šŸ’¾ Archived View for clemat.is ā€ŗ saccophore ā€ŗ library ā€ŗ ezines ā€ŗ 2600 ā€ŗ 2600_2-8_djvu.txt captured on 2022-01-08 at 14:18:25.

View Raw

More Information

ā¬…ļø Previous capture (2021-12-03)

-=-=-=-=-=-=-

AUGUST. 1985 


.2600 



VOLUME TWO, NUMBER EIGHT 


.Vrti K pthUH-il hy -ā– Wl fjilrqiriu, Irr , an flrrriMuuiy wianilUi4t Silrtiipfrin nria: II ?- j yr.ir. nAHAul. M I UNIT. -to pi I If. Sit jMi tu-LL tetf. Ownuii O I K u>- 
Lilrimr Hlfwipiirn- < Jnpwalf f EMĀ». Mllrf :Wtki jW lb hi: irtK- firmvjflSflK Ilk. WrlK gk JSĀ®, Fk04 ?S2, Mklik lit-v.J NV I l'WK'75j Dul: SliTSIWK. 

liBft-' 2QI7464471. ISSN I. Wrilr In His. TftJ. MiitjLc | !.Ji>j . NV 2 IPB-fltfM f..T ad vcit* i ā– Ā£ nras uni vrlkt mi hm umi 


SEIZED! 


i, 


6<J0 Bulletin Board is Implicated in Raid on Jersey Hackers 


Oil July 1Ā£, 1985, law enforcement 

officials seized the Private Scoter BBS, the 
official computer bulletin board of 2GQQ 
wages;! tie , for "complicity in computer 
theft," under the newly passed, and yet 
untested. New Jersey Statute 2C:2Q-25. 
fV>Iice had uncovered in April a credit 
carding ring operated around a Middlesex 
County electronic bulletin board, and from 
there _ investigated other North Jersey 
bullet id hoards. Net understanding subject 
ā– matter of tli* Private Sector S&5, police 
assumed that the sysop was involved in 
illegal activities. Sis other computers 
were also seized in this investigation, 
including those of Store Manager who ran a 
BBS of uis own, Eeewolf , Red Borchetta, the 
Vampire, NV! Hack shack, sysop of the JfJ Hack 
Shack BBS , and that of the sysop of the 
^Treasure Chest BBS, 

I mated lately after this action, members of 
ā€œ2600 contacted the media, who were 
completely unaware of any of the raids. 
They began to bombard the Middlesex County 
Prosecutor h a Office with questions and a 
press conference was announced for July 16, 
The system operator of the Private Sector 
BBS attempted to attend along. with reporters 
from 2l>00. They were effectively thrown off 
the premises . Threats were made to charge 
thorn with trespassing and other crimes. An 
officer who had at first received them 
civilly was threatened with the lose of his 
job if ho didn't got thorn removed promptly. 
Then the car was chased out of the parking 
lot. Perhaps prosecutor Alan Rockoff was 
afraid that the presence of seme technically 
literate reporters would ruin the effect of 
his press release on the public. As it 
happens > "be didn't nurd our help. 

The next day the details of the press 
conference were reported to the public by 
the press. As Rockoff intended, paranoia 
about hackers ran rampant . Head 11 ness got as 
ridiculous as hackers ordering tank parts by 
telephone from TRW ant! moving satellites 
with their home computers in order to make 
free phone calls. These and even more; 
exotic stories were reported by otherwise 
respectable media sources: The news con- 

ference understandably made the front page 
of moht of the major newspapers in the US, 
Odd Was a. major nows item as far away as 
Australia and in the United Kingdom due to 
the Sensationalism of the claims. We will 

ā–  try to explain why these claims ray have 1 
|een made in thiĀ£i issue. 

On July 28 the operator of The Private 
Sector was formally charged with "computer 
conspiracy" under the above low, and 


U9 


released in the custody of his parents. The 
next day the Araoricsn Civil Liheiā€™tiea Union 
took over his defense. The ACtU oowpeiitod 
that it would be Very hard for Rockoff to 
prove ft conspiracy juat ^because the same 
information, construed by the prosecutor to 
be ill ega 1 , appears on two bul let i n boards , " 
especially fts Backoff admitted that "he did 
not believe any of the defendants knew each 
other," The ACIU believes that the system 
Operator's righto were violated* as he wan 
assumed _ to bo involved in an i 1 legal 
activity just because of other people under 
investigation who happened to have posted 
messages on his board. 

In another Statement which seems to 
confirm Rockoff 1 m belief in guilt by ftSSoc- 
j Sti on i he announced the next day that "630 
people were being investigated to determine 
P W)y ward their computer eouipmant fraudu- 
lently, We believe this ls enly the user 
list of the fJJ Hack Shack, so the actual 
list of those to be inveatj, gated nay turn 
out to be almost 5 times that. The sheer 
overwhelming difficulty of this task may 
kill this Investigation, especially us they 
find that many hackerc simply leave false 
information. Computer hobbyists all across 
the country have already been called by the 
Bound Brook, Row Jersey office of the FBI. 
They reported that the FBI agents used scare 
tactics in order te force confessions or to 
provoke them, into turning in others. We 
would like to remind those who get called 
that there is nothing inherently wrong or 
illegal in calling nity BBS, nor in talking 
about nay activity. The iā€™BI would not 
comment on the case as it is an ''ongoing 
investigation" and in Che hands of the local 
prosecutor. They will soon find that many 
on the Private Sector BBSā€™s user list are 
data processing manngcra, telecommunications 
security people, und others who are 
interested in the subject matter of the BBS. 
hardly the underground community of computer 
criminals depicted at the news conference. 
The Private Sector BBS was u completely open 
BBS, und police and security people were 
even invited on in order to- participate. 
The BBS was far from the "elite'' type of 
underground tolecoa hoards that Rockoff 
attempted to portray. 

Within two days, Rockoff took hack almost 
all of the stutcrants he made at the news 
conference, as AT&T and the BOB discounted 
the claius he made, (le was under st audibly 
unable to find, real proof of Private 
Sector s alleged illegal activity, and was 
faced with having to return the computer 

(continued on jiogs 2-J f } 


COMMENTARY: THE THREAT TO US ALL 


7 on this kind 

Ā£>f A ivtorj, Wo ve done it 30 many timed in 
onr p^ OB thĀ«t KETf: tempted to gloss over 
rand stories; because t hey 1 ve lsocome so 
oommon^Qce,. Put we realise that 

f ^LiP K>: [ a 4.ā€˜ a 1 ch L Went ? ā–ŗ because w* all need 
to know what js happening out there It h - 
realiy not a pretty sight. 

"??Ā£ 7" thft ā€˜^ā€œPuter to someone ant) 

clā€œe I it S ^ufd Va hiL C ' ty reactions . In ou,r 

H^ uid bH " overwhelming on thus iasm ā€ž 
mucn like iui explorer confronting a new 
adventure. But lo many ]Ā»oā„¢ c!ā„¢!tEā„¢ 

^ taks * tā„¢ TSā„¢f 

tbe CCdnputer* themselves, tuid 
complete ignorance us to what they and choir 
operators are capable of doing. ive saw 
blĀ®cty Ā°T the latter last month. 

