709 lines
39 KiB
Plaintext
709 lines
39 KiB
Plaintext
|
==Phrack Inc.==
|
||
|
Volume Three, Issue Thirty-one, Phile #10 of 10
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
PWN Phrack World News PWN
|
||
|
PWN Issue XXXI, Part Three PWN
|
||
|
PWN Compiled by Phreak_Accident PWN
|
||
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
||
|
|
||
|
Comp.dcom.telecom
|
||
|
-----------------
|
||
|
The following is excerpts from comp.dcom.telecom regard the now "Infamous"
|
||
|
Legion Of Doom busts. I know most of you have seen some of these
|
||
|
somewhere-sometime, but I thought I would try to get these out for those
|
||
|
unfortunate souls that don't have Usenet access.
|
||
|
I know there have been many controversies over the following material and
|
||
|
the busts as a whole -- Henceforth, Phrack Inc. will not comment on any of such
|
||
|
busts. Mainly because we don't want to jeopardize any current investigations
|
||
|
concerning LOD and others. Leave it alone. It's old news. Let this sum it up
|
||
|
for you guys and then forget about it.
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
|
||
|
Newsgroups: comp.dcom.telecom
|
||
|
Subject: CBS News Special Report - "The Busting of The Mentor"
|
||
|
Message-ID: <4747@accuvax.nwu.edu>
|
||
|
Date: 5 Mar 90 06:11:49 GMT
|
||
|
Sender: news@accuvax.nwu.edu
|
||
|
Organization: Capital Area Central Texas Unix Society, Austin, TX
|
||
|
Lines: 37
|
||
|
Approved: Telecom@eecs.nwu.edu
|
||
|
X-Submissions-To: telecom@eecs.nwu.edu
|
||
|
X-Administrivia-To: telecom-request@eecs.nwu.edu
|
||
|
X-Telecom-Digest: Volume 10, Issue 145, Message 6 of 6
|
||
|
...I've just gotten a new update on the Mentor's recent apprehension by
|
||
|
the Feds. Thought you might like to hear something as close to as direct
|
||
|
from the Mentor as possible under the circumstances.
|
||
|
From: Daneel Olivaw #96 @5283
|
||
|
Date: Sun Mar 04 19:55:28 1990
|
||
|
I'll have to play the Mentor for now (with permission granted).
|
||
|
If you haven't heard the rumors, here is the truth.
|
||
|
The Mentor was awakened at 6:30am on Thursday (3/1/90) with the gun of
|
||
|
a Secret Service agent pointed at his head. The SS proceded to search
|
||
|
and seize for the next 4 1/2 hours. Things taken include an AT with
|
||
|
80mb HD, HP LaserJet II, various documents, and other thing. They
|
||
|
then proceded to raid his office at work, and sieze the computer and
|
||
|
laser printer there. Lost in the shuffle was a complete novel (being
|
||
|
written and due in 2 weeks), and various other things.
|
||
|
Across town: Those of you who know Erik Bloodaxe, he was also
|
||
|
awakened, and his house searched.
|
||
|
Neither have been charged with anything, but they expect to at least
|
||
|
be called as witnesses at the case of the Phrack Boys (Knight
|
||
|
Lightning and Tarren King) in Chicago April 15.
|
||
|
Apparently, they did a shoddy job, as they tagged a book that Mentor
|
||
|
had borrowed from me (Quarterman's "The Matrix"), and then forgot to
|
||
|
take it, oh well....
|
||
|
It ain't lookin so lovely. Also the UT computer systes are under
|
||
|
*VERY* close watch, as they were/are being hacked on by hackers around
|
||
|
the world, including some in Australia, and England.
|
||
|
OM
|
||
|
From: cosell@bbn.com (Bernie Cosell)
|
||
|
Newsgroups: comp.dcom.telecom
|
||
|
Subject: Keeping Copies of Illegal Things (was Re: Jolnet, Again)
|
||
|
Message-ID: <4725@accuvax.nwu.edu>
|
||
|
Date: 4 Mar 90 04:36:50 GMT
|
||
|
Sender: news@accuvax.nwu.edu
|
||
|
Organization: TELECOM Digest
|
||
|
Lines: 52
|
||
|
Approved: Telecom@eecs.nwu.edu
|
||
|
X-Submissions-To: telecom@eecs.nwu.edu
|
||
|
X-Administrivia-To: telecom-request@eecs.nwu.edu
|
||
|
X-Telecom-Digest: Volume 10, Issue 143, Message 3 of 8
|
||
|
}TELECOM Digest Sat, 3 Mar 90 20:45:00 CST Special: Jolnet, Again
|
||
|
This isn't misc.legal, and this isn't the time to be excessively picky
|
||
|
and critical, but:
|
||
|
}Here is how he told the tale of the '911 software':
|
||
|
}The software showed up on his system one day, almost two years ago. It
|
||
|
}came to him from netsys, where Len Rose was the sysadmin. According to
|
||
|
}Andrews, when he saw this file, and realized what it was, he knew the
|
||
|
}thing to do was to 'get it to the proper authorities as soon as
|
||
|
}possible',...
|
||
|
}ME> "After you passed it along to Boykin, did you then destroy the
|
||
|
}file and get it off your site?"
|
||
|
}RA> "Well, no... I kept a copy also."
|
||
|
It strikes me that this is a KEY faux pas, regardless of good
|
||
|
intentions or not.
|
||
|
}But then, said Andrews, a funny thing happened several months later.
|
||
|
}The folks at AT&T, instead of being grateful for the return of their
|
||
|
}software came back to Andrews to (in his words) 'ask for it again.'
|
||
|
}Somehow, they either never got it the first time; got it but suspected
|
||
|
}there were still copies of it out; or were just plain confused.
