home *** CD-ROM | disk | FTP | other *** search
-
- Computer underground Digest Sun Oct 30, 1994 Volume 6 : Issue 94
- ISSN 1004-042X
-
- Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
- Archivist: Brendan Kehoe
- Retiring Shadow Archivist: Stanton McCandlish
- Shadow-Archivists: Dan Carosone / Paul Southworth
- Ralph Sims / Jyrki Kuoppala
- Ian Dickinson
- Mini-biscuit editor: Guy Demau Passant
-
- CONTENTS, #6.94 (Sun, Oct 30, 1994)
-
- File 1--Interview with Erik Bloodaxe (GRAY AREAS REPRINT)
- File 2--Cu Digest Header Information (unchanged since 23 Oct 1994)
-
- CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
- THE CONCLUDING FILE AT THE END OF EACH ISSUE.
-
- ----------------------------------------------------------------------
-
- Date: Sun, 30 Oct 1994 18:22:12 CDT
- From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 1--Interview with Erik Bloodaxe (GRAY AREAS REPRINT)
- ((MODERATORS' NOTE: The following are portions of an interview with
- "Erik Bloodaxe" by Netta Gilboa of Gray Areas Magazine. Gray Areas is
- an eclectic arts and culture magazine that focuses on the fringes of
- society. It's one of the best sources for information on rock and
- alternative music, controversial social issues, computer culture, and
- other topics that aren't covered elsewhere. It's a steal $18 for four
- issues, or $50 for three years. For information, write:
-
- Gray Aras
- PO Box 808
- Broomall, PA 19008-0808
-
- Or, e-mail them at grayarea@well.sf.ca.us
-
- For those new to computer culture, "erik bloodaxe" was a member of
- the original "Legion of Doom," a modest media celebrity, and
- more recently, the editor of Phrack)).
-
- ((Excerpts from interview with Chris Goggans at Pumpcon, 1993. From:
- GRAY AREAS, Fall, 1994 (Vol 3, #2): pp 27-50))
-
- (A.K.A. ERIK BLOODAXE)
-
- By Netta Gilboa
-
- Netta Gilboa: What is Phrack magazine?
-
- Chris Goggans: Phrack is the longest running underground publication.
- I don't really know how to describe Phrack. Phrack just sort of is.
- Phrack is an electronic magazine that deals with topics of interest to
- the computer underground; different types of operating systems,
- weaknesses in system architectures; telephony; anything of any
- relevance to the community in which it was intended for, that being
- the computer underground. It has always tried to paint a picture of
- the social aspects of the computer underground rather than focus
- entirely on technical issues. So in that way it adds a lot of color to
- what's going on.
-
- GA: How did you get involved with publishing Phrack?
-
- CG: Well, I got involved when the person who was editing it at the
- time, Dispater, got into a motorcycle accident and as a result of
- this, had a lot of other financial hardships, so he wasn't going to be
- able to do it any longer. Its original editors, Craig Neidorf (Knight
- Lightning) and Taran King, had no interest in doing it themselves any
- longer for, at least in Craig's case, obvious personal reasons, and
- there really was no one else who could take it over. I was of the
- mind set that Phrack had been around so long that it had almost become
- something of an institution. I, being so ridiculously nostalgic and
- sentimental, didn't want to see it just stop, even though a lot of
- people always complain about the content and say, "Oh, Phrack is lame
- and this issue didn't have enough info, or Phrack was great this
- month, but it really sucked last month." You know, that type of thing.
- Even though some people didn't always agree with it and some people
- had different viewpoints on it, I really thought someone needed to
- continue it and so I kind of volunteered for it. And there was a
- little bit of discussion amongst some people.
-
- First Craig was really hesitant to say, "Yeah, well maybe you should
- take it over." A lot of this was being held up by Taran King who said,
- "Well, we just don't want your politics getting involved." Because,
- apparently, I have some hidden political agenda that differed with
- what they thought the role of Phrack should play. Eventually they
- decided that there is really no one else who could do a job well
- enough to continue it in the spirit in which it had been formed and I
- started with issue 42. And I think that one went over very well. That
- issue was pretty hilarious because it had a lot of stuff about packet
- switching networks, and it was a big slap in the face to B.T. Tymnet.
- I had a whole lot of fun with that issue. Since then, it's gone over
- really well, at least from everyone I've talked to. Of course there'
- have always been a few dissenters that say, Oh, Phrack sucks, but
- these are the same people who won't tell you why. They're just saying
- it to try to get a rise out of me or something, but everybody seems to
- appreciate the time and effort that goes into putting this out and
- especially since I'm getting nothing out of it.
-
- There's kind of a funny side to that. After I took it over, I went
- ahead and I registered it with the Library of Congress and I filed a
- DBA as Phrack magazine and for the first issue I put out a license
- agreement, sort of, at the beginning saying that any corporate,
- government or law enforcement use or possession of this magazine
- without prior registration with me was a violation of the Copyright
- Law, blah, blah, blah, this and that and Phrack was free to qualified
- subscribers; however, in order to qualify as a qualified subscriber,
- one must be an amateur computer hobbyist with no ties to such a thing.
- And this really went over like a ton of bricks with some people. A
- lot of corporate people immediately sent back, "Please remove my name
- from the list." I had a few other people say, well, "We're going to
- pay, but don't tell anybody we're going to pay." Of course, they never
- did. There was only one person who actually did pay, so, you know, I
- used that as wonderful ammunition for the next issue saying that all
- of them are lying, cheating scums and they have no respect for our
- information so why should they think it odd that we have any respect
- for theirs.
-
- GA: And you actually named a few people.
