💾 Archived View for aphrack.org › issues › phrack37 › 12.gmi captured on 2021-12-03 at 14:04:38. Gemini links have been rewritten to link to archived content

View Raw

More Information

-=-=-=-=-=-=-

                 Volume Four, Issue Thirty-Seven, File 12 of 14

              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
              PWN                                             PWN
              PWN              Phrack World News              PWN
              PWN                                             PWN
              PWN       Issue XXXVII / Part Two of Four       PWN
              PWN                                             PWN
              PWN     Compiled by Dispater & Spirit Walker    PWN
              PWN                                             PWN
              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


 Operation Sun-Devil Nabs First Suspect                       February 17, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 By Michael Alexander (ComputerWorld)(Page 15)

  "Defendant Pleads Guilty To Possession Of Access Codes, Faces 10-year Term"

The U.S. Department of Justice said last week that it had successfully
completed its first prosecution in the Operation Sun-Devil investigation.

Robert Chandler [a/k/a The Whiz Kid and former bulletin board system operator
of the Whiz House in 619 NPA], 21, pleaded guilty in federal court in San Diego
to a single felony for possessing 15 or more access codes, which can be used
illegally to make toll-free telephone calls, said Scott Charney, who heads the
Justice Department's computer crime unit in Washington, D.C.  Chandler also
admitted to using the access codes, Charney said.

Chandler will be sentenced on May 11.  The legal maximum penalty is 10 years'
imprisonment, but federal prosecutors will probably recommend probation,
assuming the sentencing guidelines and the judge handling the case permit it,
Charney said.

Chandler may also be required to make restitution of a still-undetermined
amount for telephone calls made with the access code.

On May 7 and 8, 1990, U.S. Secret Service and local law enforcement officials
executed more than 20 search warrants [more like 27] in 14 cities in a
nationwide crackdown on computer crime code called Operation Sun-Devil.
Federal law enforcers said the raid was aimed at rounding up computer-using
outlaws who were engaged in telephone and credit-card fraud.

Approximately 42 computers and 23,000 disks were swept up in the dragnet, but
until last week there were no indictments or convictions in the investigation.

The Justice Department has been severely criticized by Computer Professionals
for Social Responsibility (CPSR), the Electronic Frontier Foundation (EFF), and
other advocacy groups for its handling of Operation Sun-Devil cases.  CPSR has
charged that federal law enforcers trampled on the First and Fourth Amendment
rights of those targeted in the raids.
_______________________________________________________________________________

 No More Fast Times For Spicoli
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 By Night Ranger

On November 19, 1991, Spicoli was awaken by Pima County (Arizona) Sheriffs and
some other agents in his apartment.  They showed him their search warrants,
which was obtained under the suspicion of "Computer Fraud and/or Theft" and
asked him to step outside.  They began dismantling his computer system, which
ran his bulletin board called "Fast Times."  It was not a hack/phreak bulletin
board and contained no information that would normally be construed as such.
The main reason he ran the board was because he was writing it himself.

The authorities took many items not related to his computer, including his VCR.
He was not charged with any crimes and additionally he was informed that he
was "free to go."  This incident is very similar to what happened with the
hacker "Mind Rape."  Late last year, his home was raided and lots of items
were seized, but no charges followed.

Spicoli attempted to hire private legal counsel, but discovered that it was
beyond his means financially.  Since then, he has chosen to go with the public
defender's office.

Weeks later, it was revealed that his case concerned an undisclosed, but
presumably large amount of stolen money and he was charged with various
felonies.  He further learned that the authorities had been monitoring him over
a period of at least three months.  Anyone who had contact with him between
August and November should be careful.  His computer is now in the hands of the
government.  

