>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> SWEDISH HACKERS ASSOCIATION PRESENTS 1990 THE 3rd PROTOCOL 1990 EDITORS : LIXOM BAH : MR BIG : PHEARLESS : THE CHIEF ALL TEXTS IN THIS REPORT IS CONTRIBUTIONS BY ORIGINAL MEMBERS! THANX TO EVERYONE'S CO-OPERATION AND SUPPORT THIS PUBLIC DOCUMENT IS NOW IN YOUR HAND. <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< INTERNATIONAL HACKERS ASSOCIATION'S HEADQUARTERS ##-###-##### TOUCHDOWN BBS (SW) ##- #-###### INTERPOL II (SW) ##- #-###### PROJECT ATHENA (SW) (ED'S NOTE: No telephone numbers are included in the PUBLIC VOLUMES) <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< -INDEX- EDITORS INTRODUCTIONS......... 01 Editor's Page #1........ 02 Editor's Page #2........ 03 Editor's Page #3........ 04 Editor's Page #4........ 05 Hacking Rules & Advice........ 06 Cray & IBM In Sweden.......... 07 S.H.A. Member Busted.......... 08 Unix Security................. 09 Are you a Homocidal Maniac?... 10 Brittish Hackers Blackmail.... 11 The New HQ.................... 12 University Hit By Hackers..... 13 New Hackergroup Busted........ 14 New NETwork Soon Here......... 15 Telco Traces Calls............ 16 Terrorists Handbook found..... 17 New Wave Of Computer Coups.... 18 Datema-Company Sold........... 19 S.H.A. Visited ESA Computer +. 20 How To Keep On Hacking........ 21 Storytime! 'The BIG system'... 22 Editor's Final Notes.......... 23 How to contact S.H.A.......... 24 Credits and THE END........... 25 <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< -1- ()()()()()()()()()()()()() ()() INTRODUCTION 1991 ()() ()()()()()()()()()()()()() Welcome to another interesting and stunning protocol from S.H.A. - The leaders of True Hacking in Sweden today! The Only True Organization that keeps the old and genuine way of hacking. We have collected the finest and best writers for this issue, and have some nice and special views, tips, reports, stories and jokes for you, the reader. This is the Only Series that is released to the general public, which means that nothing is signed under real names or handles and that no direct phonenumbers are published, though for those who consider themselves hackers, we have a modem 'mailbox' where you can contact us (see the end of the file). By keeping a steady contact with our friends in the United States in the 'scene' we have learned and experienced a lot, been there when the busts of the FBI Operation SunDevil raged trough the underground world, watched BBSs go down, and come up again (if lucky). We have seen a new and very special bulletin board system where Feds and Hackers can discuss and change views, as well as share their own thoughts about their hobby, classified 'illegal' by the counterpart. We have seen the 'carding' scene vanish through tough and sometimes cruel work by the feds, and as an effect of this, the hacker scene suffer as well. If you called underground boards in The States a couple of years ago, and went back today, you would be in a state of shock. You won't find a genuine HACKER ONLY underground board anywhere! They have Sports, Tv reviews, Music, Classifieds, Religion, Politics, Ads, Technique and this goes on and on and on until at last, if you're lucky one or two small and unused hacker subs. You start to scan through the sub, only to find that the last message was written about two to five months ago, regarding anything but hacking. This is truly a sad development 'over there' because when we here in Europe are breaking new barriers and stretching out to the 'big country in the west', we can't find people with similar interests who are active, or seem to be active anymore. I guess this is how it really is today, but we all know that Hackers are reluctant to make 'new' friends, or admitting that they really Are hackers, which is the correct way for a hacker, but in my last two years in the underground scene in America, I thought I would finally see some people 'lighten up' and talk to me about hacking and it's effects, but I am now ready to give up, because I haven't seen nothing yet! Well, that's my point of view from the American Underground today, let's go on now with this issue of THE 3rd PROTOCOL. As I said, we have all kinds of stories, tips and treats for you, so just relax, get a nice cold coke, switch on MTV with Yo! MTV Raps & Fab Five Freddie and read this cooooold chillin' issue. PEACE! <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< -2- PAST AND PRESENT The year that have passed have been very critical in many ways. We have tried to get more serious members by tough advertisments and by keeping a low profile without any results. We are open to new members, but they have to be serious, and have to follow some kind of rules, what you can, and what you can't do I mean. Such persons are hard to find in Sweden today, let me tell you. It seems like those who already are members are the only ones left in this country. It is a sad statement, but until we find new members, that is the truth. I would personally like to see a more qualified bunch of people who enjoy and respect the world of hacking, who see the excitement and the pleasure of bending that 'door' and look into the world of computers and systems whithout having to break and trash them and going to a genuine state of illegalities. I don't find Hacking a criminal act as long as I don't trash, crash, take or alter files and programs on the systems I hack. It is a sport in a way, and a search for knowledge in another and the only competition I have is the people who have made the security on those systems. I don't respect people who don't know what they're doing when hacking and the same goes for people who crash systems and still call themselves 'hackers'. I don't respect newspapers or journalists, who add the word 'hacker' to every goddamn headline when talking about something else as long as it is about computers and crooks, just to make the whole article more interesting. Another sad statement here is that they jyst don't know what they're talking about. They have no education in computers or areas close to computers. The only education they have is a journalistic one, and that's not enough it seems. The other critical area, is the more illegal branch of the underground computer world. You probably have heard the word 'carding' before, but not in the way someone within the underground have or have experienced. One of our members got caught this year because of carding. That person just broke the limits and overdid it. If someone tries to make you 'card' something or tries to teach you how to do it; Don't! I don't recommend carding to my worst enemy even. It is too risky and too illegal to get involved into. Although Sweden is far behind the Big Hacker Country in the west, both in ordinary Hacking and Carding, we have the same laws when it comes to Carding. The law is very strict here, and will never look the other way in these matters. If you followed another case about a year ago, you read that they got a very generous sentence; just small fines, and all of them didn't make it that far even! One of them went out of there without any charges at all. Just don't think that You will get away that easy these days. The Police and the swedish FBI (SAPO) are tougher and the creditcard companies are changing their security, allowing the companies who recieve orders to check almost everything. The Customs are close to the Police and will not accept a 2 by 2 meter large package go through with a 'worth 500 SEK' stamp on it without checking the sender, the reciever and the package closely. And the swedish VAT (MOMS) is now at 25% which makes the price You pay on arrival very high (if you make it that far). Now those who are into this kind of thing says 'That's easy! Just order it by FEDERAL EXPRESS and everything goes on the creditcard!', that is true, I don't say that it doesn't, but the companies that use FEDERAL EXPRESS seem to be larger, have more money to check all creditcard orders, and have the power and money to contact the Federal Bureau of Investigations who contact their collegues in the country the order was placed, and follow the whole thing trough. They have money, time and enough background to prosecute. The final word here is just; Whatever you do, Don't! It's not worth it! <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< -3- DIFFICULTIES It IS difficult to find experienced hackers! This is the truth. We have tried to find these persons by 1) Letting them come to us, and 2) Go out advertising on public boards (This could be discussed being a smart move or not). None of them have resulted in more members in the SHA, only that more Novices (With a capital 'N') have contacted us. This may not sound as serious as it is! Hackers Must go together with their experiences and knowledge to hack the most heavily guarded and secure systems. This will be the only way to even have a chance to beat future systems. Also, a big group of hackers who 'Know What They Are Talking About' manages to come up with more ideas, and of course, more contributors to informative textfiles like this one. Another thing is also that more hackers can collect more new happenings, because it's (still) happening very much on the computer/modem scene, and it takes a lot of people to keep up with the computer systems fast developments. <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< -4- NEW AND CLASSIC NEWS WATCH OUT! ========== 5 years in prison, that's what could happen to hackers in Great Britain nowadays. A new law have been introduced that will make it much more dangerous to hack computersystems, but since almost every other european country already have this law, I think it will make no difference in ac- tivity from our great friends. The law says that if you enter a system in an illegal way, you could get 6 months in jail, or fines up to $4000 but if you enter the same system, but only with DESTRUCTION in your mind, you could be punished with up to 5 years in jail. UNIVERSITY HACKERS CHARGED ========================== 