-
- CG: Yeah, I named several people who were not only getting the
- magazine but in one case, they were spreading it around and, of
- course, none of them even contacted me for registration. It was all,
- I had a riot with it. It was a lot of fun. And, I'm still going to
- include that in every issue because I still expect them, if they're
- going to be reading my magazine, to please have some shred of decency
- and pay the registration fee, since it's a lot less than any other
- trade publication that they'd be buying regardless, and certainly a
- lot more voluminous and contains a lot more information than they're
- going to find in any other magazine dealing with computer security.
-
- GA: Is the agenda for that decision to get publicity, to have grounds
- to sue people who you don't like, or to gain financially?
-
- CG: Well, I never expected to gain anything financially. You know, a
- lot of the people who are still in the so-called "underground" are
- also working in various fields which might put them in conflict with
- the registration agreements, and we're very liberal about that. I
- mean, if someone just because they're working at, let's say...
-
- GA: Gray Areas, Inc.
-
- CG: Yeah, Gray Areas, Inc. or the people who might be independent,
- like LAN consultants, you know, just 'cause someone's working in the
- field, I'm real flexible about that. Then if someone sends me mail,
- and I get a lot like that, which says, "Well, I'm assistant
- administrator here at the university and there's no way they'll pay
- for it." I'm like, "Don't worry about it." You know, "We'll make an
- exemption in your case." But it's the people, the Gene Stafford's of
- the world, the Ed DeHart's of the world. Those are the people who
- have always pointed the finger at the people who this information is
- intended for and called them bad. They're the ones who don^Rt register
- their subscriptions and the people of their mind set and the people of
- their ilk, I guess.
-
- As far as publicity, it didn't gain any publicity. It wasn't any kind
- of stunt. My biggest concern in doing this was to try to protect this
- information and I didn't want to see it being resold. With the prior
- Phracks up 'til 41, there are companies out there, for example Onion
- Press who sells hard copies of Phrack, and I don't want anything that
- I'm putting time and effort into being resold. I don't want it in the
- CD-ROMs. There's are several CD-ROMs out right now with a bunch of
- text files from the computer underground.
-
- So, I wanted to copyright this information, put it out. It's a
- magazine, I'm doing it, it's my magazine. The DBA is in my name, I
- hold the copyright and no one's going to resell this. If it's going to
- be presented in some other format, I want to be able to control that.
- And, it's not necessarily a kind of power play. It's just I want to
- protect it. I mean, I don't think you'd appreciate people all of a
- sudden saying, "Now I'm going to put up the electronic version of Gray
- Areas."
-
- =======================
-
- GA: Many years ago, Phrack had a problem with a telephone company
- regarding a document that they printed, and a lot of people have said
- that if it was a paper publication as opposed to an electronic
- publication, that might never have happened.
-
- CG: Yeah, well, I mean, that's obvious. You look at magazines like
- 2600 and just because they're black letters on a white page instead of
- white letters on a black screen, they get away with a lot of stuff.
- They get threatening letters from Bell Cores. They like to publish
- them in their magazine, but they haven't been taken to task for any of
- that. You don't see them in any sort of court for this and the mere
- fact that the very document that they are saying was so proprietary
- was available for $19.95 from the Bell Core order line. That sort of
- stands to prove that they were just looking for a scapegoat, a
- figurehead in the underground community to use as an example for the
- rest of the people to say, "Well, we^Rll take down Phrack. That'll
- show them. That'll scare them."
-
- It's the same kind of thing that they tried to do with The Legion of
- Doom. They said, "Well, we took down the Legion of Doom." I heard it
- from one person, you know, you cut off the head, the body will die.
- It's like, AT&T or somebody had somebody map out the computer
- underground, they had Phrack magazine in the middle of a hub and the
- Legion of Doom above that; arrows going and pointing out how the
- computer underground networks together, and obviously, these people
- think there's a little more structure to it than there is. They don't
- realize that it's complete anarchy. I mean, no one's controlling
- anybody else's actions. To set out one example and hope that everybody
- else is going to learn from that one example is ludicrous.
-
- GA: What sort of problems do you encounter publishing it?
-
- CG: It takes up a lot of my time, my spare time, which is growing
- incredibly smaller and, I mean, I've overextended myself on a number
- of projects and since I've definitely got a commitment to Phrack, it's
- one that I can certainly shirk if I decided to since I'm not indebted
- to anybody to do it really. I'm not going to pass it up because I
- really want to make sure it continues to be published. That's the
- biggest problem I face, time. Then there are people who say, "Oh, I'm
- going to send you a file on this," and they don't. You know, thanks a
- lot. And I always rag on those people. In fact, in the beginning of
- Phrack 44, I said, "Yeah, and for the people who said they're going to
- send me a file and didn't, you know who you are, and you always have
- to live with your own guilt." I mean, it's typical hacker stuff. "I'm
- going to do this." And they start it and they forget about it.
-
- GA: It's funny though because I've had incredible cooperation from
- those people; more than I've had from any other community that we deal
- with. Do you think it's because I'm a girl or because it's on paper?
-
- CG: Well, it might be a little of both. The kind of files that go in
- Phrack, I don't think Gray Areas is going to publish. You know, how to
- use the Role 9000 CBX, or here's how to hack system 75's, or secret
- sectors and units, or publish C programs. You get a different type of
- thing. Maybe there are people who feel a lot more comfortable writing
- cultural type pieces or special interest pieces than they would
- writing technical stuff. And to try to compensate for that. I've put
- in a lot more stuff in the issues that I've been dealing with, to deal
- with the culture. Like I started something last issue trying to get
- people from different countries to write about what it's like in that
- country. And I had a file in from Ireland; I had a file in from
- Germany; I had a file in from Canada. This issue I've got another one
- from a different part of Canada and I've got one from Sweden and I'm
- waiting on a couple of others. Because, as the computer underground
- goes, it's, people like to have this idea that it's this closely knit
- thing of all these hackers working together, and see how they're
- trading information. But it's not. I don't know anything that's going
- on in other countries except for what the few, select people from
- those countries who hang out in the same areas that I do tell me. But
- there's so many people and so many countries doing things.