This is the second major bust in Arizona during the last half of 1991.  With
people like Gail Thackeray residing there and anti-hacker companies such as
Long Distance For Less and U.S. West it is definitely not the place for any
kind of hacking.
_______________________________________________________________________________

 U2 Shakes Up New England Bell                                February 24, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 By Steve Morse (The Boston Globe)(Page 15)

Irish rockers U2 left local telephone operators hasping for breath.  In an
unprecedented move designed to thwart scalpers, tickets for U2's March 17 show
at Boston Garden went on sale through telephone charge only -- and the result
was a long morning for the phone company.

"It was complete gridlock.  I don't know how else to describe it.  The bombed
us right out of the water," said Joanne Waddell, a New England Telephone
manager.  "We expected a lot of calls ... but this was unbelievable.  Our
operators were clicking away like crazy out there."

The Garden show sold out in 4 1/2 hours, said Doug Borg of Tea Party Concerts,
adding that it took that long because there was a two-ticket limit per person
-- another step taken to frustrate scalpers.

"The demand was overwhelming.  I heard there were a half-million calls in the
first hour," said Larry Moulter, president of Boston Garden.  The telephone
company said exact figures were not yet available, but Moulter's information is
consistent with a recent U2 sale in Atlanta, where more than one million calls,
many from eager fans with automatic redial, were logged.

"I don't really have a number.  It's safe to say thousands, many thousands,"
said Peter Cronin, a spokesman for New England Telephone.  He admitted there
were minor delays in getting a dial tone, but that it was "not a serious
situation.  If people stayed on the line, they'd get dial tone in a few seconds."

There were 100 lines selling sales for the Garden concert.  They checked for
duplicate names, credit card numbers and addresses (to help enforce the limit
of two per person) and caught 'some' attempts to use a card number more than
once.
_______________________________________________________________________________

 Federal Agents Raid WCFL; Station Silenced, Forced Off Air    January 28, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 By Patrick Townson (Telecom Digest)

In an unusual move by the Federal Communications Commission, a far southwest
suburban radio station in the Chicago area has been forced off the air by the
FCC which alleges illegal activity at the station.

WCFL-FM (104.7), a station licensed in Morris, IL with no connection to the
station using the same call letters in Chicago several years ago was silenced
by FCC officials who raided the station accompanied by members of the United
States Marshall's Office on Friday, January 24.

Prompted by complaints from other broadcasters in the Chicago area, an FCC
field inspection team on January 16 found WCFL was beaming its signal at more
than twice its authorized power of 11,000 watts, and was using a nondirectional
rather than directional antenna as called for in its license to operate.

The effect of the violations was to broacast a more powerful signal toward
Chicago and elsewhere, and "to increase the likelyhood of interference with
other stations," acccording to Dan Emrick, chief of investigations for the
FCC's office in Chicago. 

The FCC had cited the station for similar offenses in 1990, and fined the
owners $3000.  Emrick said there was no record of payment.

Tim Spires is the General Manager of WCFL, and an officer of the parent company
'MM Group' which is based in Ohio.  Neither Mr. Spires nor other officials of
'MM Group' would make any response to the FCC action which forced the station
off the air at 1:00 PM last Friday.

Emrick said federal officers entered the station shortly before 1:00 PM and
served the appropriate legal papers on employees on duty.  FCC staffers then
siezed the broadcasting studio and transmitting equipment.  After giving the
obligatory sign off message and station identification over the air, power was
killed to the transmitter.  Employees were ordered to leave the premises, which
was closed with a US Marshall's Seal.

Emrick went on to say the station would not be allowed to return to the air
until the station settles its account with the FCC and completes construction
of a directional antenna.  At that point, the station would be permitted to
operate 'in probation' while the Commission did further technical inspections,
and the probation status would continue for an unspecified period of time
afterward.

A press release was finally issued by the 'MM Group' yesterday which said in
part that WCFL " ... went off the air voluntarily in order to install a new
antenna; bring their transmitter into compliance with FCC regulations and
better serve their listening area."
_______________________________________________________________________________

 New Cellular Phones Raise A National Security Debate          February 6, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 By John Markoff (New York Times)(Page D1)

Advocates of privacy rights are challenging the nation's most clandestine
intelligence-gathering agency over how much confidentiality people will have
when communicating via the next generation of cellular telephones and wireless
computers.

