[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]


..[ Phrack Magazine ]..
.:: Phrack World News X ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ] [ 71 ]
Current issue : #11 | Release date : 1987-02-17 | Editor : Taran King
Index to Phrack ElevenTaran King
Phrack Pro-Phile VIII on Wizard of ArpanetTaran King
PACT: Prefix Access Code TranslatorThe Executioner
Hacking Voice Mail SystemsBlack Knight from 713
Simple Data Encryption or Digital Electronics 101The Leftist
AIS - Automatic Intercept SystemTaran King
Hacking Primos I, II, IIIEvil Jay
Telephone Signalling MethodsDoom Prophet
Cellular Spoofing By Electronic Serial Numbers donatedAmadeus
Busy Line VerificationPhantom Phreaker
Phrack World News XKnight Lightning
Phrack World News XIKnight Lightning
Title : Phrack World News X
Author : Knight Lightning
                                ==Phrack Inc.==

                   Volume Two, Issue Eleven, Phile #11 of 12

PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
PWN                                                                         PWN
PWN                      *>=-{ Phrack World News }-=<*                      PWN
PWN                                                                         PWN
PWN                                 Issue X                                 PWN
PWN                                                                         PWN
PWN                      Written, Compiled, and Edited                      PWN
PWN                           by Knight Lightning                           PWN
PWN                                                                         PWN
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN

Scan Man Revisited                                            January 19, 1987
------------------
The following is a reprint from TeleComputist Newsletter Issue Two;

                 SCAN MAN - FED OR PHREAK?  (The Other Side)

    TeleComputist is printing the statement Scan Man has made to us
[TeleComputist] in rebuttal to Phrack World News, whom previously printed an
article concerning Scan Man in Phrack Issue VIII.  Those of you who have seen
or read the article in Phrack VIII know that it basically covered information
and an intercepted memo alleging Scan Man of going after hackers and turning
in codes off his BBS (P-80 Systems, Charleston, West Virginia 304/744-2253) as
a TMC employee.  Please note that this statement should be read with the
article concerning Scan Man in Phrack Issue VIII to get the full
understanding.

    Scan Man started off his statement claiming not to work for TMC, but
instead for a New York branch office of Telecom Management (a Miami based
firm).  He was flown in from Charleston, West Virginia to New York every week
for a four to five day duration.  Once in New York, Telecom Management made
available a leased executive apartment where Scan Man stayed as he worked.
His position in Telecom Management was that of a systems analyst, "...and that
was it!" Scan Man stated.  Scan Man also stated that he had never made it a
secret that he was working in New York and had even left messages on his BBS
saying this.

    He also went on to say that he had no part in the arrest of Shawn [of
Phreaker's Quest] (previously known as Captain Caveman) by TMC in Las Vegas.
Scan Man claimed to have no ties with TMC in Las Vegas and that they would not
even know him.  Scan Man then went on to say that Shawn had never replied to
previous messages Scan man had left asking for TMC codes.  Scan Man also said
that the messages about TMC were in no way related to him.  He claimed to have
no ties to TMC, which is a franchised operation which makes even TMC unrelated
except by name.

   Scan Man stated that he called Pauline Frazier and asked her about the
inquiry by Sally Ride [:::Space Cadet] who acted as an insider to obtain the
information in Phrack VIII.  He said that Pauline said nothing to the imposter
(Sally Ride) and merely directed him to a TMC employee named Kevin Griffo.
Scan Man then went on to say that the same day Sally Ride called Pauline
Frazier was the same day he received his notice.  And to that Scan Man made
the comment, "If I find out this is so heads will roll!"

    After that comment, Scan Man came up with arguments of his own, starting
off with the dates printed in Phrack VIII.  He claimed that the dates were off
and backed this up by saying Ben Graves had been fired six months previously
to the conversation with Sally Ride.  Scan Man then went on to ask why it had
taken Sally Ride so long to come forward with his information.  Scan Man made
one last comment, "It's a fucking shame that there is a social structure in
the phreak world!"  Meaning Sally Ride merely presented his information to
give himself a boost socially in the phreak world.

    This is how it ended.  We would like to say that TeleComputist printed the
statement by Scan Man to offer both sides of the story.  We make no judgements
here and take no sides.

       Reprinted with permission from TeleComputist Newsletter Issue 2

            Copyright (C) 1986 by J. Thomas.   All Rights Reserved
 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Ok, that was Scan Man's side to the story, now that he had a few months to
come up with one.  Lets do a critical breakdown;

-*- "He was flown in from Charleston, West Virginia to New York every week for
    a four to five day duration."

