6809 lines
152 KiB
Plaintext
6809 lines
152 KiB
Plaintext
|
=============================================================================
|
||
|
|
||
|
PHUK MAGAZINE - Phile 0 of 10
|
||
|
|
||
|
=============================================================================
|
||
|
|
||
|
|
||
|
|
||
|
Welcome to the very first issue of P/H-UK magazine, an ezine for the
|
||
|
|
||
|
Hackers & Phreakers in the United Kingdom. In case you can't work it
|
||
|
|
||
|
out, P/H-UK stands for Phreak/Hack-United Kingdom, and having pointed
|
||
|
|
||
|
that out I promise to never mention it again!. This issue is a little
|
||
|
|
||
|
lame and a little thin, the way most h/p zines are at first, but we
|
||
|
|
||
|
hope that PHUK will grow with time and become a bit more substantial.
|
||
|
|
||
|
|
||
|
|
||
|
This issue we have some goodies, especially the chunk of the BT
|
||
|
|
||
|
computer security manual, a piece by Otaku on Defcon ][, some
|
||
|
|
||
|
circuitry from TheGoat, and a nice piece of history courtesy (!) of
|
||
|
|
||
|
New Scientist circa 1973.
|
||
|
|
||
|
|
||
|
|
||
|
Anyway, without further ado, lets go on to the contents ..
|
||
|
|
||
|
|
||
|
|
||
|
PS: THIS IS A BETA COPY OF PHUK#1 ..... NO RESPONSIBILITY CAN BE HELD
|
||
|
|
||
|
FOR ANY AND ALL SPELLING AND GRAMMATICAL ERRORS THAT OCCUR IN THIS
|
||
|
|
||
|
TFILE ---- the rest of it is down to us and the normal disclaimers
|
||
|
|
||
|
apply ... i.e. don't use this info to phuk with the system, just
|
||
|
|
||
|
read and enjoy (heheheh).
|
||
|
|
||
|
|
||
|
|
||
|
=============================================================================
|
||
|
|
||
|
P / H - U - K -- C O N T E N T S
|
||
|
|
||
|
=============================================================================
|
||
|
|
||
|
0: INTRO: You're reading it!
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
1: EDITORIAL: Channel 4 Documentaries SUCK!
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
2: NEWSBYTES: UK News
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
3: HISTORY: New Scientist 1973
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
4: DEFCON II - Otaku
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
5: ANSWERPHONE: The Panasonic KX-T1446BE
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
6: CIRCUIT: Simple Line Monitor - TheGoat
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
7: NO GIFT FROM HALLMARK - DrKaos
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
8: BT Computer Security Manual - Mrs. Brady of Doncaster
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
9: Notes & Queries: A question & Answer Forum
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
10: OUTRO: Next Issue .... we hope!!
|
||
|
|
||
|
-----------------------------------------------------------------------------
|
||
|
|
||
|
=============================================================================
|
||
|
|
||
|
PHUK MAGAZINE - Phile 1 of 10
|
||
|
|
||
|
=============================================================================
|
||
|
|
||
|
|
||
|
|
||
|
-----------------------------------------
|
||
|
|
||
|
CHANNEL FOUR DOCUMENTARIES SUCK - Phuk-Ed
|
||
|
|
||
|
-----------------------------------------
|
||
|
|
||
|
|
||
|
|
||
|
That recent documentary on channel four sucked. Just what we needed
|
||
|
|
||
|
was some stupid media c*nts telling the entire world that we were all
|
||
|
|
||
|
boxing throught Hawaii Bell. For some strange reason this line died
|
||
|
|
||
|
very soon after the documentary .... are we surprised? I think not.
|
||
|
|
||
|
At the same time horror stories about people being charged for boxed
|
||
|
|
||
|
calls through 0800 numbers began to circulate, stories of beeing fed
|
||
|
|
||
|
straight into overseas operators when using Country Direct numbers,
|
||
|
|
||
|
along with a whole slew of paranoia, which may or may not just be
|
||
|
|
||
|
disinformation designed to discourage boxing in th UK.
|
||
|
|
||
|
|
||
|
|
||
|
For example, I recently leeched a tfile from a UK bbs that claimed
|
||
|
|
||
|
that from 10-02-94 BT have been monitoring all free phone numbers
|
||
|
|
||
|
from the base in Blackpool, and that the information is also going to
|
||
|
|
||
|
the BT investigations dept at Milton Keynes. The person writing the
|
||
|
|
||
|
tfile claims to be a contracter linked to BT, and that Channel 4
|
||
|
|
||
|
had contacted BT before the documentary was screened and that this
|
||
|
|
||
|
resulted in the circulation of a confidential memo was sent
|
||
|
|
||
|
to all system & exchange managers asking what steps can be taken.
|
||
|
|
||
|
Apparently suggestions ranged from "put filters on the line", via
|
||
|
|
||
|
"link all 0800 calls to a billing machine" to "change all the
|
||
|
|
||
|
numbers". Well the many of the numbers HAVE changed, and even the
|
||
|
|
||
|
merest hint that all 0800 calls are getting routed into a computer
|
||
|
|
||
|
and analysed to check if they are legitimate data/voice/fax calls
|
||
|
|
||
|
is enough to give any phreak the willies! He also claims that "any
|
||
|
|
||
|
questions can be directed to bt internal investigations on
|
||
|
|
||
|
0800-890-999, ask for extension 131". [Does anyone know if this
|
||
|
|
||
|
number is really the BT investigations unit??]. We do not need this
|
||
|
|
||
|
type of paranoia, and all because of one stupid documentary!
|
||
|
|
||
|
|
||
|
|
||
|
The documentary itself was pathetic. Programming your computers to do
|
||
|
|
||
|
continuous directory listings might look good to the media vampires,
|
||
|
|
||
|
but to anyone with any computer literacy it just looks stupid.
|
||
|
|
||
|
Showing the two anonymous hackers inside a Brighton phone box with
|
||
|
|
||
|
what must have been the BIGGEST tape machine you could possible carry
|
||
|
|
||
|
(can't show Walkmans can we now guys!) while boxing using a tape was
|
||
|
|
||
|
hilarious. Showing them dial up an American sex line while they were
|
||
|
|
||
|
saying in essence that this is a line for all the sad computers spods
|
||
|
|
||
|
who can't get a girlfriend, was a joke. The whole chunk of credit
|
||
|
|
||
|
card fraud at the end, bleeped as if they were giving away vital
|
||
|
|
||
|
information, (of course no-one knew about credit card fraud before!)
|
||
|
|
||
|
was a useful ploy used by the documentary to discredit hackers (look
|
||
|
|
||
|
middle classes, your credit is under attack ... better lock those
|
||
|
|
||
|
hackers up quick!!).
|
||
|
|
||
|
|
||
|
|
||
|
This documentary should act as a warning to any hackers who might
|
||
|
|
||
|
consider getting involved with the media in any way. They can, and
|
||
|
|
||
|
WILL distort what you say by selective editing and voiceovers. They
|
||
|
|
||
|
can and WILL sensationalise hacking in an attempt to increase ratings
|
||
|
|
||
|
and thus advertising revenue. Luckily at least one person in the
|
||
|
|
||
|
known universe is trying to put together a film that shows hackers
|
||
|
|
||
|
and phreakers in a more favourable light ... and we here at PHUK
|
||
|
|
||
|
magazine wish her the best of luck!
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
Phuk-Ed.
|
||
|
|
||
|
|
||
|
|
||
|
+++
|
||
|
|
||
|
EOF=============================================================================
|
||
|
|
||
|
PHUK MAGAZINE - Phile 2 of 10
|
||
|
|
||
|
=============================================================================
|
||
|
|
||
|
|
||
|
|
||
|
------------
|
||
|
|
||
|
UK NEWSBYTES
|
||
|
|
||
|
------------
|
||
|
|
||
|
|
||
|
|
||
|
-- PHONE DAY
|
||
|
|
||
|
|
||
|
|
||
|
Phone Day is almost upon us! Well, not quite, its on the 16th of
|
||
|
|
||
|
April 1995, but judging by the, amount of energy BT is putting into
|
||
|
|
||
|
the big event the public are meant to absorb this information by some
|
||
|
|
||
|
weird sort of osmosis .... and now us phone phreaks are telling them
|
||
|
|
||
|
all about it instead of BT! Certainly all of Joe public I have spoken
|
||
|
|
||
|
to treat phone day as some sort of publicity stunt, like Give Up
|
||
|
|
||
|
Smoking week, where you are encouraged to use the phone more on Phone
|
||
|
|
||
|
Day. When it is explained that Phone Day is the day that all the
|
||
|
|
||
|
dailing codes change the response is mixed, ranging from "why would
|
||
|
|
||
|
they do that", to "Oh No, not again!", from people who remember the
|
||
|
|
||
|
great day when London split its codes into 2 zones (071 & 081), and
|
||
|
|
||
|
the amount of hassle it caused them! Funny enough I found an old BT
|
||
|
|
||
|
card explaining the LAST change in codes marked "BT - It's you we
|
||
|
|
||
|
answer to" .... hmmm guess thats why you still charge in UNITS
|
||
|
|
||
|
instead of seconds huh guys!
|
||
|
|
||
|
|
||
|
|
||
|
Of course companies offering Phone Day services have sprung up ..
|
||
|
|
||
|
they will update all your databases ... at a price!! In actual fact
|
||
|
|
||
|
the new codes have been with us for some months, and it has been
|
||
|
|
||
|
possible to use the new London codes (0171 & 0181) for a while now.
|
||
|
|
||
|
In case you can't remember (!), Phone Day means that all codes
|
||
|
|
||
|
starting with 0 will now start 01, and Leeds, Sheffield, Nottingham
|
||
|
|
||
|
Leicester and Bristol all get new codes (I won't bore you with the
|
||
|
|
||
|
numbers!).
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
-- CALLER RETURN / CALLER ID
|
||
|
|
||
|
|
||
|
|
||
|
Of course the BIG story of the month should have been the
|
||
|
|
||
|
introduction of caller return and caller ID on the 5th of November
|
||
|
|
||
|
.... here's what the SUN newspaper had to say about it on the 28th of
|
||
|
|
||
|
October ... (When I first wrote this of course I said 'by the time
|
||
|
|
||
|
you read this .....').
|
||
|
|
||
|
|
||
|
|
||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
|
||
|
|
||
|
[from the SUN Newspaper, 28-10-94]
|
||
|
|
||
|
|
||
|
|
||
|
BT cures hang-ups for free
|
||
|
|
||
|
|
||
|
|
||
|
People who rush to answer the phone just as it stops ringing will
|
||
|
|
||
|
be able to find out who called thanks to a free BT service unveiled
|
||
|
|
||
|
yesterday.
|
||
|
|
||
|
From Novemeber the 5th, frustrated customers can dial a code and
|
||
|
|
||
|
listen to a recorded message telling them who was the last to call
|
||
|
|
||
|
them.
|
||
|
|
||
|
BT says the number of return calls will cost the cover of the
|
||
|
|
||
|
service.
|
||
|
|
||
|
The firm is also introducing "Caller Display" which allows people
|
||
|
|
||
|
to see the number of the person calling before they answer.
|
||
|
|
||
|
|
||
|
|
||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
|
||
|
|
||
|
Once again the actual service has been around for a while in some
|
||
|
|
||
|
areas, just not "switched on". So if I dial 141, to block CI/CR, I
|
||
|
|
||
|
get a message "Sorry, you have dialled an incorect service code,
|
||
|
|
||
|
please replace the handset and consult your instructions". Similarly,
|
||
|
|
||
|
dialing 1471 gets the message "Sorry no telephone number is stored".
|
||
|
|
||
|
BUT when I phoned the BT helpline (0800-80-1471) to ask about costs,
|
||
|
|
||
|
I was told (incorrectly) that Caller Return would cost 3.99 per
|
||
|
|
||
|
month, and that Caller Display would cost an "unspecified amount"
|
||
|
|
||
|
plus the cost or rental of the equipment. Funny thing was though,
|
||
|
|
||
|
that when the helpful young BT chap asked me for my area code "for
|
||
|
|
||
|
his database" and then repeated the number back he got it wrong!!!
|
||
|
|
||
|
|
||
|
|
||
|
What is really cool is that Joe Public HAS woken up to the
|
||
|
|
||
|
problems this might cause, hence the following article from the
|
||
|
|
||
|
Guardian, 4th November 1994.
|
||
|
|
||
|
|
||
|
|
||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
|
||
|
|
||
|
[from the GUARDIAN Newspaper, 04-11-94]
|
||
|
|
||
|
|
||
|
|
||
|
BT forced to delay service identifying callers
|
||
|
|
||
|
|
||
|
|
||
|
British Telecom has been forced to postpone the launch of two
|
||
|
|
||
|
services which reveal a caller's number - because the public is not
|
||
|
|
||
|
yet aware of the risks involved.
|
||
|
|
||
|
Civil Liberties lobbies have been concerned about privacy,
|
||
|
|
||
|
pointing out that a doctor, for examle, ringing a patient from home
|
||
|
|
||
|
would not want to disclose his private number. And ex-directory
|
||
|
|
||
|
numbers will be identifiable unless customers opt to retain anonymity.
|
||
|
|
||
|
BT, which has already spent several million pounds promoting the
|
||
|
|
||
|
services and warning that numbers could easily be identified, has had
|
||
|
|
||
|
to increase its budget for an extra two week campaign of newspaper
|
||
|
|
||
|
and televsion advertisments.
|
||
|
|
||
|
The services, Call Return and Caller Display, will now come into
|
||
|
|
||
|
operation on midnight on November 21, rather than tomorrow. This
|
||
|
|
||
|
follows recent discussions between BT and Oftel, the industry
|
||
|
|
||
|
regulator, which insisted that the public must be fully informed
|
||
|
|
||
|
beforehand.
|
||
|
|
||
|
A BT spokesman said that the group was disappointed at the lack of
|
||
|
|
||
|
awareness in view of its advertising.
|
||
|
|
||
|
Call Return enables a phone owner to identify the number of the
|
||
|
|
||
|
last caller, by dialling a short code. Subscribers to Caller Display
|
||
|
|
||
|
will have a phone or box that shows the number of an incoming call on
|
||
|
|
||
|
a screen.
|
||
|
|
||
|
BT has built in two safeguards. Customers can have the calling
|
||
|
|
||
|
line identification (CLI) signa on all outgoing signals automatically
|
||
|
|
||
|
blocked, or they can block the signal on individual calls by dialling
|
||
|
|
||
|
141 before the number. However the CLI signal will be available to
|
||
|
|
||
|
BT's malicious calls units. [no shit!! and WHO else can get it!]
|
||
|
|
||
|
Many with ex-directory numbers (15 percent of personal customer)
|
||
|
|
||
|
believe that their numbers should be protected automatically.
|
||
|
|
||
|
|
||
|
|
||
|
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
|
||
|
|
||
|
|
||
|
Methinks, we have not heard the last of this .......
|
||
|
|
||
|
|
||
|
|
||
|
..... and indeed we hadn't! after "WatchDog" had a good go at
|
||
|
|
||
|
BT over CR/CD the service didn't start until November 22nd, as
|
||
|
|
||
|
planned. However, once again everything was put in place some time
|
||
|
|
||
|
before, allowing us to play with the service, which came into force
|
||
|
|
||
|
around 18:00 that day. CR does pass unlisted numbers across the lines,
|
||
|
|
||
|
but we haven't been able to test whether it passes ex-directory or
|
||
|
|
||
|
not. Blocking seems to work as advertised, and cell-phone numbers are
|
||
|
|
||
|
also not passed along. What worries me, however, is that on several
|
||
|
|
||
|
occasions after recieving a call from what I knew to be a listed
|
||
|
|
||
|
number, and from people who I wouldn't call phreaks and use the 141
|
||
|
|
||
|
blocking code, were not stored for my use :( Watch this space for
|
||
|
|
||
|
updates!
|
||
|
|
||
|
|
||
|
|
||
|
-- INTERNET MANIA
|
||
|
|
||
|
|
||
|
|
||
|
Anyone who hasn't heard of the Internet these days must be blind,
|
||
|
|
||
|
deaf, half-asleep or all three. With the introduction of a Guardian
|
||
|
|
||
|
ONLINE section, the bbc getting their own email address ..(yes!! you
|
||
|
|
||
|
can email the broom cupboard!), the opening of London's first
|
||
|
|
||
|
fully fledged, and much hyped "CyberCafe", and the publication of
|
||
|
|
||
|
not one but 2 expensive glossies (Internet & Comms, and .net),
|
||
|
|
||
|
everyone and his dog will have an internet account by the year 2000
|
||
|
|
||
|
(well, if we don't run out of addresses first!).
|
||
|
|
||
|
|
||
|
|
||
|
However, at a minimum 1.50 UKP per half hour for the privilege
|
||
|
|
||
|
of having coffee, danish & WWW, we here at PHUK magazine feel that
|
||
|
|
||
|
Cyberia might be spending some of their hard earned (!!) profits on an
|
||
|
|
||
|
internet security expert before too long :)
|
||
|
|
||
|
|
||
|
|
||
|
+++
|
||
|
|
||
|
That's all for this ish, don't forget, NEWSBYTE exists on
|
||
|
|
||
|
contributions from its readers, so send your snippets, comments etc to
|
||
|
|
||
|
PHUK magazine at anon19143@anon.penet.fi, where we will do our best to
|
||
|
|
||
|
include them in the next issue.
|
||
|
|
||
|
|
||
|
|
||
|
-- BT HACKER :)
|
||
|
|
||
|
|
||
|
|
||
|
OK, boring, but I couldn't resist commenting! Calling the BT
|
||
|
|
||
|
contractor who stole the queen's phone number a HACKER is a joke!! But
|
||
|
|
||
|
then the Independant wouldn't have sold so many papers with the
|
||
|
|
||
|
headline "Sub-Contactor Breaks Confidentiality Agreement" would it?
|
||
|
|
||
|
|
||
|
|
||
|
+++
|
||
|
|
||
|
EOF=============================================================================
|
||
|
|
||
|
PHUK MAGAZINE - Phile 3 of 10
|
||
|
|
||
|
=============================================================================
|
||
|
|
||
|
|
||
|
|
||
|
---------------------------
|
||
|
|
||
|
HISTORY: New Scientist 1973
|
||
|
|
||
|
---------------------------
|
||
|
|
||
|
|
||
|
|
||
|
This issue's HISTORY section has an article published in the New
|
||
|
|
||
|
Scientist on the 13th December 1973 in the wake of the Old Bailey
|
||
|
|
||
|
trial. The article made the front page, running under the headline
|
||
|
|
||
|
"Are phone phreaks just telephone addicts?". Anything in square
|
||
|
|
||
|
brackets is mine, the rest comes straight from the magazine page to
|
||
|
|
||
|
you ... Enjoy & Have phun! - Phuk-Ed
|
||
|
|
||
|
|
||
|
|
||
|
--
|
||
|
|
||
|
[headline]
|
||
|
|
||
|
|
||
|
|
||
|
Are telephones addictive?
|
||
|
|
||
|
[intro]
|
||
|
|
||
|
|
||
|
|
||
|
Nine "phone phreaks" were acquitted last month after a seven-week
|
||
|
|
||
|
trial at the Old Bailey. The trial gave considerable publicity to teh
|
||
|
|
||
|
techniques used by a small and determined group of intellectuals with
|
||
|
|
||
|
a compulsive desire to know the telephone system inside out.
|
||
|
|
||
|
|
||
|
|
||
|
[start]
|
||
|
|
||
|
|
||
|
|
||
|
When Post Office invesigators raided a Hammersmith, London flat in
|
||
|
|
||
|
October 1972, the found a "phone phreaks" conference in progress with
|
||
|
|
||
|
large quantities of telephone equipment, a computer printout listing
|
||
|
|
||
|
supposedly secret Post Office codes, and devices for making calls. A
|
||
|
|
||
|
Post Office installed monitoring device showed that one man had spent
|
||
|
|
||
|
much of the day experimenting with one of London's international
|
||
|
|
||
|
exchanges.
|
||
|
|
||
|
|
||
|
|
||
|
Nineteen men went on trial on 3 October at the Old Bailey. With
|
||
|
|
||
|
advance promises of nominal fines, 10 pleaded guilty - one to
|
||
|
|
||
|
actually making calls, the others to conspiracy. Fines ranged from 50
|
||
|
|
||
|
to 100 [pounds]. The other nine stood trial for conspiracy to defraud
|
||
|
|
||
|
the telephone system. On 13 November, all were acquitted, in a trial
|
||
|
|
||
|
estimated to have cost more than 100,000 [pounds].
|
||
|
|
||
|
|
||
|
|
||
|
Most were men in their 20s holding university degrees, primarily from
|
||
|
|
||
|
Oxford, Cambridge and London. Their interest had begun in student
|
||
|
|
||
|
days, usually from reading standard texts such as Atkinson's Telphony
|
||
|
|
||
|
and moving on to the Post Office Electrical Engineers Journal.
|
||
|
|
||
|
Experiments by exhuastive dialing on local networks followed. Soon
|
||
|
|
||
|
the exhausted the possibilities of dialing and moved on to electronic
|
||
|
|
||
|
aids. Their attitude was neatly summarised by the trial judge Neil
|
||
|
|
||
|
McKinnon, QC, when he commented: "Some take to heroin, some take to
|
||
|
|
||
|
telephones." He, too, entered into the spirit of the thing and asked
|
||
|
|
||
|
for the codes used in his own local exchange in south London.
|
||
|
|
||
|
|
||
|
|
||
|
Like scientists conducting experiments, the phone phreaks report
|
||
|
|
||
|
results to one another. And they take a perverse delight in writing
|
||
|
|
||
|
to the Post Office to explain new and previously undetected ways to
|
||
|
|
||
|
beat the telephone system - often the Post Office does not believe
|
||
|
|
||
|
these suggestions until much later. The penetration of the Post
|
||
|
|
||
|
Office's secrets has been massive. The investigation that led to the
|
||
|
|
||
|
recent trial was apparently triggered by the discovery that for some
|
||
|
|
||
|
years the Cambridge University Titan computer had held complete and
|
||
|
|
||
|
laboriously compiled files detailing the entire trunk and local
|
||
|
|
||
|
network system
|
||
|
|
||
|
|
||
|
|
||
|
[caption]
|
||
|
|
||
|
|
||
|
|
||
|
Imitate control signals
|
||
|
|
||
|
|
||
|
|
||
|
[start]
|
||
|
|
||
|
|
||
|
|
||
|
In general, telephone enthusiasts (as the court genteely put it) work
|
||
|
|
||
|
by imitating the control signals that the telephone system must have.
|
||
|
|
||
|
he signals tell an exchange, for example, that a call is coming from
|
||
|
|
||
|
another exchange, or that a subscriber has hung up, or that a call
|
||
|
|
||
|
has been answered and that charging should begin. On long distance
|
||
|
|
||
|
trunk circuits the signals are withing the normal telephone speech
|
||
|
|
||
|
bandwidth (30 Hz - 3 kHz), and the UK Post Office uses pulses of
|
||
|
|
||
|
single frequency - 2.28 kHz, As the signalling must take place on the
|
||
|
|
||
|
line which will be used for the call, there is no way that the Post
|
||
|
|
||
|
Office can prevent anyone from imitating the codes. Usually they use
|
||
|
|
||
|
a "bleeper" which puts the tone onto the line with an accoustic
|
||
|
|
||
|
coupler, similar to that used for portable computer terminals.
|
||
|
|
||
|
Details of using a bleeper to make international calls are given in
|
||
|
|
||
|
the box.
|
||
|
|
||
|
|
||
|
|
||
|
[start sub-box]
|
||
|
|
||
|
|
||
|
|
||
|
[photograph with caption]
|
||
|
|
||
|
|
||
|
|
||
|
Typical phone phreaking equipment. Rear right - an older style AC9
|
||
|
|
||
|
simulator (bleeper) with a telephone dial. Front, a newer AC9
|
||
|
|
||
|
simulator, with an accoustic coupler (an ordinary telephone
|
||
|
|
||
|
earpiece). Rear left - a multifrequency simulator. A print-out of
|
||
|
|
||
|
telephone codes lies under the equipment.
|
||
|
|
||
|
|
||
|
|
||
|
[basically thats what the photo shows ... this stuff is OLD and
|
||
|
|
||
|
clunky looking though!]
|
||
|
|
||
|
|
||
|
|
||
|
[end sub-box]
|
||
|
|
||
|
|
||
|
|
||
|
In the last few years, the Post Office has begun the introduction of
|
||
|
|
||
|
the Trunk Transit Network to effect speedier transit of information.
|
||
|
|
||
|
Where the normal system uses pulses of 2.28 kHz to represent numbers
|
||
|
|
||
|
(1 pulse for 1, 2 for 2, etc, just like a telephone dial), the new
|
||
|
|
||
|
Multifrequcny system (MF2) has six different tones, and uses two at a
|
||
|
|
||
|
time, permitting 15 possible combinations (10 numbers and 5 control
|
||
|
|
||
|
signals). Thus, where the 0 required 10 pulses, it now only requires
|
||
|
|
||
|
1. The Post Office hopes to introduce full nationwide STD using this
|
||
|
|
||
|
technique by 1980. This goal was achieved in the USA and many
|
||
|
|
||
|
European countries some years ago. Generating the six tones required
|
||
|
|
||
|
in the UK is more complex than tha traditional 2.28 kHz, and involves
|
||
|
|
||
|
a six-frequency generator. Because many countries have their own sets
|
||
|
|
||
|
of tones, the international phone phreak will need a set of bleepers.