C ? r 'ā€œ if re fuse to underā€” 

fltdnd computers and how they fit in What 

MODI fit t0p 3ā„¢ ver * iB *' bft b these same 
r k 015 bein # t ā€œ i oneei to pasm laws 
IĀ£er? inv ā€¢ ā„¢ c Ā£rning Ā«*nef*. In 

^k^ tY j inV ā€™ligation we have seen, ignorance 
^ true, such ignorance can 
the vā„¢ L - 1 got a ,g 0ft Ā® ta..gh when we hoard 
the wu! ' rac y authorities insisting that 
the Nore iw n g ftatellites "through 

bb< 4 . b 1 ā€œ e havens But. losing The Private 

cRller^L ?y Mother you 

were n caller to tbvc bulletin board or not. 

^whlf 53 Lfl ā„¢! v S ry trc,ub Jtng sign r 
What, was Jfho Private Sector? Picture a 
bt T d ?f idoaa, thcori*Ā£ ^d\ K - 

^Mvate' : L^?^ yoU 13 h ? vc a * 00<i *<ica. Tho 
Soc tor was a place to aak questions, 
tulk to experts, and learn ft hell of a lot 
J ec * 1 0 o ^Ā®' r It was sever a place 
d Ll i^ Jsl 111 1 <j rjuatian , such as Sprint 
codes i, credit card numbers, or computer 

elflWat!' The . system operator ^took 

goW measures to ensure this, such as 
going through each and every Message public 
and private, on 0 daily basL U sure 

nothing shady woa transpiring. tfe <wf 
Ss 1 i cv 9* h ^ should have hud to ^o even this. 

t n f onc * OI]e censor ah ip of any kind ā€” 

ā–  wer * t ? hflt ā€œ popple wonted to 
do j 1 legal things , then they waul d face the 

the people who sfmpiy 
talked to them, But the sysop had his own 

Slem*' He^ ^- ke Pt the board 

oieao. ha wanted two things; a good 

iith r anth^*^ ,lL ' leti ?*. hf A' rd an d no trouble 
JJhtoiĀ£ā€˜ Uthor ^ L f 1 ?? J At lā„¢t he monaged to 
obtain one of those goals. 

Again we te ignorance and u disregard 
t awards t hr.: rights of al 1 of us , They dime 

r + r boflrc! - whoAc only "crimeā€ was 
being mentioned on another board that bad 
been raided the month before. The Private 
^COmpletAy innocent of any wrong- 

without ball 11 L | bei ?Ā£ h * td at this ā„¢*nl, 
witnout bail. See the connection to free 

rET^hee^' M ā„¢y P* rt Pi<? have trouble seeing 
.hia aecnuse of :.hat word computer. Yet -i 

^Omputer bulletin board is probably the 
of lre * speech that exists 
Trn^H^ . Af , J ron ^ can call, anyone can spoBk. 

identity 1 Ā® not required. Why should 
thia be considered a throat in a deawjcracj'^ 

ing in e ld ther ? H l^islattoh pend* 

"rfgulate'^hā€žll^ e ^ . He P^ā„¢tatl ins to 
regulate bulletin boards. What this would 


mean is a ro-definition of liBSā€™a into u sort 
oi public utility. The system operator 
would havo to tokc full res pons ibilty for 
everyth! tig that was posted, "This means if 
he went uwny for ft week and didn't censor 
messages. he could find hiaself facing 
charges when he curnc hack!) The system 
operator would also bo required to confirm 
tho identitios of ull users and we wouldn't 
ot all ho surprised if part of thia involves 
the paying of scano sort of fee for a 
license. These sound very much like the 
'tied of tactics used by repressive rc T ses 
to curb public assemblies and nc^wspape Is 
this lti fact whut is happens ing'"-' a.im't 
bulletin boards a fora of public assembly, a 
kind of electronic publication? 

+1 ^?f cir Ā® Wraputer hobbyists out 

^e "biickers" for ruining 
tho rutujro of bulletin boards., we'd liicp fvĀ«- 

ā€˜S yif.tMf Ā»fole affair 3 an laport" 
ant and inevitshlc test. True, same boards 
today are being used for sleazy things ami 

could say the 

rThff 1 l fcLl ^II ^ out telephones or oven cars, 
tie illegal information must 

be passed wi hin the confines of some 

SSiiiL^P The . fact ia - \o caCt 
p"wā€˜c fl arn ā„¢e IĀ»1 

Wc see this sort of test frequently. When 
police pull you over and ask all kinds of 


R^Ln 3 ^ probably wind up fairly annoyed, 

drunk Hi ky s Ā«r it's a wav of catering 
n b v t . ā€” well, now that- s different 

V 1 *' fr 77 a ten'* all that im 1 
pottant when the public welfare ia at stake, 
rubbish. And what a perfect wav ta 
start eroding cur rights as individuals. 

fhS ^ * Iad JM, were shlu to convince 
th<. American Civil liberties Union to take 
cne case, which is most likely their 
introduction to the issues that Surround the 

^ *7 found good media 
like York Tjjb&s that actually cares 

ā–  i.scut what I s said in their atcries and 
attempts to find out what all the sides are 
We vo also soon sensational iam at Ms worst, 
such as WABC-TV, which took our comments out 
or Conffixt- and sso.d.Q tj^g scgib like? an 
^iti -hacker establishment? Or The Afcw York 
reporter who asked us after we 
a at o the system oparutor was M aurpriscd lf to 
hia computer tsikĀ« 3 p 4 he zhorkcdC' 

2 3 ^f. though, we re amazed at the 
response of hackers and non -hackers alike. 

to the defense of The Private 

vice rh flu- f ah rin,? equipment, ad- 

vice, DuĀ» phones have been jammed ā„¢ā€” wo' ve 

^TTL| St '?? an K tbin l tete. Everyone who 

J he ii ri vat S:- Seu tor knows it was 
things it's being accused 
o. having. The most important thing anyone 
can do at this point is to unite sure 
vvaryanc knows . The concept of a bulletin 
board must be understood. The vnlue of The 
mus 41 he known. The cninnoc- 
hJ* bI i C ^i ; j C v e J and freedom of speech 

S?S a *> that people undor- 

j-tund the threat to thfM whenever a bulletin 

S i! ut ^ <lwn - Jfofcn w Ā« ^0 this, wo 'il 
q^., at i. 7 h Ā°J? scr *0 getting The Private 
Sector back on lino and nuking a posit?ā„¢ 


precedent T 


Ā£-5fl 


ABC 


MNO 

lJL 


0 Pi: H 

o 


CHEW 

0 


2600 A Hacking Victim 

.WW CVl >C-|>.T 

When we received chit June SBS Skyline hill, we wlsc a bk 
surprised. Over sis hundred dollm ot' it ciiiot; from uu Ih w 
never [raids, But wh;iiA rvidlv i ikicrcitirig is the wav tha.L the 
Skyline pem;ilĀ£ handled Lt. In early June, vt gee a call tcjlinjus 
line; llidr sophisticated equipment deleted backers trying 1o 
gucs;; a code by scanning numerically. They sikt ljut ecale 
won Id sewn he d iseoverod, so they wt n goi ng lo give us a new 
One, with i ven extra dibits added. They did this and that very 
day our did code was inactivated The iilegii I Ā«i 13s hud occurred 
before 1 hill day, and wv figure Skyline mijM have known Lhis. 
Maybe they Thought that JdW, in our corporate clumsiness, 
would pay a huge bill without invest ignr inn. Many big 
cumpa hies wcmld. Gods. give litem credit tor frying. 

W lien weeal ied up about it, liicy didn't want lo handle it over 
the phone! "Send the bill through Ihe rraiiL,ā€ they said, ā€œMark 
the calls you rraide and deduct the rest." Why lire jtfiooe 
companies so i'dnud Id do things over the phone? 