    Gee, wouldn't that get awfully expensive?  Every week...and "made
    available a leased executive apartment..."   He must have been quite an
    asset to "Telecom Management" for them to spend such large amounts on him.
    Kinda interesting that he lived in Charleston, West Virginia (where
    surprisingly enough there is a branch of TMC) and flew to New York every
    week.

-*- "Scan Man claimed to have no ties with TMC in Las Vegas..."  Ok, I'll buy
    that.  Notice how he didn't say that he had no ties with TMC in
    Charleston.  Furthermore if he had no ties with TMC in Charleston why
    would they have his name in their company records?  Why would all those
    employees know him or dislike him for that matter?

-*- "Scan Man then went on to say that the same day Sally Ride called Pauline
    Frazier was the day he received his notice."  Well now, how can there be a
    connection between the two events at all when Scan Man works for Telecom
    Management and has "no ties with TMC" and claimed "not to work for TMC"?
    If TMC and Telecom Management are truly independent of each other then
    nothing Sally Ride said to Pauline Frazier could have affected him in ANY
    way. That is unless he did work for TMC in the first place.

-*- "...and back this up by saying that Ben Graves had been fired six months
    previously to the conversation with Sally Ride."  Well first of all, PWN
    did not give a date as to when Ben Graves was fired from TMC.  Second of
    all and more important, how does Scan Man know so much about TMC when he
    works for "Telecom Management" and has "...no ties with TMC..."?

The rest of his statements were highly debatable and he showed no proof as to
their validity.  As for why Sally Ride waited so long to come forward, well he
didn't wait that long at all, he came forward to myself in late May/early June
of 1986.  My decision was to do nothing because there wasn't enough proof.
After three months of research we had enough proof and the article was
released.

With this attempt to cover up the truth, Scan Man has only given more
ammunition to the idea that he isn't what he claims to be.

                  Special Thanks to TeleComputist Newsletter
______________________________________________________________________________

The Cracker Cracks Up?                                       December 21, 1986
----------------------
         "Computer 'Cracker' Is Missing -- Is He Dead Or Is He Alive"

 By Tom Gorman of The Los Angeles Times

ESCONDIDO, Calif. -- Early one morning in late September, computer hacker Bill
Landreth pushed himself away from his IBM-PC computer -- its screen glowing
with an uncompleted sentence -- and walked out the front door of a friend's
home here.

He has not been seen or heard from since.

The authorities want him because he is the "Cracker", convicted in 1984 of
breaking into some of the most secure computer systems in the United States,
including GTE Telemail's electronic mail network, where he peeped at NASA
Department of Defense computer correspondence.

He was placed on three years' probation.  Now his probation officer is
wondering where he is.

His literary agent wants him because he is Bill Landreth the author, who
already has cashed in on the successful publication of one book on computer
hacking and who is overdue with the manuscript of a second computer book.

The Institute of Internal Auditors wants him because he is Bill Landreth the
public speaker who was going to tell the group in a few months how to make
their computer systems safer from people like him.

Susan and Gulliver Fourmyle want him because he is the eldest of their eight
children.  They have not seen him since May 1985, when they moved away from
Poway in northern San Diego county, first to Alaska then to Maui where they
now live.

His friends want him because he is crazy Bill Landreth, IQ 163, who has pulled
stunts like this before and "disappeared" into the night air -- but never for
more than a couple of weeks and surely not for 3 months.  They are worried.

Some people think Landreth, 21, has committed suicide.  There is clear
evidence that he considered it -- most notably in a rambling eight-page
discourse that Landreth wrote during the summer.

The letter, typed into his computer, then printed out and left in his room for
someone to discover, touched on the evolution of mankind, prospects for man's
immortality and the defeat of the aging process, nuclear war, communism versus
capitalism, society's greed, the purpose of life, computers becoming more
creative than man and finally -- suicide.

The last page reads:

"As I am writing this as of the moment, I am obviously not dead.  I do,
however, plan on being dead before any other humans read this.  The idea is
that I will commit suicide sometime around my 22nd birthday..."

The note explained:

"I was bored in school, bored traveling around the country, bored getting
raided by the FBI, bored in prison, bored writing books, bored being bored.  I
will probably be bored dead, but this is my risk to take."

But then the note said:

"Since writing the above, my plans have changed slightly.... But the point is,
that I am going to take the money I have left in the bank (my liquid assets)
and make a final attempt at making life worthy.  It will be a short attempt,
and I do suspect that if it works out that none of my current friends will
know me then.  If it doesn't work out, the news of my death will probably get
around. (I won't try to hide it.)"

