==Phrack Magazine== Volume Six, Issue Forty-Seven, File 22 of 22 PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN PWN PWN PWN Phrack World News PWN PWN PWN PWN Compiled by Datastream Cowboy PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN 3 Residents Investigated In Theft Of Phone Card Numbers Oct 10, 1994 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Russ Britt (Los Angeles Daily News) Three Los Angeles residents have come under investigation in connection with the theft of 100,000 telephone calling card numbers used to make $50 million worth of long distance calls, officials said. The Secret Service searched the suspects' residences over the past two weeks and found computer disks containing calling card codes, said Jim Bauer, special agent-in-charge of he Los Angeles office. Ivy J. Lay, an MCI switch engineer based in Charlotte, N.C., was arrested last week in North Carolina on suspicion of devising computer software to hold calling card numbers from carriers that route calls through MCI's equipment, the Secret Service said. Lay is suspected of supplying thousands cards of calling codes to accomplices in Los Angeles for $3 to $5 a number, Bauer said. The accomplices are suspected of reselling the numbers to dealers in various cites, who then sold them to buyers in Europe, Bauer said. European participants would purchase the numbers to make calls to the United States to pirate computer software via electronic bulletin boards. ------------------------------------------------------------------------------- Revealed: how hacker penetrated the heart of British intelligence Nov 24, 1994 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Tim Kelsey (The Independent) p. 1 [ In typical British style, The Independent boasts 3 FULL pages on the story of how a "hacker" broke into British Telecom's databases and pulled information regarding sensitive numbers for the Royal Family and MI 5 & 6. Reportedly, information was sent anonymously to a reporter named Steve Fleming over the Internet by a "hacker" who got a job as a temp at BT and used their computers to gather the information. (I heard that Fleming later admitted that "he" was actually the supposed "hacker.") This is news? This is like saying, "Employees at Microsoft gained access to proprietary Microsoft source code," or "CAD Engineers at Ford gained access to super-secret Mustang designs." Get real. ] ------------------------------------------------------------------------------- Telecom admits security failings Nov 29, 1994 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Tim Kelsey (The Independent) p. 1 [ In typical British style, senior officials at BT attempted to save face by stating that sensitive information such as the file of Royal Family and Intelligence services phone numbers and addresses (currently floating around the Internet) was safe from prying eyes, but could indeed be accessed by BT employees. Uh, yeah. ] ------------------------------------------------------------------------------- Phreak Out! Dec 1994 ~~~~~~~~~~~ by Steve Gold (Internet and Comms Today) p. 44 [ A valiant attempt by England's Internet & Comms Today (my favorite Internet-related magazine--by far) to cover the Hack/Phreak scene in the UK, with a few tidbits about us here in the states. Not 100% accurate, but hell, it beats the living shit out of anything ever printed by any US mainstream mag. ] ------------------------------------------------------------------------------- Hack To The Future Dec 1994 ~~~~~~~~~~~~~~~~~~ by Emily Benedek (Details) p. 52 Hacking Vegas Jan 1995 ~~~~~~~~~~~~~ by Damien Thorn (Nuts & Volts) p. 99 [ A review of HOPE, and a review of DefCon. One from a techie magazine whose other articles included: Build a Telephone Bug, Telephone Inside Wiring Maintenance, Boat GPS on Land and Sea and Killer Serial Communications; the other from a magazine that usually smells more fragrant than Vogue, and whose other articles included: The Madonna Complex, Brother From Another Planet, Confessions of a Cyber-Lesbian and various fashion pictorials. One written by someone who has been in the hack scene since OSUNY ran on an Ohio-Scientific and the other written by a silly girlie who flitted around HOPE taking pictures of everyone with a polaroid. You get the idea. ] ------------------------------------------------------------------------------- Hackers Take Revenge on the Author of New Book on Cyberspace Wars Dec 5, 1994 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Jared Sandberg (The Wall Street Journal) p. B5 In his forthcoming book writer Joshua Quittner chronicles the bizarre but true tale of a Hatfield-and-McCoys feud in the nether world of computer hackers. Now the hackers have extracted revenge for Mr. Quittner's attention, taking control of his phone line and voice mail and bombarding his on-line account with thousands of messages. "I don't believe I've ever been hacked to this degree," says Mr. Quittner, whose book, written with wife Michelle Slatalla, was excerpted in the latest issue of Wired magazine, apparently prompting the attack. "People in MOD and LOD are very unhappy about the