==Phrack Inc.== Volume Three, Issue Thirty-one, Phile #8 or 10 PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN Phrack World News PWN PWN Issue XXXI, Part One PWN PWN Compiled by Phreak_Accident PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN Operation "Sun-Devil" ===================== May 9th and 10th brought on two day thats would be marked in every hackers history book. The reason we assume these days will be important to many, is that maybe it's time we opened are eyes and saw the witch hunt currently in progress. In less than 48 hours, 150 Secret Service men and other law officials served 30 search warrents in 14 cities around the nation (This thing was hudge). Operation "Sun-Devil" (As the Attorney General in Phoenix called it), was a success on their part. "The investigation though is not over, and there are more warrents to be executed.", said Jim Folwer of L.A's Secret Service. Any details of the investigation are not being given out at this time. The Asst. Attorney General of Pheonix told Phrack Inc. that there were other problems involving the investigation and that it was an ongoing investigation for the last TWO years. It is my understanding that Gail Thackeray and the Secret Service are not, taking this lightly. She told Phrack inc. that they are not distinquishing pirates, hackers, or phreakers. Basically, it's any kid with a modem that calls a BBS with an alias. Yes, we are the witches, and we are being hunted. The following are Two news releases obtianed via fax through the U.S. Secret Service for Phrack Inc. N E W S R E L E A S E FOR IMMEDIATE RELEASE CONTACT: Gail Thackeray ------------------------ Assitant Attorney General May 9, 1990 @ 11:00 A.M. (602) 542-4266 Attorney General Bob Corbin announced today that in connection with an eighteen-month joint investigation into computer crime conducted with the United States Secret Service and the United States Attorney's office, the Arizona Attorney General's office has executed seven search warrants in which computers, electronic bulletin boards, telephone test equipment and records have been seized. The Organized Crime and Racketeering Division investigation involved complaints by Arizona and out of state victims of substantial financial losses resulting from credit card fraud and theft of long distance telephone and data communications services, and by victims of attacks on computer systems operated by government agencies, private corporations, telephone companies, financial institutions, credit bureaus, and a hospital. The Arizona Attorney General's office received information and technical assistance from the Glendale, Arizona Police Department's Computer Crime Unit, and from many private sector sources, including Bellcore (Bell Communications Research), American Express, Communications carriers U.S. Sprint, AT&T, MCI, Com Systems, MidAmerican Communications, LDL Communications, and Shared Use Network. Without the cooperation of these companies and of numerous federal, state and local law enforcement agencies around the country, this investigation would have been impossible. The privacy of our citizens and the health of our economy depend upon secure, reliable computer systems. Computer fraud and attempts to compromise senstitive public and private computer systems will not be tolerated. Individuals who commit these offenses in Arizona can expect to be prosecuted. .end. P R E S S R E L E A S E FOR IMMEDIATE RELEASE Contact: Wendy Harnagel Wednesday, May 9, 1990 United States Attorney's Office ---------------------- (602) 379-3011 PHOENIX -- Stephen M. McNamee, United States Attorney District of Arizona, Robert K. Corbin, Attorney General for the State of Arizona, and Henry R. Potosky, Acting Special Agent in Charge of the United States Secret Service Office in Phoenix, today announced that approximately twenty-seven search warrants were executed on Monday and Tuesday, May 7 and 8, 1990, in various cities across the nation by 150 Secret Service agents along with state and local law enforcement officials. The warrants were issued as a part of Operation Sundevil, which was a two year investigation into alleged illegal computer hacking activities. The United States Secret Service, in cooperation with the United States Attorney's Office, and the Attorney General for the State of Arizona, established an operation utilizing sophisticated investigative techniques, targeting computer hackers who were alleged to have trafficked in and abuse stolen credit card numbers, unauthorized long distance dialing codes, and who conduct unauthorized access and damage to computers. While the total amount of losses cannot be calculated at this time, it is estimated that the losses may run into the millions of dollars. For example, the unauthorized accessing of long distance telephone credit cards have resulted in uncollectible charges. The same is true of the use of stolen credit card numbers. Individuals are able to utilize the charge accounts to purchase items for which no payment is made. Federal search warrants were executed in the following cities: Chicago, IL Cincinatti, OH Detroit, MI Los Angeles, CA Miami, FL Newark, NJ New York, NY Phoenix, AZ Pittsburgh, PA Plano, TX Richmond, VA San Diego, CA San Jose, CA Unlawful computer hacking imperils the health and welfare of individuals, corporations and government agencies in the United States who rely on computers and telephones to communicate. Technical and expert assistance was provided to the United States Secret Service by telecommunication companies including Pac Bel, AT&T, Bellcore, Bell South, MCI, U.S. Sprint, Mid-American, Southwestern Bell, NYNEX, U.S. West, and by the many corporate victims. All are to be commended for their efforts for their efforts in researching intrusions and documenting losses. McNamee and Corbin expressed concern that the improper and alleged illegal use of computers may become the White Collar crime of the 1990's. McNamee and Corbin reiterated that the state and federal government will vigorously pursue