|
*** SEIZURE WARRANT DOCUMENTS FOR RIPCO BBS *** ******************************************************************** On May 8, 1990, RIPCO BBS was closed and the equipment seized as the result of a seizure warrant. FULL DISCLOSURE Magazine obtained publicly available copies of the various documents related to the warrant, which are reproduced below. The documents include (in order presented): 1. Government's petition for Assistance during Execution of Search Warrant 2. ORDER approving assistance 3. Order authorizing blocking out income telephone and data calls 4. Application for order to block out calls 5. Application and affidavit for seizure warrant (Barbara Golden, affiant) 6. Application and affidavit for seizure warrant (G. Kirt Lawson, affiant) Attached to the original documents (but not presented here) are an application (by Ira H. Raphaelson and William J. Cook, United States attorney and AUSA) to suppress the seizure warrant for 90 days, and a variety of photographs of Dr. Ripco's premises. ******************************************************************* **************************************** Government's Petition for Assistance **************************************** UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION UNITED STATES OF AMERICA ) ) v. ) No. 90-M-187 & 90-M-188 ) Magistrate James T. Balog ) xxxx NORTH CLYBOURN, CHICAGO ) ILLINOIS AND xxxx NORTH ) LAWNDALE, CHICAGO, ILLINOIS ) GOVERNMENT'S PETITION FOR ASSISTANCE DURING EXECUTION OF SEARCH WARRANT The United States of America, by its attorney, Ira H. Raphaelson, United States Attorney for the Northern District of Illinois, petitions this Court for an order directing representatives of AT&T's Corporate Security Division to accompany Special Agents of the Secret Service during the execution of the search warrant against the premises of xxxx North Clybourn, Chicago, Illinois, and xxxx North Lawndale, Chicago, Illinois. This petition is supported by the following: 1. The affidavit of Special Agent Barbara Golden of the Secret Service is incorporated herein by reference. 2. AT&T has offered the assistance of Jerry Dalton and John Hickey of AT&T Corporate Security/Information Protection to the government and this Court. Both men are very experienced in the operation of computers and especially in the analysis of UNIX systems. 3. We also request that Sergeant Abigail Abrahams of the Illinois State Police be authorized in the execution of the aforementioned warrants. Sergeant Abrahams has investigated the computer bulletin board (BBS) operation since approximately 1988 - 1 - and has extensive details with respect to the structure of the BBS and its contents. While these individuals will not be seizing evidence, their assistance is necessary to quickly read and identify the critical files in the computer being searched. Moreover, their presence during the search will insure that the records on the computer are not accidentally erased and remain intact. Respectfully submitted, IRA H. RAPHAELSON United States Attorney BY: (signature of) WILLIAM J. COOK Assistant United States Attorney - 3 - UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION UNITED STATES OF AMERICA ) ) v. ) No. 90-M-187 & 90-M-188 ) Magistrate James T. Balog ) xxxx NORTH CLYBOURN, CHICAGO ) ILLINOIS AND xxxx NORTH ) LAWNDALE, CHICAGO, ILLINOIS ) ORDER In view of the specialized nature of the evidence that is being sought in this warrant, _______________, as indicated in the government's petition and the affidavit for the search warrant, which is incorporated herein by reference; It is Hereby Ordered that representatives of AT&T's Corporate Security Division and Sergeant Abigail Abrahams of the Illinois State Police accompany Special Agents of the United States Secret Service during the execution of the search warrant to assist those agents in the recovery and identification of the evidence sought in the warrant. (signature) James T. Balog 5-7-90 UNITED STATES MAGISTRATE - 3 - UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION IN THE MATTER OF THE ) APPLICATION OF THE UNITED STATES ) OF AMERICAN FOR AN ORDER FOR THE ) No. 90-M-187 & 90-M-188 BLOCKING OF INCOMING TELEPHONE ) Magistrate James T. Balog AND DATA CALLS AT (312 )528-5020 ) (312 )xxx-xxxx AND (312)xxx-xxxx ) ORDER AUTHORIZING BLOCKING OUT INCOME TELEPHONE DATA CALLS An application having been made before me by Colleen D. Coughlin, an Assistant United States Attorney for the Northern District of Illinois, pursuant to Title 28, United States Code, Section 1651, for an Order to "block out" incoming telephone and data calls by the Illinois Bell Telephone company, and there is reason to believe that requested actions are relevant to a legitimate law enforcement investigation; IT IS ORDERED THAT: 1. Illinois Bell Telephone company servicing said telephone lines shall "Block out" of incoming telephone and data calls on (312) 528-5020, (312) xxx-xxxx and (312) xxx-xxxx, which telephone and data lines are on premises which are the subject of federal search warrants to be executed the 8th day of May, 1990 at approximately 0630 hours. Such "blocking out" of incoming telephone and data calls shall commence at 0500 hours on May 8, 1990 and continue up to and incoming 1700 hours on May 8, 1990, or until the completion of the search warrants, whichever is the earlier. 2. The "blocking out" of incoming telephone and data calls will likely assist in the execution of search warrants seeking - 4 - evidence of violations of Title 18, United States Code, Sections 1343, 1030, 1962, 1963, and 371. (signature of) JAMES T. BALOG Magistrate 5-7-89 (sic) - 5 - UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION IN THE MATTER OF THE ) APPLICATION OF THE UNITED STATES ) OF AMERICAN FOR AN ORDER FOR THE ) No. 90-M-187 & 90-M-188 BLOCKING OF INCOMING TELEPHONE ) Magistrate James T. Balog AND DATA CALLS AT (312 )528-5020 ) (312 )xxx-xxxx AND (312)xxx-xxxx ) A P P L I C A T I O N Now comes the UNITED STATES OF AMERICA, by IRA H. RAPHAELSON, United States Attorney and Colleen D. Coughlin, Assistant United States Attorney, and makes application pursuant to Title 28, United States Code, Section 1651, the All Writs Act, for an Order to stop or "block out" incoming telephone calls to particular telephone and/or data lines, as described below, by the Illinois Bell Telephone Company. In support of this Application the undersigned states as follows: 1. This Application seeks an order requiring the Illinois Bell Telephone Company to "block out" incoming telephone and data calls from 0500 hours until 1700 on May 8, 1990 regarding the following numbers (312) 528-5020, (312) xxx-xxxx and (312) xxx- xxxx. 2. The United States Secret Service has been conducting a two year investigation into the activities of computer hackers which will result in thirty-two search warrants being executed across the United States on May 8, 1990 beginning at 0630 hours. 3. Because the United States Secret Service needs to ensure the integrity of the evidence at each of these locations from remote access tampering, alteration, or destruction, this "blocking out" order is required. 4. This action by Illinois Bell Telephone will only "block out" incoming calls and the telephones will at all times be capable of making "outgoing" calls. Thus, the telephone lines will at all times be available for emergency outgoing calls. 5. It is reasonably believed by the United States Secret Service, based on experience and their investigation in this case, that the requested action will be of substantial assistance in forwarding this criminal investigation. 