story," Mr. Quittner says. "That is what I believe prompted the whole thing." ------------------------------------------------------------------------------- Terror On The Internet Dec 1994 ~~~~~~~~~~~~~~~~~~~~~~ By Philip Elmer-Dewitt (Time) Thanksgiving weekend was quiet in the Long Island, New York, home of Michelle Slatalla and Josh Quittner. Too quiet. "We'd been hacked," says Quittner, who writes about computers, and hackers, for the newspaper Newsday, and will start writing for TIME in January. Not only had someone jammed his Internet mailbox with thousands of unwanted pieces of E-mail, finally shutting down his Internet access altogether, but the couple's telephone had been reprogrammed to forward incoming calls to an out-of-state number, where friends and relatives heard a recorded greeting laced with obscenities. "What's really strange," says Quittner, "is that nobody who phoned, including my editor and my mother, thought anything of it. They just left their messages and hung up." It gets stranger. In order to send Quittner that mail bomb, the electronic equivalent of dumping a truckload of garbage on a neighbor's front lawn, someone, operating by remote control, had broken into computers at IBM, Sprint and a small Internet service provider called the Pipeline, seized command of the machines at the supervisory, or "root", level, and installed a program that fired off E-mail messages every few seconds. Adding intrigue to insult, the message turned out to be a manifesto that railed against "capitalist pig" corporations and accused those companies of turning the Internet into an "overflowing cesspool of greed." It was signed by something called the Internet Liberation Front, and it ended like this: "Just a friendly warning corporate America; we have already stolen your proprietary source code. We have already pillaged your million dollar research data. And if you would like to avoid financial ruin, get the ((expletive deleted)) out of Dodge. Happy Thanksgiving Day turkeys." It read like an Internet nightmare come true, a poison arrow designed to strike fear in the heart of all the corporate information managers who had hooked their companies up to the information superhighway only to discover that they may have opened the gate to trespassers. Is the I.L.F. for real? Is there really a terrorist group intent on bringing the world's largest computer network to its knees? That's what is so odd about the so-called Internet Liberation Front. While it claims to hate the "big boys" of the telecommunications industry and their dread firewalls, the group's targets include a pair of journalists and a small, regional Internet provider. "It doesn't make any sense to me," says Gene Spafford, a computer-security expert at Purdue University. "I'm more inclined to think it's a grudge against Josh Quittner." That is probably what it was. Quittner and Slatalla had just finished a book about the rivalry between a gang of computer hackers called the Masters of Deception and their archenemies, the Legion of Doom, an excerpt of which appears in the current issue of Wired magazine. And as it turns out, Wired was mail-bombed the same day Quittner was, with some 3,000 copies of the same nasty message from the I.L.F. Speculation on the Net at week's end was that the attacks may have been the work of the Masters of Deception, some of whom have actually served prison time for vandalizing the computers and telephone systems of people who offend them. ------------------------------------------------------------------------------- The Phreak Show Feb 5, 1995 ~~~~~~~~~~~~~~~ By G. Pascal Zachary (Mercury News) "Masters of Deception" provides an important account of this hidden hacker world. Though often invoked by the mass media, the arcana of hacking have rarely been so deftly described as in this fast-paced book. Comprised of precocious New York City high schoolers, the all-male "Masters of Deception" (MOD) gang are the digital equivalent of the 1950s motorcyclists who roar into an unsuspecting town and upset things for reasons they can't even explain. At times funny and touching and other times pathetic and disturbing, the portrait of MOD never quite reaches a crescendo. The authors, journalists Michelle Slatalla of Newsday and Joshua Quittner of Time, fail to convey the inner lives of the MOD. The tale, though narrated in the MOD's inarticulate, super-cynical lingo and packed with their computer stunts, doesn't convey a sense of what makes these talented oddballs tick. Too often the authors fawn all over their heroes. In "Masters of Deception," every hacker is a carefree genius, benign and childlike, seeking only to cavort happily in an electronic Garden of Eden, where there are no trespassing prohibitions and where no one buys or sells information. Come on. Phiber and phriends are neither criminals nor martyrs. The issue of rights and responsibilities in cyberspace is a lot more complicated than that. Rules and creativity can co-exist; so can freedom and privacy. If that's so hard to accept, a full 25 years after the birth of the Internet, maybe it's time to finally get rid of the image of the