[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]

..[ Phrack Magazine ]..
.:: PWN/Part 3 ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ]
Current issue : #39 | Release date : 1992-06-26 | Editor : Dispater
Phrack LoopbackPhrack Staff
Phrack Pro-Phile on Shadow Hawk 1Shadow Hawk 1 & Dispater
Network Miscellany VDatastream Cowboy
DIALOG Information NetworkBrian Oblivion
Centigram Voice Mail System Consolesunknown
Special Area Codes IIBill Huttig
Air Fone FrequenciesLeroy Donnelly
The Open Barn DoorDouglas Waller
PWN/Part 1Datastream Cowboy
PWN/Part 2Datastream Cowboy
PWN/Part 3Datastream Cowboy
PWN/Part 4Datastream Cowboy
Title : PWN/Part 3
Author : Datastream Cowboy
                                ==Phrack Inc.==

                 Volume Four, Issue Thirty-Nine, File 12 of 13

              PWN                                             PWN
              PWN              Phrack World News              PWN
              PWN                                             PWN
              PWN       Issue XXXIX / Part Three of Four      PWN
              PWN                                             PWN
              PWN        Compiled by Datastream Cowboy        PWN
              PWN                                             PWN

 New Phones Stymie FBI Wiretaps                                  April 29, 1992
 By Simson L. Garfinkel (Christian Science Monitor)(Page 12)

        "Legislation proposed by Justice Department would change the way
        telecommunications equipment is developed in the United States."

For more than 50 years, wiretapping a telephone has been no more difficult than
attaching two clips to a telephone line.  Although legal wiretaps in the United
States have always required the approval of a judge or magistrate, the actual
wiretap has never been a technical problem.  Now that is changing, thanks to
the same revolution in communications that has made car phones, picture
telephones, and fax machines possible.

The only thing a person tapping a digital telephone would hear is the
indecipherable hiss and pop of digital bits streaming past.  Cellular
telephones and fiber-optic communications systems present a would-be wiretapper
with an even more difficult task:  There isn't any wire to tap.

Although cellular radio calls can be readily listened in on with hand-held
scanners, it is nearly impossible to pick up a particular conversation -- or
monitor a particular telephone -- without direct access to the cellular
telephone "switch," which is responsible for connecting the radio telephones
with the conventional telephone network.

This spring, the Federal Bureau of Investigation (FBI) unveiled legislation
that would require telephone companies to include provisions in their equipment
for conducting court-ordered wiretaps. But critics of the legislation,
including some members of Congress, claim that the proposals would expand the
FBI's wiretap authority and place an undue burden on the telecommunications

Both sides agree that if provisions for monitoring communications are not made
in the planning stages of new equipment, it may eventually become impossible
for law enforcement personnel to conduct wiretaps.

"If the technology is not fixed in the future, I could bring an order [for a
wiretap] to the telephone company, and because the technology wasn't designed
with our requirement in mind, that person could not [comply with the court
order]," says James K. Kalstrom, the FBI's chief of engineering.

The proposed legislation would require the Federal Communications Commission
(FCC) to establish standards and features for makers of all electronic
communications systems to put into their equipment, require modification of all
existing equipment within 180 days, and prohibit the sale or use of any
equipment in the US that did not comply.  The fine for violating the law would
be $10,000 per day.

"The FBI proposal is unprecedented," says Representative Don Edwards (D) of
California, chairman of the House Judiciary Subcommittee on Civil and
Constitutional Rights and an outspoken critic of the proposal.  "It would give
the government a role in the design and manufacture of all telecommunications
equipment and services."

Equally unprecedented, says Congressman Edwards, is the legislation's breadth:
The law would cover every form of electronic communications, including cellular
telephones, fiber optics, satellite, microwave, and wires.  It would cover
electronic mail systems, fax machines, and all networked computer systems.  It
would also cover all private telephone exchanges -- including virtually every
office telephone system in the country.

Many civil liberties advocates worry that if the ability to wiretap is
specifically built into every phone system, there will be instances of its
abuse by unauthorized parties.

