| ==Phrack Inc.== | |
| Volume Three, Issue Thirty-Three, File 12 of 13 | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| PWN PWN | |
| PWN Phrack World News PWN | |
| PWN PWN | |
| PWN Issue XXXIII / Part Two PWN | |
| PWN PWN | |
| PWN Compiled by Dispater PWN | |
| PWN PWN | |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN | |
| Legion of Doom Goes Corporate | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| The following is a compilation of several articles from by Michael | |
| Alexander of ComputerWorld Magazine about Comsec Data Security, Inc. | |
| Comsec Data Security, Inc. | |
| Chris Goggans a/k/a Erik Bloodaxe 60 Braeswood Square | |
| Scott Chasin a/k/a Doc Holiday Houston, Texas 77096 | |
| Kenyon Shulman a/k/a Malefactor (713)721-6500 | |
| Robert Cupps - Not a former computer hacker (713)721-6579 FAX | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Hackers Promote Better Image (Page 124) June 24, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| HOUSTON -- Three self-professed members of the Legion of Doom, one of the | |
| most notorious computer hacker groups to operate in the United States, said | |
| they now want to get paid for their skills. Along with a former securities | |
| trader, the members launched a computer security firm called Comsec Data | |
| Security that will show corporations how to keep hackers out. | |
| "We have been in the computer security business for the last 11 years -- | |
| just on the different end of the stick," said Scott Chasin who said he once | |
| used the handle Doc Holiday as a Legion of Doom member. The group has been | |
| defunct since late last year, Chasin said. | |
| The start-up firm plans to offer systems penetration testing, auditing, | |
| and training services as well as security products. "We have information that | |
| you can't buy in bookstores: We know why hackers hack, what motivates them, | |
| why they are curious," Chasin said. | |
| Already, the start-up has met with considerable skepticism. | |
| "Would I hire a safecracker to be a security guy at my bank?" asked John | |
| Blackley, information security administrator at Capitol Holding Corporation in | |
| Louisville, Kentucky. "If they stayed straight for 5 to 10 years, I might | |
| reconsider, but 12 to 18 months ago, they were hackers, and now they have to | |
| prove themselves." | |
| "You don't hire ne'er-do-wells to come and look at your system," said Tom | |
| Peletier, an information security specialist at General Motors Corporation. | |
| "The Legion of Doom is a known anti-establishment group, and although it is | |
| good to see they have a capitalist bent, GM would not hire these people." | |
| Comsec already has three contracts with Fortune 500 firms, Chasin said. | |
| "I like their approach, and I am assuming they are legit," said Norman | |
| Sutton, a security consultant at Leemah Datacom Corporation in Hayward, | |
| California. His firm is close to signing a distribution pact with Comsec, | |
| Sutton said. | |
| Federal law enforcers have described the Legion of Doom in indictments, | |
| search warrants, and other documents as a closely knit group of about 15 | |
| computer hackers whose members rerouted calls, stole and altered data and | |
| disrupted telephone service by entering telephone switches, among other | |
| activities. | |
| The group was founded in 1984 and has had dozens of members pass through | |
| its ranks. Approximately 12 former members have been arrested for computer | |
| hacking-related crimes; three former members are now serving jail sentences; | |
| and at least three others are under investigation. None of the Comsec founders | |
| have been charged with a computer-related crime. | |
| (Article includes a color photograph of all four founding members of Comsec) | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| An Offer You Could Refuse? (Page 82) July 1, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Tom Peletier, an information security specialist at General Motors in | |
| Detroit, says he would never hire Comsec Data Security, a security consulting | |
| firm launched by three ex-members of the Legion of Doom. "You don't bring in | |
| an unknown commodity and give them the keys to the kingdom," Peletier said. | |
| Chris Goggans, one of Comsec's founders, retorted: "We don't have the keys to | |
| their kingdom, but I know at least four people off the top of my head that do." | |
| Comsec said it will do a free system penetration for GM just to prove the | |
| security firm's sincerity, Goggans said. "All they have to do is sign a | |
| release form saying they won't prosecute." | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Group Dupes Security Experts (Page 16) July 29, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| "Houston-Based Comsec Fools Consultants To Gather Security Information" | |
| HOUSTON -- Computer security consultants are supposed to know better, but | |