1990 February Two youngsters have been arrested for illegal use of a computer at a Swedish university. Last winter they made a successful hack and searched for information about grades and tentamen-results. Both hackers risk fines, and they have to pay the university $1500 in damage costs. - I didn't think the school had so much to learn me, said one of the students. Instead he hacked his way into the administrative computer system. But due to a mistake from his side, the school-staff was warned and they un- derstood that a unauthorised user had been in their system. The same ev- ening, one of the system operators started his hunt for the hacker. After a while the hacker was traced to one of the computer rooms at the university. The operator was quite sure he had found the right person, but he had no evidence. When one of the hacker's friend called the univ- ersity from the outside, the call was traced, and the game was over. American Hackers are developing a chinese VIRUS! ================================================ Some months ago I read an a newspaper, and suddenly I saw an article about communism, and above the text, there was a picture of some youngsters sitting by their computers. Interested as I was, I started reading. I read that some American hackers had plans to construct a virus, that should be spread on the nets in China. The virus was supposed to be a destructive one, it was going to erase all data it came in contact with, and write LI PENG SUCKS! (That's the prime-minister in China) SIX PERSONS SUSPECTED FOR FELONY COMPUTER CRIME =============================================== Six hackers between 18 and 20 years old, are suspected for extensive computer swindle at the Swedish University in Linkoping. They had hacked the password to the universitys databank, and caused damage for at least $13000. The persons at the university got suspicious when they got a phonebill on $15000 HIGHER then the normal, and called the police. Trial is waiting. GERMAN HACKERS CONVICTED FOR ESPIONAGE The first hackertrial in German history started in February-90. Three hackers got conditional sentences, because they had had entered some military systems and then sold the information to the KGB. The court in Celle outside Hannover, found all three guilty to the crime. The both hackers Markus Hess and Dirk Brzenzinski had hacked their way in into both military and commercial nets in USA, Europe and the Orient. The affair gave them $60000. The third man, Peter Carl, who worked as a croupier at a casino, where supposed to act as the contactman. He went to Berlin, where he passed the disks with information to the KGB. Earlier there was also a 4th prsecuted, but he took his life in 1989. An American programmer reacted when a bill came to an account that didn't exist. The programmer suspected hackers, and spent one year on an investigation. And after that, he got them on the hook. (The bill was on 80 cents.....) <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< -5- HACKERS... One word that the media have made an ugly word. The media view of hackers is that they only want to steal information and destroy information if they can. More or less, they work for the KGB. What could be more wrong? Hackers are people who are only interested in penetrating secure systems. Of course there are always people that might destroy information, but they are often people who are novices when it comes to real hacking and don't know much about it. Why should anyone want to destroy information just to be discovered and kicked out, if they want to use the CPU? Unless the media start to write about how it really is, I think that they more or less will influense young novice hackers that they should behave like that, and then we will have a dissaster when these people learn how to get access to systems. And because of this bad publicity the police are spending more money on trying to trace down hackers who only want to learn more. I think we few real hackers have a hard time before us. Our golden days were a couple a years ago. <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< -6- HACKER RULES AND ADVICES a fast guide to make LESS mistakes when IT happens. * If you get to a system you don't recognize at all, store as much text you can, WITHOUT LOGGING ON and ask someone who you think knows more about it. Note: Ofcourse, you don't give anyone who knows less than you the number. * A Hacker is always trying to get as much access as possible on the systems s/he have hacked into. * Remember, a number to a system that you've found on a public BBS could be a trap just to bust someone like YOU. * To create new accounts: - Never do this when there's top 30 users. - Let the new user's name be in the middle or maybe in the end of the user list. (Mostly alphabetical) - Avoid creating a new user by refreshing an old, dis-used username, (like: Last login 21-JAN-1987) * If you note a new command or a new instruction, store all text available from help menues and similar, and ask someone who you think knows more. * If a system you use to call has been modified or maybe updated, store text and ask somebody. * If you are planning to do something on a system you NEVER have done before, and you're not sure about Everything about it... Don't do it. ASK someone more experienced to get further advices. * Remember: The bigger company, the bigger the chance is that they - trace calls with 'odd' behaviour - have unique security-systems and routines - have a lot of active users * MOST systems stores ALL faults and errors you cause (typing fault, access violations). So if you don't know what you're doing by 100%, don't do it. * Never even START hack a system you don't know how to handle in some way. The only exception is systems who doesn't introduce themselves. * When you've hacked into a system, do the following IMMEDIATELY 1) Open your capture/buffert for incomming text 2) List the logged in users ALWAYS LOG OFF IF... a) ... any kind of System Operator is logged on. Note: On some systems, the System Operator's console is always logged on to the system. b) ... there's any kind of Project Manager logged on. c) ... another user with 'your' name is logged on. GO ON IF... a) ... you seem to be alone, or only normal users are logged on. 3) If you have system privilegies, try to shut off (Not DELETE!) the (if any) system logs. 4) Capture EVERYTHING in the help menues or similar. IMPORTANT! 5) Try to list all available directories (or all directory names, if nothing else is possible), no matter how many they seem to be. 6) Get as many other usernames as possible. REMEMBER: a) Never send letters or phone any other users through the system, before you have EVERYTHING under control. One exception though, when you are trying to 'fool' some users to give them more usernames or/and passwords for projects etc. * If you get in on a user and you of some reasons know that you WONT get back in again ('forgot' the password, got 'thrown in'), follow the whole "When you've hacked into a system..." EXCEPT the ALWAYS LOG OFF IF... at 2). <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< -7- [SUPERCOMPUTERS] [CRAY X-MP/48] [IBM 3090-600J/VF] [ETA10] Sweden have these computers (which I guess you might recognise). Two of them are in use, and the third (ETA10) is now taken out of service to be shipped back to the United States, and as a hacker, you realise the power and the pleasure of hacking one of them. Therefor I've written a little bit of information for you to drool on. -=* COSTS & PRICES *=- Well, this is a matter of HUGE amounts of money we talk about here. SE-Banken (a bank here in Sweden) and Wallenbergsstiftelsen financed the Cray X-MP/48 with an amount of 59 Million Swedish Crowns (about US$ 10.000.000 (US$ at 5.80 SEK) and the IBM 3090-600J/VF was paid with donated money (no information from whom). The price? A small sum of 150 Million Swedish Crowns (about US$ 26.000.000). Handelsbanken (another bank) finaces the scientists 10.000 CPU-hours / year with 15 Million Swedish Crowns (US$ 2.600.000). If you want to use the IBM, you'll have to pay between 15.000 and 20.000 Swedish Crowns per CPU-hour. The Cray is a bit cheaper to lend at 7.000 Swedish Crowns per CPU-hour. -=* OWNERS *=- Who have got the money to run these machines? The IBM is owned by Kommunen (the local government) and a company called NorrData and the Cray is owned by SAAB, who gets 25% of the capacity in exchange for paying running costs. -=* USERS & USED TIME *=- Users of these two sofisticated systems are mostly scientists, but also two big universities, namely UMEA and LINKOPING. The local government in Skelleftea use the IBM for salary payments on the side of all science projects, and like stated above, SAAB have 25% of the capacity on the Cray. These computers are not used to their full capacity today. If you make a scale, you would find that the IBM is have 60% administration, 30% resurch and the final 10% is sold to the industry. The Cray on the other side have 75% universities, and 25% SAAB. But these figures just show how much time that is disposed, not how much is used. All scientists who wants to use these computers are granted access today, perhaps not the amout of time they want, but still access. There is a need for more users and companies to make these computers worth the money, time and effort to have them running. -=* SECURITY *=- The American export-control authorities have restricted Sweden for export of these machines to the East (which is understandable). In Sweden, the rules is decided by Forsvarets Materielverk (Military), and include several restrictions about foreign users (certain nationalities) who are not accepted and therefor can not use the computers. Accepted users are supplied with a special authorization-card and an equipment that generate passwords. -=* THE FUTURE *=- Today, the most reason companies and users give when asking why they don't use these computers more or at all, is that they are not running under UNIX or some kind of operating system