|
||
|
|
||
|
One presented in evidence at the trial was very elaborate, being
|
||
|
|
||
|
capable of simulating seven different signalling sytems. Nicknamed
|
||
|
|
||
|
the Mighty Wurlitzer, it was rumoured to cost 200 [pounds] to build.
|
||
|
|
||
|
The Post Office offered 20 [pounds] for it.
|
||
|
|
||
|
|
||
|
|
||
|
As new MF2 centres are added to the network - Newcastle, Hull and
|
||
|
|
||
|
Bradford last month - the Post Office is reportedly intensly worried
|
||
|
|
||
|
about the vulnerability of MF2. It is perhaps typical that the Post
|
||
|
|
||
|
Office were initially complacent, and did not believe the Cambridge
|
||
|
|
||
|
undergrad who some years ago told them that MF2 could be beaten.
|
||
|
|
||
|
|
||
|
|
||
|
One defendant revealed that he and others had written a set of
|
||
|
|
||
|
letters to the Post Office explaining flaws in the system. His most
|
||
|
|
||
|
recent contribution - a dialling sequence known as 9-1-11 which would
|
||
|
|
||
|
give irregular STD service from small country exchanges - was
|
||
|
|
||
|
haughtlyi rejected by a Post Office expert with "it couldn't
|
||
|
|
||
|
theoretically work".
|
||
|
|
||
|
|
||
|
|
||
|
[begin sub-box]
|
||
|
|
||
|
|
||
|
|
||
|
[caption]
|
||
|
|
||
|
|
||
|
|
||
|
Bleeping around the world
|
||
|
|
||
|
|
||
|
|
||
|
[start]
|
||
|
|
||
|
|
||
|
|
||
|
At the trial, the Post Office gave a demonstration of how
|
||
|
|
||
|
international calls might be made, using a bleeper. The telephone
|
||
|
|
||
|
enthusiast first dials an STD call to a destination which will be
|
||
|
|
||
|
charged at local rate - from London to Badger's Mount just north of
|
||
|
|
||
|
Sevenoaks will do. This call is routed automatically through the
|
||
|
|
||
|
london STD centre and the trunk exchange in sevenoaks. When the call
|
||
|
|
||
|
(which is made to a number known to be spare) had gone through, he
|
||
|
|
||
|
sends the "clear forward" signal which tells Badger's Mount that the
|
||
|
|
||
|
call is finished. Because the enthusiast's telephone is still off the
|
||
|
|
||
|
hook, the London equipment believes that the call to be still in
|
||
|
|
||
|
progress. The result is an open line going as far as the Sevenoaks
|
||
|
|
||
|
trunk exchange.
|
||
|
|
||
|
|
||
|
|
||
|
He then sends to Sevenoaks a signal known as "seize" which wakes up
|
||
|
|
||
|
the Sevenoaks end. He could then send the digit "1" which will put
|
||
|
|
||
|
him on the outgoing trunks from Sevenoaks. By dialling the secret
|
||
|
|
||
|
trunk codes or routings, he can then dial freely through the trunk
|
||
|
|
||
|
network. He could dial to Tunbridge Wells (code 15) and through it to
|
||
|
|
||
|
Cardiff (65) and London International (112). At this point, by using
|
||
|
|
||
|
other tones, he could if he wished experiment in any part of the
|
||
|
|
||
|
world.
|
||
|
|
||
|
|
||
|
|
||
|
Unlike STD codes, the trunk codes are not the same throughout the
|
||
|
|
||
|
country - to get from Reading to Tunbridge the code would be 35
|
||
|
|
||
|
rather than 15. Thus the enthusiasts have built up massive files of
|
||
|
|
||
|
trunk codes, often produced on computer printouts.
|
||
|
|
||
|
|
||
|
|
||
|
Knowing the codes, however, does little good because they cannot
|
||
|
|
||
|
simply be dialled - extra equipment is required. The clicks that an
|
||
|
|
||
|
ordinary telephone dial sends down the line are reallt DC pulses, 67
|
||
|
|
||
|
millisec (ms) long, send at the rate of 10 per second. Long distance
|
||
|
|
||
|
trunk circuits cannot handle DC, so the exchange automatically
|
||
|
|
||
|
converts these to eually long pulses of 2.28 kHz. This signalling
|
||
|
|
||
|
system is known as AC9. Having already passed the local exchange, the
|
||
|
|
||
|
phone phreak must produce his own 2.28 kHz signals. Some people are
|
||
|
|
||
|
actuially able to whistle the correct tone, but most phone phreaks
|
||
|
|
||
|
use some sort of electronic simulator - usually called a bleeper -
|
||
|
|
||
|
made up of a tone generator and a telephone dial or more complex push
|
||
|
|
||
|
button system. The device must also produce at least one other signal
|
||
|
|
||
|
- the Clear Forward which is 700 ms of 2.28 kHz. The seize signal is
|
||
|
|
||
|
simply a "1".
|
||
|
|
||
|
|
||
|
|
||
|
One of the effects of the clear forward signal is to accidentally
|
||
|
|
||
|
generate another signal which starts the equipment in London charging
|
||
|
|
||
|
for the call. Thus, the user of a bleeper is then paying for the call
|
||
|
|
||
|
whether or not he ever completes it. But the charge is always for a
|
||
|
|
||
|
call to the first exchange dialed (London always thinks that the call
|
||
|
|
||
|
is to Badger's Mount) so the bleeper user always starts with a call
|
||
|
|
||
|
to the local exchange to keep the cost down.
|
||
|
|
||
|
|
||
|
|
||
|
The legal question enters at this point - the effect of the recent
|
||
|
|
||
|
acquittal would appear to be that using a bleeper is not illegal
|
||
|
|
||
|
unless a call is actually completed, in which case the phone phreak
|
||
|
|
||
|
is getting a long distance call at local rates. Simple possesion of
|
||
|
|
||
|
bleepers themselves is apparently not illegal, although the Post
|
||
|
|
||
|
Office has the right to disconnect the phone of anyone who uses one
|
||
|
|
||
|
|
||
|
|
||
|
[there is a diagram accompanying this sub-box which just uses a box
|
||
|
|
||
|
and arrow type diagram showing the relationships between the
|
||
|
|
||
|
different exchanges discussed in para 2]
|
||
|
|
||
|
|
||
|
|
||
|
[end sub-box]
|
||
|
|
||
|
|
||
|
|
||
|
[caption]
|
||
|
|
||
|
|
||
|
|
||
|
Dial direct
|
||
|
|
||
|
|
||
|
|
||
|
[start]
|
||
|
|
||
|
|
||
|
|
||
|
There is a second major way for the telephone enthusiasts to get into
|
||
|
|
||
|
the PO network. As described here recently (vol 58, pg 23), some
|
||
|
|
||
|
engineers had covertly installed their own unauthorised links. As
|
||
|
|
||
|
these individuals had ample opportunity to discover the secrets of
|
||
|
|
||
|
the telephone network, the only purpose of such circuits could be
|
||
|
|
||
|
fraud, as was shown in the recent prosecution of a Bristol engineer
|
||
|
|
||
|
who operated an Air Charter compnay on the side. Several other
|
||
|
|
||
|
accesses arose accidentaly, caused by careless or sloppy design. Thei
|
||
|
|
||
|
utility to telephone enthusiasts had resulted in a large scale hunt
|
||
|
|
||
|
for them. A list of these trunk accesses was eventually passed to the
|
||
|
|
||
|
Post Office. Nevertheless, suggestions of "sabotage from within" are
|
||
|
|
||
|
hotly denied by the Post Office. But a recent example is an
|
||
|
|
||
|
"engineers fiddle" fitted to the Chiswick exchange. It allowed North
|
||
|
|
||
|
London Post Office staff who knew about it to make free STD calls,
|
||
|
|
||
|
quite illegally from phones all over London. By dialling 995 for
|
||
|
|
||
|
Chiswick, then 47, then any four digits to "unlock" the circuit
|
||
|
|
||
|
(since someone, perhaps even an investigator, might stumble on 995-47
|
||
|
|
||
|
by accident), they would be enabled to dial free calls. This money
|
||
|
|
||
|
saving device disappeared earlier this year, when the code became
|
||
|
|
||
|
needed for new subscribers on that exchange and the engineer had to
|
||
|
|
||
|
take it out.
|
||
|
|
||
|
|
||
|
|
||
|
Two devices to avoid payment were displayed at the trial. One, known
|
||
|
|
||
|
simply as a black box or non-charge facility, is simply a battery and
|
||
|
|
||
|
two simple components that can be fitted to any telephone and prevent
|
||
|
|
||
|
the exchange from realising that the called telephone has been
|
||
|
|
||
|
answered - thus no charge is made to the caller.
|
||
|
|
||
|
|
||
|
|
||
|
The other was more amusing - a 2p piece on a length of thread. Its
|
||
|
|
||
|
student owner had not known that it could be used for telephones, but
|
||
|
|
||
|
a zealous executive engineer studied the problem and showed the court
|
||
|
|
||
|
how, with a little legerdemain, it could be retrieved from the reject
|
||
|
|
||
|
slot of the coin box.
|
||
|
|
||
|
|
||
|
|
||
|
[caption]
|
||
|
|
||
|
|
||
|
|
||
|
Telephone tapping?
|
||
|
|
||
|
|
||
|
|
||
|
As might be expected in Watergate year, allegations of telephone
|
||
|
|
||
|
tapping were well to the fore, and several Post Office methods were
|
||
|
|
||
|
exposed. The first, and simplest, is a printermeter, which makes an
|
||
|
|
||
|
automatic record of whom you call, for how long, and the exact time
|
||
|
|
||
|
and date of the call. The second is the misuse of special test
|
||
|
|
||
|
circuits to listen in to any call. The operator or monitor merely has
|
||
|
|
||
|
to dial you number on these special circuits, and listen for as long
|
||
|
|
||
|
as he likes. The intended use of such circuits is to interrupt a call
|
||
|
|
||
|
to tell you that someone is trying to call you from abroad, for
|
||
|
|
||
|
instance.
|
||
|
|
||
|
|
||
|
|
||
|
The third is the euphemistically named "Call Check Circuit" - this
|
||
|
|
||
|
can be attached to any phone in the country - and is undetectable. It
|
||
|
|
||
|
can be used with a tape recorder to record all incoming and outgoing
|
||
|
|
||
|
calls. Identifiable only by the type number painted on it, 60345, it
|
||
|
|
||
|
is now fitted as standard equipment.
|
||
|
|
||
|
|
||
|
|
||
|
[start sub-box]
|
||
|
|
||
|
|
||
|
|
||
|
[photograph with caption]
|
||
|
|
||
|
|
||
|
|
||
|
The Post Office goes to great, but unsuccessful lengths to keep its
|
||
|
|
||
|
secrets. The centre door (31-32 High Holborn) is the unmarked
|
||
|
|
||
|
entrance to the Kingsway exchange, London's largest trunk exchange,
|
||
|
|
||
|
located in two deep bomb shelters under Chancery Lane underground
|
||
|
|
||
|
station.
|
||
|
|
||
|
|
||
|
|
||
|
[end sub-box]
|
||
|
|
||
|
|
||
|
|
||
|
The British Post Office is not the only organisation with pranksters
|
||
|
|
||
|
prowling through their system. In the USA, the vast telephone network
|
||
|
|
||
|
has been blighted for some time by the phenomenon. For technical
|
||
|
|
||
|
reasons, the Bell system is far more open to the possessor of a Blue
|
||
|
|
||
|
Box, as a bleeper is called across the Atlantic. Forty years ago,
|
||
|
|
||
|
world telephone technologies diverged. The Bell system, which owns
|
||
|
|
||
|
almost all of North America;s 140 million telephones, started to use
|
||
|
|
||
|
the crossbar system, while Britain stuck with the Strowger method,
|
||
|
|
||
|
invented by a Kansas City undertaker in the 1890s. The effect of the
|
||
|
|
||
|
crossbar on the trunk network was to enable the same codes that are
|
||
|
|
||
|
used for the nationwide dialling system to be used for the internal
|
||
|
|
||
|
codes of the system, resulting in far greater reliability and faster
|
||
|
|
||
|
operation. It also uses a multifrequency signalling system, using
|
||
|
|
||
|
frequencies between 700 Hz and 1700 Hz. Because of the identical code
|
||
|
|
||
|
usage, US phreaks are sparedn the hard work of compiling and using
|
||
|
|
||
|
special trunk codes as in Britain.
|
||
|
|
||
|
|
||
|
|
||
|
The phreaks first appeared on the US scene in the early 1960s when a
|
||
|
|
||
|
group of MIT students were found to have conducted a late night
|
||
|
|
||
|
dialling experiment on the Defense Department's secret network. They
|
||
|
|
||
|
were rewarded with jobs when they explained their system to Bell
|
||
|
|
||
|
investigators. The attitude was a little different a few years later
|
||
|
|
||
|
when blind Joe Engressia, sometimes acclaimed as the "King of the
|
||
|
|
||
|
Phone Phreaks", was discovered merrily whistling down the line to fix
|
||
|
|
||
|
up free calls around the world for his school friends. As a result of
|
||
|
|
||
|
his widely-publicised prosecution, many individuals who had been
|
||
|
|
||
|
working in teh dark, alone, across the continent rang in to Blind
|
||
|
|
||
|
Joe. The new technology spread rapidly through the underground, and
|
||
|
|
||
|
names like Captain Crunch and Midnight Stalker became commonplace on
|
||
|
|
||
|
illegaly procured trunks. The name "phone phreak" identified the
|
||
|
|
||
|
enthusiasts with the common underground usage of freak as someone who
|
||
|
|
||
|
was cool and used drugs.
|
||
|
|
||
|
|
||
|
|
||
|
Since then, the telephone system has been a battleground between the
|
||
|
|
||
|
phreaks and the Telcos (as the telephone companies nickname themselves).
|
||
|
|
||
|
Abbie Hoffman's Yippies, the Youth International Party, gave birth to
|
||
|
|
||
|
a phreak division whose monthly, The Party Line, publishes details of
|
||
|
|
||
|
the latest and best Anti-Telco hardware. It has recently diversified
|
||
|
|
||
|
into using high-power magnets on parking meters in order to stay
|
||
|
|
||
|
longer, cheaper. In June 1972, Ramparts carried a set of instructions
|
||
|
|
||
|
on how to build the Black Box, or non-charge facility.
|
||
|
|
||
|
|
||
|
|
||
|
In the US, phreaking is receiving increasing publicity, and the
|
||
|
|
||
|
annual conference held on 8 September at a major New York hotel was
|
||
|
|
||
|
given wide press coverage. Unveiled at that meeting was the Red Box -
|
||
|
|
||
|
an electronic device that simulates tone pulses sent to an operator
|
||
|
|
||
|
when money is put into a coin box.
|
||
|
|
||
|
|
||
|
|
||
|
From the Telcos this year comes their effort to keep up, the Model
|
||
|
|
||
|
51A Dialled Digit recorder. It costs $3500. For a further $1000 the
|
||
|
|
||
|
MF option can be fitted, and with another $100 for the 67A extender,
|
||
|
|
||
|
the telephone company can have a recorder which will record no less
|
||
|
|
||
|
than four different types of signalling: a match to the Mighty
|
||
|
|
||
|
Wurlitzer.
|
||
|
|
||
|
|
||
|
|
||
|
[begin sub-box]
|
||
|
|
||
|
|
||
|
|
||
|
[caption]
|
||
|
|
||
|
|
||
|
|
||
|
An Old Bailey anniversary
|
||
|
|
||
|
|
||
|
|
||
|
This year is the 20th anniversary of another Old Bailey telephone
|
||
|
|
||
|
conspiracy trial. In that year, a Mayfair chemical company director
|
||
|
|
||
|
and two friends were accused of making automatic trunk calls around
|
||
|
|
||
|
Britain - almost ten years before STD was introduced. And all for a
|
||
|
|
||
|
single charge of an old penny.
|
||
|
|
||
|
|
||
|
|
||
|
Their method was known as the Toll A drop-back, named after Toll A,
|
||
|
|
||
|
an exchange near St Paul's which routes calls between London and
|
||
|
|
||
|
nearby non-London exchanges. The trick was to dial a number, such as
|
||
|
|
||
|
Dartford 21111, which was then not allocated. Then, the reciever rest
|
||
|
|
||
|
would be "flashed" (depressed for 1/2 a second). This would act in a
|
||
|
|
||
|
similar way to the "clear forward" on the a.c. system. The caller
|
||
|
|
||
|
would be left with an open line into the Toll A exchange.
|
||
|
|
||
|
|
||
|
|
||
|
The user could then dial a code, 018, which would take him on to what
|
||
|
|
||
|
was then the first trunk (long distance) exchange in Britain. Once
|
||
|
|
||
|
again with a list of trunk codes which he could have compiled by
|
||
|
|
||
|
experimentation, he could dial around Britain. The advantages of
|
||
|
|
||
|
these methods in 1953 was immense. The delays on trunk calls through
|
||
|
|
||
|
the trunk operator could often be several hours, and the quality very
|
||
|
|
||
|
poor.
|
||
|
|
||
|
|
||
|
|
||
|
The method is still available. One of the defendannts in last month's
|
||
|
|
||
|
trial was alleged to have made experiments by using a Toll A dropback.
|
||
|
|
||
|
He had dialled Caterham 41111, a number not in use. Then by flashing,
|
||
|
|
||
|
he could dial through the Toll A exchange, and out through exchanges
|
||
|
|
||
|
around London to some point where he would be able to dial up onto
|
||
|
|
||
|
the trunk network.
|
||
|
|
||
|
|
||
|
|
||
|
In May, a London chemistry student pleaded guilty to making calls to
|
||
|
|
||
|
he US utilising Toll A dropback via exchanges in Surrey where trunk
|
||
|
|
||
|
accesses had been fitted at the time. he was fined 70 [pounds] plus
|
||
|
|
||
|
10 [pounds] costs and ordered to pay the Post Office 350 [pounds] for
|
||
|
|
||
|
lost revenue.
|
||
|
|
||
|
|
||
|
|
||
|
[end sub-box]
|
||
|
|
||
|
|
||
|
|
||
|
[Phew! I am knackered after typing that in! but I hoped you enjoyed
|
||
|
|
||
|
it! Nice to know that the Red Box has come of age ... being 21 years
|
||
|
|
||
|
old this year! I actually met one of these defendants at this trial
|
||
|
|
||
|
at a 2600 meeting last year. A few questions though ... WHERE are the
|
||
|
|
||
|
Call Check Circuit marked 60345 installed??? In a junction? a DP? In
|
||
|
|
||
|
you house??? and WHY can't BT be as complacent as the Post Office are
|
||
|
|
||
|
reported to have been? - Phuk-Ed]
|
||
|
|
||
|
|
||
|
|
||
|
+++
|
||
|
|
||
|
EOF=============================================================================
|
||
|
|
||
|
PHUK MAGAZINE - Phile 4 of 10
|
||
|
|
||
|
=============================================================================
|
||
|
|
||
|
|
||
|
|
||
|
----------------------------------------
|
||
|
|
||
|
DEFCON ][ , Las Vegas, July 1994 - Otaku
|
||
|
|
||
|
----------------------------------------
|
||
|
|
||
|
|
||
|
|
||
|
Since I have been nagged to write a space filling article for this
|
||
|
|
||
|
inaugural issue of PHUK, here are some person observations about the
|
||
|
|
||
|
DEFCON ][ conference held this summer.
|
||
|
|
||
|
|
||
|
|
||
|
Unlike Winn Schwartau, I am not a writer/lecturer on security issues,
|
||
|
|
||
|
but those of you who want another view of what went on at DEFCON ][
|
||
|
|
||
|
should read his account "Cyber-Christ meets Lady Luck" in PHRACK 46 ,
|
||
|
|
||
|
file 19.
|
||
|
|
||
|
|
||
|
|
||
|
In January 1994, before I had decided to go to DEFCON ][, I saw an
|
||
|
|
||
|
article in alt.2600 from a journalist wanting to meet "hacker/phreaker
|
||
|
|
||
|
types". I suggested that he go to DEFCON ][ in July and perhaps report
|
||
|
|
||
|
as follows (looking back, I must have been psychic, because some
|
||
|
|
||
|
things happened just as predicted !):
|
||
|
|
||
|
|
||
|
|
||
|
>Judging by the press coverage of last year's HEU event in the Netherlands,
|
||
|
|
||
|
>someone needs to educate the media/government, perhaps you can help.
|
||
|
|
||
|
|
||
|
|
||
|
>Here are some suggestions 8-)
|
||
|
|
||
|
|
||
|
|
||
|
>Unlike the HEU event, you should be able to write your story from the
|
||
|
|
||
|
>comfort of an air conditioned bar. Editors too old fashioned to
|
||
|
|
||
|
>believe the authenticity of email might be convinced by a creatively
|
||
|
|
||
|
>constructed expenses claim for bar room interviews of "sources".
|
||
|
|
||
|
|
||
|
|
||
|
>With Las Vegas as a background, you can pique your editors interest with
|
||
|
|
||
|
>quotes from Hunter S. Thompson's "Fear and Loathing in Las Vegas"
|
||
|
|
||
|
>Go on to draw attention to the similarity of the physical look and atmosphere
|
||
|
|
||
|
>of Las Vegas at night and most of the literary visions of Cyberspace from the
|
||
|
|
||
|
>likes of William Gibson ("Neuromancer") and Neal Stephenson ("Snow Crash").
|
||
|
|
||
|
>Since you are in the desert, you could even drag in references to Wild Palms.
|
||
|
|
||
|
>(Culture & technology)
|
||
|
|
||
|
|
||
|
|
||
|
Winn Schwartau mentions Hunter S.Thompson in his article, so perhaps I had
|
||
|
|
||
|
the right idea !
|
||
|
|
||
|
|
||
|
|
||
|
>If you can tag along with the right people, you will no doubt visit all
|
||
|
|
||
|
>the sights of Vegas. See if you can persuade someone with a cell phone scanner
|
||
|
|
||
|
>to show you how to track the call girls being despatched to the
|
||
|
|
||
|
>various hotels.
|
||
|
|
||
|
>(Sex and technology)
|
||
|
|
||
|
|
||
|
|
||
|
The call girl/cell phone stuff was done: a couple of potential
|
||
|
|
||
|
customers were warned off by "the voice of God" breaking in on their
|
||
|
|
||
|
cell phone conversation and warning that it was a police setup. At
|
||
|
|
||
|
least one drug deal was also scotched in a similar manner.
|
||
|
|
||
|
|
||
|
|
||
|
>This could lead you nicely on to the other Vegas cliches of pondering the
|
||
|
|
||
|
>enormous amount of money flowing about the place and all the computer
|
||
|
|
||
|
>and telecomms technology used to provide the infrastructure to the casinos.
|
||
|
|
||
|
>Recount the stories of the computer assisted Blackjack hackers.
|
||
|
|
||
|
>(Money & technology)
|
||
|
|
||
|
|
||
|
|
||
|
>No doubt there should be various law enforcment types lurking about.
|
||
|
|
||
|
>Ask them about the Steve Jackson affair and about Phiber Optik.
|
||
|
|
||
|
>(Legal issues & technology)
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
I heard that an approach had been made to one of the delegates, asking
|
||
|
|
||
|
if he could "hack into the the Sands Casino Baccarat high-rollers
|
||
|
|
||
|
list". Since this game accounts for more than half the profits of a
|
||
|
|
||
|
casino, the few mega-rich gamblers who choose to lose at baccarat are
|
||
|
|
||
|
feted with free rooms, food, drink, women etc. A suitablly impressive
|
||
|
|
||
|
looking data file was constructed, and Gail Thackery's name was put on
|
||
|
|
||
|
it. She was a guest speaker, and also the District Attorney who was
|
||
|
|
||
|
involved in the farcical Operation Sundevil affair involving Steve
|
||
|
|
||
|
Jackson games.
|
||
|
|
||
|
|
||
|
|
||
|
>Ask people about PGP. Compare and contrast the arguments about freedom,
|
||
|
|
||
|
>privacy and strong public key encryption from the Cypherpunks, to the right
|
||
|
|
||
|
>to bear arms arguments of the NRA. Ask what Bill Clinton and Al Gore are up
|
||
|
|
||
|
>to with the Clipper chip proposal. Will access to the new Digital Superhighway
|
||
|
|
||
|
>if it gets built be as free as this Internet ?
|
||
|
|
||
|
>(Government & technology)
|
||
|
|
||
|
|
||
|
|
||
|
Phillip Zimmermman, author of PGP was one of the speakers
|
||
|
|
||
|
|
||
|
|
||
|
>A few photos of people with reversed baseball caps posing with laptops and
|
||
|
|
||
|
>cell phones in front of the various casinos (at night for best effect)
|
||
|
|
||
|
>and you might be able to sell the story to the mainstream media.
|
||
|
|
||
|
|
||
|
|
||
|
There were plenty of reversed baseball caps, but only one person had
|
||
|
|
||
|
gone so far as to get a computer chip implanted next to his tatoos
|
||
|
|
||
|
(seriously !)
|
||
|
|
||
|
|
||
|
|
||
|
The conference was held in the Sahara Hotel, which is not the newest,
|
||
|
|
||
|
biggest or most luxurious, but was a whole lot more comfortable than
|
||
|
|
||
|
either the Dutch campsite which hosted HEU or the New York flea pit
|
||
|
|
||
|
that apparently hosted HOPE.