As h]ri|c as Skyline decided to give the "ā– perpetrators" some 
extra time before the invcstigiilion skirts, we figure wc might as 
well lend a hand tuo. OuioM code was ii>Q09L>. Wc loved that 
code and arc very upset at Losing it. Our new si^ht digit one is 
very difljeu It to remeirihcT suvt nowhere near as fun. 

And one lasL note about these new eight digit numbers. 
Phone phreaks have already figured out n way arourxl them, if 
you dial the first six digits of an eight digit code, ihen the ien 
dtgtL phone number a rat hu n S key, you ā€™ll set your tone hack: 
Thu nncaris i licit- air cm ly a hundred possible codes since there 
a re only two mo re dig Its to figure out and one of them definitely 
WOrVs! If you triEĀ£ r sis digits that are not part of an eight digit 
code, and then a ten digit phone number, you! I get n n ernor 


nvissiixe immediately or ilia; take carder nunc Sly Line loves to 
send out. Tint cone, incidentally, is for you hackers with Apples 
ami C jnmjnOdOrvs that s::;i r, ,i ll nighl lung look my. Lei i the crdĀ£ 
shat will pet you through to a number that responds wrtb a 
carrier Lone. In tbe morning, you see how rrainy earner detects 
you jsOL aru .1 which codes gpi them for you- Skyline's iden is thid 
if cvcj-y invalid code gives a luaeker a can icr tone, ihuic is m? 
way for a computer to separate file good codes from the bad 
ones. Come on! How about setting your computer to dial a 
rrorj -carrier and Idling it to pnnt Oul only Ibose codec that 
ijā€™iciW V get a oai rler tone? And there a re pi ohahly a hundred 
more ways, Gig corporations cun he so much fun 

New Phone System For Courthouse 

ā– ā– ā– Vn H - ā–  r.xi k IIiSsb 1 h r an 

Thy Middhiwa County Courthouse and Administration 
Building wi It liave a new phnne system inxiadlinl in iiiergase the 
.security of Che complex, according to Middlesex County 
Prosecutor Alan J . RookoiT. [Yes, (he sume Alan J . Rodtofif 
thaL was convinced computer hackers were moving caLcliitcs 
through the "blue heavens") 

The phone system, due by ScpieiiTbCT, will be able to detect 
and cut off unauthorised calls nude in on emergency situation. 

ā€œOnce u phone is activated it will show up on this massive 
d nigrum that will ljo on a omnpiiler screen and wi 1 1 show where 

thal phone is being used in the courthouse or the administration 
building," Rockoff said. 

3 Tie syslem would niorulor which phones were active and 
would be' ahlC Lu euL QfinnuCLiOnx in ari trtsliiciE- Linekoff 
promised lhal the system would not be designed to hi p phones- 
[Of course, if his knowledge of lapping is anything Like his 
knowledge of satellites....] 


Seizure of Private Sector 

equipment with nothing to show for hia 
effort. Rockoff panicked, and on July 31 , 
the system operator had a maw charge against 
him, 'wiring up hia computer as a blur; box. H 
Apparently this was referring to hi a Nova- 
tion ApipleCut modem which is capable of 
generating any hertz tons over the phone 
line, [ly this stretch of imagination an 
Applecat could! produce n 3 E 3 CJQ hertK tofift as 
well U# the MBā€™ which is necessary for "blue 
boxing, w However , each and avary other 
owner of an Appiocnt or any other aodram that 
can ganemta i ts own tones therefore has 
also 11 wired up his conuputor os a blue box 1 ' 
by merely i natal linrt the modem. This charge 
is so ridiculous thut Rockoff 
never bothar to proas it, 
wording of wiring 
Rockoff an excuse to 
the computer longer in 
iUegot activity. 

"We have rctiuostod. that the prosecutors 
give us more specific infqirmation, " said 
jirthur .Millar, tea lawyer for The Private 
Sector. The charges are so 
Can 1 1 really pres ent d c&sa 
filler will appear in court 
tai a this in format ion . He 
demand, for the return of 


i'lt:i min ut?d / 'o?t i peg r 2-49} 


will 

owever, the 
up the computer gives 
continue to hold onto cases 
hiĀ® futile search for 


'Ai 

0t- 


Vogue that we 
St this point . N 
on August 16 i to 
is also issuing 
the equipment 

241 


if the prosecutors don't cooperate,, 
commence court proceedings against 
"They havenā€™t been particularly 


und. 
will 

thesi . H Tlioy haven ā€™ t 
cooperative," he nnid. 

li&ckoff probably will soon raco insider 
taking Private Sectorā€™s case to court, oS ho 
wil 1 have to udmi t he Just didn 3 1 know wluil 
he was doing when he seized tha &HS . The 
arrest warrant listed only "computer con- 
spiracy" against Private Sector, which is 
much more difficult to prosecute than the 
multitude of charge:? uguinst some of tha 
other defendants, which include credit card 
fraud, toil fraud, the unauthorized entry 
into computers, and mmerpua others , 

Both Rockoff and the ACM) mentioEicd tire 
Supreme Court in their press releases, but 
he wi 11 assuredly take one of his stronger 
to tost the new Hew Jersey computer 
CE'Lme law, JJy seizing the BBS just because 
of ^ supposed activities discussed on it, 
Rockofr raises constitutional questions, 
Dnrrcll Paster, a lawyer who centers much of 
his work on computer crime, says the New 
Jersey case is just another exustple of 
loeal law enforcement getting on the band- 
wtyfon of crime that Saa COme into vogue to 
prosecute, and they haw proceeded with very 

(continued on ;.wi' J-J/LJ 


moving satellites right up in the blue... 


Ā£*3?^ People knowleilgoahle about 

technology and commit*.*-* ... 


; : people tc . 

technology end computer* very disgusted. 
Manyxinple and innocent bits Jf inf onto lion 

activities. With the aid of The Shadow wy* 
have put together e guide to theā„¢ 
misinterpretations in the hopes fW 
^frryone can *ro how this invest ijĀ± it ion hit* 
gotten completely out of control, r ā€˜ 

Alan Kockr.fi- said^VhS^ 
ing the positions; of satellites up in the 
aifSi v ? HWe V B Ir !M ld Causing crianutii cat ions 
l - 1 i tc> Change prosit torts 1 ' in order l.y 
intike J roe phone ctil is "'boss ihly d ": srunt in tr 

wft^"Ā£ ine E t ' Ql Cdmmun feat ions mid making 
WitiBnto phono calls impossible, Ir ThiE 

ofĀ° r Sir^ 3 n^i a ? by the ā€œ6tfia to the extent 
satolti u-C r ^ lctlon f .of hueker-s causing 
satoilitos tnj crash into the Soviet Utiion 

Ā»gi? 3 

anv^rtttt-^T^ 17 ^ AT8lT C<smat <**fliod thut 

any attends to re-ronto BateUites had been 

Macke i i-l e8ii-fTr fl< ' f 'e 311 AT&T executive on the 
Lehrer Report stated that Khr. 
compu tors which control 1 *d the S J S3 ] t tS 

^S ei, that eV ^o C Ā°^!f^ With ttl * ph ā„¢* ] ā„¢ 

m/1 5QtoI Lites ware constantly 

Ea^ic^foS. " ov ā€œ s " t - Ā«*i ^ 

hl JS S ia P^acy arise. Hot bavin/ 

th^t Ā° th s r hoard * we eĀ«l only assume 

mnb^H K. r - i7 -'l hnve con tftined in forma tion or, 
?P^ L "S lilegol international culls, giving 