-
- They've got their own little pirate wares, trading scenes, they've got
- their own little virus scenes, they've got their freaking things.
- Stuff that works on their own system, only works in their country; and
- they have their own secret ways of doing things, and their own
- networks that they like to hack, and they all hang out on certain
- deals and they have their own little lore about the busts, or super
- hackers from their country, and that's the kind of stuff that's just
- great to find out. Because, otherwise, you would never know. And it's
- really, really interesting to read what these people are up to and no
- one names names. They're just talking about what it's like to be a
- hacker in their country, and that's the kind of cool stuff that I
- want to continue to do.
-
- =======================
-
- GA: I suppose we should get into your background and how you became
- qualified to run Phrack.
-
- CG: I don't know if it's a qualification to run Phrack...
-
- GA: Well, obviously, there are an awful lot of people who could have
- been considered but weren't.
-
- CG: Yeah, well, I guess so.
-
- GA: What sort of stages did you go through? From the time that you
- first discovered computers and so on until today?
-
- CG: I kind of went through an exponential learning curve from the very
- beginning and it plateaued out for a while and it's just been a steady
- growth since then. At least I tried to maintain that because there's
- so many new developments that come out and I try to stay abreast of
- everything that's going on. I started messing around with computers a
- very long time ago. For any number of reasons, I always have problems
- trying to place the exact date.
-
- GA: What sort of computers were there? That dates it a little.
-
- CG: Well, the very first computer I did anything on with a modem was
- an Apple II, and a micro modem II. It was a friend of mine's dad's.
- He was a lawyer. He got it so he could get on Dialogue, because it
- was like the brand new service for lawyers. They could go on and look
- up legal briefs and it was all exciting. So, this friend of mine was
- showing it off, I guess maybe 5th grade, 6th grade, somewhere around
- there? A long time ago. And, in order to get on Dialogue, you had to
- dial this special number. Well, we got on, followed the instructions,
- got on Dialogue, looked at it, said, "This is really cool." And we
- noticed that, "Well, gee, in order to get on Dialogue, you have to
- dial this number" which was 415 something. Well, what happens if you
- type in a different number? So we typed a different number somewhere
- else. And, that was sort of it.
-
- We spent the vast majority of that night trying different addresses on
- Telenet and actually got into a system. And, this was the first time I
- had ever been on a modem and, I mean, it was just natural. We were
- like, wow! We didn't have any concept of what a network was, we
- couldn't imagine what this meant. The concept of being able to call
- one little number and connect to computers around the entire country
- was so mind boggling, so strange to us that we were sucked into it.
-
- As a little bit of background to this, I had already been messing
- around with telephones before this and this is a ridiculous story that
- a lot of people give me a lot of s--- about but, I mean, I don't
- really care. A friend of mine and I had stolen a dirty magazine from a
- convenience store and rifling through it, it was like a High Society
- or something like that.
-
- GA: Probably not. There were no such things then. They didn't start
- until 1975-76.
-
- CG: Well, this is back in 1980. I'm not that old. I turned 25 in May,
- so it wasn't that long ago I guess in the grand scheme of things.
- But, to me it was a hell of a long time ago. So anyway, we had stolen
- a High Society from them and in it, it said, "Call this number right
- now." It was 212-976-2626 or 212-976-2727, a brand new service. I
- said, "We got to call that number. We can't call that number, that's a
- long distance number, we'll get in trouble." It was like, "No, we
- gotta call that." So, we went back over to his house, and his Mom
- works. She was working, it's funny, she was actually working at
- Datapoint. She was at work, it was the summer, so we got there and
- dialed it up, listened to if for, like you know, some phone sex
- recording. Wow! You're a little punk kid, of course, that's just great
- to hear some crazy recording like that.
-
- We hung up after it was over and were like, "Man, that's great. We're
- going to have to call that other one. No we can't call the other
- one.^T He says, "Well, actually maybe we can, but if we're going to
- call it, we need to use this thing that my Mom's got." What thing? He
- said, "Well, it's this thing that's supposed to make her phone bill
- cheaper." And, it was a company that started up way back then called
- LDS. It was a Watts re-seller and they had a local dial-up number, you
- call up and you gave the operator who answered the phone a code, you
- read it out to her and she connected the call. I think at that time it
- was a four or five digit code. So we called up, gave it to her, gave
- her the number, the call went through. So, next time you call her
- back, give her someone else's number. Goes, "nah." So we called up,
- added ten to the number we had and placed the call. It was like,
- "Well, that's really cool." And it's funny that I've done that prior
- to doing anything on the computer because shortly thereafter, after
- being on the computer and discovering networks and after that,
- discovering bulletin boards, it became readily apparent to me how the
- marriage of the two was inevitable because there was no way in hell
- I'd be able to call a bulletin board any place other than down the
- street and not get beat to death by my parents for raking up very
- large phone bills. And after that, it kind of just shot up
- exponentially like I said before. From such humble beginnings.
-
- =======================
-
- CG: Which connected, at the time, I think now they have limits as to
- how many people. At the time, it was basically unlimited. You could
- take as many people as you wanted on your conference. And they had a
- lot of different features that they don't have now. Like, you could
- transfer control. And we used to do all sorts of ridiculous stuff.