The issue has emerged at meetings this week of an obscure committee of
telecommunications experts that is to decide what kinds of protections against
eavesdropping should be designed into new models of cellular phones.  People
concerned with privacy are eager to incorporate more potent scrambling and
descrambling codes in equipment to prevent the eavesdropping that is so easy
and so common in the current generation of cellular phones.

But privacy advocates contend that the industry committee has already decided
not to adopt the maximum level of protection because of pressure from the
National Security Agency, whose intelligence gathering includes listening in on
phone conversations in foreign countries and intercepting data sent by
computers.  The privacy-rights faction contends that the security agency
opposes codes that are hard to crack because the equipment might be used
overseas.

"The NSA is trying to weaken privacy technology," said Marc Rotenberg,
Washington director of Computer Professionals for Social Responsibility, a
public advocacy group organized by computer scientists and engineers.  "At
stake is nothing less than the future of our privacy in the communications
world."

The standards setting group is made up of cellular telephone equipment
manufacturers and service providers.

The National Security Agency is the Defense Department Agency in charge of
electronic intelligence gathering around the world for use by many other
branches of the government.  Officials of the agency, who have been
participating in the meetings as observers, said their only interest in the
matter was insuring that the government's own secure telephones were compatible
with the new cellular phones.  They said that agency officials have
specifically been told not to participate in the standards-setting effort, and
indeed some engineers attending the meetings said they have felt no outside
pressure.

But other engineers involved in the standards process said the agency's
presence had loomed large in earlier technical meetings during the past two
years.  "I would talk to people and they would say, 'The NSA wouldn't like
this, or wouldn't like that,'" said one committee member, who spoke on the
condition that he not be identified.

The Agency's Long Reach

The debate is important, the privacy advocates say, not just for cellular
phones but for many other emerging technologies that communicate using radio
signals, which are easier to intercept than information sent over conventional
telephone lines.  These include wireless "personal communicators" that transmit
and receive data, and portable "notebook" computers.

But the dispute also illustrates that even as the cold war ebbs, the
National Security Agency is still wielding influence over many United States
high-technology industries.  Indeed, executives from a number of high-
technology companies say the agency is hampering their efforts to compete for
business overseas by forcing them to make products for foreign markets that are
different from products sold domestically.

The agency exercises this power in evaluating some of the applications by
companies to export high-technology products.  In that role, critics say, the
agency has opposed exports of equipment fitted with advanced encryption systems
that are increasingly vital to modern business.

Buyers Can Shop Elsewhere

The agency's critics say it is almost impossible to contain the proliferation
of encryption technologies and that customers who are deterred from buying it
in the United States will simply shop abroad or steal the technology.

"The notion that you can control this technology is comical," said William H.
Neukom, vice president for law and corporate affairs at Microsoft Corporation,
the big software publisher.

Critics also say that it is ludicrous that encryption systems used in popular
software programs receive the type of Government scrutiny that might be
expected for weapons.  "The notion that our our products should be classified
as munitions, and treated that way just doesn't make sense at all," Mr. Neukom
said.

Privacy advocates have also challenged the committee's intention not to publish
the algorithm on which the encryption technology is based.  Traditionally,
cryptographers have said that the best way to ensure that encryption techniques
work is to publish the formulas so they can be publicly tested.

The committee has said that it will not disclose the formula because it does
not want to criminals an opportunity to crack the code.  But publishing the
formula is only a danger only if the formula is weak, said John Gilmore, a
Silicon Valley software designer, and privacy advocate.  If the formula is
strong, disclosing it publicly and letting anyone try to crack it would simply
prove it works.

The code, however, is simple to break, say a number of engineers who have
examined it.  Several committee members said they realized that the security
agency would never permit the adoption of an unbreakable privacy scheme.