that is portable from other systems. Therefor, these computers will have unix-similar operating systems very soon, to allow new and more use and portability of code and programs from smaller computers and systems. >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> -8- ================= SHA MEMBER BUSTED ================= In October-90 a S.H.A. member was brutaly busted, and charged for creditcard fraud and illegal attemps to enter some computer-systems here in Sweden. The member spent 46 hrs in an isolated cell at the central Police Headquarter in Stockholm. While he was questioned, the police searched his house twice. - When I finally got home, I nearly got a heartstroke, some of my computer equipment was taken, and the worst thing of all, they had taken ALL my dumps, printouts and notes as evidence, says the busted hacker. <> <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< -9- UNIX SECURITY Unix is a very open OS and have many flaws in the security because of this. The first security hole is the /etc/passwd file that any user can read and that contains the encrypted passwords. It is very easy to write a small program that use crypt(3), the internal unix cryption routine, to scan all accounts for common passwords or to match against a dictionary. The one that unix have, can be used. Newer unix versions like AIX, the IBM version, don't have the passwords in the /etc/passwd, since they are stored in a non-readable file since the US Defence C2 doesn't allow users access to encrypted passwords. It is even possible to re-create a password through the encrypted version, or atleast get a limited number of passwords to try. Impossible, you might say. The passwords are one-way encrypted! Yes! They are... but you also have more then one password that gives the same encrypted result since you lose information when you are encryting the password. You can go the other way and get about 4096 possible passwords and then only match these against /etc/passwd. This is a great advantage over scanning all possible combinations of root passwords in the standard way might take a year or so before you hit. The hard part is to get your hands on crypt(3)-source and be able to rever- se the encryption... And that isn't a easy way since crypt(3) isn't written to be understood by common people. But it is possible... <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< -10- -=*> ARE YOU A HOMOCIDAL MANIAC? <*=- If you are one, you truly are a danger to your surrounding and should be visiting your local shrink, very often... Answer these questions honest to yourself, and then count together your points. Written by a [normal] SHA contributor. ------------------------------------------------------------------------------- 1) You are watching this movie (Texas Chainsaw Massacre I), and when the hero (Leatherface) cuts deeeeep into some 'poor' human with his roaring little motorised tool, what do you feel? [a] Ohhhh, brother. Disgusting, Puke! [b] Booo! Miserable special effects!! [c] You start drivelling... 2) You're at a party with all your friends gathered. After a while you (ofcourse) are fighting as hell with some stupid motherfucker that doesn't see that you're ALWAYS right. Ok, you win and the beaten shit runs to the door screaming "Hey, fuckface! You're lucky that I didn't kill you!" and slams the door shut behind him. What is your reaction? [a] Say "The fight is over, go home now!" [b] Scream back "Say that again and I'll kill YOU!" [c] You take something sharp from the nearest table (knife, siccors, vase) and run screaming after him. 3) You've just bought some bread and beer for the weekend and suddenly you see a rifle with several boxes of ammo in an unlocked car. What do you do? [a] Goes home without thinking more about it. [b] Steal it, to sell it off later. [c] Drops everything you hold, open the car door, takes out ALL boxes of ammo and load the rifle. And then you go around shooting moving targets all the day (Cars, people, playing children, cats, dogs). 4) You are driving down your street, and you see a woman and her two daughters waiting to go across the street. How do you react? [a] Stop your car to let them go across the street. [b] Stop your car to let them go across the street, and roars the engine just to frighten them as they pass your car's front. [c] Stop your car to let them go across the street, but when they are exactly infront of your car, you smash the pedal and run over them. 5) You pass a window on the 15th floor and see somebody standing outside the building, just at the wide open window. Your plans? [a] Quietly sneaks away to dial 911. [b] Says "Boo!". [c] Says "Hello" with a friendly voice and when he turns around, you hit him real good in the stomach. 6) What do you think about the TV documentaries about war? [a] Nah... I don't like to see people getting killed. [b] Good to know that it isn't faked, anyway. [c] What I think? I RECORD them, and then watch them until the tape fucks up. 7) You are looking out the window on the 5th floor and see 8-10 people waiting for the bus, just below your window. Your actions? [a] Go back into the room and watch the games. [b] Get a 5 gallon bucket of water and throws over them. [c] Fill the same 5 gallon bucket with a gasoline/soapflake mixture and lighten it just as you throw it out the window. 8) A friend owes you 5 bucks, and he haven't payed them back YET! [a] Phone him and ask if I can get my money back. [b] Phone him and DEMAND him to give the money back! [c] Phone him and tell him to say his last prays. 9) You accidently hit a deer when you are driving to your work. What do you do now? [a] Go out and try to save the poor animal. [b] Go out and hit it over the head with the jack. [c] Go out and kick the bloody creature to death. 10) Your next door neighbour have a big (BIG) swimmingpool, and EVERY weekend he have BIG parties with at least 100 people invited, and it's a hell to get some sleep the whole Friday and Saturday. What shall you do about it? [a] Mail him a letter which says "If you don't stop having those loud parties every weekend, I'm calling the police." [b] Call the cops and tell them that you've seen somebody get raped at your neighbours party. [c] Go out to your car and drive it like a madman through your neighbours hedges and hit everybody within reach. [d] Join the party. ------------------------------------------------------------------------------- Additional questions: 1 point for No and 2 for Yes. Do you shout HOORAY! everytime somebody gets killed in a movie? Do you watch every splatter-rated movies more that 20 times? Do you admire the German Leader during World War II? Are you a collector of real, automatic weapons? Are you dreaming of 'Shooting your way out'? ------------------------------------------------------------------------------- [a] is 1 points, [b] 3 points, [c] 5 points and [d] 0 points. ------------------------------------------------------------------------------- Points Rating ------------------ 10- Relax, you're quite normal. Perhaps a little bit too normal. -20 Relax you too... You still have the chance to live a normal life. -30 Hmm... You should consider wheteher to be out on the street or not. -40 Never, NEVER go out without 5-10 pills of valium in your pocket! -50 You ARE a Homocidal maniac, there are no doubts. -60 To make the world a safer place to be, commit suicide, please! <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< -11- --------------------------------------------------- & BRITTISH HACKERS BLACKMAIL FIVE BANKS IN LONDON & --------------------------------------------------- Atleast five banks in the London Financial world, City, have according to the magazine Independent On Sunday been the target of blackmail attempts since break-ins into their computersystems by so called 'hackers'. The manipulations started in May this year. To penetrate these systems have, from the look of it, not been any problems for the pirates. They have reached so far into the systems that they are able to creat chaos. None of the five banks have paid, at this date, says Indipendent On Sunday, and states that the latest discovered manipulations could be The most sofisticated ever in Great Britain. The pirates seem to have certain connections between them, but operate individually and probably have no connections with organized crime. Within the banks, they are worried that the customers confidence may be undermined. These crimes are investigated by the police and Hambros Banks Network Security Managements specialist in computer crimes. The chief, David Price, said he was confident the pirates would soon be arrested. The risk of computer crimes increase as the computer-technique develops faster and faster. The security-routines become more complicated and takes longer time to implement. >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> -12- ====================== NEW S.H.A. HEADQUARTER ====================== In February-91 a S.H.A. member is going out of the country, and because of that, the currently S.H.A. HQ is going down. BUT, a new board will be opened called Project Athena, and it will contain Swedens largest Tfile-area when it's about Hacking/Carding/Phreaking/Terrorism/Thrashing and Anarchism. Watch out for the new phonenumber.. <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< -13- SWEDISH UNIVERSITY HIT BY HACKERS A major Univeristy in Sweden have had their unix machines used buy non- students for a long time. They didn't know anything about it until the novice hacker got his hands on a password to the computers from a secure bulletin board system. A few weeks later the system managers at the university detected that one user hacked their computers. The novice hacker had used rlogin at many other targets. Used FTP at prime time and downloaded many megs of files and stored it on the computer. He also had big jobs running on the machine that tried to scan passwd files that he had downloaded from other machines. That was what got the system managers attention since they lacked