Early this year, FBI director William Sessions and Attorney General William
Barr met with Senator Ernest F. Hollings (D) of South Carolina, chairman of the
Senate Commerce Committee, and stressed the importance of the proposal for law

Modifying the nation's communications systems won't come cheaply.  Although
the cost of modifying existing phone systems could be as much as $300 million,
"We need to think of the costs if we fail to enact this legislation," said Mr.
Sessions before a meeting of the Commerce, Justice, State, and Judiciary
Subcommittees in April.  The legislation would pass the $300 million price-tag
along to telephone subscribers, at an estimated cost of 20 cents per line.

But an ad-hoc industry coalition of electronic communications and computer
companies has objected not only to the cost, but also to the substance of the
FBI's proposal.  In addition, they say that FCC licensing of new technology
would impede its development and hinder competitiveness abroad.

Earlier this month, a group of 25 trade associations and major companies,
including AT&T, GTE, and IBM, sent a letter to Senator Hollings saying that "no
legislative solution is necessary."  Instead, the companies expressed their
willingness to cooperate with the FBI's needs.

FBI officials insist that legislation is necessary.  "If we just depend on
jaw-boning and waving the flag, there will be pockets, areas, certain places"
where technology prevents law enforcement from making a tap, says Mr. Kalstrom,
the FBI engineer.  "Unless it is mandatory, people will not cooperate."

For example, Kalstrom says, today's cellular telephone systems were not built
with the needs of law enforcement in mind.  "Some companies have modified their
equipment and we can conduct surveillance," he says.  But half of the companies
in the US haven't, he adds.

Jo-Anne Basile, director of federal relations for the Cellular
Telecommunications Industry Association here in Washington, D.C., disagrees.

"There have been problems in some of the big cities because of [limited]
capacity," Ms. Basile says.  For example, in some cities, cellular operators
had to comply with requests for wiretaps by using limited "ports" designed for
equipment servicing.  Equipment now being installed, though, has greatly
expanded wiretap capacity in those areas.

"We believe that legislation is not necessary because we have cooperated in
the past, and we intend on cooperating in the future," she adds.

The real danger of the FBI's proposal is that the wiretap provisions built in
for use by the FBI could be subverted and used by domestic criminals or
commercial spies from foreign countries, says Jerry Berman, director of the
Electronic Frontier Foundation, a computer users' protection group in
Cambridge, Mass.

"Anytime there is a hearing on computer hackers, computer security, or
intrusion into AT&T, there is a discussion that these companies are not doing
enough for security.  Now here is a whole proposal saying, 'Let's make our
computers more vulnerable.'  If you make it more vulnerable for the Bureau,
don't you make it more vulnerable for the computer thief?"

Civil liberties advocates also worry that making wiretaps easier will have the
effect of encouraging their use -- something that the FBI vehemently denies.

"Doing a wiretap has nothing to do with the [technical] ease," says Kalstrom.
"It is a long legal process that we must meet trying all other investigations
before we can petition the court."

Kalstrom points out the relative ease of doing a wiretap with today's telephone
system, then cites the federal "Wiretap Report," which states that there were
only 872 court-approved wiretaps nationwide in 1990.  "Ease is not the issue.
There is a great dedication of manpower and cost," he says.  But digital
wiretapping has the potential for drastically lowering the personnel
requirements and costs associated with this form of electronic surveillance.
Computers could listen to the phone calls, sitting a 24-hour vigil at a low
cost compared with the salary of a flesh-and-blood investigator.

"Now we are seeing the development of more effective voice-recognition
systems," says Edwards.  "Put voice recognition together with remote-access
monitoring, and the implications are bracing, to say the least."

Indeed, it seems that the only thing both sides agree on is that digital
telephone systems will mean more secure communications for everybody.

"It is extremely easy today to do a wiretap:  Anybody with a little bit of
knowledge can climb a telephone poll today and wiretap someone's lines," says
Kalstrom.  "When the digital network goes end-to-end digital, that will
preclude amateur night.  It's a much safer network from the privacy point of

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 FBI Fight With Computer, Phone Firms Intensifies                   May 4, 1992
 Taken from Los Angeles Times (Business, Part D, Page 2)

               "Spy Agencies Oppose Technology That Will Prevent
                 Them From Tapping Into Data And Conversations"

Top computer and telecommunications executives are fighting attempts by the FBI
and the nation's intelligence community to ensure that government surveillance
agencies can continue to tap into personal and business communications lines as
new technology is introduced.