|
||
|
|
||
|
|
||
|
|
||
|
I fell in with the organiser of the conference, Dark Tangent, a law
|
||
|
|
||
|
student from Seattle, as well as TDK (one of the elite few from the
|
||
|
|
||
|
UK), MTV, Tagger and a man with no nickname.
|
||
|
|
||
|
|
||
|
|
||
|
"Lets's go and see the MGM" :this is the biggest casino/resort hotel
|
||
|
|
||
|
in Vegas, 5000+ rooms, the usual huge casino, a seven story lion
|
||
|
|
||
|
guarding the entrance and a theme park similar to Disneyland. Since we
|
||
|
|
||
|
were here to enjoy ourselves, we headed off in a couple of cars.
|
||
|
|
||
|
|
||
|
|
||
|
We toured past the Las Vegas Hilton, which used to have the largest
|
||
|
|
||
|
illuminated neon sign in the world (worth $2 million, over 100 feet
|
||
|
|
||
|
high). Unfortunately it had collapsed into a heap of twisted girders
|
||
|
|
||
|
and broken glass the day before I arrived.
|
||
|
|
||
|
|
||
|
|
||
|
The MGM is huge, even by Vegas standards, but of course every punter
|
||
|
|
||
|
is treated like a VIP, so there is obligatory valet parking at the
|
||
|
|
||
|
entrance. We got out of the two cars we had cruised up in, whereupon,
|
||
|
|
||
|
the man with no nickname got managed to lock the keys to one of the
|
||
|
|
||
|
cars inside it, in the middle of the valet parking lane.
|
||
|
|
||
|
|
||
|
|
||
|
The car valets then proceeded to give us a demonstartion of car
|
||
|
|
||
|
repossession techniques using flexible metal strips known as "slim
|
||
|
|
||
|
jims" which they inserted between the rubber seal and the glass of the
|
||
|
|
||
|
car window. They were trying from both sides, with little apparent
|
||
|
|
||
|
success, but those musical Vegas words "there will be a big tip for
|
||
|
|
||
|
you" were uttered and both driver's and passenger's doors sprang open
|
||
|
|
||
|
as if by magic ! We decided to christen the man with no nickname
|
||
|
|
||
|
"Repo Man" in honour of his part in our entertainment and education
|
||
|
|
||
|
but upon reflection "Repo-Spazz" seemed to stick.
|
||
|
|
||
|
|
||
|
|
||
|
The evening was a cool 90 degrees Fahrenheit, so we headed indoors to
|
||
|
|
||
|
the air-conditioned casino, which was impressive enough in scale, but
|
||
|
|
||
|
held little interest for us as we headed off to the amusement park on
|
||
|
|
||
|
the other side.
|
||
|
|
||
|
|
||
|
|
||
|
We watched an amusing slapstick/stunt performance involving costumed
|
||
|
|
||
|
pirates and much leaping off walls and diving into water. Piracy seems
|
||
|
|
||
|
to be a theme in Vegas. There is hotel called Treasure Island, in
|
||
|
|
||
|
front of which, just to draw the crowds, are two full sized pirate
|
||
|
|
||
|
ships on an artificial lake, which periodically stage a performance
|
||
|
|
||
|
involving crews of actors, sword fights etc. One of the ships then
|
||
|
|
||
|
"sails" towards the other and fires cannon etc.
|
||
|
|
||
|
|
||
|
|
||
|
The rides were ok, and we did not have to queue as this was late in
|
||
|
|
||
|
the day. We were nearly ejected from one ride, a flight simulator type
|
||
|
|
||
|
"ride to the centre of the earth" , when one of our number could not
|
||
|
|
||
|
resist the temptation to spit into one of the pools of water lit by a
|
||
|
|
||
|
red light which was supposed to represent a pool of molten lava
|
||
|
|
||
|
(there are security cameras everywhere in Vegas !).
|
||
|
|
||
|
|
||
|
|
||
|
We had more fun on a proper roller coaster type ride, which happened
|
||
|
|
||
|
mostly indoors, and so although short, was quite fast and aggressive
|
||
|
|
||
|
in its twists and turns. MTV lost his precious baseball cap, which he
|
||
|
|
||
|
had to go back for later and Dark Tangent was taken by the video photo
|
||
|
|
||
|
of a girl in one of the cars following us. At the point where the
|
||
|
|
||
|
cameras flashed, she was holding on to herself in such a fashion that
|
||
|
|
||
|
Dark Tangent bribed the photo clerk for a copy. It may appear on the
|
||
|
|
||
|
DEFCON ][ WWW and ftp site at dfw.com under Aleph1' s pages.
|
||
|
|
||
|
|
||
|
|
||
|
Nearly midnight, and Vegas keeps on going (they pump extra oxygen into
|
||
|
|
||
|
the casino air conditioning in the wee hours of the morning to keep
|
||
|
|
||
|
the staff and punters awake, and also make sure that there are no
|
||
|
|
||
|
visible clocks or windows to give you time clues), but, hey, there is a
|
||
|
|
||
|
conference due to start tomorrow !
|
||
|
|
||
|
|
||
|
|
||
|
We went back to Dark Tangent's room and I helped stuff an extra sheet
|
||
|
|
||
|
into hundreds of copies of the conference program. I got my
|
||
|
|
||
|
psychodelic conference badge (#1 no less!) and various stories were
|
||
|
|
||
|
recounted. The infamous Oregon State vehicle licence/voters roll
|
||
|
|
||
|
CD-ROM was displayed and discussed. This contains the names ,
|
||
|
|
||
|
addresses , telphone numbers and social security numbers of thousands
|
||
|
|
||
|
of citizens in the state of Oregon , legally obtained by paying the
|
||
|
|
||
|
appropriate fee to the proper authorities, in exactly the same way as
|
||
|
|
||
|
the credit bureaux and marketing database companies do. Somehow the
|
||
|
|
||
|
act of translating it from 9 inch tape format to CD-ROM format and
|
||
|
|
||
|
making it available to the public caused quite a stir in Oregon. As
|
||
|
|
||
|
the warning on the label says "Do not use this to create false
|
||
|
|
||
|
identities, apply for credit cards etc-"
|
||
|
|
||
|
|
||
|
|
||
|
Who says phone phreaks are a menace to society ? One of the female
|
||
|
|
||
|
conference delegates was having difficulties with the hotel phone
|
||
|
|
||
|
equipment. Within 5 minutes the jack was out of the wall and various
|
||
|
|
||
|
soldering irons were in use and her phone was repaired without any
|
||
|
|
||
|
need to call hotel maintainance at 1am in the morning. Perhaps this
|
||
|
|
||
|
was when it was discovered that the trunking which held the phone
|
||
|
|
||
|
lines to your room, also had the wires for most of the rest of the
|
||
|
|
||
|
same floor 8-)
|
||
|
|
||
|
|
||
|
|
||
|
The hotel had given us a conference room the size of a couple of
|
||
|
|
||
|
tennis courts for free providing that Dark Tangent could supply the
|
||
|
|
||
|
requisite number of hotel bookings. Normally this works well for the
|
||
|
|
||
|
hotel, e.g. there was also a convention of Railway Signalmen booked in
|
||
|
|
||
|
at the same time, who spent much more on beer and at the tables than
|
||
|
|
||
|
the DEFCON crowd did.
|
||
|
|
||
|
|
||
|
|
||
|
Dark Tangent organised the registration process, but of course there
|
||
|
|
||
|
were people who had pre-registered, of whom no record could be found
|
||
|
|
||
|
("computer problem") and there was much waiting around for things to
|
||
|
|
||
|
happen. The DEFCON tshirts were popular, and Dark Tangent learned
|
||
|
|
||
|
that black outsells white which outsells green.
|
||
|
|
||
|
|
||
|
|
||
|
Once the various speakers got going, things were fine, but generally,
|
||
|
|
||
|
unlike HEU, there was hardly any technology on show for people to play
|
||
|
|
||
|
with. The most desparate email addicts did get a 'Net connection' on
|
||
|
|
||
|
Zak's portable Sun clone via a Macintosh modem and several hours of
|
||
|
|
||
|
social engineering of the hotel operator.
|
||
|
|
||
|
|
||
|
|
||
|
Much of Dark Tangent's promised equipment failed to turn up in time.
|
||
|
|
||
|
|
||
|
|
||
|
Since Zak is from the UK, and TDK sorted out some of the PA and
|
||
|
|
||
|
overhead projector problems, and I lent my portable for some German
|
||
|
|
||
|
Videophone type stuff, the very small UK contingent aquitted itself
|
||
|
|
||
|
better than the native Americans in terms of conference
|
||
|
|
||
|
hardware/software.
|
||
|
|
||
|
|
||
|
|
||
|
The point of such a conference is not to have an online
|
||
|
|
||
|
hacking/phreaking session, or to play with the Internet, but to meet
|
||
|
|
||
|
interesting people.
|
||
|
|
||
|
|
||
|
|
||
|
I had interesting chats with Philip Zimmerman, the author of Pretty
|
||
|
|
||
|
Good Privacy public key encrpyption (he is working on a PGP for
|
||
|
|
||
|
voice/audio which will do what the infamous Clipper chip is meant to
|
||
|
|
||
|
do, without government interference). I got to chat with Padgett
|
||
|
|
||
|
Petersen, an anti-virus expert and also with Winn Schwartau and other
|
||
|
|
||
|
more anonymous people, including the winner of the "I am a Fed" tshirt
|
||
|
|
||
|
in the "Spot the Fed " contest.
|
||
|
|
||
|
|
||
|
|
||
|
Winn's book "Information Warfare" has some details of High Energy
|
||
|
|
||
|
Radio Frequency weapons, which although military in origin, can
|
||
|
|
||
|
apparently be home brewed to produce a 16 megawatt directed pulse
|
||
|
|
||
|
which can frazzle a computer at a distance. He raised the possability
|
||
|
|
||
|
of a HERF gun demo perhaps at the next DEFCON, out in the desert,
|
||
|
|
||
|
providing that the attendees do not have pacemakers etc. The
|
||
|
|
||
|
implications of this sort of technology are as significant for us in
|
||
|
|
||
|
the UK as they are in the USA. What would have happened if the IRA had
|
||
|
|
||
|
used a HERF gun or a similar EMP/T bomb instead of explosives in the
|
||
|
|
||
|
City of London ?
|
||
|
|
||
|
|
||
|
|
||
|
Dr Mark Ludwig gave his wry International Virus Writing Competion
|
||
|
|
||
|
award to one of the proponents of the media hype surrounding the fact
|
||
|
|
||
|
of the announcement of a Virus Writing Conference. His Virus CD-ROM
|
||
|
|
||
|
containing hundreds of live computer viruses and source code seemed to
|
||
|
|
||
|
sell out quickly. He now looks at computer viruses in terms of
|
||
|
|
||
|
evoloution and has done experiments with Genetic Algorithm programming
|
||
|
|
||
|
to allow virus code to mutate and recombine in order to evade the
|
||
|
|
||
|
attentions of anti-virus scanning software. Since he has also
|
||
|
|
||
|
published protected mode boot sector infectors, all the snobs who
|
||
|
|
||
|
think that just because they are running Linux, Windows NT, or OS/2
|
||
|
|
||
|
that they are safe from mere MSDOS viruses, had better think again.
|
||
|
|
||
|
|
||
|
|
||
|
Annaliza (an honourary member of the UK contingent, since she attends
|
||
|
|
||
|
the 2600 meetings in London when she is over here) gave a talk about
|
||
|
|
||
|
her video "Unauthorised Access" and Christian from the Chaos Computer
|
||
|
|
||
|
Club in Germany gave an account of things over there. He also showed
|
||
|
|
||
|
the cool video phone technology he is working on using my portable.
|
||
|
|
||
|
|
||
|
|
||
|
TDK ran through what was happening in the UK (you should know all
|
||
|
|
||
|
about that already)
|
||
|
|
||
|
|
||
|
|
||
|
One of the most interesting ideas I picked up from DEFCON was from
|
||
|
|
||
|
Stephen Dunifer of Berkley Free Radio. He is involved in Free Radio
|
||
|
|
||
|
(i.e. "pirate" broadcasting ) using CAD/CAM designed, stable frequency
|
||
|
|
||
|
micro-power transmitters. As these do not drift as much as commercial
|
||
|
|
||
|
stations do, there tend to be fewer complaints, and the stations can
|
||
|
|
||
|
stay on air longer before the authorities have to be seen to act to
|
||
|
|
||
|
shut them down. He and his collegues have been involved in providing
|
||
|
|
||
|
such cheap transmitters to the Chiapas indians during and after their
|
||
|
|
||
|
recent revolt against the Mexican government. the plans for these,
|
||
|
|
||
|
including PCB graphics and component lists are available by ftp from
|
||
|
|
||
|
crl.com, directory ftp/users/ro/frbspd
|
||
|
|
||
|
|
||
|
|
||
|
What caught my attention was his description of a recent rave in the
|
||
|
|
||
|
Bay area, where due to restrictions on amplified music, the DJs
|
||
|
|
||
|
broadcast on FM via a micro-power transmitter and got the audience to
|
||
|
|
||
|
bring along their boom-boxes. The concept of an audience of ravers all
|
||
|
|
||
|
wearing Sony Walkmans seemed quite bizzare and Californian, but it
|
||
|
|
||
|
made me think of what might be possible/necessary after the UK
|
||
|
|
||
|
Criminal Justice Bill gets passed.
|
||
|
|
||
|
|
||
|
|
||
|
There were a couple of interesting talks by private detective /
|
||
|
|
||
|
telephone bugging types. I watched a couple of them demonstrate how to
|
||
|
|
||
|
pick a lock (somehow one of the hotel's noticeboards with those
|
||
|
|
||
|
movable letters behind a locked glass fronted door got re-arranged).
|
||
|
|
||
|
With the right tools and a bit of practice it seems quite easy. There
|
||
|
|
||
|
is a shop opposite the hotel which sells bugging / anti bugging
|
||
|
|
||
|
equipment, which these professionals were naturally contemptuous of.
|
||
|
|
||
|
It seems to be a major pastime in the USA, and of course DEFCON aided
|
||
|
|
||
|
things by publishing the frequencies used by the local police and
|
||
|
|
||
|
hotel security staff. Can Princess Diana be seriously contemplating
|
||
|
|
||
|
exile in the USA ? Somehow I think that the "Squidgy" tapes incident
|
||
|
|
||
|
would be childs' play in the USA.
|
||
|
|
||
|
|
||
|
|
||
|
There was an interesting talk on anonymous remailers, and the
|
||
|
|
||
|
possabilities of extending the concept of remailer chaining and
|
||
|
|
||
|
encryption. The old military/ diplomatic signals security trick of
|
||
|
|
||
|
continuously sending a stream of messages between re-mailers, even
|
||
|
|
||
|
when they are have no "real" messages to send was discussed, since it
|
||
|
|
||
|
was claimed that anon.penet.fi had been the target of successful
|
||
|
|
||
|
traffic analysis.
|
||
|
|
||
|
|
||
|
|
||
|
Whilst the convention was in progress, the big event was of course the
|
||
|
|
||
|
opening of Planet Hollywood, the film star owned burger restaurant in
|
||
|
|
||
|
Caesar's Palace shopping mall. I did mosey along, and the crowds were
|
||
|
|
||
|
even bigger than when the one in London opened, all hoping for a
|
||
|
|
||
|
glance of Arnie or Bruce. I did not see them, but I did see at least 6
|
||
|
|
||
|
"Hollywood Blonde" women, tall and beautiful, each with a wizened
|
||
|
|
||
|
monkey at least twice their age and about half their height as an
|
||
|
|
||
|
escort, heading for the opening festivities.
|
||
|
|
||
|
|
||
|
|
||
|
I resisted the temptation to go go haring off into the desert in
|
||
|
|
||
|
search of something interesting in Area 54 and Groom Lake
|
||
|
|
||
|
("Dreamland") where the US stealth planes and it is rumoured captured
|
||
|
|
||
|
UFOs lurk.
|
||
|
|
||
|
|
||
|
|
||
|
By the end of the conference, the DEFCON tshirts were no longer
|
||
|
|
||
|
causing many double takes "are DEFCON a rock band ?" and I had
|
||
|
|
||
|
"nearly" won a jackpot from a slot machine . It was time to head off
|
||
|
|
||
|
to San Francisco and then home.
|
||
|
|
||
|
|
||
|
|
||
|
All in all I enjoyed DEFCON ][ and look forward to the similar event
|
||
|
|
||
|
which TDK may be organising in London this April. Watch this space,
|
||
|
|
||
|
and send offers of help, money, etc. care of the editors of PHUK
|
||
|
|
||
|
magazine.
|
||
|
|
||
|
|
||
|
|
||
|
- Otaku
|
||
|
|
||
|
|
||
|
|
||
|
+++
|
||
|
|
||
|
EOF
|
||
|
|
||
|
=============================================================================
|
||
|
|
||
|
PHUK MAGAZINE - Phile 5 of 10
|
||
|
|
||
|
=============================================================================
|
||
|
|
||
|
|
||
|
|
||
|
-----------------------------------
|
||
|
|
||
|
ANSWERPHONES - Panasonic KX-T1446BE
|
||
|
|
||
|
-----------------------------------
|
||
|
|
||
|
|
||
|
|
||
|
Reading the phile in sUBTERRANEAN TECHNOLOGIES mAGAZINE by nEIL.s on
|
||
|
|
||
|
answerphones, (complete with BT Response 400 manual), made me realise
|
||
|
|
||
|
that quite a few people mess with these things and that working the
|
||
|
|
||
|
commands out is often more of a drag than hacking the remote code. A
|
||
|
|
||
|
happened to have a answerphone manual and decided to type in the
|
||
|
|
||
|
relevant portions and send them to PHUK magazine. If everyone typed
|
||
|
|
||
|
in an answerphone manual then we would soon have the manuals for
|
||
|
|
||
|
every answerphone in the known universe .... making our lives
|
||
|
|
||
|
considerably easier!
|
||
|
|
||
|
|
||
|
|
||
|
Anyway, on with the answerphone manual
|
||
|
|
||
|
|
||
|
|
||
|
--
|
||
|
|
||
|
Panasonic KX-T1446BE
|
||
|
|
||
|
|
||
|
|
||
|
* to skip outgoing message when dialing in
|
||
|
|
||
|
1 backspace incoming message
|
||
|
|
||
|
2 skip forward incoming message (ICM)
|
||
|
|
||
|
3 incoming message reset
|
||
|
|
||
|
4 memory playback
|
||
|
|
||
|
7 begin re-recording outgoing message (OGM)
|
||
|
|
||
|
8 continue through incoming messages
|
||
|
|
||
|
9 end recording outgoing message
|
||
|
|
||
|
0 turn off machine
|
||
|
|
||
|
|
||
|
|
||
|
Playing Back Messages
|
||
|
|
||
|
|
||
|
|
||
|
* dial the phone
|
||
|
|
||
|
* press remote code during OGM
|
||
|
|
||
|
* a beep will sound followed by a number of beebs to tell you how
|
||
|
|
||
|
many messages you have got (up to 8 times)
|
||
|
|
||
|
* the unit will beep between each message, and 3 times at the end of
|
||
|
|
||
|
the messages
|
||
|
|
||
|
* every 2 minutes 40 seconds the unit will do 2 beeps, press 8 to
|
||
|
|
||
|
continue listening to ICM
|
||
|
|
||
|
|
||
|
|
||
|
Playing Back Newly Recorded Messages
|
||
|
|
||
|
|
||
|
|
||
|
* press 4
|
||
|
|
||
|
* after 1 beep the unit will play back the messages
|
||
|
|
||
|
* during playback of previously heard messages you can skip them by
|
||
|
|
||
|
pressing 4
|
||
|
|
||
|
|
||
|
|
||
|
Rewinding/Fast-Forwarding the ICM while Hearing Messages
|
||
|
|
||
|
|
||
|
|
||
|
* Push 1 to rewind 15 seconds
|
||
|
|
||
|
* push 2 to skip forward 15 seconds
|
||
|
|
||
|
|
||
|
|
||
|
Resetting the ICM for Future Messages
|
||
|
|
||
|
|
||
|
|
||
|
* To record future messages from the beggining of the tape press 3
|
||
|
|
||
|
after all messages have been played
|
||
|
|
||
|
|
||
|
|
||
|
* The unit will rewind the tape to the beginning & do 1 beep
|
||
|
|
||
|
|
||
|
|
||
|
* If you have pressed 4 to listen to new messages only press 3
|
||
|
|
||
|
|
||
|
|
||
|
* The unit will rewind etc & beep once
|
||
|
|
||
|
|
||
|
|
||
|
* Then press 3 again to rewind the tape
|
||
|
|
||
|
|
||
|
|
||
|
* If you reset by mistake then press 2 and hang up to advance the
|
||
|
|
||
|
tape to the end of all the messages
|
||
|
|
||
|
|
||
|
|
||
|
Recording a Marker Message
|
||
|
|
||
|
|
||
|
|
||
|
* After reviewing the messages 3 beeps will be heard, followed 10
|
||
|
|
||
|
seconds later by another 2 beeps.
|
||
|
|
||
|
|
||
|
|
||
|
* Record your marker message right after the two beeps
|
||
|
|
||
|
|
||
|
|
||
|
* If you hear 6 beeps the tape is full
|
||
|
|
||
|
|
||
|
|
||
|
Changing the Outgoing Message
|
||
|
|
||
|
|
||
|
|
||
|
* Press 7
|
||
|
|
||
|
|
||
|
|
||
|
* The OGM tape will rewind to the beginning with short beeps and then
|
||
|
|
||
|
a long beep will be heard
|
||
|
|
||
|
|
||
|
|
||
|
* Record the new outgoing message after you hear the long beep
|
||
|
|
||
|
|
||
|
|
||
|
* When you have finished recording press 9 to stop recording
|
||
|
|
||
|
|
||
|
|
||
|
* The new OGM will be played back to you
|
||
|
|
||
|
|
||
|
|
||
|
Setting & Cancelling Answer Mode
|
||
|
|
||
|
|
||
|
|
||
|
* To set: wait 20 rings then hang up
|
||
|
|
||
|
|
||
|
|
||
|
* To Cancel: dial up and press 0
|
||
|
|
||
|
|
||
|
|
||
|
--
|
||
|
|
||
|
|
||
|
|
||
|
Right, that's the lot ... anyone else with answerphone manuals or
|
||
|
|
||
|
lists of commands send them to us & we'll make sure they get a wide
|
||
|
|
||
|
distribution :)
|
||
|
|
||
|
|
||
|
|
||
|
+++
|
||
|
|
||
|
EOF
|
||
|
|
||
|
=============================================================================
|
||
|
|
||
|
PHUK MAGAZINE - Phile 6 of 10
|
||
|
|
||
|
=============================================================================
|
||
|
|
||
|
|
||
|
|
||
|
-----------------------------
|
||
|
|
||
|
Simple Line Monitor - TheGoat
|
||
|
|
||
|
-----------------------------
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
The simple line monitor provides a number of functions, initialy it
|
||
|
|
||
|
was produced to give a visual indication of ringing.
|
||
|
|
||
|
|
||
|
|
||
|
Parts : Line connection jack & cable.
|
||
|
|
||
|
Two led's, green and red.
|
||
|
|
||
|
Two resistors 33K.
|
||
|
|
||
|
Small piece of vero.
|
||
|
|
||
|
|
||
|
|
||
|
For convenience I used a ready molded phone jack cable scavenged from
|
||
|
|
||
|
an old phone, I also found it had a .1" pin socket on the other end,
|
||
|
|
||
|
the plug for which was also removeable from the phone, mounting the
|
||
|
|
||
|
plug at one end of the vero, I put the resistors and LEDs in the
|
||
|
|
||
|
middle to form a small square.
|
||
|
|
||
|
|
||
|
|
||
|
1 +----------------------+
|
||
|
|
||
|
2 +------\ +----+ ==+2-\-R1----D1+----+ |
|
||
|
|
||
|
3/4 |P/jack]+----//--| + ==+ \--R2----+D2--+ |
|
||
|
|
||
|
5 +------/ +----+ ==+5----------------+ |
|
||
|
|
||
|
6 +----------------------+
|
||
|
|
||
|
|
||
|
|
||
|
Effectivly, pin 2 of the phone jack connects to both resistors each
|
||
|
|
||
|
resistor to a diode, note positive of each diode. and finaly both
|
||
|
|
||
|
diode ends lead back to pin 5 of the phone jack.
|
||
|
|
||
|
|
||
|
|
||
|
Pin 2 ------------------+-------+
|
||
|
|
||
|
| |
|
||
|
|
||
|
R1 R2
|
||
|
|
||
|
| |
|
||
|
|
||
|
+ |
|
||
|
|
||
|
D1 D2
|
||
|
|
||
|
| +
|
||
|
|
||
|
| |
|
||
|
|
||
|
Pin 5 ------------------+-------+
|
||
|
|
||
|
|
||
|
|
||
|
The connection of pin 5 and 2 is not too important.
|
||
|
|
||
|
|
||
|
|
||
|
When connected to a line one LED will be lit to show line voltage,
|
||
|
|
||
|
if a ring signal is present both LEDs will light brightly in the ring
|
||
|
|
||
|
pattern. (ie: flash-flash--blank-blank-..... etc). As such this met
|
||
|
|
||
|
the initial requirements, but when we first tried it in anger we
|
||
|
|
||
|
found it could also indicate a number of other things. When a phone
|
||
|
|
||
|
is also attached to the line and is picked up the single LED will dim
|
||
|
|
||
|
to about half its previous brightness. If a futher phone is added,
|
||
|
|
||
|
then when the second phone is picked up a futher dimming is noticable.