|
||
|
Just so, and if RA *supplied* another copy, I suspect they'd interpret
|
||
|
that as pretty convincing evidence that it WAS further distributed,
|
||
|
and with RA's knowledge. I know that they didn't actually contact him
|
||
|
and ask/tell him to expunge all copies of the stuff, but his actions
|
||
|
clearly demonstrated his knowledge of just what it was he was messing
|
||
|
with, and I think they could easily show that he incurred an
|
||
|
obligation to act prudently with it, or else [just guessing now] he
|
||
|
could be liable to being an accessory after the fact.
|
||
|
}So he was contacted by the feds about a year ago, and it was at that
|
||
|
}point he decided it was in his best interest to cooperate with any
|
||
|
}investigation going on.
|
||
|
Perhaps his sudden cooperation was less out of pangs of conscience
|
||
|
that it might have appeared... [not to besmirch his motives here,
|
||
|
only to point out that a call from the FBI pointing out that while you
|
||
|
may not have really DONE anything, your actions _could_ end up landing
|
||
|
you in court with some serious potential badness going down (and none
|
||
|
of this untested cheesiness about the the technicalities of bbs's and
|
||
|
such... nice mainstream legal liability), could be pretty persuasive
|
||
|
at converting a concerned, but out-of-the-loop, citizen into an active
|
||
|
helper].
|
||
|
/Bernie\
|
||
|
From: dattier@chinet.chi.il.us (David Tamkin)
|
||
|
Newsgroups: comp.dcom.telecom
|
||
|
Subject: Seizures Spreading
|
||
|
Message-ID: <4724@accuvax.nwu.edu>
|
||
|
Date: 4 Mar 90 05:55:20 GMT
|
||
|
Sender: news@accuvax.nwu.edu
|
||
|
Organization: TELECOM Digest
|
||
|
Lines: 15
|
||
|
Approved: Telecom@eecs.nwu.edu
|
||
|
X-Submissions-To: telecom@eecs.nwu.edu
|
||
|
X-Administrivia-To: telecom-request@eecs.nwu.edu
|
||
|
X-Telecom-Digest: Volume 10, Issue 143, Message 2 of 8
|
||
|
News is that Illuminati BBS, a system run by a company named Steve
|
||
|
Jackson Games somewhere in Texas, was also shut down and its equipment
|
||
|
seized by the federal government because two suspected Legion of Doom
|
||
|
members were among its users.
|
||
|
[Moderator's Note: And I suspect the raids will continue during the
|
||
|
next week or two. I wonder which sites will be next? Each place they
|
||
|
raid, the local crackers point their fingers at each other like
|
||
|
naughty children, and to make themselves seem like the good guys they
|
||
|
say, "Have you talked to so-and-so yet?". Let's see now: netsys,
|
||
|
jolnet, attctc, illuminati, (your name here?)... Apparently even
|
||
|
getting rid of incriminating evidence won't work any longer, if
|
||
|
someone upstream of you tattled. PT]
|
||
|
From: mosley@peyote.cactus.org (Bob Mosley III)
|
||
|
Newsgroups: comp.dcom.telecom
|
||
|
Subject: Austin, TX BBS Shut Down From Joinet Bust Fallout
|
||
|
Message-ID: <4723@accuvax.nwu.edu>
|
||
|
Date: 4 Mar 90 17:22:26 GMT
|
||
|
Sender: news@accuvax.nwu.edu
|
||
|
Organization: Capital Area Central Texas Unix Society, Austin, TX
|
||
|
Lines: 28
|
||
|
Approved: Telecom@eecs.nwu.edu
|
||
|
X-Submissions-To: telecom@eecs.nwu.edu
|
||
|
X-Administrivia-To: telecom-request@eecs.nwu.edu
|
||
|
X-Telecom-Digest: Volume 10, Issue 143, Message 1 of 8
|
||
|
This hit most BBS's in the Austin area on Thursday. It's believed
|
||
|
the bust came down Wednesday morning. In a nutshell, here's what
|
||
|
happened:
|
||
|
Wednesday morning, Feb. 28, the offices of Steve Jackson Games, inc.,
|
||
|
were raided by FBI and Secret Service officials. The establishment was
|
||
|
shit down, and all computer systems, including the Illuminati BBS,
|
||
|
were confiscated.
|
||
|
At that time, a 'retired' member of the LoD, who was identified as
|
||
|
'The Mentor' was arrested. The charges reportedly are related to the
|
||
|
recent 911 bust that has shut down joinet and attatc (or whatever
|
||
|
Killerused to be called). His home system was confiscated, complete
|
||
|
with an entire collection of "Phrack" issues and related paraphanalia.
|
||
|
As of this writing, the Mentor is reportedly out on bail, sans system
|
||
|
and network connection. The Illuminati BBS is still down, although SJ
|
||
|
Games is back in operation, and no charges have been filed against any
|
||
|
of the employees other than The Mentor. The systems owned by SJ Games
|
||
|
have not been returned as of this writing.
|
||
|
Finally, rumors were trickling in early this morning (Saturday, 3/4)
|
||
|
that two BBS's in Dallas, three in Houston, and one in San Antonio
|
||
|
were busted by the same authorites in relation to the same case.
