| ==Phrack Inc.== |
| Volume Three, Issue Thirty-one, Phile #10 of 10 |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN Phrack World News PWN |
| PWN Issue XXXI, Part Three PWN |
| PWN Compiled by Phreak_Accident PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
| Comp.dcom.telecom |
| ----------------- |
| The following is excerpts from comp.dcom.telecom regard the now "Infamous" |
| Legion Of Doom busts. I know most of you have seen some of these |
| somewhere-sometime, but I thought I would try to get these out for those |
| unfortunate souls that don't have Usenet access. |
| I know there have been many controversies over the following material and |
| the busts as a whole -- Henceforth, Phrack Inc. will not comment on any of such |
| busts. Mainly because we don't want to jeopardize any current investigations |
| concerning LOD and others. Leave it alone. It's old news. Let this sum it up |
| for you guys and then forget about it. |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Newsgroups: comp.dcom.telecom |
| Subject: CBS News Special Report - "The Busting of The Mentor" |
| Message-ID: <4747@accuvax.nwu.edu> |
| Date: 5 Mar 90 06:11:49 GMT |
| Sender: news@accuvax.nwu.edu |
| Organization: Capital Area Central Texas Unix Society, Austin, TX |
| Lines: 37 |
| Approved: Telecom@eecs.nwu.edu |
| X-Submissions-To: telecom@eecs.nwu.edu |
| X-Administrivia-To: telecom-request@eecs.nwu.edu |
| X-Telecom-Digest: Volume 10, Issue 145, Message 6 of 6 |
| ...I've just gotten a new update on the Mentor's recent apprehension by |
| the Feds. Thought you might like to hear something as close to as direct |
| from the Mentor as possible under the circumstances. |
| From: Daneel Olivaw #96 @5283 |
| Date: Sun Mar 04 19:55:28 1990 |
| I'll have to play the Mentor for now (with permission granted). |
| If you haven't heard the rumors, here is the truth. |
| The Mentor was awakened at 6:30am on Thursday (3/1/90) with the gun of |
| a Secret Service agent pointed at his head. The SS proceded to search |
| and seize for the next 4 1/2 hours. Things taken include an AT with |
| 80mb HD, HP LaserJet II, various documents, and other thing. They |
| then proceded to raid his office at work, and sieze the computer and |
| laser printer there. Lost in the shuffle was a complete novel (being |
| written and due in 2 weeks), and various other things. |
| Across town: Those of you who know Erik Bloodaxe, he was also |
| awakened, and his house searched. |
| Neither have been charged with anything, but they expect to at least |
| be called as witnesses at the case of the Phrack Boys (Knight |
| Lightning and Tarren King) in Chicago April 15. |
| Apparently, they did a shoddy job, as they tagged a book that Mentor |
| had borrowed from me (Quarterman's "The Matrix"), and then forgot to |
| take it, oh well.... |
| It ain't lookin so lovely. Also the UT computer systes are under |
| *VERY* close watch, as they were/are being hacked on by hackers around |
| the world, including some in Australia, and England. |
| OM |
| From: cosell@bbn.com (Bernie Cosell) |
| Newsgroups: comp.dcom.telecom |
| Subject: Keeping Copies of Illegal Things (was Re: Jolnet, Again) |
| Message-ID: <4725@accuvax.nwu.edu> |
| Date: 4 Mar 90 04:36:50 GMT |
| Sender: news@accuvax.nwu.edu |
| Organization: TELECOM Digest |
| Lines: 52 |
| Approved: Telecom@eecs.nwu.edu |
| X-Submissions-To: telecom@eecs.nwu.edu |
| X-Administrivia-To: telecom-request@eecs.nwu.edu |
| X-Telecom-Digest: Volume 10, Issue 143, Message 3 of 8 |
| }TELECOM Digest Sat, 3 Mar 90 20:45:00 CST Special: Jolnet, Again |
| This isn't misc.legal, and this isn't the time to be excessively picky |
| and critical, but: |
| }Here is how he told the tale of the '911 software': |
| }The software showed up on his system one day, almost two years ago. It |
| }came to him from netsys, where Len Rose was the sysadmin. According to |
| }Andrews, when he saw this file, and realized what it was, he knew the |
| }thing to do was to 'get it to the proper authorities as soon as |
| }possible',... |
| }ME> "After you passed it along to Boykin, did you then destroy the |
| }file and get it off your site?" |
| }RA> "Well, no... I kept a copy also." |
| It strikes me that this is a KEY faux pas, regardless of good |
| intentions or not. |
| }But then, said Andrews, a funny thing happened several months later. |
| }The folks at AT&T, instead of being grateful for the return of their |
| }software came back to Andrews to (in his words) 'ask for it again.' |
| }Somehow, they either never got it the first time; got it but suspected |
| }there were still copies of it out; or were just plain confused. |
| Just so, and if RA *supplied* another copy, I suspect they'd interpret |
| that as pretty convincing evidence that it WAS further distributed, |
| and with RA's knowledge. I know that they didn't actually contact him |
| and ask/tell him to expunge all copies of the stuff, but his actions |
| clearly demonstrated his knowledge of just what it was he was messing |
| with, and I think they could easily show that he incurred an |
| obligation to act prudently with it, or else [just guessing now] he |