The debate flared last week at a House Judiciary Committee hearing on foreign
intelligence agencies' attempts to gather U.S. companies' secrets.  The
committee's chairman, Representative Jack Brooks (D-Tex.), called the hearing
to complain that the FBI and the National Security Agency (NSA) are hurting
companies' attempts to protect their communications.

The issue has been heating up on two fronts.  Phone companies have been
installing digital equipment that frustrates phone tapping efforts, and
computer companies are introducing new methods of securing data transmissions
that are almost impossible for intelligence agencies to penetrate.

The controversy centers, in part, on an FBI attempt to persuade Congress to
force telephone companies to alter their digital networks, at a possible cost
of billions of dollars that could be passed on to ratepayers, so that the FBI
can continue performing court-authorized wiretaps.  Digital technology
temporarily converts conversations into computerized code, which is sent at
high speed over transmission lines and turned back to voice at the other end,
for efficient transmission.

Civil liberties groups and telecommunications companies are fiercely resisting
the FBI proposal, saying it will stall installation of crucial technology and
negate a major benefit of digital technology:  Greater phone security.  The
critics say the FBI plan would make it easier for criminals, terrorists,
foreign spies and  computer hackers  to penetrate the phone network.  The FBI
denies these and other industry assertions.

Meanwhile, the NSA, the nation's super-secret eavesdropping agency, is trying
to ensure that government computers use a computer security technology that
many congressmen and corporate executives believe is second-rate, so that NSA
can continue monitoring overseas computer data transmissions.  Corporations
likely would adopt the government standard.

Many corporate executives and congressmen believe that a branch of the Commerce
Department that works closely with NSA, the National Institute of Standards and
Technology (NIST), soon will endorse as the government standard a computer-
security technology that two New Jersey scientists said they penetrated to
demonstrate its weakness.  NIST officials said that their technology wasn't
compromised and that it is virtually unbreakable.

"In industry's quest to provide security (for phones and computers), we have a
new adversary, the Justice Department," said D. James Bidzos, president of
California-based RSA Data Security Inc., which has developed a computer-
security technology favored by many firms over NIST's.  "It's like saying that
we shouldn't build cars because criminals will use them to get away."

"What's good for the American company may be bad for the FBI" and NSA, said
Representative Hamilton Fish Jr. (R-N.Y.).  "It is a very heavy issue here."

The situation is a far cry from the 1950s and 1960s, when companies like
International Business Machines Corporation and AT&T worked closely with law-
enforcement and intelligence agencies on sensitive projects out of a sense of
patriotism.  The emergence of a post-Vietnam generation of executives,
especially in new high-technology firms with roots in the counterculture, has
short-circuited the once-cozy connection, industry and government officials

"I don't look at (the FBI proposal) as impeding technology," FBI Director
William S. Sessions testified at the Judiciary Committee hearing.  "There is a
burden on the private sector . . . a price of doing business."

FBI officials said they have not yet fumbled a criminal probe due to inability
to tap a phone, but they fear that time is close.  "It's absolutely essential
we not be hampered," Sessions said.  "We cannot carry out our responsibilities"
if phone lines are made too secure.

On the related computer-security issue, the tight-lipped NSA has never
commented on assertions that it opposes computerized data encryption
technologies like that of RSA Data Security because such systems are

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

For more articles on this same topic, please see:

Phrack 38, File 11; The Digital Telephony Proposal.

 FBI Seeks Compiled Lists For Use In Its Field Investigation     April 20, 1992
 By Ray Schultz (DMNews)(Page 1)
 Special Thanks: The Omega and White Knight

Washington, D.C. -- The Federal Bureau of Investigation, in a move that could
spell trouble for the industry, reported is seeking commercial mailing lists
for use in its investigations.