| at least six experts acknowledged last week that they were conned. The | |
| consultants said they were the victims of a bit of social engineering by Comsec | |
| Data Security, Inc., a security consulting firm recently launched. | |
| Comsec masqueraded as a prospective customer using the name of Landmark | |
| Graphics Corporation, a large Houston-area software publisher, to gather | |
| information on how to prepare business proposals and conduct security audits | |
| and other security industry business techniques, the consultants said. | |
| Three of Comsec's four founders are self-professed former members of the | |
| Legion of Doom, one of the nation's most notorious hacker groups, according to | |
| law enforcers. | |
| "In their press release, they say, 'Our firm has taken a unique approach | |
| to its sales strategy,'" said one consultant who requested anonymity, citing | |
| professional embarrassment. "Well, social engineering is certainly a unique | |
| sales strategy." | |
| Social engineering is a technique commonly used by hackers to gather | |
| information from helpful, but unsuspecting employees that may be used to | |
| penetrate a computer system. | |
| "They are young kids that don't know their thumbs from third base about | |
| doing business, and they are trying to glean that from everybody else," said | |
| Randy March, director of consulting at Computer Security Consultants, Inc., in | |
| Ridgefield, Connecticut. | |
| The consultants said gathering information by posing as a prospective | |
| customer is a common ploy, but that Comsec violated accepted business ethics by | |
| posing as an actual company. | |
| "It is a pretty significant breech of business ethics to make the | |
| misrepresentation that they did," said Hardie Morgan, chief financial officer | |
| at Landmark Graphics. "They may not be hacking anymore, but they haven't | |
| changed the way they operate." | |
| Morgan said his firm had received seven or eight calls from security | |
| consultants who were following up on information they had sent to "Karl | |
| Stevens," supposedly a company vice president. | |
| SAME OLD STORY | |
| The consultants all told Morgan the same tale: They had been contacted by | |
| "Stevens," who said he was preparing to conduct a security audit and needed | |
| information to sell the idea to upper management. "Stevens" had asked the | |
| consultants to prepare a detailed proposal outlining the steps of a security | |
| audit, pricing and other information. | |
| The consultants had then been instructed to send the information by | |
| overnight mail to a Houston address that later proved to be the home of two of | |
| Comsec's founders. In some instances, the caller had left a telephone number | |
| that when called was found to be a constantly busy telephone company test | |
| number. | |
| Morgan said "Stevens" had an intimate knowledge of the company's computer | |
| systems that is known only to a handful of employees. While there is no | |
| evidence that the company's systems were penetrated by outsiders, Landmark is | |
| "battering down its security hatches," Morgan said. | |
| Posing as a prospective customer is not an uncommon way to gather | |
| competitive information, said Chris Goggans, one of Comsec's founders, who once | |
| used the handle of Erik Bloodaxe. | |
| "Had we not been who we are, it would be a matter of no consequence," | |
| Goggans said. | |
| "They confirm definitely that they called some of their competitors," said | |
| Michael Cash, an attorney representing Comsec. "The fact they used Landmark | |
| Graphics was an error on their part, but it was the first name that popped into | |
| their heads. They did not infiltrate Landmark Graphics in any way." | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| "LEGION OF DOOM--INTERNET WORLD TOUR" T-SHIRTS! | |
| Now you too can own an official Legion of Doom T-shirt. This is the same | |
| shirt that sold-out rapidly at the "Cyberview" hackers conference in St. Louis. | |
| Join the other proud owners such as award-winning author Bruce Sterling by | |
| adding this collector's item to your wardrobe. This professionally made, 100 | |
| percent cotton shirt is printed on both front and back. The front displays | |
| "Legion of Doom Internet World Tour" as well as a sword and telephone | |
| intersecting the planet earth, skull-and-crossbones style. The back displays | |
| the words "Hacking for Jesus" as well as a substantial list of "tour-stops" | |
| (internet sites) and a quote from Aleister Crowley. This T-shirt is sold only | |
| as a novelty item, and is in no way attempting to glorify computer crime. | |
| Shirts are only $15.00, postage included! Overseas add an additional $5.00. | |
| Send check or money-order (No CODs, cash or credit cards--even if it's really | |
| your card :-) made payable to Chris Goggans to: | |
| Chris Goggans | |