6. The All Writs Act, 28 U.S.C. 1651, provides as follows: The Supreme Court and all courts established by the Act of Congress may issue all writs necessary and appropriate in aid of their respective jurisdictions and agreeable to the uses and principles of law. 7. A Federal Court has power to issue "such commands under the All Writs Act as may be necessary or appropriate to effectuate and prevent the frustration of orders it has previously issued in the exercise of its jurisdiction...." UNITED STATES v. NEW YORK TELEPHONE CO., 434 U.S. 159, 172 (1977). WHEREFORE, on the basis of the allegations contained in this Application, applicant requests this Court to enter an order for "blocking out" of income telephone and/or data calls at the above described telephone numbers. It is further requested that Illinois Bell Telephone Company may be ordered to make no disclosure of the existence of this Application and Order until further order of this Court since - 2 - disclosure of this request to the individual or individuals whose telephone lines are affected would threaten or impede this computer investigation. Respectfully submitted, IRA H. RAPHAELSON United States Attorney By: (signed) COLLEEN D. COUGHLIN Assistant United States Attorney - 3 - **************************************************** {transcriber's note:} Following is the APPLICATION AND AFFADAVIT FOR SEIZURE WARRANT, Case number 90-M-187, dated May 7, 1990. Affiant: Barbara Golden, Special Agent, U.S. Secret Service Location: United State District Court, Northern District of Illinois Judicial Officer: Magistrate James T. Balog The warrant alleges violations under Title 18, USC, Sections 1343, 1030, 1029, 1962, 1963, and 371. ******************************************* --------------(Begin Barbara Golden's Affidavit)----------------- State of Illinois ) ) SS County of Cook ) AFFIDAVIT 1. I, Barbara Golden, am a Special Agent of the United States Secret Service and have been so employed for the past fourteen years; the past three years as a Special Agent. I am present assigned to the Computer Fraud Section of the United States Secret Service in Chicago. I am submitting this affidavit in support of the search warrants for the residence of Bruce Xxxxxxxxxxx xxxx North Lawndale, Chicago, Illinois (including the detached garage behind the house) and his business address at xxxx North Clybourn, Chicago, Illinois. 2. This affidavit is based upon my investigation and information provided to me by Special Agent G. Kirt Lawson of the United States Secret Service in Phoenix, Arizona and by other agents of the United States Secret Service. I have also received information from Sergeant Abigail Abrahams of the Illinois State Police. 3. Additionally, I have received technical information and investigative assistance from Roland Kwasny of Illinois Bell Telephone Corporate Security. VIOLATIONS INVOLVED 4. This warrant is requested to recover unauthorized and illegally used access codes posted on the RIPCO BBS by computer hackers and to develop evidence of their illegal use of those codes in violation of federal criminal laws, including: - 1 - a. 18 USC 2314 which provides federal criminal sanctions against individuals who knowingly and intentionally transport stolen property or property contained by fraud, valued at $5,000.00 or more, in interstate commerce. b. 18 USC 1030(a)(6) provides federal criminal sanctions against individuals who, knowingly and with intent to defraud, traffic in interstate commerce any information through which a computer may be accessed without authorization in interstate commerce. c. Other federal violations involved in this case may include Wire Fraud (18 U.S.C. 1343), Access Device Fraud (U.S.C. 1029) and other violations listed and described on page 15, 16, and 17 of the attached affidavit of Special Agent Lawson. LAWSON AFFIDAVIT 5. The attached affidavit of Special Agent Kirt Lawson is incorporated herein in its entirety and is attached as Attachment 1. Lawson's affidavit is based upon a two year undercover investigation of the United States Secret Service involving an undercover bulletin board located in Phoenix, Arizona. Essentially, Lawson's affidavit and my investigation establish probably cause to believe: a. Bruce Xxxxxxxxxxx, using the computer hacker handle "Dr. Ripco", has been operating the RIPCO BBS in Chicago since approximately December 10, 1983. - 2 - b. During the time period named in the Lawson affidavit unauthorized access codes were posted on the RIPCO BBS by various computer hackers. c. The access codes posted on the RIPCO BBS have been determined by Special Agent Lawson to be valid access codes which are being used without authorization of the true authorized user of the access codes. Moreover, in many cases the access codes have been reported stolen by the true authorized user(s). d. Special Agent Lawson's investigation has further determined that the access codes posted on the RIPCO BBS are not concealed from the system administrator of the BBS and could be seen by the system administrator during an examination of the BBS. 6. I have personally worked with S.A. Lawson on computer crime investigations and known him to be a reliable agent of the Secret Service and an expert in the field of telecommunication investigations. 7. I personally received the attached affidavit on May 1, 1990 and have verified with S.A. Lawson that it is in fact his affidavit and have verified with S.A. Lawson that it is in fact his affidavit and that it accurately reflects his investigation. I have verified information with respect to his investigation with Special Agent Lawson as recently as May 7, 1990. - 3 - UPDATED PROBABLE CAUSE 8. On May 1, 1990, I personally observed that the surveillance cameras described on pages 32 and 33 of Lawson's affidavit still appear to be in operation. (The antennas and surveillance cameras located at the Clybourn address are reflected in the photographs attached as Attachment 2.) 9. On May 4, 19900, I personally updated the status of the telephone lines at the Clybourn address with Roland Kwasny of Illinois Bell Telephone. Kwasny advised me that those telephones continue to be in active service at this time. ITEMS TO BE SEIZED 10. On pages 36 to 39 of his affidavit S.A. Lawson describes the items to be seized at the search locations. Locations to be Searched 11. The complete description of the business location to be searched on Clybourn Street is contained on page 30 of S.A. Lawson's affidavit. (Photographs of that location are in Attachment 2.) I have personally observed the resident to be searched on Lawndale on May 1, 1990. The photographs attached to this affidavit as Attachment 3 truly and accurately show the residence known as xxxx North Lawndale, Chicago, Illinois, as of May 1, 1990. - 4 - EXAMINATION OF COMPUTER RECORDS 13. Request is made herein to search and seize the above described computer and computer data and to read the information contained in and on the computer and computer data. 14. The following attachments are incorporated herein by reference: Attachment 1 - Affidavit of S.A. Lawson (39 pages): Attachment 2 - Photographs of the Clybourn address (2 pages); Attachment 3 - Photographs of the Lawndale address (1 page). (signature) Special Agent Barbara Golden United States Secret Service Sworn and Subscribed to before me this 7th day of May, 1990. (signature) James T. Balog UNITED STATES MAGISTRATE - 5 - ** (End Barbara Golden's Affidavit) ** ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ ** (Begin G. Kirt Lawson's affidavit) ** ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ State of Arizona ) ) SS County of Maricopa ) AFFIDAVIT 1. Your affiant G. Kirt Lawson has been a Special Agent of the U.S. Secret service for eighteen years and in the course of his employment has investigated over 100 cases involving credit card fraud, theft, computer- related crime, and other offenses. I have training from the Secret Service in the investigation of computer fraud, have attended six or more seminars on investigative procedures from AT&T and the Secret Service, and have lectured on computer crime for the IEEE (an international professional group of electrical engineers) and Bellcore (the research / security organization owned by the regional Bell operating companies.) Within the last year, I have assisted the Arizona Attorney General's office with the execution of three computer-crime search warrants, and the Austin, Texas field office of the Secret Service with the execution of another computer-related search warrant. Over the last two years, I have assisted numerous state, local, and federal law enforcement agents in half a dozen U.S. cities by providing information and technical assistance which has led to the execution of over a dozen search warrants in computer crime cases nationwide. - 1 - SOURCES OF INFORMATION 2. Your affiant has also received technical information and investigative assistance from the following experts in the field of telecommunication fraud and computer crime: a. R.E. "Sandy" Sandquist,, Regional Security Manager, U.S. Sprint Communications Company, who has been so employed since 1987, and was previously employed by General Telephone (GTE) as a special agent, technical investigations since 1983. He has investigated cases of communications fraud involving computer