Spokespersons for both MetroMail Corporation and Donnelley Marketing confirmed
that they were approached for services within the last two weeks and other
firms also received feelers.

Neither of the identified firms would discuss details, but one source familiar
with the effort said the FBI apparently is seeking access to a compiled
consumer database for investigatory uses.

The FBI agents showed "detailed awareness" of the products they were seeking,
and claimed to have already worked with several mailing list companies,
according to the source.

Metromail, which has been supplying the FBI with its MetroNet address lookup
service for two years, did not confirm this version of events.  Spokesperson
John Tomkiw said only that the firm was asked by the FBI about a "broadening"
of its services.

The firm has supplied the bureau with a full listing of its products and
services, but has not yet been contacted back and is not sure what action it
will take, said Tomkiw.

Donnelley was also vague on the specifics of the approach, but did say it has
declined any FBI business on the grounds that it would be an inappropriate use
of its lists.

FBI spokesperson Bill Carter was unable to provide confirmation, although he
did verify that the FBI uses MetroNet to locate individuals needed for

If the database scenario is true, it would mark the first major effort by a
government agency to use mailing lists for enforcement since the Internal
Revenue Service tried to use rented lists to catch tax cheats in 1984.

"We have heard of it," said Robert Sherman, counsel to the Direct Marketing
Association and attorney with the firm of Milgrim Thomajan & Lee, New York. 
"We'd like to know more about it.  If it is what it appears to be, law
enforcement agents attempting to use marketing lists for law enforcement
purposes, then the DMA and industry would certainly be opposed to that on
general principles."

Such usage would "undermine consumer confidence in the entire marketing process
and would intrude on what otherwise would be harmless collection of data,"
Sherman said.

RL Polk, which has not been contacted, said it would decline for the same
reasons if approached.

"That's not a proper use of our lists," said Polk chairman John O'Hara.  "We're
in the direct mail business and it's our policy not to let our lists be used
for anything but marketing purposes."

According to one source, who requested anonymity, the FBI intimated that it
would use its subpoena power if refused access to the lists.

The approaches, made through the FBI training center in Quantico, VA, 
reportedly were not the first.

The FBI's Carter said the MetroNet product was used for address lookups only.

"If a field office needs to locate somebody for an interview, we can check the
[MetroNet] database as to where they reside and provide that information to the
field office," he said.

However, the product was cited as a potential threat to privacy last year by
Richard Kessel, New York State Consumer Affairs Commissioner.

In a statement on automatic number identifiers, Kessel's office said that "one
firm offers to provide 800-number subscribers immediate access to information
on 117-million customers in 83-million households nationwide.

"The firm advertises that by matching the number of an incoming call into its
database, and an 800 subscriber within seconds can find out such information as
whether the caller has previously purchased items from their companies."

Kessel included a copy of a trade ad for MetroNet, in which the product is
presented as a direct marketing tool.

Under the headline "Who am I?" the copy reads as if it is by an imaginary

"The first step to knowing me better is as easy as retrieving my phone number
in an Automatic Number Identification environment," it says.  "Within seconds
you can search your internal database to see if I've purchased from you before.
And if it's not to be found, there's only one place to go -- to MetroNet.

"MetroNet gives you immediate access to information on 117-million consumers in
83-million households nationwide: recent addresses; phone numbers; specific
demographics and household information."

Tomkiw defended the product, saying its primary focus is "direct marketing.
We're always sensitive to those types of issues."

MetroNet works as an electronic white pages, but does not contain "a lot of
demograhpic data," he said.  "It's primarily used by the real estate and
insurance industries."

The 1984 IRS effort reportedly was a failure, but it created a public outcry
and much negative publicity for the industry.  Though Polk, MetroMail and
Donnelley all refused to rent their lists for the effort, the IRS was able to
locate other lists through Dunhill of Washington.  Most industry sources say
that such efforts are doomed to fail because lists are useful only in
identifying people in aggregate, not as individuals."