disk- space. They always checked that users didn't store many files that al- ready was on the computer in public libraries. They checked the files and discovered that he had stored many passwd files so they started to watch the users account. The system managers had programs running 24 hours a day trying to guess passwords themselves to check out their own security and at the same time control what the users were using on the machines when no operators were present. Later the University decided to throw out the student that originally had the account that was used, since they thought that he had done the hacking. They main reason they would kick the student out wasn't because he tried to hack, which is pretty common at Universities, but for the small damages the novcie hacker had done. The only way to prevent the University from kicking out an innocent stu- dent was to expose, to the system managers, that the computers were used by other people. So the one who had originaly cracked the passwords from the passwd file and posted them on a board, made contact with the system managers and explained the situation, that some passwords had been drif- ting around and that some people had used accounts on their computers. This stopped the University from kicking out the student, but resulted in that the University now have their security level raised. Now your password must include one non alpha character and be at least 5 characters long. All passwords will be changed frequently and not as before when a student could have his password for his whole studies at the University. Alas.. if the novice hacker hadn't have the password all this could have been avoided. >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> -14- NEWS NEWS NEWS NEWS NEWS NEWS NEWS ----------- NEWS NEWS HACKER NEWS NEWS NEWS ----------- NEWS NEWS NEWS NEWS NEWS NEWS NEWS NEW HACKERGROUP BUSTED. -Used false creditcards. Yet another hackergroup have been caught. The group is suspected to have bought computer equipment with others creditcards. Not all hackers keep themselves within the law's border. Now and then, articles about teenagers who have gone over the border, are published. This time it's two teenagers in Stockholm who have been caught and interrogated. "But our suspicions points above all at one of them", said prosecutor Wulf Zippis at the distr- ict attourneys office in Stockholm. This new case, have big similarities with a case we had about a year ago said Zippis. Then, a big hackergroup, spread all over the country, was dis- covered. With the help of selfmade computer-programs, they could produce creditcard codes for the creditcards MasterCard and Visa. With the help of these codes, they then could order merchandise from foreign countries for hundred thousands of crowns. The merchandise was ordered in fake names to P.O boxes and adresses. But though it involved large amounts of money, the hackergroup managed to get away with fines and conditional sentences - that time. How it will go this time, prosecutor Wulf Zippis wouldn't guess. "The investigations are still in full progress. We will have to see what the police discovers". The hacker comes from a suburb of Stockholm, is in his teens but not legally competent. Usually, young people like this, gets conditional sentences and not a jail sentence, atleast if they haven't got any previous records. The prosecutor wouldn't comment on how much the hacker have spent, but he confirms that it is of a substantial sum. A guess would be round 300.000 crowns. <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< -15- ============================= ======== SMALL NOTES ======== ============================= The Swedish Telecom and the State-Owned datacompany Dafa are going to build a nation-wide teleNet called DafaNet. It will be possible for, trough a central computer, companies to communicate directly with different authorities. The thought is to offer the customers a wide information-process with access to databases and electronic message- systems. The Net is built with so called X 25-standard which makes it possible to connect computers of a wide range of different fabricats to it. >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> -16- ================== TELCO TRACES CALLS ================== Some months ago I decided to find out how fast the Telco could trace the calls and the answer is terrifying. It takes approx. 2-3 seconds (local trace). And this is how I did the test: I went to a cafe' and borrowed the telephone. The phonenumber was clearly printed at the bottom.. (let's say 123456) I dialed an operator and told her that I wanted a collect call to Hong Kong.After that I gave her the phonenumber I wanted to call, she said: - Ok I'll have to call you back in 5 minutes. What phonenumber are you calling from? - Uhh... I don't know, I'm call from a borrowed phone, I said. - Ok..hold on. After that she pushed some buttons, and said: - Are you calling from phonenumber 123456 ? That little test shows how fast they trace calls.... A good advice when hacking computers is to ALWAYS dial through outdials ... <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< -17- NEWS NEWS NEWS NEWS NEWS NEWS NEWS ----------- NEWS NEWS TERROR NEWS NEWS NEWS ----------- NEWS NEWS NEWS NEWS NEWS NEWS NEWS THIS IS HOW YOU MAKE A LIGHTBULB BOMB. -They found book for terrorists. Qualified advice to terrorists exists in ordinary Swedish Bulletin Board Systems. How to make weapons and timebombs home in your kitchen are explained and very easy to understand. In just a couple to minutes, the two school-KIDS Petter Aasheim and Jorg Akerlund from Gothenburg, theoretically learned how to make nitroglycerin. Very alarming, those who want are able to get their hands on a dangerous knowledge, said Torsten Bjorkhede, chief of SAPO (Swedish FBI) in Gothenburg. The superintendent at the violence division, Hasse Carlsson is also worried. I have never heard of anything like this, he said. It was of a pure accident that they came across this information. On a Bulletin Board System in Kungalv, "Halla Hogia", they saw the headline - The Terrorists Handbook. We were curious and brought home the text, the kids said. About 100 sides loaded with real blowstuff came from the printer. THE CHEMISTRY TEACHER WENT PALE. First I thought that the "handbook" was cool, said Petter Aasheim. But when he read through the material more thouroughly he changed his mind. With this material, everyone can be a terrorist, said his friend Jorg Akerlund. The two kids took the text to their chemistry teacher and let him read it. Pale he said - Go immediately to the police with this. We have seen some terrorist handbooks earlier. But nothing as detailed like this one, said Trosten Bjorkhede. The author, an unknown American, shows the terrorists ABC and very detailed too. THE CHEMIST'S HAVE MOST OF IT. All necessary substances for making explosives are listed. Most of them are available at the Chemist's and the rest can easily be found in listed insecticides, fotoliquids and in usual stores. If the terrorist still can't get his hands on the necessary ingrediences, the next step is to break into a chemical lab/school room. To be sure that the burglar doesn't miss any vital substance, the author have included a check-list. It says "if a lock to the lab has to be forced, the best picklock is dynamite followed by the sledgehammer. Unfortunately, these methods make too much noise. The third best way is therefor a set of picklocks." Thereafter follows a very thouro- ughly described way on how to make your own picklock set. When it comes to the explosives, everything is very detailed, almost pedantic. EVERYTHING is explained. SIMPLE TO MAKE A LIGHTBULB BOMB. The author recommends the highly explosive explosive R.D.X. According to the "handbook", it can easily be made home in the kitchen. With drawings, the author explains how to triggers and timesettings should be done. Then it continues on how to make package-, book-, telephone- and lightbulbbombs. It says "An authomatic reaction when you enter a dark room, is to light the lamp. Though that can be very dangerous, if a lightbulb-bomb have been scr- ewed into the socket. Such a thing is very easy to make. Start with heating the bulb's socket with a gasflame..." One section tells about weapons. There it is described how to re-build a shot-gun into a grenade-gun, how ordinary new-year rockets becomes bomb-carriers. This must be investigated right now. It can be a case of insugency, said the district attorney Sven- Olof Hakansson in Gothenburg. 