"The cynics in the bar would say that you're never going to get anything by the
NSA that they can't crack trivially anyway," said Peter Nurse, chairman of the
authentication and privacy subcommittee of the standards committee and an
engineer at Hughes Network Systems.

NSA Role Denied

But a number of engineers who worked on the technical standard insist that the
agency has had no overt role in setting it.  "The standard was based on the
technical deliberations of some of the best experts in North America," said
John Marinho, chairman of the standards committee and an executive at AT&T.  He
said the committee relied on the NSA only for guidance on complying with United
States regulations.

He also said that the new standard would offer far more privacy protection than
is available under the present cellular telephone system.  Today, although it
is against the law to eavesdrop on a cellular telephone conversation, many
individuals modify commercial radio scanners so they can receive the
frequencies on which cellular calls are transmitted.
_______________________________________________________________________________

 FBI Eavesdropping Challenged                                 February 17, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 Taken from The Washington Post

WASHINGTON -- Cellular telephones and other state-of-the art telecommunications
technology are seriously challenging the FBI's ability to listen to the
telephone conversations of criminal suspects, law enforcement officials say.
The FBI is seeking $26.6 million next year to update its eavesdropping
techniques.  Normally tight-lipped FBI officials become even more closed-
mouthed when the subject of investigative "sources and methods" comes up.  But
a review of the bureau's 1993 budget request provides an unusual glimpse into
the FBI's research on electronic surveillance and its concerns about new
technologies.

"Law enforcement is playing catchup with the telecommunications industry's
migration to this technology," said the FBI's budget proposal to Congress. "If
electronic surveillance is to remain available as a law enforcement tool,
hardware and software supporting it must be developed."

The new technologies include digital signals and cellular telephones.  At the
same time, there has been an increase in over-the-phone transmission of
computer data, which can be encrypted through readily available software
programs, say industry experts and government officials.

The FBI's five-year research effort to develop equipment compatible with
digital phone systems is expected to cost $82 million, according to
administration figures.

The FBI effort is just a part of a wider research program also financed by the
Pentagon's secret intelligence budget, said officials who spoke on condition of
anonymity.

Electronic surveillance, which includes both telephone wiretaps and microphones
hidden in places frequented by criminal suspects, is a key tool for
investigating drug traffickers as well as white-collar and organized crime.

Conversations recorded by microphones the FBI placed in the New York City
hangouts of the Gambino crime family are the centerpiece of the government's
case against reputed mob boss John Gotti, now on trial for ordering the murder
of his predecessor, Paul Castellano.

Taps on the phones of defense consultants provided key evidence in the Justice
Department's long running investigation of Pentagon procurement fraud, dubbed
"Operation Ill Wind."  But with the advent of digital phone signals, it is
difficult to unscramble a single conversation from the thousands that are
transmitted simultaneously with computer generated data and images, industry
officials said.

"In the old days all you had to do was take a pair of clip leads and a head
set, put it on the right terminal and you could listen to the conversation,"
said James Sylvester, an official of Bell Atlantic Network Services Inc.  But
digital signal transmission makes this task much more difficult.  Conversations
are broken into an incoherent stream of digits and put back together again at
the other end of the line.

John D. Podesta, a former counsel to the Senate Judiciary's law and technology
subcommittee, said the FBI and other law enforcement agencies are simply
victims of a technological revolution.  For more than 50 years the basic
telephone technology remained the same.
_______________________________________________________________________________

 Nynex Will Go On-line With Listings                          February 20, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 By Adam M. Gaffin (adamg@world.std.com)(Middlesex News, Framingham, MA)

You can now let your fingers do the walking electronically through the Yellow
Pages.

Nynex yesterday announced an online Yellow Pages available to anyone with a
computer and modem, becoming the first regional Bell operating company to offer
an electronic Yellow Pages database.  The 1984 court order that broke up AT&T
had barred such efforts, but that provision was overturned last year. 

The service, at least at first, will offer listings only, rather than ads, from
close to 300 Nynex directories -- the company serves most of New York and New
England, except for Connecticut.