| could be liable to being an accessory after the fact. |
| }So he was contacted by the feds about a year ago, and it was at that |
| }point he decided it was in his best interest to cooperate with any |
| }investigation going on. |
| Perhaps his sudden cooperation was less out of pangs of conscience |
| that it might have appeared... [not to besmirch his motives here, |
| only to point out that a call from the FBI pointing out that while you |
| may not have really DONE anything, your actions _could_ end up landing |
| you in court with some serious potential badness going down (and none |
| of this untested cheesiness about the the technicalities of bbs's and |
| such... nice mainstream legal liability), could be pretty persuasive |
| at converting a concerned, but out-of-the-loop, citizen into an active |
| helper]. |
| /Bernie\ |
| From: dattier@chinet.chi.il.us (David Tamkin) |
| Newsgroups: comp.dcom.telecom |
| Subject: Seizures Spreading |
| Message-ID: <4724@accuvax.nwu.edu> |
| Date: 4 Mar 90 05:55:20 GMT |
| Sender: news@accuvax.nwu.edu |
| Organization: TELECOM Digest |
| Lines: 15 |
| Approved: Telecom@eecs.nwu.edu |
| X-Submissions-To: telecom@eecs.nwu.edu |
| X-Administrivia-To: telecom-request@eecs.nwu.edu |
| X-Telecom-Digest: Volume 10, Issue 143, Message 2 of 8 |
| News is that Illuminati BBS, a system run by a company named Steve |
| Jackson Games somewhere in Texas, was also shut down and its equipment |
| seized by the federal government because two suspected Legion of Doom |
| members were among its users. |
| [Moderator's Note: And I suspect the raids will continue during the |
| next week or two. I wonder which sites will be next? Each place they |
| raid, the local crackers point their fingers at each other like |
| naughty children, and to make themselves seem like the good guys they |
| say, "Have you talked to so-and-so yet?". Let's see now: netsys, |
| jolnet, attctc, illuminati, (your name here?)... Apparently even |
| getting rid of incriminating evidence won't work any longer, if |
| someone upstream of you tattled. PT] |
| From: mosley@peyote.cactus.org (Bob Mosley III) |
| Newsgroups: comp.dcom.telecom |
| Subject: Austin, TX BBS Shut Down From Joinet Bust Fallout |
| Message-ID: <4723@accuvax.nwu.edu> |
| Date: 4 Mar 90 17:22:26 GMT |
| Sender: news@accuvax.nwu.edu |
| Organization: Capital Area Central Texas Unix Society, Austin, TX |
| Lines: 28 |
| Approved: Telecom@eecs.nwu.edu |
| X-Submissions-To: telecom@eecs.nwu.edu |
| X-Administrivia-To: telecom-request@eecs.nwu.edu |
| X-Telecom-Digest: Volume 10, Issue 143, Message 1 of 8 |
| This hit most BBS's in the Austin area on Thursday. It's believed |
| the bust came down Wednesday morning. In a nutshell, here's what |
| happened: |
| Wednesday morning, Feb. 28, the offices of Steve Jackson Games, inc., |
| were raided by FBI and Secret Service officials. The establishment was |
| shit down, and all computer systems, including the Illuminati BBS, |
| were confiscated. |
| At that time, a 'retired' member of the LoD, who was identified as |
| 'The Mentor' was arrested. The charges reportedly are related to the |
| recent 911 bust that has shut down joinet and attatc (or whatever |
| Killerused to be called). His home system was confiscated, complete |
| with an entire collection of "Phrack" issues and related paraphanalia. |
| As of this writing, the Mentor is reportedly out on bail, sans system |
| and network connection. The Illuminati BBS is still down, although SJ |
| Games is back in operation, and no charges have been filed against any |
| of the employees other than The Mentor. The systems owned by SJ Games |
| have not been returned as of this writing. |
| Finally, rumors were trickling in early this morning (Saturday, 3/4) |
| that two BBS's in Dallas, three in Houston, and one in San Antonio |
| were busted by the same authorites in relation to the same case. |
| [in light of the Mentor's posted defense of the LoD, I kinda thought |
| you'd like to see this one! - OM] |
| From: telecom@eecs.nwu.edu (TELECOM Moderator) |
| Newsgroups: comp.dcom.telecom |
| Subject: Jolnet, Again |
| Message-ID: <4701@accuvax.nwu.edu> |
| Date: 4 Mar 90 02:45:00 GMT |
| Sender: news@accuvax.nwu.edu |
| Organization: TELECOM Digest |
| Lines: 350 |
| Approved: Telecom@eecs.nwu.edu |
| X-Submissions-To: telecom@eecs.nwu.edu |
| X-Administrivia-To: telecom-request@eecs.nwu.edu |
| X-Telecom-Digest: Special: Jolnet, Again |
| TELECOM Digest Sat, 3 Mar 90 20:45:00 CST Special: Jolnet, Again |
| Today's Topics: Moderator: Patrick Townson |
| Re: AT&T Sourcecode: Poison! (Chip Rosenthal) |
| Jolnet Seizure (Mike Riddle) |
| Article Regarding JOLNET/e911/LoD/Phrack (Ben Rooney) |
| A Conversation With Rich Andrews (TELECOM Moderator) |
| Killer/attctc Permanently Down (Charlie Boykin) |
| ---------------------------------------------------------------------- |
| From: Chip Rosenthal <chip@chinacat.lonestar.org> |
| Subject: Re: AT&T Sourcecode: Poison! |
| Date: 3 Mar 90 00:00:00 GMT |
| Organization: Unicom Systems Development, Austin (yay!) |
| [Moderator's Note: Original date of 2/25 changed to prevent premature |
| expiration. PT] |
| You've got a lot of nerve, Patrick. |