15-YEAR OLD RESPONSIBLE FOR THE BULLETIN BOARD SYSTEM. Responsible for the System "Halla Hogia" is a 15-year old from Kungalv. He doesn't know what information lies available on his own system: New things arrive daily, he said. Do you know that you have "The Terrorists handbook" on your system? "No." Is it possible to check who sent it to you? "No. All such information is erased after one week." Everything in the Sys- tem is free. To access it, all you need to know is the telephone-number. NEWSPAPER: EXPRESSEN DATE : 91/01/11 REPORTER : RIKARD BJORK FOTO : TOMMY NAZELL (photo: The two kids (looking stupid) infront of a computer with the text: - We were curious. That is how Petter Aasheim and Jorg Akerlund explains the discovery of "The Terrorists handbook". The dangerous information was found at an open Swedish Bulletin Board System.) <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< -18- NEWS NEWS NEWS NEWS NEWS NEWS NEWS ----------- NEWS NEWS HACKER NEWS NEWS NEWS ----------- NEWS NEWS NEWS NEWS NEWS NEWS NEWS NEW WAVE OF COMPUTER COUPS IN SWEDEN. HACKERS IN KARLSTAD AND LINKOPING ARRESTED. A wave of computer coups oozes over Sweden. Those worst affected are Swedish universities that are used by young hackers. Their illegal entries have cost hundreds of thousands crowns. At a large Swedish company, a couple of employees are suspected for illegal entries at a secret West-German database. For the Swedish computer-police, the several coups wasn't unexpected. During the last months of 1989, the chief of the Swedish computer-police warned the public about what was about to come. Rolf Nilsson also said that the next five years will be dangerous, and that they expected some kind of big bang. The real devestating bang in Data-Sweden haven't happened yet, but these illegal entries are enough to make the police very nervous. Several young hackers have, with the help of university-computers, made electronic journeys round the world. On other locations, students have made their way into university-computers and tried to change salary- payments and grades. All togheter, there are about ten young hackers that's been charged, and they have fines or max 2 years in jail ahead of them. The other investigation is conducted by SAPO (Swedish FBI) and riks- kriminalen, and concerns five employees at a large Swedish company, who have illegaly entered a super-secret, big database in West-Germany. At this moment, the case is too sensitive, so the police can't give out any information. Though a Swedish computer-magazine tells of an institute for advanced mathematical processing and that the West-German secret police (BND) have asked for help to trace the intruders. As usual they think the KGB is involved, like in the Hess/NATO case, which resulted in conditional jail-sentences. Also when it comes to these Swedish hackers, the sentences will not be of freedom-taking nature. They could face a two-year jail-sentence but it will be very hard for the police to find evidence showing that they had criminal intentions. "If you look at the bright side of this, they really should get high grades in this area", said Stig Hakangard, who is perfekt at the institution for ADB at the school in Karlstad. These two hackers, aged 22 and 26, have illegally entered the schools computer-terminal and among other things, destroyed a salary-register. They are two students, who have one term of programming behind them. "When I look at it, it seem to be a classic hacker-motive; they wanted to get as far into the system as possible without getting caught." Their fall came after they accidentaly deleted a salary-register, and the system started to "ring the alarmbell". "We are very weak because of our connections to SUNET, and there are over 200 node-computers in Sweden, so if you crack the password to the Net, the road is open and limitless. The police looks more strongly at the coups in Linkoping, where six hackers have used the university-computer to call BBSs and databases in, among other countries, USA and Australia. Four of them are charged and could face fines or jail and pay for claimed damages. (ie. phonebills). They have succeded in connecting with commercial databases through the central computer and their own home-computers, and they used the univer- sity identity which means they never had to use any passwords. The phonebills came as a shock to the university. The first were at 60.000 US dollars, and the second at 20.000 US dollars. The hackers were lucky that time, because the Swedish Telecoms counters didn't work at that time. Parallel investigations are made to trace the foreign hackers, who have managed to enter Swedish computers through university-computers in among other countries, Canada and Finland. The final word here, is that the Swedish police is So nervous when it comes to illegal entries, that they always notify the Swedish Millitary forces and SAPO when they discover new hacker activities and entries. <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< -19- ============================= ======== SMALL NOTES ======== ============================= Datema sold their daughter-company Datema Konsult AB to the Swedish Computer-central. The company have 28 employees and is specialized in servicebureau activities and economy-administrative consult activities. <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< -20- ================================================= S.H.A. VISITED AN EUROPEAN SPACE AGENCY COMPUTER. ================================================= In August-90 a SHA member hacked his way into an ESA computer, and got access to a lot of interesting stuff. - It took me 3 minutes to hack that computer, so I can't call that security, says the hacker. NEWS NEWS NEWS NEWS NEWS NEWS NEWS ----------- NEWS NEWS HACKER NEWS NEWS NEWS ----------- NEWS NEWS NEWS NEWS NEWS NEWS NEWS HACKERS BOUGHT COMPUTERS - ON OTHERS CREDITCARDS Two teenagers have been exposed as hackers. They have bought computer- equipment for 100.000's of crowns and paid with others creditcards. We think that they got the numbers from computers, said the district attorney Wulf Zippis. The Police' computer-experts suspect that they are connected to a group of hackers, who have made the numbers with own computer-programs. That group was revealed eight months ago and consists of computer-knowledged teenagers between 16 and 20 years. Most of them are students on the Nature-scientific or Technic course, and they live from Umea in the north to Lund in the south and have a common int- erest; the possibility of the computer. USED FAKE NAMES The two, who are arrested, live in one of the suburbs of Stockholm. After long hearings we are now working on how they made this possible, said Zippis. We know that they ordered the merchandise in fake names with false adresses, and paid with false creditcard numbers. How they got their hands on the secret numbers will be investigated. I can't tell you how large sums that are involved, but sure, it is large amounts of money, said Zippis. One of the two teenagers is described as very talanted, but lack of interest in school-work got him lousy grades. He cons- entrated his talent in the technical world of computers. Looked for success in hacker-circles and bought advanced computer-technique on others credit- cards. The numbers were made by a computer-program which had been made by a group of hackers. Rikskriminalens computer-experts have had long hearings with the teenagers, and their story have had a similar pattern: They have gotten a home computer and joined a club. In computer games, they have found new ideas and improved the technique with help from modems. VISA AND MASTERCARD With help from modems, they have connected with databases and found inter national lines. One of the members of the group, stole a list with blocked creditcards. With the computer, they discovered how the 16 numbers were made. That's the way they made numbers for VISA and Mastercard creditcards. After that, it wasn't very hard to buy equipment from American mailorder companies. To leave a number of a creditcard that is not blocked is enough. The mercha- ndise were delivered to P.O. Box adresses in fake names. The bills were del- ivered to the owners of the cards. -/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/- -21- HOW TO KEEP ON HACKING I. Password and number swapping II. Single or Parallel hacking? III. What a hacker can do and still be a hacker IV. Hiding your stuff and safety precautions I. Password and number swapping This is a subject where almost everybody have their own opinion, whether to swap hacked systems with total strangers or only within some kind of limited circle. The smartest thing to do is of course Not to swap with people you don't know, like putting them up on Public Bulletin Boards and so on, this is VERY stupid; Why? Well, imagine that you give out the userid's necessary to access the system you've hacked and alot of people start to call it and do what they can. Then... you notice the outidal that's been hidden in some strange direc- tory. What do you do know? The system will maybe change their number because of the XX calls they get per day all of a sudden, and when the same userid is logged in 10 at a time, you'll have to wardial their new number...Clever? No. And even worse, the computer will might not have it's number changed, it maybe 'only' increase their system security, tracing suspicious calls etc. It's the same thing about Numbers to systems you Haven't hacked (yet). I think you agree with me that the smartest thing to do is to keep your numbers and passwords to yourself, if you want to keep on having the system 'at your service'. The way to keep numbers and passwords within some kind of circle or group is also a way of Not letting numbers and passwords slip away. Decide and make Your own rules on how these things should be handled, do it for a start, so you have it written if something occurs (your favorite system crashes...). In Sweden, I know this is a SERIOUS problem for hackers that have gone thr- ough lots of trouble getting into a system, and after giving it to a friend that couldn't SHUT UP about it, the result is that the system changes number or increases the level of security. I know that MANY boards are letting their amateur hackers go berserk on systems they just found! This is not good for anyone, not the hackers and not the systems. The (now) best way to solve this should be to validate the members that want to join a certain (hacker) meeting, where they can tell eachothers what they know / what they've found. So hackers and other people, Share Experiences, Not Passwords. II. Single or Parallel hacking? Which way is the best? In some situations it's difficult to say. In systems, where your hack cannot be hidden (Printer log etc) you might have to take all the data possible from the system (under time stress...), and this is when parallel hacking is best, two persons can Capture more than one. But ofcourse, you choose how many you are in at the time (downloading). Two is though preferable, because it's easier (and Faster!) to speak to eachother through the system and tell one another what to do, and that you're not storing the same data. In all other situations, the single hack is the best hack. You get more out of it for yourself. III. What a hacker can do and still be a hacker First of all, my definition of a Hacker; --------------------------------------- -Describe short what a hacker is. A hacker is someone who want to