hackers, computer bulletin board systems (see Definitions section below), and the abuse of voice mail message computers, involving over 100 systems. He has assisted law enforcement search teams in the execution of search warrants, and has trained many state, local and federal agents in the investigation of computer and communications crime. b. Stephen R. Purdy, Special Agent, U.S. Secret Service, currently the Assistant to the Special Agent In Charge of Fraud Division of the Computer Diagnostic Lab in Washington, D.C. He is a member of the Federal Computer Investigations Committee, and is currently its Co-Chair. He has helped to design training programs in computer crime and telecommunications fraud investigations for the Federal Law Enforcement Training Center in Glynco, Georgia. He also developed and instructs in the Secret Service's training program in computer fraud investigations. - 2 - c. George Mehnert has been a Special Agent with the Arizona Attorney General's office for more than twelve years; for the last three years, he has been responsible for special projects including the investigation of computer crime. He has taken courses relating to computer hardware and software programs from various industry sources and a local college, and has worked with computer hardware and software, including communications equipment and analysis tools, in investigative matters for more than six years. Mehnert has instructed numerous state and local law enforcement agencies in the methodology of executing search warrants involving computers, and in the investigation of computer crimes. He recently published of article on this subject in a law enforcement periodical. In the past two years, Mehnert has been involved in thirty warrant searches relating to the seizure of computer of communications-related evidence. d. In addition to the above, affiant has also received technical assistance and information from the following communication industry sources: Steve Matthews, Telenet; Leila Stewart, MCI; Sue Welch, MCI; Toni Ames, U.S. West; Connie Bullock, ComSystems (a long-distance carrier); Karen Torres, MidAmerican Communications Company; Richard Petiollo and Richard Kopacz, AT&T; Hank Kluepfel and David Bauer, Bellcore (a research/security company owned by the Bell Regional Operating Companies); Marty Locker, International Telephone and Telegraph (ITT), and credit industry sources: Valerie Larrison, American Express; MaryAnn Birkinshaw, TRW: Michelle Mason, CBI (TRW and CBI are national card bureaus). - 3 - DEFINITIONS AND EXPLANATIONS 3. Computer hackers: individuals involved in the unauthorized intrusion into computer systems by various means. They commonly identify themselves by aliases of "hacker handles" when communicating by voice or electronically with other hackers. Because they normally communicate through electronic bulletin board systems in several states, and because they often conduct their hacking activities against victims at many locations outside their local calling area, computer hackers typically use long-distance carrier customer authorization codes without the permission of the individuals or corporations to which they are assigned, in order to achieve "free" long distance telecommunications (over standard voice lines, or over data-communications services). Search warrants executed in hacker cases routinely produce evidence of theft of communications services, and often product of possession, use, and/or distribution of credit cards as well. 4. Electronic Bulletin Board System (BBS): an electronic bulletin board is a computer operated as a medium of electronic communications between computer users at different locations. Users access the BBS by telephone from distant locations (often their residences), using their own computers and communication devices (modems). Typical functions of a BBS include (1) providing storage for a software library; (2) allowing users to "download" (copy to their own computers) various files or software programs; (3) allowing users to - 4 - exchange and store messages by "electronic mail"; and (4) publishing of text files and tutorials, which contain information or instructions on various subjects of interest to the users. Although many BBS's are operated as commercial services to the public (large services such as Compuserve and The Source may offer many more functions than those listed above), thousands of BBS's are privately operated by individuals who run them from their residences, or by special-interest clubs. It is common for a BBS to have several sections or "conferences" on the system, to which a particular level of access is required: many users might have access to lower-level sections, while only some users would be permitted to access the highest-level sections (many sysops --defined below-- "voice validate" a prospective user, using a telephone call to screen users and determine whether they are law enforcement, adults, or other undesirables). This is particularly true of BBS's whose members are involved in some form of criminal activity. Many "underground" or criminal bulletin boards contain subsections through which the users regularly exchange stolen customer authorization codes, credit card numbers, and information on techniques or methods for the commission of such crimes as computer fraud and abuse, access device fraud and wire fraud. 5. System operator/system administrator (sysop): the person(s) charged with the responsibility for operating a particular computer bulletin board system (usually the owner of - 5 - the computer who lives in the residence where the BBS is operating). In order to perform their necessary supervisory and maintenance functions, sysops who run or own the BBS give themselves the highest level of access, or privileges, available on a system. In the case of a bulletin board sysop, these functions typically include deciding whether or not to to give access or type of privileges to allow to different users, and the ability to read the entire content stored on the BBS (including "private mail" -- see electronic mail, below.) Sysops control the BBS, can remove contents, add and delete users, change the programming, alter the communications parameters, and perform a number of administrative and maintenance tasks associated with operation of the BBS. 6. Electronic mail (E-mail): electronic mail is a means of communication among computer users, and is one of the features normally found on a BBS. Each user on a criminal BBS has a distinct identifier, with a computer hacker's "username" or "login" often identical to his hacker handle (handles tend toward the theatrical, I.e. Prophet of Doom, DungeonMaster, Ax Murderer, etc.) and a unique confidential password; each user may also be assigned a user number by the system. Users may send "public" mail by leaving a message in a section of the system where all who call in may read the message and respond. They may also send "private mail" by sending a message limited to a particular individual or group. - 6 - In this instance, other users would not be able to read the private message. (Except, of course for the sysop, as explained above.) 7. Chat: unlike electronic mail, which consists of messages and responses entered and stored for later review, the "chat" communication on a BBS consists of simultaneous interactive communication between the sysop and a user, or between two or more users -- the computer equivalent of a conference call. A more sophisticated BBS may have more than one telephone line connected to the system, so that two or more users can "talk" to each other though the BBS from their own computer systems at one time. 8. Voice Mail System (VMS): a voice mail system is an electronic messaging computer which acts as an answering service. These systems are generally either (1) operated for hire to the public by commercial communications companies, often in combination with cellular telephone or paging services, or (2) by corporations for the convenience of employees and customers. In either case, the subscriber or employee is assigned an individual "mailbox" on the system which is capable of performing several functions. Among these functions are receiving and storing messages from callers, sending messages to other boxes on the system, and sending messages to a pre-selected group of boxes. These functions are performed by pushing the appropriate numerical commands on a telephone keypad for the desired function. - 7 - 9. While voice mail systems vary among manufacturers, in general, a caller dials either a local area code and number, or an "800" number to access the system. Generally, the caller hears a corporate greeting identifying the system and listing instructions for leaving a message and other options. To leave a message, the caller enters a "mailbox number," a series of digits (often identical to the assigned owner's telephone extension), on his own telephone keypad. The caller then hears whatever greeting the mailbox owner has chosen to leave. Again, the caller can usually exercise several options, one of which is to dictate an oral message after a tone. 10. In this respect, the voice mail system operates much like a telephone answering machine. Rather than being recorded on audio tape, however, the message is stored in digitized form by the computer system. When the message is retrieved, the computer plays it back as sound understandable by the human ear. The entire VMS is actually a computer system accessible through telephone lines; the messages are stored on large-capacity computer disks. 