|
||
|
[in light of the Mentor's posted defense of the LoD, I kinda thought
|
||
|
you'd like to see this one! - OM]
|
||
|
From: telecom@eecs.nwu.edu (TELECOM Moderator)
|
||
|
Newsgroups: comp.dcom.telecom
|
||
|
Subject: Jolnet, Again
|
||
|
Message-ID: <4701@accuvax.nwu.edu>
|
||
|
Date: 4 Mar 90 02:45:00 GMT
|
||
|
Sender: news@accuvax.nwu.edu
|
||
|
Organization: TELECOM Digest
|
||
|
Lines: 350
|
||
|
Approved: Telecom@eecs.nwu.edu
|
||
|
X-Submissions-To: telecom@eecs.nwu.edu
|
||
|
X-Administrivia-To: telecom-request@eecs.nwu.edu
|
||
|
X-Telecom-Digest: Special: Jolnet, Again
|
||
|
TELECOM Digest Sat, 3 Mar 90 20:45:00 CST Special: Jolnet, Again
|
||
|
Today's Topics: Moderator: Patrick Townson
|
||
|
Re: AT&T Sourcecode: Poison! (Chip Rosenthal)
|
||
|
Jolnet Seizure (Mike Riddle)
|
||
|
Article Regarding JOLNET/e911/LoD/Phrack (Ben Rooney)
|
||
|
A Conversation With Rich Andrews (TELECOM Moderator)
|
||
|
Killer/attctc Permanently Down (Charlie Boykin)
|
||
|
----------------------------------------------------------------------
|
||
|
From: Chip Rosenthal <chip@chinacat.lonestar.org>
|
||
|
Subject: Re: AT&T Sourcecode: Poison!
|
||
|
Date: 3 Mar 90 00:00:00 GMT
|
||
|
Organization: Unicom Systems Development, Austin (yay!)
|
||
|
[Moderator's Note: Original date of 2/25 changed to prevent premature
|
||
|
expiration. PT]
|
||
|
You've got a lot of nerve, Patrick.
|
||
|
telecom@eecs.nwu.edu (TELECOM Moderator) writes:
|
||
|
>We're told by a deep-throat type that AT&T is on the war path about
|
||
|
>their software [...] Like jolnet, netsys went down abruptly, with
|
||
|
>*everything* confiscated [...] Now comes news that attcdc [sic], formerly
|
||
|
>known as killer went off line in a hurry.....
|
||
|
Yessir, after all your complaints about that about anonymous Legion of
|
||
|
Doom message, this is a really crummy thing to post. Based upon
|
||
|
unattributed conversations, you imply that Len Rose and Charlie Boykin
|
||
|
were involved in wrongdoing which lead to the shutdown of their
|
||
|
systems.
|
||
|
I don't know Len personally, but have had uucp connections with him in
|
||
|
the past. Charlie, on the other hand, I do know personally. He is
|
||
|
very well regarded in the Dallas/Fort Worth area, and was voted "1989
|
||
|
DFW Administrator of the Year" by the DFW lunch-bunch...errr....DFW
|
||
|
Association of Unix System Administrators.
|
||
|
You have cast some crummy aspersions towards these guys. Since I know
|
||
|
them, I will wait for the facts to come in. Others who don't know
|
||
|
them could very well jump to conclusions on the basis of this posting.
|
||
|
Was this message really called for?
|
||
|
Chip Rosenthal | Yes, you're a happy man and you're
|
||
|
chip@chinacat.Lonestar.ORG | a lucky man, but are you a smart
|
||
|
Unicom Systems Development, 512-482-8260 | man? -David Bromberg
|
||
|
------------------------------
|
||
|
Date: Wed, 28 Feb 90 21:38:39 EST
|
||
|
From: Mike Riddle <Mike.Riddle@p6.f666.n5010.z1.fidonet.org>
|
||
|
Subject: Jolnet Seizure
|
||
|
Reply-to: Mike.Riddle@p6.f666.n285.z1.fidonet.org
|
||
|
Organization: DRBBS Technical BBS, Omaha, Ne. 402-896-3537
|
||
|
Has anyone tried a novel legal approach to the case of equipment
|
||
|
seizure as "evidence"? As I remember the Electronic Communications
|
||
|
Privacy Act, it contains specific procedures for authorities to obtain
|
||
|
copies/listings of data on a system (which system may have been used
|
||
|
for illegal purposes, but whose operator is not at the moment
|
||
|
charged). From this I think a creative attorney could construct an
|
||
|
argument that the national policy was not to seize equipment, merely
|
||
|
to obtain all the information contained therein. After all, it's the
|
||
|
data that caused any harm.
|
||
|
Also, the Federal Rules of Evidence, and most state rules, provide
|
||
|
that computer generated copies are "originals" for evidentiary
|
||
|
purposes.
|
||
|
I hope that someone close enough to the scene can keep us informed
|
||
|
about what is happening on this one.
|
||
|
{standard disclaimer goes here--don't pay any attention to me!}
|
||
|
--- Ybbat (DRBBS) 8.9 v. 3.07 r.1
|
||
|
* Origin: [1:285/666.6@fidonet] The Inns of Court, Papillion, NE (285/666.6)
|
||
|
--- Through FidoNet gateway node 1:16/390
|
||
|
Mike.Riddle@p6.f666.n5010.z1.fidonet.org
|
||
|
------------------------------
|
||
|
From: brooney@sirius.uvic.ca
|
||
|
Date: 3 Mar 90 2:36 -0800
|
||
|
Subject: Article Regarding JOLNET/e911/LoD/Phrack
|
||
|
The following is an article I received five days ago which contains, to my
|
||
|
knowledge, information as yet unpublished in comp.dcom.telecom regarding the
|
||
|
ongoing JOLNET/e911/LoD discussion. It was printed in a weekly magazine
|
||
|
with a publishing date of Feb. 27 but other than that I have no exact idea
|
||
|
of when the events mentioned herein took place.
|
||
|
- Ben Rooney
|
||
|
MISSOURI STUDENT PLEADS INNOCENT TO 911 CHARGES
|
||
|
[Knight Lightning], a 19-year-old University of Missouri student, has
|
||
|
pleaded not guilty to federal allegations that he invaded the 911
|
||
|
emergency phone network for 9 states.