S?^S^ā„¢A^ d6a that 1hcre was 1 Tutor 

distance oom- 

cutls ^riL Sutelltloa to transmit their 
Th& Sect or BBS hud much in- 

formation on satellites, fitting Jn with it* 
Purpose us a teiecnnniun i cat ions information 
As^T^ ?ā€? rwmrrin* topic was TASI. (Tine 

tr^i^i t i 1" l' or PĀ°^ fl t ion J method o f 

satellite conversations. TASI 
is only the packet switching of telephone 
conversations ā€ž where the Conversation ia 

ffttollit^ inrf* riinEli:i 1 'tickets sent over 

ifje v anĀ£ * ā„¢y long distance circuits 
s iā€œ u ltĀ«neously along with nvmv 
other conversation Si TAK-.I permit.Ā® several 

tp he t; tint over one satellite 
Remitting more conversations 
without pending up more satelliteĀ®, rt 

+- rjS ā€˜' boUt ? wdojD t ransmiĀ®- 
srion methods. A* iar os we hmu there i a 

j*? i 1 ? 0, ar '^ fiiuilar information 

Plainly one cannot moyf^ 

Counfi uaan # Evidently Widdlese K 

county law enforcement, sow ported mr^sairet 
o^t he rou tiiitf of calls Mrat^ua^flSS 
ā– Jiid jumped, due to paranoia, to the con- 

liteaā„¢ Wt1S f Ā° r tfl& w*** 0 ? ttir - =atol- 

^jfj the wore sensationalist charges 
ā€”i ā€ž ^ 1 f - k youths hiid JOfipcirtn^fcit lot' 

ā–  secret telephone codes"' that could 

toĀ°tha t Kā„¢ iĀ° t! *e Pentagon, hue 

ā– t the subject mutter of the Private Sector 


AUTOVON the Dorr, 

b i;sgl 

eating network architect urt; quite different 
tram civilian phone systeaĀ®, Ā£otne AEIOyoK' 
phone numbers were on the hoard ns cKomales 

SL tJl Ā° f K lf ** lt of thc [i umber ing p?i,ri! 

These numberĀ® are easy to obtain imd have 
appeared on other bourds. These aUTOVON 
phane number cHn be obtained f rom u dec Las 
si ried DoJ] phone hook amai lab ] e from the 
Cover nmont Printing Office for a small fee, 
One of the more muddied of the ch was 

rcporUai by media sourceĀ® vari Iv ^ 
hackerĀ® ordering tank parts using stolen 

into TRW of by Pā€œ Inlt T r frym THW-, breaking 
j into tRn computerĀ® for t op secret inf onn- 
atioji yn tank partĀ®, and other variation*- 
It turns out that TRW does do some def^o 
contracting, but it has nothing at a.ll to do 
oerr^ t e^ pat ā€™ t ' 11 , 1Ha tend making automobile 

wMcle/ TRW ^ā„¢-tanS mj litary 

venicies, TBft doeĀ® have a credit rating 

service access able by COWputer . but this ie 
^mpietexy separate diviaion. Somehow 
the authorities and the press hĀ«d mangled 
dit fererĀ» , alleged crimes of credit curd 
leaking into of o defense 

t hft V ^ OJ "ri t e^ put A r s y 3t ft - m Which happened 
ā– o hayt, defense department information in 
it. binee TRW is in Ā£cth credit rdtinga rt Jd 

Sin ā–  n J ^- t + ing ( 14 w P uld ā„¢ obvious 
ā„¢ iL fluvo %hv hackers break 

e^edit^rd? 1 ^ 1 ^ ^ tftnk P arts b V 

] And just why wi,iĀ® the Private tiefO. 
dLscuĀ®Ā®ing ThVf in the first place 7 " tvw* 
SS SuSfl^ coaputera wore discussed on 

-Si Ā£, ?ā„¢, SluC ^- aft TfW wa ^ diacussed 

in 2yy0 (July 1GS4), Since people's private 
credi t m format ion is stored under shoddy 

cuas j'onā€™ r * -if 4 Hfl-tyrally came up in the dis- 
v Q j f eomptitcr security as a particu- 

woren"t for j.iS &thCI:Ce ' ? UC v discussions 

weren t for the purpose of breaking into 

vario^* r hfl-^ teni ? + wcr0 conducted by 

doth ^ not criminal.Ā®] and 

data processing managers who were interested 

Ar^Fb rity ā€œd computer abuseĀ® r 

th?*S? f possibLe source of confusion is 
ā–”pqĀ», f ^ n + h , atl of the megsugefi on the 

c ?3f lscat ^ were written bv 
peopU. id years old or younger. People this 
and tell, stories as voung 
people sometimes do. We're sure that yon 

Q K1 y0uni:t ]PĀ«r3on tolling La 
iriends how he blew- up aĀ® AT&T cnanutee ^,v 

e f'Ntollite out nf orbilTmuch the 
ā€œ^Eht brag shout the speed of 
oew.BDSPt, car. It wohld be 

i l kid'a r ?RĀ„h' 1: ā€™ lb f ā€œJhfritiM to issue 
, f lcl M father a ticket based on this i-uat 
f- H irresponsible of them to SnpKI 
ā–  j... f- c the list of conputer crimeā€; 

verifying that actual erimoa did 
occur. Tho authorities art? still unsuro 


to be mere flights of fancy, a great Imft flf 
about computers and telephony in 

Wd Ā°fw? d t i rc ' par i ot ]ixw enf nroomeiV J| 

alon/ t t Uw ^ fpreemen t official 

f telocoamun icst ions hobbyists 

should start to research the field by * look 


2-32 


...what was really gonng on? 


iiig ift their public library, or oven hatter 
a -oca 1 college library (under V 2 \ IHawey 
Decimal Ij , Several magazines also provide 
fiaod im format ion, aucb bh T^lccon ttjgcst 
Communications Ag Ā£ -, .3 a well 03 2600 and 

other telecom indn^try pub] j cations. 

Credit Card Fraud Explained 
. 1 . 1 th regards to the credit card part, of 
this whole thin? acre is a brief guide to 
llow crftdj P. card auhibcrs arĀ« used fraudu- 
lently., 

first one obtains a complete credit card 
rurtocr^ including expiration date, Zf a 
driver a License number, gocial security 
number, or other information ie also ob- 
tained, then it is easier to uac the credit 
card number to charge goods ā„¢d services. 
Credit, and other information is uana liy 
iound in the form of carbons (actual carbon 
paper that fits between the credit slip and 
the receipt) that are often discarded' after 
thoir use. Carbons contain all of the 
information from a previous legitimate 
purchase, if someone is required to inciude 
their address or social security number with 
f.hojir credit card number then this will also 
appear on the carbon which is found in the 
daily trash of many retail stores. One can 
then call up ft company that tabes chan 
requests over- the phone and order 
Using the credit card. Informal ion that was 
round With the trash, 

But the real hurdle to committing credit 
card fraud 1. a to have the package delivered 
and for this one needs a nailing address. 
This can be obtained a few ways. Goo io to 
get a post office box under an assumed name, 
and another is to have it delivered to a 
place where if eon be picked up before the 
gfiCkugc is noticed, fly using stolon or 
false identification or- by being convincing 
to a postal clerk, one can obtain a post 
office box. One can also ask for general 
post office delivery, whore the post office 
writ put your package on the racks behind 
tho counter waiting for you to pick up. by 
Sending e vacant or temporarily empty home 
one can also have the objects delivered 
t here . 