| 5300 N. Braeswood #4 | |
| Suite 181 | |
| Houston, TX 77096 | |
| _______________________________________________________________________________ | |
| Steve Jackson Games v. United States of America | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| Articles reprinted from Effector Online 1.04 and 1.08 | |
| May 1, 1991 / August 24, 1991 | |
| "Extending the Constitution to American Cyberspace" | |
| To establish constitutional protection for electronic media and to obtain | |
| redress for an unlawful search, seizure, and prior restraint on publication, | |
| Steve Jackson Games and the Electronic Frontier Foundation filed a civil suit | |
| against the United States Secret Service and others. | |
| On March 1, 1990, the United States Secret Service nearly destroyed Steve | |
| Jackson Games (SJG), an award-winning publishing business in Austin, Texas. | |
| In an early morning raid with an unlawful and unconstitutional warrant, | |
| agents of the Secret Service conducted a search of the SJG office. When they | |
| left they took a manuscript being prepared for publication, private electronic | |
| mail, and several computers, including the hardware and software of the SJG | |
| Computer Bulletin Board System. Yet Jackson and his business were not only | |
| innocent of any crime, but never suspects in the first place. The raid had | |
| "been staged on the unfounded suspicion that somewhere in Jackson's office | |
| there "might be" a document compromising the security of the 911 telephone | |
| system. | |
| In the months that followed, Jackson saw the business he had built up over | |
| many years dragged to the edge of bankruptcy. SJG was a successful and | |
| prestigious publisher of books and other materials used in adventure | |
| role-playing games. Jackson also operated a computer bulletin board system | |
| (BBS) to communicate with his customers and writers and obtain feedback and | |
| suggestions on new gaming ideas. The bulletin board was also the repository of | |
| private electronic mail belonging to several of its users. This private mail | |
| was seized in the raid. Despite repeated requests for the return of his | |
| manuscripts and equipment, the Secret Service has refused to comply fully. | |
| More than a year after that raid, the Electronic Frontier Foundation, | |
| acting with SJG owner Steve Jackson, has filed a precedent setting civil suit | |
| against the United States Secret Service, Secret Service Agents Timothy Foley | |
| and Barbara Golden, Assistant United States Attorney William Cook, and Henry | |
| Kluepfel. | |
| "This is the most important case brought to date," said EFF general | |
| counsel Mike Godwin, "to vindicate the Constitutional rights of the users of | |
| computer-based communications technology. It will establish the Constitutional | |
| dimension of electronic expression. It also will be one of the first cases | |
| that invokes the Electronic Communications Privacy Act as a shield and not as a | |
| sword -- an act that guarantees users of this digital medium the same privacy | |
| protections enjoyed by those who use the telephone and the U.S. Mail." | |
| Commenting on the overall role of the Electronic Frontier Foundation in | |
| this case and other matters, EFF's president Mitch Kapor said, "We have been | |
| acting as an organization interested in defending the wrongly accused. But the | |
| Electronic Frontier Foundation is also going to be active in establishing | |
| broader principles. We begin with this case, where the issues are clear. But | |
| behind this specific action, the EFF also believes that it is vital that | |
| government, private entities, and individuals who have violated the | |
| Constitutional rights of individuals be held accountable for their actions. We | |
| also hope this case will help demystify the world of computer users to the | |
| general public and inform them about the potential of computer communities." | |
| Representing Steve Jackson and the Electronic Frontier Foundation in this | |
| suit are Harvey A. Silverglate and Sharon L. Beckman of Silverglate & Good of | |
| Boston; Eric Lieberman and Nick Poser of Rabinowitz, Boudin, Standard, Krinsky | |
| & Lieberman of New York; and James George, Jr. of Graves, Dougherty, Hearon & | |
| Moody of Austin, Texas. | |
| Copies of the complaint, the unlawful search warrant, statements by Steve | |
| Jackson and the Electronic Frontier Foundation, a legal fact sheet and other | |
| pertinent materials are available by request from the EFF. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| Also made available to members of the press and electronic media on | |
| request were the following statement by Mitchell Kapor and a legal fact sheet | |
| prepared by Sharon Beckman and Harvey Silverglate of Silverglate & Good, the | |
| law firm central to the filing of this lawsuit. | |
| "Why the Electronic Frontier Foundation Is | |