- One of my favorite tricks was to call up Directory Assistance and, at
- the time, I don't think they do this any more, I haven't really
- bothered to check in about five years, but at the time, Western
- Digital who made all the automatic call distribution systems for
- Directory Assistance since they were still the Bell system; they had a
- feature in there that would send it into a test mode. If you called
- up and just as the ACD system kicked in, it started to cue a call for
- the next available operator if you held down a D tone. A lot of your
- readers might not know this, but on a standard touch tone phone, there
- are really four rows and four columns and not three rows and four
- columns. There's an extra column that's left out and that's A, B, C,
- and D. Well, I had a phone that had A, B, C, and D on it. There's a
- number of different ways to build a tone generator, they'll do that
- and a lot of modems will make those tones or what have you. But,
- anyway, there was a trick at one time by holding down the D tone, if
- you called Directory Assistance, it'd throw the ACD into its
- maintenance mode. And, one of the features on this was to do a test of
- a circuit by establishing basically a loop so, if someone would call,
- hold down a D, get thrown into the maintenance mode, get the 5 key,
- they'd get onto one side of the mode. Someone else could call back
- in, hold down the D key, hit 6, get on the other side of loop, and
- then you could talk.
-
- Well, I used to call Directory Assistance from the conference, hold
- down the D key, hit 5, add that into the conference, the loop,
- transfer control to Directory Assistance and then call back in on the
- other side of the loop and then take control of the conference that
- way. So, if any of the test people who were working on the software
- for Alliance and working on getting the bugs worked out of everything,
- if any of the engineers would go back to look and see why these
- circuits were active and they'd look to see who was running control of
- this conference, they'd see it was Directory Assistance and it really
- used to confuse the hell out of them. We got a great deal of mileage
- out of that because, you know, I don't really think they knew how, but
- somehow it kept going. But anyway, on these conferences, I got hooked
- up with a group of really, really, really, really smart people and by
- sitting and talking with these people, and learning what they knew,
- because like I said before, everyone was really open and everybody
- wanted everybody to learn. If more people were working on a project,
- everybody had a better chance of learning and succeeding then if just
- one person decided to hoard it all to themselves.
-
- >From being on these conferences and talking about to all of these
- people and sharing information with all of these people, I was
- eventually asked to join a group that was being formed at that time
- and it ended up being called The Legion of Doom.
-
- GA: How did it get called Legion of Doom? Who named it?
-
- CG: I don't know. The person whose idea it was to start the group, his
- handle was Lex Luther and from the DC Comics, Lex Luther's infamous
- group of anti-heroes was The Legion of Doom, so it was pretty a
- natural choice. A lot of stuff has been attributed to it lately, such
- as it being a sinister type name. Well, Lex Luther couldn't possibly
- have called his group anything other than the Legion of Doom. Anybody
- who has every read a Super Friends comic knows that's exactly what it
- was called.
-
- As The Legion of Doom continued on in its growth and its endless quest
- of knowledge about different operating systems and networking
- technologies and phone systems and everything else, the reps of
- everybody involved in the group sort of kind of sky rocketed because
- everybody by us all working together, we had a better resource of
- knowledge to provide the people and by continuing to do so, everybody,
- I guess, built up a sort of respect for the group and some of it has
- even lasted to today, even though the group is no longer around. A lot
- of things that it affected still linger on in the community.
-
- GA: There's been a lot of debate about who was in that group. Seems
- like everybody in the world wanted to be. Ha, ha. So many of the
- hackers I meet say they were.
-
- CG: There are always going to be people who want to run around and
- say, "Yeah, I was in the Legion of Doom." And I know everybody who
- was in it. I've got a list of everybody who was in it and written
- about everybody who was in it. We all know who was in it, so it really
- does not make any difference. If some joker off the street is going
- to come up and say, "I was in The Legion of Doom," who really cares,
- you know, what's it going to get him today? It doesn't mean anything,
- because the group is not around anymore. Um, if they know something,
- well, their knowledge alone should speak for itself and should not
- have to relay on the name of some group that does not exist to try to
- perpetrate some sort of false image to other people, so it really
- doesn't happen that often. We see people like Ian Murphy, for
- instance. I've still got newspaper articles with him in it saying that
- he was in Legion of Doom, and in fact, he has told some people, and
- some business acquaintances of mine, I guess in some desperate attempt
- to generate revenue, that not only was he in Legion of Doom, but he
- founded it, ha, ha, so, that's nice and he can continue to delude
- himself in a lot of things. If anybody wants to live in delusion,
- well that's their right, I suppose. It doesn't mean anything to me.
-
- GA: Isn't there a new Legion of Doom now?
-
- CG: Well, I really don't want to get into that too much. There was a
- young Canadian fellow who decided that it might be a good idea to
- start the new Legion of Doom and within like say an hour after that
- got posted to the Net, we were on the phone with him, telling him what
- a bad idea that was. It was myself and Scott Chasin who called him up
- first and he said, "Well, I think The Legion of Doom was a real
- important thing for the community and I just want to see it continue"
- and this and that. I said, "Who are you to come out of nowhere and
- think that not only do you have enough knowledge to say that you could
- have been associated with The Legion of Doom, much less to usurp the
- name? The name is dead, we put the group to rest and we want it to
- stay that way. He said, Well I'm not going to change it and as soon as
- you see the type of journal I put out, you will be really impressed."
- I said, "If your magazine is good, it will stand on its own merit and
- you don't need our name." He said, "Well you retired the name and that
- means it's fair game for anybody else." Okay, well so there is no
- talking to this guy, so I said, "Well I want to tell you this Cameron,
- Scott and I are the first to call you, there will be many others. We
- are the nicest. It's not going to be pretty for you and I just want
- you to know that."
-
- And let's just say there is no more New Legion of Doom. It was kind of
- an interesting experience for everybody because it did get a lot of
- the members back in contact with one another. A lot of us had gone our
- separate ways. The members grew older.The group was founded in '84 and
- here it is almost '94, I mean that's a long time for, you know, a
- bunch of people to stay in contact, regardless of whether or not it
- was for some silly little computer group to form a net. So it was
- nice to catch back up with a lot of people. It's really refreshing to
- see that damn near everybody who was ever involved in the group is
- doing very well for themselves in their chosen careers or professions,
- or graduating with high graduate degrees, Ph.D.s, Master Degrees, and
- things; it's certainly not what one would expect from the world's most
- infamous hacker group, but that certainly is what happened. But, you
- know, the whole Cameron Smith New Legion of Doom thing, it didn't
- accomplish anything for him, but it certainly did accomplish something
- for us. It got a bunch of us back together again. I don't want to
- sound grateful to him for it, but it worked out pretty well.
