exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

fuck0203.html

fuck0203.html
Posted Aug 17, 1999

A Real Hack (anonymous)

tags | paper
SHA-256 | eb36a25117cf3d2a33a0da036874a31ff8f6ef2e668f4eef5d8c2b38a65c0023

fuck0203.html

Change Mirror Download
<!DOCTYPE HTML PUBLIC "html.dtd">
<HTML>
<HEAD><TITLE>Hacker Scene</TITLE>
</HEAD>
<BODY BGCOLOR="#000000" VLINK="#C0C0C0" TEXT="#FFFFFF" LINK="#FF0000" ALINK="#FF0000">

<PRE>

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
= F.U.C.K. - Fucked Up College Kids - Born Jan. 24th, 1993 - F.U.C.K. =
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

A Real Hack
-----------

Received this in the mail the other day, fakemailed to me.
Let this be a good lesson to the media and their shitty bias.

-----BEGIN PGP SIGNED MESSAGE-----

Hackers have the unfair reputation of being evil. Always up to no good
and out to destroy every computer they come across and to use every
credit card number they can find.

The media is, in our eyes, the sole entity responsible for this
misrepresentation in the public eye. Hackers make media headlines only
when they have damaged or stolen something. Hey, sensationalism and
ratings are all they give a fuck about, and stories about good hackers
don't produce either.

On April 8th of this year, a young girl disappeared from northern
California and was believed to be in the Los Angeles area. Police and
federal agencies were not making any progress, as trying to find a
missing girl in Los Angeles is pretty much a hopeless cause because of
the geographical size of it.

An interesting idea was sparked when in conversation with a federal
agency, familiar with some of the hobbies of the family member of the
missing girl, suggested that his resources were "better than theirs" in
such a situation.

This hacker then got on the phone and starting calling all of his friends
dispersed throughout California, seeing who was available and what
resources could be tapped. It was Sunday afternoon, April 21st.

The informal group believes that every persons mistake is in their use of
the phone. So, naturally, the first resource was the phone company. Once
in, call details were pulled of the missing person and then call detail
reports pulled from each of those numbers covering a three month period
of time.

Frequent numbers were tallied starting from newest to oldest and then
distributed for the calls to begin. Meanwhile, hackers were weaving their
way through the network of local and federal law enforcement agencies,
credit companies and bank and gas company card user databases. Everything
was coming up blank. The only information found all led back to the point
of disappearance.

Except for one small piece of information. An SSA search listed a
temporary mailing address used many years earlier for corresspondence to
that individual. Back into the phone company to pull the customer
information on that address. Bogus call to see who answered was then made.
No one familiar.

It was now late Monday morning. A hacker friend located in the area of
the address parked across the street armed with printouts of .jpg files
scanned earlier that morning and emailed to him. He was going to stick
around and see what was happening.

The call came at 12:05 p.m. Monday afternoon. She was there! The
appropriate calls were made and the whole thing came to an end thirty
minutes later with another phone call between family members.

Hackers come in many ideologies. There are those who destroy and steal,
but most are just intellectually curious with an abundance of knowledge
of how the system works. This was just the kind of people who used their
resources to settle a missing persons case in less than twenty-four hours
after a federal agency couldn't do it themselves, and basically suggested
they do what they had to do.

The irony is that these data trackers committed close to a hundred
felonies in the process of tracking this missing person. The federal
agencies would have used the same type of methods to accomplish the same
thing, but they wouldn't have had broken a single law. And these federal
officers work for us, yet they are also the ones who will kick in your
door at six in the morning and terrorize the fuck out of you and drag you
into jail for doing the same thing.

No one was defrauded, not a single thing damaged or stolen. Justifiable,
unofficially-sactioned activities that may have ultimately saved the
taxpayers millions of dollars. Yet, we're the criminals.

This story was intentionally written to be vague, non-descriptive and
non-incriminating. Yet the story is very much true. We wish not to be known.




-----BEGIN PGP SIGNATURE-----
Version: 2.6.2

iQEVAwUBMX/2BderPGNZ9LrRAQF3kgf8CxNciq9DZRa4lrNwc10/R0Hl6EUf1VF9
66qxezF3Tv6gPcWrjliP7hGhqAORF8ZVktw+Z6lyc+gF/KWD48VU+NxlbX8fafrK
qtkx8M7iekXG6UIG81eV6tshgWvTg74ceIN2DRblHdFGdTw4e/U6Fl6PWdl/zigL
xNn5mKWXHl9nxDAE+SwwVNjfO3jvIB1yu0AGrPe5Af5KZYKBioWabcTiv/ztWbzv
PiGkSOC8/dYlMBidgvcZH19Z2QQcadDsBMRWFaaiMeTG57zC+D996TNx6EnOP1nP
wrnUhcGb60hcCc1uATBk1OG7AfiMwPsIKhkfVIEhoLVnd1cxatMTiQ==
=Suym
-----END PGP SIGNATURE-----

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
= Questions, Comments, Bitches, Ideas, Rants, Death Threats, etc etc... =
= Internet : jericho@dimensional.com (Mail is welcomed) =
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
= gote land +27.31.441115 =
= Arrested Development +31.77.3547477 =
= Global Chaos +61.2.681.2837 =
= Chemical Persuasion 203.324.0894 Undrgrnd Indust/Inc. 207.490.2158 =
= Damnation 212.861.0580 that stupid place 215.985.0462 =
= Hacker's Haven 303.343.4053 PheedbacK 303.782.0893 =
= E.L.F. (NUP) 314.272.3426 Misery 318.625.4532 =
= Dungeon Sys. Inc. 410.263.2258 Psykodelik Images 407.834.4576 =
= Paradise Lost 414.476.3181 Black SunShine 513.891.3465 =
= underworld_1995.com 514.683.1894 Digital Fallout 516.378.6640 =
= PSYCHOSiS 613.836.7211 Bad Trip 615.870.8805 =
= Plan 9 716.881.3663 suicidal chaos 718.592.1083 =
= Damaged 801.944.7353 The Death Star Bar 805.872.3151 =
= Purple Hell 806.791.0747 Atrocity Exhibition 905.796.3385 =
= Phoenix Modernz 908.830.8265 The Keg 914.234.9674 =
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
= Files through Anon FTP FTP.DIMENSIONAL.COM/users/jericho/FUCK =
= FTP.PRISM.NET/pub/users/mercuri/zines/fuck =
= FTP.WINTERNET.COM/users/craigb/fuck =
= FTP.GIGA.OR.AT/pub/hackers/zines/FUCK =
= ETEXT.ARCHIVE.UMICH.EDU - /pub/Zines/FUCK =
= FTP.DIMENSIONAL.COM - /users/rage/zines/fuck =
= Files through WWW: http://www.dimensional.com/~jericho =
= http://command.com.inter.net (DisordeR's User Page) =
= http://www.prism.net/zineworld/fuck/ =
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

</PRE>
</BODY>
</HTML>

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close