|
||
|
As reported earlier, he was indicted this month along with [The Prophet],
|
||
|
20, of Decatur, Ga. Both are charged with interstate
|
||
|
transportation of stolen property, wire fraud, and violations of the
|
||
|
federal Computer Fraud and Abuse Act of 1986.
|
||
|
Prosecutors contend the two used computers to enter the 911 system of
|
||
|
Atlanta's Bell South, then copied the program that controls and
|
||
|
maintains the system. The stolen material later allegedly was
|
||
|
published on a computer bulletin board system operating in the Chicago
|
||
|
suburb of Lockport. Authorities contend Neidorf edited the data for
|
||
|
an electronic publication known as "Phrack."
|
||
|
According to Associated Press writer Sarah Nordgren, in a recent
|
||
|
hearing on the case Assistant U.S. Attorney William Cook was granted a
|
||
|
motion to prevent the 911 program from becoming part of the public
|
||
|
record during the trial. U.S. District Judge Nicholas Bua set April
|
||
|
16 for a trial.
|
||
|
The 911 system in question controls emergency calls to police, fire,
|
||
|
ambulance and emergency services in cities in Alabama, Mississippi,
|
||
|
Georgia, Tennessee, Kentucky, Louisiana, North Carolina, South
|
||
|
Carolina and Florida.
|
||
|
---------------------------------------
|
||
|
Article from "A Networker's Journal" by Charles Bowen.
|
||
|
Info-Mat Magazine (Vol. 6, No. 2)
|
||
|
[Moderator's Note: {Info-Mat Magazine}, by the way, is the excellent
|
||
|
electronic journal distributed on many BBS machines throughout the
|
||
|
United States who are fortunate enough to be accepted as part of the
|
||
|
magazine's distribution network. I personally wish it was distributed
|
||
|
on Usenet as well: it is well written and very informative. PT]
|
||
|
------------------------------
|
||
|
Date: Sat, 3 Mar 90 19:34:54 CST
|
||
|
From: TELECOM Moderator <telecom@eecs.nwu.edu>
|
||
|
Subject: A Conversation With Rich Andrews
|
||
|
After the first articles appeared here relating to the seizure of
|
||
|
Jolnet, and the indictment of some people for their part in the theft
|
||
|
of '911 software', I got various messages from other folks in
|
||
|
response. Some were published, while others were just personal
|
||
|
correspondence to me. One from Chip Rosenthal was held over, and is
|
||
|
included in this special issue today.
|
||
|
One writer, whose comments were attributed to 'Deep Throat' spent some
|
||
|
time on two occassions on the phone, in a conference call between
|
||
|
himself, David Tamkin and myself.
|
||
|
What was lacking in the several messages which appeared over the past
|
||
|
week were comments from Rich Andrews, system administrator of Jolnet.
|
||
|
I got one note from someone in Canada who said Andrews wanted to speak
|
||
|
with me, and giving a phone number where I could call Andrews at his
|
||
|
place of employment.
|
||
|
I put in a call there, with David Tamkin on the other line and had a
|
||
|
long discussion with Andrews, who was aware of David being on the line
|
||
|
with me. I asked Andrews if he had any sort of net access available
|
||
|
to him at all -- even a terminal and modem, plus an account on some
|
||
|
site which could forward his mail to telecom. You see, I thought, and
|
||
|
still think it is extremely important to include Rich Andrews in any
|
||
|
discussion here.
|
||
|
He assured me he did have an account on a Chicago area machine, and
|
||
|
that a reply would be forthcoming within hours. I had a second
|
||
|
conversation with him the next morning, but without David on the line.
|
||
|
He again told me he would have a response to the several articles
|
||
|
written in the Digest ready and in the email 'very soon'. This was on
|
||
|
Wednesday morning, and we estimated his message would be here sometime
|
||
|
later in the day -- certainly by midnight or so, when I am typically
|
||
|
working up an issue of the Digest.
|
||
|
Midnight came and went with no message. None showed up Thursday or
|
||
|
Friday. I deliberatly withheld saying anything further in the hopes
|
||
|
his reply would be here to include at the same time. I guess at this
|
||
|
point we have to go on without him.
|
||
|
When David Tamkin and I talked to him the first time, on Tuesday
|
||
|
evening this past week, the first thing Andrews said to us, after the
|
||
|
usual opening greetings and chitchat was,
|
||
|
"I've been cooperating with them for over a year now. I assume you
|
||
|
know that."
|
||
|
We asked him to define 'them'. His response was that 'them' was the
|
||
|
United States Secret Service, and the Federal Bureau of Investigation.
|
||
|
He said this without us even asking him if he was doing so.
|
||
|
We asked him to tell us about the raid on his home early in February.
|
||
|
He said the agents showed up that Saturday afternoon with a warrant,
|
||
|
and took everything away as 'evidence' to be used in a criminal
|
||
|
prosecution.
|
||
|
ME> "If you have been working and cooperating with them for this long,
|
||
|
why did they take your stuff?"
|
||
|
RA> "They wanted to be sure it would be safe, and that nothing would be
|
||
|
destroyed."
|
||
|
ME> "But if you wanted to simply keep files safe, you could have taken
|
||
|
Jolnet off line for a few weeks/months by unplugging the modems from
|
||
|
the phone jacks, no? Then, plugged in a line when you wanted to call
|
||
|
or have a trusted person call you."
|
||
|
RA> "They thought it was better to take it all with them. It was mostly
|
||
|
for appearance sake. They are not charging me with anything."
|
||
|
ME> "Seems like a funny way to treat a cooperative citizen, at least
|
||
|
one who is not in some deep mess himself."
|
||
|
He admitted to us that several crackers had accounts on Jolnet, with
|
||
|
his knowledge and consent, and that it was all part of the investigation
|
||
|
going on ... the investigation he was cooperating in.