|
||
|
|
||
|
When tapping a line, indication that the destination phone is in use is
|
||
|
|
||
|
important.
|
||
|
|
||
|
|
||
|
|
||
|
Coming in the next article: Upgrading to give a direct connection to
|
||
|
|
||
|
a computer port for Ring Indication.
|
||
|
|
||
|
|
||
|
|
||
|
- TheGoat
|
||
|
|
||
|
|
||
|
|
||
|
+++
|
||
|
|
||
|
EOF=============================================================================
|
||
|
|
||
|
PHUK MAGAZINE - Phile 7 of 10
|
||
|
|
||
|
=============================================================================
|
||
|
|
||
|
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
NO GIFT FROM HALLMARK - DrKaos
|
||
|
|
||
|
------------------------------
|
||
|
|
||
|
|
||
|
|
||
|
After the 2600 article by FyberLyte ("The Magical Tone Box", 2600 Vol
|
||
|
|
||
|
10, No.4), I hunted in vain through my local Rat Shack for an
|
||
|
|
||
|
ISD1000A but without any joy. Of course I did not plan to do Red
|
||
|
|
||
|
Boxing, as it doesn't work in the UK, but I did think that the chip
|
||
|
|
||
|
had applications that could stretch as far as a whole number
|
||
|
|
||
|
including CF, KP & ST ....
|
||
|
|
||
|
|
||
|
|
||
|
When the buzz started about the Hallmark cards that could record
|
||
|
|
||
|
speech & tones began, I looked all over for a UK source of the
|
||
|
|
||
|
Hallmark cards, even going as far to phone their UK HQ, only to learn
|
||
|
|
||
|
that they were not imported into the UK. I did however find a UK
|
||
|
|
||
|
supplier, DISET UK, and phoned them with the express idea of
|
||
|
|
||
|
engineering some "samples" out of them on the grounds that I wanted
|
||
|
|
||
|
to buy several hundred or so of these cards (yeah right!). As this
|
||
|
|
||
|
approach seemed to fail I took the backup approach of ordering two
|
||
|
|
||
|
cards by mail order for about 12 quid. The cards arrived, and then
|
||
|
|
||
|
some MORE cards arrived, and then still MORE cards arrived .... until
|
||
|
|
||
|
I had 6 in all...:)
|
||
|
|
||
|
|
||
|
|
||
|
I dismantled my card and removed the microphone and crappy little
|
||
|
|
||
|
speaker and then put the whole mess into a DAT tape box along with a
|
||
|
|
||
|
record/playback switch, an actuation press switch and a phono jack
|
||
|
|
||
|
for the imput (throwing away the mike in the process). I won't bore
|
||
|
|
||
|
you with the details of the actual construction because that was
|
||
|
|
||
|
covered in 2600 Vol 11, No 1 ("A Gift from Hallmark" by Bernie S).
|
||
|
|
||
|
Suffice it to say that anyone with half a brain and a soldering iron
|
||
|
|
||
|
can figure out how it works and box it adding switches etc themselves.
|
||
|
|
||
|
|
||
|
|
||
|
In testing my box I found that I had plenty of space for a good long
|
||
|
|
||
|
sequence: Break, Clear Forward, KP2, <num>, ST .... but never managed
|
||
|
|
||
|
to succesfully seize a trunk with it (although the break seemed
|
||
|
|
||
|
fine). About this time my tone generating machine (an Amiga) broke,
|
||
|
|
||
|
and I also learned that the timings were suspect in the box proggie I
|
||
|
|
||
|
was using, so I just put it down to the program, threw the box in the
|
||
|
|
||
|
drawer and forgot about it.
|
||
|
|
||
|
|
||
|
|
||
|
In the meantime I had given out cards to several people, so that they
|
||
|
|
||
|
could experiment with them also. One of these nefarious individuals
|
||
|
|
||
|
was at that time boxing with a Walkman and was suffering tape
|
||
|
|
||
|
stretch, and thought that the Diset Box would be cool.
|
||
|
|
||
|
|
||
|
|
||
|
I forgot all about the Diset Box for a while, being occupied with
|
||
|
|
||
|
other things, but at a 2600 meeting a while ago the subject of the
|
||
|
|
||
|
Diset cards came up and I asked the individual concerned whether he
|
||
|
|
||
|
had ever constructed the box. Yes, he had, he replied, but it didn't
|
||
|
|
||
|
work!! Apparently, using the same tones and trunks that he could
|
||
|
|
||
|
succesfully box over with his Walkman, he had loaded up the box and
|
||
|
|
||
|
set off only to find that what did work with his Walkman, did not
|
||
|
|
||
|
work with the box :( Shame!
|
||
|
|
||
|
|
||
|
|
||
|
Now I thought about this recently, and it seems that there could be
|
||
|
|
||
|
several reasons for the failure: (i) volume not loud enough, (ii)
|
||
|
|
||
|
distortion or clipping of frequencies caused by the algorithm used in
|
||
|
|
||
|
the digitisation process, or (iii) distortion caused by using the
|
||
|
|
||
|
crappy little speaker that came with the card. Unfortunately my Amiga
|
||
|
|
||
|
is still broken, and until I buy a soundblaster card I cannot
|
||
|
|
||
|
generate tones, and that has to wait until I get gainful employment!
|
||
|
|
||
|
|
||
|
|
||
|
Still, if anyone has succesfully overcome the problems with the Diset
|
||
|
|
||
|
box by improving amplification or speaker quality PHUK magazine would
|
||
|
|
||
|
like to hear about it. In the meantime here is the address of Diset
|
||
|
|
||
|
UK should anyone want to play with a Diset Box themselves.
|
||
|
|
||
|
|
||
|
|
||
|
Diset UK, Portica House, Addison Road, Chilton Industrial Estate,
|
||
|
|
||
|
Sudbury, Suffolk, CO10 6YJ. Phone: 0787-310775
|
||
|
|
||
|
|
||
|
|
||
|
- DrKaos
|
||
|
|
||
|
|
||
|
|
||
|
+++
|
||
|
|
||
|
EOF=============================================================================
|
||
|
|
||
|
PHUK MAGAZINE - Phile 8 of 10
|
||
|
|
||
|
=============================================================================
|
||
|
|
||
|
|
||
|
|
||
|
------------------------------------------
|
||
|
|
||
|
British Telecom - Computer Security Manual
|
||
|
|
||
|
------------------------------------------
|
||
|
|
||
|
Mrs. Brady, of Doncaster
|
||
|
|
||
|
------------------------
|
||
|
|
||
|
|
||
|
|
||
|
Heads up!! This one is a goody! sent to us anonymously by someone who
|
||
|
|
||
|
wishes only to be known by the name of Mrs. Brady of Doncaster, this
|
||
|
|
||
|
is a delightful trashing find of the British Telecom Computer Security
|
||
|
|
||
|
manual!! Run in PHUK as a three part series, here is the first part,
|
||
|
|
||
|
right up to the bits about computers and networks ... which should
|
||
|
|
||
|
make you all look forward to the next issue of PHUK magazine....:)
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
SEC|POL|AO12
|
||
|
|
||
|
NOT TO BE SHOWN OUTSIDE BT
|
||
|
|
||
|
ISIS Directive
|
||
|
|
||
|
Computer Security Manual
|
||
|
|
||
|
Origin: Security and Investigation Directorate
|
||
|
|
||
|
Issue 7: March 1993
|
||
|
|
||
|
|
||
|
|
||
|
Contents
|
||
|
|
||
|
|
||
|
|
||
|
Foreword by the chairman. . . . . . . . . . . . . . . . . iv
|
||
|
|
||
|
|
||
|
|
||
|
Amendment record sheet. . . . . . . . . . . . . . . . . . . v
|
||
|
|
||
|
|
||
|
|
||
|
List of effective pages . . . . . . . . . . . . . . . . . vii
|
||
|
|
||
|
|
||
|
|
||
|
Introduction and scope. . . . . . . . . . . . . . . . . . 1-1
|
||
|
|
||
|
Introduction. . . . . . . . . . . . . . . . . . . . . . . 1-2
|
||
|
|
||
|
Scope and purpose . . . . . . . . . . . . . . . . . . . . 1-2
|
||
|
|
||
|
Relationship to the previous issue. . . . . . . . . . . . 1-3
|
||
|
|
||
|
Structure of the manual . . . . . . . . . . . . . . . . . 1-3
|
||
|
|
||
|
Feedback. . . . . . . . . . . . . . . . . . . . . . . . . 1-4
|
||
|
|
||
|
Use of the CSM by suppliers and contractors . . . . . . . 1-4
|
||
|
|
||
|
Acknowledgements. . . . . . . . . . . . . . . . . . . . . 1-4
|
||
|
|
||
|
|
||
|
|
||
|
Objectives and policy . . . . . . . . . . . . . . . . . . 2-1
|
||
|
|
||
|
Introduction. . . . . . . . . . . . . . . . . . . . . . . 2-2
|
||
|
|
||
|
Corporate policy on electronic system security. . . . . . 2-2
|
||
|
|
||
|
Objective . . . . . . . . . . . . . . . . . . . . . . . . 2-2
|
||
|
|
||
|
Relationship to other security policies . . . . . . . . . 2-2
|
||
|
|
||
|
Responsibility for security . . . . . . . . . . . . . . . 2-3
|
||
|
|
||
|
Derivation of security requirements . . . . . . . . . . . 2-4
|
||
|
|
||
|
Security policy for the life cycle. . . . . . . . . . . . 2-6
|
||
|
|
||
|
Security evaluation, certification and accreditation. . . 2-7
|
||
|
|
||
|
Security approvals. . . . . . . . . . . . . . . . . . . . 2-9
|
||
|
|
||
|
Product security. . . . . . . . . . . . . . . . . . . . .2-10
|
||
|
|
||
|
|
||
|
|
||
|
Communications and network security . . . . . . . . . . . 3-1
|
||
|
|
||
|
Introduction. . . . . . . . . . . . . . . . . . . . . . . 3-2
|
||
|
|
||
|
System interconnection . . . . . . . . . . . . . . . . . 3-4
|
||
|
|
||
|
Network management . . . . . . . . . . . . . . . . . . . 3-5
|
||
|
|
||
|
Network architecture . . . . . . . . . . . . . . . . . . 3-5
|
||
|
|
||
|
Threats to networked systems . . . . . . . . . . . . . . 3-8
|
||
|
|
||
|
Cryptographic protection . . . . . . . . . . . . . . . .3-13
|
||
|
|
||
|
Electronic Mail Systems . . . . . . . . . . . . . . . . .3-14
|
||
|
|
||
|
|
||
|
|
||
|
Electronic systems insta11ations . . . . . . . . . . . . 4-1
|
||
|
|
||
|
Introduction . . . . . . . . . . . . . . . . . . . . . . 4-2
|
||
|
|
||
|
Accommodation . . . . . . . . . . . . . . . . . . . . . . 4-2
|
||
|
|
||
|
Services . . . . . . . . . . . . . . . . . . . . . . . . 4-4
|
||
|
|
||
|
Electronic system equipment sign posting . . . . . . . . 4-5
|
||
|
|
||
|
Physical access control strategy . . . . . . . . . . . . 4-5
|
||
|
|
||
|
Personnel access . . . . . . . . . . . . . . . . . . . . 4-7
|
||
|
|
||
|
System or master consoles . . . . . . . . . . . . . . . . 4-8
|
||
|
|
||
|
Other terminals . . . . . . . . . . . . . . . . . . . . . 4-9
|
||
|
|
||
|
Communications rooms and equipment . . . . . . . . . . . 4-9
|
||
|
|
||
|
Media libraries and disaster stores . . . . . . . . . . . 4-9
|
||
|
|
||
|
|
||
|
|
||
|
5 Personal computers . . . . . . . . . . . . . . 5-1
|
||
|
|
||
|
5.1 Introduction . . . . . . . . . . . . . . . . . 5-2
|
||
|
|
||
|
5.2 Personal security responsibility . . . . . . . 5-3
|
||
|
|
||
|
5.3 PC and data access security. . . . . . . . . . 5 4
|
||
|
|
||
|
5.4 Security of software . . . . . . . . . . . . . 5-8
|
||
|
|
||
|
5.5 Personal computer communications . . . . . . . 5-8
|
||
|
|
||
|
5.6 Contingency planning . . . . . . . . . . . . . 5-10
|
||
|
|
||
|
5.7 File Servers . . . . . . . . . . . . . . . . . 5-12
|
||
|
|
||
|
|
||
|
|
||
|
6 User access to computers . . . . . . . . . . . 6-1
|
||
|
|
||
|
6.1 Introduction . . . . . . . . . . . . . . . . . 6-3
|
||
|
|
||
|
6.2 Regulating access to computers . . . . . . . . 6-3
|
||
|
|
||
|
6.3 Identification . . . . . . . . . . . . . . . . 6-4
|
||
|
|
||
|
6.4 Passwords. . . . . . . . . . . . . . . . . . . 6-6
|
||
|
|
||
|
6.5 Limitations of password security . . . . . . . 6-10
|
||
|
|
||
|
6.6 Logging on . . . . . . . . . . . . . . . . . . 6-11
|
||
|
|
||
|
6.7 Logging off. . . . . . . . . . . . . . . . . . 6-14
|
||
|
|
||
|
6.8 User privileges. . . . . . . . . . . . . . . . 6-15
|
||
|
|
||
|
6.9 Access to user files . . . . . . . . . . . . . 6-16
|
||
|
|
||
|
6.10 Customer access to BT computers. . . . . . . . 6-17
|
||
|
|
||
|
6.11 Contractors . . . . . . . . . . . . . . . . . .6-18
|
||
|
|
||
|
|
||
|
|
||
|
7 Software and data . . . . . . . . . . . . . . .7-1
|
||
|
|
||
|
7.1 Introduction. . . . . . . . . . . . . . . . . .7-2
|
||
|
|
||
|
7.2 Software installation and maintenance . . . . .7-2
|
||
|
|
||
|
7.3 Log facilities and system data. . . . . . . . .7-4
|
||
|
|
||
|
7.4 Data sensitivity. . . . . . . . . . . . . . . .7_7
|
||
|
|
||
|
7.5 Storage . . . . . . . . . . . . . . . . . . . .7-8
|
||
|
|
||
|
7.6 Disposal of media . . . . . . . . . . . . . . .7-9
|
||
|
|
||
|
7.7 Computer viruses. . . . . . . . . . . . . . . .7-11
|
||
|
|
||
|
|
||
|
|
||
|
8 Administraion . . . . . . . . . . . . . . . . .8-1
|
||
|
|
||
|
8.1 Introduction. . . . . . . . . . . . . . . . . .8-2
|
||
|
|
||
|
8.2 Personnel . . . . . . . . . . . . . . . . . . .8-2
|
||
|
|
||
|
8.3 Disaster protection . . . . . . . . . . . . . .8-7
|
||
|
|
||
|
|
||
|
|
||
|
9 Data protection act . . . . . . . . . . . . . .9-1
|
||
|
|
||
|
9.1 Introduction. . . . . . . . . . . . . . . . . .9-2
|
||
|
|
||
|
9.2 Data protection act principles. . . . . . . . .9-2
|
||
|
|
||
|
9.3 Definitions . . . . . . . . . . . . . . . . . .9-3
|
||
|
|
||
|
9.4 Registration. . . . . . . . . . . . . . . . . .9-4
|
||
|
|
||
|
|
||
|
|
||
|
10 Further information . . . . . . . . . . . . . .10-1
|
||
|
|
||
|
10.1 Introduction. . . . . . . . . . . . . . . . . .10-2
|
||
|
|
||
|
10.2 Security contacts . . . . . . . . . . . . . . .10-2
|
||
|
|
||
|
10.3 Sources of other guidance . . . . . . . . . . .10-4
|
||
|
|
||
|
10.4 Contingency Planning for Anton Piller Orders. .10-7
|
||
|
|
||
|
10.5 GLS conhcts (1993/94) . . . . . . . . . . . . .10-9
|
||
|
|
||
|
|
||
|
|
||
|
11 Approved products . . . . . . . . . . . . . . .11-1
|
||
|
|
||
|
11.1 Introduction. . . . . . . . . . . . . . . . . .11-2
|
||
|
|
||
|
11.2 List of products. . . . . . . . . . . . . . . .11-2
|
||
|
|
||
|
|
||
|
|
||
|
G Glossary. . . . . . . . . . . . . . . . . . . .G-1
|
||
|
|
||
|
|
||
|
|
||
|
Foreward by the chairman
|
||
|
|
||
|
|
||
|
|
||
|
A vital element in our drive to achieve the highest quality of service
|
||
|
|
||
|
standards is the provision of a secure work environment. This means
|
||
|
|
||
|
that our resources - people, systems, information and physical assets
|
||
|
|
||
|
must be protected against a variety of threats which range from
|
||
|
|
||
|
the malicious to the criminal. We also have security obligations that
|
||
|
|
||
|
form part of the legal and regulatory requirements we must observe.
|
||
|
|
||
|
|
||
|
|
||
|
The Information Security Code, Computer Security Manual and Physical
|
||
|
|
||
|
Security Handbook define the ways in which we can maintain a secure
|
||
|
|
||
|
environment. They clarify our responsibilities and provide the expert
|
||
|
|
||
|
guidance which we can use to achieve and maintain the levels of
|
||
|
|
||
|
security appropriate to the various activities of BT. The rules
|
||
|
|
||
|
outlined in these publications are mandatory.
|
||
|
|
||
|
|
||
|
|
||
|
IDT Vallance
|
||
|
|
||
|
|
||
|
|
||
|
Introduction and scope
|
||
|
|
||
|
|
||
|
|
||
|
Contents
|
||
|
|
||
|
|
||
|
|
||
|
1.1 Introduction . . . . . . . . . . . . . . . . . . . 1-2
|
||
|
|
||
|
1.2 Scope and purpose. . . . . . . . . . . . . . . . . 1-2
|
||
|
|
||
|
1.3 Relationship to the previous issue . . . . . . . . 1-3
|
||
|
|
||
|
1.4 Structure of the manua1. . . . . . . . . . . . . . 1-3
|
||
|
|
||
|
1.5 Feedback . . . . . . . . . . . . . . . . . . . . . 1-4
|
||
|
|
||
|
1.6 Use of the CSM by supp1iers and contractors. . . . 1-4
|
||
|
|
||
|
1.7 Acknowledgements . . . . . . . . . . . . . . . . . 1-4
|
||
|
|
||
|
|
||
|
|
||
|
1.l Introduction
|
||
|
|
||
|
|
||
|
|
||
|
British Telecom (BT) is highly reliant on electronic systems to support its
|
||
|
|
||
|
business processes. Computers are used in many critical points in the business: in
|
||
|
|
||
|
switching systems, administration systems and management systems. Many of
|
||
|
|
||
|
these systems are either interconnected, or are planned to be interconnected,
|
||
|
|
||
|
BT's infrastructure of systems will become highly integrated.
|
||
|
|
||
|
|
||
|
|
||
|
This evolutionary process makes security even more important. It is
|
||
|
|
||
|
becoming possible to access a wide variety of information from a
|
||
|
|
||
|
single terminal. Furthermore, a security flaw or failure in one system
|
||
|
|
||
|
may allow unauthorised access or misuse of other systems.
|
||
|
|
||
|
|
||
|
|
||
|
BT possesses valuable information about its customers and their
|
||
|
|
||
|
commercial operations which it is our responsibility to safeguard.
|
||
|
|
||
|
Coupled with this should be an awareness of the possibility of
|
||
|
|
||
|
computer crime by people inside and outside BT.
|
||
|
|
||
|
|
||
|
|
||
|
While security failures are, like any other quality failure, bad
|
||
|
|
||
|
business practice, the repercussions may be more serious.
|
||
|
|
||
|
|
||
|
|
||
|
There are many motivators for good electronic security. BT is obliged
|
||
|
|
||
|
under the terms of its current licence to observe a Code of Practice
|
||
|
|
||
|
on disclosure of customer information. Disclosure of information could
|
||
|
|
||
|
also provide likely movements in the price of BT shares or those of
|
||
|
|
||
|
our suppliers. It could be used to embarrass the business by
|
||
|
|
||
|
disclosure of commercial negotiations. The business could also suffer
|
||
|
|
||
|
through corruption or loss of data. There could also be personal legal
|
||
|
|
||
|
liability under the terms of the Data Protection Act in the event of
|
||
|
|
||
|
security failure. All these possibilities make the security of BT
|
||
|
|
||
|
computer operations increasingly important.
|
||
|
|
||
|
|
||
|
|
||
|
Good security does not have to be expensive. Often simple, low-cost
|
||
|
|
||
|
measures, combined with a positive attitude to security, can achieve
|
||
|
|
||
|
considerable reduction in the vulnerability of BT systems.
|
||
|
|
||
|
|
||
|
|
||
|
1.2 Scope and purpose
|
||
|
|
||
|
|
||
|
|
||
|
Although this manual is called the Computer Secunty Manual, it
|
||
|
|
||
|
encompasses all electronic systems that are broadly computer-based. It
|
||
|
|
||
|
applies equally, for example, to digital switching systems and
|
||
|
|
||
|
building access control systems, as well as to the mainframe and
|
||
|
|
||
|
personal computers for which it has customarily been used.
|
||
|
|
||
|
|
||
|
|
||
|
BT is now operating in a global environment and its activities cover
|
||
|
|
||
|
most parts of the world. Many of its non-core activities and overseas
|
||
|
|
||
|
operations are carried out through subsidiary companies. All people
|
||
|
|
||
|
working in these wholly-owned subsidiaries are also "BT people". "BT"
|
||
|
|
||
|
refers to the parent company and all its wholly owned subsidiaries.
|
||
|
|
||
|
Adoption of the CSM in partly-owned subsidiaries will be a matter
|
||
|
|
||
|
negotiated between the Director of Security and Investigation and the
|
||
|
|
||
|
senior management of each part-owned subsidiary.
|
||
|
|
||
|
|
||
|
|
||
|
The purpose of the Computer Secunty Manual is to enable BT people to
|
||
|
|
||
|
recognise possible threats to BT s systems, and to bring together the
|
||
|
|
||
|
current guidance on electronic security principles and practices which
|
||
|
|
||
|
may be used to minimise the risk.
|
||
|
|
||
|
|
||
|
|
||
|
Examples of threats include:
|
||
|
|
||
|
o natural calamities such as fire or flood
|
||
|
|
||
|
o sophisticated tampering
|
||
|
|
||
|
o software errors
|
||
|
|
||
|
o hardware failure
|
||
|
|
||
|
o vulnerability of communication links
|
||
|
|
||
|
o unauthorised use of terminals
|
||
|
|
||
|
o hacking
|
||
|
|
||
|
o deliberate damage, and
|
||
|
|
||
|
o fraud.
|
||
|
|
||
|
|
||
|
|
||
|
The Computer Security Manual is primarily intended for those who specify
|
||
|
|
||
|
security requirements in BTs systems and those who implement them, it
|
||
|
|
||
|
is also essential reading for users of those systems so that they may
|
||
|
|
||
|
understand the rationale behind the protective measures that may be
|
||
|
|
||
|
imposed upon them. While it is recognised that the threats to BT's
|
||
|
|
||
|
systems are constantly changing, the guidance given is the best
|
||
|
|
||
|
available at the time of issue. It should be recognised however, that
|
||
|
|
||
|
guidance will need to be revised when existing threats change or new
|
||
|
|
||
|
threats appear.
|
||
|
|
||
|
|
||
|
|
||
|
1.3 Relationship to the previous issue
|
||
|
|
||
|
|
||
|
|
||
|
Although some of the policies on electronic systems security affecting
|
||
|
|
||
|
computers have changed since the last issue, the previous structure
|
||
|
|
||
|
has been retained where possible, so as to cause minimum inconvenience
|
||
|
|
||
|
to users of the manual.
|
||
|
|
||
|
|
||
|
|
||
|
1.4 Structure of the manual
|
||
|
|
||
|
|
||
|
|
||
|
This version of the Computer Security Manual contains mandatory
|
||
|
|
||
|
requirements, called CSM Policies, which should be followed in the
|
||
|
|
||
|
design, implementation and operation of systems.
|
||
|
|
||
|
|
||
|
|
||
|
The CSM Policies describe various mechanisms that can be employed to
|
||
|
|
||
|
protect the security of an electronic system, and are derived from
|
||
|
|
||
|
threats (that have been found) and countermeasures that can be used.
|
||
|
|
||
|
|
||
|
|
||
|
The main text provides guidance and background to the CSM Policy statements.
|
||
|
|
||
|
|
||
|
|
||
|
The chapters have been ordered to reflect the larger view of systems
|
||
|
|
||
|
(networked systems and the supporting network infrastructure), and
|
||
|
|
||
|
then narrowing that view to large computer systems, personal
|
||
|
|
||
|
computers, and so on.
|
||
|
|
||
|
|
||
|
|
||
|
The page number found at the bottom of each page is in the format
|
||
|
|
||
|
chapter-page in chapter and facilitates the easy replacement of entire
|
||
|
|
||
|
chapters without upsetting the numbering of pages in subsequent chapters.
|
||
|
|
||
|
|
||
|
|
||
|
1.5 Feedback
|
||
|
|
||
|
|
||
|
|
||
|
The policy and guidance contained in e Computer Security Manual is
|
||
|
|
||
|
prepared and issued after extensive discussion with experts in
|
||
|
|
||
|
electronic security throughout the business. The Electronic Security
|
||
|
|
||
|
Unit welcomes feedback from users on the adequacy of the guidance
|
||
|
|
||
|
given, so that future issues may be improved.