| telecom@eecs.nwu.edu (TELECOM Moderator) writes: |
| >We're told by a deep-throat type that AT&T is on the war path about |
| >their software [...] Like jolnet, netsys went down abruptly, with |
| >*everything* confiscated [...] Now comes news that attcdc [sic], formerly |
| >known as killer went off line in a hurry..... |
| Yessir, after all your complaints about that about anonymous Legion of |
| Doom message, this is a really crummy thing to post. Based upon |
| unattributed conversations, you imply that Len Rose and Charlie Boykin |
| were involved in wrongdoing which lead to the shutdown of their |
| systems. |
| I don't know Len personally, but have had uucp connections with him in |
| the past. Charlie, on the other hand, I do know personally. He is |
| very well regarded in the Dallas/Fort Worth area, and was voted "1989 |
| DFW Administrator of the Year" by the DFW lunch-bunch...errr....DFW |
| Association of Unix System Administrators. |
| You have cast some crummy aspersions towards these guys. Since I know |
| them, I will wait for the facts to come in. Others who don't know |
| them could very well jump to conclusions on the basis of this posting. |
| Was this message really called for? |
| Chip Rosenthal | Yes, you're a happy man and you're |
| chip@chinacat.Lonestar.ORG | a lucky man, but are you a smart |
| Unicom Systems Development, 512-482-8260 | man? -David Bromberg |
| ------------------------------ |
| Date: Wed, 28 Feb 90 21:38:39 EST |
| From: Mike Riddle <Mike.Riddle@p6.f666.n5010.z1.fidonet.org> |
| Subject: Jolnet Seizure |
| Reply-to: Mike.Riddle@p6.f666.n285.z1.fidonet.org |
| Organization: DRBBS Technical BBS, Omaha, Ne. 402-896-3537 |
| Has anyone tried a novel legal approach to the case of equipment |
| seizure as "evidence"? As I remember the Electronic Communications |
| Privacy Act, it contains specific procedures for authorities to obtain |
| copies/listings of data on a system (which system may have been used |
| for illegal purposes, but whose operator is not at the moment |
| charged). From this I think a creative attorney could construct an |
| argument that the national policy was not to seize equipment, merely |
| to obtain all the information contained therein. After all, it's the |
| data that caused any harm. |
| Also, the Federal Rules of Evidence, and most state rules, provide |
| that computer generated copies are "originals" for evidentiary |
| purposes. |
| I hope that someone close enough to the scene can keep us informed |
| about what is happening on this one. |
| {standard disclaimer goes here--don't pay any attention to me!} |
| --- Ybbat (DRBBS) 8.9 v. 3.07 r.1 |
| * Origin: [1:285/666.6@fidonet] The Inns of Court, Papillion, NE (285/666.6) |
| --- Through FidoNet gateway node 1:16/390 |
| Mike.Riddle@p6.f666.n5010.z1.fidonet.org |
| ------------------------------ |
| From: brooney@sirius.uvic.ca |
| Date: 3 Mar 90 2:36 -0800 |
| Subject: Article Regarding JOLNET/e911/LoD/Phrack |
| The following is an article I received five days ago which contains, to my |
| knowledge, information as yet unpublished in comp.dcom.telecom regarding the |
| ongoing JOLNET/e911/LoD discussion. It was printed in a weekly magazine |
| with a publishing date of Feb. 27 but other than that I have no exact idea |
| of when the events mentioned herein took place. |
| - Ben Rooney |
| MISSOURI STUDENT PLEADS INNOCENT TO 911 CHARGES |
| [Knight Lightning], a 19-year-old University of Missouri student, has |
| pleaded not guilty to federal allegations that he invaded the 911 |
| emergency phone network for 9 states. |
| As reported earlier, he was indicted this month along with [The Prophet], |
| 20, of Decatur, Ga. Both are charged with interstate |
| transportation of stolen property, wire fraud, and violations of the |
| federal Computer Fraud and Abuse Act of 1986. |
| Prosecutors contend the two used computers to enter the 911 system of |
| Atlanta's Bell South, then copied the program that controls and |
| maintains the system. The stolen material later allegedly was |
| published on a computer bulletin board system operating in the Chicago |
| suburb of Lockport. Authorities contend Neidorf edited the data for |
| an electronic publication known as "Phrack." |
| According to Associated Press writer Sarah Nordgren, in a recent |
| hearing on the case Assistant U.S. Attorney William Cook was granted a |
| motion to prevent the 911 program from becoming part of the public |
| record during the trial. U.S. District Judge Nicholas Bua set April |
| 16 for a trial. |
| The 911 system in question controls emergency calls to police, fire, |
| ambulance and emergency services in cities in Alabama, Mississippi, |
| Georgia, Tennessee, Kentucky, Louisiana, North Carolina, South |
| Carolina and Florida. |
| --------------------------------------- |
| Article from "A Networker's Journal" by Charles Bowen. |
| Info-Mat Magazine (Vol. 6, No. 2) |
| [Moderator's Note: {Info-Mat Magazine}, by the way, is the excellent |
| electronic journal distributed on many BBS machines throughout the |
| United States who are fortunate enough to be accepted as part of the |
| magazine's distribution network. I personally wish it was distributed |