Landreth's birthday is December 26 and his best friend is not counting on
seeing him again.

"We used to joke about what you could learn about life, especially since if
you don't believe in a God, then there's not much point to life," said Tom
Anderson, 16, a senior at San Pasqual High School in Escondido, about 30 miles
north of San Diego.  Anderson also has been convicted of computer hacking and
placed on probation.

Anderson was the last person to see Landreth.  It was around September 25 --
he does not remember exactly.  Landreth had spent a week living in Anderson's
home so the two could share Landreth's computer.  Anderson's IBM-PC had been
confiscated by authorities, and he wanted to complete his own book.

Anderson said he and Landreth were also working on a proposal for a movie
about their exploits.

"He started to write the proposal for it on the computer, and I went to take a
shower," Anderson said.  "When I came out, he was gone.  The proposal was in
mid-sentence.  And I haven't seen him since."

Apparently Landreth took only his house key, a passport, and the clothes on
his back.

Anderson said he initially was not concerned about Landreth's absence.  After
all this was the same Landreth who, during the summer, took off for Mexico
without telling anyone -- including friends he had seen just the night before
-- of his departure.

But concern grew by October 1, when Landreth failed to keep a speaking
engagement with a group of auditors in Ohio, for which he would have received
$1,000 plus expenses.  Landreth may have kept a messy room and poor financial
records, but he was reliable enough to keep a speaking engagement, said his
friends and literary agent, Bill Gladstone, noting that Landreth's second
manuscript was due in August and had not yet been delivered.

But, the manuscript never came and Landreth has not reappeared.

Steve Burnap, another close friend, said that during the summer Landreth had
grown lackadaisical toward life.  "He just didn't seem to care much about
anything anymore."
                        Typed for PWN by Druidic Death
                         From The Dallas Times Herald
______________________________________________________________________________

Beware The Hacker Tracker                                       December, 1986
-------------------------
By Lamont Wood of Texas Computer Market Magazines

If you want to live like a spy in your own country, you don't have to join the
CIA or the M15 or the KGB.  You can track hackers, like John Maxfield of
Detroit.

Maxfield is a computer security consultant running a business called
BoardScan, which tracks hackers for business clients.  He gets occasional
death threats and taunting calls from his prey, among whom he is known as the
"hacker tracker," and answers the phone warily.

And although he has received no personal harassment, William Tener, head of
data security for the information services division of TRW, Inc., has found it
necessary to call in experts in artificial intelligence from the aerospace
industry in an effort to protect his company's computer files.  TRW is a juicy
target for hackers because the firm stores personal credit information on
about 130 million Americans and 11 million businesses -- data many people
would love to get hold of.

Maxfield estimates that the hacker problem has increased by a factor of 10 in
the last four years, and now seems to be doubling every year.  "Nearly every
system can be penetrated by a 14-year old with $200 worth of equipment," he
complains.  "I have found kids as young as nine years old involved in hacking.
If such young children can do it, think of what an adult can do."

Tener estimates that there are as many as 5,000 private computer bulletin
boards in the country, and that as many as 2,000 are hacker boards.  The rest
are as for uses as varied as club news, customer relations, or just as a hobby.
Of the 2,000 about two dozen are used by "elite" hackers, and some have
security features as good as anything used by the pentagon, says Maxfield.

The number of hackers themselves defies estimation, if only because the users
of the boards overlap.  They also pass along information from board to board.
Maxfield says he has seen access codes posted on an east coast bulletin board
that appeared on a west coast board less than an hour later, having passed
through about ten boards in the meantime.  And within hours of the posting of
a new number anywhere, hundreds of hackers will try it.

"Nowadays, every twerp with a Commodore 64 and a modem can do it, all for the
ego trip of being the nexus for forbidden knowledge," sighs a man in New York
City, known either as "Richard Cheshire" or "Chesire Catalyst" -- neither is
his real name.  Cheshire was one of the earliest computer hackers, from the
days when the Telex network was the main target, and was the editor of TAP, a
newsletter for hackers and phone "phreaks".  Oddly enough, TAP itself was an
early victim of the hacker upsurge.  "The hacker kids had their bulletin
boards and didn't need TAP -- we were technologically obsolete," he recalls.