|
||
|
|
||
|
|
||
|
|
||
|
1.6 Use of the CSM by suppliers and contractors
|
||
|
|
||
|
|
||
|
|
||
|
The CSM is the baseline document for the protection of BT's electronic
|
||
|
|
||
|
assets on BT premises, in transit, at employees' homes or on
|
||
|
|
||
|
contractors' premises. Where a supplier or contractor has obligations
|
||
|
|
||
|
to protect BT assets, a copy of the CSM may be loaned to supply the
|
||
|
|
||
|
necessary guidance provided:
|
||
|
|
||
|
Agreement is obtained from DSecI
|
||
|
|
||
|
|
||
|
|
||
|
2 A non-disclosure agreement is in place with the supplier or
|
||
|
|
||
|
contractor based on the "Acceptance Agreement from BT"' contained
|
||
|
|
||
|
within the Information Security Code
|
||
|
|
||
|
|
||
|
|
||
|
3 Sections 10 and 11 are removed from the manual before it is lent to
|
||
|
|
||
|
anyone outside BT.
|
||
|
|
||
|
|
||
|
|
||
|
4 The manual is returned to BT upon completion or termination of the
|
||
|
|
||
|
contract.
|
||
|
|
||
|
|
||
|
|
||
|
Updates to the CSM will be sent to the manager who originally arranged
|
||
|
|
||
|
the loan, who must ensure that the update arrangements meet criteria 3
|
||
|
|
||
|
and 4 above. The CSM must be returned on completion of termination of
|
||
|
|
||
|
the contract.
|
||
|
|
||
|
|
||
|
|
||
|
1.7 Acknowledgements
|
||
|
|
||
|
|
||
|
|
||
|
We would like to thank the help received by all parts of the BT Group
|
||
|
|
||
|
in the production of this version of the Manual. In particular, Group
|
||
|
|
||
|
Security, Group Information Services, British Telecom International,
|
||
|
|
||
|
British Telecom Security Consultancy, Business Communications,
|
||
|
|
||
|
Development and Procurement, Internal Audit, and to others for their
|
||
|
|
||
|
feedback to this, and previous issues of the Manual.
|
||
|
|
||
|
|
||
|
|
||
|
Objectives and policy
|
||
|
|
||
|
|
||
|
|
||
|
Contents
|
||
|
|
||
|
|
||
|
|
||
|
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . 2-2
|
||
|
|
||
|
|
||
|
|
||
|
2.2 Corporate policy on electronic system security . . . . . 2-2
|
||
|
|
||
|
|
||
|
|
||
|
2.3 Objective. . . . . . . . . . . . . . . . . . . . . . . . 2-2
|
||
|
|
||
|
|
||
|
|
||
|
2.4 Relationship to other security policies. . . . . . . . . 2-2
|
||
|
|
||
|
2.4.1 Application . . . . . . . . . . . . . . . . . . . . . . 2-3
|
||
|
|
||
|
|
||
|
|
||
|
2.5 Responsibility for security . . . . . . . . . . . . . . . 2-3
|
||
|
|
||
|
2.5.1 Business operation or process owner. . . . . . . . . . . 2-3
|
||
|
|
||
|
2.5.2 System supplier. . . . . . . . . . . . . . . . . . . . . 2-4
|
||
|
|
||
|
|
||
|
|
||
|
2.6 Derivation of security requirements. . . . . . . . . . . 2-4
|
||
|
|
||
|
2.6.1 Value and impact analysis. . . . . . . . . . . . . . . . 2-4
|
||
|
|
||
|
2.6.2 Data sensitivity . . . . . . . . . . . . . . . . . . . . 2-4
|
||
|
|
||
|
2.6.3 Countermeasures . . . . . . . . . . . . . . . . . . . . .2-5
|
||
|
|
||
|
2.6.4 Risk analysis. . . . . . . . . . . . . . . . . . . . . . 2-6
|
||
|
|
||
|
|
||
|
|
||
|
2.7 Security policy for the life cycle . . . . . . . . . . . . 2-6
|
||
|
|
||
|
|
||
|
|
||
|
2.8 Security evaluation, certification and accreditation . . . 2-7
|
||
|
|
||
|
2.8.1 Scope of accreditation . . . . . . . . . . . . . . . . . 2-7
|
||
|
|
||
|
2.8.2 Four-stage approach to security accreditation. . . . . . 2-7
|
||
|
|
||
|
|
||
|
|
||
|
2.9 Security approva1s . . . . . . . . . . . . . . . . . . . 2-9
|
||
|
|
||
|
|
||
|
|
||
|
2.10 Product security . . . . . . . . . . . . . . . . . . . . 2-9
|
||
|
|
||
|
|
||
|
|
||
|
2.1 Introduction
|
||
|
|
||
|
|
||
|
|
||
|
This chapter describes the objectives of the Computer Security Manual,
|
||
|
|
||
|
and places electronic security in the context of the security
|
||
|
|
||
|
infrastructure for BT s business operations and processes.
|
||
|
|
||
|
|
||
|
|
||
|
2.2 Corporate policy on electronic system security
|
||
|
|
||
|
|
||
|
|
||
|
The electronic systems security policy for the BT Group as affirmed by
|
||
|
|
||
|
Malcolm Argent, Group Director & Secretary, on 8th August 1990 is
|
||
|
|
||
|
reproduced below.
|
||
|
|
||
|
|
||
|
|
||
|
"The British Telecom Group attaches particular importance to the
|
||
|
|
||
|
security of its business processes and systems. The Group's policy on
|
||
|
|
||
|
electronic security is to ensure that we properly safeguard all our
|
||
|
|
||
|
switching systems, information systems and other electronic assets,
|
||
|
|
||
|
having regard to legal and regulatory requirements, our commercial
|
||
|
|
||
|
interests and sound business practices.
|
||
|
|
||
|
|
||
|
|
||
|
This policy covers all aspects of the electronic environment: systems;
|
||
|
|
||
|
administration procedures; environmental controls; hardware; software;
|
||
|
|
||
|
data and networks. It applies to all stages in the system life cycle,
|
||
|
|
||
|
from feasibility study through to in service and operations. It
|
||
|
|
||
|
applies no matter whether the system is developed or bought by BT. It
|
||
|
|
||
|
is the responsibility of managers at all levels to observe this policy
|
||
|
|
||
|
themselves and to ensure that it is fully understood and followed by
|
||
|
|
||
|
their people.
|
||
|
|
||
|
|
||
|
|
||
|
To help managers carry out their responsibilities, the Director of
|
||
|
|
||
|
Security and Investigation will issue appropriate guidelines, on a
|
||
|
|
||
|
continuing basis, supplementing the requirements of the Computer
|
||
|
|
||
|
Security Manual, The Information Security Code and the Physical
|
||
|
|
||
|
Security Handbook to take account of changing threats to BT's
|
||
|
|
||
|
electronic systems. He will also be the central point of information
|
||
|
|
||
|
for the Company's policy on electronic security and will monitor
|
||
|
|
||
|
compliance with it. "
|
||
|
|
||
|
|
||
|
|
||
|
2.3 Objective
|
||
|
|
||
|
|
||
|
|
||
|
The Computer Security Manual draws together the policies applying to
|
||
|
|
||
|
computer systems in particular, and electronic systems in general,
|
||
|
|
||
|
supplementing it with guidance and advice on implementation. Within
|
||
|
|
||
|
the BT Group there are many different computer systems supporting a
|
||
|
|
||
|
multitude of business processes. Therefore it is not possible to
|
||
|
|
||
|
produce specific recommendations for the security of every aspect of
|
||
|
|
||
|
every system. The objective of the Manual is to concentrate on the
|
||
|
|
||
|
baseline policy and guidelines generally applicable to BT systems.
|
||
|
|
||
|
|
||
|
|
||
|
2.4 Relationship to other security policies
|
||
|
|
||
|
|
||
|
|
||
|
The Computer Security Manual is an elaboration and extension of the
|
||
|
|
||
|
information security strategy contained in the Information Security
|
||
|
|
||
|
Code.
|
||
|
|
||
|
|
||
|
|
||
|
2.4.1 Application
|
||
|
|
||
|
|
||
|
|
||
|
Except where inapplicable, the Policies enumerated in the Computer
|
||
|
|
||
|
Security Manual are MANDATORY. For example: Passwords are not a
|
||
|
|
||
|
mandatory feature of all BT systems, but where an analysis suggests
|
||
|
|
||
|
that passwords are a sufficiently strong measure to regulate access to
|
||
|
|
||
|
those systems, the relevant policies on passwords contained in this
|
||
|
|
||
|
Manual become mandatory. Policies usually appear after any descriptive
|
||
|
|
||
|
text and are numbered to assist the checking of compliance in systems.
|
||
|
|
||
|
|
||
|
|
||
|
While Policies are mandatory, all supporting guidance and advice on
|
||
|
|
||
|
implementing the policies is discretionary, although strongly
|
||
|
|
||
|
recommended to achieve a harmonious and consistent approach to
|
||
|
|
||
|
electronic security throughout the BT Group. Policies appear within
|
||
|
|
||
|
boxes.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 2.1: ASSIMILATION OF REVISED MANDATORY POLICY
|
||
|
|
||
|
|
||
|
|
||
|
From the date of publication, this issue of the Computer Security
|
||
|
|
||
|
Manual applies to all new systems supporting BT's business operations
|
||
|
|
||
|
and processes. It also applies to any changes to existing systems, in
|
||
|
|
||
|
particular where an opportunity to update security occurs, so as to
|
||
|
|
||
|
achieve greater compliance with the policies given in this manual.
|
||
|
|
||
|
|
||
|
|
||
|
2.5 Responsibility for security
|
||
|
|
||
|
|
||
|
|
||
|
Every BT employee, and those contracted to work for BT have the
|
||
|
|
||
|
responsibility to ensure the security of BT assets. Where the asset is
|
||
|
|
||
|
information, the degree of protection needed is defined by the owner
|
||
|
|
||
|
of the information. Additional measures may be required beyond those
|
||
|
|
||
|
necessary to protect BT's information assets because of legal
|
||
|
|
||
|
requirements.
|
||
|
|
||
|
|
||
|
|
||
|
2.5.1 Business operation or process owner
|
||
|
|
||
|
|
||
|
|
||
|
It is the responsibility of the owner of each business operation or
|
||
|
|
||
|
process to recognise the value of their activity, and the potential
|
||
|
|
||
|
impact on the business from security failure. In the context of the
|
||
|
|
||
|
Computer Security Manual, ownership of a process is defined as the
|
||
|
|
||
|
manager responsible or accountable for the process. The
|
||
|
|
||
|
responsibility of the business operation or process owner also extends
|
||
|
|
||
|
to ensuring that, in general terms, security of the systems supporting
|
||
|
|
||
|
the process is adequate in relationship to the impact of security
|
||
|
|
||
|
failure. A service level agreement should exist between the business
|
||
|
|
||
|
process and the system owners.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY2.2: RESPONSIBILITY ASSIGNED TO PROCESS OWNERS
|
||
|
|
||
|
|
||
|
|
||
|
The owner of each business process shall ensure that security is
|
||
|
|
||
|
adequate in the systems that support the process.
|
||
|
|
||
|
|
||
|
|
||
|
2.5.2 System supplier
|
||
|
|
||
|
|
||
|
|
||
|
The process owner will be responsible for evaluating the impact of
|
||
|
|
||
|
security failure and deciding on the general requirements for
|
||
|
|
||
|
security. The detailed implementation of security controls and
|
||
|
|
||
|
countermeasures to meet the owner's requirements will be the
|
||
|
|
||
|
responsibility of the system supplier whose computer systems support
|
||
|
|
||
|
the process. The process owner and the computer supplier will usually
|
||
|
|
||
|
be linked through a customer/supplier relationship. The quality of
|
||
|
|
||
|
computer security, including the adherence to the policies described
|
||
|
|
||
|
in this Manual should be the subject of a Service Level Agreement.
|
||
|
|
||
|
2.6 Derivation of security requirements
|
||
|
|
||
|
|
||
|
|
||
|
2.6.1 Value and impact analysis
|
||
|
|
||
|
|
||
|
|
||
|
The security measures needed to safeguard each business process wil be
|
||
|
|
||
|
determined from the sensitivity of the material handled and the impact
|
||
|
|
||
|
of security failure, defined in terms of confidentiality, integrity
|
||
|
|
||
|
and availability. The owner of each business operation or process will
|
||
|
|
||
|
ensure that the value of the information processed and the impact of
|
||
|
|
||
|
security failure are known since they are the core parameters in the
|
||
|
|
||
|
rationale of cost-effective security. Sometimes the value of the
|
||
|
|
||
|
information may be obvious and easily quantified as a monetary
|
||
|
|
||
|
expression. On other occasions, the value of the information or
|
||
|
|
||
|
processing capability is less apparent, protection being necessary to
|
||
|
|
||
|
safeguard only the reputation or credibility of the Business. Impact
|
||
|
|
||
|
of failure includes the concepts of asset value, importance, damage to
|
||
|
|
||
|
the business because of information disclosure, loss of accuracy or
|
||
|
|
||
|
currency of the information, and loss of the use of business-critical
|
||
|
|
||
|
resources.
|
||
|
|
||
|
|
||
|
|
||
|
2.6.2 Data sensitivity
|
||
|
|
||
|
|
||
|
|
||
|
The Informaion Security Code describes the privacy marking to be used
|
||
|
|
||
|
to identify information which requires a level of protection beyond
|
||
|
|
||
|
that provided by a clear desk policy. Currently this protection is
|
||
|
|
||
|
defined only in terms of the confidentiality requirements of security.
|
||
|
|
||
|
There is no comparable marking for integrity or availability.
|
||
|
|
||
|
|
||
|
|
||
|
Information stored using electronic media is more vulnerable wen
|
||
|
|
||
|
stored than information on paper . It can be easily modified without
|
||
|
|
||
|
trace, and its content is not immediately obvious. It is readily
|
||
|
|
||
|
deleted, and in large systems can be easily lost. Therefore the
|
||
|
|
||
|
sensitivity of electronic data should be specified in terms of the
|
||
|
|
||
|
impact of loss arising from failure of confidentiality, integrity or
|
||
|
|
||
|
availability.
|
||
|
|
||
|
|
||
|
|
||
|
To preserve compatibility with the paper-based system, data
|
||
|
|
||
|
sensitivities for electronic information use the same criteria for
|
||
|
|
||
|
assessing the impact of security failure, thus allowing common threat
|
||
|
|
||
|
models to be used.
|
||
|
|
||
|
|
||
|
|
||
|
2.6.2.1 Sensitivity level 1
|
||
|
|
||
|
|
||
|
|
||
|
Information for which the impact of inaccuracy, alteration, disclosure
|
||
|
|
||
|
or unavailability would be to cause inconvenience or reduction in
|
||
|
|
||
|
operational efficiency.
|
||
|
|
||
|
|
||
|
|
||
|
2.6.2.2 Sensitivity level 2
|
||
|
|
||
|
|
||
|
|
||
|
Information for which the impact of inaccuracy, alteration, disclosure
|
||
|
|
||
|
or unavailability would be to cause any of the following:
|
||
|
|
||
|
|
||
|
|
||
|
o Significant financial loss to BT;
|
||
|
|
||
|
|
||
|
|
||
|
o Significant gain to a competitor;
|
||
|
|
||
|
|
||
|
|
||
|
o Marked embarrassment to BT;
|
||
|
|
||
|
|
||
|
|
||
|
o Marked loss of confidence to BT and its commercial dealing;
|
||
|
|
||
|
|
||
|
|
||
|
o Marked reduction of BT's standing in the community or to relationships generally.
|
||
|
|
||
|
|
||
|
|
||
|
Information marked IN CONFIDENCE has sensitivity level 2.
|
||
|
|
||
|
|
||
|
|
||
|
2.6.2.3 Sensitivity 1evel 3
|
||
|
|
||
|
|
||
|
|
||
|
Information for which the impact of inaccuracy, alteration, disclosure
|
||
|
|
||
|
or unavailability would be to cause any of the following:
|
||
|
|
||
|
|
||
|
|
||
|
o Substantial financial loss to BT;
|
||
|
|
||
|
|
||
|
|
||
|
o Substantial gain to a competitor;
|
||
|
|
||
|
|
||
|
|
||
|
o Severe embarrassment to BT;
|
||
|
|
||
|
|
||
|
|
||
|
o Serious loss of confidence in BT;
|
||
|
|
||
|
|
||
|
|
||
|
o Serious reduction of BT's standing in the community or to
|
||
|
|
||
|
relationships generally.
|
||
|
|
||
|
|
||
|
|
||
|
Information marked IN STRICTEST CONFIDENCE has sensitivity level 3 and
|
||
|
|
||
|
are called in this manual High Impact Systems.
|
||
|
|
||
|
|
||
|
|
||
|
2.6.2.4 Sensitivity levels above 3
|
||
|
|
||
|
|
||
|
|
||
|
Impact scenarios exist for failures of security for data beyond
|
||
|
|
||
|
sensitivity level 3. Specialist advice is available from the Director
|
||
|
|
||
|
of Security and Investigation on electronic systems which process:
|
||
|
|
||
|
corporate plans; business propositions (new enterprises, flotations,
|
||
|
|
||
|
joint ventures, take-overs); personnel and industrial relations
|
||
|
|
||
|
matters; marketing strategies and plans; financial and tariff
|
||
|
|
||
|
proposals, and high-level contractual matters, or other information
|
||
|
|
||
|
which is price-sensitive within the terms of the Stock Exchange
|
||
|
|
||
|
Listing Agreement.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY2.3: VALUE OF ASSETS AND IMPACT OF FAILURE
|
||
|
|
||
|
|
||
|
|
||
|
The value of the information, assets or processing capability to be
|
||
|
|
||
|
protected shall be estimated and recorded, as shall the impact of
|
||
|
|
||
|
possible disclosure, inaccuracy, incompleteness or unavailability of
|
||
|
|
||
|
that information.
|
||
|
|
||
|
|
||
|
|
||
|
2.6.3 Countermeasures
|
||
|
|
||
|
|
||
|
|
||
|
A fundamental objective is to ensure that the countermeasures deployed
|
||
|
|
||
|
to protect sensitive information or processes should be practical and
|
||
|
|
||
|
appropriate to the threats against the electronic systems, giving due
|
||
|
|
||
|
regard to the impact of security failure.
|
||
|
|
||
|
|
||
|
|
||
|
While insufficient, inappropriate, or poorly implemented
|
||
|
|
||
|
countermeasures may leave a system unduly vulnerable, excessive
|
||
|
|
||
|
countermeasures may lead to complacency, the neglect of security
|
||
|
|
||
|
operating procedures, and an unjustifiably high overhead of processing
|
||
|
|
||
|
power, or severe operational difficulties.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 2.4: COUNTERMEASURES
|
||
|
|
||
|
|
||
|
|
||
|
The cost of countermeasures should be appropriate to the threats to
|
||
|
|
||
|
security and business processes, the value of the information being
|
||
|
|
||
|
protected and the impact of any security failure.
|
||
|
|
||
|
|
||
|
|
||
|
2.6.4 Risk analysis
|
||
|
|
||
|
|
||
|
|
||
|
It is the responsibility of the owner of each business operation or
|
||
|
|
||
|
process to assess and manage effectively the degree of risk to
|
||
|
|
||
|
commercially sensitive information, and the resilience of critical
|
||
|
|
||
|
business processes supported by computer-based systems. The risk
|
||
|
|
||
|
analysis will take cognisance of the value of the information or
|
||
|
|
||
|
critical processes being protected, and the perceived threats to the
|
||
|
|
||
|
system. Furthermore, the risk analysis should not be a once-only
|
||
|
|
||
|
exercise. It should be repeated regularly and revalidated whenever
|
||
|
|
||
|
significant changes occur to the security assumptions.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY2.5: RISK ANALYSIS
|
||
|
|
||
|
|
||
|
|
||
|
At all principal stages during the life cycle of each project
|
||
|
|
||
|
involving the storage or processing of commercially sensitive
|
||
|
|
||
|
information, or the provision of High Impact Systems, a risk analysis
|
||
|
|
||
|
shall be undertaken. The analysis, which must be repeated periodically
|
||
|
|
||
|
or revalidated to assess the impact of change, must be so as to
|
||
|
|
||
|
determine the vulnerability of the commercially sensitive information
|
||
|
|
||
|
or applications in its processing environment, given the prevailing
|
||
|
|
||
|
threats to security, the countermeasures deployed, and the value of
|
||
|
|
||
|
the information being processed.
|
||
|
|
||
|
|
||
|
|
||
|
2.7 Security policy for the life cycle
|
||
|
|
||
|
|
||
|
|
||
|
The preparation of a Security Policy Document (Security Statement)
|
||
|
|
||
|
should be viewed as an integral part of the life-cycle of business
|
||
|
|
||
|
processes. At the beginning of each project a security policy will be
|
||
|
|
||
|
prepared to guide the implementation of security in the systems that
|
||
|
|
||
|
will support the business operation. This vital step is necessary to
|
||
|
|
||
|
ensure that correct business planning decisions are taken. Where
|
||
|
|
||
|
security is a relevant feature of a process, its provision will be
|
||
|
|
||
|
costed and included in business cases going forward for financial
|
||
|
|
||
|
approval.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 2.6: SECURITY POLICY DOCUMENT
|
||
|
|
||
|
|
||
|
|
||
|
A Security Policy Document will be prepared by the owner of a business
|
||
|
|
||
|
process, outlining the system, the impact or loss associated with
|
||
|
|
||
|
possible security failure, the threats to the system, the proposed
|
||
|
|
||
|
countermeasures, and a risk analysis. The Security Policy Document
|
||
|
|
||
|
will guide development and implementation of security features during
|
||
|
|
||
|
the development life- cycle of the system that supports the business
|
||
|
|
||
|
process, of which electronic security is an integral part. A Security
|
||
|
|
||
|
Policy Document is also required for existing systems where the impact
|
||
|
|
||
|
of security failure is high.
|
||
|
|
||
|
|
||
|
|
||
|
Details of all BT multi-user, administration and management systems
|
||
|
|
||
|
must be registered by the Development Manager on the Applications
|
||
|
|
||
|
Inventory. This is the catalogue of the company's software assets, and
|
||
|
|
||
|
is used to inform People of what systems exist and assist management
|
||
|
|
||
|
of the portfolio. The requirement to register covers systems that are
|
||
|
|
||
|
either developed or procured by BT. Details may be found in section 10.
|
||
|
|
||
|
|
||
|
|
||
|
2.8 Security evaluation, certification and accreditation
|
||
|
|
||
|
|
||
|
|
||
|
The accreditation life cycle is a process for checking that
|
||
|
|
||
|
appropriate security is built into the specification, development and
|
||
|
|
||
|
operational procedures for systems, thereby ensuring that the security
|
||
|
|
||
|
requirements of the business are met prior to the system becoming
|
||
|
|
||
|
operational.
|
||
|
|
||
|
|
||
|
|
||
|
Security accreditation for electronic systems has three main objectives:
|
||
|
|
||
|
|
||
|
|
||
|
- to ensure that the level of security in BT's High Impact Systems is
|
||
|
|
||
|
adequate;
|
||
|
|
||
|
- to prevent systems without adequate security being deployed until
|
||
|
|
||
|
remedial action has been undertaken; and
|
||
|
|
||
|
- to provide a framework for the continued improvement of the quality
|
||
|
|
||
|
of security in BT's systems.
|
||
|
|
||
|
|
||
|
|
||
|
2.8.1 Scope of accreditation
|
||
|
|
||
|
|
||
|
|
||
|
System security accreditation is a process which is undertaken to
|
||
|
|
||
|
ensure that security mechanisms, procedures and functions have been
|
||
|
|
||
|
implemented in a way that guarantees a level of confidence in the
|
||
|
|
||
|
quality of the system security. The BT scheme, which is broadly based
|
||
|
|
||
|
upon the 'Information Technology Security Evaluation Criteria'
|
||
|
|
||
|
(lTSEC), is facilitated through agents operating on behalf of the
|
||
|
|
||
|
Director of Security and Investigation.
|
||
|
|
||
|
|
||
|
|
||
|
2.8.2 Four-stage approach to security accreditation
|
||
|
|
||
|
|
||
|
|
||
|
The object of Security Accreditation is to reduce the risk of security
|
||
|
|
||
|
failure without unduly delaying the implementation of important
|
||
|
|
||
|
systems. To assist in meeting this objective a four-stage
|
||
|
|
||
|
accreditation process has been developed.
|
||
|
|
||
|
|
||
|
|
||
|
2.8.2.1 Stage 1 - Security Policy Document (Creation and Approval)
|
||
|
|
||
|
|
||
|
|
||
|
The Security Policy Document (SPD) outlines the system, the impact or
|
||
|
|
||
|
loss associated with possible security failure, the threats to the
|
||
|
|
||
|
system and the generic countermeasures. The SPD will also contain a
|
||
|
|
||
|
risk analysis and an assurance rating to be used during subsequent
|
||
|
|
||
|
evaluation and certification. Only high impact systems progress into
|
||
|
|
||
|
the evaluation, certification and accreditation stages. Note, however,
|
||
|
|
||
|
that all new systems must have a System Security Statement, regardless
|
||
|
|
||
|
of the need to progress into stage 2. The SPD is created by the owner
|
||
|
|
||
|
of the business process and approved by DSecI.
