This is a posting by Lewis De Payne, a friend of Kevin Mitnick's. Of particular note is the reference in the .sig to Kathleen Carson.
Newsgroups: alt.2600 From: email@example.com (Lewis De Payne) Subject: Re: New York Time article? Message-ID: <lewizD323E5.M2r@netcom.com> Approved-By: firstname.lastname@example.org Organization: NETCOM On-line Communication Services (408 261-4700 guest) X-Newsreader: TIN [version 1.2 PL1] References: <email@example.com> <012595231157Rnf0.firstname.lastname@example.org> Date: Fri, 27 Jan 1995 08:54:04 GMT Lines: 65 email@example.com stopped to think, then wrote: : : The first known attack using the new technique took place : on Dec. 25 against the computer of a well-known computer : security expert at the San Diego Supercomputer Center. It happened at the San Diego SuperDuper Computer Center. Remember that. : The flaw, which has been known as a theoretical possibility to : computer experts for more than a decade, but has never been : demonstrated before, is creating alarm among security experts : now because of the series of break-ins and attacks in recent weeks. The so-called "experts" knew of the "theoretical flaw" for more than a decade, and didn't do anything about it on their own systems... They were obviously willing to gamble. Sometimes you roll snake-eyes. : The weakness, which was previously reported in technical papers : by AT&T researchers, was detailed in a talk given by Tsutomu : Shimomura, a computer security expert at the San Diego Super- : computer Center, at a California computer security seminar : sponsored by researchers at the University of California at : Davis two weeks ago. Bingo. It happened at the San Diego SuperDuper Computer Center, and this Tsunami "windbag" Shimomoto who works at SDSCS gives a talk on it. How much do you want to bet that this is the self-proclaimed "expert" who was too lazy to practice what he preaches. Is this an expert? : Mr. Shimomura's computer was taken over by an unknown attacker : who then copied documents and programs to computers at the : university of Rochester where they were illegally hidden on : school computers. I'm surprised that Special Agents from the FBI didn't obtain a search warrant for the University of Rochester, with Justin Petersen as the affiant, and CONFISCATE the University's computer system in much the same was as they do other businesses. What was on Mr. "Neboken-ja neyo" Shimomoto's computer? Isn't the SDSCS funded by the taxpayers? Is this guy scared now because the perpetrator(s) might make his GIF files public? : Internet veterans also expressed anger at the new style of attack : because it would cause many organizations to strengthen their : security systems, thus making the network less convenient and less : useful. What a pity - having to fix the problem. Can you imagine that? Now I understand how companies like GM can sometimes decided to pay the lawsuits instead of correct the problem. : "These guys are striking the basis of trust that makes the : network work," Mr. Ranum said, "and I hate that." Yes - having to work for a living is a bitch, isn't it. PS - You can bet the "big boys" are involved in investigating this one, and that JC Penney is starting to run out of perma-press blue suits. -- "Mum's the word" - Justin Petersen || cc: Kennie G. McGuire, SA, FBI, LA CA "Did you use SAS?" - Terry Atchley || Kathleen "Hottub" Carson, SA, FBI "I am not a crook" - Richard Nixon || Behave - or I'll tell Janet Reno!
Page design Copyright © 1995 Vicious
Fishes Web Design and Dan
Meriwether. All rights reserved.