11. A caller needs to known only the extension or mailbox number in order to leave a message for the employee or subscriber. In order to retrieve the messages or delete them from the system, however, the person to whom the box is assigned must have both the box number and a confidential password: the password ensures privacy of the communications, by acting as a "key" to "unlock" the box and reveal its contents. Anyone - 8 - calling the telephone number of the mailbox hears the owner's greeting -- only the content of messages left for the owner is protected by the password or security code. The person to whom the box is assigned may also have the ability to change his password, thereby preventing access to the box contents by anyone who may have learned his password. 12. Private Branch Exchange (PBX): a private branch exchange is a device which operates as a telephone switching system to provide internal communications between telephone facilities located on the owner's premises as well as communications between the company and other private or public networks. By dialing the specific telephone number of a PBX equipped with a remote access feature and entering a numeric password or code on a telephone keypad or by means of a computer modem, the caller can obtain a dial tone, enabling the caller to place long distance calls at the expense of the company operating the PBX. 13. Phone phreak: phone phreaks, like computer hackers, are persons involved in the theft of long-distance services and other forms of abuse of communications technology, but they often do not have computer systems. Rather than communicating with each other through BBS's, they communicate with each other and, exchange stolen carrier customer authorization codes and credit cards, either directly or by means of stolen or "hacked" corporate voice mailboxes. Phone phreaks may also set up fraudulent conference calls for the - 9 - exchange of information. A phone phreak may operate a "codeline" (a method of disseminating unauthorized access devices) on a fraudulently obtained voice mailbox, receiving messages containing stolen credit card numbers from his co-conspirators, and in turn "broadcasting" them to those he shares this information with during the greeting (box owner's message to callers), which can be heard by anyone dialing the mailbox number. Phone phreaks and computer hackers sometimes share information by means of the conference calls and codelines. Like computer hackers, phone phreaks also identify themselves by "handles" or aliases. BACKGROUND OF THE INVESTIGATION 14. Over the past several years, the U.S. Secret Service has received and increasing number of complaints from long distance carriers, credit card companies, credit reporting bureaus, and other victims of crimes committed by computer hackers, phone phreaks, and computer bulletin board users and operators (see Definitions section), which have resulted in substantial financial losses and business disruption to the victims. Because the persons committing these crimes use aliases or "handles", mail drops under false names, and other means to disguise themselves, they have been extremely difficult to catch. They also conspire with many others to exchange information such as stolen long distance carrier authorization codes, credit card numbers, and technical information relating to the unauthorized invasion of computer systems and voice mail - 10 - messaging computers, often across state or national borders, making the investigation of a typical conspiracy extremely complex. Many of these persons are juveniles or young adults, associate electronically only with others they trust or who have "proven" themselves by committing crimes in order to gain the trust of the group, and use characteristic "hacker jargon." By storing and trading information through a network of BBS's, the hackers increase the number of individuals attacking or defrauding a particular victim, and therefore increase the financial loss suffered by the victim. 15. For all of the above reasons, the U.S. Secret Service established a computer crime investigation project in the Phoenix field office, utilizing an undercover computer bulletin board. The purpose of the undercover BBS was to provide a medium of communication for persons engaged in criminal offenses to exchange information with each other and with the sysop (CI 404-235) about their criminal activities. The bulletin board began operating on September 1, 1988 at 11:11 p.p., Mountain Standard Time, was located at 11459 No. 28th Drive, Apt. 2131, Phoenix, Arizona, and was accessed through telephone number (602) 789-9269. It was originally installed on a Commodore personal computer, but on January 13, 1989 was reconfigured to operate on an Amiga 2000 personal computer. 16. The system was operated by CI 404-235, a volunteer paid confidential informant to the U.S. Secret Service. CI 404-235 was facing no criminal charges. Over the past eighteen - 11 - months, information by CI 404-235 (see paragraph 16) has consistently proved to be accurate and reliable. The Arizona Attorney General's office executed six search warrants related to affiant's investigation in 1989 and 1990 (affiant participated in three of these). Evidence obtained in those searches corroborated information previously given to affiant or to George Mehnert, Special Agent of the Arizona Attorney General's office by CI 404-235. In over a dozen instances, CI 404-235's information was verified through other independent sources, or in interviews with suspects, or by means of a dialed number recorder (pen register). One arrest in New York has been made as a result of CI 404-235's warning of planned burglary which did occur at a NYNEX (New York regional Bell operating company) office. Throughout this investigation, CI 404-235 has documented the information provided to the affiant by means of computer printouts obtained from the undercover BBS and from suspect systems, and consensual tape recordings of voice conversations or voice-mail messages. 17. Because many of the criminal bulletin board systems require that a new person seeking access to the telephone code or credit card sections contribute stolen card information to demonstrate "good faith," when asked to do so, CI 404-235 has "posted," (left on the system in a message) Sprint, MidAmerican or ComSystems authorization codes given to affiant by investigators at these companies for that purpose. - 12 - EVIDENCE IN HACKER CASES 18. Computer hackers and persons operating or using computer bulletin board systems commonly keep records of their criminal activities on paper, in handwritten or printout form, and magnetically stored, on computer hard drives, diskettes, or backup tapes. They also commonly tape record communications such as voice mail messages containing telephone authorization codes and credit cards. On several occasions, affiant has interviewed George Mehnert, Special Agent, Arizona Attorney General's office and R.E. "Sandy" Sandquist, Security Manager, U.S. Sprint, about the types of evidence normally found in connection with computer/ communications crimes. Both have assisted more than 20 search teams in the execution of search warrants in such cases. Both Mehnert and Sandquist stated that because of the sheer volume of credit card numbers, telephone numbers and authorization codes, and computer passwords, and other information necessary to conduct this type of criminal activity, in almost every case, they have found a large volume of paper records and magnetically-stored evidence at scenes being searched. Because of the ease of storing large amounts of information on computer storage media such as diskettes, in a very small space, computer hackers and bulletin board users or operators keep the information they have collected for years, rather than discarding it. Mehnert stated that in virtually every communications/computer crime case he has investigated, the suspect was found to have records in his possession dating - 13 - back for years -- Mehnert stated that it is common in such cases to find records dating from 1985 and sometimes, even earlier. 