|
||
|
|
||
|
|
||
|
|
||
|
2.8.2.2 Stage 2 - Evaluation
|
||
|
|
||
|
|
||
|
|
||
|
Those systems which are to be included in the accreditation process,
|
||
|
|
||
|
as indicated within the SPD and agreed by Director of Security and
|
||
|
|
||
|
Investigation (DSecl), will be evaluated to ascertain that the
|
||
|
|
||
|
required level of assurance has been achieved. The SPD is the baseline
|
||
|
|
||
|
document against which the system is evaluated.
|
||
|
|
||
|
|
||
|
|
||
|
DSecI will nominate an evaluator to gain and subsequently analyse
|
||
|
|
||
|
information on the following:
|
||
|
|
||
|
|
||
|
|
||
|
Requirements - a detailed description of the system requirements
|
||
|
|
||
|
relating to its security.
|
||
|
|
||
|
|
||
|
|
||
|
Architectural design - an examination of the system architecture.
|
||
|
|
||
|
|
||
|
|
||
|
Detailed design - a more detailed description on how specific security
|
||
|
|
||
|
components have been designed.
|
||
|
|
||
|
|
||
|
|
||
|
Implementation- evidence of functional and mechanism testing.
|
||
|
|
||
|
Examination of source code and hardware drawings.
|
||
|
|
||
|
|
||
|
|
||
|
Configuration control- evidence of an effective change control
|
||
|
|
||
|
procedure which is able to provide unique identification of the system
|
||
|
|
||
|
and details of an acceptance procedure.
|
||
|
|
||
|
|
||
|
|
||
|
Program languages and compilers - details about the language(s) used.
|
||
|
|
||
|
|
||
|
|
||
|
Developers' security- security procedures including physical and
|
||
|
|
||
|
personnel arrangements.
|
||
|
|
||
|
|
||
|
|
||
|
Operational documentation - examination of the user and administration
|
||
|
|
||
|
documentation provided.
|
||
|
|
||
|
|
||
|
|
||
|
Operational environment-
|
||
|
|
||
|
|
||
|
|
||
|
- delivery and configuration - configuration information, delivery and
|
||
|
|
||
|
audited system generation procedures and evidence of an approved
|
||
|
|
||
|
distribution procedure;
|
||
|
|
||
|
- startup and operation - secure startup and operation procedures,
|
||
|
|
||
|
including a description of security functions that have a relevance
|
||
|
|
||
|
during system startup. Evidence that effective hardware diagnostic
|
||
|
|
||
|
test procedures exist.
|
||
|
|
||
|
|
||
|
|
||
|
2.8.2.3 Stage 3 - Certification
|
||
|
|
||
|
|
||
|
|
||
|
Certification occurs after the system has been developed. In order for
|
||
|
|
||
|
certification to be given, the evidence as described within the
|
||
|
|
||
|
evaluation report(s) must show that security has been correctly
|
||
|
|
||
|
applied during the development phase.
|
||
|
|
||
|
|
||
|
|
||
|
2.8.2.4 Stage 4 - Accreditation
|
||
|
|
||
|
|
||
|
|
||
|
Final accreditation occurs after the system has been running for a
|
||
|
|
||
|
limited period of time as agreed between DSecI and the Process Owner.
|
||
|
|
||
|
The purpose of the trial is to allow the secure operating procedures
|
||
|
|
||
|
to be assessed in a live environment. The system is then inspected in
|
||
|
|
||
|
its operational environment to ascertain whether compliance has been
|
||
|
|
||
|
achieved. When a security audit indicates that this aspect of security
|
||
|
|
||
|
is satisfactory, final security accreditation can be given, after
|
||
|
|
||
|
which the system enters the normal periodic security audit cycle.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 2.7: SECURITY ACCREDlTATION
|
||
|
|
||
|
|
||
|
|
||
|
It is the responsibility of the owner of each business process, for
|
||
|
|
||
|
which the impact of failure is high, before making operational use of
|
||
|
|
||
|
the system to furnish the Director of Security and Investigation with
|
||
|
|
||
|
evidence that the security requirements described in its Security
|
||
|
|
||
|
Policy Document have been observed during the development life cycle.
|
||
|
|
||
|
|
||
|
|
||
|
2.9 Security approvals
|
||
|
|
||
|
|
||
|
|
||
|
Many of the policies within the Computer Security Manual require that
|
||
|
|
||
|
only products approved by the Director of Security and Investigation
|
||
|
|
||
|
may be used to protect BT commercially sensitive information and processes.
|
||
|
|
||
|
|
||
|
|
||
|
SecID maintains a list of approved products. If you require a product
|
||
|
|
||
|
to be submitted through the approvals procedure it is necessary to do
|
||
|
|
||
|
this via SecID. See the contact data in Section 10.
|
||
|
|
||
|
|
||
|
|
||
|
2.10 Product security
|
||
|
|
||
|
|
||
|
|
||
|
Developers and procurers of products for internal BT use should be
|
||
|
|
||
|
aware of the target market for the products. An assessment must be
|
||
|
|
||
|
made of the likely sensitivity of material handled by the product.
|
||
|
|
||
|
Although security demands personal responsibility from the people
|
||
|
|
||
|
carrying out a particular business process, managers should not avoid
|
||
|
|
||
|
the responsibility of providing users with a secure product
|
||
|
|
||
|
environment. It is much better to design security into products rather
|
||
|
|
||
|
than to add it on as an afterthought. Substantial economies of scale
|
||
|
|
||
|
can be achieved by building security into products.
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 2.8: PRODUCTS FOR INTERNAL USE
|
||
|
|
||
|
|
||
|
|
||
|
Managers shall ensure that the security of products intended for
|
||
|
|
||
|
internal BT use meet users' needs. A clear statement shall be included
|
||
|
|
||
|
with all literature giving the sensitivity level for which the product
|
||
|
|
||
|
is suitable, and the circumstances under which it will retain its
|
||
|
|
||
|
suitability.
|
||
|
|
||
|
|
||
|
|
||
|
Communications and network security
|
||
|
|
||
|
|
||
|
|
||
|
Contents
|
||
|
|
||
|
|
||
|
|
||
|
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . 3-2
|
||
|
|
||
|
3.1.1 General policies . . . . . . . . . . . . . . . . . . . 3-2
|
||
|
|
||
|
|
||
|
|
||
|
3.2 System interconnection . . . . . . . . . . . . . . . . 3-4
|
||
|
|
||
|
|
||
|
|
||
|
3.3 Network management . . . . . . . . . . . . . . . . . . 3-5
|
||
|
|
||
|
|
||
|
|
||
|
3.4 Network architecture . . . . . . . . . . . . . . . . . 3-5
|
||
|
|
||
|
3.4.1 Private circuits . . . . . . . . . . . . . . . . . . . 3-5
|
||
|
|
||
|
3.4.2 Public Switched Telephone Network (PSTN) . . . . . . . 3-6
|
||
|
|
||
|
3.4.3 Public data networks . . . . . . . . . . . . . . . . . 3-6
|
||
|
|
||
|
3.4.4 Local area networks. . . . . . . . . . . . . . . . . . 3-7
|
||
|
|
||
|
|
||
|
|
||
|
3.5 Threats to networked systems . . . . . . . . . . . . . 3-8
|
||
|
|
||
|
3.5.1 Information disclosure . . . . . . . . . . . . . . . . 3-8
|
||
|
|
||
|
3.5.2 Unauthorised access. . . . . . . . . . . . . . . . . . 3-10
|
||
|
|
||
|
3.5.3 Modification, insertion and deletion . . . . . . . . . 3-12
|
||
|
|
||
|
3.5.4 Denial or failure of service . . . . . . . . . . . . . 3-12
|
||
|
|
||
|
|
||
|
|
||
|
3.6 Cryptographic protection . . . . . . . . . . . . . . . 3-13
|
||
|
|
||
|
|
||
|
|
||
|
3.7 E1ectronic Mail Systems. . . . . . . . . . . . . . . . 3-14
|
||
|
|
||
|
|
||
|
|
||
|
3.1 Introduction
|
||
|
|
||
|
|
||
|
|
||
|
Transmitting information between computers and other electronic based
|
||
|
|
||
|
systems can represent a substantial threat to security. Therefore
|
||
|
|
||
|
safeguards appropriate to the sensitivity of the information and the
|
||
|
|
||
|
transmission medium should be adopted during its transmission.
|
||
|
|
||
|
|
||
|
|
||
|
Most of the measures described in this section are concerned only with
|
||
|
|
||
|
the protection of communication links against attack by unauthorised
|
||
|
|
||
|
persons. Few of the techniques safeguard against illicit activities by
|
||
|
|
||
|
authorised users who misuse their privilege. This section gives
|
||
|
|
||
|
guidance on the acceptability of various communications methods and
|
||
|
|
||
|
services for the transfer of commercially sensitive information. The
|
||
|
|
||
|
methods recommended do not necessarily give complete
|
||
|
|
||
|
protection absolute security is never feasible. This section addresses
|
||
|
|
||
|
the issues of computer systems connected by networks, either to other
|
||
|
|
||
|
computers for exchange of information or to enable remote access where
|
||
|
|
||
|
the users of computer-based applications are remote from the service
|
||
|
|
||
|
or information provider.
|
||
|
|
||
|
|
||
|
|
||
|
The advice and guidance offered herein is applicable to networks of
|
||
|
|
||
|
mainframes, personal computers and terminals or any combination of
|
||
|
|
||
|
them.
|
||
|
|
||
|
|
||
|
|
||
|
3.1.1 General policies
|
||
|
|
||
|
|
||
|
|
||
|
The following general policies apply to every case of electronic
|
||
|
|
||
|
transfer of privacy marked information.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 3.1: INFORMATION CORRECTLY LABELLED
|
||
|
|
||
|
|
||
|
|
||
|
The originator shall ensure that information to be communicated is
|
||
|
|
||
|
correctly marked in accordance with the Information Security Code.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 3.2: INFORMATION APPROPRIATELY PROTECTED
|
||
|
|
||
|
|
||
|
|
||
|
It is the responsibility of the author and originator of privacy
|
||
|
|
||
|
marked or commercially sensitive information communicated via
|
||
|
|
||
|
electronic means to ensure that it is always correctly safeguarded.
|
||
|
|
||
|
|
||
|
|
||
|
\POLICY 3.3: INFORMATION CORRECTLY ADDRESSED
|
||
|
|
||
|
|
||
|
|
||
|
The originator shall ensure that IN STRICTEST CONFIDENCE information
|
||
|
|
||
|
is sent only to a specific authorised recipient.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 3.4: TRANSMISSION OF HIGH IMPACT OR IN STRICTEST
|
||
|
|
||
|
CONFIDENCE ELECTRONIC INFORMATION
|
||
|
|
||
|
|
||
|
|
||
|
HIGH IMPACT or IN STRICTEST CONFIDENCE information shall not be
|
||
|
|
||
|
transmitted without the protection of an encryption system approved by
|
||
|
|
||
|
Director of Security and Investigation except where one of the
|
||
|
|
||
|
following is used:
|
||
|
|
||
|
|
||
|
|
||
|
1. private circuits for which access to all distribution frame and
|
||
|
|
||
|
flexibility points are secured for HIGH IMPACT or IN STRICTEST
|
||
|
|
||
|
CONFIDENCE information, and which are routed via ducts, risers and
|
||
|
|
||
|
conduits having tamper detecting seals.
|
||
|
|
||
|
|
||
|
|
||
|
2. fibre optic circuits for which all connection points are secured
|
||
|
|
||
|
for HIGH IMPACT or IN STRICTEST CONFIDENCE information,
|
||
|
|
||
|
|
||
|
|
||
|
3. an Exclusive LAN in a secured area used only by BT People.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 3.5: TRANSMISSION OF IN CONFIDENCE ELECTRONIC INFORMATION
|
||
|
|
||
|
|
||
|
|
||
|
IN CONFIDENCE information shall not be transmitted without the
|
||
|
|
||
|
protection of approved encryption system unless communication is
|
||
|
|
||
|
strongly authenticated, such as by:
|
||
|
|
||
|
|
||
|
|
||
|
1. via Private Circuits between BT buildings,
|
||
|
|
||
|
|
||
|
|
||
|
2. via the Public Switched Telephone Network with approved dialback systems,
|
||
|
|
||
|
|
||
|
|
||
|
3. via the PSS using closed user groups (or equivalent), or
|
||
|
|
||
|
|
||
|
|
||
|
4. via the PSS with a challenge response system.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 3.6: USE OF ELECTRONIC MAIL SYSTEMS
|
||
|
|
||
|
|
||
|
|
||
|
Privacy marked or sensitive information shall not be transmitted
|
||
|
|
||
|
between systems using Electronic Mail Systems that have not been
|
||
|
|
||
|
approved as suitable for that use by the Director of Security and
|
||
|
|
||
|
Investigation.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 3.7: SPECIAL DISPENSATION IN AN EMERGENCY
|
||
|
|
||
|
|
||
|
|
||
|
Where special justification exists, for example in emergencies, IN
|
||
|
|
||
|
STRICTEST CONFIDENCE information may exceptionally be transmitted
|
||
|
|
||
|
according to the conditions for IN CONFIDENCE material. In these
|
||
|
|
||
|
circumstances, prior authority from a person in the Senior Management
|
||
|
|
||
|
Group shall be obtained on each occasion.
|
||
|
|
||
|
|
||
|
|
||
|
System interconnection
|
||
|
|
||
|
|
||
|
|
||
|
The connection of a system of computers by means of a network forms
|
||
|
|
||
|
the basis for bilateral agreements and practices between those
|
||
|
|
||
|
responsible for the security of the computers and those responsible
|
||
|
|
||
|
for the security of the network. A failure by any of those involved to
|
||
|
|
||
|
correctly secure the equipment for which they are responsible, may
|
||
|
|
||
|
result in a failure of security of the entire network.
|
||
|
|
||
|
|
||
|
|
||
|
It is the responsibility of the owners of all computer systems
|
||
|
|
||
|
connected to a network to ensure that their security is not
|
||
|
|
||
|
compromised by the network techniques used, or by any subsequent
|
||
|
|
||
|
changes to the network configuration and topology. Before allowing
|
||
|
|
||
|
connection of a computer system to a LAN or other network, the owners
|
||
|
|
||
|
of the business processes entrusted to that system must satisfy
|
||
|
|
||
|
themselves that their policy for security will not be violated.
|
||
|
|
||
|
|
||
|
|
||
|
Connection must be refused by the computer system administrator on
|
||
|
|
||
|
behalf of the business process owner if the networking arrangements
|
||
|
|
||
|
are or become inconsistent with the security policy. These
|
||
|
|
||
|
considerations apply to any network which permits access to several
|
||
|
|
||
|
computer systems via a common telecommunications facility (whether all
|
||
|
|
||
|
users need such access or not).
|
||
|
|
||
|
|
||
|
|
||
|
The connection of any computer system to a network introduces a number
|
||
|
|
||
|
of additional threats to the security of that system, to the security
|
||
|
|
||
|
of the network and to any other computer system sharing the network.
|
||
|
|
||
|
By far the greatest threat to a computer connected to a network is the
|
||
|
|
||
|
possibility of unauthorised access from other network users. Other
|
||
|
|
||
|
threats include the accidental or unintentional distribution of
|
||
|
|
||
|
privacy marked information across the network.
|
||
|
|
||
|
|
||
|
|
||
|
The vulnerability of the network increases because the authority to
|
||
|
|
||
|
grant users permission to access the network is given to the
|
||
|
|
||
|
administrator of the connected computer system. If that computer were
|
||
|
|
||
|
already connected to another network, for example, the number of
|
||
|
|
||
|
potential users might increase dramatically.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 3.8: CONNECTION OF A COMPUTER SYSTEM TO NETWORKS
|
||
|
|
||
|
|
||
|
|
||
|
The administrators of a computer system connected to networks shall
|
||
|
|
||
|
ensure that the network arrangements do not contravene the security
|
||
|
|
||
|
policy of the business processes or applications being supported by
|
||
|
|
||
|
their system.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 3.9: INTERCONNECTION OF NETWORKS
|
||
|
|
||
|
|
||
|
|
||
|
Networks shall not be joined together unless it can be shown that the
|
||
|
|
||
|
resulting network does not contravene the security policy of either
|
||
|
|
||
|
network or of the security policy of those systems connected to either
|
||
|
|
||
|
network.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 3.10: ADMINISTRATION OF A COMPUTER CONNECTED TO A
|
||
|
|
||
|
NETWORK
|
||
|
|
||
|
|
||
|
|
||
|
The administrators of a computer system connected to networks shall
|
||
|
|
||
|
ensure that the security administration of their system does not
|
||
|
|
||
|
contravene the security policy of the network to which their system is
|
||
|
|
||
|
connected.
|
||
|
|
||
|
|
||
|
|
||
|
3.3 Network management
|
||
|
|
||
|
|
||
|
|
||
|
Owners of systems connected to a network have a level of expectation
|
||
|
|
||
|
about the services that the network provides. For example, network
|
||
|
|
||
|
users may expect that the service:
|
||
|
|
||
|
|
||
|
|
||
|
o is available when it is needed,
|
||
|
|
||
|
o has sufficient capacity to carry the load,
|
||
|
|
||
|
o is able to ensure the confidentiality of information in transit,
|
||
|
|
||
|
o does not corrupt the information in transit,
|
||
|
|
||
|
o delivers the information to the intended recipient,
|
||
|
|
||
|
o restricts access to those so authorised.
|
||
|
|
||
|
|
||
|
|
||
|
The level of service offered by the network should be well documented
|
||
|
|
||
|
and will form the basis of any contract between the owner of the
|
||
|
|
||
|
network and the owners of the connected systems.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 3.11: NETWORK SECURITY POLICY
|
||
|
|
||
|
|
||
|
|
||
|
Providers of networks that claim to provide security functions shall
|
||
|
|
||
|
declare to their users and customers the protective measures, and
|
||
|
|
||
|
conditions placed on the users of the network, for security offered by
|
||
|
|
||
|
the network and shall make available a document describing these
|
||
|
|
||
|
features and their applications.
|
||
|
|
||
|
|
||
|
|
||
|
3.4 Network architecture
|
||
|
|
||
|
|
||
|
|
||
|
The following means of computer-to-computer and user-to-computer
|
||
|
|
||
|
access are commonly encountered:
|
||
|
|
||
|
|
||
|
|
||
|
o Private Circuits,
|
||
|
|
||
|
o Public Switched Telephone Network,
|
||
|
|
||
|
o Public data networks (PSS, for example),
|
||
|
|
||
|
o Local Area Networks (of various types), and
|
||
|
|
||
|
o Integrated Services Digital Network (called IDA in the UK).
|
||
|
|
||
|
|
||
|
|
||
|
3.4.1 Private circuits
|
||
|
|
||
|
|
||
|
|
||
|
Private Circuits are often perceived as being secure because of their
|
||
|
|
||
|
immunity to logical attack, that is, hacking. They are not necessarily
|
||
|
|
||
|
physically secure because their fixed routing may make them vulnerable
|
||
|
|
||
|
to direct interception. Typically, Private Circuits may be routed via
|
||
|
|
||
|
the distribution frame of the local exchange and the building serving
|
||
|
|
||
|
the user. Unless otherwise protected, the information on the Private
|
||
|
|
||
|
Circuit is vulnerable to interception at these points.
|
||
|
|
||
|
|
||
|
|
||
|
3.4.2 Public Switched Telephone Network (PSTN)
|
||
|
|
||
|
|
||
|
|
||
|
The PSTN is open to public access and is the favoured medium for
|
||
|
|
||
|
unauthorised access world-wide. Because Calling Line Identification
|
||
|
|
||
|
(CLI) is not currently provided as a basic facility, it is not easy to
|
||
|
|
||
|
identify the origin of connection attempts. For this reason, dialup
|
||
|
|
||
|
PSTN access to BT systems containing sensitive data is forbidden
|
||
|
|
||
|
unless adequate precautions are taken.
|
||
|
|
||
|
|
||
|
|
||
|
The connection of computers to the PSTN for the purposes of
|
||
|
|
||
|
outward-bound connections to information service providers is strongly
|
||
|
|
||
|
discouraged unless it can be demonstrated that the connection
|
||
|
|
||
|
equipment cannot be subverted or incorrectly configured so as to
|
||
|
|
||
|
permit inward-bound connections.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 3.12: PSTN CONNECTION TO BT SYSTEMS
|
||
|
|
||
|
|
||
|
|
||
|
BT computer systems containing or processing sensitive information
|
||
|
|
||
|
shall not be connected to the PSTN unless adequate precautions are
|
||
|
|
||
|
taken to protect the system from unauthorised access.
|
||
|
|
||
|
|
||
|
|
||
|
3.4.3 Public data networks
|
||
|
|
||
|
|
||
|
|
||
|
Worldwide, there are many different data networks available to the
|
||
|
|
||
|
public. The following comments refer specifically to BT's UK data
|
||
|
|
||
|
network known as PSS.
|
||
|
|
||
|
|
||
|
|
||
|
In general, there are two methods by which a connection to PSS can be
|
||
|
|
||
|
achieved: ]
|
||
|
|
||
|
|
||
|
|
||
|
o by direct connection (a private circuit connecting the user to the
|
||
|
|
||
|
X25 network), or
|
||
|
|
||
|
|
||
|
|
||
|
o by dial connection (via the PSTN, to an X25 PAD in the network).
|
||
|
|
||
|
|
||
|
|
||
|
Each user of PSS is identified by a Network User Address (NUA) which
|
||
|
|
||
|
is analogous to a telephone number. Where the user is directly
|
||
|
|
||
|
connected to PSS, the NUA is permanently associated with that line and
|
||
|
|
||
|
can provide a valuable check on the user's identity.
|
||
|
|
||
|
|
||
|
|
||
|
If the user gains access to the PSS by dial connection to a PAD, he
|
||
|
|
||
|
identifies himself to the network by means of a password (sometimes
|
||
|
|
||
|
called the Network User Identity, NUI). This is, in turn, checked by
|
||
|
|
||
|
the network management software to find the corresponding NUA of the
|
||
|
|
||
|
user. Because the NUA does not identify a particular line or location,
|
||
|
|
||
|
security may be compromised if a password is discovered by other people.
|
||
|
|
||
|
|
||
|
|
||
|
Use of the following facilities can decrease the vulnerability of the
|
||
|
|
||
|
PSS to attack:
|
||
|
|
||
|
|
||
|
|
||
|
o All authorised users can be included in a Closed User Group (CUG).
|
||
|
|
||
|
In effect, this creates a private network not available to
|
||
|
|
||
|
unauthorised parties. However this advantage may be compromised if the
|
||
|
|
||
|
CUG includes the NUAs of dial-up users who are authenticated only by
|
||
|
|
||
|
passwords.
|
||
|
|
||
|
|
||
|
|
||
|
o The caller's Network User Address (NUA) provided by PSS can be
|
||
|
|
||
|
checked by the host against a list of authorised callers.
|
||
|
|
||
|
|
||
|
|
||
|
3.4.4 Local area netvorks
|
||
|
|
||
|
|
||
|
|
||
|
Access to computers and computer-to-computer communications via LANs
|
||
|
|
||
|
may present a substantial risk to security. Most LANs are implemented
|
||
|
|
||
|
using a shared transmission medium which broadcasts all the signals to
|
||
|
|
||
|
most or all of the attached nodes. Some LANs support Closed User
|
||
|
|
||
|
Groups (CUGs) in a manner analogous to the PSS and so may also provide
|
||
|
|
||
|
some call origination information. The relative ease of user access to
|
||
|
|
||
|
LAN control software and hardware makes dependence on the security of
|
||
|
|
||
|
any of these facilities unwise. The situation is especially aggravated
|
||
|
|
||
|
where LANs are connected by gateways to one another, the PSS, or to
|
||
|
|
||
|
the PSTN. In each case the risk of unauthorised access is increased
|
||
|
|
||
|
enormously. See earlier CSM Policies in this section regarding the
|
||
|
|
||
|
interconnection of networks. Data on LANs are generally regarded as
|
||
|
|
||
|
being at risk because:
|
||
|
|
||
|
|
||
|
|
||
|
o Most LANs are designed around a shared communications facility which
|
||
|
|
||
|
generally broadcasts signals to all of the attached nodes, security
|
||
|
|
||
|
being dependent on access points ignoring messages not specifically
|
||
|
|
||
|
addressed to them.
|
||
|
|
||
|
|
||
|
|
||
|
O LANs are frequently used as the carriers of Office Automation
|
||
|
|
||
|
facilities in the office environment where system security was not
|
||
|
|
||
|
necessarily a prime consideration in the original choice of the
|
||
|
|
||
|
accommodation.
|
||
|
|
||
|
|
||
|
|
||
|
O LAN signalling sometimes extends into the radio frequency spectrum
|
||
|
|
||
|
and, if electromagnetic signals are emitted from the cabling, LAN
|
||
|
|
||
|
traffic can be intercepted (see also TEMPESI) .
|
||
|
|
||
|
|
||
|
|
||
|
Strong methods of user authentication must be implemented if privacy
|
||
|
|
||
|
marked information is transmitted over the LAN so special precautions
|
||
|
|
||
|
may need to be applied to LANs in order to enhance their operational
|
||
|
|
||
|
security. Three particular types of LAN are defined below:
|
||
|
|
||
|
|
||
|
|
||
|
3.4.4.1 Exclusive LANs
|
||
|
|
||
|
An Exclusive LAN is one where its security depends on:
|
||
|
|
||
|
|
||
|
|
||
|
o its use being restricted to only those users who have an operational
|
||
|
|
||
|
need to use it
|
||
|
|
||
|
|
||
|
|
||
|
o its access points being within BT secure premises
|
||
|
|
||
|
|
||
|
|
||
|
o its not being connected to another network - public or private.