 Do You Know Where Your Laptop Is?                                 May 11, 1992
 By Robert Kelly (InformationWeek)

           Are your executives carrying computers with critical data?
                     If so, company secrets are vulnerable

It was an expensive round of window shopping.  On December 17, 1990, David
Farquhar parked his car in downtown London to browse through an automobile
showroom.  A Wing Commander in Great Britain's Royal Air Force, he was enjoying
a few moments away from the mounting pressures leading up to the Gulf War,
which would begin less than a month later.

But Farquhar made a huge mistake:  He left his laptop computer in his car.  And
although he was gone a mere five minutes, by the time he returned, the laptop
had been stolen -- as had U.S. General Norman Schwarzkopf's plans, stored in
the computer's disk drive, for the upcoming Allied strike against Iraq.

Farquhar paid dearly for his carelessness.  Soon after the red-faced Wing
Commander reported the incident, he was court-martialed, demoted, and slapped
with a substantial fine.  The computer was anonymously returned a week later-
with the disk drive intact.

Farquhar may feel alone in his dilemma and rue the wrong turn his life has
taken, but such episodes are anything but isolated.  Though electronic security
sources say it's too soon to keep score yet on the exact number of laptop
thefts, anecdotally, at least, it appears a computer crime wave is underway.
According to electronic data experts, during the past 18 months, as laptop
purchases have soared, theft has taken off also.

For instance, at the Computer Security Institute (CSI), an organization that
ironically comprises corporate security experts, a half-dozen members have
already reported their company laptops stolen, says Phil Chapnick, director of
the San Francisco-based group.  And there are probably more that aren't
speaking about it, he adds:  "Victims prefer to maintain a low profile."

So do the perpetrators, obviously.  But a picture of who some of them are is
beginning to emerge, says John Schey, a security consultant for the federal
government.  He says a roving band of "computer hit men" from New York, Los
Angeles, and San Francisco has been uncovered; members are being paid upwards
of $10,000 to steal portable  computers  and strategic data stored on those
machines from executives at Fortune 1,000 companies.  Federal agents, Schey
adds, are conducting a "very, very dynamic and highly energized investigation
to apprehend the group."  U.S. law enforcement authorities refuse to comment on
the issue.

Laptop theft is not, of course, limited to the United States.  According to
news reports, and independently confirmed by InformationWeek, visiting
executives from NCR Corp. learned that reality the hard way recently when they
returned to their rooms after dinner at the Nikko Hotel in Paris to find the
doors removed from their hinges.  The rooms were ransacked, turned upside down,
but the thieves found what they were looking for.  All that was taken were two
laptops containing valuable corporate secrets.

Paul Joyal, president of Silver Spring, Maryland, security firm Integer and a
former director of security for the Senate Intelligence Committee, says he
learned from insiders close to the incident that French intelligence agents,
who are known for being chummy with domestic corporations, stole the machines.
Joyal suspects they were working for a local high-tech company.  An NCR
spokesman denies knowledge of the incident, but adds that "with 50,000
employees, it would be impossible to confirm."  Similar thefts, sources say,
have occurred in Japan, Iraq, and Libya.

It's not hard to figure out why laptop theft is on the rise.  Unit sales of
laptops are growing 40% annually, according to market researchers Dataquest
Inc., and more than 1 million of them enter the technology stream each year.
Most of the machines are used by major companies for critical tasks, such as
keeping the top brass in touch when they're on the road, spicing up sales calls
with real data pulled from the corporate mainframe, and entering field data
into central computers.  Because of laptops, says Dan Speers, an independent
data analyst in West Paterson, New Jersey, "there's a lot of competitive data
floating around."

And a perfect way to steal information from central corporate databases.
Thieves are not only taking laptops to get at the data stored in the disk
drives, but also to dial into company mainframes.  And sometimes these thieves
are people the victims would least suspect.  One security expert tells of "the
wife of a salesman for a Fortune 500 manufacturing firm who worked for a direct
competitor."  While her husband slept, she used his laptop to log on to a
mainframe at his company and download confidential sales data and profiles of
current and potential customers.  "The husband's job," says the security
expert, "not the wife's, was terminated."

