
|
Bruce Sterling, author of the recently published "The Hacker Crackdown";
|
||
|
Emmanuel Goldstein, editor and publisher of 2600: The Hacker Quarterly" and
|
||
|
a number of well-known "hackers."
|
||
|
|
||
|
Stevens said, "When I came home, I read as much of the literature about the
|
||
|
subject that I could and came to the conclusion that a hacker is not
|
||
|
necessarily a computer criminal."
|
||
|
|
||
|
The use of the term "hacker" to describe those alleged to have committed
|
||
|
computer crimes has long been an irritant to many in the online community.
|
||
|
When the July 8th federal indictment of 5 New York City individuals
|
||
|
contained the definition of computer hacker as "someone who uses a computer
|
||
|
or a telephone to obtain unauthorized access to other computers," there was
|
||
|
an outcry on such electronic conferencing system as the WELL (Whole Earth
|
||
|
'Lectronic Link). Many of the same people reacted quite favorably to the
|
||
|
Stevens statement when it was posted on the WELL.
|
||
|
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
11. STEVE JACKSON GAMES TRIAL DATE SET -- Mike Godwin, General Counsel for the
|
||
|
Electronic Frontier Foundation, announced on December 23rd that the case
|
||
|
of Steve Jackson Games, et.al. v. The United States Secret Service et. al.
|
||
|
will go to trial in Austin, Texas on Tuesday, January 19, 1993.
|
||
|
_______________________________________________________________________________
|