-
- GA: How did The Legion of Doom originally break up?
-
- CG: Well, The Legion of Doom kind of went through three different
- waves. You can kind of chart the history of the computer underground,
- it sort of runs parallel to the history of The Legion of Doom, because
- you can see as the new members came in, that's when all the busts
- happened. People would either get nervous about the busts and move on
- and go to college and try to get a life, or they would be involved in
- some of the bust and some of them would leave that way. So it kind of
- went through three different membership reorganizations. You can tell
- who came in where because of what was going on. It finally kind of
- folded. I had talked to a bunch of members somewhat recently, within
- the past three or four years and I said, "Well maybe we ought to try
- to do something, we need to get some more members in and try to work
- towards a different end." At the time, there was still the infant of
- an idea about going into consulting by building together this last
- insurgence of Legion of Doom. I talked to several people and wanted
- to try to track down newer people, so I talked to the members who were
- still active and asked are you still interested in doing this again,
- because we've got some other things that we want to try to focus on
- and as stuff starts to progress, something might come out of it. I'm
- doing something with some other people, and we got people who are
- experts in different types of fields, and we were talking to people
- who are experts in mainframes, in telephony, in Unix, and all sorts of
- different stuff and as that started to progress, we got a bunch of
- people in the last new membership drive for the group, did a few
- things, and as that started to go on, most of my main focus started
- dealing in with a few people from the last insurgence about trying to
- form this consulting company, which ended up being Comsec.
-
- We finally decided that's what we were going to do and we were serious
- about it, we said okay well then maybe we should just dissolve the
- group, because if we are going to have Comsec, we don't need Legion of
- Doom, 'cause this is what we want to do. Instead of spreading the
- knowledge around the net in the form of text files free, we were going
- to spread the knowledge around the corporate world for money. It
- really was a logical progression to us, because, you are not going to
- be 35 years old and still trying to break into the systems somewhere;
- the thrill doesn't last that long and if it does, well, you need to
- get a life or a pet or something. There is no reason why someone who
- even has an inkling of maturity, not to say that I do in the least,
- should be wasting away their life gathering up how many university
- systems they broke into.
-
- So after we finally made the formal decision, we talked to some people
- and said well, we were just going to say goodbye to the group.
- Everybody who was still active or interested from the group was like
- look, you know, when this thing takes off, we want all of you to be
- there. When we need more consultants, you're the best, and everyone
- was all up for it. That's what happened.
-
- GA: Let's stick with The Legion of Doom for awhile. What was the
- relationship between The Legion of Doom Technical Journals and Phrack
- and Phun?
-
- CG: Well, it's kind of funny. Originally, I think this was something
- that Craig and Lex had done. Originally, there was going to be a
- Phrack issue that was going to be the Legion of Doom Phrack Issue. It
- was going to be Phrackful, nothing would follow us but Legion of Doom
- members and it went on and on and on. I guess Lex had collected
- enough files, he was like, "I don't want to give these to Phrack."
- So, he stuck them together in the Legion of Doom Technical Journals,
- since it was all Legion of Doom stuff anyway, might as well go ahead
- and put it out ourselves. And I don't know if that was something
- personal against Craig, I really doubt it because Craig and Lex have
- always been friendly enough. I just think that is something he decided
- to do. From that there were three others published, so there was a
- total of four Tech Journals. They didn't come out in any sort of
- organized order, they just sort of came out when they wanted to come
- out. It was like they were done when they were done and they appeared
- when we were finished and that's why there were only four for a group
- that was around for so long, but they were fairly timely when they
- were all released and I guess everybody really appreciated the kind of
- knowledge that was in them when they came out.
-
- Looking back, I don't know how much interest someone is going to get
- on how to hack Tops 20. I^Rd like to find the Tops 20 right now. It
- doesn't exist. So the knowledge that was in those things is fairly
- dated, but at the time, it was very timely and people appreciated it.
-
- =======================
-
- GA: You were busted in 1990, right?
-
- CG: Nope.
-
- GA: How did that go down?
-
- CG: On March 1 1990, I was raided by the Secret Service, but I wasn't
- busted. There is a big distinction there. Just because they came in
- my house and dug through my stuff, that doesn't mean anything
- happened.
-
- Let me give a little preface to that. Several months prior, I received
- notification from the University of Texas that my school records
- (specifically mentioning my computer accounts) were being subpoenaed
- by a federal district court judge in Chicago. I knew very well that
- was the district that William Cook was in, so I trotted on down to the
- Dean's office at the University of Texas and said, "Hi, I understand
- my records have been subpoenaed. I need a copy of that for my lawyer."
- So they ran me off a copy of it and sure enough there's William Cook's
- name. So, okay, I was right, and I went home and vacuumed the house
- and cleaned everything up nice and neat for them, started placing
- little notes in various places. I had little notes that said, "Nope,
- nothing in here," put that in a drawer and a little note that said,
- "Wrong, try again," put that in there and little things everyplace
- that someone might look to try to find the secret hacker notes. I
- printed out a copy of the 911 document, nice laser printed copy, laid
- that out and fan folded it over my desk. I went down to the Federal
- Building, picked up brochures on how to became an FBI agent and a
- Secret Service Agent, set those out on my desk. I got a printout of
- several different things, laid those out all nice and neat, had some
- Phrack issues, I had some messages off of the Phoenix Project, I had
- all this stuff laid out. It looked like a little alter, a shrine to
- the FBI.