Users will also be able to scan UPI news and financial information, according
to Kurt Roessner, president of Nynex Information Technologies, the subsidiary
that will run the service.  Ultimately, the company hopes to begin offering and
displaying Yellow Pages-like ads to users, Roessner said yesterday.

Users will require special software to access the information through the
Minitel network, a French system that has so far failed to catch on in the U.S.
Nynex will provide the software for free to users of MS-DOS, Macintosh, Apple
II and Commodore computers, Roessner said.

Roessner said Nynex eventually hopes to offer the service on other, more
popular computer networks.  Minitel was chosen because Nynex has offered its
Yellow Pages information to French subscribers for almost two years, he said.

Nynex will charge 61 cents a minute -- $36.60 an hour -- the same as French
users pay.  However, Roessner acknowledged this may be more than Americans are
willing to pay and that the company will look at lowering the rate.

CompuServe, the nation's largest consumer-oriented computer network, charges
$12.80 an hour -- but drops that to just 50 cents an hour to people who use an
AT&T directory of national toll-free numbers.

The Nynex project is the latest in a series of efforts by large companies to
sell information to consumers via computer.  Some, such as an effort by Knight-
Ridder in the mid-1980s, have ended in spectacular failure.  Last year, Nynex
dropped its own information "gateway" service after losing several million
dollars.  CompuServe and several other online services, however, reportedly
earn sizable profits.

Phone-company information services have been surrounded by controversy.
Opponents, who include organizations representing newspaper publishers, say it
is unfair to allow a company that provides the means of distribution to also
offer services -- a common comparison is to a turnpike authority that also ran
a trucking company.

Roessner, however, said he hopes the phone company can cooperate with, rather
than fight, other potential "information providers."  He said he has already
talked with officials at a number of newspapers who seem more willing to work
with the phone company on joint projects than their national organizations
would let on.
_______________________________________________________________________________

 Civil Jury Rules Against AT&T in Patent Violation Case        February 9, 1992
 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 By Paul Deckelman (United Press International/UPI)

NEW YORK -- A jury ruled American Telephone & Telegraph Company infringed upon
somebody else's patent for telephone switching equipment and awarded the
plaintiff $34.6 million, an attorney said.

AT&T contends the suit is without merit and said it will appeal the verdict.

The six-member jury at the federal district court in Midland, Texas, returned
its verdict after having heard six days of testimony in the case, brought
against the telecommunications giant by Collins Licensing L.P., of Dallas.

The plaintiff's lawyer, Joseph Grear, of the Chicago-based firm of Rolf
Stadheim Ltd., held out the possibility that the total award could go
substantially higher, due to interest accruing back to 1985.  An AT&T spokesman
dismissed the possibility.

U.S. District Court Judge Lucius Bunton is considering the jury's
recommendation. 

Grear claimed AT&T's 5ESS digital central office switching device infringed
upon a 1976 federal patent for a "Time Space Time (TST) Switch" awarded to the
late Arthur A. Collins.

Collins was the founder of Collins Radio Co., now a division of Rockwell
International Inc., of El Segundo, California.

"Arthur Collins was a pioneer in the field of digital telecommunications.  The
jury's verdict provides recognition of Mr. Collins' substantial research and
development investment in, and important technical contributions to, the field
of digital telephony," Grear said.

AT&T's Network Systems division came out with the device in the early 1980s,
using it for central-office telephone switching equipment used to route calls
to the proper exchange and number.

The suit, filed in December 1990, originally named Southwestern Bell, of
Dallas, as a co-defendent.  That portion of the case, however, was dismissed
when the regional telephone company argued it had not violated the patent
because it did not make the disputed switching equipment -- it had only bought
it from AT&T.

But AT&T contends that Collins' patent was not valid.

Spokesman Curt Wilson said the Federal Patent Office is currently examining the
patent in question in a separate proceeding at the request of both AT&T and
Collins Licensing.  "We think they will invalidate that patent and we won't
have to pay," he said.

