{"id":5,"date":"2005-03-01T02:17:32","date_gmt":"2005-03-01T06:17:32","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/zeroday\/2005\/03\/01\/hey-look-its-vin-diesels-phone-number"},"modified":"2005-03-01T02:17:32","modified_gmt":"2005-03-01T06:17:32","slug":"hey-look-its-vin-diesels-phone-number","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/zeroday\/2005\/03\/01\/hey-look-its-vin-diesels-phone-number\/","title":{"rendered":"Hey look it&#8217;s Vin Diesel&#8217;s phone number"},"content":{"rendered":"<p><a name='a6'><\/a><\/p>\n<p>The first reporter on &#8220;the scene&#8221; was Kevin Poulsen and ex hacker turned journalist.&nbsp; I had read about the case earlier when the story broke that Operation Firewall was turning up the heat.&nbsp; <a href=\"http:\/\/www.viruslist.com\/en\/news?id=154205192\">Operation Firewall<\/a> was a seperate operation by the Secret Service to capture identity theft rings.&nbsp; As they were monitoring certain IRC channels for information they started seeing internal SS documents traded like baseball cards.&nbsp; This did not bode well.&nbsp; <br \/> The amount of damage to T-Mobile should be massive as far as reputation and security are concerned.&nbsp; I have a feeling that since the SS was involved and does not want to share in the embarassment that not many will be the wiser.&nbsp; The only people I know for sure that know about the effects of this massive hack are those who were lucky enough to make it to Paris Hilton&#8217;s address book.&nbsp; One of the major advertising points for the Sidekick is that all the data is stored at the T-Mobile servers in California.&nbsp; A list, which I have seen with my own two eyes, of every person in her cell phones address book was published to underground sites last week.&nbsp; I have friends who actually bothered calling some of these numbers.&nbsp; I mean who wouldn&#8217;t want to talk to <a href=\"http:\/\/images.google.com\/images?hl=en&amp;q=anna+kournikova&amp;spell=1\"><b>Anna<\/b> <b>Kournikova<\/b><\/a>?&nbsp; Rumor has it her voice mail box filled up fast.&nbsp; Another rumor holds that the daughter of notorious gangster John Gotti, Victoria, was out on a date the night the numbers were released from their elite private circles.&nbsp; Since the mother didn&#8217;t want her daughter to be out of touch she refused to cancel the service.&nbsp; Which means she must have answered hundreads of phone calls that night from would be pranksters.&nbsp; I guess in my old age I&#8217;ve lost some of my edge because I don&#8217;t think I&#8217;d have the balls to prank call the daughter of a serial killer.&nbsp; <br \/> But these are the troubles of the rich and the famous.&nbsp; What about everyone else?&nbsp; All the information, including notes taken on the devices, were available for hackers who had access to T-Mobile Servers.&nbsp; <br \/> This could include credit card information, social security numbers, and addresses.&nbsp; The California notification law <a href=\"http:\/\/www.google.com\/url?sa=U&amp;start=1&amp;q=http:\/\/info.sen.ca.gov\/pub\/01-02\/bill\/sen\/sb_1351-1400\/sb_1386_bill_20020926_chaptered.html&amp;e=8092\">SB 1386<\/a> is the only reason we know about it.&nbsp; Even so the SS were able to delay the breach for months (maybe a year??) for it&#8217;s ongoing investigation.&nbsp; As Kevin Poulsen noted, &#8220;The Secret Service played both victim and investigator&#8221; for this crime.&nbsp; So my question is this.&nbsp; When California instituted a no smoking indoors or on public property law, states flocked on board.&nbsp; When are other states going to pass simliar SB 1386 laws?&nbsp; Corporation after corporation has had to come to the spot light, tail between it&#8217;s legs, and admit to getting hacked.&nbsp; Without this law who knows how many social security numbers would have quietly found their way into the underground.&nbsp; Their owners only finding out that they identity was compromised when they applied for a new mortage or car.&nbsp; <br \/> As a side note the pictures of Paris Hilton&#8217;s camera were also stored online.&nbsp; This was more frightening then anything else.&nbsp; If I&#8217;m taking personal photos with my camera, and let&#8217;s just say hers were .. intimate, I really would not like them uploaded and stored anywhere.&nbsp; <\/p>\n<p> [editors note: I am also the editor, this is more like a PS.&nbsp; I don&#8217;t know what an enclosure URL is.&nbsp; I also think it amusing that Ms Hilton is the focus of so much attention.&nbsp; I honestly think she loves that her private details were released to the public.&nbsp; The notes from her Sidekick show a woman who is obsessed with scandal and time in the limelight]<br \/> [editors note 3\/2005: I changed the anna kournakova link to a more &#8220;work safe&#8221; image search on google.]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The first reporter on &#8220;the scene&#8221; was Kevin Poulsen and ex hacker turned journalist.&nbsp; I had read about the case earlier when the story broke that Operation Firewall was turning up the heat.&nbsp; Operation Firewall was a seperate operation by the Secret Service to capture identity theft rings.&nbsp; As they were monitoring certain IRC channels [&hellip;]<\/p>\n","protected":false},"author":214,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-5","post","type-post","status-publish","format-standard","hentry"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/5","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/users\/214"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/comments?post=5"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/posts\/5\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/media?parent=5"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/categories?post=5"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/zeroday\/wp-json\/wp\/v2\/tags?post=5"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}