hacker as noble savage. It just gets in the way. ------------------------------------------------------------------------------- Hacking Out A Living Dec 8, 1994 ~~~~~~~~~~~~~~~~~~~~ by Danny Bradbury (Computing) p. 30 There's nothing like getting it from the horse's mouth, and that's exactly what IT business users, anxious about security, did when they went to a recent conference given by ex-hacker, Chris Goggans. [ Yeah, so it's a blatant-plug for me. I'm the editor. I can do that. (This was from one of the seminars I put on in Europe) ] ------------------------------------------------------------------------------- Policing Cyberspace Jan 23, 1995 ~~~~~~~~~~~~~~~~~~~ by Vic Sussman (US News & World Report) p. 54 [ Yet another of the ever-growing articles about high-tech cops. Yes, those dashing upholder of law and order, who bravely put their very lives on the line to keep America free from teenagers using your calling card. Not that I wouldn't have much respect for our High-Tech-Crimefighters, if you could ever show me one. Every High-Tech Crime Unit I've ever seen didn't have any high-tech skills at all...they just investigated low-tech crimes involving high-tech items (ie. theft of computers, chips, etc.) Not that this isn't big crime, its just not high tech. Would they investigate the theft of my Nientendo? If these self-styled cyber-cops were faced with a real problem, such as the theft of CAD files or illegal wire-transfers, they'd just move out of the way and let the Feds handle it. Let's not kid ourselves. ] ------------------------------------------------------------------------------- Hacker Homecoming Jan 23, 1995 ~~~~~~~~~~~~~~~~~ by Joshua Quitter (Newsweek) p. 61 The Return of the Guru Jan 23, 1995 ~~~~~~~~~~~~~~~~~~~~~~ by Jennifer Tanaka and Adam Rogers (Time) p. 8 [ Two articles about Mark "Phiber Optik" Abene's homecoming party. Amazing. Just a few years earlier, Comsec was (I think) the first group of hackers to make Time & Newsweek on the same date. Now, all someone has to do is get out of jail and they score a similar coup. Fluff stories to fill unsold ad space. ] ------------------------------------------------------------------------------- Data Network Is Found Open To New Threat Jan 23, 1995 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by John Markoff (New York Times) p. A1 A Federal computer security agency has discovered that unknown intruders have developed a new way to break into computer systems, and the agency plans on Monday to advise users how to guard against the problem. The first known attack using the new technique took place on Dec. 25 against the computer of a well-known computer security expert at the San Deigo Supercomputer Center. An unknown individual or group took over his computer for more then a day and electronically stole a large number of security programs he had developed. The flaw, which has been known as a theoretical possibility to computer experts for more than a decade, but has never been demonstrated before, is creating alarm among security experts now because of the series of break-ins and attacks in recent weeks. The weakness, which was previously reported in technical papers by AT&T researchers, was detailed in a talk given by Tsutomo Shimomura, a computer security expert at the San Deigo Supercomputer Center, at a California computer security seminar sponsored by researchers at the University of California at Davis two weeks ago. Mr. Shimomura's computer was taken over by an unknown attacker who then copied documents and programs to computers at the University of Rochester where they were illegally hidden on school computers. ------------------------------------------------------------------------------- A Most-Wanted Cyberthief Is Caught In His Own Web Feb 16, 1995 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by John Markoff (New York Times) p. A1 After a search of more than two years, a team of FBI agents early this morning captured a 31-year-old computer expert accused of a long crime spree that includes the theft of thousands of data files and at least 20,000 credit card numbers from computer systems around the nation. Federal officials say Mr. Mitnick's confidence in his hacking skills may have been his undoing. On Christmas Day, he broke into the home computer of a computer security expert, Tsutomo Shimomura, a researcher at the federally financed San Deigo Supercomputer Center. Mr. Shimomura then made a crusade of tracking down the intruder, an obsession that led to today's arrest. It was Mr. Shimomura, working from a monitoring post in San Jose, California, who determined last Saturday that Mr. Mitnick was operating through a computer modem connected to a cellular telephone somewhere near Raleigh, N.C. "He was a challenge for law enforcement, but in the end he was caught by his own obsession," said Kathleen Cunningham, a deputy marshal for the United States Marshals Service who has pursued Mr. Mitnick for several years. ------------------------------------------------------------------------------- Computer Users Beware: Hackers Are Everywhere ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Michelle V. Rafter (Reuters News Sources) System Operators Regroup In Wake Of Hacker Arrest ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Elizabeth Weise (AP News Sources) Computer Hacker Seen As No Slacker ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Paul Hefner (New York Times) Kevin Mitnick's Digital Obsession ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Josh Quittner (Time) A Superhacker Meets His Match ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Katie Hafner (Newsweek) Cracks In The Net ~~~~~~~~~~~~~~~~~ by Josh Quittner (Time) Undetected Theft Of Credit-Card Data Raises Concern About Online Security ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Jared Sandberg (The Wall Street Journal) [Just a sampling of the scores of Mitnick articles that inundated the news media within hours of his arrest in North Carolina. JUMP ON THE MITNICK BANDWAGON! GET THEM COLUMN INCHES! WOO WOO!] ------------------------------------------------------------------------------- Hollywood Gets Into Cyberspace With Geek Movies ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By Therese Poletti (Reuters News Sources) With dramatic tales like the capture last week of a shadowy computer hacker wanted around the world, Hollywood studios are scrambling to cash in on the growing interest in cyberspace. "They are all looking at computer-related movies because computers are hot," said Bishop Kheen, a Paul Kagan analyst. "They are all reviewing scripts or have budgets for them. "We are going to see a rash of these kinds of movies." Experts say it remains to be seen what kind of box office draw can be expected from techie movies such as one that might be based on the hunt for Mitnick. But the recent surge of interest in the Internet, the high-profile criminal cases, and romanticized images of hackers may fuel their popularity. "I think it's a limited market, although given the media's insatiable appetite for Internet hype, these movies might do well," said Kevin Benjamin, analyst with Robertson Stephens. TriStar Pictures and Columbia Pictures, both divisions of Sony Corp., are developing movies based on technology or computer crime, executives said. TriStar is working on a movie called "Johnny Mnemonic," based on a science fiction story by William Gibson, about a futuristic high-tech "data courier" with confidential information stored in a memory chip implanted in his head. Sony also has plans for a CD-ROM game tied to the movie, also called "Johnny Mnemonic," developed by Sony Imagesoft, a division of Sony Electronic Publishing. Columbia Pictures has a movie in development called "The Net," starring Sandra Bullock, who played opposite Reeves in "Speed." Bullock plays a reclusive systems analyst who accidentally taps into a classified program and becomes involved in a murder plot. Sony Imagesoft has not yet decided whether it will develop a CD-ROM game version of "The Net." MGM/United Artists is said to be working on a movie called "Hackers," about a group of young computer buffs framed for a crime and trying to protect their innocence. An MGM/UA spokeswoman did not return calls seeking comment. Disney is also said to be working on a movie called f2f, (face to face), about a serial killer who tracks his victims on an online service. Disney also did not return calls. Bruce Fancher, once a member of the Legion of Doom hacker gang, worked as a consultant for "Hackers." He said, much to his dismay, hackers are becoming more popular and increasingly seen as romantic rebels against society. "I've never met one that had political motivation. That is really something projected on them by the mainstream media," Fancher said. ------------------------------------------------------------------------------- Film, Multimedia Project In The Works On Hacker Kevin Mitnick Mar 8, 1995 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By Greg Evans (Variety) Miramax Films will produce a film and a multimedia project based on the hunt for accused cyber felon Kevin Mitnick, the computer criminal who captured the attention of the New York Times, the FBI and Hollywood. Less than a month after Mitnick's capture made the front page of Feb. 16's Times, Miramax has purchased the worldwide film and interactive rights to the hacker's tale. Rights were bought for an undisclosed amount from computer security expert Tsutomu Shimomura, who led the two-year pursuit of Mitnick, and reporter John Markoff, who penned the Times' article. Markoff will turn his article into a book, which will be developed into a script. "Catching Kevin: The Pursuit and Capture of America's Most Wanted Computer Criminal" will be published later this year by Miramax's sister company, Hyperion Books (both companies are owned by the Walt Disney Co.). Miramax also plans to work with Shimomura to develop an interactive project, most likely a CD-ROM, based on "Catching Kevin," according to Scott Greenstein, Miramax's senior VP of motion pictures, music, new media and publishing. He represented Miramax in the deal. No director has been attached to the film project yet, although the company is expected to make "Kevin" a high priority. The story attracted considerable studio attention. In a statement, Shimomura said he went with Miramax "based on their track record." Shimomura and Markoff were repped by literary and software agent John Brockman and Creative Artists Agency's Dan Adler and Sally Willcox. ------------------------------------------------------------------------------- Hack-Happy Hollywood Mar 1995 ~~~~~~~~~~~~~~~~~~~~ (AP News Sources) Not since the heyday of Freddy Krueger and Jason Voorhees has hacking been so in demand in Hollywood. Only this time, it's computer hackers, and the market is becoming glutted with projects. In fact, many studio buyers were reluctant to go after the screen rights to the story of computer expert Tsutomu Shimomura, who tracked down the notorious cyber-felon Kevin Mitnick. The rights were linked to a New York Times article by John Markoff, who's turning the story into a book. But Miramax wasn't daunted by any competing projects, and snapped up the rights. "We're talking about a ton of projects that all face the same dilemma: How many compelling ways can you shoot a person typing on a computer terminal?" said one buyer, who felt the swarm of projects in development could face meltdown if the first few films malfunction. The first test will come late summer when United Artists opens "Hackers," the Iain Softley-directed actioner about a gang of eggheads whose hacking makes them prime suspects in a criminal conspiracy. Columbia is currently in production on "The Net," with Sandra Bullock as an agoraphobic computer expert who's placed in danger when she stumbles onto secret files. Touchstone has "The Last Hacker," which is closest in spirit to the Miramax project. It's the story of hackmeister Kevin Lee Poulson, who faces a hundred years in prison for national security breaches and was so skilled he disabled the phones of KIIS-FM to be the 102nd (and Porsche-winning) caller. He was also accused of disabling the phones of "Unsolved Mysteries" when he was profiled. Simpson/Bruckheimer is developing "f2f," about a serial killer who surfs the Internet for victims. Numerous other projects are in various stages of development, including MGM's "The Undressing of Sophie Dean" and the Bregman/Baer project "Phreaking," about a pair of hackers framed for a series of homicidal computer stunts by a psychotic hacker. ------------------------------------------------------------------------------- A Devil Of A Problem Mar 21, 1995 ~~~~~~~~~~~~~~~~~~~~ by David Bank (Knight-Ridder) Satan is coming to the Internet and might create havoc for computer networks around the world. The devilish software, due for release April 5, probes for hidden flaws in computer networks that make them vulnerable to intruders. The tool could be used by mischievous pranksters or serious espionage agents to attack and penetrate the computer networks of large corporations, small businesses or even military and government installations. None of the potential problems has swayed the authors of the program, Dan Farmer, the "network security czar" of Silicon Graphics Inc. in Mountain View, California, and Wietse Venema, his Dutch collaborator. "Unfortunately, this is going to cause some serious damage to some people," said Farmer, who demonstrated the software this month in his San Francisco apartment. "I'm certainly advocating responsible use, but I'm not so naive to think it won't be abused." "It's an extremely dangerous tool," said Donn Parker, a veteran computer security consultant with SRI International in Menlo Park, California. "I think we're on the verge of seeing the Internet completely wrecked in a sea of information anarchy." Parker advocates destroying every copy of Satan. "It shouldn't even be around on researcher's disks," he said. ------------------------------------------------------------------------------- Satan Claims Its First Victim Apr 7, 1995 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Dwight Silverman (Houston Chronicle) The cold hand of Satan knocked on the electronic door of Phoenix Data Systems Wednesday night, forcing the Clear Lake-based Internet access provider to temporarily shut down some computers. "These guys can come in and literally take control, get super-user status on our systems," said Bill Holbert, Phoenix's owner. "This is not your average piece of shareware." The attack began about 9 p.m. Wednesday, he said. Technicians watched for a while and then turned off the machines at Phoenix that provide "shell" accounts, which allow direct access to a computer's operating system. The system was back up Thursday afternoon after some security modifications, he said. "It actually taught us a few things," Holbert said. "I've begun to believe that no computer network is secure." ------------------------------------------------------------------------------- Fraud-free Phones Feb 13, 1995 ~~~~~~~~~~~~~~~~~ by Kirk Ladendorf (Austin American Statesman) p. D1 Texas Instruments' Austin-based Telecom Systems business came up with an answer to cellular crime: a voice-authorization service. The technology, which TI showed off at the Wireless '95 Convention & Exposition in New Orleans this month, was adapted from a service devised for long-distance telephone companies, including Sprint. TI says its voice-recognition systems can verify the identity of cellular phone users by reading and comparing their "voice prints," the unique sound patterns made by their speech. The TI software uses a statistical technique called Hidden Markov Modeling that determines the best option within a range of choices as it interprets a voice sample. If the verification is too strict, the system will reject bona fide users when their voice patterns vary too much from the computer's comparison sample. If the standard is too lenient, it might approve other users whose voice patterns are similar to that of the authentic user. The system is not foolproof, TI officials said, but beating it requires far more time, effort, expense and electronics know-how than most cellular pirates are willing to invest. ------------------------------------------------------------------------------- Nynex Recommends Cellular Phone Customers Use A Password Feb 9, 1995 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By Aaron Zitner (The Boston Globe) Nynex Corp. is asking cellular telephone customers to dial an extra four digits with each phone call in an attempt to foil thieves who steal an estimated $1.3 million in cellular phone services nationwide each day. Nynex Mobile Communications Co., has been "strongly recommending" since November that all new customers adopt a four-digit personal identification number, or PIN. This week, the company began asking all its customers to use a PIN. The Cellular Telecommunications Industry Association estimates that "phone thieves" made $482 million in fraudulent calls last year, equal to 3.7 percent of the industry's total billings. Thieves can make calls and bill them to other people by obtaining the regular 10-digit number assigned to a person's cellular phone, as well as a longer electronic serial number that is unique to each phone. Thieves can snatch those numbers from the air using a specialized scanner, said James Gerace, a spokesman for Nynex Mobile Communications. Even when no calls are being made, cellular phones broadcast the two numbers every 30 seconds or so to notify the cellular system in case of incoming calls, he said. When customers adopt a PIN, their phone cannot be billed for fraudulent calls unless the thieves also know the PIN, Gerace said. He said the phone broadcasts the PIN at a different frequency than the phone's electronic serial number, making it hard for thieves to steal both numbers with a scanner. Gerace also noted that customers who become victims of fraud despite using a PIN can merely choose a new number. Victims who do not use a PIN must change their phone number, which requires a visit to a cellular phone store to have the phone reprogrammed, he said. [ Uh, wait a second. Would you use touch-tone to enter this PIN? Woah. Now that's secure. I've been decoding touch-tone by ear since 1986. What a solution! Way to go NYNEX! ] ------------------------------------------------------------------------------- Kemper National Insurance Offers PBX Fraud Feb 3, 1995 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ (Knight-Ridder News Sources) Kemper National Insurance Cos. now offers inland marine insurance coverage to protect Private Branch Exchange (PBX) systems against toll fraud. "Traditional business equipment policies companies buy to protect their PBX telephone systems do not cover fraud," a Kemper spokesman said. The Kemper policy covers both the equipment and the calls made illegally through the equipment. The coverage is for the PBX equipment, loss of business income from missed orders while the PBX system is down, and coverage against calls run up on an insured's phone systems. The toll fraud coverage is an option to the PBX package. ------------------------------------------------------------------------------- New Jersey Teen To Pay $25,000 To Microsoft, Novell Feb 6, 1995 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The Wall Street Journal Microsoft Corp. and Novell Inc. reached a court-approved settlement with a New Jersey teenager they accused of operating a computer bulletin board that illegally distributed free copies of their copyrighted software programs. Equipped with a court order, employees of the two companies and federal marshals raided the young man's house in August, seizing his computer equipment and shutting down an operation called the Deadbeat Bulletin Board. Under the settlement announced Friday, the teenager agreed to pay $25,000 to the companies and forfeit the seized computer equipment. In return, the companies agreed to drop a copyright infringement lawsuit brought against him in federal court in New Jersey, and keep his identity a secret. Redmond-based Microsoft and Novell, Provo, Utah, opted to take action against the New Jersey man under civil copyright infringement laws rather than pursue a criminal case. The teenager had been charging a fee to users of the Deadbeat Bulletin Board, which was one reason the companies sought a cash payment, a Novell spokesperson