learn more about current systems and in some cases, their security systems. -What is a hacker's purpose when he's entered the system? A Hacker NEVER destroy anything vital for the system, this is one of the basic rules. Then he should take care of all interesting data he can access and take it home, and after that, explore how This very sys- tem works. Are there perhaps any changes compared to similar operating systems? -What happens to hackers that destroy systems then? First, a 'hacker' that destroys systems frequently should NOT be called a hacker at all. Crasher ([System-] Cracker) is the word for that kind of people. IV. Hiding your stuff and safety precautions * Hacking: ------- USE outdials! (dialouts). An 'outdial' is a modem that you are able to use through a computer, it's connected to the telephone network, and allows you to make ordinary calls. You use outdials in two purposes; One, to make your hacks harder to trace, and two, keeping your phonebills on an acceptable level. The most preferable is to use outdials And diffrent gateways when you hack systems that are highly protected against intruders. Gateways are com- puter hosts who allow you to connect to further computers and/or net- works. Try to make this a rule, Always Use Outdials. Also, you should know that Outdials are Very usual in a system, but the chance that it's un- or lightly protected is very small. Another thing to remember is that (almost) everyone Wants an outdial, but nobody got one. If You find an Outdial, keep it to yourself. The Swedish telecom can trace your call in one second (AXE within Sw) when the conditions are the best. If you are calling through several outdials and gateways, it could take the company (and the Telecom) hours to trace you. If the System Operator breaks in and starts to talk to you, don't piss him off, try to (IF possible) make friends with him, point out weak- nesses in the system etc, impress him, but it takes alot to do this, so you know. If you're REALLY lucky, it Could be another hacker. But don't bet on it! System Operators very seldom interrupts his users, no matter how weird they are behaving, his orders are to report to security. * Magnetic Storages (Diskettes, Harddrives, Tapes): ------------------------------------------------ The very best way is to crypt the 'hot' data so you never have some- thing to fear. If the cops ask you what that strange file is, you say it's a game save or what ever you like. The second best way is to have your data hidden in a safe place (This is NOT under your bed, in the basement or in the garage). But where should you keep it then? A way is to keep it at one of your friends, preferable someone who doesn't know shit about computers, and have no connections to the world of hacking. The worst, but most effective way to keep data out of the hands of some stupid investigator, is to destroy it. Erase (Equals NOT Format) the Hard drive/s, smash your diskettes. But as you know, both these ways take some time, and you can never revive it yourself. Choose crypting. * Dumps (Print-Outs, Hard Copies): ------------------------------- REALLY avoid printing user and/or password lists, if you do, ALWAYS keep them in a place only you know about. And if some old dumps are out of date, burn them! Or put them through your document destroyer. Keep ALL kind of 'delicate' dumps on One place, so that you have them all put together (Easy to hide/destroy) DO NOT put up 'hot' dumps on your wall or on your monitor, this is only stupid, put them in boxes or in a cover. When the cops come with their search warrant, you can walk to the police house with a smile on your face. NEVER have headers like 'PASSWORDS FOR ABC SYS- TEMS' on ANY list! * Your friends: ------------ Never brag about systems you've hacked in public rooms or similar, perhaps this is where some large-eared person reports to his com- pany, and your next login could be expected. Bad. Also don't brag about hacked systems in public meetings, and if you do, don't name any names or any clues. NEVER keep names OR handles of your hacker mates on notes or dumps. This is one of the easiest ways for the cops to find out how many hackers you know (and have connections with). More, don't keep numbers to 'special' boards lying on your desk or up on the walls, this could result in Very Bad Things. * The Law: ------- Don't give the cops a hard time when they come (i.e don't fight, Stupid!) let them take your computer, diskettes and print-outs. You are prepared, you know. If they are crossexamining you, hour after hour, Don't tell them anything, the only 'evidence' they have is perhaps a traced phonecall. They will probably tell you that they know all about what you have been up to, and that you better speak up. Don't care, they're lying. If they name some names on systems and people (And you might recognize some of them. Your best friend's name for example) and ask you what you know about them, you don't know shit. They are only shooting in the dark. Even if they say that your hacking mate also is under arrest, and that he has confessed everything, don't care, they're telling you lies again. Rememeber, you're not under oath. If you're well prepared, an arrest is nothing more than some days/ weeks without hacking. Ofcourse, the police is making a BIG mistake. Never under-estimate the cops' knowledge about computers and comp- uter communication! Yes, 99% of them are total idiots when it comes to computers, but if you tell them some really strange shit (made up), the 1% cop might be listening to you, and they will put 2 and 2 together. It's better to tell them 'I don't know' then telling a bunch of lies, because a 'I don't know' can NOT be said is a lie. Tell them that, EVEN if you have the system's telephone number tat- ooed in your forehead. And, if you're not 18 years old (in Sweden), they might ask you if they should call your parents. Let them do that, so they can tell the police that 'He's always been such a nice boy' etc etc. If you REALLY are into deep shit (forgot that print-out on your monitor, didn't crypt your Hot files...), don't give up anyway! You COULD have downloaded that list from a public BBS (on which you forgot the name, number, city and country...). And if the time and date on some print-outs/files talks against you, tell them that it is the wrong time/dates and show them how easily it is to set the computer clock. Precautions if you're busted. BEFORE you're busted, make up alarm- call chains with your friends. That means, you decide who should call who, and warn them about a bust. And if someone in the chain isn't available, you just call the next person om your chain-list. And as I mentioned before, do not write names or handles, just put up their initials or words related to the persons. - All these safety precautions and procedures may seem silly as you are sitting there, comfortable in your chair. But if you are carried away in hand cuffs, you really wish you SHOULD have hidden those dumps and crypted those files. -/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/- As it's written in Phrack; You SHOULD be paranoid, you ARE doing something illegal. -/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/- <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< -22- 'THE BIG SYSTEM' Author: The Chief Written 1989-1990 For more stories and deep thoughts, contact me at the number to the MAILBOX with some nice Fan-Mail. As a young hacker, I left early for the BIG systems. The small ones didn't last long enough. Soon I had nestled myself into some very big systems and found that they were very much like the smaller ones. I had to find a REALLY OUTRAGEOUS BIG system, to satisfy my needs... IF YOU WANT TO GO FURTHER INTO THIS STORY, YOU'LL NEED SOME ADVICE AND SOME OTHER VARIOUS THINGS MENTIONED BELOW. If you are a one of my fans, skip this section, else goto the next line. Return. (just kidding!) Ok, so you have picked up this file at your local underground board, eh? Nice. I like to see the GOOD files, on every GOOD UGD-Board! Back to earth. You will need the following: A Coke A Flashlight A Pack of chips A Good sense of humour A Rainy day or a Sunny day for reading A Couple of days to finish this story! The advise mentioned above: Don't let this story out of your hands! There are Serpenin-spys looking for it everywhere! ------------------------------------------------------------------------------- ___________________________________CHAPTER ONE_________________________________ I was 15. The sun shined and the grass was green. The neighbours sexy 21-year-old daughter, Marielle, licked the sun in a sunchair next to their swimmingpool and our dog "Phileas" chased butterflies. It was the first day of summer in Charmington where I lived. From my bedroom-window on the second floor, I had the best view in the neighbourhood. Marielle had a tight body-bikini, and I could see her lying there, sweating, the sun licking her body from her head to her toes. I just waited for the moment when she would unwrap the bikini, because of the heat, and reveal those unreal breasts like she always did. This time though, it didn't seem to happen...she was not on time...Well..I'll stick around a couple of minutes more, I thought, and waited. The birds sang, the sun burned, almost no wind and the town slept. My mom and dad were visiting the grandparents and my sister was out with her friends so this time would be perfect for Marielle to show me her beautiful body, but nothing had happend yet, and I wondered if she was sleeping... ------------------------------------------------------------------------------- ____________________________________CHAPTER TWO________________________________ "Special Computers Designed Here" said the sign by the mailbox. Steve Spingleman talked on the phone with a Head Executive at GCEC, Government Computer Engineers Center. - That is not etical to do, said Spingleman with a broken voice. - Mr. Spingleman...Steve...This isn't my field. You must understand that I am but a mere messenger. If I do not