| on Usenet as well: it is well written and very informative. PT] |
| ------------------------------ |
| Date: Sat, 3 Mar 90 19:34:54 CST |
| From: TELECOM Moderator <telecom@eecs.nwu.edu> |
| Subject: A Conversation With Rich Andrews |
| After the first articles appeared here relating to the seizure of |
| Jolnet, and the indictment of some people for their part in the theft |
| of '911 software', I got various messages from other folks in |
| response. Some were published, while others were just personal |
| correspondence to me. One from Chip Rosenthal was held over, and is |
| included in this special issue today. |
| One writer, whose comments were attributed to 'Deep Throat' spent some |
| time on two occassions on the phone, in a conference call between |
| himself, David Tamkin and myself. |
| What was lacking in the several messages which appeared over the past |
| week were comments from Rich Andrews, system administrator of Jolnet. |
| I got one note from someone in Canada who said Andrews wanted to speak |
| with me, and giving a phone number where I could call Andrews at his |
| place of employment. |
| I put in a call there, with David Tamkin on the other line and had a |
| long discussion with Andrews, who was aware of David being on the line |
| with me. I asked Andrews if he had any sort of net access available |
| to him at all -- even a terminal and modem, plus an account on some |
| site which could forward his mail to telecom. You see, I thought, and |
| still think it is extremely important to include Rich Andrews in any |
| discussion here. |
| He assured me he did have an account on a Chicago area machine, and |
| that a reply would be forthcoming within hours. I had a second |
| conversation with him the next morning, but without David on the line. |
| He again told me he would have a response to the several articles |
| written in the Digest ready and in the email 'very soon'. This was on |
| Wednesday morning, and we estimated his message would be here sometime |
| later in the day -- certainly by midnight or so, when I am typically |
| working up an issue of the Digest. |
| Midnight came and went with no message. None showed up Thursday or |
| Friday. I deliberatly withheld saying anything further in the hopes |
| his reply would be here to include at the same time. I guess at this |
| point we have to go on without him. |
| When David Tamkin and I talked to him the first time, on Tuesday |
| evening this past week, the first thing Andrews said to us, after the |
| usual opening greetings and chitchat was, |
| "I've been cooperating with them for over a year now. I assume you |
| know that." |
| We asked him to define 'them'. His response was that 'them' was the |
| United States Secret Service, and the Federal Bureau of Investigation. |
| He said this without us even asking him if he was doing so. |
| We asked him to tell us about the raid on his home early in February. |
| He said the agents showed up that Saturday afternoon with a warrant, |
| and took everything away as 'evidence' to be used in a criminal |
| prosecution. |
| ME> "If you have been working and cooperating with them for this long, |
| why did they take your stuff?" |
| RA> "They wanted to be sure it would be safe, and that nothing would be |
| destroyed." |
| ME> "But if you wanted to simply keep files safe, you could have taken |
| Jolnet off line for a few weeks/months by unplugging the modems from |
| the phone jacks, no? Then, plugged in a line when you wanted to call |
| or have a trusted person call you." |
| RA> "They thought it was better to take it all with them. It was mostly |
| for appearance sake. They are not charging me with anything." |
| ME> "Seems like a funny way to treat a cooperative citizen, at least |
| one who is not in some deep mess himself." |
| He admitted to us that several crackers had accounts on Jolnet, with |
| his knowledge and consent, and that it was all part of the investigation |
| going on ... the investigation he was cooperating in. |
| Here is how he told the tale of the '911 software': |
| The software showed up on his system one day, almost two years ago. It |
| came to him from netsys, where Len Rose was the sysadmin. According to |
| Andrews, when he saw this file, and realized what it was, he knew the |
| thing to do was to 'get it to the proper authorities as soon as |
| possible', so he chose to do that by transferring it to the machine |
| then known as killer, a/k/a attctc, where Charlie Boykin was the |
| sysadmin. |
| Andrews said he sent it to Boykin with a request that Boykin pass it |
| along to the proper people at AT&T. |
| ME> "After you passed it along to Boykin, did you then destroy the |
| file and get it off your site?" |
| RA> "Well, no... I kept a copy also." |
| ME> "Did Charlie Boykin pass it along to AT&T as you had requested?" |
| RA> "I assume he did." |
| But then, said Andrews, a funny thing happened several months later. |
| The folks at AT&T, instead of being grateful for the return of their |
| software came back to Andrews to (in his words) 'ask for it again.' |
| Somehow, they either never got it the first time; got it but suspected |
| there were still copies of it out; or were just plain confused. |
| So he was contacted by the feds about a year ago, and it was at that |
| point he decided it was in his best interest to cooperate with any |
| investigation going on. |
| Andrews pointed out that the '911 software' was really just ".... a |
| small part of what this is all about..." He said there was other |
| proprietary information going around that should not be circulating. |
| He said also the feds were particularly concerned by the large number |
| of break-ins on computers which had occurred in the past year or so. |
| He said there have been literally "....thousands of attempts to break |
| into sites in the past year....", and part of his cooperation with the |
| authorities at this time dealt with information on that part of it. |
| We asked him about killer/attctc: |
| ME> "You knew of course that killer went off line very abruptly about |
| a week ago. What caused that? It happened a week or so after the feds |
| raided you that Saturday." |
| RA> "Well the official reason given by AT&T was lack of funds, but you |
| know how that goes...." |
| Now you'd think, wouldn't you, that if it was a funding problem -- if |
| you can imagine AT&T not having the loose change in its corporate |
| pocket it took to provide electrical power and phone lines to attctc |
| (Charlie got no salary for running it) -- that at least an orderly |
| transition would have taken place; i.e. an announcement to the net; an |
| opportunity to distribute new maps for mail and news distribution, |
| etc; and some forthcoming shut down date -- let's say March 1, or |
| April 1, or the end of the fiscal year, or something.... |
| But oh, no... crash boom, one day it is up, the next day it is gone. |
| ME> "What do you know about the temporary suspension of killer some |
| time ago? What was that all about?" |
| RA> "It was a security thing. AT&T Security was investigating Charlie |
| and some of the users then." |
| Andrews referred to the previous shutdown of killer as 'a real blunder |
| by AT&T', but it is unclear to me why he feels that way. |
| We concluded our conversation by Andrews noting that "there is a lot |
| happening out there right now." |
| He said the [Phrack] magazine distribution, via netsys, attctc and |
| jolnet was under close review. "One way to get them (crackers) is by |
| shutting down the sites they use to distribute stuff..." |
| And now, dear reader, you know everything I know on the subject. Well, |
| almost everything, anyway.... |
| From other sources we know that Len Rose of netsys was in deep |
| trouble with the law *before* this latest scandal. How deep? Like he |
| was ready to leave the country and go to the other side of the world |
| maybe? Like he was in his car driving on the expressway when they |
| pulled him over, stopped the car and placed him under arrest? Deep |
| enough? This latest thing simply compounded his legal problems. |
| Patrick Townson |
| ------------------------------ |
| Date: Fri Mar 2 06:59:23 1990 |
| From: Charlie Boykin <cfb@sulaco.sigma.com> |
| Subject: Killer/attctc Is Permanently Down |
| Hello, |
| Regarding a couple of things as well as a message from Bill Huttig. |
| The system WAS shut down a couple of years ago - for three weeks - |
| as part of a security inquiry. It has been in continous operation |
| since. On July 4, 1989, it was moved to a Customer Demonstration |
| location at the Dallas Infomart and the node name changed to attctc |
| (for AT&T Customer Technology Center). The system was closed down on |
| February 20, 1990 after 5 years of operation. There are no charges |
| pending and the "management" of the system have been ostensibly |
| cleared of any illegal activities. |
| As of now, there are no intentions of returning the system to |
| service. There are hopeful plans and proposals that could conceivably |
| result in the system being placed back in service in a different |
| environment and under different management. |
| Respectfully, |
| Charles F. Boykin |
| Formerly sysop\@attctc (killer) |
| ------------------------------ |
| End of TELECOM Digest Special: Jolnet, Again |
| ****************************** |
| --------------- |
| [reprinted without permission from the Feb. 12th, 1990 issue of Telephony] |
| ALLEGED HACKERS CHARGED WITH THEFT OF 911 DATA |
| Dawn Bushaus, Assistant Editor |
| Four alleged computer hackers were indicted last week on charges that they |
| schemed to steal and publish proprietary BellSouth Corp. emergency data. The |
| alleged activity could have produced disruptions in 911 networks nationwide, |
| according to federal officials. |
| The case could raise new concerns about the security of local exchange |
| carriers' internal computer networks, which house data records on customers, |
| equipment and operations. |
| "Security has always been a concern for the telephone companies," said |
| Peter Bernstein, an analyst with Probe Research. "If you can crack the 911 |
| system, what does that say about the operational support system or the billing |
| system?" |
| A federal grand jury in Chicago handed down two indictments charging |