And this is hew it is done from start to. 
ruugh. There may be more effective ways to 
complete the various stages, but nil in all 
it is that simple. This is mainly because 
companies make it easy to Ā«yko a ā€˜ purchase 
while only supplying a small amount ef per- 
sonal ini ormat ion. Often if a company has 
been guaranteed that it will, be covered for 
the value of fraudulently 
then the company will make 
person to charge them. 

The problem of credit card fraud has a few 
simple cures: make it harder to order oh - 
jecva by phono (companies) can issue a code 
that must be verbally communicated in order 
Eo complete the purchase- one that <ivcsnā€˜t 
appear on the carbon) or d i s oā„¢t inue the use 
ot carbons m credit cord receipts. There 
ora many other safeguards that run be used 
to decrease this type of fraud, 
k This section was not intended to be a 

1^15Ā° ā€œ DW - to dammit a crime, but an 

r edit icat ion of how thia crime is not 
comnitted. Credit card fraud is not high 
tech crime. No computer is involved or has 


to be involved: 
involved; and it. 


no illegal phone Culls ate 
la not necessary to break 
into TRW or other credit bureaus to cobuh it 


this crime. 

Computers may be 
message boards whore 
down the information 
trash. With regards 


mail, or post 
involved in 


. Used as ifotcp 
individuals flight wriitc 
that they found in the 
to Credit card fraud, 
computers ore only used as u medium for com- 
mun teat j on . Credit card carbons are so 

1?* 4 Process of performing 

the actual illegal charge has been made nr> 
easy that it is not even necessary to dis- 
cuss the topic with others to be able to 
Conn.Lt the crime 4 

Because of the use of [,'g 
Office boxes, the post office is 
investigating this type of cripĀ»c, The 
Secret Service wain authorised last October 
to investigate credit card fraud. The FBI 
Variety of reasons to investigate. 

5 1 ready laws everywhere against 
credit card fraud, and there are already as- 
sociated penalties. It is nothing now to 
law enforcement. In addition, much 'of nil 
credit card fnmd is ctsmniittftd by those who 
steal, manufacture , or find whol 
cords. 

We hope that this thorou 
will help to got rid of t 
stories wo ve seen abounding. 


ā– e credit 


explanation 
e inaccurate 
Again wc l d 


1 -E - *0 ve seen armunding, Again we d 

?^ art ^V that law enforcement people 
,-houlfl loam a bit about computers and 
te I e comm uni cat 1 Ona and above all try to con- 
trol thoir gllthuin nam - 

course t only qualified to 
comment on the specific case of The Private 

that Rockoff and hie 
cohorts will have to search a long time for 
tho special codes that provided illegal 
access to the information at issue 11 ā€™ on The 
r-riyate_ Sector, fts th ey just aren 1 t there. 


Lot cot noNS.1 


03 - 29-03 


charged ^ods, 
it easier for u 


System hkrwd Pootod! 


RULES OF THIS BBS! 


1J MS CDQSF 'ā– PASSWORDS/ CC *' = arc to bb 
fl-CHtted or ejiclidnqcO via. Eā€” it.il ] T 
Violutjcn o-f this ru: Ā« wl ] 1 CObit you 
ycur sccssc. R6Ā£b*hti |ir- h w see every- 
thing you type. 

2> POST INFORMATION relating to tblerw 
ONLY? 

These ruios jrs to protect bath you tho 
user jnJ w tlw -.yatjpii. 

I-f you have any i n tern ot \ ng pr IS Cl es 
pi ee sc t.c."id tftem to 24.00 y \ * Cue : 1 to 
H IOOO hAGhilUb.ā€œ Hv iippr ug 1 *to dll pood 
anO Informative 





W11Y COMPUTERS GET SNATCHED 

When a computer System is confiscated from 
ft young person b&Cftuso thoy break inis 
someone s mainframe, because UKy have a BBS 
wl t h ] ots of codes or passwords pos ted on 
1 t of. because they arc caught mek i ng 

illegal E>hono calls, no one complains. It 
is Often said that the young parson 
obviously comm i ted a crime and deserves to 
lose their computer, '/be kid's parents are 
not going to complain, because they know 
enougn to think twice about arguing with the 
FB I , The Secrc t Scrv i ce, or whomever . Plus 
the parents do not want to make headlines in 
the local papers. So whet the author itien 
ln effect are doing is convicting people and 
punishing them by taking away their computer 
ftp tern. This is r in part, due to the fact 
that charges are often not pressed uguinat 
young people who break into computers, 

Witcd one -asks &ubh> bip compares public 
relations department whether orā€˜ not people 
brettk into their cwiputors they atv likely 
to snyl Oh no, of course not, wo .have the 
most secure sys toms This is becuuso i t 
looks bad to admit to security broaches in 
oneā€™s system; one's livelihood, in the case 
of GTEā€” fe 1 ema i 1 , the peop 1 e there saw some- 
thing going wrong, told the FBI and then the 
Cftse was out of their hands, A full four 
HObths or more after the raids in October, 
JaoJ the default password was still the 
letter A . And it was not until weeks 
after this was publicized that this was 
corrected (see 2600 , April 1984), Ob- 

viously Telemail did Hot want to admit that 
they were reluctant to deal with the real 
problem. TFW was upset last, k uamcr when the 
press {see 2600, July 13B1) had to tell the 
wer Id about breaches into the companyā€™ s 
credit gathering system. 

These companies make money because their 
systems arc reliable and secure and not 
because they will prosecute people who break 
in. Th*y know that it is not worth it to 
try to prosecute kids, and it is better to 
prosecute those who try to use a computer to 
anberzle. In addition kids are often exempt 
from prosecution or, because of youthful 
offender laws, will have little of no penal- 
ties placed against them. 

It is for these reasons that it is more 
advantageous for companies to have author- 
ities confiscate equipment, and punish the 
hacker that way rather than dragging them 
through court. They keep the c^ulfssent by 
calling it evidence in an ongoing investiga- 
tion, and they often return it if the kid 
tc 1 is them everything they know . f In 

addi t ion ā€ž the kid* s confession about the 
poor security of whatever ayst^st he may have 
broken into is rarely related to the proper 
security personnel at the company that owns 
f lic" system. ) This is also a fora of Ji-EoraBSā€” 
neat or scare tactica. Arenā€™t young people 
citizens and don't they have rights just 
like the rest of us? They have the right to 
due process and have to bo proven guilty 
beyond a reasonable doubt. 

Law enforcement types have said that they 
occasionally have to make hacking headline:} 
in Order to reduce the amount of Tata night 
computer activity. They have admitted that 
they need to gat a good bust in before the 
stjwmior a tarts, because they knew that all 
young people with computers may spend their 
summer trying to start World Wur III from 
their homo. And fhis is a no-no. 


Some important Questions To Ask 

Who* l h T ā– ftsf'fr 

sysop how about remote sysops? How much can 
one do to regulate a BBS' 1 On the private 
Sector mea sages were regularly scanned for 
potential illegal material and then deleted 
when found- Then the user who posted the 
massage was denied any further access, What 
more can one do than this? Especially if 
t.he BBS is simply a hobby and not a full 
time job. On the Private Sector it was 
extremely unlikely to see A. credit cord 
number or an Allnct code, Plus isn t it 
really illegal to use these codes? This ia 
because a crime has been comn ed only 
after a code has been used, But .n again 
in Rome states, namely California., it is 
illegal to tell people code formats. This 
makes all credit card otHMercials, sample 
credit cards, and this publication illegal 
there. Does this sound right? 