criminal violations of statutes under their jurisdiction. Three individuals were arrested yesterday in other jurisdictions on collateral or independent state charges. The investigations surrounding the activities of Operation Sundevil are continuing. The investigations are being conducted by agents of the United States Secret Service and Assistant United States Attoryney Tim Holtzen, District of Arizona, and Assistant Arizona Attorney General Gail Thackery. .end. _______________________________________________________________________________ Virus mania =========== Robert T. Morris started it all. Who cares, it's over and done with. Never the less, it's being dragged out in every national paper. It's old news so we won't cover it here, but we will tell you about something the Army has up its sleeve. Army is Looking for a Few Good Viruses By Rory J. O'conner Knight-Ridder Newspapers ______________________________________ The U.S. Army is looking for help to develop the seeds of a new-age germ warfare: It wants business to help it turn computer "viruses" into military weapons. Experts predict the viruses, if sucessfully developed, could be used to wreak havoc on the increasing number of computers in the battlefield. The destructive computer programs which have increasingly damaged commercial and research computer systems in the past four years, could be used to disrupt military communications and feed misleading data to enemy commanders. The viruses could aslo be used to alter the programming of crucial communications satellites serving combat units, the experts said. The Army is soliciting bids from small businesses to determine the feasibility of using computer viruses in warefare. And it is willing to pay up to $550,000 to a company that comes up with a plan for creating the programs - and figures out how to use military radio systems to introduce them into enemy computers. A computer virus is a kind of program designed to disrupt normal operation of a computer system or damage data ont hat system by altering or destroying it. The rogue programs are most effective when introduced secretly into the computer system of an unsuspecting user and when their damage is subtle or hidden fromt he user for some time. Viruses are also self-duplicating and can spread undetected from an infected computer to other computer systems they contact. So far, more than 60 computer viruses have been identified, most of them attacking poorly guarded personal computers used by businesses, universities and inividuals. The Army's virus would have to be more sophisticated than those programs. But some detractors of the concept say the Army could wind up with the same problem it has with biological weapons: Creating destructive elements that might get loose and cause widespread damage to its own forces as well as civilians. "This stuff is very dangerous, and most people involved in creating viruses are not aware of the threat," said a Bay Area virus expert who asked ot to be named. "You can't spread anthrax around the world and not have it come back around to you. And the enemy is using the same kind of computers and software that we are." Many experts who are fighting the explosion in virus activity by amateur programmers are especially angry at government efforts to develop the programs for the military. Some say it is particulary troubling in light of the sentencing of Robert T. Morris Jr. (Ed -Ick), convicted in federal court of sending a similar program through a government sponsored network in 1988. "It bothers me that the government says in one breath (viruses) are bad and illegal and then asks for someone to develop them," said Glenn Tenney, a San Mateco, Calif., programmer and organizer of the annual Computer Hackers Conference. "If Morris had done the same thing for the Army, they'd have paid him hundreds of thousands to do it. But he did it on the wrong side and got punished." Computer experts say creating a virus to the Army's specifications is possible with current technology - although some of the Army's requirements could make developing it more difficult than creating an ordinary personal computer virus. First, military computer systems are usually designed with far more security features than commercial systems, making it much harder for a virus to enter the systems. Second, the Army is emphasizings the use of radio communication to inject the virus into enemy systems. Normally, computer viruses spread through the exchange of floppy disks that contain the rogue program or along wires connecting several computers. Using complex military radio signals instead would require expertise that mose programmers don't have. .end _______________________________________________________________________________ RIPCO May 8th, 1990 ----- ------------- Operation Sun-Devil claimed more than just a few "Codelords" around the states, it claimed one of the oldest and more popular boards. Nobody knows when or if RIPCO shall return. Reportedly, Dr. Ripco was charge on a hand-gun violation after his house was searched. Phrack inc. can't comment on this. The following is the exact transcript of the message left on RIPCO's answering maching after Operation Sun-Devil. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - This is 528-5020. As you are probably aware, on May 8, the Secret Service conducted a series of raids across the country. Early news reports indicate these raids involved people and computers that could be connected with credit card and long distance toll fraud. Although no arrests or charges were made, Ripco BBS was confiscated on that morning. It's involvement at this time is unknown. Since it is unlikely that the system will ever return, I'd just l say goodbye, and thanks for your support for the last six and a half years. It's been interesting, to say the least. Talk to ya later. {Dr. Ricpo} *** END OF VOICE MESSAGE *** _______________________________________________________________________________ Downloaded From P-80 International Information Systems 304-744-2253 12yrs+