follow orders, I will loose my job. If you have any objections to this project, you'll just have to talk to my superiors. Here...you can call this number if you have any trouble or questions. Spingleman heard the man, known to him as Mr. Jensen, messing around in the room, searching for the phonenumber. Drawers were opened and closed again, papers lifted and put down again. Finally he came back to the phone. - Here it is! Ok, Steve...055-381-289662. He said the numbers one and one once more to make sure Spingleman got the number correct. - This number goes directly to the GCE Experiment Center and there you'll reach me and my superiors. Just DON'T show this number to anyone else, Ok? Spingleman thought for a while, and then he decided what to say. - Allright Mr. Jensen. I'll try, but I can't assure you that this will work. This is a highly complicated computer you ask for and my experiences with these sort of things are but none. Spinglemans voice had become nothing but a whisper. It shivered when he tried to make his way out of the project with a lie. - Ah, come now, Mr. Spingleman. You know that we know all about you and that these sorts of experiments are your speciality, or should I say, WERE your speciality. Steve Spingleman now realised that he had to go through with it, even if it was unetical, unreal and very dangerous. If he hadn't..... No. That was long ago, and he couldn't change the past. He hated GCEC and this Mr. Jensen who leaved him with no alternative but to do this dirty work for him. - Mr. Spingleman? - Yes, I'm still here, said Spingleman. I understand your terms... - Good. Let's hope that this project will float smoothly and that you'll follow my advise. We don't want anything to happen, do we Mr. Spingleman? No.. I didn't think so, Mr. Jensen said, answering his own question. We will contact you if something comes up. Goodbye Mr. Spingleman. ------------------------------------------------------------------------------- _________________________________CHAPTER THREE_________________________________ Daydreaming...that was something for a troubled mind, and right now my mind WAS troubled. Marielle DIDN'T unwrap the bikini! As a 15-year- old boy, your mind will undoubtely be on a constant lookout for girls and sex, that is a fact, but the average teenager will never have such an oppor- tunity as I had here with Marielle, so I was known as "The lucky one" among my friends. Suddenly something happend. Marielle started to move, and my eyes homed in on the target. She sat up in the chair and looked around. Now I recognise you, my mind said, and opened a memory-bank for storing what was about to happen. She stood up....and went into the house!... Memory Error, my mind said and closed itself. Damn! What was she doing?! I was ready to give up, and go back to my computer, when she came out again. She had a sun-lotion bottle in her right hand, walking to the chair again, but changed her mind at the last moment and walked to a table, which stood just behind a tree, out of the view from my window. I ran to my sisters room. The view from that window was better than mine, and a lot closer too. She was exercising! Bending over, lifted a leg, made sit-ups and so on. Fantastic! This was great! When she appeared to be finished, she opened the sun-lotion bottle and started to rub it on her sun-tanned skin. Then it happened, and my mind opened about 20 Megabyte for storage at the same time. The bikini fell on the ground and I was in heaven. She rubbed the lotion all over, and took her time doing it. I had the time of my life (consider my age will you!). Soon she went back to the sun-chair and I went back to my room and the window. Now she was lying there...with only a pair of small bikini-trousers covering her fantastic body. If I just had some courage, I thought, I would go down and talk to her. - Hello! The sound made me jump. My parents stood in the doorway to my room. - How has your day been, son, my father said with a big smile covering his face. - You should have been there with us! We found two new flower-spicies so now, your grandfather has thirty-two different ones. Isn't that fantastic, mother said in a state of extasy. - Fantastic, I muttered in an attempt to sound excited. - Well, dinner's ready, said mother on her way out of my room. We bought fried chicken at the Drive-in so hurry before it gets cold. To buy drive-in-food is like buying walked-in-shoes. You can wear both. ------------------------------------------------------------------------------- __________________________________CHAPTER FOUR_________________________________ Steve Spingleman jumped by a noise too. The "click" in his ear when Mr. Jensen hung up. Boy, was he in trouble now! GCEC had ordered a very special computer from him, because he was the best computer builder when it came to specialities. This demanded his full attention and skill. The other customers just had to wait...but for how long? This computer would take at least 2 years to build even though he already had started on a proto- type which he had hooked up with one of his own inventions, an XX EXPRESS digital and optical modem. To have it "on-line", as a service to the customers, whom, ofcourse had very special wishes, were for test reasons only because of the fact that nothing is ever perfect the first time. Every progress he made, were added to the prototype for his customers to call-in, look at and try out. His customers were not of the "normal" kind, if you can call people normal these days. No, to mention some of his customers, there were the State Department, ASA (American Space Agency), YMCA (Yugoslavian Micro Computer Association), STATE (Soviet Tolerance Approval Tecnology Engineers) and GCEC which I presume you have heard about. All of them had their special wants and needs, which Spingleman worked on. Now they had to wait. Spingleman went over to his laboratory to collect the package he had recieved from GCEC earlier this friday. It contained the plans for the computer and what they wanted it to do for them. The package was a 7 kilo big box with the word "CONFIDENTIAL" scattered on all sides. He opened it. 4 Videocasettes on the HRTV-D (High Resolution TV - Digital) format with digitally scanned maps of the computer. 2 DAT-C (Compact DAT) Cassettes with information and the rest of the 7 kilos were encrypted filled laboratory- tubes and paper-discs, a new invention by himself and a big success on the market. When there were no trees left anywhere, the World Crisis Federation had called to order a new kind of paper, and he made the paper-discs. How they looked like? How you used one? It's too complicated to understand, but if you are a true knowledge-eater you can look in the dictionary at the end of this book. He picked up all of it and put it on the big designer-table to study the maps and read the discs when someone logged onto the his prototype computer. ------------------------------------------------------------------------------- _________________________________CHAPTER FIVE__________________________________ I saw the text on my monitor. "ACCESS DENIED" "YOUR DIGITAL NUMBERS DO NOT MATCH" Damn. This was one of the new XX EXPRESS modems which could spot the number and PBX-X you called from and had special numbers for access. Well, the hacker-underground had discussed these modems for a while now so I decided to call the DRAGONFIRE ugd board to see how far the discussion had come. Letters and more letters. It took me twenty minutes to answer all of them and if you are a knowledged modem-user you know how long that is, if you use the automatic answerer! In the Hacker-conference there had finally been a breakthrough and a new gear called METROSPECTIVE had been built for breaking XX and XY EXPRESS modem security systems. I talked to Mr. Farmhouse (the "dad" in our circle) and he promised to send one the same day. What are friends for?! I had all of the "pre-desolation" gear from boxes to programs written in a long gone and "dead" language called Pascal. My friends in the hacker comunity called me "The Collector" for obvious reasons. I was called a lot of things back then. New gear and inventions had become standard those days and I liked to try them out. The Metro (short for METROSPECTIVE) was brand new. I had a XX EXPRESS number, so to try the Metro on it was a must for me. I hadn't a clue to where I was calling and the unbelevable things that would happen to me because of my curiosity. ------------------------------------------------------------------------------- __________________________________CHAPTER SIX__________________________________ Spingleman looked at the screen. Someone had called, but didn't have the correct access to enter his system. He should have been worried about it, but wasn't. Perhaps a "wrong-number" call. That was common these days with the complex ISDNS telephone system. When they introduced ISDN in the 1990's, it had been a step forward, but the ISDNS (SONIC) had turned out to be a much too complex system for the average user. No-one really knew the possabilities of the system becuse of the inconvinient and strange deaths of the inventors. Actually, no-one knew where they had gone! They just dissapeared one by one, all of them good friends to Spingleman and this happened during his work on the prototype. Spingleman went back to his studies with a troubled mind. Tormented by what he had remembered and the pictures of his friends still in his mind. The digital maps on the video-board showed a complete build-up of the computer GCEC had ordered. Any ordinary person who studied these maps would have given up after approximately thirty seconds. The complexity of the maps were total but Spingleman just took a look at them and saw the errors at once. This could not be what they wanted?, Spingleman thought for himself. These errors were small but there were many of them. If he followed these maps, the computer would explode within five minutes after startup. If he used two-bolted merentors instead of one-bolted