So who are these hackers and what are they doing?  Tener says most of the ones
he has encountered have been 14 to 18 year old boys, with good computer
systems, often bright, middle class, and good students.  They often have a
reputation for being loners, if only because they spend hours by themselves at
a terminal, but he's found out-going hacker athletes.

But Maxfield is disturbed by the sight of more adults and criminals getting
involved.  Most of what the hackers do involves "theft of services" -- free
access to Compuserve, The Source, or other on-line services or corporate
systems.  But, increasingly, the hackers are getting more and more into credit
card fraud.

Maxfield and Cheshire describe the same process -- the hackers go through
trash bins outside businesses whose computer they want to break into looking
for manuals or anything that might have access codes on it.  They may find it,
but they also often find carbon copies of credit card sales slips, from which
they can read credit card numbers.  They use these numbers to order
merchandise -- usually computer hardware -- over the phone and have it
delivered to an empty house in their neighborhood, or to a house where nobody
is home during the day. Then all they have to do is be there when the delivery
truck arrives.

"We've only been seeing this in the last year," Maxfield complains.  "But now
we find adults running gangs of kids who steal card numbers for them.  The
adults resell the merchandise and give the kids a percentage of the money."

It's best to steal the card number of someone rich and famous, but since
that's usually not possible it's a good idea to be able to check the victim's
credit, because the merchant will check before approving a large credit card
sale.  And that's what makes TRW such a big target -- TRW has the credit
files.  And the files often contain the number of any other credit cards the
victim owns, Maxfield notes.

The parents of the hackers, meanwhile, usually have no idea what their boy is
up to -- he's in his room playing, so what could be wrong?  Tener recalls a
case where the parents complained to the boy about the high phone bill one
month.  And the next month the bill was back to normal.  And so the parents
were happy.  But the boy had been billing the calls to a stolen telephone
company credit card.

"When it happens the boy is caught and taken to jail, you usually see that the
parents are disgruntled at the authorities -- they still think that Johnny was
just playing in his bedroom.  Until, of course, they see the cost of Johnny's
play time, which can run $50,000 to $100,000.  But outside the cost, I have
never yet seen a parent who was really concerned that somebody's privacy has
been invaded -- they just think Johnny's really smart," Tener says.

TRW will usually move against hackers when they see a TRW file or access
information on a bulletin board.  Tener says they usually demand payment for
their investigation costs, which average about $15,000.

Tales of the damage hackers have caused often get exaggerated.  Tener tells of
highly publicized cases of hackers who, when caught, bragged about breaking
into TRW, when no break-ins had occurred.  But Maxfield tells of two 14-year
old hackers who were both breaking into and using the same corporate system.
They had an argument and set out to erase each other's files, and in the
process erased other files that cost about a million dollars to replace.
Being juveniles, they got off free.

After being caught, Tener says most hackers find some other hobby.  Some,
after turning 18, are hired by the firms they previously raided.  Tener says
it rare to see repeat offenders, but Maxfield tells of one 14-year-old repeat
offender who was first caught at age 13.

Maxfield and Tener both make efforts to follow the bulletin boards, and
Maxfield even has a network of double agents and spies within the hacker
community.  Tener uses artificial intelligence software to examine the day's
traffic to look for suspicious patterns.  TRW gets about 40,000 inquiries an
hour and has about 25,000 subscribers.  But that does not address the
underlying problem.

"The real problem is that these systems are not well protected, and some can't
be protected at all," Maxfield says.

Cheshire agrees.  "A lot of companies have no idea what these kids can do to
them," he says.  "If they would make access even a little difficult the kids
will go on to some other system."  As for what else can be done, he notes that
at MIT the first thing computer students are taught is how to crash the
system. Consequently, nobody bothers to do it.

But the thing that annoys old-timer Cheshire (and Maxfield as well) is that
the whole hacker-intruder-vandal-thief phenomenon goes against the ideology of
the original hackers, who wanted to explore systems, not vandalize them.
Cheshire defines the original "hacker ethic" as the belief that information is
a value-free resource that should be shared.  In practice, it means users
should add items to files, not destroy them, or add features to programs,
rather than pirate them.

"These kids want to make a name for themselves, and they think that they need
to do something dirty to do that.  But they do it just as well by doing
something clever, such as leaving a software bug report on a system," he
notes.

Meanwhile, Maxfield says we are probably stuck with the problem at least until
the phone systems converts to digital technology, which should strip hackers
of anonymity by making their calls easy to trace.

Until someone figures out how to hack digital phone networks, of course. -TCM

                        Typed for PWN by Druidic Death
______________________________________________________________________________
[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2024, Phrack Magazine.