Such stories, and there are plenty of them, have led many U.S. companies to
give lip service to laptop theft, but in almost all cases they're not doing
much about it.  "Management has little or no conception of the vulnerability of
their systems," says Winn Schwartau, executive director of InterPact, an
information security company in Nashville.  That's not surprising, adds CSI's
Chapnick:  "Security typically lags technology by a couple of years."

     Playing Catch-Up

Still, some companies are trying to catch up quickly.  Boeing Corp., Grumman
Corp., and Martin Marietta Corp., among others, have adopted strict policies on
portable data security.  This includes training staffers on laptop safety
rules, and even debriefing them when they return from a trip.  One company,
sources say, was able to use such a skull session to identify a European hotel
as a threat to data security, and put it on the restricted list for future

Conde Nast Publications Inc. is taking the the issue even more seriously.  The
New York-based magazine group's 65-member sales force uses laptops to first
canvas wholesalers, then upload data on newsstand sales and distribution
problems to the central mainframe.  To ensure that the corporate database isn't
poisoned by rogue data, "we have a very tight security system," says Chester
Faye, Conde Nast's director of data processing.  That system's centerpiece is a
program, created in-house at Conde Nast, that lets the mainframe read an
identification code off of the chip of each laptop trying to communicate with
it.  "The mainframe, then, can hang up on laptops with chip IDs it doesn't
recognize and on those reported stolen by sales reps," says Faye.

And some organizations hope to go to even greater lengths.  InterPact's
Schwartau says a government agency in Great Britain wants to build a device
that attaches to a user's belt and disconnects communication to a mainframe
when the laptop deviates 15 degrees vertically.  The reason:  To protect
corporate data if the person using the laptop is shot and killed while dialing

Users say they're taking such extreme measures because the vendors don't; most
laptops arrive from the factory without adequate security protection.  Most
require a password before booting, but thieves can decipher them with relative
ease.  Some also have removable hard drives, but again, these can be stolen
with similar impunity and therefore provide little protection.

Ironically, none of this may be necessary; experts emphasize that adding
security to a laptop will not serve to price it out of existence.  By some
estimates, building in protection measures raises the price of a laptop by at
most 20%.  Beaver Computer Corp. in San Jose, California, for example, has a
product to encrypt the data on a laptop's hard drive and floppy disks.  With
this, the information can't be accessed without an "electronic key" or
password.  BCC has installed this capability on its own laptop, the SL007,
which seems to have passed muster with some very discriminating customers:
Sources close to the company say a major drug cartel in Colombia wants some of
these machines to protect drug trafficking data.

Equally important is the need to protect data in the host computer from hackers
who have stolen passwords and logons.  Security Dynamics Technologies Inc. in
Cambridge, Massachusetts, offers the credit card-sized SecurID, which can be
attached to most laptops.  SecurID consists of a $60 device that is connected
to the laptop, and additional hardware (Cost: $3,800 to $13,000) installed on
the host.  SecurID continuously changes the logon used to dial into the host;
by the time a hacker gets around to using a stolen logon, for instance, it will
be obsolete.

But what if all measures fail?  You can always insure the hardware; can you
insure the data?  Not yet, but soon, says Nashville-based newsletter Security
Insider Report.  An upstart startup will soon begin offering data insurance
policies that may include coverage of information lost when a portable computer
is stolen.

     Company Cooperation

>From protection to insurance, however, no measure can work unless laptop owners
take the problem seriously.  And that doesn't always happen.  Case in point: In
the late 1980s, the Internal Revenue Service approached Schwartau's firm to
develop a blueprint for securing the confidential data that travels over phone
lines between the 30,000 laptops used by field auditors and IRS offices.
Schwartau came up with a solution.  But the IRS shelved its security plans, and
has done nothing about it since, he charges.

Even those who should know better can run afoul of the laptop crime wave.
About 18 months ago, Ben Rosen, chairman of laptop maker Compaq Computer Corp.,
left his machine behind on the train; it was promptly stolen.  Rosen insists
there was no sensitive data in the computer, but he did lose whatever he had.
Unlike Schwarzkopf's plans, the laptop was never returned.
[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2021, Phrack Magazine.