ones..... Spindleman started to re-draw the maps with the videoscan-pen, correcting the errors, working through the night. ------------------------------------------------------------------------------- ________________________________CHAPTER SEVEN__________________________________ I was roughly awakened by Phileas, licking my face. I looked at the alarm clock, it said 11.45 am and I tried to go back to sleep. Suddenly I remembered that I would recieve the Metro today, and that the Electronic Package Service closed 12.00 Sharp on Saturdays! I got out of bed and was ready to leave for the EPS office six seconds later. I stumbled up the stairs to the office, pushed the door and the clock showed 12.00. Just in time! The package, at the size of a micro-stereo, had arrived. On my way home I met my sister, Angelica, and her friends who were working on a beach-party, due that night next to our house. - Hi bro', Angelica said, goin' to our party tonite? Megan wants to see you, you know... Angelica had gotten her accent from her surf-friends who lived on the beach and whom she almost lived with. Megan was one of her friends who (if I may say so) had had a crush on me for the last few weeks. Though she was one of the most beautiful girls I had ever seen, I had never gotten the chance to talk to her alone so this could be the perfect opportunity. - I'll think about it, I said. Angelica sat her elbow in my side and went back to her friends with a smile on her face. Walking towards the house, I saw Angelica talking to Megan, and I got nervous. Later that day I connected the Metro to one of the expansion-slots of my computer to try it out. Just when I was going to start it the phone rang. I pressed the "off hook" button and heard.... - The Fourth world war has started. ------------------------------------------------------------------------------- _________________________________CHAPTER EIGHT_________________________________ J.C. Harris was one of the two new-hired engineers at GCEC. His record had been spotless and his skills on computer-design couldn't be measured. That is to say that he was one of the best in the country. Right now though, he was sitting in an office, waiting for a man known to him as Mr. Jensen, and an assignment. His thoughts wandered to the time when he was a young enthousiast and didn't have any problems to handle. He had been the best in his class and had finished all courses he attended with top marks without any attempts to study. Nowadays the schools had made efforts in computer-security, and the hackers efforts in breaking it, but he knew that they couldn't break it. A smile swept over his face when he thought of his "unbreakable" system. Thirty hours. He tasted the two words once more, just to make it under- standable to himself. Thirty HOURS! That was too unbelievable even to himself. The computer system then, had been quite simple he remembered, but THIRTY hours?! He had boken the security-name in just two seconds by looking in the principal secretary's big black book once when he was left alone in her room. But the password had been a big barrier. No "usual" password had worked and nothing you ordinary would try, like the name of their dog, children or mother- in-Law either. Noriegamodular5. When he entered that and it worked, he didn't believe his eyes. The Sonic planet Noriegamodular5, named after a dictator in central- America in the 20th century, had been the home-planet of the secretary's little pet, the grywlow. What a password that was. Phew.. and it took him thirty hours to figure that out. With the "live" programs of today, that password would have been halfway to the 99th moon of Trolarian by now. Known to everyone. Fiftyfive seconds later "Mr. Jensen" arrived in his black Mercedes 995 COEC (Computer Oriented Electric Car). He carried the black suitcase in a steady grip. His black suit and gloves were made by the JJJ company, the most ex- pensive designer of clothes, known to be untapable and never torn. The security system accepted his C-AXS card and opened the big, armed doors revealing a man, standing, waiting for him. "Mr. Jensen" signaled to the man, who ofcourse was Harris, to come with him into his office. When Harris had closed the door behind him, seven guards grabbed him and carried him into a cirkular shield and left him there. ------------------------------------------------------------------------------- ________________________________CHAPTER NINE___________________________________ "Hi Kev", the voice said. "Christ, Matt, You scared the hell out of me, you know!" "I know", Matt said in a just-ment-to-be-funny tone. Since the computer at WCC went crazy because of our biggest and most interesting 'hacks' ever, and tried to start the Third world war (which happend anyways..), I hadn't been that active in the hacker-community, but now, with a new invention, the Metro, and a new and interesting number, I couldn't stay out. "I saw you'd been on the Dragonfire yesterday, and that the 'Old Man' ehrm... Farmhouse I mean, had sent you the latest and greatest equip around these parts, The Metro I mean, and as usual, when you get your hands on a piece of merchandise like that, you have a new place to try it out on! Am I right or am I right buddy?" It was no secret that I tried most of the new stuff for the rest of the hackers, because of my knowledge (modest remark), and that I usually had more places to try them on that any of the others, but I never gave a number away, and all of them knew that, but that didn't keep them from trying until I had to actually throw them out of the bathroom! Matt had a great job by the way. He worked at the Intercom Packaging Service who handled all of the Electronic Packages North of Lake Acid, and therefor knew what every package contained, where it came from and for whom it was. I had been waiting for him to call, but not this early. I guessed that this equipment, The Metro, was something special. But I hadn't been following the conversation in the InterInvention meeting for atleast two weeks, and I now knew I should have. "Yes I have a place to try it out on, but you know I can't let you in on it as you probably already have guessed as usual, Matt." "Ah, come on Kev", Matt said in his ordinary 'begging' voice, "You know I never, and I mean NEVER spread things I get from you, or don't you?" "Yes, I know...", I said, and tried to continue. "So what's the problem, Kev?... Buddy... Old pal of mine!" "I haven't tried it yet! I just got the damn thing a..." "Yes I know", Matt giggled, "Remember where I work?" "Yes I know where you work Matt, but as I said, I just got it, and was just about to try it out, and you interrupted me!", I said. "Yeah? Matt said. "You'll let me in on it later then, right?" "Sure, I said", trying to get him off the line. "I'll let you in on it later, Okay?" "Ok, fine! I knew you wouldn't forget me, old PAL! I call you in an hour, and then we can talk, ok bye!" "Try tomorrow, or next week!", I tried to say, but the 'click' got there before me. Jeez! Matt really was my best friend and pal, but he always wanted to know and learn everything. Now you probably say, 'Hey! That's just what Hackers are all about!', and I couldn't agree with you more, but you just hear me out on this one first! He wanted to know, when we was about five years old, how you 'get it on' with a woman (referring to Marielle Peterson) and at six years of age, he wanted to know how a rocket scientist ate lunch. At seven years, he wanted to know how to make succini with red sauce. I can continue with this list, but I would then take up all the space in this story and the story will be untold. I hope that's NOT what you want to read. ----------------------------------------------------------------------------- For the complete story, or other stories, contact me at the MAILBOX. (c) 1989, 1990, 1991 THE CHIEF STORY SERIES(r) <<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<< -23- Sorry about all the spelling-errors, but hey, You read it! See you all in the next year REPORT !! Members: The Inside Int. Hackers Association #1 1991 is sent to you in February and will contain, among other nice things: 'The World of the Hacker'.... The first Swedish doctor's thesis about Hackers! 'The Chief's StoryLine'...... New Story from The Chief! Long awaited! 'The Verdict'................ S.H.A. Member trial news and his verdict. See you all Members in February! -ED- >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> -24- NEWS REPORTERS: The Swedish Hackers Association welcomes ALL NEWS containing information from the hacking-world. To report YOUR news: Call our boards in Sweden and leave a message there containing Your news! OTHERS: This number is to an ordinary BBS in Sweden, so if you consider yourself a REAL Hacker, you know what you're doing, and want to contact us, maybe to join, or give us a hand, or perhaps to thank us for this splendid issue (haha); Call +46-(0)11-138259 and write a Letter to MAILBOX. Use the command 'MAIL MAILBOX'. If you want us to answer your letter, be a member of the BBS so we can send our reply through the mailbox to you. * IMPORTANT * Remember to write where you found this issue (THE NAME & NUMBER of the BBS thank you). Message to all connected to the Police, Law or likewise: -------------------------------------------------------- Sorry guys! You can't get us! The Swedish Secure boards are restricted and private. Still, to reach us, call; + 4 6 - 8 - 7 1 6 6 4 6 5 or + 4 6 - 7 5 3 - 7 6 0 0 0 These numbers are for POLICE ONLY, so all of you other guys, DON'T call these numbers! It is on your own risk if you do! >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> -25- The material in this document is NOT ment to encourage hacking, cracking or illegal entering to computer systems. The Swedish Hackers Association can NOT be blamed for any abuse caused by it. The Swedish Hackers Association is formed only to inform the public what hackers and hacking really mean, and to report all hacking news and events to the readers.