| [The Prophet], 20, of Decatur, Ga., and [Knight Lightning], 19, of |
| Chesterfield, Mo., with wire fraud, violations of the 1986 Computer Fraud Act |
| and interstate transportation of stolen property. |
| Facing similar criminal charges in Atlanta are [The Urvile], 22, and |
| [The Leftist], 23. |
| The four, alleged to be part of a closely knit group of hackers calling |
| themselves the Legion of Doom, reportedly participated in a scheme to steal the |
| BellSouth 911 data, valued at $80,000, and publish it in a hacker magazine |
| known as "Phrack." |
| The Legion of Doom reportedly is known for entering telephone companies' |
| central office switches to reroute calls, stealing computer data and giving |
| information about accessing computers to fellow hackers. |
| According to the Chicago indictment, XXXXX, also known as "The Prophet," |
| stole a copy of the BellSouth 911 program by using a computer outside the |
| company to tap into the BellSouth computer. Riggs then allegedly transferred |
| the data to a computer bulletin board in Lockport, Ill. |
| XXXXXXX, also known as "Knight Lightning," reportedly downloaded the |
| information into his computer at the University of Missouri, Columbia, where he |
| edited it for publication in the hacker magazine, the indictment said. |
| The indictment also charges that the hackers disclosed the stolen |
| information about the operation of the enhanced 911 system to other hackers so |
| that they could illegally access the system and potentially disrupt or halt |
| other systems across the country. |
| The indictments followed a year-long investigation, according to U.S. |
| Attorney Ira Raphaelson. If convicted, the alleged hackers face 31 to 32 years |
| in prison and $122,000 in fines. |
| A BellSouth spokesman said the company's security system discovered the |
| intrusion, which occurred about a year ago, and the company then notified |
| federal authorities. |
| Hacker invasion in the BellSouth network is very rare, the spokesman said, |
| adding that the company favors "stringent laws on the matter." |
| The indictment solicited concern about the vulnerability of the public |
| network to computer hacking. |
| ---------------- |
| From: MM02885@swtexas.bitnet |
| Newsgroups: comp.dcom.telecom |
| Subject: Re: Hacker Group Accused of Scheme Against BellSouth |
| Message-ID: <4153@accuvax.nwu.edu> |
| Date: 20 Feb 90 11:16:00 GMT |
| Sender: news@accuvax.nwu.edu |
| Organization: TELECOM Digest |
| Lines: 95 |
| Approved: Telecom@eecs.nwu.edu |
| X-Submissions-To: telecom@eecs.nwu.edu |
| X-Administrivia-To: telecom-request@eecs.nwu.edu |
| X-Telecom-Digest: Volume 10, Issue 118, message 3 of 6 |
| <<< SYS$ANCILLARY:[NOTES$LIBRARY]GENERAL.NOTE;1 >>> |
| -< General Discussion >- |
| ============================================================================== |
| Note 155.6 the MENTOR of the tree tops 6 of 6 |
| SWT::RR02026 "Ray Renteria [ F L A T L I N E ] " 89 lines 20-FEB-1990 00:18 |
| -< Life, The Universe, & LOD >- |
| To set the record straight, a member of LOD who is a student in Austin |
| and who has had his computer account at UT subpoenaed by the DA out of |
| Chicago because of dealings with the above happenings: |
| My name is Chris, but to the computer world, I am Erik Bloodaxe. I |
| have been a member of the group known as Legion of Doom since its |
| creation, and admittedly I have not been the most legitimate computer |
| user around, but when people start hinting at my supposed |
| Communist-backed actions, and say that I am involved in a world-wide |
| consipracy to destroy the nations computer and/or 911 network, I have |
| to speak up and hope that people will take what I have to say |
| seriously. |
| Frank, Rob and Adam were all definately into really hairy systems. |
| They had basically total control of a packet-switched network owned by |
| Southern Bell (SBDN)...through this network they had access to every |
| computer Southern Bell owned...this ranging from COSMOS terminals up |
| to LMOS front ends. Southern Bell had not been smart enough to |
| disallow connections from one public pad to another, thus allowing |
| anyone who desired to do so, the ability to connect to, and seize |
| information from anyone else who was using the network...thus they |
| ended up with accounts and passwords to a great deal of systems. |
| This was where the 911 system came into play. I don't know if this |
| system actually controlled the whole Southern Bell 911 network, or if |
| it was just a site where the software was being developed, as I was |
| never on it. In any case, one of the trio ended up pulling files off |
| of it for them to look at. This is usually standard proceedure: you |
| get on a system, look around for interesting text, buffer it, and |
| maybe print it out for posterity. No member of LOD has ever (to my |
| knowledge) broken into another system and used any information gained |
| from it for personal gain of any kind...with the exception of maybe a |
| big boost in his reputation around the underground. Rob took the |
| documentation to the system and wrote a file about it. There are |
| actually two files, one is an overview, the other is a glossary. (Ray |