said. The two software producers previously settled a similar case in Minneapolis, when they also seized the operator's equipment and obtained an undisclosed cash payment. "About 50 groups are out there engaging in piracy and hacking," said Edward Morin, manager of Novell's antipiracy program. He said they operate with monikers such as Dream Team and Pirates With Attitude. ------------------------------------------------------------------------------- Software Piracy Still A Big Problem In China Mar 6, 1995 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By Jeffrey Parker (Reuters News Sources) Sales of pirated software have reached a fever pitch in Beijing in the week since U.S. and Chinese officials defused a trade war with a broad accord to crush such intellectual property violations. In the teeming "hacker markets" of the Zhongguancun computer district near Beijing University, there were few signs of any clampdown Monday, the sixth day of a "special enforcement period" mandated by the Feb. 26 Sino-U.S. pact. "The police came and posted a sign at the door saying software piracy is illegal," said a man selling compact disk readers at bustling Zhongguancun Electronics World. "But look around you. There's obviously a lot of profit in piracy," he said. A score of the market's nearly 200 stalls openly sell compact disks loaded with illegal copies of market-leading desktop software titles, mostly the works of U.S. firms. Cloudy Sky Software Data Exchange Center offers a "super value" CD-ROM for 188 yuan ($22) that brims with 650 megabytes of software from Microsoft, Lotus and other U.S. giants whose retail value is about $20,000, nearly 1,000 times higher. ------------------------------------------------------------------------------- Internet Story Causes Trouble Feb 7, 1995 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ (AP News Sources) The University of Michigan has refused to reinstate a sophomore suspended last week after he published on the Internet a graphic rape and torture fantasy about a fellow student. The student's attorney told The Detroit News on Monday that the university is waiting until after a formal hearing to decide if the 20-year-old student is a danger to the community. A closed hearing before a university administrator is scheduled for Thursday. "Our position is that this is a pure speech matter," said Ann Arbor attorney David Cahill. "He doesn't know the girl and has never approached her. He is not dangerous. ... He just went off half-cocked." The Jan. 9 story was titled with the female student's last name and detailed her torture, rape and murder while gagged and tied to a chair. The student also may face federal charges, said FBI Special Agent Gregory Stejskal in Ann Arbor. Congress recently added computer trafficking to anti-pornography laws. The student was suspended Thursday by a special emergency order from university President James J. Duderstadt. His identification card was seized and he was evicted from his university residence without a hearing. University spokeswoman Lisa Baker declined to comment. ------------------------------------------------------------------------------- Snuff Porn On The Net Feb 12, 1995 ~~~~~~~~~~~~~~~~~~~~~ by Philip Elmer-Dewitt (Time) Jake Baker doesn't look like the kind of guy who would tie a woman by her hair to a ceiling fan. The slight (5 ft. 6 in., 125 lbs.), quiet, bespectacled sophomore at the University of Michigan is described by classmates as gentle, conscientious and introverted. But Baker has been doing a little creative writing lately, and his words have landed him in the middle of the latest Internet set-to, one that pits a writer's First Amendment guarantees of free speech against a reader's right to privacy. Now Baker is facing expulsion and a possible sentence of five years on federal charges of sending threats over state lines. It started in early December, when Baker composed three sexual fantasies and posted them on alt.sex.stories, a newsgroup on the Usenet computer network that is distributed via the Internet. Even by the standards of alt.sex.stories, which is infamous for explicit depictions of all sorts of sex acts, Baker's material is strong stuff. Women (and young girls) in his stories are kidnapped, sodomized, mutilated and left to die by men who exhibit no remorse. Baker even seemed to take pleasure in the behavior of his protagonists and the suffering of their victims. The story that got Baker in trouble featured, in addition to the ceiling fan, acts performed with superglue, a steel-wire whisk, a metal clamp, a spreader bar, a hot curling iron and, finally, a match. Ordinarily, the story might never have drawn attention outside the voyeuristic world of Usenet sex groups, but Baker gave his fictional victim the name of a real female student in one of his classes. Democratic Senator James Exon of Nebraska introduced legislation earlier this month calling for two-year prison terms for anyone who sends, or knowingly makes available, obscene material over an electronic medium. "I want to keep the information superhighway from resembling a red-light district," Exon says.