-
- Well, sure enough a couple months later, there they were. And I also
- put some notes on my computer account at UT. I made some really large
- files, like cordons and named them dot master, dot password, dot zip,
- just stupid names, you know that tack ID's, and left these sitting in
- my account. All this noise. And then I made this one that said,
- "Secret Info." If anybody would have bothered to read that, it was
- like a 10K file of me saying, "Anybody who would take the time to
- search through my files and try to find illegal information is a
- complete scumbag." Sure enough when they came to visit my house that
- morning, I woke up to the sound of people running up my stairs and
- their screaming, "Federal Agents - warrant," then they came in my
- room, "Out of the bed." Leading the pack is Special Agent Tim Foley,
- and he's got his service revolver out, and he's got it pointed at me.
- He's a pretty big guy and I'm me. I don't present a menacing figure to
- most and especially at 6 in the morning in boxer shorts, ha, ha. It
- just looked like I'm going to jump right out and start ripping
- peoples' heads off, so he quickly put his gun away. Nonetheless, he
- did have it drawn. I like to point that out. Hackers are a notoriously
- violent group of people who are known for their physical prowess, so
- guns are definitely always necessary. (said sarcastically)
-
- So, they ordered me downstairs and held me in the kitchen. I
- immediately said, "Let me call my lawyer," and they said, "You'll get
- your chance." So, they started going through all my stuff. I heard
- them up in my room, rifling all though my drawers and about an hour or
- so later, one comes down and hands over one of the Secret Service
- Brochures that I had. He says, "So, thinking about joining up?" I
- said, "Well, I think I could probably do better than some people." He
- didn't like that remark. He said, "Well, I think our requirements are
- a little more stringent than to let in the likes of you." I said,
- "Well, it shows." He didn't like that very much either. I said, "So,
- what's your degree in?" He said, "Well, I'm not going to tell you."
- I said "I'm just making conversation." So they continued on in the
- search of my house and when they found absolutely nothing having
- anything to do with computers, they started digging through other
- stuff. The found a bag of cable and wire and they decided they better
- take that, because I might be able to hook up my stereo, so they took
- that. I have an arcade size PacMan machine, which of course, one of
- the agents decided was stolen, because a lot of people slip those
- into their backpacks on the way home from school. So they started
- calling up all the arcade vendors around town trying to see if this
- had indeed been stolen. The thought of me wheeling an arcade size
- PacMan machine down the street, just didn't occur to them. So,
- finally, I said "Look, I bought it, here's the guy, call him." So
- they finally gave that up, so then they started harassing me about
- some street signs I had in my house. I had a Stop sign. I had a No
- Dumping sign over the toilet. "You need to get rid of those, it's
- state property, if we come back here and you have those, we are taking
- you downtown." I go like, "Okay." So then they started looking for
- drugs, and one guy is digging through a big box of, like a jumbo
- family size deal of Tide we bought at Sam's, it was about three feet
- tall and it was one of the monster size things. This guy is just
- digging through it, just scooping it out, his hands are all turning
- blue and sudsy from digging through this detergent and Foley walks
- over to him and says, "Well, I think we can safely assume that that's
- laundry detergent."
-
- So, Foley comes back in to where I'm sitting in the kitchen and I've
- been freezing my ass off, so they had let me get a jacket, and put on
- some jeans, and he says to me, "Well, I want to show you something."
- He whips out some business cards that I had printed up for SummerCon a
- few years ago, that said, "Erik Bloodaxe, Hacker." It had a little
- treasury logo on it and he says, "Impersonating a Federal official?"
- "Well, it doesn't say anywhere on there, 'Chris Goggans, Special
- Agent.' It says, 'Erik Bloodaxe, Hacker.' Whoever this Erik Bloodaxe
- character is. It might be me, it might not. I'm Chris Goggans and that
- says, Erik Bloodaxe, Hacker. Just because the seals there, it doesn't
- mean anything." He says, "Well, if you don't tell us everything that
- there is to know about all your higher ups, we are going to be
- pressing state, local and federal charges against you." I said, "On
- what grounds?" He goes, "We want to know everything about your higher
- ups." Which I'm thinking, gosh, I'm going to have to turn in the big
- man, which is ludicrous, because there is no such thing as a higher
- up, but apparently they thought we were a part of some big
- organization. So, I said, "Well, I'm not saying anything to you, I'm
- calling my lawyer." And I already had told my lawyer previously that I
- would be raided shortly and that I would be needing to call him. So I
- called him and said, "Hi, this is Chris and the Secret Service is here
- and I'd like you to speak to the agent in charge." And he said that
- my client declines any sort of interviews until such a time that I can
- arrange to be there to represent him in an official capacity and I'll
- need your name and I need all the information. The agent said, "We
- will be in touch." And that was it. They gathered the bag of wire and
- the printouts of the 911 document, how to be an FBI agent, the
- printouts of the Phoenix Project messages, and they trotted on off. As
- they were walking out the door, one of the guys kind of looks over at
- my television set and he says, "Hey, why is that video game plugged
- into the phone line?" And it was kind of like a Homer Simpson, cause
- Foley trots over and I had a 300v terminal, which is what I had been
- using to get on bulletin boards with. It was plugged into the phone.
- It was a little membrane keyboard box. All it was was a modem. So they
- bundled that up and stuck that in there, and they went on their merry
- way, and I followed them out to the car, and wished them well, and
- wrote down their license plate, and went back into the house, and got
- into my car, and went driving around calling up everybody else around
- town to see if anybody else had been raided.
-
- GA: Had they?
-
- CG: Yeah, at the same time as what was going on in my house, the house
- of Lloyd Blankenship was being raided, The Mentor, as well as the
- office place of Steve Jackson Games, where Lloyd worked, which ran
- into a huge fiasco later on down the road for these hapless agents,
- but that's an entirely different story.
-
- =======================
-
- GA: Did you ever do any malicious hacking?