| has the issue of PHRACK that has the files) The information is hardly |
| something anyone could possibly gain anything from except knowledge |
| about how a certain aspect of the telephone company works. |
| The Legion of Doom used to publish an electronic magazine called the |
| LOD Technical Journal. This publication was kind of abandoned due to |
| laziness on our part. PHRACK was another publication of this sort, |
| sent to several hundred people over the Internet, and distributed |
| widely on bulletin boards around the US. Rob sent the files to PHRACK |
| for the information to be read. One of PHRACK's editors, Craig, |
| happened to be the one who received the files. If Rob had sent the |
| files to one address higher, Randy would have been the one who would |
| probably be in trouble. In anycase, Craig, although he may have |
| suspected, really had no way to know that the files were propriatary |
| information and were stolen from a Southern Bell computer. |
| The three Atlanta people were busted after having voice and data taps |
| on their lines for 6 months. The Phrack people were not busted, only |
| questioned, and Craig was indicted later. |
| What I don't understand is why Rob and Craig are singled out more |
| often than any other people. Both of them were on probation for other |
| incidents and will probably end up in jail due to probation violations |
| now. Frank and Adam still don't know what is going on with their |
| cases, as of the last time I spoke with them. |
| The whole bust stemmed from another person being raided and rolling |
| over on the biggest names he could think of to lighten his burden. |
| Since that time, Mr. William Cook, the DA in Chicago, has made it his |
| life's goal to rid the world of the scourge of LOD. The three Atlanta |
| busts, two more LOD busts in New York, and now, my Subpoena. |
| People just can't seem to grasp the fact that a group of 20 year old |
| kids just might know a little more than they do, and rather than make |
| good use of us, they would rather just lock us away and keep on |
| letting things pass by them. I've said this before, you cant stop |
| burglars from robbing you when you leave the doors unlocked and merely |
| bash them in the head with baseball bats when they walk in. You need |
| to lock the door. But when you leave the doors open, but lock up the |
| people who can close them for you another burglar will just walk right |
| in. |
| If anyone really wants to know anything about what is going on or just |
| wants to offer any opinions about all this directly to me, I'm |
| erikb@walt.cc.utexas.edu |
| but my account is being monitored so don't ask anything too explicit. |
| ->ME |
| ----------- |
| Well, as some of you may already know, the people that put out Phrack were |
| busted recently. Up until now, details were scarce, but things are starting to |
| appear in the news. |
| [reprinted without permission from the Milwaukee Journal Wed. Feb. 7th] |
| Chicago, Ill. - AP - A computer hacker broke into the 911 emergency |
| telephone network covering nine states in the South and another intruder passed |
| on the access data to other hackers, authorities said. |
| [The Prophet], 20, of Decatur, GA., and [Knight Lightning], |
| 19, of Chesterfield, MO., were indicted Tuesday by |
| a federal grand jury and accused of computer crimes, said acting US Atty. Ira |
| H. Raphaelson. |
| He said Riggs was a member of the so-called Legion of Doom hackers |
| group, whose members are involved in numerous illegal activities. |
| Riggs and two other alleged members also were indicted in Atlanta and |
| charged in other computer break-ins. |
| The government would not say if any emergency calls were disrupted or |
| whether other damage was done during the tampering. |
| ------------ |
| Name: The Prophet #104 |
| Date: Tue Feb 06 23:55:15 1990 |
| Imagine that you're deaf, dumb, blind, and paralyzed from the neck down and |
| totally unable to experience or communicate with the outside world. How long |
| could you retain your sanity? How many of you would choose to die instead? |
| How many of you think you could muster the willpower to create your own little |
| mental world to live in for the rest of your life, and how long do you think |
| the hospital would wait before putting you out of your misery? |
| -The Prophet |
| ------------ |
| Name: The Mentor #1 |
| Date: Sat Jan 20 02:58:54 1990 |
| Welp, Phrack magazine is dead. Those of you who pay attention to BITNET know |
| that the phrack accounts at U of M have been shut down. The story is as |
| follows... |
| Government agents (not sure of the dept., probably SS) have apparently been |
| monitoring the e-mail of the Phrack kids (Knight Lightning & Taran King) for |
| some time now. Apparently, a portion of a file sent to them (and subsequently |
| published) contained copyrighted information. This is all they needed. They |
| have now seized the entire Phrack net mailing list (over 500 accounts), plust |
| every piece of information that Randy & Craig have (and they have a *LOT*) on |
| real names, addresses and phone numbers. |
| This is evolving directly out of the busts of three LOD members (Urvile, |
