==Phrack Inc.== Volume Two, Issue 23, File 11 of 12 PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN P h r a c k W o r l d N e w s PWN PWN ~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~ PWN PWN Issue XXIII/Part 1 PWN PWN PWN PWN Created, Written, and Edited PWN PWN by Knight Lightning PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN Back To The Present ~~~~~~~~~~~~~~~~~~~ Welcome to Phrack World News Issue XXIII. This issue features stories on the Chaos Computer Club, more news about the infamous Kevin Mitnick, and details about an Australian-American hackers ring that has been shut down. I also wanted to add a big "thanks" to those of you who did send in news stories and information. Your help is greatly appreciated. :Knight Lightning _______________________________________________________________________________ Armed With A Keyboard And Considered Dangerous December 28, 1988 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ A follow-up story to the Kevin Mitnick case in the December 24, 1988 edtion of the Los Angeles Times says the federal magistrate refused to release Mitnick on bail Decemember 23, 1988; "after prosecutors revealed new evidence that Mitnick penetrated a National Security Agency computer and may have planted a false story on a financial news wire...." Investigators believe that Mitnick may have been the instigator of a false report released by a news service in April that Security Pacific National Bank lost $400 million in the first quarter of 1988. The report, which was released to the NY Stock Exchange and other wire services, was distributed four days after Mitnick had been turned down for a job at Security Pacific [after the bank learned he had lied on a job application about his past criminal record]. The false information could have caused huge losses for the bank had it reached investors, but the hoax was uncovered before that could happen. The prosecutor said Mitnick also penetrated a NSA computer and obtained telephone billing data for the agency and several of its employees. [In refusing bail, the magistrate said,] "I don't think there's any conditions the court could set up based upon which the court would be convinced that the defendant would be anything other than a danger to the community.... It sounds like the defendant could commit major crimes no matter where he is." Mitnick's attorney said prosecutors have no evidence for the new accusations. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Dark Side Hacker Seen As Electronic Terrorist January 8, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By John Johnson Los Angeles Times "Computer an 'Umbilical Cord to His Soul" When a friend turned him in and Mitnick asked why, the friend replied, "Because you're a menace to socd computer junkie known as a "dark side" hacker for his willingness to use the computer as a weapon. His high school computer hobby turned into a lasting obsession. He allegedly used computers at schools and businesses to break into Defense Department computer systems, sabotage business computers, and electronically harass anyone -- including a probation officer and FBI agents -- who got in his way. He also learned how to disrupt telephone company operations and disconnected the phones of Hollywood celebrities such as Kristy McNichol, authorities said. So determined was Mitnick, according to friends, that when he suspected his home phone was being monitored, he carried his hand-held keyboard to a pay phone in front of a 7-Eleven store, where he hooked it up and continued to break into computers around the country. "He's an electronic terrorist, said [the friend who turned him in], "He can ruin someone's life just using his fingers." Over the last month, three federal court judges have refused at separate hearings to set bail for Mitnick, contending there would be no way to protect society from him if he were freed. Mitnick's lack of conscience, authorities say, makes him even more dangerous than hackers such as Robert Morris Jr., who is suspected of infecting computer systems around the country with a "virus" that interfered with their operations. Mitnick's family and attorney accuse federal prosecutors of blowing the case out of proportion, either out of fear or misunderstanding of the technology. The story details his "phone phreak" background, and his use of high school computers to gain access to school district files on remote computers, where he didn't alter grades, but "caused enough trouble" for administrators and teachers to watch him closely. He used the name "Condor," after a Robert Redford movie character who outwits the government. The final digits of his unlisted home phone were 007, reportedly billed to the name "James Bond." [He and a friend] broke into a North American Air Defense Command computer in Colorado Springs in 1979. [The friend] said they did not interfere with any defense operation. "We just got in, looked around, and got out." What made Mitnick "the best" said a fellow hacker and friend, was his ability to talk people into giving him privileged information. He would call an official with a company he wanted to penetrate and say he was in the maintenance department and needed a computer password. He was so convincing, they gave him the necessary names or numbers. He believed he was too clever to be caught. He had penetrated the DEC network in Massachusetts so effectively that he could read the personal electronic mail of security people working on the case of the mysterious hacker and discover just how close they were getting to him. But caught he was, again and again. Mitnick's motive for a decade of hacking? Not money, apparently... Friends said he did it all simply for the challenge. [His one-time probation officer says,] "He has a very vindictive streak. A wholehey call me all the time." His mastery of the computer was his "source of self-esteem," said a friend. _______________________________________________________________________________ Computer Chaos Congress 88 Report January 3, 1989 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Observing Chaos Communication Congress 1988, Hamburg "From Threat To Alternative Networks" On 28-30 December, 1988, Computer Chaos Club (CCC) held its 5th annual "Chaos Communication Congress" at Hamburg/FRG (West Germnay). As in previous years, 300 people (mainly aged 16-36, 90% male, with some visitors from Austria and The Netherlands) gathered, carefully observed from newsmedia (German stations, printmedia, press agencies, but also from UK's BBC, and being observed by Business Week's Katie Hafner, who gathered material for a book on hackers, planned by John Markoff and herself). In the chaotic (though creative) congress "organization," two different tracks were visible: -- Technical presentations on networks (UUCP, GEONET, FIDONet, and CCCs emerging "open networks" BTXnet and "Zerberus"), and on a PC-DES encryption developed by a leading CCC member (who had escaped the French police's arrest by travelling to SECURICOM by railway while police waited at the airport); -- Socio-political discussions about "sociology of hackers," "free flow of information" as well as reports about recent events, dominated by the arrest of Steffen Wernery in Paris in Spring 88 when being invited to speak on SECURICOM. CCC speakers reported about their