|
||
|
|
||
|
|
||
|
|
||
|
If the LAN spans several buildings, the links between those premises
|
||
|
|
||
|
should be secured by encryption.
|
||
|
|
||
|
|
||
|
|
||
|
3.4.4.2 Access-controlled LANs
|
||
|
|
||
|
|
||
|
|
||
|
An Access-controlled LAN is one which incorporates special precautions
|
||
|
|
||
|
to restrict access between users and resources. All resources
|
||
|
|
||
|
accessible from equipment under a user's control, for example a dumb
|
||
|
|
||
|
terminal, PC or workstation are protected by strong authentication
|
||
|
|
||
|
mechanism. Strong authentication is an authentication mechanism that
|
||
|
|
||
|
is resilient to eavesdropping and masquerade attacks in the context of
|
||
|
|
||
|
the communications network between user and system.
|
||
|
|
||
|
|
||
|
|
||
|
Authentication of connections to LAN nodes may be implemented using
|
||
|
|
||
|
systems based on Kerberos. (Further advice may be obtained from D&P
|
||
|
|
||
|
Data Security Laboratories, see Section 11).
|
||
|
|
||
|
|
||
|
|
||
|
Where there may be a number of separate LAN segments interconnected by
|
||
|
|
||
|
bridges or gateways, each individual LAN segment must comply with the
|
||
|
|
||
|
access control policy.
|
||
|
|
||
|
|
||
|
|
||
|
3.4.4.3 Ordinary LANs
|
||
|
|
||
|
|
||
|
|
||
|
An Ordinary LAN is one which does not meet the security criteria for
|
||
|
|
||
|
an Exclusive or an Access-controlled LAN.
|
||
|
|
||
|
|
||
|
|
||
|
3.4.4.4 LAN Usage
|
||
|
|
||
|
|
||
|
|
||
|
In general the following applies:
|
||
|
|
||
|
|
||
|
|
||
|
LAN Type Usage
|
||
|
|
||
|
|
||
|
|
||
|
Exclusive In Strictest Confidence
|
||
|
|
||
|
Access Controlled In Confidence
|
||
|
|
||
|
Ordinary Non-Privacy marked
|
||
|
|
||
|
|
||
|
|
||
|
Note that use of a specific LAN architecture does not negate the use
|
||
|
|
||
|
of other mandatory features which may be required for handling
|
||
|
|
||
|
sensitive information.
|
||
|
|
||
|
|
||
|
|
||
|
The security of a LAN is a complex issue, especially when the
|
||
|
|
||
|
mechanisms for processing, storing, or transmitting sensitive
|
||
|
|
||
|
information do not all offer the same level of security. In this case
|
||
|
|
||
|
contact the Commercial Security Unit for further guidance.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 3.13: LOCAL AREA NETWORKS
|
||
|
|
||
|
|
||
|
|
||
|
A LAN shall be characterised as one of Exclusive, Access Controlled,
|
||
|
|
||
|
or Ordinary so that the owners, administrators, and users, are aware
|
||
|
|
||
|
of the security controls that must be enforced.
|
||
|
|
||
|
|
||
|
|
||
|
3.5 Threats to networked systems
|
||
|
|
||
|
|
||
|
|
||
|
Four major threats exist to networked systems:
|
||
|
|
||
|
|
||
|
|
||
|
1 Disclosure of information stored or in transit on the network.
|
||
|
|
||
|
|
||
|
|
||
|
2 Masquerading as an authorised user.
|
||
|
|
||
|
|
||
|
|
||
|
3 Accidental or unauthorised modification, insertion or deletion of
|
||
|
|
||
|
the information stored or in transit on the network, and
|
||
|
|
||
|
|
||
|
|
||
|
4 Denial of the use of the network to those entitled to use it.
|
||
|
|
||
|
|
||
|
|
||
|
3.5.1 Information disclosure
|
||
|
|
||
|
|
||
|
|
||
|
Much sensitive information (access information as well as user data)
|
||
|
|
||
|
can be gained from illicit interception of telecommunications signals
|
||
|
|
||
|
by tapping and bugging. These activities are usually committed against
|
||
|
|
||
|
local lines rather than the main network. This is because local plant
|
||
|
|
||
|
is more accessible to illicit interception and there is little or no
|
||
|
|
||
|
confusion from other multiplexed signals.
|
||
|
|
||
|
|
||
|
|
||
|
All forms of radio, microwave, infrared and other beam transmission
|
||
|
|
||
|
techniques are also vulnerable to interception.
|
||
|
|
||
|
|
||
|
|
||
|
Four classes of countermeasures may be brought to bear to reduce the
|
||
|
|
||
|
risk of information disclosure. These are:
|
||
|
|
||
|
|
||
|
|
||
|
o Data separation,
|
||
|
|
||
|
o Physical protection,
|
||
|
|
||
|
o TEMPEST protection, and
|
||
|
|
||
|
o Cryptographic protection.
|
||
|
|
||
|
|
||
|
|
||
|
3.5.1.1 Data sparation
|
||
|
|
||
|
|
||
|
|
||
|
Depending on the architecture of the chosen network, information of
|
||
|
|
||
|
varying sensitivity may be in transit simultaneously across a single
|
||
|
|
||
|
channel. Under these circumstances, there needs to be a clear
|
||
|
|
||
|
distinction between the level of sensitivity of information. This can
|
||
|
|
||
|
be achieved by either:
|
||
|
|
||
|
|
||
|
|
||
|
o commencing a new single-level communications session each time there
|
||
|
|
||
|
is a change to the level of data sensitivity, or
|
||
|
|
||
|
|
||
|
|
||
|
o Labelling each item of data with its sensitivity in such a way that
|
||
|
|
||
|
the protocol used on the multi-level channel provides clear indication
|
||
|
|
||
|
of the sensitivity, and facilitates unambiguous pairing between the
|
||
|
|
||
|
label and the associated data received or sent.
|
||
|
|
||
|
|
||
|
|
||
|
In either circumstance, the communication channel should be secured to
|
||
|
|
||
|
handle the most sensitive information that it is expected to carry.
|
||
|
|
||
|
|
||
|
|
||
|
3.5.1.2 Physical protection
|
||
|
|
||
|
|
||
|
|
||
|
Because any network may be vulnerable to eavesdropping, special care
|
||
|
|
||
|
must be taken when transmitting highly sensitive information.
|
||
|
|
||
|
|
||
|
|
||
|
Many networks are located in buildings that are considerably less
|
||
|
|
||
|
secure than purpose-built computer centres. When planning the
|
||
|
|
||
|
installation of the network, the guidelines and suggestions detailed
|
||
|
|
||
|
in the section on Electronic Systems Installations should be followed
|
||
|
|
||
|
as far as possible.
|
||
|
|
||
|
|
||
|
|
||
|
On these occasions, where it is operationally necessary to install
|
||
|
|
||
|
networks in insecure buildings, including those to which members of
|
||
|
|
||
|
the public have access, the following additional points must be
|
||
|
|
||
|
considered:
|
||
|
|
||
|
|
||
|
|
||
|
o cabling should be continuous and not be routed through areas where
|
||
|
|
||
|
public access is permitted. If this is not possible it should be
|
||
|
|
||
|
contained in heavy duty grounded metal conduit preferably requiring a
|
||
|
|
||
|
specialised tool to remove the inspection plates.
|
||
|
|
||
|
|
||
|
|
||
|
o where sensitive information is likely to be transmitted on a
|
||
|
|
||
|
network, consideration should be given to using protected cable.
|
||
|
|
||
|
|
||
|
|
||
|
o where sensitive information is transmitted, consideration should be
|
||
|
|
||
|
given to housing termination points, ie. wall mounted coaxial sockets,
|
||
|
|
||
|
in proprietary lockable metal boxes. These must be kept locked at all
|
||
|
|
||
|
times when authorised staff are not present.
|
||
|
|
||
|
|
||
|
|
||
|
o after the installation of cabling, particularly when completed by
|
||
|
|
||
|
outside contractors and in a building not dedicated to BT use, the
|
||
|
|
||
|
routing of the cable must be thoroughly inspected to ensure that it
|
||
|
|
||
|
meets the original specification and that it has not been routed to
|
||
|
|
||
|
locations which could be used by potential eavesdroppers.
|
||
|
|
||
|
|
||
|
|
||
|
o the power switches of network connected terminals should be fitted with
|
||
|
|
||
|
proprietary lockable boxes (which are kept locked!) .
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 3.21: NETWORK MONlTORING
|
||
|
|
||
|
|
||
|
|
||
|
The use of network monitoring equipment must be strictly controlled.
|
||
|
|
||
|
|
||
|
|
||
|
3.5.1.3 Tempest protection
|
||
|
|
||
|
|
||
|
|
||
|
Communications lines, personal computers, Visual Display Units (VDUs)
|
||
|
|
||
|
and printers may radiate significant amounts of radio frequency energy
|
||
|
|
||
|
and it is possible for data displayed on a screen or being printed to
|
||
|
|
||
|
be intercepted. TEMPEST is the name of the technology that enables
|
||
|
|
||
|
this unintentional radio emission to be reduced to acceptable
|
||
|
|
||
|
proportions. In practice the signals can only be received over a short
|
||
|
|
||
|
distance and identifying one particular VDU/printer among several
|
||
|
|
||
|
others is difficult. Although the threat may be real in some military
|
||
|
|
||
|
situations, for the commercial world it must be considered a threat
|
||
|
|
||
|
only when the information being handled is extremely sensitive.
|
||
|
|
||
|
|
||
|
|
||
|
For specialist advice on the applicability and methods of TEMPEST
|
||
|
|
||
|
protection, refer to Section 10.
|
||
|
|
||
|
|
||
|
|
||
|
3.5.1.4 Cryptographic protection
|
||
|
|
||
|
|
||
|
|
||
|
The use of cryptographic techniques is not limited in its application
|
||
|
|
||
|
to the protection of communications networks. This topic is covered in
|
||
|
|
||
|
the Cyptographic Protection section.
|
||
|
|
||
|
|
||
|
|
||
|
3.5.2 Unauthorised access
|
||
|
|
||
|
|
||
|
|
||
|
Connection requests across a network should be verified as to their
|
||
|
|
||
|
authenticity. The chosen authentication mechanism should not place
|
||
|
|
||
|
undue or unwarranted trust on the network to carry the authentication
|
||
|
|
||
|
information accurately or in secrecy unless it has been proved able to
|
||
|
|
||
|
carry out that function. Care should be taken to ensure that the
|
||
|
|
||
|
chosen mechanisms for user authentication are sufficiently strong and
|
||
|
|
||
|
that they are managed correctly.
|
||
|
|
||
|
|
||
|
|
||
|
It is important to realise that user authentication information is
|
||
|
|
||
|
carried across the network and should be appropriately protected, that
|
||
|
|
||
|
is, with the same rigour as that afforded to the information that it
|
||
|
|
||
|
protects. If cryptographic methods are used to facilitate access
|
||
|
|
||
|
control, then the algorithm, configuration and key management must be
|
||
|
|
||
|
approved by the Director of Security and Investigation. Where
|
||
|
|
||
|
cryptographic keys are shared, a method of personal authentication
|
||
|
|
||
|
should be used in addition.
|
||
|
|
||
|
|
||
|
|
||
|
If a strong method of authentication (eg. a one time password) is
|
||
|
|
||
|
used, then this may be adequate as the sole means of authentication.
|
||
|
|
||
|
Otherwise, in addition to personal authentication, authentication of
|
||
|
|
||
|
the recipient's point of entry to the communications network is
|
||
|
|
||
|
required. To be acceptable this must reliably identify the recipient
|
||
|
|
||
|
as being at a fixed physical location. This location must be
|
||
|
|
||
|
authenticated as one at which the recipient may receive the
|
||
|
|
||
|
information. Suitable methods are dependent on the type of connection
|
||
|
|
||
|
and are as follows:
|
||
|
|
||
|
|
||
|
|
||
|
o PRIVATE CIRCUIT - The recipient should be connected via a private
|
||
|
|
||
|
circuit to a fixed location.
|
||
|
|
||
|
|
||
|
|
||
|
o PUBLIC DATA NETWORK - The recipient should be at an authorised fixed
|
||
|
|
||
|
address which is verified by the originator, or should be a member of
|
||
|
|
||
|
an authorised CUG, or authenticated by a one-time password system in
|
||
|
|
||
|
the network.
|
||
|
|
||
|
|
||
|
|
||
|
o PUBLIC SWITCHED TELEPHONE NETWORK- The recipient should be at an
|
||
|
|
||
|
authorised fixed address which is verified by the originator by
|
||
|
|
||
|
dialling-out or by a dialback device approved by the Director of
|
||
|
|
||
|
Security and Investigation.
|
||
|
|
||
|
|
||
|
|
||
|
o INTEGRATED DIGITAL ACCESS - The recipient should be at an authorised
|
||
|
|
||
|
address which is verified by the originator by dialling-out or by
|
||
|
|
||
|
checking the Calling Line Identification.
|
||
|
|
||
|
|
||
|
|
||
|
o LOCALAREA NETWORKS - The recipient should be at an authorised port
|
||
|
|
||
|
on an access-controlled LAN, or at any port on an exclusive LAN.
|
||
|
|
||
|
|
||
|
|
||
|
o OTHER DATA NETWORKS - The recipient should be at an authorised port
|
||
|
|
||
|
on a BT-only data network which does not use broadcast transmission.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 3.14: NETWORK ORIGIN AUTHENTICATION
|
||
|
|
||
|
|
||
|
|
||
|
The identity of network users shall be authenticated. Where the method
|
||
|
|
||
|
of authentication is weak, strong technical methods shall be employed
|
||
|
|
||
|
to determine the point of access of the originator into the network.
|
||
|
|
||
|
|
||
|
|
||
|
3.5.2.1 Dialback
|
||
|
|
||
|
|
||
|
|
||
|
The security of dial in access may be enhanced by providing an
|
||
|
|
||
|
'Automatic Dialback' facility whereby the caller is forced, at the
|
||
|
|
||
|
outset of a call, to declare his identity to the system. The equipment
|
||
|
|
||
|
terminates the call and dials the caller on a different outgoing-only
|
||
|
|
||
|
line using a telephone number it associates with the caller's declared
|
||
|
|
||
|
identity. This prevents access from arbitrary telephone locations and
|
||
|
|
||
|
offers an audit and accountability mechanism.
|
||
|
|
||
|
|
||
|
|
||
|
Some types of dialback device may be defeated by quite simple
|
||
|
|
||
|
techniques, and therefore do not give the intended protection. Only
|
||
|
|
||
|
the system administrator should be able to modify the list of
|
||
|
|
||
|
authorised telephone numbers stored in the dialback equipment.
|
||
|
|
||
|
Dialback systems used to protect BT's commercially sensitive
|
||
|
|
||
|
information must be approved by the Director of Security and
|
||
|
|
||
|
Investigation.
|
||
|
|
||
|
|
||
|
|
||
|
In some systems manual dialback may be appropriate, however, whether
|
||
|
|
||
|
dialback is automatic or manual, a full log of each access should be
|
||
|
|
||
|
maintained. Because Dialback units only provide authentication of the
|
||
|
|
||
|
point of entry into the Public Switched Telephone Network (PSTN),
|
||
|
|
||
|
other measures should be taken for High Impact Systems.
|
||
|
|
||
|
|
||
|
|
||
|
Dialback techniques can be rendered ineffective if the exchange offers
|
||
|
|
||
|
a Call Diversion facility.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 3.15: DIALBACK
|
||
|
|
||
|
|
||
|
|
||
|
Where the method of network user authentication is weak, the point of
|
||
|
|
||
|
access into the network shall be established using a dialback unit
|
||
|
|
||
|
that has been approved by the Director of Security and Investigation.
|
||
|
|
||
|
|
||
|
|
||
|
3.5.3 Modification, insertion and deletion
|
||
|
|
||
|
|
||
|
|
||
|
Special measures may need to be taken to ensure that information is
|
||
|
|
||
|
not lost or corrupted in transit across a network. For example,
|
||
|
|
||
|
message sequence numbers can be used to detect the accidental or
|
||
|
|
||
|
deliberate deletion or insertion of entire blocks of information in
|
||
|
|
||
|
the information stream.
|
||
|
|
||
|
|
||
|
|
||
|
Accidental modification of the information in transit can be detected
|
||
|
|
||
|
by the use ofcomparatively simple techniques, for example checksums or
|
||
|
|
||
|
Cyclic Redundancy Checks (CRCs). Where it is anticipated that
|
||
|
|
||
|
deliberate attempts will be made to modify information then
|
||
|
|
||
|
cryptographic techniques may be appropriate.
|
||
|
|
||
|
|
||
|
|
||
|
Cryptographic techniques may be used to prove:
|
||
|
|
||
|
|
||
|
|
||
|
o that data has not been modified,
|
||
|
|
||
|
o the identity of the originator of information,
|
||
|
|
||
|
o that information has been delivered to its intended destination, and
|
||
|
|
||
|
o the source of information into a network.
|
||
|
|
||
|
|
||
|
|
||
|
Note that the adoption of cryptographic techniques for one purpose may
|
||
|
|
||
|
offer the opportunity of other checks. For example, the adoption of
|
||
|
|
||
|
Digital Signatures will provide a facility to enable the detection of
|
||
|
|
||
|
accidental or deliberate modification of information. Cryptographic
|
||
|
|
||
|
techniques are technically difficult to design and implement such that
|
||
|
|
||
|
their use and management is not prone to errors and subsequent
|
||
|
|
||
|
security failures. Because of this, the use of any such equipment must
|
||
|
|
||
|
have the approval of the Director of Security and Investigation.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 3.16: DIGITAL SIGNATURES
|
||
|
|
||
|
|
||
|
|
||
|
In the design of systems where proof of origin of a message must be
|
||
|
|
||
|
ascertained, Digital Signature techniques shall be considered and
|
||
|
|
||
|
documented.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY3.17: NON REPUDIATION SERVICES
|
||
|
|
||
|
|
||
|
|
||
|
In the design of systems where it is necessary to prove that the
|
||
|
|
||
|
intended recipient has received information, cryptographic techniques
|
||
|
|
||
|
to manufacture an incontrovertible receipt note shall be considered
|
||
|
|
||
|
and documented.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 3.18: DATA ORIGIN AUTHENTICATION
|
||
|
|
||
|
|
||
|
|
||
|
In the design of systems where there is a requirement to prove the
|
||
|
|
||
|
identity of the origin of data then cryptographic techniques shall be
|
||
|
|
||
|
considered and documented.
|
||
|
|
||
|
|
||
|
|
||
|
3.5.4 Denial or failure of service
|
||
|
|
||
|
|
||
|
|
||
|
In the office environment there is generally no need to provide
|
||
|
|
||
|
fallback communication systems as the standard response time for fault
|
||
|
|
||
|
correction is adequate for most requirements. However, for systems
|
||
|
|
||
|
which use private circuits or the PSS as the prime means of
|
||
|
|
||
|
communication, it is worth considering using PSTN as a fallback for
|
||
|
|
||
|
nonsensitive data provided that the PSTN connection is not made
|
||
|
|
||
|
permanent.
|
||
|
|
||
|
|
||
|
|
||
|
At purpose-built computer centres the situation is somewhat different
|
||
|
|
||
|
as most systems would become useless in the event of loss of their
|
||
|
|
||
|
communications links. Some link redundancy is generally necessary to
|
||
|
|
||
|
protect against this. Communication links that are provisioned as
|
||
|
|
||
|
backup should if possible, be terminated on different hardware in the
|
||
|
|
||
|
system and routed via different cable ducts and transmission routes so
|
||
|
|
||
|
as to minimise the danger of loss of both links in the event of a
|
||
|
|
||
|
hardware failure.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 3.19: NETWORK AVAILABILITY
|
||
|
|
||
|
|
||
|
|
||
|
In the design of systems, measures shall be taken to ensure that the
|
||
|
|
||
|
availability of the network satisfies the system's requirement.
|
||
|
|
||
|
|
||
|
|
||
|
3.6 Cryptographic protection
|
||
|
|
||
|
|
||
|
|
||
|
Modern encryption techniques are regarded as offering a formidable
|
||
|
|
||
|
barrier to any adversary and probably an insurmountable barrier unless
|
||
|
|
||
|
substantial computing power is available or the key and algorithm are
|
||
|
|
||
|
compromised.
|
||
|
|
||
|
|
||
|
|
||
|
The use of cryptographic techniques can contribute significantly to
|
||
|
|
||
|
security by offering strong mechanisms to:
|
||
|
|
||
|
|
||
|
|
||
|
o authenticate the user,
|
||
|
|
||
|
o authenticate the calling location,
|
||
|
|
||
|
o assure message integrity,
|
||
|
|
||
|
o maintain the confidentiality of messages.
|
||
|
|
||
|
|
||
|
|
||
|
The use of encryption is not without operational problems some of
|
||
|
|
||
|
which are listed below:
|
||
|
|
||
|
|
||
|
|
||
|
o encryption packages inevitably involve an overhead in terms of key
|
||
|
|
||
|
management and administration although, in some public key systems,
|
||
|
|
||
|
this overhead is reduced.
|
||
|
|
||
|
|
||
|
|
||
|
o serious problems can arise if individuals forget their keys or
|
||
|
|
||
|
become indisposed etc. As a precaution, it may be prudent to keep
|
||
|
|
||
|
duplicate cryptographic keys or copies of the files in unencrypted
|
||
|
|
||
|
form. Any such duplicates must be kept securely.
|
||
|
|
||
|
|
||
|
|
||
|
o encrypted information may contain control characters which make it a
|
||
|
|
||
|
prerequisite that any protocol used to transmit a file electronically
|
||
|
|
||
|
is completely transparent to the file contents. It is likely that
|
||
|
|
||
|
encrypted data would interfere with many network operating systems. As
|
||
|
|
||
|
a result either considerable tailoring of a system or specially
|
||
|
|
||
|
developed encryption packages would be required to enable encrypted
|
||
|
|
||
|
data to be transmitted.
|
||
|
|
||
|
|
||
|
|
||
|
o some encryption systems are not suitable for every type of network
|
||
|
|
||
|
so expert advice must be sought.
|
||
|
|
||
|
|
||
|
|
||
|
Encryption systems used to protect BT's commercially sensitive
|
||
|
|
||
|
information must be approved by the Director of Security and
|
||
|
|
||
|
Investigation.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 3.20: APPROVAL OF USE OF CRYPTOGRAPHY
|
||
|
|
||
|
|
||
|
|
||
|
Any cryptographic techniques or encryption systems selected to
|
||
|
|
||
|
safeguard BT information shall have been approved by the Director of
|
||
|
|
||
|
Security and Investigation prior to their use.
|
||
|
|
||
|
|
||
|
|
||
|
3.7 Electronic Mail Systems
|
||
|
|
||
|
|
||
|
|
||
|
There are considerable risks associated with current electronic mail
|
||
|
|
||
|
systems. In particular, data may be forged, altered, redirected or
|
||
|
|
||
|
intercepted. Although techniques are being developed to solve many of
|
||
|
|
||
|
these problems, users of electronic mail systems should be aware of
|
||
|
|
||
|
their present limitations. The advice given here is for guidance and
|
||
|
|
||
|
is intended to highlight areas of concern. In the future specific
|
||
|
|
||
|
policies will be produced to cover electronic mail security.
|
||
|
|
||
|
|
||
|
|
||
|
Authentication
|
||
|
|
||
|
|
||
|
|
||
|
Currently, most systems authenticate users by means of User IDs and
|
||
|
|
||
|
passwords. This is not a strong means of authenticating users.
|
||
|
|
||
|
Electronic mail systems should not be used as a means of providing
|
||
|
|
||
|
authorisation to other individuals for carrying out tasks unless they
|
||
|
|
||
|
have been specified, designed and installed for that purpose. For
|
||
|
|
||
|
example, it should not be possible to requisition goods on the basis
|
||
|
|
||
|
of an uncorroborated electronic mail message. At present, in the UK, a
|
||
|
|
||
|
handwritten signature is a legally-binding proof of authorisation.
|
||
|
|
||
|
Electronic mail systems using weak authentication do not offer the
|
||
|
|
||
|
required level of proof and assurance of the origination of a message.
|
||
|
|
||
|
Designers of electronic mail systems should look at
|
||
|
|
||
|
currently-available technologies which offer scope for proof of
|
||
|
|
||
|
origination.
|
||
|
|
||
|
|
||
|
|
||
|
Integrity
|
||
|
|
||
|
|
||
|
|
||
|
Without appropriate coding techniques, messages may easily be
|
||
|
|
||
|
intercepted and modified or replayed. Designers of systems should
|
||
|
|
||
|
ensure that the threats are understood and that appropriate
|
||
|
|
||
|
countermeasures are adopted. Digital signatures can be used very
|
||
|
|
||
|
effectively to ensure the integrity and authenticity of a message.
|
||
|
|
||
|
|
||
|
|
||
|
Labelling
|
||
|
|
||
|
|
||
|
|
||
|
Labelling is a way of attaching a marker to a message, file or segment
|
||
|
|
||
|
of data, to indicate a specific attribute. Often the attribute is the
|
||
|
|
||
|
sensitivity of the information. Systems which make use of labels are
|
||
|
|
||
|
able to utilise sophisticated access methods for permitting access to
|
||
|
|
||
|
data An example might be a system which permitting IN CONFIDENCE
|
||
|
|
||
|
material to be redirected to a colleague for action, perhaps because
|
||
|
|
||
|
of holiday arrangements, but which did not permit STAFF IN CONFIDENCE
|
||
|
|
||
|
material to be so directed.