19. Sandquist confirmed Mehnert's experience, stating that hackers and phone phreaks typically also keep a notebook listing the location of information especially important to them, for easy access. Mehnert has seized several of these "hacker notebooks" in computer/communications crime cases; they were usually found quite close to the computer system, or in the hacker's possession. Both Mehnert and Sandquist stated that it is common for a person involved in the theft of communications services (long distance voice or data calls, voice mail boxes, etc.) also to be involved in the distribution or use of stolen credit cards and/or numbers; hackers and phone phreaks often trade codes for credit cards, or the reverse. Both Mehnert and Sandquist stated that it is common to find credit card carbons at locations being searched for stolen telephone authorization codes. 20. Both Mehnert and Sandquist also stated other evidence commonly found in connection with these cases includes telephone lineman tools and handsets (used for invading telephone company pedestal or cross-boxes and networks, or for illegal interception of others' communications), tone generators (for placing fraudulent calls by electronically "fooling" the telephone network into interpreting the tones and legitimate electronic switching signals), computer systems (including central processing unit, monitor or screen, keyboard, modem for - 14 - computer communications, and printer), software programs and instruction manuals. Sysops of bulletin boards also commonly keep historical backup copies of the bulletin board contents or message traffic, in order to be able to restore the system in the event of a system crash, a power interruption or other accident. An important piece of evidence typically found in connection with a criminal bulletin board is the "user list" -- sysops normally keep such a list on the BBS, containing the real names and telephone numbers of users who communicate with each other only by "handles." The user list is a very substantial piece of evidence linking the co-conspirators to the distribution of telephone codes and credit cards through the BBS messages or electronic mail. 21. Mehnert and Sandquist stated that it is also common to find lists of voice mailboxes used by the suspect or his co-conspirators, along with telephone numbers and passwords to the voice mailboxes. Many suspects also carry pagers to alert them to incoming messages. CRIMINAL VIOLATIONS 22. Criminal violations may include, but are not limited to, the following crimes: 23. Wire fraud: 18 U.S.C. ~ 1343 prohibits the use of interstate wire communications as part of a scheme to defraud, which includes obtaining money or property (tangible or intangible) by a criminal or the loss of something of value by the victim. Investigation by your affiant has determined that - 15 - the actions of the computer hackers, phone phreaks and bulletin board operators detected in this investigation defrauded telephone companies whose customer authorization codes were exchanged through the BBS's) gained valuable property because their fraud scheme provided them with telephone customer authorization codes and other access devices which in turn could be used by them to obtain telephone services and property which would be charged to the victim companies. Their scheme also provided them with access to private branch exchange (PBX) numbers and codes which could be used to obtain telephone service which was charged to the victim companies. 24. Computer fraud and abuse: 18 U.S.C. ~ 1030 prohibits unauthorized access to a federal interest computer with intent to defraud. Intent to defraud has the same meaning as in the wire fraud statute above. A federal interest computer is defined as "one of two or more computers used in committing the offense, not all of which are located in the same state," as well as computers exclusively for the use of a financial institution or the United States Government, among others defined in the statute. This section also prohibits unauthorized access to financial records and information contained in consumer reporting agency files. 25. Access device fraud: 18 U.S.C. ~ 1029 prohibits the unauthorized possession of 15 or more unauthorized or counterfeit "access devices" with intent to defraud, and - 16 - trafficking in authorized access devices with an intent to defraud and an accompanying $1,000 profit to the violator or loss to the victim. These prohibitions also apply to members of a conspiracy to commit these offenses. Intent to defraud has the same meaning as in the wire fraud statute above. "Access devices" includes credit cards, long distance telephone authorization codes and calling card numbers, voice mail or computer passwords, and PINS (personal identification numbers). An "unauthorized access device" is any access device obtained with the intent to defraud, or is lost, stolen, expired, revoked, or cancelled. 26. Other offenses: other federal statutes violated in this case may include 18 U.S.C. ~ 1962 and 1963 which prohibit the commission of two or more acts of racketeering (including two or more acts in violation of 18 U.S.C. ~ 1343 and/or 1029), and permits forfeiture of the instrumentalities used or obtained in the execution of a crime; and 18 U.S.C. ~ 371, the federal conspiracy statute. PROBABLE CAUSE BULLETIN BOARD SYSTEM 312-528-5020 27. CI 404-235 has accessed a public electronic bulletin board at 312-528-5020 over three dozen times between 4/7/89 and 12/31/90. The most recent access was on 4/28/90. In the "Phone Phun" subsection of the BBS, CI 404-235 has regularly seen messages posted by users of the BBS, which contain long distance carrier customer - 17 - authorization codes, references to hacking, and to credit cards and credit bureaus. This affidavit is in support of a search warrant for two premises where evidence of the operation of the BBS is expected to be found. CI 404-235 provided to affiant copies of messages posted to the BBS, including the following: Numb 12 (54r4q9kl-12) Sub miscellaneous... From DON THOMPSON (#689) To all Date 03/17/89 03:55:00 PM o.k.: 1999: 322300 342059 366562 344129 549259 549296 492191 496362 422000 549659 28. In the above message, "1999" refers to the last four digits of the local access number assigned to Starnet, a long distance network owned by ITT Metromedia Communications. To use such codes, a caller dials the local access number, the customer authorization code, and the area code and number to be called. Marty Locker, ITT Security, verified that the local access number 950-1999 is Starnet's (Starnet's authorization codes and six digits long). Loss figures on the above are unknown. 29. On 3/20/89, user #452 "Blue Adept" replies to a previous message, as follows: - 18 - Numb 25 (54r4q9kl-25) Sub Reply to: Reply to: Legal expenses >From BLUE DEPT (#452) To all Date 03/20/89 08:42:00 AM 1999 is starnet. they've busted several people I know. they live to bust people. mainly with extraordinarily large fines. I've heard of them taking it to court though. first person they busted was the Diskmaster/Hansel. really cool guy. hacked em 300 times with the applecat and they busted him. he didn't "Hacked em 300 times" refers to the number of timers that "Diskmaster/Hansel" is supposed to have attempted to hack out a Starnet customer authorization code. "Applecat" is the name of a modem (computer communications device) and related software program which automates the code-hacking process. Numb 69 (54r4q9kl-69) Sub loop >From JOE FRIDAY (#120) To all Date 03/25/89 07:10:00 PM IF ANYONE HAS A LOOP FOR THE 404 AREACODE I WOULD APPR. IT VERY MUCH!! IF THERE ARE ANY REAL PHREAKS THAT STILL DO HACK ALOT LEAVE I THINCK YOU MIGHT BENEIFIT FROM IT. 18002370407-8010464006ACN- 8205109251- IF ANYONE STILL GETS INTO LMOSE LEAVE ME A MESSAGE.. 30. On 4/17/90 Mark Poms, Director of Security, Long Distance Service of Washington D.C., verified the following: 1) 1-800-237-0407 is his company's assigned 1-800-line number. Authorization code 8010464006 has suffered $6, 287.22 in fraud - 19 - losses, and 8205109251 has suffered $970.34 in fraud losses. 31. In the above message, "LOOP" refers to a telephone company "loop around test line". Hackers commonly exchange information on loops, in order to be able to communicate with each other without divulging their home telephone numbers. If two hackers agree to call a loop number at a certain time, they loop allows them to speak with each other -- neither hacker needs to know or to dial the other's telephone number. "LMOSE" refers to a type of computer system (LMOS) operated by Bell regional operating companies (local telephone companies). This computer system contains data such as subscriber records, and the LMOS system is solely for the use of telephone company employees for the purpose of maintaining telephone service. (Explanations provided by Bellcore computer security technical staff member David Bauer.) Numb 136 (56r5q9kl-136) Sub Suicide? >From THE RENEGADE CHEMIST (#340) To All Date 04/18/89 05:33:00 PM 9501001 074008 187438 057919 068671 056855 054168 071679 - 20 - 32. On 3/20/90 Karen Torres, MidAmerican Communications, a long distance carrier which a local access number of 950-1001 as valid MidAmerican customer authorization codes. She advised that all but the invalid code were terminated "due to hacking". 950-1001 074008 Valid code, no loss 187438 Valid code, no loss 057919 Invalid 068671 Valid code, no loss 056855 Valid code, no loss 054168 Valid code, no loss 071697 Valid code, no loss Numb 109 (53r3q0k2-109) Sub Reply to: Reply to: Reply to: Reply to: Reply to: John Anderson >From BRI PAPE (#22) To ALL... Date 06/28/89 05:31:00 AM ANOTHER valid code.. AND A DIVERTER... 215-471-0083..(REMAIN QUIET) 33. 950-0488 is the local access number for ITT Metromedia Communications, according to Marty Locker, ITT Security. Fraud, losses, if any, on this customer authorization code are unknown. 34. On 4/16/90, Kathy Mirandy, Director of Communications, Geriatrics and Medical Center Incorporated, - 21 - United Health Care Services, in Philadelphia, PA, verified that 1-215-471-0083 is her company's telephone number. She stated that between 12/28/88 nand 5/15/89, her company suffered a fraud loss of $81,912.26 on that number. In the above message, "diverter" refers to a common hacker/phone phreak term for a means of placing telephone calls through a telephone facility which belongs to someone else. The hacker "diverts" his call through the other facility, and if the outgoing "diverted" call is a long distance call, the owner of the facility is billed for the call as though it originated from the victim telephone facility. 35. On 7/3/89, CI 404-235 accessed the BBS and observed the following message, a copy of which was provided to the affiant: Numb 137 (56r3q0k2-137) Sub dib. >From POWER ASSIST (#524) To * Date 07/02/89 12:01:00 AM Divertors: 1800 543 7300 543 3300 I'm not sure if this is a 800 to 800 : 800 777 2233 36. On 4/18/90 Delores L. Early, Associate General Counsel of the Arbitron Company, Laurel, Maryland, verified that 1-800-543-7300 is listed to her company. She advised that her company suffered a direct fraud loss by October, 989 of $8,100 on that line, as well as additional expenses in for form of the installation of "an elaborate security procedure to prevent this - 22 - type of fraudulent use," and lost employee time in identifying and correcting the problem. "800 to 800" refers to whether the "divertor" posted in the above message can be used to call out to another 800 number. Numb 113 (53r6q0k2-113) Sub Codes >From BLUE STREAK (#178) To ALL Date 07/26/89 05:05:00 AM Here is a code: 1800-476-3636 388409+acn 950-0266 487005 8656321 6575775 oops first one is 4847 not 487 Blue Streak. Blee blee blee thats all pholks. 37. On 4/2/90. Dana Berry. Senior Investigator, Teleconnect (a division of Tele*Com USA, a long distance carrier), verified that 1-800- 476-3636 code 388409 is her company's authorization code and it has suffered a fraud loss of x176.21 {transcrib. note: portion of dollar figure (first digit) is illegible on copy of affidavit} 38. On 4/20/90, Christy Mulligan, ComSystems Security, whose company is assigned the local access number 950-0266, verified the following: - 23 - 1) 4847005 $2,548.75 loss due to fraud 2) 8656321 $2,000.00 loss due to fraud 3) 6575775 $ 753.61 loss due to fraud Numb 122 (57r3qlk2-122) Sub TRW >From NEMESIS TKK (#311) To Garth Date 09/30/89 04:01:00 AM I have no ideas about accessing TRW through any type of network, but,m you cal dial TRW directly (although you will probably want to code out..Even if format has changed or anything in the past 5 years.. its still db idpw first, ast, etc...So anyway, if you do know how to use it,you can get at it from that number. 39. In the above, "Nemesis" gives a telephone number in area code 602 (Arizona) for TRW. "Code out" refers to using a stolen customer authorization code ("if only to save yourself the fone bill") to call the TRW number. The format for getting in to the TRW computer that he gives Marianne Birkinshaw, TRW investigator advised that the telephone number posted in the message is "a legitimate telephone number into TRW's database". Numb 138 (57r4q2k2-138) Sub 5 >From Chris X (#134) To PEOPLE WHO HAVE OR HACK CODEZ Date 01/22/90 05:54:00 PM - 24 - Dear Anyone, I am in desperate need of a code. SOMEONE PLEASE Post a code with a dialup and the format the code must be entered. I will be ever so greatful. PLEASE HELP!!! Max Man - Chris X 40. In the above, user #134 asks for a code (customer authorization code), "dialup" (the local access or 800 number through which the code may be used), and the format (the order in which code, area code and number must be dialed in order to place a call on the particular network). Numb 146 Sub Here's your code beggar >From POWER ASSIST (#524) To beggars Date 01/23/90 12:40:00 AM 950-0266 6552513 1564844 probably die before you use it. -PA 41. On 4/19/90, John Elerick, ComSstems Security, verified that the codes posted with his company's local access number (950-0266) in the above message are valid; 6552513 has suffered $185.31 in fraud loss, and it" refers to the code -- customer authorization codes "die" when they are deactivated or cancelled by the carrier. - 25 - 42. On 1/26/90, CI 404-235 again accessed the BBS and observed the following message, a copy of which was provided to the affiant: Numb 147 (50r5q2k2-147) Sub ALL >From THE SILENCER (#269) To ALL Date 01/25/90 08:26:00 PM YO...UMM...WHO ASKED FOR CARDS? hahahahah that is pretty pathetic..god. If you want Credit Cards get your own. One step closer to safe carding....getting cc's off bbs's is the most disgusting thing I've ever heard...use TRW..use CBI...trash...steal...pickpocket....but dont get em off a bbs...jeez.. 0266 working:1593527 lets hope that this dies real fast so the REAL phreaks will be left alone by the leacherz...heheheh - Silencer 43. In the above message, "carding" is a common hacker/phone phreak term which refers to the fraudulent use of credit cards or credit card numbers to obtain merchandise which will be billed to the cardholder. "The Silencer" advises "all" users on the BBS to use TRW, or CBI (both national credit bureaus) or to "trash" (the practice of obtaining credit card numbers and related information from receipts or carbons discarded in trash -- sometimes also referred to as "dumpster diving"), steal or pickpocket, but not to get them (credit cards) from a bulletin board system. He then gives the a ComSystems code identified by the the last four digits (0266) of the ComSystems local access number. "Leacher" is a common hacker insult for those BBS - 26 - users who copy codes, credit cards, or software from a BBS but do not contribute their share. 44. On 4/13/90, John Elrick, ComSystems Security, verified that 1593527 is a valid customer authorization code which has suffered $27, 353.34 in fraud loss. 45. It should be noted that in message #138 above, dated 1/22/90, Chris X asked for codes. On 1/26/90 the following followup message was noted by CI 404-235: Numb 149 (50rq2k2-149) Sub Credit Card's for Codez >From Chris X (#134) To ALL Date 02/26/90 07:43:00 AM Okay, Tell ya what. I will exchange any amount of credit cards for a code or two. You name the credit limit you want on the credit card and I will get it for you. I do this cause i go to ganitorial work at night INSIDE the bank when no one is there..... heheheheheh 46. On 1/30/90, Zimmerman left a message on the BBS for CI 404-235, stating that he "will be ready to exchange your codez for cards. I have got 2 right now. 1 witch contains a $1500 credit limit and the other containing a $2200 credit limit. I will 'steal' some more when I go to the bank this weekend. Talk to ya tomorrow..." On 1/31/90 CI 404-235 gave Chris X Sprint Customer authorization code 25259681433275, provided to affiant by U.S. Sprint Regional Security Manager R.E. Sandquist for this purpose. On 3/18/90 in a computer-to-computer - 27 - conversation (not on the BBS), Chris X gave CI 404-235 a list of ten (10) credit card numbers with names, addresses, credit limits, and expiration dates. All of the credit cards appear to be issued in Illinois. Zimmerman told CI 404-235 that all of the cards "belong" to Consumers Co Op Credit Union. 47. On 4/28/90, CI 404-235 again accessed the BBS and provided printouts of messages which he observed on the BBS. In one, dated 3/27/90, "Scott Sxxxxx", user #160, offered to trade "virgin" credit cards (newly acquired and not yet used for fraudulent purposes) for AT&T cards (calling card numbers), PBX's (see Definition section above) or numbers that will call overseas. In a message dated 4/17/90, "SLI FOLKS", user #572, stated that he was calling from Edmonton, Canada, "using a stolen account on Datapac for this call" (Datapac is a data communications carrier). He tells "all" users that he has access to phone rooms for two apartment buildings "which gives me access to several hundred phone lines. new bpox that lets me get free LD on someone elses line frommy house. So I hope you guys can teach me some stuff." On 4/24/90, Chris X left another message to "anyone" offering to trade credit cards and codes for information on how to get "information on a non-published person. It can be found if you have a persons phone number and want a name and address or vice-versa." (He is referring to obtaining non-published subscriber information maintained by the telephone companies.) - 28 - 48. In attempting to located the BBS which operates on telephone number 312-528-5020, affiant has discovered several significant facts which appear to indicated that an attempt has been made to disguise the actual location of the BBS. These facts, and the sources for them, are detailed below. In summary, the BBS telephone line is listed to an address as one of its facilities, the BBS telephone line ends at an Illinois Bell junction box where an non-Illinois Bell (unauthorized) line leads from the BBS line to an apparent retail/office structure at another address. The BBS telephone bills are sent to a post office box opened in the corporate name, but the applicant, who is not listed as an officer of the corporation, described himself in a police report as "self-employed". A second, unlisted, telephone line, billed to the post office box applicant's home address, is installed at the retail/office structure where the non-Illinois bell (BBS) line also leads. 49. Illinois Bell telephone records show that the BBS telephone number 312-528-5020 is subscribed to by Mxxx Xxxxxx, Inc., xxxx West Belmont, xxxx xxx, Chicago, Illinois. The bills for this service are sent in the name of Mxxx Xxxxxx, Inc., at P.O. Box xxxx, Chicago, Illinois, 60618-0169. The BBS line was installed on December 1, 1982. 50. In April of 1989, Sgt. Abigail Abraham, Illinois State Police, conducted an investigation of the bulletin board - 29 - system at telephone number 312-528-5020. She checked directory assistance, and both white and yellow-page telephone directories: although she found several telephone numbers and address for Micro Repair, Inc., 312-528-5020 and xxxx West Belmont were not among them. She investigated the purported BBS site, and determined that xxxx West Belmont, xxxx xxx, Chicago, Illinois, does not exist. She reported that at xxxx W. Belmont, there is a structure which would incorporate the address of xxxx W. Belmont. Sgt. Abraham had a telephone company repairman check the physical junction pole: they discovered that the 312-528-5020 line ran from the phone via a non-Illinois Bell (unauthorized) connection to a building at xxxx N. Clybourn, Chicago, Illinois. This building appears to be a retail/office structure, at which, according to SA Conway, Secret Service Chicago field office, as of 4/16/90 "there is nothing to indicate that there are any businesses operating out of xxxx N. Clybourn, Chicago, Illinois." It is a one story section of a larger one-and-two story building which is "V" shaped, fronting on both Clybourn and Belmont Avenues. The third leg of the larger building (southeast side) fronts on a parking lot, with a fenced courtyard section off the parking lot. The xxxx address is approximately the last thirty feet at the south end of the Clybourn side of the building. - 30 - 51. Illinois Bell records show that a non-published telephone line is installed at xxxx N. Clybourn, which is 312-xxx-xxxx. Per Sgt. Abraham, the subscriber is Bruce Xxxxxxxxxxx, xxxx N. Lawndale, Chicago, Illinois and the bills are mailed to Fred Xxxxxxxxxxx at the same address. Telephone service for 312-xxx-xxxx was installed at xxxx N. Clybourn on January 1, 1982. 52. On April 26, 1989, Sgt. Abraham wrote down all of the vehicle license plates parked in the parking lot next to xxxx N. Clybourn and those parked immediately in front of it. PTxxxx, which was a 1987, four- door Ford, was registered to Bruce Xxxxxxxxxxx, xxxx N. Lawndale, Chicago, Illinois. 53. On 4/5/90, the Secret Service office in Chicago was notified by the Illinois Department of Revenue that there are not business licenses for xxxx N. Clybourn, Chicago, Illinois, nor are there any licenses issued to Bruce Xxxxxxxxxxx. 54. On 4/2/90 the Illinois Secretary of State, Corporation Division, advised that Martin and Wendy Gilmore are the only officers for Micro Repair listed on its Illinois Articles of Incorporation. 55. On 4/3/90, the Chicago Postal Inspector's Office informed the Secret Service office in Chicago that the billing address for telephone number 312-528-5020 (the BBS) is Post Office Box xxxx and is open in the name of Mxxx Xxxxxx. The name of the person who made the application for the post office box is Bruce Xxxxxxxxxxx, xxxx N. Lawndale, Chicago, Illinois, - 31 - telephone number 312-xxx-xxxx. Identification used to open the box was Illinois Driver's License exxx-xxxx-xxxx (per the Illinois Secretary of State this license is that of Bruce Xxxxxxxxxxx), and according to Sgt. Abraham, his license address is also xxxx N. Lawndale. 56. To the rear of the property where xxxx N. Clybourn is located, there is an antenna and a satellite dish. SA William P. Conway of the Chicago field office contacted the Coast Guard for assistance in determining the latitude and longitude of the satellite antenna. On 4/3/90, the Coast Guard Air Operations Duty Officer at the Glenview Naval Air Station, Chicago, Illinois, advised that the Belmont/Western/Clybourn intersection, Chicago, Illinois, has a latitude of 41 degrees, 56 minutes, 9 seconds north, and a longitude of 87 degrees, 41 minutes, 5 seconds west. With that information, SA Conway was able to obtain assistance from the Federal Communications Commission in determining the owner of the satellite antenna. Will Gray, of the Chicago FCC office, advised that the FCC license for the antenna (which is mounted on a tower located in the fenced courtyard section of the larger building of which xxxx N. Clybourn is a part) is registered to the American United Cab Company at xxxx N. Belmont. The satellite dish is affixed to the rear of xxxx N. Clybourn. Mounted on the tower are two closed circuit cameras. The first camera is located approximately 20 feet above the ground, the second camera is approximately 45 feet above the ground. - 32 - 57. Chicago Police Department General Offense Report #Mxxxxxx, dated 3/13/89, lists Bruce Xxxxxxxxxxx as the victim, with the address of occurrence listed as xxxx N. Clybourn, Chicago, Illinois. Xxxxxxxxxxx reported that his car window was broken by two subjects. Per this police report, Xxxxxxxxxxx states that he watched on a closed circuit security camera as the two subjects entered the parking lot adjacent to xxxx N. Clybourn, and broke his automobile window. Xxxxxxxxxxx told the officers that the cameras are used for parking lot security, due to "breakins". This incident took place at 2:30 PM. The report lists Xxxxxxxxxxx's residence address as xxxx N. Lawndale, Chicago, Illinois, his home phone number as 312-xxx-xxxx (that telephone number is listed to Fred Xxxxxxxxxxx at the xxxx N. Lawndale address, according to Sgt. Abraham), and his work phone number as 312-xxx-xxxx (the unlisted line billed to his residence). He stated that he is self-employed. 58. On 4/5/90, the Chicago Office of the Secret Service requested Rolonie Kwasny, Security Supervisor, Illinois Bell Telephone to verify that there are no other authorized or unauthorized telephone lines into xxxx N. Clybourn other than 312-528-5020 and 312-xxx-xxxx. 59. On 4/6/90, Kwansy notified the Chicago Office that early on that date the xxxx N. Clybourn address was checked. The larger building of which xxxx N. Clybourn is part, is serviced by 13 working phone lines through the box attached to the Belmont Side of the building, which also services the xxxx address. - 33 - 60. The only authorized phone line to the xxxx address is 312-xxx-xxxx (the number Bruce Xxxxxxxxxxx gave as his business number in the police report). The only other phone line (unauthorized) into the xxxx address is bulletin board number 312-528-5020, the line which leads from the junction box to the building. Kwasny advised that this type of hookup required no special knowledge. 61. Affiant has interviewed Sandquist, Mehnert, and CI 404-235, all of whom have operated electronic bulletin boards themselves. All three advised affiant that the sysop of a BBS must continuously perform a great many maintenance or "housekeeping" chores necessary to operation of the BBS. A sysop's maintenance functions include constantly making changes on the BBS, such as adding or removing users, raising or lowering users' level of access, removing files or programs uploaded to the BBS (added to the system by a user). If a user places a virus or logic bomb which could disrupt the functioning of the BBS, for example, on the sysop's computer, the sysop can remove it. 62. Since many BBS's (including this one) operate 24 hours a day, for the convenience of sysops, BBS software allows many of these functions to be performed from what is called "remote" locations, I.e., by the sysop using another computer, over the telephone line to the BBS. If the BBS is operating at a - 34 - business address, for example, the sysop can perform his maintenance functions at night or any other time from his residence or from any other location where he has a computer, modem, and telephone communication to the BBS. BBS users commonly communicate directly with the sysop on the BBS, either in "chat" mode or by leaving him electronic mail (see Definitions section, above). A BBS sysop is essentially "on call" during the entire time the BBS is in operation, to solve equipment/software problems or interruptions to the operation of the BBS, for the supervision of users, and to communicate with them. Operating a BBS is extremely time-consuming, according to Mehnert, Sandquist, and CI 404-235. 63. CI 404-235 advised affiant that, when he logs on to the BBS, he sees a screen in which the first two lines advised that connection has been made to the BBS, the third line lists the baud rates, or speeds, at which a user may communicate with the BBS, and the fourth line states "On line since 12/10/83". This indicates that approximately one year after the 312-528-5020 number was subscribed to by Bruce Xxxxxxxxxxx, the BBS began operating. As of 4/29/90, all attempts to locate any residence for Bruce Xxxxxxxxxxx other than that listed on his driver's license, auto registration, post office box application, and subscriber records for telephone number 312-xxx-xxxx, have been negative. Therefore, it appears that his residence address is xxxx N. Lawndale, Chicago, Illinois. - 35 - 64. The telephone bills for the unlisted line (312-xxx-xxxx) which is installed in the xxxx N. Clybourn building where the unauthorized BBS line (312-528-5020) leads, are mailed to the same address, xxxx N. Lawndale, Chicago, Illinois, to Fred Xxxxxxxxxxx. 65. If the sysop is accessing the BBS from his residence, it is likely that evidence of the sysop's identity and evidence relating to the operating of the BBS will be found on a computer system at the residence, or on diskettes, printouts, and other records at the residence. The telephone bills for unlisted number are also likely to be found at the residence, along with financial records such as cancelled checks or receipts, which will assist in identifying the individual who paid them. 66. At the xxxx N. Clybourn address, evidence of the connection of the BBS equipment to the 312-528-5020 telephone line, and evidence relating to the operation of the BBS, are expected to be found. Entry into the premises at this location, and physical inspection, are necessary in order to determine whether the 312-xxx-xxxx line is also connected to the BBS. 67. Based upon all of the foregoing, affiant believes that evidence of violations of 18 U.S.C. ~~ 1343, 1030, 1029, 1962, 1963, and 371, will be found at xxxx N. Lawndale, Chicago, Illinois, and at xxxx N. Clybourn, Illinois, such evidence consisting of: - 36 - 68. Electronic data processing and storage devices, computers and computer systems including central processing units; internal and peripheral storage devices such as fixed disks, floppy disk drives and diskettes, tape drives and tapes, optical storage devices or other memory storage devices; peripheral input/output devices such as keyboards, printers, video display monitors, optical readers, and related communications devices such as modems; together with system documentation, operating logs and documentation, software and instruction manuals. 69. Telephone equipment such as lineman's handsets, memory telephones, automatic dialers, programmable telephone dialing or signalling devices, electronic tone generating devices. 70. Records pertaining to ComSystems, ITT and other long distance companies' access numbers and customer authorization codes; credit card numbers; telephone numbers for computer bulletin boards, voice mail systems, and corporate computer systems; PBX codes and related telephone numbers; records and information related to the unauthorized access into computer systems or to the sale, sharing, or other distribution of long distance companies' access numbers and customer authorization codes, credit card numbers, including financial records, receipt of payments, worksheets, correspondence, memoranda, computer bulletin board downloads or messages, and other documentation. 71. Records pertaining to Mxxx Xxxxxx Inc., to Post - 37 - Office box number xxxx, telephone bills for 312-528-5020 and to 312-xxx-xxxx from 1982 to the present date, bank account records including statements and cancelled checks for Bruce Xxxxxxxxxxx from 1982 to the present date, business records relating to the occupancy of the xxxx N. Clybourn premises, including rent/mortgage payment receipts, rental or mortgage contracts, utility bills and proof of payment, and records pertaining to the purchase, ownership, and maintenance of the BBS computer system and software. 72. All of the above records, whether stored or on paper, on magnetic media such as tape, cassette, disk, diskette, or on memory storage devices such as optical disks, programmable instruments such as telephones, "electronic address books", programmable wristwatches, calculators, or any other storage media, together with the indicia of use, ownership, possession or control of all of the above property or records, including bills, letters, identification, personal effects, memoranda, and other documentation. 73. Since much of the above-described evidence is likely to be found in electronic form or machine-readable media which cannot be read or analyzed by affiant in its present form, - 38 - affiant requests authorization to seize, listen to, read, review, and maintain the above described property and records and to convert the above records to human-readable form as necessary. (Signature/G. Kirt Lawson) Affiant Subscribed and Sworn before me this 30th day of APRIL, 1990. (signature) Cynthaia M. Penumire {??illegible) Notary Public My Commission Expires (illegible) 9865e/ - 39 - ---end of documents-----