-
- CG: No. To be honest, there were a couple of times I actually
- considered such a thing. At one point in time, we had access to South
- African Government computers, like South African Treasury, things like
- that and we were thinking, should we take it down? Nah, we better not
- do that, can we just change the message of the day to something like
- some anti-apartheid statement, some sort of politically correct thing.
- It was all a big joke to us, we certainly weren't thinking about that,
- we just figured it would really piss them off, but we never did it.
- When the Russian x25 network went up, we were right there on it. They
- can't bust us for hacking Russia, I mean, who would? What were they
- going to say? It's like, "You should hack them, because they are our
- enemies, well maybe you should hack them," so, we were just going
- after the Russian network pretty hardcore.
-
- Malicious hacking pretty much stands against everything that I adhere
- to. You always hear people talking about this so called hacker ethic
- and I really do believe that. I would never wipe anything out. I would
- never take a system down and delete anything off of a system. Any time
- I was ever in a system, I'd look around the system, I'd see how the
- system was architectured, see how the directory structures differed
- from different types of other operating systems, make notes about this
- command being similar to that command on a different type of system,
- so it made it easier for me to learn that operating system. Because
- back then you couldn't just walk down the street to your University
- and jump right on these different computer systems, because they
- didn't have them and if they did have them only several classes would
- allow you access to them. Given the fact that I was certainly not of
- college age, it wasn't really an option. You didn't have public access
- to systems. All you had to do was call up and ask for an account and
- you'd get one. So, the whole idea of doing anything destructive or
- malicious or anything even with malcontents using computer systems to
- track information about people or harass people, that just goes
- against the grain of anything that's me. I find it pretty repulsive
- and disgusting. I am certainly not blind to the fact that there are
- people out there that do it, but obviously these people have a s---ty
- upbringing or they are just bad people.
-
- =======================
-
- GA: How about books that have come out about hackers?
-
- CG: Well, I'll take a stab at that. The Hacker Crackdown I found to be
- a very schizophrenic piece of writing. I still to this day have not
- read it completely. I found it very hard to follow and I was there. It
- is very hard for me to read that book and follow the chronology.
- Everything is on the money and he did a very good job of making sure
- the facts were correct, but it's just hard for me to read. Maybe
- that's just a criticism of his writing style.
-
- Approaching Zero, I didn't really care for that too much, more
- specifically because they just basically out and out called me a
- traitor and said I was keen on selling secrets to the Soviet Union.
- Maybe you ought to ask the IRS about all that money I got from the
- Soviet Union, because I haven't seen it, but I'm sure I'll be taxed on
- that too. But I found that rather disgusting and after that book, I
- actually had a conversation with one of the people who was writing the
- book. A guy named Brian, actually called us up at Comsec and I talked
- to him for about 30-45 minutes about things and next thing I know,
- nothing we really said ended up in the book. A bunch of people were
- misquoted, left and right. All the stuff about the American hacking
- scenes, off the mark. People were quoted as saying stuff that they
- never said, things supposedly from bulletin boards that were not on
- bulletin boards. I don't know where this information came from, but
- it's really just off the money. I guess if you know something so
- intimately, you are always going to be critical of anything someone
- says about it because they don't know it as well as you do, so you are
- always going to find fault in something. So maybe I'm just being
- overly critical.
-
- =======================
-
- GA: While on the subject of Comsec, you have said that you have gotten
- bad press. From where?
-
- CG: Well, I think an article saying that I have been arrested in the
- past for breaking into Bell South, or books being published saying
- myself of The Legion of Doom destroyed the 911 Network in nine states
- just to see if we could do it. Things like that which are just out and
- out lies. I'd say that was pretty bad press.
-
- GA: Did Comsec fold because of personality problems, or a lack of
- business?
-
- CG: Comsec folded for a number of reasons. The press aspect weighed
- heavy. We were basically blacklisted by the security community. They
- wouldn't allow me a forum to publish any of my articles. It
- essentially boiled down to, with the trade magazines, at least, they
- were told by certain members of large accounting firms that they would
- pull their advertising if they associated with us, and when you are a
- trade magazine that is where all of your revenue comes from, because
- no one is paying for subscriptions and they can't afford that loss.
- They were more interested in making money then they were in spreading
- the gospel of truth in security. But hey, it's a business, I guess you
- have to take that. I had speaking engagements pulled. A head of a very
- large security association promised me a speaking engagement and then
- decided to cancel it and didn't bother to tell me until a month before
- the conference. I talked to him and he said, "Oh, well I should have
- called you." This is like one of the largest security associations in
- the country and the second largest. So we had that kind of treatment.
-
- Some of these conferences, since we were not speaking at them, we
- could not really justify spending thousand of dollars to fly out there
- and attend. We were cut off from a lot of things and since we did not
- have a presence at these conferences, a lot of our competitors used
- this to target the companies that we were marketing. You would have
- these MIS directors from large oil companies out there, and you would
- have other people going up to them and saying, "You're from Houston.
- You are not dealing with those Comsec folks, are you? Well, you know
- that they are nothing but a bunch of crooks out there." So, one very
- large oil company, we had already had all of our paperwork passed
- though all of their legal departments and it was just waiting to be
- signed; it had already been approved and money was allocated in the
- budget and we were ready to rock. This would have meant a large amount
- of money over a period of several years. Well from going though all
- of these friendly happy negotiations and papers ready to be signed, to
- XYZ oil company does not do business with criminals, Click! Who talked
- to this guy? Who feed him this nonsense?
-
- Well, we got a lot of that, certainly that weighed heavy. The fear
- that came from companies like DeLloyd Touche.I will single them out
- especially because some of their larger consultants were very vocal in
- speaking out against us, in the very forums they denied us. They used
- the magazines as a place where one particular consultant said
- something like, "Can we lie down with dogs and be surprised when we
- get up with fleas?" I mean, I don't deserve that type of commentary. I
- don't think anybody does. It is certainly not a mature attitude for
- somebody who is supposed to be an upstanding ethical consultant to use
- a trade publication to vent his frustration against his competition.