It also raises a variety cd Questions on 
the admissibility of o Loot rente evidence. 

The Middlesex prosecutors consider reading 
messages on a BBS the same as overhearing a 
conversation. Is this the proper way to 
look at BBS messages? And what about elec - 
tropic mail? Is the sysop responsible for 
the contents of electronic mail just because 
he provides the service? Isnā€™ t it just as 
sacred as U& mail? Now, there are cur- 
rently no laws that require court approval 
in order to tap data lines, &o s how does 
one consider evidence that ift received bv a 
legal, vet unapproved tap? If authorities 
can confiscate a suspect, computer systems 
because it has un illegal message on it, why^^ 
donā€™t they confiscate CompuServe when at Ā» 

used by criminals to exchange illegal infer 
mat ion? Or is the government just upset 
about the fact that people are comscun icut ing 
in an unregu 1 uted manner? These questions 
go on and on. What are the answers? 

Some of the answers are only starting to 
appear as legislators address the problems 
that are connected with the computer ago. 

But often they are only responses to head- 
lines. For instance, we wore told that Sen- 
ator Paul. Trible { lf r V frgin ia \ has recently 
proposed legislation, (S--1B05) that would 
regulate obscene material on a BBS. Called 
the "ā€™Computer Pornography and Child , Exploi 
tat ion Prevention Act of 19B5 t r the legisla- 
tion would prohibit the posting of names _ or 
addresses of children and prevent discussion 
that could bo construed as pertaining to 
child exploitation, A couple of eX[J licit 
sessugos might give sufficient cause t.o get 
a warrant to seise your BBS. We have not 
Seen the legislation itself yet, hut it was 
related to us by Jerry Barman of the Amer- 
ican Civil Liberties tin? onā€™s Privacy Project 
in Washington . He said that this showed 
"ā– Congress trying to regulate on industry 
that no One understands and that has no con- 
stituency. 1 ' This is all. too truc- 

On the other side, Bcrnian told us about 
legislation that is being draft ad by Patrick 
beahv (D-Vermont) that, would extend laws 
which limit wiretaps ih order to protect 
data transmission, electronic moil, and 
BBS's. This is something that would be 
harder to get through Congress, as 
reduces the power of law enforcement . 

tfc will try to keep you informed when any* 
t.b i ng new happens . So ask the uucsti otis 
now, before they are answered for you. 


2-54 


HOW CANS YSOPS PRO TEC T THEMSEL VES? 


ā€"hā„¢ a Ā£j bĀ§| 

riot^h^r E nL^ 3Dr Ā® 1 'i b,or P abcmt Aether or 

u^erWs ^ m W - U B * ww lip in 

Ufler j. Oga , Ah Weā€™ve now seen, it imikeft no 

ditference whether or not youā€™re actually 

in iUzsr activity. V Any b3lĀ£ in 

Sfj th;-r hare K f ^ d . be n *Ā»* Eherc'rSot 

t that eon be done to prevent 

w Ā° *** ā– "ā– ā€¢ iĀ«ā„¢ wSĀ«dā€œ; 

t] }* mnntioe, however, there are a few 
loosen the odds of a. raid or to thwart the 

J 9 ss*ni b issiā€œ* y i Ā° * et i ā€ t Ā° ā„¢- 

you con almost expect to get visited, even 
What^p u nly b ? ing .^ono in private mail, 
S ^ ? h J V . ln, E iortan t. at this, stage is the 
r^lc the sya text is olavitw w -j f-v. 

re^rda.to this inf-Uat ion. if hĀ£/5L iĀ£ 
tainT^h* 6 emit ti oi pant there will mo.; I c er- 
theft y T+^ r ' io make an axomplo of 

tntift. It Ā£ a mil, air to draft rdifiat ration 
Who pub Hoi EC their oppositionā€” tiny 

ā„¢. kpp*ā€ž ā€˜}s if ā€˜fc 

running a bulletin beard, you aro call lap 
attention to yourself, so it stands to 
Ā£5^ ^.should keep your act clean. 

ly 1. ^fniT^ 16 boā„¢ written before July 
itfi.. houJj have advised B-ysopt; +o ehā€” 
courage people not to post credit rurd 
bā„¢Ā«Te*ā€™ etc, in order not to ā€˜get 

With 1 ?i. n E p^H. th i s h* Ioil Ā£Ā°r the case, 
inlL r a Pri L vli te Sector, authorities moved 
i K-t, the board whs kept spunking 
clean of the above, So now, the only way we 
Oun guarantee that your board won^t ā„¢ 
snutchec from you is if you unplug it ?tsd 

ā„¢ In - a B 030 ?,. Using a bulletin board 
lor communication between two or more people 
cun now be considered risky. 

,w AE ?J?" illK ^ bat. you still want ydur board 
there ore other precautionary measures, 
tot onft . l-b Ln Ss the boards that ask the 
COUer whether or not they work for law en- 
forcement really arc working against then- 

all low enforcement types to dutifully soy 
yes and never call buck when theyā€™re denied 
access; ho they really think that these 
people can get their foot in tho door even 
if it raan elite board? Even if there is 
nothing illegal on such a board, attention 
, drawn to 1 1 by such s tatemen ts and it 
H1 tl become impossible to persuade tho 
authorities that there simply innā€™t- a higher 
access level On the same token, sysops 

t f?Lfā€œ n ^ a i t 4 .^ 3cIail ā€œ sr with words to the 
ertect of the sysop takc^ no responsibility 
.or wnut is said on this board" are kidding 
themselves if they think this is going to 
Save them iron harassment, Those words 
jfiouJd apply, naturally, but at the moment 
they donā€™t seen to. 

Whether or not you want to censor the 


patera U up to you. Some- 
t Lmcs it helps to Wood out undesirobl ea and 
sometimes it s an intrusion into someoneā€™s 
privacy We never Liked, the practice 
a l though i t was done regular 1 y on The 
Private Sector. Itā€™s your board nn$ yob 
have tho right to run it your way. 

What really aceds to be addressed at this 
point is the concept of protection. Tea, 
you r have the right to protect yourself 
against thugs that came into your home, no 
matter who sent them. One way in by 
scrambled data. There ora .Ā±ony scrambling 
programs around and some of them are quite 

f ood, oven the KSA would have a time crackā€” 
dg the code. We feel that all. UScrlogs 
should be scrambled, at the verv least, (in 
some cases, a valid form of protection would 
bo to keep no userlog at nil. > System oper- 
ators should try to figure out a wav to 
scramble everything so that nothing 1 is 
available to unauthorized parties. When 
raids become totally fruit leas, maybe then 
they will stop. Of course, now there is the 
problem of being forced, under penalty cf 
law,, to; unsertsmbie everything. A vivid 
imagination can probably find a way around 
this as well. 

