GENWiki

Premier IT Outsourcing and Support Services within the UK

User Tools

Site Tools


archive:news:singh.hac

Unauthorised Access UK 0636-708063 10pm-7am 12oo/24oo

Hackers Cove 8:30pm-7am +44 (0)204 792642 v21/22/22bis/23/32/32bis/42bis

                                HACKING
                    THE CASE OF EDWARD AUSTIN SINGH
             THIS FILE WAS RIPPED FROM ZINE DISK MAGAZINE
           AND EDITED TO 80 CULUMN TEXT BY /\STERiX/CYANIDE

Here is a fairly old but not publicised enough article on a famous hacker. One single Sunday afternoon a programmmer remained preoccupied at Guildford University in England. His name, Edward Austin Singh. His preoccuption included browsing through computer files on a military network in the United States, He was connected to another computer in Germany via the one in America, his satellite link crossed and recrossed the Atlantic, He was once again Hacking into an important system. That day at 7.10pm he was caught by a detective Superintendent and a detective inspector of Scotland Yard's serious crime squad whom walked in and passed across their police identification cards. Singh had no choice but to admit to all his computer crimes. He explained to them that he would break into systems by one particular sceme that worked very well. He wrote a capture program that grabbed people's passwords. They thought it was just the terminal asking for their passwords, but it stored them and Singh would collect them later. During his exploration, the more he hacked, the more hackers he came into contact with, always leaving messages or answering queries on various Bulletin Boards and chat systems. Singh penitreted these systems completely, in most cases he could gain super-user or system manager privileges and he got into everything connected up to the network. If Singh couldn't get into a system then all he would do was contact someone else through another Bulletin Board and they would help him. While he was browsing through various boards, he found valid credits cards with numbers on them, so thanks to hackers like Singh we were all able to start `Phreaking'. He had broken into NASA and examined details of a project which was being planned, it included details of an unmanned mission to Mars! He also found his way into Nuclear power stations and he explored a space defence centre operated by a US government arms manufacturer. There was no system in the whole world which could keep him out! When he was bored, he would break into a system and put a back door into it and he would send messages to the Sysop telling him that he had been penetrated by hackers, then he would wait and see if the Sysop could keep him out. Usually they just changed the passwords and never found the back door. It is amazing to know that half of the people that run these systems have absolutely no idea what the hell is going on! Operations to catch Singh were going on for at least six months by the United States Secret Service. But even Singh already knew that they were onto him before he was caught, because of a message left on a BBS by another hacker warning him that the US head office was awaring of Hacking in his general area and they had isolated him and wanted his name. Many System owners became very unhappy when Singh admitted to, and showed how he broke into those Systems because some of them appeared to be absolutely vulnerable to infiltration. When Singh was arreseted he estimated that he had about 250 systems under his control, which were computer sites that he could enter anytime again at his own will. Beleive it or not, Singh's did not recieve any punishment for all of his activities! he got let off with a strict warning! Also, to his good fortune of being caught he obtained a job as a software security consultant. `You have to be a hacker to catch a hacker' one has always said. Singh's main goal, before he was caught was total world domination! He wanted everything under his very own control. It was the ULTIMATE game on the ULTIMATE scale. He got a thrill out of beating the systems, and having so much power. Saying that Singh was obsessed was a gross understatement! (aren't we all obsessed in one way or another when dealing with computers?) The sheer scope of fraud, espionage and damage had never been greater. Singh was one of the best hackers in this generation, although his efforts breaking into alot of systems were not all that hard to achieve. But it involved a lot of time, patience and instinct which Singh seemed to have as a second nature. Hacking is not only a past-time, but for many people it is an art-form.

              Bandit/Mystix
  1. ———————–

Downloaded From P-80 International Information Systems 304-744-2253

/data/webs/external/dokuwiki/data/pages/archive/news/singh.hac.txt · Last modified: 1999/08/01 17:08 by 127.0.0.1

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki