|
==Phrack Inc.== Volume Three, Issue Thirty-Three, File 12 of 13 PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN Phrack World News PWN PWN PWN PWN Issue XXXIII / Part Two PWN PWN PWN PWN Compiled by Dispater PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN Legion of Doom Goes Corporate ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The following is a compilation of several articles from by Michael Alexander of ComputerWorld Magazine about Comsec Data Security, Inc. Comsec Data Security, Inc. Chris Goggans a/k/a Erik Bloodaxe 60 Braeswood Square Scott Chasin a/k/a Doc Holiday Houston, Texas 77096 Kenyon Shulman a/k/a Malefactor (713)721-6500 Robert Cupps - Not a former computer hacker (713)721-6579 FAX - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Hackers Promote Better Image (Page 124) June 24, 1991 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ HOUSTON -- Three self-professed members of the Legion of Doom, one of the most notorious computer hacker groups to operate in the United States, said they now want to get paid for their skills. Along with a former securities trader, the members launched a computer security firm called Comsec Data Security that will show corporations how to keep hackers out. "We have been in the computer security business for the last 11 years -- just on the different end of the stick," said Scott Chasin who said he once used the handle Doc Holiday as a Legion of Doom member. The group has been defunct since late last year, Chasin said. The start-up firm plans to offer systems penetration testing, auditing, and training services as well as security products. "We have information that you can't buy in bookstores: We know why hackers hack, what motivates them, why they are curious," Chasin said. Already, the start-up has met with considerable skepticism. "Would I hire a safecracker to be a security guy at my bank?" asked John Blackley, information security administrator at Capitol Holding Corporation in Louisville, Kentucky. "If they stayed straight for 5 to 10 years, I might reconsider, but 12 to 18 months ago, they were hackers, and now they have to prove themselves." "You don't hire ne'er-do-wells to come and look at your system," said Tom Peletier, an information security specialist at General Motors Corporation. "The Legion of Doom is a known anti-establishment group, and although it is good to see they have a capitalist bent, GM would not hire these people." Comsec already has three contracts with Fortune 500 firms, Chasin said. "I like their approach, and I am assuming they are legit," said Norman Sutton, a security consultant at Leemah Datacom Corporation in Hayward, California. His firm is close to signing a distribution pact with Comsec, Sutton said. Federal law enforcers have described the Legion of Doom in indictments, search warrants, and other documents as a closely knit group of about 15 computer hackers whose members rerouted calls, stole and altered data and disrupted telephone service by entering telephone switches, among other activities. The group was founded in 1984 and has had dozens of members pass through its ranks. Approximately 12 former members have been arrested for computer hacking-related crimes; three former members are now serving jail sentences; and at least three others are under investigation. None of the Comsec founders have been charged with a computer-related crime. (Article includes a color photograph of all four founding members of Comsec) - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - An Offer You Could Refuse? (Page 82) July 1, 1991 ~~~~~~~~~~~~~~~~~~~~~~~~~~ Tom Peletier, an information security specialist at General Motors in Detroit, says he would never hire Comsec Data Security, a security consulting firm launched by three ex-members of the Legion of Doom. "You don't bring in an unknown commodity and give them the keys to the kingdom," Peletier said. Chris Goggans, one of Comsec's founders, retorted: "We don't have the keys to their kingdom, but I know at least four people off the top of my head that do." Comsec said it will do a free system penetration for GM just to prove the security firm's sincerity, Goggans said. "All they have to do is sign a release form saying they won't prosecute." - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Group Dupes Security Experts (Page 16) July 29, 1991 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ "Houston-Based Comsec Fools Consultants To Gather Security Information" HOUSTON -- Computer security consultants are supposed to know better, but at least six experts acknowledged last week that they were conned. The consultants said they were the victims of a bit of social engineering by Comsec Data Security, Inc., a security consulting firm recently launched. Comsec masqueraded as a prospective customer using the name of Landmark Graphics Corporation, a large Houston-area software publisher, to gather information on how to prepare business proposals and conduct security audits and other security industry business techniques, the consultants said. Three of Comsec's four founders are self-professed former members of the Legion of Doom, one of the nation's most notorious hacker groups, according to law enforcers. "In their press release, they say, 'Our firm has taken a unique approach to its sales strategy,'" said one consultant who requested anonymity, citing professional embarrassment. "Well, social engineering is certainly a unique sales strategy." Social engineering is a technique commonly used by hackers to gather information from helpful, but unsuspecting employees that may be used to penetrate a computer system. "They are young kids that don't know their thumbs from third base about doing business, and they are trying to glean that from everybody else," said Randy March, director of consulting at Computer Security Consultants, Inc., in Ridgefield, Connecticut. The consultants said gathering information by posing as a prospective customer is a common ploy, but that Comsec violated accepted business ethics by posing as an actual company. "It is a pretty significant breech of business ethics to make the misrepresentation that they did," said Hardie Morgan, chief financial officer at Landmark Graphics. "They may not be hacking anymore, but they haven't changed the way they operate." Morgan said his firm had received seven or eight calls from security consultants who were following up on information they had sent to "Karl Stevens," supposedly a company vice president. SAME OLD STORY The consultants all told Morgan the same tale: They had been contacted by "Stevens," who said he was preparing to conduct a security audit and needed information to sell the idea to upper management. "Stevens" had asked the consultants to prepare a detailed proposal outlining the steps of a security audit, pricing and other information. The consultants had then been instructed to send the information by overnight mail to a Houston address that later proved to be the home of two of Comsec's founders. In some instances, the caller had left a telephone number that when called was found to be a constantly busy telephone company test number. Morgan said "Stevens" had an intimate knowledge of the company's computer systems that is known only to a handful of employees. While there is no evidence that the company's systems were penetrated by outsiders, Landmark is "battering down its security hatches," Morgan said. Posing as a prospective customer is not an uncommon way to gather competitive information, said Chris Goggans, one of Comsec's founders, who once used the handle of Erik Bloodaxe. "Had we not been who we are, it would be a matter of no consequence," Goggans said. "They confirm definitely that they called some of their competitors," said Michael Cash, an attorney representing Comsec. "The fact they used Landmark Graphics was an error on their part, but it was the first name that popped into their heads. They did not infiltrate Landmark Graphics in any way." - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - "LEGION OF DOOM--INTERNET WORLD TOUR" T-SHIRTS! Now you too can own an official Legion of Doom T-shirt. This is the same shirt that sold-out rapidly at the "Cyberview" hackers conference in St. Louis. Join the other proud owners such as award-winning author Bruce Sterling by adding this collector's item to your wardrobe. This professionally made, 100 percent cotton shirt is printed on both front and back. The front displays "Legion of Doom Internet World Tour" as well as a sword and telephone intersecting the planet earth, skull-and-crossbones style. The back displays the words "Hacking for Jesus" as well as a substantial list of "tour-stops" (internet sites) and a quote from Aleister Crowley. This T-shirt is sold only as a novelty item, and is in no way attempting to glorify computer crime. Shirts are only $15.00, postage included! Overseas add an additional $5.00. Send check or money-order (No CODs, cash or credit cards--even if it's really your card :-) made payable to Chris Goggans to: Chris Goggans 5300 N. Braeswood #4 Suite 181 Houston, TX 77096 _______________________________________________________________________________ Steve Jackson Games v. United States of America ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Articles reprinted from Effector Online 1.04 and 1.08 May 1, 1991 / August 24, 1991 "Extending the Constitution to American Cyberspace" To establish constitutional protection for electronic media and to obtain redress for an unlawful search, seizure, and prior restraint on publication, Steve Jackson Games and the Electronic Frontier Foundation filed a civil suit against the United States Secret Service and others. On March 1, 1990, the United States Secret Service nearly destroyed Steve Jackson Games (SJG), an award-winning publishing business in Austin, Texas. In an early morning raid with an unlawful and unconstitutional warrant, agents of the Secret Service conducted a search of the SJG office. When they left they took a manuscript being prepared for publication, private electronic mail, and several computers, including the hardware and software of the SJG Computer Bulletin Board System. Yet Jackson and his business were not only innocent of any crime, but never suspects in the first place. The raid had "been staged on the unfounded suspicion that somewhere in Jackson's office there "might be" a document compromising the security of the 911 telephone system. In the months that followed, Jackson saw the business he had built up over many years dragged to the edge of bankruptcy. SJG was a successful and prestigious publisher of books and other materials used in adventure role-playing games. Jackson also operated a computer bulletin board system (BBS) to communicate with his customers and writers and obtain feedback and suggestions on new gaming ideas. The bulletin board was also the repository of private electronic mail belonging to several of its users. This private mail was seized in the raid. Despite repeated requests for the return of his manuscripts and equipment, the Secret Service has refused to comply fully. More than a year after that raid, the Electronic Frontier Foundation, acting with SJG owner Steve Jackson, has filed a precedent setting civil suit against the United States Secret Service, Secret Service Agents Timothy Foley and Barbara Golden, Assistant United States Attorney William Cook, and Henry Kluepfel. "This is the most important case brought to date," said EFF general counsel Mike Godwin, "to vindicate the Constitutional rights of the users of computer-based communications technology. It will establish the Constitutional dimension of electronic expression. It also will be one of the first cases that invokes the Electronic Communications Privacy Act as a shield and not as a sword -- an act that guarantees users of this digital medium the same privacy protections enjoyed by those who use the telephone and the U.S. Mail." Commenting on the overall role of the Electronic Frontier Foundation in this case and other matters, EFF's president Mitch Kapor said, "We have been acting as an organization interested in defending the wrongly accused. But the Electronic Frontier Foundation is also going to be active in establishing broader principles. We begin with this case, where the issues are clear. But behind this specific action, the EFF also believes that it is vital that government, private entities, and individuals who have violated the Constitutional rights of individuals be held accountable for their actions. We also hope this case will help demystify the world of computer users to the general public and inform them about the potential of computer communities." Representing Steve Jackson and the Electronic Frontier Foundation in this suit are Harvey A. Silverglate and Sharon L. Beckman of Silverglate & Good of Boston; Eric Lieberman and Nick Poser of Rabinowitz, Boudin, Standard, Krinsky & Lieberman of New York; and James George, Jr. of Graves, Dougherty, Hearon & Moody of Austin, Texas. Copies of the complaint, the unlawful search warrant, statements by Steve Jackson and the Electronic Frontier Foundation, a legal fact sheet and other pertinent materials are available by request from the EFF. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Also made available to members of the press and electronic media on request were the following statement by Mitchell Kapor and a legal fact sheet prepared by Sharon Beckman and Harvey Silverglate of Silverglate & Good, the law firm central to the filing of this lawsuit. "Why the Electronic Frontier Foundation Is Bringing Suit On Behalf of Steve Jackson" With this case, the Electronic Frontier Foundation begins a new phase of affirmative legal action. We intend to fight for broad Constitutional protection for operators and users of computer bulletin boards. It is essential to establish the principle that computer bulletin boards and computer conferencing systems are entitled to the same First Amendment rights enjoyed by other media. It is also critical to establish that operators of bulletin boards -- whether individuals or businesses -- are not subject to unconstitutional, overbroad searches and seizures of any of the contents of their systems, including electronic mail. The Electronic Frontier Foundation also believes that it is vital to hold government, private entities, and individuals who have violated the Constitutional rights of others accountable for their actions. Mitchell Kapor, President, The Electronic Frontier Foundation - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - "Legal Fact Sheet: Steve Jackson Games v. United States Secret Service, et al" This lawsuit seeks to vindicate the rights of a small, successful entrepreneur/publisher to conduct its entirely lawful business, free of unjustified governmental interference. It is also the goal of this litigation to firmly establish the principle that lawful activities carried out with the aid of computer technology, including computer communications and publishing, are entitled to the same constitutional protections that have long been accorded to the print medium. Computers and modems, no less than printing presses, typewriters, the mail, and telephones -being the methods selected by Americans to communicate with one another -- are all protected by our constitutional rights. Factual Background and Parties: Steve Jackson, of Austin, Texas, is a successful small businessman. His company, Steve Jackson Games, is an award- winning publisher of adventure games and related books and magazines. In addition to its books and magazines, SJG operates an electronic bulletin board system (the Illuminati BBS) for its customers and for others interested in adventure games and related literary genres. Also named as plaintiffs are various users of the Illuminati BBS. The professional interests of these users range from writing to computer technology. Although neither Jackson nor his company were suspected of any criminal activity, the company was rendered a near fatal blow on March 1, 1990, when agents of the United States Secret Service, aided by other law enforcement officials, raided its office, seizing computer equipment necessary to the operation of its publishing business. The government seized the Illuminati BBS and all of the communications stored on it, including private electronic mail, shutting down the BBS for over a month. The Secret Service also seized publications protected by the First Amendment, including drafts of the about-to-be-released role playing game book GURPS Cyberpunk. The publication of the book was substantially delayed while SJG employees rewrote it from older drafts. This fantasy game book, which one agent preposterously called "a handbook for computer crime," has since sold over 16,000 copies and been nominated for a prestigious game industry award. No evidence of criminal activity was found. The warrant application, which remained sealed at the government's request for seven months, reveals that the agents were investigating an employee of the company whom they believed to be engaged in activity they found questionable at his home and on his own time. The warrant application further reveals not only that the Secret Service had no reason to think any evidence of criminal activity would be found at SJG, but also that the government omitted telling the Magistrate who issued the warrant that SJG was a publisher and that the contemplated raid would cause a prior restraint on constitutionally protected speech, publication, and association. The defendants in this case are the United States Secret Service and the individuals who, by planning and carrying out this grossly illegal search and seizure, abused the power conferred upon them by the federal government. Those individuals include Assistant United States Attorney William J. Cook, Secret Service Agents Timothy M. Foley and Barbara Golden, as well Henry M. Kluepfel of Bellcore, who actively participated in the unlawful activities as an agent of the federal government. These defendants are the same individuals and entities responsible for the prosecution last year of electronic publisher Craig Neidorf. The government in that case charged that Neidorf's publication of materials concerning the enhanced 911 system constituted interstate transportation of stolen property. The prosecution was resolved in Neidorf's favor in July of 1990 when Neidorf demonstrated that materials he published were generally available to the public. Legal Significance: This case is about the constitutional and statutory rights of publishers who conduct their activities in electronic media rather than in the traditional print and hard copy media, as well as the rights of individuals and companies that use computer technology to communicate as well as to conduct personal and business affairs generally. The government's wholly unjustified raid on SJG, and seizure of its books, magazines, and BBS, violated clearly established statutory and constitutional law, including: o The Privacy Protection Act of 1980, which generally prohibits the government from searching the offices of publishers for work product and other documents, including materials that are electronically stored; o The First Amendment to the U. S. Constitution, which guarantees freedom of speech, of the press and of association, and which prohibits the government from censoring publications, whether in printed or electronic media. o The Fourth Amendment, which prohibits unreasonable governmental searches and seizures, including both general searches and searches conducted without probable cause to believe that specific evidence of criminal activity will be found at the location searched. o The Electronic Communications Privacy Act and the Federal Wiretap statute, which together prohibit the government from seizing electronic communications without justification and proper authorization. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - STEVE JACKSON GAMES UPDATE: THE GOVERNMENT FILES ITS RESPONSE After several delays, the EFF has at last received the government's response to the Steve Jackson Games lawsuit. Our attorneys are going over these documents carefully and we'll have more detailed comment on them soon. Sharon Beckman, of Silverglate and Good, one of the leading attorneys in the case said: "In general, this response contains no surprises for us. Indeed, it confirms that events in this case transpired very much as we thought that they did. We continue to have a very strong case. In addition, it becomes clearer as we go forward that the Steve Jackson Games case will be a watershed piece of litigation when it comes to extending constitutional guarantees to this medium." _______________________________________________________________________________ Feds Arrest "Logic Bomber" July 1, 1991 ~~~~~~~~~~~~~~~~~~~~~~~~~~ by Michael Alexander (ComputerWorld)(Page 10) SAN DIEGO -- Federal agents arrested a disgruntled programmer last week for allegedly planting a logic bomb designed to wipe out programs and data related to the U.S. government's billion-dollar Atlas Missile program. According to law enforcers, the programmer hoped to be rehired by General Dynamics Corporation, his former employer and builder of the missile as a high-priced consultant to repair the damage. Michael J. Lauffenburger, age 31, who is accused of planting the bomb, was arrested after a co-worker accidentally discovered the destructive program on April 10, 1991, disarmed it and alerted authorities. Lauffenburger had allegedly programmed the logic bomb to go off at 6 p.m. on May 24, 1991 during the Memorial Day holiday weekend and then self-destruct. Lauffenburger is charged with unauthorized access of a federal-interest computer and attempted computer fraud. If convicted, he could be imprisoned for up to 10 years and fined $500,000. Lauffenburger pleaded innocent and was released on $10,000 bail. The indictment said that while Lauffenburger was employed at the General Dynamics Space Systems Division plant in San Diego, he was the principle architect of a database program known as SAS.DB and PTP, which was used to track the availability and cost of parts used in building the Atlas missile. On March 20, he created a program called Cleanup that, when executed, would have deleted the PTP program, deleted another set of programs used to respond to government requests for information, and then deleted itself without a trace, according to Mitchell Dembin, the assistant U.S. attorney handling the case. _______________________________________________________________________________