The best method of protection is complete 
destruction of data. Soae people hook up 
their computers *0 that if the wrong door is 
opened or a button isnā€™t preaood, a magnet 
activates and wipes the disk clean. Bookies 
like to do this with their Apples. fiimi lor 
sys terns can be rjggcd so that if a computer 
jp unplugged, the first thing it does upon 
is u piiftfe [not- 41 dirtttQry pur&ft 
which .cures with simply deleting file names, 
u complete reformatting of the disk which 
erases #.U data} , Ibis means, though, that 
evory power failure- will have the same 
1 1 feet. It will talfO some time to make a 
good system of protection, but. this is pro- 
bob ^y the most constructive project that BBS 
Operators OUn engage In, It dceisnā€™t matter 
if you have H nothing to hideā€. The fact U 
you have everything to protect from in- 
truding eyes. Because when they sei^e 

equipment they read everything without 

concern that the sysop may be the caretaker 
of people, p. personal messages end writings. 
We a l-iko- to hear other methods of out- 
a&sirtiti^ those gd>i>i-:is. It's &iot very haiā€™cl. 
for mstunoc t you could have a bulletin 
board dinl-in at one location, which will 
then call-forward to the real location or 
still another dummy Location. Each of these 
requires another phone line, but youā€™ll get 
Plenty of warning, especially if o dtamuy 
computer is set up at one of the locations. 
And this is only the beginning. 

'We don t enjoy having to ' suggest these 
Courses of action. We'd like very much to 
he ub le to get on wi th what wc ā€™ re supiKised 
to be doing; discussing telecommunications 
arid computers in our own way. Inateod we 
have to pause again to defend our right to 
Ā« ay t hose th t Ugo , Its a utodcssary course 
uCt ion ant! , if wc hold our heads up, i t 
wi 11 be o -succeas ful one. 




HOW CANS YSOPS PRO TEC T THEMSEL VES? 


B BS ā– " j.ā€™H SHhw ,r 

"serio* s w i 1 1 3how U P i I " raided 

4?Ā£Ā£ io Ā£ fi - wo've now seen. it makes rto 

dl fforence whether or not you* rf- actual 1 v 
a "f in ill egr act iv ity . * Any ffi let 1 n 
t[=r herft v f ^L d l l5e neift ā–  , ' nd there 'k hot 
t that l ;cm bf! rb>nf - tc > prevent 

iriteS ** ā„¢ Iawa to 

...^ the meantime, however, there are u few 

^Kā€˜SrĀ«a 0 r a Ta!d g*s 

fidcntial b mat^iol? y * mB ** l Ā° * et into ^n~ 

tw vi tv2i y ' if yoti ]wVo fl bulletin board 
trint frequently posts codas and passwords 

if U it^ iĀ° a Ā£ .OKpeol, to get visited, even 
? nly h Ā£ in Ā£ ^4onc %n private mail, 
?ol^ nt this stage is the 

role tne system operator is playing with 
reguria to this information. If fie/sHo is 
hi* participant there will most cer : 

thim ly Tf'Sf 1 J 10 ,ā€œĀ«*Ā« Ā«n example Of 

tfu.m. It s similar to draft rejfi strati on 

are^ThJ^o ā–  publ *Ā£ i S e t t eir oppositionā€” they 
STL bT lCB t ^ rjt prosecuted, rot the 

Pā„¢fila about it. By 

b<y fi 4 > you ore calling 

attention to yourself, so it stand* to 

Ā£1^* y Ā°^ a ^ ]a L ld ke*P your act. clean, 
had this article been written before July 
12ā€ž we would have advised sysop* to en- 
courage people not to pest credit card 

j etc ' in Ā° rder not to get 
hoHaled. But this is no longer the ease, 

" th u i h - Sector, authorities moved 

i? _ thfi ^ourd was kept spunking 
clean of the above . EJ-0 now, the only way we 

.P f 5 r 5 nteft thj ? fc your board won't bo 
snatched from you is if you unplug it find 

f?* 3 ' Using a bulletin board 
1 or com man icat i on between two or moro peopl r 
oan now be considered risky, * 

that you a till want ybur board 
UP, there arc bther precautionary measures. 
I'or one things the boards that ask the 
caller whether or not they work for law en- 
forcement really are working against thexr- 
sejves. First off, do they honestly expect 
flU law enforcement types to dutifully aav 
ye* and never call buck when they 1 re denied 
flCocas? ho they really think that these 
people can t ip got their foot in tho door even 
^Ā£, iT- i s . 1 & board? Even if there is 

nothing illegal on such a board, attention 
is drawn to it by such a t atejnen ts and it 
wlU become impossible to persuade tho 
Monties that there simply isn't a hi gher 
access level On the same token, sysops 

^ 4 ^ 114 . . with to the 

errect of the sysop takes no responsibility 
xor whtit is said on this beard" are kidding 
themselves if they think this is going to 
save them from hurossment ā€ž Those wards 

Naturally, but at the .moment 
i-tLov don't seem to. 

Whether or not you want to censor the 


ayatem is up to you, SomĀ«- 

-J iL he ] Ā„* E Ā° we< ^ c| . c>ut - ul::iJEo3 ā€œ c* and 
w:s s ā„¢ intrusion into someone 1 n 

f:y i. - IK ā„¢ e3 'ā€˜ liked tlie practice 

although it was done regularly on The 
Private Sector, It's your board anti you 
havo tho right to run it your way. 

What rea 11 y needs to be addressed at thi a 
point is the concept of protection. Yes, 
you, have the right to protect yourself 
against thugs that come into your home, no 
matter who sent them. One way is by 
scrambled detĀ£u Thers nn: ā€¢ā–  mny scr ccccsb 1 infi 
programs around and some of them are quite 
good' oven the NS A would have a time crack- 
ing the code. We feel that all user logs 
should be acradbled, at the very least, (Tn 
seme esses,, a valid form of protection would 
be to keep no userlog at all.) System oper- 
ulois shonld try to figure oyt a way to 
scramble everything so that nothing is 
available to unauthorized partie-s. When 
raids become totally fruitless, maybe then 
they will step. Of course, now there is the 
problem of being forced, under penalty of 
law, to unscrumb le everything. A vivid 
imagination can probably find a way around 
this as well. 

The best method of protection is complete 
destruction of data, Some people hook up 
their computers so that if the wrong door is 
opened or a button isn' t prosisod, a magnet 
activates and wipes tho disk clean. Book lea 
like to do this with their Apples, Similar 
systems ean be rjggcd ao that if a computer 
is unplugged, the first- thing it does upon 
revival is u purge [not a directory purge 
which coĀ»es with simply deleting file names, 
u complete reformatting of the disk which 
erases sJJ dutaj. This means, though, that 
every power failure will have tho same 
if feet, it will take Some time to make a 
good system of protection, but. this is pro- 
bably the most constructive project that B&$ 
Operators eon engage in. It doesn't matter 
if you have 'nothing to hide". The fact U 
you have everything to protect from in- 
truding eyes. Because when they seise 

equipment they read everything without 

concern that the sysop may be the caretaker 
of people s. persona L messages and writings. 

We d like to hear othe r met hods of ont- 
smartipg those goons. It's not verv hard 
mi- ItMiliinoB, yooi could have a bulletin 
board dial-in at One location, which will 
then call-forward to the real location, or 
still another dummy location. Each of these 
requires another phone line, bnt you'll get 
plenty oi warning, especially if a dtmay 


computer is set up at one of the locations, 
ā– and this i* only the beginning . 

Ā„c don't enjoy having to auggesr. these 
courses of action, Weā€™d like very much to 
be able to get on with what we're stipposed 
to be doing: discussing tel cconmrun i cations 

and computers in our own way. Instead kg 
have to pausse again to defend oar right to 
sey these things. It s a tlccoaoary course 
fit fiction aricEj, 11 we hold our heo.de yp, it 
will be o auceiFrissful one- 


2-55 


PRIVATE SECT OR SEIZED 

(amiimwd fr&m 2-5!) 