There is no firm time frame for the anticipated Patent Office ruling.

Wilson added that even if the patent is found by the government to have been
valid, AT&T does not believe its equipment used Collins' discovery, and thus
feels it did not infringe upon the patent.

"The jury found in our favor on seven of the original eight counts of the
suit," Wilson said, "and on the remaining claim, awarded them $34 million, 70
times less than the amount they had originally sought."

We believe this suit is totally without merit," the spokesman asserted.  "The
patent is not valid -- and we expect the patent office to agree."
_______________________________________________________________________________

User "Bill Of Rights" Introduced                               January 23, 1992
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
TAMPA, FLORIDA.-- .The North American Directory Forum (NADF) introduced a "User
Bill of Rights" to address security and privacy issues regarding entries and
listings concerning its proposed cooperative public directory service.  NADF
members also approved continuing efforts on an experimental publish directory
pilot at their eighth quarterly meeting.

The "User Bill of Rights" addresses the concerns of the individual user or the
user's agent, and is in response to issues brought to the attention of the
NADF.

Final plans were completed for the X.500 directory pilot scheduled to begin in
the first quarter of this year.  The pilot will be used by the NADF to validate
its technical agreements for providing a publich directory service in North
America.  The agreements have been recorded in standing documents and include
the services that will be provided, the directory schema and information
sharing required to unify the directory.  It will test the operation of X.500
in a large-scale, multi-vendor environment.

All NADF members are participating in the pilot.  The members are AT&T, Bell
Atlantic, BellSouth Advanced Networks, Bellcore representing US West, BT North
America, GE Information Services, IBM, Infonet, MCI Communications Corp.,
Pacific Bell, Performance Systems International, US Postal Service and Ziff
Communications Co.  Joining the NADF at this meeting are Canada Post
Corporation and DirectoryNet, Inc.

The NADF was founded in 1990 with the goal of bringing together major messaging
providers in the U.S. and Canada to establish a public directory service based
on X.500, the CCITT recommendation for a global directory service.  The forum
meets quarterly in a collaborative effort to address operational, commercial
and technical issues involved in implementing a North American directory with
the objective of expediting the industry's transition to a global X.500
directory.

This quarter's meeting was hosted by the IBM Information Network, IBM's
value-added services network that provides networking, messaging, capacity and
consulting services.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

USER BILL OF RIGHTS (for entries and listings in the Public Directory)

The mission of the North American Directory Forum is to provide interconnected
electronic directories which empower users with unprecedented access to public
information.  To address significant security and privacy issues, the North
American Directory Forum introduces the following "User Bill of Rights" for
entries in the Public Directory.  As a user, you have:

I.    The right not to be listed.
II.   The right to have you or your agent informed when your entry is created.
III.  The right to examine your entry.
IV.   The right to correct inaccurate information in your entry.
V.    The right to remove specific information from your entry.
VI.   The right to be assured that your listing in the Public Directory will
      comply with US or Canadian law regulating privacy or access information.
VII.  The right to expect timely fulfillment of these rights.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Scope of Intent - User Bill of Rights

The North American Directory Forum is a collection of service providers that
plan to offer a cooperative directory service in North America.  This is
achieved by interconnecting electronic directories using a set of
internationally developed standards known as the CCITT X.500 series.

In this context, the "Directory" represents the collection of electronic
directories administered by both service providers and private operators.  When
an entry containing information about a user is listed in the Directory, that
information can be accessed unless restricted by security and privacy controls.

A portion of the Directory -- The Public Directory -- contains information for
public dissemination.  In contrast, other portions of the Directory may contain
information not intended for public access.  A user or user's agent may elect
to list information in the Public Directory, a private directory, or some
combination.  For example, a user might publicly list a telephone number or an
electronic mail address, and might designate other information for specific
private use.

The User Bill of Rights pertains to the Public Directory.
Source:  NADF, January 1992