| Bringing Suit On Behalf of Steve Jackson" | |
| With this case, the Electronic Frontier Foundation begins a new phase of | |
| affirmative legal action. We intend to fight for broad Constitutional | |
| protection for operators and users of computer bulletin boards. | |
| It is essential to establish the principle that computer bulletin boards | |
| and computer conferencing systems are entitled to the same First Amendment | |
| rights enjoyed by other media. It is also critical to establish that operators | |
| of bulletin boards -- whether individuals or businesses -- are not subject to | |
| unconstitutional, overbroad searches and seizures of any of the contents of | |
| their systems, including electronic mail. | |
| The Electronic Frontier Foundation also believes that it is vital to hold | |
| government, private entities, and individuals who have violated the | |
| Constitutional rights of others accountable for their actions. | |
| Mitchell Kapor, | |
| President, The Electronic Frontier Foundation | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| "Legal Fact Sheet: Steve Jackson Games v. United States Secret Service, et al" | |
| This lawsuit seeks to vindicate the rights of a small, successful | |
| entrepreneur/publisher to conduct its entirely lawful business, free of | |
| unjustified governmental interference. It is also the goal of this litigation | |
| to firmly establish the principle that lawful activities carried out with the | |
| aid of computer technology, including computer communications and publishing, | |
| are entitled to the same constitutional protections that have long been | |
| accorded to the print medium. Computers and modems, no less than printing | |
| presses, typewriters, the mail, and telephones -being the methods selected by | |
| Americans to communicate with one another -- are all protected by our | |
| constitutional rights. | |
| Factual Background and Parties: | |
| Steve Jackson, of Austin, Texas, is a successful small businessman. His | |
| company, Steve Jackson Games, is an award- winning publisher of adventure games | |
| and related books and magazines. In addition to its books and magazines, SJG | |
| operates an electronic bulletin board system (the Illuminati BBS) for its | |
| customers and for others interested in adventure games and related literary | |
| genres. | |
| Also named as plaintiffs are various users of the Illuminati BBS. The | |
| professional interests of these users range from writing to computer | |
| technology. | |
| Although neither Jackson nor his company were suspected of any criminal | |
| activity, the company was rendered a near fatal blow on March 1, 1990, when | |
| agents of the United States Secret Service, aided by other law enforcement | |
| officials, raided its office, seizing computer equipment necessary to the | |
| operation of its publishing business. The government seized the Illuminati BBS | |
| and all of the communications stored on it, including private electronic mail, | |
| shutting down the BBS for over a month. The Secret Service also seized | |
| publications protected by the First Amendment, including drafts of the | |
| about-to-be-released role playing game book GURPS Cyberpunk. The publication | |
| of the book was substantially delayed while SJG employees rewrote it from older | |
| drafts. This fantasy game book, which one agent preposterously called "a | |
| handbook for computer crime," has since sold over 16,000 copies and been | |
| nominated for a prestigious game industry award. No evidence of criminal | |
| activity was found. | |
| The warrant application, which remained sealed at the government's request | |
| for seven months, reveals that the agents were investigating an employee of the | |
| company whom they believed to be engaged in activity they found questionable at | |
| his home and on his own time. The warrant application further reveals not only | |
| that the Secret Service had no reason to think any evidence of criminal | |
| activity would be found at SJG, but also that the government omitted telling | |
| the Magistrate who issued the warrant that SJG was a publisher and that the | |
| contemplated raid would cause a prior restraint on constitutionally protected | |
| speech, publication, and association. | |
| The defendants in this case are the United States Secret Service and the | |
| individuals who, by planning and carrying out this grossly illegal search and | |
| seizure, abused the power conferred upon them by the federal government. Those | |
| individuals include Assistant United States Attorney William J. Cook, Secret | |
| Service Agents Timothy M. Foley and Barbara Golden, as well Henry M. Kluepfel | |
| of Bellcore, who actively participated in the unlawful activities as an agent | |
| of the federal government. | |
| These defendants are the same individuals and entities responsible for the | |