| Leftist & Prophet). The Prophet (who is on probation) is apparently being |
| threatened with a prison term if he doesn't cooperate. We don't know for sure |
| if he cooperated or not, but what would you do in the same position? |
| The same officials are apparently *VERY* interested in our co-sys, Mr. |
| Bloodaxe. His net account is being watched, etc. I'll let him tell the story. |
| board only. I will be adding a secure (and I mean fucking secure) encryption |
| routine into the e-mail in the next 2 weeks - I haven't decided exactly how to |
| implement it, but it'll let two people exchange mail encrypted by a password |
| only know to the two of them. Hmmmm... carry this conversation to the |
| programming board. |
| Anyway, I do not think I am due to be busted, but then again, I don't do |
| anything but run a board. Still, there is that possibility. I assume that my |
| lines are all tapped until proven otherwise. |
| There is some question to the wisdom of leaving the board up at all, but I hae |
| (have) personally phoned several government investigators and invited them to |
| join us here on the board. If I begin to feel that the board is putting me in |
| any kind of danger, I'll pull it down with no notice - I hope everyone |
| understands. |
| It looks like it's sweeps-time again for the feds. Let's hope all of us are |
| still around in 6 months to talk about it. |
| The Mentor |
| Legion of Doom! |
| [Phoenix Project has been down for some time now.] |
| --------------- |
| Newsgroups: comp.dcom.telecom |
| Subject: The Purpose and Intent of the Legion of Doom |
| Message-ID: <4248@accuvax.nwu.edu> |
| From: anytown!legion@cs.utexas.edu (Legion of Doom) |
| Date: 22 Feb 90 04:42:04 GMT |
| Sender: news@accuvax.nwu.edu |
| Organization: Anytown USA |
| Approved: Telecom@eecs.nwu.edu |
| X-Submissions-To: telecom@eecs.nwu.edu |
| X-Administrivia-To: telecom-request@eecs.nwu.edu |
| X-Telecom-Digest: Volume 10, Issue 121, message 4 of 5 |
| Lines: 51 |
| [Moderator's Note: This anonymous message came in the mail today. PT] |
| Well, I had to speak up. There has been a lot of frothing (mostly by |
| people who believe everything that they read in the paper) about |
| Legion of Doom. I have been involved in the group since 1987, and |
| dislike seeing irresponsible press concerning our "plot to crash 911" |
| or our "links to organized crime." |
| LOD was formed to bring together the best minds from the computer |
| underground - not to do any damage or for personal profit, but to |
| share experiences and discuss computing. The group has *always* |
| maintained the highest ethical standards of hacker (or "cracker," as |
| you prefer) ethics. On many occasions, we have acted to prevent abuse |
| of systems that were *dangerous* to be out - from government systems |
| to Easter Seals systems. I have known the people involved in this 911 |
| case for many years, and there was *absolutely* no intent to interfere |
| with or molest the 911 system in any manner. While we have |
| occasionally entered a computer that we weren't supposed to be in, it |
| is grounds for expulsion from the group and social ostracism to do any |
| damage to a system or to attempt to commit fraud for personal profit. |
| The biggest crime that has been committed is that of curiosity. Kim, |
| your 911 system is safe (from us, at least). We have been instrumental |
| in closing many security holes in the past, and had hoped to continue |
| to do so in the future. The list of computer security people who count |
| us as allies is long, but must remain anonymous. If any of them choose |
| to identify themselves, we would appreciate the support. |
| I am among the people who no longer count themselves as "active" |
| members of the group. I have been "retired" for well over a year. But |
| I continue to talk to active members daily, and support the group |
| through this network feed, which is mail-routed to other LODers, both |
| active and accessible. |
| Anyone who has any questions is welcome to mail us - you'll find us |
| friendly, although a bit wary. We will also be glad to talk voice with |
| anyone if they wish to arrange a time to call. In spite of all the |
| media garbage, we consider ourselves an ethical, positive force in |
| computing and computer security. We hope others will as well. |
| The Mentor/Legion of Doom |
| legion%anytown.uucp@cs.utexas.edu |
| [Moderator's Note: As an 'ethical, positive force in computing', why |
| can't you sign your name to messages such as the above? Usually I |
| don't even consider anonymous messages for publication in the Digest; |
| but your organization has a perfect right to tell your side of the |
| story, and I am derelict if I don't print it. Real names and |
| addresses go a long way toward closing credibility gaps here. PT] |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
| There you go. It's over now, forget it and move on. Nothing more to |
| report on the subject that hasn't been printed, typed, spoken, or heard in the |
| last couple of months. |
|
|
| _______________________________________________________________________________ |
| Phrack 31 - .end |
|
|
|
|
|
|
|
|