Utllo technical understanding. and in the 
process they have abused many people's 
constitutional rights. What we have devel- 
oping as a mini vUuS hunt which i.s analo- 
goua to some .of the arrests at day care 
centers where they swoop in and arrest 
everybody, ruin reputations, and then find 
that there is only one or two guilty 
parties. We feel that law enforcement, not 
understanding the information on the ni3E n 
decided to strike first and ask questions 
Later . 

2600 atage^ine and the sysops of the 
lYivate Sector BUS stand fully behind the 
system operator. As soon e.Ā« the equipment 
I* returned, the BBS will be hack up. Wo 
&sk alt our readers to do their utmost to 
Support us in our efforts t and to educate hs 
nany of the public os possible that a hacker 
if. not a computer criminal. We are ail 
convinced of our sysop's innocence, and 
await Rookof f s dropping of the charges. 

[ NOTE : Header* will notice that our 

reporting of the events are quite different 
than those presented in the media cund bv the 
Middlesex County Prosecutor. Wc can only 
remind you that we arc much closer to the 
events at twnd than the media is and that 
we are much _ more technologically literate 
Middlesex County Prosecutor * Ā« ' 
Office. The Middlesex Prosecutor has 

already taken back many of his ntatemonts. 
alter his contentions were disprove^ by AT&T 
und the DOI), One problem is that the media 
and the police Lend to treat the seven cases 
a* one case, thus the charges against and 
activities of some of the hackers has been 
extended to all of the charged. We at P$Q 
can only speak about the case ef Private 
Sector . \ 

nm qf ntw uriLvir \ 


MY COMPLIMENTS TO 
THE PRIVATE SECTOR ! 



CFJWmVĀ£KNt WS A DUALITY BULLETIN ROAR D SYSTEM 
WHEN THEY SEP ONE. 11 [ATS WHAT THE PRIVATE. 
SECTOR WASā€” AND WTIJ, HE AGAIN, WiTII YOUR HĀ£LP 

tell. tiib world what ti ie private sector was all 

ABOUT AND IlOW XT WAS UNJUSTLY SNATCHED 1M ITS 
ā„¢ā„¢E. WRITE OR CALI. YOUR ELECTED OFFICIALS AMD 
OFFER TO EXPLAIN THIS KJNDOFTHlNOTOTIIEM. THEY 
WILL LISTEN BECAUSE NO ONE FT. SI: IS OOJNU TO TF1.T. 

theaii donate your time, resources, and/or ā–  

AR1T.1TISS AND STAY INā€™ TOUCH W1TI E MW *T(jM) 751 -SfcOfl 
YOUR IDEAS ARE WELCOME. 


OQUtfl y <ir UiiXjLLH:* 


H 


MtallClI. IIMlIJiAN r 


" TĀ«-| run Li rtg i*.Ā»-m I , ā–  ftcCMtb? * i . . V .^ ir, L._? I CM Cult. l^r m C ,- 1 r- yj, h L J C. 

" *Ā« i" ,fc * ; ā„¢ā€™ r r ā€œ 1 HKhĀ«UW La .hr H pv.fcrv.U IjHi*,, !l rr r r.^ I hĀ«r. hd MIU. 

-L^liu-Uvf 'j;uEy-:_i.u7lTu iM h r . 

" ā€” J l i U llfl = ā€˜ r - ^ ā€˜ r ā€™* , ā–  I n I* L*. tA: J lfl.ll LA- I'ulkj.Mrd Ā»-n na > Y I v 4H 

^ ^ H35 2C J 2tĀ«-3- , ifĀ£:J h 2C:2-Ā«5 

-C.'rAq. I L.'rh I y ji ā– - V -^ 1 U t h r tfrl ft | 4pĀ£0hf hCLl]y , COBJHjfctfhā€™ Oi'|oS|rWlFit r 'in-= l C.T.r. , 
r-Ai.iu.uir, pOCIvucVj h d r. j a i a j iinniii'! ā–  >j ) -p ] L r. ā–  , AkhirdAt LpOtAh, r-rL-zTd.r . 
nj3CĀ«iir *!ā– ā– -:.. |,4 hm'd r 1+KT.r. I..1..I li.j liFHic ncardd AFri .... . i.-jj-u r ā–  Ir n r n 

rajACLPh; ā– *Ā£. n.r LfrerdtJan ot ihw fo^iiliT. 


^ā– LVu-: | I S ..-J IUH 1 V 1 I hr iruvr rf r-i^ir 1 , 1 

3 *ā– * ā– > mui *1 n ^kv^F..i h.^. r.i , 1^.^. 

Kr-i ā–  i-Vn .H ā– !.ā– ā– ā– ā– ,Ā» ik. |>.i.mā„¢ ā€” mĀ»i h ihĀ»-,i ā– * .. 

H Hi K. n. -.-lMr.il ... Iā€™Ll. _ -.In K-UUk. Ā» -- I ā–  .-I, .ā–  -.Ir.LsiM -rfKJ i-nlri,,. hnr. 

r-rrr i i vmui ..l ,#l. . ,- ā–  ā–  ā–  ā–  ā– - . .ā–  -i i . h . Am ā€”ā€” l ikj-pLjutr i li'iflL 

1 r- ā€ž 1 hjMlB **- 1 1 /ā€ž -,.-i,. c ā€žj^:,|., 

r ā€œā„¢ " ā– :ilK-:il Jri IV nwtr kf^JJi U LLr^mip. H Iff R,:-J;4i 

ZZl 'Zu hmrf ' taJ a f M ^ n 'ā–  knla ā€˜ F 1 ā€œH h Si 1 d I j 1 V rrm ā–  ry rj ,h, F , T<I , r 

J. TV VfcAll .. tā€”MPI Cl Ih n,...-x,. |J a FChlck ,. 

\ii.< ..i.Lu. n-u .Tcriajf, Ā»r,rc i W v,j Ly i>3 1-= r L b-i J /,*. t, 

rā€” l.y if-Ldl tml u.iivniv -Jth LLur j I .. ,,,,._ ..H.n.j | rt ,taā€ž. 

j-i-L-au.il. h T hi. u pnparLv. Vm r-D-rJt.-;L- laajiM La . x a L l- ā–  

IkJā€˜JĀ« 1 Ā«, 1 H rlVlt ā–  Lila . 






Attention ReeszHersi 

Demand for back i&snas has^rown so myth that we're m 
(lid process oirapfinJing our entire foveaEOfy. Asa resul!. 
we'i-a going tp be raising the price on btiok issues 10 52 
each. This is nccus&arv to cevur the time i>ncf expense 
involvod in doing this. HcweveL our pTesent subscribers 
(you) can Still get back issues at Iha pfo price i$1j if yp U r 
order is pnstmarkod Seftamber 1 5 or earlier, 

QAĀ£K 6tlĀ£E5 AI5EAVAl>W.t: FCR EVERY IdCTf l>f STtCE JWti L5KV. l'W, 
Sand all r^gucsts to: 

2fiOQ Back Issues Dept. 

0ox7b^ 

Middle Island, NY 

(B 1 &> 751 -2G0Q 

AiiOUV -/ WEEKS FOR DELtVERY 


UjJ.iZV 5fc-.E^n:K 
JrS.C.