| prosecution last year of electronic publisher Craig Neidorf. The government in | |
| that case charged that Neidorf's publication of materials concerning the | |
| enhanced 911 system constituted interstate transportation of stolen property. | |
| The prosecution was resolved in Neidorf's favor in July of 1990 when Neidorf | |
| demonstrated that materials he published were generally available to the | |
| public. | |
| Legal Significance: | |
| This case is about the constitutional and statutory rights of publishers | |
| who conduct their activities in electronic media rather than in the traditional | |
| print and hard copy media, as well as the rights of individuals and companies | |
| that use computer technology to communicate as well as to conduct personal and | |
| business affairs generally. | |
| The government's wholly unjustified raid on SJG, and seizure of its books, | |
| magazines, and BBS, violated clearly established statutory and constitutional | |
| law, including: | |
| o The Privacy Protection Act of 1980, which generally prohibits the | |
| government from searching the offices of publishers for work product and | |
| other documents, including materials that are electronically stored; | |
| o The First Amendment to the U. S. Constitution, which guarantees freedom | |
| of speech, of the press and of association, and which prohibits the | |
| government from censoring publications, whether in printed or electronic | |
| media. | |
| o The Fourth Amendment, which prohibits unreasonable governmental searches | |
| and seizures, including both general searches and searches conducted | |
| without probable cause to believe that specific evidence of criminal | |
| activity will be found at the location searched. | |
| o The Electronic Communications Privacy Act and the Federal Wiretap | |
| statute, which together prohibit the government from seizing electronic | |
| communications without justification and proper authorization. | |
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - | |
| STEVE JACKSON GAMES UPDATE: | |
| THE GOVERNMENT FILES ITS RESPONSE | |
| After several delays, the EFF has at last received the government's response to | |
| the Steve Jackson Games lawsuit. Our attorneys are going over these documents | |
| carefully and we'll have more detailed comment on them soon. | |
| Sharon Beckman, of Silverglate and Good, one of the leading attorneys in the | |
| case said: | |
| "In general, this response contains no surprises for us. Indeed, it | |
| confirms that events in this case transpired very much as we thought | |
| that they did. We continue to have a very strong case. In addition, | |
| it becomes clearer as we go forward that the Steve Jackson Games case | |
| will be a watershed piece of litigation when it comes to extending | |
| constitutional guarantees to this medium." | |
| _______________________________________________________________________________ | |
| Feds Arrest "Logic Bomber" July 1, 1991 | |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~ | |
| by Michael Alexander (ComputerWorld)(Page 10) | |
| SAN DIEGO -- Federal agents arrested a disgruntled programmer last week | |
| for allegedly planting a logic bomb designed to wipe out programs and data | |
| related to the U.S. government's billion-dollar Atlas Missile program. | |
| According to law enforcers, the programmer hoped to be rehired by General | |
| Dynamics Corporation, his former employer and builder of the missile as a | |
| high-priced consultant to repair the damage. | |
| Michael J. Lauffenburger, age 31, who is accused of planting the bomb, was | |
| arrested after a co-worker accidentally discovered the destructive program on | |
| April 10, 1991, disarmed it and alerted authorities. Lauffenburger had | |
| allegedly programmed the logic bomb to go off at 6 p.m. on May 24, 1991 during | |
| the Memorial Day holiday weekend and then self-destruct. | |
| Lauffenburger is charged with unauthorized access of a federal-interest | |
| computer and attempted computer fraud. If convicted, he could be imprisoned | |
| for up to 10 years and fined $500,000. Lauffenburger pleaded innocent and was | |
| released on $10,000 bail. | |
| The indictment said that while Lauffenburger was employed at the General | |
| Dynamics Space Systems Division plant in San Diego, he was the principle | |
| architect of a database program known as SAS.DB and PTP, which was used to | |
| track the availability and cost of parts used in building the Atlas missile. | |
| On March 20, he created a program called Cleanup that, when executed, | |
| would have deleted the PTP program, deleted another set of programs used to | |
| respond to government requests for information, and then deleted itself without | |
| a trace, according to Mitchell Dembin, the assistant U.S. attorney handling the | |
| case. | |
| _______________________________________________________________________________ | |