- But, hey, it's a free market and if he has a forum and they gave him a
- column, well I think he can write whatever the hell he wants.
-
- Sure, I was in The Legion of Doom. I have been in everybody's system.
- But I have never been arrested. I have never broken anything, I have
- never done anything really, really, criminally bad. There is a
- difference in doing something illegal, you like walk across the street
- at the wrong place and you are committing a crime, but that does not
- make you a criminal, and there is a big difference between different
- types of behavior. By all these different forces saying so many
- negative things about us, we had our work cut out for us.
-
- To be honest, they had us beat. They had the deep pockets. They could
- wait us out. They could keep saying bad things about us forever. They
- had hundreds of millions of dollars so that even if they weren't
- making money they could sit on it. We didn't. Eventually we could not
- do it any more. I had overextended myself. I sold off all my stock,
- all my personal stock. I had a bunch of stock in energy companies and
- things like that, that was in the past supposed to be paying for my
- college education, and I gambled it away on Comsec and I ran out of
- money. I needed to eat, I needed to get a job, I had to move, I
- couldn't afford it anymore. And everybody was basically saying the
- same thing. Scott didn't have any money, Rob didn't have any money,
- our sales guys were getting really antsy because they were having a
- real hard time closing sales, so we just had to shut down.
-
- =======================
-
- GA: Any thoughts on where technology is going and how hacking might
- change in the next couple of years?
-
- CG: Well, like I said earlier, the Internet is a very scary place with
- a very, very limited set of knowledge. One person could take down a
- majority of the network and for so much trust and need to be placed in
- a network that is so inherently unstable because of the protocol that
- drives it. I mean you don't plan a trip across country in a 1957
- jalopy! You go out and get a new car, or you rent a good car, you
- don't put all your trust in something that ain't gonna work. And it
- works well enough for a lot of things, but for people to trust their
- entire enterprise network to stuff over the Internet, they are asking
- for trouble. And as people become more familiar with the entire
- protocol sweep, they are going to find out that there is a world of
- hurt about to happen, and in the next few years, people are going to
- be real surprised when stuff starts going down like crazy. That's
- going to be the biggest thing to happen.
-
- I would imagine that all the cellular problems are going to disappear
- because the advent of digital caller is going to remove all this
- problem. A lot of things are going to change. I imagine people,
- hopefully, will once again get more and more into writing software and
- doing more productive stuff. With all the wealth of knowledge that is
- coming out of every community, even in the underground, because people
- are exposing bugs and people are changing things, so eventually people
- are going to be able to make all types of systems, robust enough to
- survive different things. So out of all this turmoil, some good is
- going to come. And from that, once all the problems have been
- corrected, people will be able to direct their energies into a more
- positive thing, like developing applications, writing software and
- focusing their attention on doing neat, nifty tricks, rather than
- doing neat nifty stupid tricks, ha, ha.
-
- You are going to see some really, really cool stuff that is going to
- blow your mind and you are going to be able to carry it around in your
- hand. You are never going to be out of touch anywhere in the world,
- so, I think that will be very cool.
-
- =======================
-
- GA: We should certainly tell people how to subscribe to Phrack, and
- the prices on the LOD disks.
-
- CG: Yeah, people who want information about Phrack can mail me at:
- Phrack@well.sf.ca.us and for information about the BBS Archive Project
- mail: LODCOM@Mindvox.Phantom.com
-
- GA: Thanks Chris!
-
- G: Thank you.
-
- ------------------------------
-
- Date: Sun, 23 Oct 1994 22:51:01 CDT
- From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: File 2--Cu Digest Header Information (unchanged since 23 Oct 1994)
-
- Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
- available at no cost electronically.
-
- CuD is available as a Usenet newsgroup: comp.society.cu-digest
-
- Or, to subscribe, send a one-line message: SUB CUDIGEST your name
- Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
- The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
- or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL
- 60115, USA.
-
- Issues of CuD can also be found in the Usenet comp.society.cu-digest
- news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
- LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
- libraries and in the VIRUS/SECURITY library; from America Online in
- the PC Telecom forum under "computing newsletters;"
- On Delphi in the General Discussion database of the Internet SIG;
- on RIPCO BBS (312) 528-5020 (and via Ripco on internet);
- and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
- CuD is also available via Fidonet File Request from
- 1:11/70; unlisted nodes and points welcome.
-
- EUROPE: from the ComNet in LUXEMBOURG BBS (++352) 466893;
- In ITALY: Bits against the Empire BBS: +39-461-980493
- In BELGIUM: Virtual Access BBS: +32.69.45.51.77 (ringdown)
-
- UNITED STATES: etext.archive.umich.edu (192.131.22.8) in /pub/CuD/
- ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
- aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
- world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
- uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
- wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
- EUROPE: nic.funet.fi in pub/doc/cud/ (Finland)
- ftp.warwick.ac.uk in pub/cud/ (United Kingdom)
-
- JAPAN: ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD
-
- The most recent issues of CuD can be obtained from the NIU Sociology gopher
- at: tk0gphr.corn.cso.niu.edu (navigate to the "acad depts;"
- "liberal arts;" "sociology" menus, and it'll be in CuDs.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted for non-profit as long
- as the source is cited. Authors hold a presumptive copyright, and
- they should be contacted for reprint permission. It is assumed that
- non-personal mail to the moderators may be reprinted unless otherwise
- specified. Readers are encouraged to submit reasoned articles
- relating to computer culture and communication. Articles are
- preferred to short responses. Please avoid quoting previous posts
- unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ------------------------------
-
- End of Computer Underground Digest #6.94
- ************************************
-
-
-