|
||
|
Here is how he told the tale of the '911 software':
|
||
|
The software showed up on his system one day, almost two years ago. It
|
||
|
came to him from netsys, where Len Rose was the sysadmin. According to
|
||
|
Andrews, when he saw this file, and realized what it was, he knew the
|
||
|
thing to do was to 'get it to the proper authorities as soon as
|
||
|
possible', so he chose to do that by transferring it to the machine
|
||
|
then known as killer, a/k/a attctc, where Charlie Boykin was the
|
||
|
sysadmin.
|
||
|
Andrews said he sent it to Boykin with a request that Boykin pass it
|
||
|
along to the proper people at AT&T.
|
||
|
ME> "After you passed it along to Boykin, did you then destroy the
|
||
|
file and get it off your site?"
|
||
|
RA> "Well, no... I kept a copy also."
|
||
|
ME> "Did Charlie Boykin pass it along to AT&T as you had requested?"
|
||
|
RA> "I assume he did."
|
||
|
But then, said Andrews, a funny thing happened several months later.
|
||
|
The folks at AT&T, instead of being grateful for the return of their
|
||
|
software came back to Andrews to (in his words) 'ask for it again.'
|
||
|
Somehow, they either never got it the first time; got it but suspected
|
||
|
there were still copies of it out; or were just plain confused.
|
||
|
So he was contacted by the feds about a year ago, and it was at that
|
||
|
point he decided it was in his best interest to cooperate with any
|
||
|
investigation going on.
|
||
|
Andrews pointed out that the '911 software' was really just ".... a
|
||
|
small part of what this is all about..." He said there was other
|
||
|
proprietary information going around that should not be circulating.
|
||
|
He said also the feds were particularly concerned by the large number
|
||
|
of break-ins on computers which had occurred in the past year or so.
|
||
|
He said there have been literally "....thousands of attempts to break
|
||
|
into sites in the past year....", and part of his cooperation with the
|
||
|
authorities at this time dealt with information on that part of it.
|
||
|
We asked him about killer/attctc:
|
||
|
ME> "You knew of course that killer went off line very abruptly about
|
||
|
a week ago. What caused that? It happened a week or so after the feds
|
||
|
raided you that Saturday."
|
||
|
RA> "Well the official reason given by AT&T was lack of funds, but you
|
||
|
know how that goes...."
|
||
|
Now you'd think, wouldn't you, that if it was a funding problem -- if
|
||
|
you can imagine AT&T not having the loose change in its corporate
|
||
|
pocket it took to provide electrical power and phone lines to attctc
|
||
|
(Charlie got no salary for running it) -- that at least an orderly
|
||
|
transition would have taken place; i.e. an announcement to the net; an
|
||
|
opportunity to distribute new maps for mail and news distribution,
|
||
|
etc; and some forthcoming shut down date -- let's say March 1, or
|
||
|
April 1, or the end of the fiscal year, or something....
|
||
|
But oh, no... crash boom, one day it is up, the next day it is gone.
|
||
|
ME> "What do you know about the temporary suspension of killer some
|
||
|
time ago? What was that all about?"
|
||
|
RA> "It was a security thing. AT&T Security was investigating Charlie
|
||
|
and some of the users then."
|
||
|
Andrews referred to the previous shutdown of killer as 'a real blunder
|
||
|
by AT&T', but it is unclear to me why he feels that way.
|
||
|
We concluded our conversation by Andrews noting that "there is a lot
|
||
|
happening out there right now."
|
||
|
He said the [Phrack] magazine distribution, via netsys, attctc and
|
||
|
jolnet was under close review. "One way to get them (crackers) is by
|
||
|
shutting down the sites they use to distribute stuff..."
|
||
|
And now, dear reader, you know everything I know on the subject. Well,
|
||
|
almost everything, anyway....
|
||
|
From other sources we know that Len Rose of netsys was in deep
|
||
|
trouble with the law *before* this latest scandal. How deep? Like he
|
||
|
was ready to leave the country and go to the other side of the world
|
||
|
maybe? Like he was in his car driving on the expressway when they
|
||
|
pulled him over, stopped the car and placed him under arrest? Deep
|
||
|
enough? This latest thing simply compounded his legal problems.
|
||
|
Patrick Townson
|
||
|
------------------------------
|
||
|
Date: Fri Mar 2 06:59:23 1990
|
||
|
From: Charlie Boykin <cfb@sulaco.sigma.com>
|
||
|
Subject: Killer/attctc Is Permanently Down
|
||
|
Hello,
|
||
|
Regarding a couple of things as well as a message from Bill Huttig.
|
||
|
The system WAS shut down a couple of years ago - for three weeks -
|
||
|
as part of a security inquiry. It has been in continous operation
|
||
|
since. On July 4, 1989, it was moved to a Customer Demonstration
|
||
|
location at the Dallas Infomart and the node name changed to attctc
|
||
|
(for AT&T Customer Technology Center). The system was closed down on
|
||
|
February 20, 1990 after 5 years of operation. There are no charges
|
||
|
pending and the "management" of the system have been ostensibly
|
||
|
cleared of any illegal activities.
|
||
|
As of now, there are no intentions of returning the system to
|
||
|
service. There are hopeful plans and proposals that could conceivably
|
||
|
result in the system being placed back in service in a different
|
||
|
environment and under different management.
|
||
|
Respectfully,
|
||
|
Charles F. Boykin
|
||
|
Formerly sysop\@attctc (killer)
|
||
|
------------------------------
|
||
|
End of TELECOM Digest Special: Jolnet, Again
|
||
|
******************************
|
||
|
---------------
|
||
|
[reprinted without permission from the Feb. 12th, 1990 issue of Telephony]
|
||
|
ALLEGED HACKERS CHARGED WITH THEFT OF 911 DATA
|
||
|
Dawn Bushaus, Assistant Editor
|
||
|
Four alleged computer hackers were indicted last week on charges that they
|
||
|
schemed to steal and publish proprietary BellSouth Corp. emergency data. The
|
||
|
alleged activity could have produced disruptions in 911 networks nationwide,
|
||
|
according to federal officials.