work to install "free networks." In Germany, most of the networks are organized in the form of a "Verein" (an association with legal status, which guarantees tax-free operation): Such networks are access-restricted to their members. The different German science and University networks (and their bridges to international networks) usually restrict access to scientists. Different CCC subgroups are establishing "alternative networks," such as "EcoNet" for communication of ecological data and information, planned to be available, free of cost, to broader social, ecological, peace and political groups and individuals. Apart from traditional technologies (such as GEONET and FIDONet), the German Post Office's Bildschirmtext (Btx) will be used as a cheap communications medium; while CCCs first hack was, years ago, to attack the "insecure Btx-system" (in the so-called "HASPA coup" where they misused the Btx passwork of the Hamburg savings bank to repeatedly invoke CCC's Btx information at a total prize of 135.000 DM, then about 50.000$), they today begin to use this cheap though very limited medium while more powerful communications media are available. Today, the emerging ISDN technology is verbally attacked by hackers because of the excessive accumulation of personal data; from here, hacks may be attempted when ISDN becomes regionally available in 1989/90. Several speakers, educated Informaticians with grades from West German Informatiin Software production and in selling hardware/software to economy and state agencies. Among them, several professional UNIX and UUCP users have begun to organize CCC's future UUCP version. Up to now, only few CCC members use (and know about) UNIX systems, but their number may grow within the near future according to CCC's "marketing." One speaker told the audience, "that you can remotely start programs in UUCP." After some learning phase, the broadened availability of UNIX in the hacker scene may produce new threats. The other track of the Congress discussed themes like "sociology of hackers" where a group of politology students from Berlin's Free University analyzed whether hackers belong to the "new social movements" (e.g. groups on peace, nuclear energy, feminist themes). They found that, apart from much public exaggeration (it is not true that hackers can invade *any* computer), hackers are rather "unpolitical" since they are preferably interested in technology. A major topic was "free access to/flow of information." Under the title "freedom of information act," speakers suggested a national legislation which guarantees individual and group rights to inspect files and registers of public interest; the discussion lacked sufficient basic knowledge, e.g. of the respective US legislation and corresponding international discussions in Legal Informatics. Summarizing the Congress and accompanying discussions, active CCC members try hard to demonstrate that they have *no criminal goals* and ambitions (they devoted a significant amount of energy to several press conferences, TV discussions etc). The conference was dominated by young computer professionals and students from the PC scene, partially with good technological knowledge of hardware, software and networks; while some people seem to have good technical insights in VAXsystems, knowledge of large systems seems to be minimal. To some extent, the young professionals wish to behave as the :good old-fashioned hackers": without criminal energy, doing interesting work of good professional quality in networks and other new areas. While former CCCongresses were devoted to threats like Viruses, *no explicit discussion* was devoted *to emerging threats*, e.g. in ISDN or the broadening use of UNIX, UUCP. The new track discussing political and social aspects of computing follows former discussions about "hacker ethics." Here, the superficial, unprofessional discussions of related themes show that the young (mainly) males are basically children of a "screen era" (TV, PCs) and of an education which concentrates on the visible "image," rather than understanding what is behind it. Special Thanks to Dr. Klaus Brunnstein, University of Hamburg - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - The Chaos Communication Congress 1988 in Hamburg ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ From Terra of The Chaos Computer Club One of the basic statements of the Chaos Computer Clublic of Germany is the demand for "The new human right of free exchange of data between all beings, without censorship, for all beings, and for the moment at least world-wide." Other statements include "data free NOW!" and "Free flow of information." Indeed, these ideas are not new, not even in the computer community, but the important thing is that the CCC is now in the process of turning some of the old hacker dreams into reality. For example: they are now creating their own networks, that exchange not only 'club' information, but everything that interest those on the net. This includes genetical engineering and environmental issues. The Chaos Communication Congress that takes place every year in Hamburg is for many hackers even more of a dream. Imagine being a hacker in some lonesome outpost thinking you are the only one that is crazy enough to be smarter than technology, and finding out there is a whole bunch of people that are just as, or even more, crazy. This year is the fifth congress, and advertisement is not needed: The 'family' knows exactly, because it's all in the networks. The congress itself is split up over a number of rooms. There is a hack-room, where the real hacking takes place. There is also a press room, where hackers and journalists together try to bring the hacker message out to the rest of the world. The archive contains all of the 'Chaos papers,' all press clippings, interesting remarks and all issues of the "datenschleuder", the German Hacker Magazine. German 'data travelers' are also present. A 'data traveler' is someone that uses the international data network for gaining access to all sorts of computers all over the world. A famous story is that of a German hacker thet tries to reach a friend and finds his phone busy. He then calls his local Datanet access number and goes through all of the computers that he knows his friend is interested in at that moment. His friend, hanging around in some computer in New York gets a message on his screen saying; "Ah here you are, I've been looking around everywhere." Back to this congress. On the first day the emphasis lies on the past. All things that have happened to the CCC in the past year are being discussed. The second day the emphasis lies on the future; and then ideas about the future of the information society is the subject of discussion. CCC says "Information society" is not equivalent to "Informed Society", and more attention should be paid to public use of computer technology. One of the main goals of the CCC is getting people to think about these issues; so that it is no longer just computer maniacs that decide over the faith of the world. "We don't know yet wheteher the computer is a gift or a timebomb, but it IS going to change everyone's life very soon." _______________________________________________________________________________ EOF Downloaded From P-80 International Information Systems 304-744-2253 12yrs+