|
||
|
The case could raise new concerns about the security of local exchange
|
||
|
carriers' internal computer networks, which house data records on customers,
|
||
|
equipment and operations.
|
||
|
"Security has always been a concern for the telephone companies," said
|
||
|
Peter Bernstein, an analyst with Probe Research. "If you can crack the 911
|
||
|
system, what does that say about the operational support system or the billing
|
||
|
system?"
|
||
|
A federal grand jury in Chicago handed down two indictments charging
|
||
|
[The Prophet], 20, of Decatur, Ga., and [Knight Lightning], 19, of
|
||
|
Chesterfield, Mo., with wire fraud, violations of the 1986 Computer Fraud Act
|
||
|
and interstate transportation of stolen property.
|
||
|
Facing similar criminal charges in Atlanta are [The Urvile], 22, and
|
||
|
[The Leftist], 23.
|
||
|
The four, alleged to be part of a closely knit group of hackers calling
|
||
|
themselves the Legion of Doom, reportedly participated in a scheme to steal the
|
||
|
BellSouth 911 data, valued at $80,000, and publish it in a hacker magazine
|
||
|
known as "Phrack."
|
||
|
The Legion of Doom reportedly is known for entering telephone companies'
|
||
|
central office switches to reroute calls, stealing computer data and giving
|
||
|
information about accessing computers to fellow hackers.
|
||
|
According to the Chicago indictment, XXXXX, also known as "The Prophet,"
|
||
|
stole a copy of the BellSouth 911 program by using a computer outside the
|
||
|
company to tap into the BellSouth computer. Riggs then allegedly transferred
|
||
|
the data to a computer bulletin board in Lockport, Ill.
|
||
|
XXXXXXX, also known as "Knight Lightning," reportedly downloaded the
|
||
|
information into his computer at the University of Missouri, Columbia, where he
|
||
|
edited it for publication in the hacker magazine, the indictment said.
|
||
|
The indictment also charges that the hackers disclosed the stolen
|
||
|
information about the operation of the enhanced 911 system to other hackers so
|
||
|
that they could illegally access the system and potentially disrupt or halt
|
||
|
other systems across the country.
|
||
|
The indictments followed a year-long investigation, according to U.S.
|
||
|
Attorney Ira Raphaelson. If convicted, the alleged hackers face 31 to 32 years
|
||
|
in prison and $122,000 in fines.
|
||
|
A BellSouth spokesman said the company's security system discovered the
|
||
|
intrusion, which occurred about a year ago, and the company then notified
|
||
|
federal authorities.
|
||
|
Hacker invasion in the BellSouth network is very rare, the spokesman said,
|
||
|
adding that the company favors "stringent laws on the matter."
|
||
|
The indictment solicited concern about the vulnerability of the public
|
||
|
network to computer hacking.
|
||
|
----------------
|
||
|
From: MM02885@swtexas.bitnet
|
||
|
Newsgroups: comp.dcom.telecom
|
||
|
Subject: Re: Hacker Group Accused of Scheme Against BellSouth
|
||
|
Message-ID: <4153@accuvax.nwu.edu>
|
||
|
Date: 20 Feb 90 11:16:00 GMT
|
||
|
Sender: news@accuvax.nwu.edu
|
||
|
Organization: TELECOM Digest
|
||
|
Lines: 95
|
||
|
Approved: Telecom@eecs.nwu.edu
|
||
|
X-Submissions-To: telecom@eecs.nwu.edu
|
||
|
X-Administrivia-To: telecom-request@eecs.nwu.edu
|
||
|
X-Telecom-Digest: Volume 10, Issue 118, message 3 of 6
|
||
|
<<< SYS$ANCILLARY:[NOTES$LIBRARY]GENERAL.NOTE;1 >>>
|
||
|
-< General Discussion >-
|
||
|
==============================================================================
|
||
|
Note 155.6 the MENTOR of the tree tops 6 of 6
|
||
|
SWT::RR02026 "Ray Renteria [ F L A T L I N E ] " 89 lines 20-FEB-1990 00:18
|
||
|
-< Life, The Universe, & LOD >-
|
||
|
To set the record straight, a member of LOD who is a student in Austin
|
||
|
and who has had his computer account at UT subpoenaed by the DA out of
|
||
|
Chicago because of dealings with the above happenings:
|
||
|
My name is Chris, but to the computer world, I am Erik Bloodaxe. I
|
||
|
have been a member of the group known as Legion of Doom since its
|
||
|
creation, and admittedly I have not been the most legitimate computer
|
||
|
user around, but when people start hinting at my supposed
|
||
|
Communist-backed actions, and say that I am involved in a world-wide
|
||
|
consipracy to destroy the nations computer and/or 911 network, I have
|
||
|
to speak up and hope that people will take what I have to say
|
||
|
seriously.
|
||
|
Frank, Rob and Adam were all definately into really hairy systems.
|
||
|
They had basically total control of a packet-switched network owned by
|
||
|
Southern Bell (SBDN)...through this network they had access to every
|
||
|
computer Southern Bell owned...this ranging from COSMOS terminals up
|
||
|
to LMOS front ends. Southern Bell had not been smart enough to
|
||
|
disallow connections from one public pad to another, thus allowing
|
||
|
anyone who desired to do so, the ability to connect to, and seize
|
||
|
information from anyone else who was using the network...thus they
|
||
|
ended up with accounts and passwords to a great deal of systems.
|
||
|
This was where the 911 system came into play. I don't know if this
|
||
|
system actually controlled the whole Southern Bell 911 network, or if
|
||
|
it was just a site where the software was being developed, as I was
|
||
|
never on it. In any case, one of the trio ended up pulling files off
|
||
|
of it for them to look at. This is usually standard proceedure: you
|
||
|
get on a system, look around for interesting text, buffer it, and
|
||
|
maybe print it out for posterity. No member of LOD has ever (to my
|
||
|
knowledge) broken into another system and used any information gained
|
||
|
from it for personal gain of any kind...with the exception of maybe a
|
||
|
big boost in his reputation around the underground. Rob took the
|
||
|
documentation to the system and wrote a file about it. There are
|
||
|
actually two files, one is an overview, the other is a glossary. (Ray
|
||
|
has the issue of PHRACK that has the files) The information is hardly
|
||
|
something anyone could possibly gain anything from except knowledge
|
||
|
about how a certain aspect of the telephone company works.
|
||
|
The Legion of Doom used to publish an electronic magazine called the
|
||
|
LOD Technical Journal. This publication was kind of abandoned due to
|
||
|
laziness on our part. PHRACK was another publication of this sort,
|
||
|
sent to several hundred people over the Internet, and distributed
|
||
|
widely on bulletin boards around the US. Rob sent the files to PHRACK
|
||
|
for the information to be read. One of PHRACK's editors, Craig,
|
||
|
happened to be the one who received the files. If Rob had sent the
|
||
|
files to one address higher, Randy would have been the one who would
|
||
|
probably be in trouble. In anycase, Craig, although he may have
|
||
|
suspected, really had no way to know that the files were propriatary
|
||
|
information and were stolen from a Southern Bell computer.
|
||
|
The three Atlanta people were busted after having voice and data taps
|
||
|
on their lines for 6 months. The Phrack people were not busted, only
|
||
|
questioned, and Craig was indicted later.
|
||
|
What I don't understand is why Rob and Craig are singled out more
|
||
|
often than any other people. Both of them were on probation for other
|
||
|
incidents and will probably end up in jail due to probation violations
|
||
|
now. Frank and Adam still don't know what is going on with their
|
||
|
cases, as of the last time I spoke with them.
|
||
|
The whole bust stemmed from another person being raided and rolling
|
||
|
over on the biggest names he could think of to lighten his burden.
|
||
|
Since that time, Mr. William Cook, the DA in Chicago, has made it his
|
||
|
life's goal to rid the world of the scourge of LOD. The three Atlanta
|
||
|
busts, two more LOD busts in New York, and now, my Subpoena.
|
||
|
People just can't seem to grasp the fact that a group of 20 year old
|
||
|
kids just might know a little more than they do, and rather than make
|
||
|
good use of us, they would rather just lock us away and keep on
|
||
|
letting things pass by them. I've said this before, you cant stop
|
||
|
burglars from robbing you when you leave the doors unlocked and merely
|
||
|
bash them in the head with baseball bats when they walk in. You need
|
||
|
to lock the door. But when you leave the doors open, but lock up the
|
||
|
people who can close them for you another burglar will just walk right
|
||
|
in.
|
||
|
If anyone really wants to know anything about what is going on or just
|
||
|
wants to offer any opinions about all this directly to me, I'm
|
||
|
erikb@walt.cc.utexas.edu
|
||
|
but my account is being monitored so don't ask anything too explicit.
|
||
|
->ME
|
||
|
-----------
|
||
|
Well, as some of you may already know, the people that put out Phrack were
|
||
|
busted recently. Up until now, details were scarce, but things are starting to
|
||
|
appear in the news.
|
||
|
[reprinted without permission from the Milwaukee Journal Wed. Feb. 7th]
|
||
|
Chicago, Ill. - AP - A computer hacker broke into the 911 emergency
|
||
|
telephone network covering nine states in the South and another intruder passed
|
||
|
on the access data to other hackers, authorities said.
|
||
|
[The Prophet], 20, of Decatur, GA., and [Knight Lightning],
|
||
|
19, of Chesterfield, MO., were indicted Tuesday by
|
||
|
a federal grand jury and accused of computer crimes, said acting US Atty. Ira
|
||
|
H. Raphaelson.
|
||
|
He said Riggs was a member of the so-called Legion of Doom hackers
|
||
|
group, whose members are involved in numerous illegal activities.
|
||
|
Riggs and two other alleged members also were indicted in Atlanta and
|
||
|
charged in other computer break-ins.
|
||
|
The government would not say if any emergency calls were disrupted or
|
||
|
whether other damage was done during the tampering.
|
||
|
------------
|
||
|
Name: The Prophet #104
|
||
|
Date: Tue Feb 06 23:55:15 1990
|
||
|
Imagine that you're deaf, dumb, blind, and paralyzed from the neck down and
|
||
|
totally unable to experience or communicate with the outside world. How long
|
||
|
could you retain your sanity? How many of you would choose to die instead?
|
||
|
How many of you think you could muster the willpower to create your own little
|
||
|
mental world to live in for the rest of your life, and how long do you think
|
||
|
the hospital would wait before putting you out of your misery?
|
||
|
-The Prophet
|
||
|
------------
|
||
|
Name: The Mentor #1
|
||
|
Date: Sat Jan 20 02:58:54 1990
|
||
|
Welp, Phrack magazine is dead. Those of you who pay attention to BITNET know
|
||
|
that the phrack accounts at U of M have been shut down. The story is as
|
||
|
follows...
|
||
|
Government agents (not sure of the dept., probably SS) have apparently been
|
||
|
monitoring the e-mail of the Phrack kids (Knight Lightning & Taran King) for
|
||
|
some time now. Apparently, a portion of a file sent to them (and subsequently
|
||
|
published) contained copyrighted information. This is all they needed. They
|
||
|
have now seized the entire Phrack net mailing list (over 500 accounts), plust
|
||
|
every piece of information that Randy & Craig have (and they have a *LOT*) on
|
||
|
real names, addresses and phone numbers.
|
||
|
This is evolving directly out of the busts of three LOD members (Urvile,
|
||
|
Leftist & Prophet). The Prophet (who is on probation) is apparently being
|
||
|
threatened with a prison term if he doesn't cooperate. We don't know for sure
|
||
|
if he cooperated or not, but what would you do in the same position?
|
||
|
The same officials are apparently *VERY* interested in our co-sys, Mr.
|
||
|
Bloodaxe. His net account is being watched, etc. I'll let him tell the story.
|
||
|
board only. I will be adding a secure (and I mean fucking secure) encryption
|
||
|
routine into the e-mail in the next 2 weeks - I haven't decided exactly how to
|
||
|
implement it, but it'll let two people exchange mail encrypted by a password
|
||
|
only know to the two of them. Hmmmm... carry this conversation to the
|
||
|
programming board.
|
||
|
Anyway, I do not think I am due to be busted, but then again, I don't do
|
||
|
anything but run a board. Still, there is that possibility. I assume that my
|
||
|
lines are all tapped until proven otherwise.
|
||
|
There is some question to the wisdom of leaving the board up at all, but I hae
|
||
|
(have) personally phoned several government investigators and invited them to
|
||
|
join us here on the board. If I begin to feel that the board is putting me in
|
||
|
any kind of danger, I'll pull it down with no notice - I hope everyone
|
||
|
understands.
|
||
|
It looks like it's sweeps-time again for the feds. Let's hope all of us are
|
||
|
still around in 6 months to talk about it.
|
||
|
The Mentor
|
||
|
Legion of Doom!
|
||
|
[Phoenix Project has been down for some time now.]
|
||
|
---------------
|
||
|
Newsgroups: comp.dcom.telecom
|
||
|
Subject: The Purpose and Intent of the Legion of Doom
|
||
|
Message-ID: <4248@accuvax.nwu.edu>
|
||
|
From: anytown!legion@cs.utexas.edu (Legion of Doom)
|
||
|
Date: 22 Feb 90 04:42:04 GMT
|
||
|
Sender: news@accuvax.nwu.edu
|
||
|
Organization: Anytown USA
|
||
|
Approved: Telecom@eecs.nwu.edu
|
||
|
X-Submissions-To: telecom@eecs.nwu.edu
|
||
|
X-Administrivia-To: telecom-request@eecs.nwu.edu
|
||
|
X-Telecom-Digest: Volume 10, Issue 121, message 4 of 5
|
||
|
Lines: 51
|
||
|
[Moderator's Note: This anonymous message came in the mail today. PT]
|
||
|
Well, I had to speak up. There has been a lot of frothing (mostly by
|
||
|
people who believe everything that they read in the paper) about
|
||
|
Legion of Doom. I have been involved in the group since 1987, and
|
||
|
dislike seeing irresponsible press concerning our "plot to crash 911"
|
||
|
or our "links to organized crime."
|
||
|
LOD was formed to bring together the best minds from the computer
|
||
|
underground - not to do any damage or for personal profit, but to
|
||
|
share experiences and discuss computing. The group has *always*
|
||
|
maintained the highest ethical standards of hacker (or "cracker," as
|
||
|
you prefer) ethics. On many occasions, we have acted to prevent abuse
|
||
|
of systems that were *dangerous* to be out - from government systems
|
||
|
to Easter Seals systems. I have known the people involved in this 911
|
||
|
case for many years, and there was *absolutely* no intent to interfere
|
||
|
with or molest the 911 system in any manner. While we have
|
||
|
occasionally entered a computer that we weren't supposed to be in, it
|
||
|
is grounds for expulsion from the group and social ostracism to do any
|
||
|
damage to a system or to attempt to commit fraud for personal profit.
|
||
|
The biggest crime that has been committed is that of curiosity. Kim,
|
||
|
your 911 system is safe (from us, at least). We have been instrumental
|
||
|
in closing many security holes in the past, and had hoped to continue
|
||
|
to do so in the future. The list of computer security people who count
|
||
|
us as allies is long, but must remain anonymous. If any of them choose
|
||
|
to identify themselves, we would appreciate the support.
|
||
|
I am among the people who no longer count themselves as "active"
|
||
|
members of the group. I have been "retired" for well over a year. But
|
||
|
I continue to talk to active members daily, and support the group
|
||
|
through this network feed, which is mail-routed to other LODers, both
|
||
|
active and accessible.
|
||
|
Anyone who has any questions is welcome to mail us - you'll find us
|
||
|
friendly, although a bit wary. We will also be glad to talk voice with
|
||
|
anyone if they wish to arrange a time to call. In spite of all the
|
||
|
media garbage, we consider ourselves an ethical, positive force in
|
||
|
computing and computer security. We hope others will as well.
|
||
|
The Mentor/Legion of Doom
|
||
|
legion%anytown.uucp@cs.utexas.edu
|
||
|
[Moderator's Note: As an 'ethical, positive force in computing', why
|
||
|
can't you sign your name to messages such as the above? Usually I
|
||
|
don't even consider anonymous messages for publication in the Digest;
|
||
|
but your organization has a perfect right to tell your side of the
|
||
|
story, and I am derelict if I don't print it. Real names and
|
||
|
addresses go a long way toward closing credibility gaps here. PT]
|
||
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
||
|
There you go. It's over now, forget it and move on. Nothing more to
|
||
|
report on the subject that hasn't been printed, typed, spoken, or heard in the
|
||
|
last couple of months.
|
||
|
|
||
|
_______________________________________________________________________________
|
||
|
Phrack 31 - .end
|
||
|
|
||
|
|
||
|
|