|
||
|
|
||
|
|
||
|
|
||
|
Mail redirection
|
||
|
|
||
|
|
||
|
|
||
|
Automatic electronic mail redirection should not be used unless it is
|
||
|
|
||
|
possible for the message originator to know that message redirection
|
||
|
|
||
|
is in operation.
|
||
|
|
||
|
|
||
|
|
||
|
Account usage
|
||
|
|
||
|
|
||
|
|
||
|
Where it is operationally necessary for another person to use an
|
||
|
|
||
|
electronic mail account for a short time, it is imperative that a hand
|
||
|
|
||
|
over is arranged in a manner which ensures:
|
||
|
|
||
|
|
||
|
|
||
|
o that any password is only known by one person
|
||
|
|
||
|
|
||
|
|
||
|
o that the time period during which the account is temporarily managed by the
|
||
|
|
||
|
other person is documented and recorded by the system manager.
|
||
|
|
||
|
|
||
|
|
||
|
The system manager is the only person authorised to make and record
|
||
|
|
||
|
such a change, and must ensure that the required written authorisation
|
||
|
|
||
|
is signed by the user.
|
||
|
|
||
|
|
||
|
|
||
|
Electronic systems installations
|
||
|
|
||
|
|
||
|
|
||
|
Contents
|
||
|
|
||
|
|
||
|
|
||
|
4.1 Introduction . . . . . . . . . . . . . . . . . . 4-2
|
||
|
|
||
|
|
||
|
|
||
|
4.2 Accommodation. . . . . . . . . . . . . . . . . . 4-2
|
||
|
|
||
|
4.2.1 Natural disasters. . . . . . . . . . . . . . . . 4-2
|
||
|
|
||
|
4.2.2 Civil unrest . . . . . . . . . . . . . . . . . . 4-2
|
||
|
|
||
|
4.2.3 Neighbouring accommodation . . . . . . . . . . . 4-3
|
||
|
|
||
|
4.2.4 Fire . . . . . . . . . . . . . . . . . . . . . . 4-3
|
||
|
|
||
|
|
||
|
|
||
|
4.3 Services . . . . . . . . . . . . . . . . . . . . 4_4
|
||
|
|
||
|
4.3.1 Electrical power . . . . . . . . . . . . . . . . 4-4
|
||
|
|
||
|
4.3.2 Maintenance of local environments. . . . . . . . 4-5
|
||
|
|
||
|
|
||
|
|
||
|
4.4 Electronic system equipment sign posting . . . . 4-5
|
||
|
|
||
|
|
||
|
|
||
|
4.5 Physical access conol strategy . . . . . . . . . 4-5
|
||
|
|
||
|
4.5.1 Access to secure areas . . . . . . . . . . . . . 4-6
|
||
|
|
||
|
4.5.2 Data cabinets and safes. . . . . . . . . . . . . 4-6
|
||
|
|
||
|
|
||
|
|
||
|
4.6 Personnel access . . . . . . . . . . . . . . . . 4-7
|
||
|
|
||
|
4.6.1 Staff, official visitors and other personnel . . 4-7
|
||
|
|
||
|
4.6.2 'General interest' visits. . . . . . . . . . . . 4-7
|
||
|
|
||
|
|
||
|
|
||
|
4.7 System or master consoles. . . . . . . . . . . . 4-8
|
||
|
|
||
|
|
||
|
|
||
|
4.8 Other terminals. . . . . . . . . . . . . . . . . 4-9
|
||
|
|
||
|
|
||
|
|
||
|
4.9 Communications rooms and equipment . . . . . . . 4-9
|
||
|
|
||
|
|
||
|
|
||
|
4.10 Media libraries and disaster stores. . . . . . . 4-9
|
||
|
|
||
|
|
||
|
|
||
|
4.1 Introduction
|
||
|
|
||
|
|
||
|
|
||
|
Security of significant computer or network installations concerns not
|
||
|
|
||
|
only the security of the computer and electronic hardware but also the
|
||
|
|
||
|
protection of systems in general, software, user data, media library
|
||
|
|
||
|
facilities, communications networks and the safety and well being of
|
||
|
|
||
|
personnel. These installations need to be protected against the
|
||
|
|
||
|
effects of events such as fire, flood, loss of power, failure of
|
||
|
|
||
|
air-conditioning and ancillary plant and damage by natural or man-made
|
||
|
|
||
|
hazards. This chapter should be read in conjunction with the Physical
|
||
|
|
||
|
Security Handbook.
|
||
|
|
||
|
|
||
|
|
||
|
4.2 Accommodation
|
||
|
|
||
|
|
||
|
|
||
|
During the planning of an electronic installation due consideration
|
||
|
|
||
|
must be given to both the location of the building that will house the
|
||
|
|
||
|
equipment and the placement of the equipment within the building as
|
||
|
|
||
|
this has a direct effect on the overall security requirements. The
|
||
|
|
||
|
following factors must be considered when selecting installation
|
||
|
|
||
|
sites:
|
||
|
|
||
|
|
||
|
|
||
|
o natural disasters,
|
||
|
|
||
|
o civil unrest,
|
||
|
|
||
|
o neighbouring accommodation,
|
||
|
|
||
|
o fire.
|
||
|
|
||
|
|
||
|
|
||
|
4.2.1 Natural disasters
|
||
|
|
||
|
Certain natural disasters could either severely damage the
|
||
|
|
||
|
installation directly, or prevent its operation by unavailability of
|
||
|
|
||
|
staff.
|
||
|
|
||
|
|
||
|
|
||
|
These include:
|
||
|
|
||
|
|
||
|
|
||
|
o Local flooding including fracture of air conditioning or water
|
||
|
|
||
|
cooling equipment.
|
||
|
|
||
|
o Local landslide, subsidence and so on,
|
||
|
|
||
|
o exceptional weather conditions.
|
||
|
|
||
|
|
||
|
|
||
|
4.2.2 Civil unrest
|
||
|
|
||
|
Electronic system installations might be popular targets for attack by
|
||
|
|
||
|
politically motivated groups and individuals as well as by mobs. It is
|
||
|
|
||
|
undesirable that an electronic system site should be in a vicinity
|
||
|
|
||
|
with:
|
||
|
|
||
|
|
||
|
|
||
|
o unusually high risk of mob violence,
|
||
|
|
||
|
o unusually high incidence of criminal and malicious damage,
|
||
|
|
||
|
o unusually high risk terrorist activity.
|
||
|
|
||
|
|
||
|
|
||
|
If such a site is unavoidable, additional levels of physical security
|
||
|
|
||
|
may be appropriate.
|
||
|
|
||
|
|
||
|
|
||
|
4.2.3 Neighbouring accommodation
|
||
|
|
||
|
Even if the areas housing the electronic system equipment are well
|
||
|
|
||
|
designed, there could be possible hazards from incompatible
|
||
|
|
||
|
neighbouring accommodation both internal and external to the equipment
|
||
|
|
||
|
such as:
|
||
|
|
||
|
|
||
|
|
||
|
o staff restaurants, fuel storage areas (risk of fire),
|
||
|
|
||
|
o washrooms, piped water facilities and tanks (risk of flood),
|
||
|
|
||
|
o electrical generator rooms, railways, radio and radar transmitting
|
||
|
|
||
|
stations (risk of vibration and electromagnetic interference).
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 4.1: SlTlNG OF ELECTRONIC SYSTEMS
|
||
|
|
||
|
|
||
|
|
||
|
The physical siting and location of an electronic system shall be
|
||
|
|
||
|
planned with due regard to security considerations from the inception
|
||
|
|
||
|
of the planning process. The effects of natural disasters, civil
|
||
|
|
||
|
unrest and threats from incompatible neighbouring accommodation shall
|
||
|
|
||
|
be taken into consideration when planning purpose-built electronic
|
||
|
|
||
|
system installations.
|
||
|
|
||
|
|
||
|
|
||
|
4.2.4 Fire
|
||
|
|
||
|
Fire remains one of the most serious of all security hazards
|
||
|
|
||
|
especially in data preparation and media library areas where large
|
||
|
|
||
|
quantities of combustible material are present and electronic
|
||
|
|
||
|
equipment is often allowed to run unattended. Detailed advice on fire
|
||
|
|
||
|
precautions must be sought from local fire safety experts but the main
|
||
|
|
||
|
considerations are:
|
||
|
|
||
|
|
||
|
|
||
|
o limitation of whole-building fire risk,
|
||
|
|
||
|
o limitation of fire risk in main computer and electronic system room,
|
||
|
|
||
|
o limitation of fire risk in data preparation areas.
|
||
|
|
||
|
|
||
|
|
||
|
The necessary preventative measures include:
|
||
|
|
||
|
|
||
|
|
||
|
o partitioning of the installation into fire compartments,
|
||
|
|
||
|
|
||
|
|
||
|
o use of fire-retardant construction materials,
|
||
|
|
||
|
automatic fire detection equipment,
|
||
|
|
||
|
|
||
|
|
||
|
o automatic fire alarm systems (may be linked directly to local fire
|
||
|
|
||
|
station),
|
||
|
|
||
|
|
||
|
|
||
|
o automatic fire suppression equipment (especially Halon gas or
|
||
|
|
||
|
similar systems in the main computer and electronic system room. The
|
||
|
|
||
|
traditional view is that sprinklers are inappropriate here because of
|
||
|
|
||
|
the affect of water on the electronic hardware. Halon has
|
||
|
|
||
|
environmental and safety problems so expert advice must be sought.),
|
||
|
|
||
|
|
||
|
|
||
|
o manual fire fighting equipment, and
|
||
|
|
||
|
|
||
|
|
||
|
o enforcement of fire safety procedures (such as no smoking areas) .
|
||
|
|
||
|
For specific guidance you should refer to Chapter 10 for the BT Fire
|
||
|
|
||
|
Safety Manager in the BT Safety Unit.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 4.2: FIRE THREATS
|
||
|
|
||
|
|
||
|
|
||
|
The threat and impact of fire shall be taken into consideration when
|
||
|
|
||
|
planning dedicated electronic systems installations.
|
||
|
|
||
|
|
||
|
|
||
|
4.3 Services
|
||
|
|
||
|
|
||
|
|
||
|
The security of services and especially electric light and power
|
||
|
|
||
|
should be considered where appropriate during the siting of electronic
|
||
|
|
||
|
system installations. Provisions may need to be made to cater for a
|
||
|
|
||
|
growth in requirements.
|
||
|
|
||
|
|
||
|
|
||
|
4.3.1 Electrical power
|
||
|
|
||
|
|
||
|
|
||
|
Standby power sources should be available for all systems where
|
||
|
|
||
|
availability has been identified as important. Any emergency power
|
||
|
|
||
|
supplies should provide no-break protection otherwise data will be
|
||
|
|
||
|
corrupted during switching. It should be tested regularly and there
|
||
|
|
||
|
should be sufficient fuel available. When the power load of a unit is
|
||
|
|
||
|
extended, checks should be carried out to ensure the power of the
|
||
|
|
||
|
standby source is sufficient.
|
||
|
|
||
|
|
||
|
|
||
|
Standby power should be invoked not only in the event of total
|
||
|
|
||
|
disruption of primary power, but also at any time that primary power
|
||
|
|
||
|
falls outside (above or below) the equipment manufacturer's
|
||
|
|
||
|
specification. Standby power should also be available to ensure
|
||
|
|
||
|
continued operation of all security monitoring and access control
|
||
|
|
||
|
devices. The provision of adequate monitoring facilities should enable
|
||
|
|
||
|
switch over to occur before the equipment manufacturer's specification
|
||
|
|
||
|
is exceeded.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 4.3: EMERGENCY POWER SUPPLY
|
||
|
|
||
|
|
||
|
|
||
|
Electronic systems shall be safeguarded from the threat of disrupted
|
||
|
|
||
|
electric power by the provision of standby power facilities where
|
||
|
|
||
|
appropriate.
|
||
|
|
||
|
|
||
|
|
||
|
Power supplies used for systems containing high-sensitivity or
|
||
|
|
||
|
high-availability applications and data must be monitored periodically
|
||
|
|
||
|
to ensure sufficient quality of power for the safe and reliable
|
||
|
|
||
|
operation of these systems. Computer systems are extremely sensitive
|
||
|
|
||
|
to the quality of power delivered. Good grounding, "clean" isolated
|
||
|
|
||
|
power (no transient voltage spikes, brownouts, sags, intermittent
|
||
|
|
||
|
losses) and reliable connections and cabling are essential.
|
||
|
|
||
|
Preferably, these should be verified prior to the installation of a
|
||
|
|
||
|
system. For all applicable systems, the power conditions should be
|
||
|
|
||
|
measured at the point where power is applied to the system cabinets or
|
||
|
|
||
|
boxes. Periodic checks should be supplemented by checks done when
|
||
|
|
||
|
known power conditions change due to modifications in electrical
|
||
|
|
||
|
supply or load.
|
||
|
|
||
|
|
||
|
|
||
|
Power distribution panels, cabinets and rooms must be considered
|
||
|
|
||
|
sensitive areas and protected appropriately.
|
||
|
|
||
|
|
||
|
|
||
|
4.3.2 Maintenance of local environments
|
||
|
|
||
|
|
||
|
|
||
|
For electronic systems requiring a controlled environment (temperature
|
||
|
|
||
|
and humidity) main and standby air conditioning facilities should also
|
||
|
|
||
|
be provided. Any vents to the outside should also be physically
|
||
|
|
||
|
secured to prevent intruders.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 4.4: MAINTENANCE OF LOCAL ENVIRONMENT
|
||
|
|
||
|
|
||
|
|
||
|
The threat of electronic systems operating outside of their specified
|
||
|
|
||
|
temperature and humidity ranges shall be minimised by provision of
|
||
|
|
||
|
adequate equipment
|
||
|
|
||
|
|
||
|
|
||
|
4.4 Electronic system equipment sign posting
|
||
|
|
||
|
|
||
|
|
||
|
The location of electronic system equipment within a building, for
|
||
|
|
||
|
example connection points, communications frames, has a direct effect
|
||
|
|
||
|
on the overall security arrangements and must be considered carefully.
|
||
|
|
||
|
|
||
|
|
||
|
Ideally, computer and electronic systems should be located above
|
||
|
|
||
|
ground level, but below the top floor and away from exterior windows.
|
||
|
|
||
|
It is preferable that the installation should be windowless and with
|
||
|
|
||
|
no equipment visible from outside the building. Windows not only
|
||
|
|
||
|
represent a security hazard but also can have an adverse effect on
|
||
|
|
||
|
environmental controls. All external signposts of the facility or
|
||
|
|
||
|
obvious displays should be minimised.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 4.5: SIGN POSTING OF ELECTRONIC SYSTEMS
|
||
|
|
||
|
|
||
|
|
||
|
Buildings housing electronic systems shall not be obviously marked or
|
||
|
|
||
|
signposted.
|
||
|
|
||
|
|
||
|
|
||
|
4.5 Physical access control strategy
|
||
|
|
||
|
|
||
|
|
||
|
General site security is never a substitute for control of direct
|
||
|
|
||
|
access to the electronic system installation, which must always be a
|
||
|
|
||
|
secure area in its own right.
|
||
|
|
||
|
|
||
|
|
||
|
Physical security is enhanced by enforcing several layers of defence,
|
||
|
|
||
|
often called 'Defence in depth'. Access to the site should be
|
||
|
|
||
|
controlled through a manned station which, in turn, regulates entry to
|
||
|
|
||
|
buildings specifically those housing important electronic systems.
|
||
|
|
||
|
Further access controls can then be enforced at the entrance to the
|
||
|
|
||
|
general computing area, and again at the doors to rooms containing the
|
||
|
|
||
|
computer and electronic systems, communications plant and media
|
||
|
|
||
|
library.
|
||
|
|
||
|
|
||
|
|
||
|
In summary, access to the actual computing and electronic system
|
||
|
|
||
|
facility must not be possible except
|
||
|
|
||
|
|
||
|
|
||
|
o past a manned station, or
|
||
|
|
||
|
o through locked doors requiring speciat keys or codes to open.
|
||
|
|
||
|
|
||
|
|
||
|
To ensure compliance with a system security policy it may be a
|
||
|
|
||
|
requirement that sensitive systems are separated physically as well as
|
||
|
|
||
|
logically.
|
||
|
|
||
|
|
||
|
|
||
|
For more specific advice and guidance, refer to the Physical Securiy
|
||
|
|
||
|
Handbook.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 4.6: PHYSICAL ACCESS CONTROLS
|
||
|
|
||
|
|
||
|
|
||
|
In the design of systems, physical access controls shall be
|
||
|
|
||
|
implemented so as to prevent unauthorised access to sensitive areas.
|
||
|
|
||
|
|
||
|
|
||
|
Small installations which cannot economically justify a manned station
|
||
|
|
||
|
but use access control methods shall record the issue and receipt of
|
||
|
|
||
|
keys, and, where oractical, their use.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 4.7: SECURITY OF UNATTENDED BUILDING
|
||
|
|
||
|
|
||
|
|
||
|
Sensitive installations in unattended buildings should be physically
|
||
|
|
||
|
secure and alarmed through to an alarm monitoring station.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 4.8: PHYSICAL SECURlTY HANDBOOK
|
||
|
|
||
|
|
||
|
|
||
|
In the planning of accommodation and siting of electronic systems
|
||
|
|
||
|
attention shall be paid to the recommendations and guidance documented
|
||
|
|
||
|
in the Physical Security Handbook.
|
||
|
|
||
|
|
||
|
|
||
|
4.5.1 Access to secure areas
|
||
|
|
||
|
|
||
|
|
||
|
Subject to fire regulations, there should be a minimum number of
|
||
|
|
||
|
physical access points to the secure area housing the electronic
|
||
|
|
||
|
system installation, preferably one usual portal and one emergency
|
||
|
|
||
|
exit, the latter opening outwards only from the installation.
|
||
|
|
||
|
|
||
|
|
||
|
Even if authorised staff are present in the vicinity of computer and
|
||
|
|
||
|
electronicsystems, all routes of entry should normally be locked; the
|
||
|
|
||
|
use of self-closing and self-locking doors is recommended.
|
||
|
|
||
|
|
||
|
|
||
|
4.5.2 Data cabinets and safes
|
||
|
|
||
|
|
||
|
|
||
|
In addition to the access controls, physical protection for the data
|
||
|
|
||
|
itself must be provided. A Data Cabinet or Data Safe is used to
|
||
|
|
||
|
protect magnetic media against hazards such as Fire, Dust, Pilferage,
|
||
|
|
||
|
Accidental or Malicious damage and the effects of water from
|
||
|
|
||
|
sprinklers. Where the information recorded on the magnetic media
|
||
|
|
||
|
warrants a higher level of physical security, the Data Cabinet or Safe
|
||
|
|
||
|
should be kept in a Strongroom or a proprietary Security Safe.
|
||
|
|
||
|
|
||
|
|
||
|
IN CONFIDENCE and encrypted IN STRICTEST CONFIDENCE marked media may
|
||
|
|
||
|
be stored in Data Cabinets, provided correct procedures are in force
|
||
|
|
||
|
for the control of the data cabinet keys or combination locks.
|
||
|
|
||
|
Unencrypted IN STRICTEST CONFIDENCE marked media may also be stored
|
||
|
|
||
|
on an occasional basis. For regular storage of small quantities of IN
|
||
|
|
||
|
CONFIDENCE or unencrypted IN STRICTEST CONFIDENCE marked media, a data
|
||
|
|
||
|
insert for filing cabinets is available which may be used to store
|
||
|
|
||
|
such media in approved security furniture.
|
||
|
|
||
|
|
||
|
|
||
|
For further advice, refer to the Information Security Code.
|
||
|
|
||
|
|
||
|
|
||
|
There are standing arrangements for the purchase of Data Safes; refer
|
||
|
|
||
|
to Chapter 10 for further information.
|
||
|
|
||
|
|
||
|
|
||
|
4.6 Personnel access
|
||
|
|
||
|
|
||
|
|
||
|
4.6.1 Staff, official visitors and other personnel
|
||
|
|
||
|
|
||
|
|
||
|
Access to sensitive computer and electronic system installations
|
||
|
|
||
|
should be allowed only to those with a genuine need to perforrn their
|
||
|
|
||
|
duties. Other personnel (maintenance engineers, cleaners) must conform
|
||
|
|
||
|
with a formal logging procedure for entry. They should be accompanied
|
||
|
|
||
|
at all times. A visitor remains the responsibility of the host for the
|
||
|
|
||
|
duration of the visit.
|
||
|
|
||
|
|
||
|
|
||
|
All personnel, including visitors and non-BT staff such as cleaners
|
||
|
|
||
|
and maintenance engineers, must be issued with passcards. The style of
|
||
|
|
||
|
the passcards should be such that the bearer can be identified as
|
||
|
|
||
|
regular staff or a visitor, as such, the passcard must be displayed
|
||
|
|
||
|
clearly at all times whilst within the building.
|
||
|
|
||
|
|
||
|
|
||
|
Special consideration should be given to controlling the access of
|
||
|
|
||
|
ancillary personnel such as cleaners and service engineers (BT and
|
||
|
|
||
|
non-B. Temporary changes such as building work or accommodation moves
|
||
|
|
||
|
must not be used to justify a relaxation in procedures. Special
|
||
|
|
||
|
arrangements should be made to accommodate these.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 4.9: PERSONNEL IN SENSITIVE AREAS
|
||
|
|
||
|
|
||
|
|
||
|
Only authorised people shall have access to sensitive areas.
|
||
|
|
||
|
Procedures shall be in place and maintained to control the access of
|
||
|
|
||
|
external maintenance engineers or other personnel.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 4.10: MANAGEMENT AND USE OF PASSCARDS
|
||
|
|
||
|
|
||
|
|
||
|
Passcards shall be issued and worn at all times. Their style shall be
|
||
|
|
||
|
such as to enable a clear distinction between regular staff, BT and
|
||
|
|
||
|
non-BT visitors.
|
||
|
|
||
|
|
||
|
|
||
|
For specific advice and guidance, the Information Security Code applies.
|
||
|
|
||
|
|
||
|
|
||
|
4.6.2 'General interest' visits
|
||
|
|
||
|
|
||
|
|
||
|
Although BT wishes to maintain good relations with the community,
|
||
|
|
||
|
general visitors are not permitted into operational computer centres.
|
||
|
|
||
|
Visits to associated premises may be permitted but should not be
|
||
|
|
||
|
actively encouraged. Any request for a visit should be considered on
|
||
|
|
||
|
its merits by local management.
|
||
|
|
||
|
|
||
|
|
||
|
When a visit is arranged, the following measures must be taken to
|
||
|
|
||
|
minimise the risk:
|
||
|
|
||
|
|
||
|
|
||
|
1 Formal entry and exit procedures must be scrupulously followed.
|
||
|
|
||
|
|
||
|
|
||
|
2 Visitors must be issued with passcards.
|
||
|
|
||
|
|
||
|
|
||
|
3 Parties must be organised so that they are of manageable size so as
|
||
|
|
||
|
to ensure that all visitors are accompanied and supervised at all
|
||
|
|
||
|
times. A ratio of five visitors to each BT guide one of whom must be
|
||
|
|
||
|
at least a level 2 manager (MPG4), is suggested.
|
||
|
|
||
|
|
||
|
|
||
|
4 The route and timetable must be preplanned and strictly followed so
|
||
|
|
||
|
as to avoid all sensitive areas.
|
||
|
|
||
|
|
||
|
|
||
|
5 Areas of work which are demonstrated must be selected to avoid close
|
||
|
|
||
|
up viewing of sensitive information (such as logging on procedures,
|
||
|
|
||
|
network access numbers and customer data) .
|
||
|
|
||
|
|
||
|
|
||
|
6 Staff must be given adequate warning of impending visits so that
|
||
|
|
||
|
sensitive material and access methods can be concealed.
|
||
|
|
||
|
|
||
|
|
||
|
7 Passwords must be changed after any such visit if it is considered
|
||
|
|
||
|
that any have been compromised.
|
||
|
|
||
|
|
||
|
|
||
|
8 Any handouts must have been authorised by the local manager in
|
||
|
|
||
|
accordance with the Information Security Code.
|
||
|
|
||
|
|
||
|
|
||
|
9 The carrying by visitors of cameras and electronic devices capable
|
||
|
|
||
|
of interference with computer systems must be prohibited.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 4.11: GENERAL INTEREST VISlTS
|
||
|
|
||
|
|
||
|
|
||
|
Local rules governing visitors and visits shall be documented.
|
||
|
|
||
|
Visitors shall be guided so as to exclude them from all sensitive
|
||
|
|
||
|
areas. Refer to the Physical Security Handbook for guidance.
|
||
|
|
||
|
|
||
|
|
||
|
4.7 System or master consoles
|
||
|
|
||
|
|
||
|
|
||
|
Controls against unauthorised activity are essential on electronic
|
||
|
|
||
|
access to computer and electronic system facilities, in particular
|
||
|
|
||
|
over communications links but also to computer and electronic system
|
||
|
|
||
|
consoles. System or master consoles usually provide access to highly
|
||
|
|
||
|
privileged activities, for example system administration and software
|
||
|
|
||
|
or machine maintenance; others may provide enhanced operator
|
||
|
|
||
|
privileges necessary for efficient machine usage.
|
||
|
|
||
|
|
||
|
|
||
|
Master consoles must be located in the most physically secure
|
||
|
|
||
|
environment available within the computer and electronic system
|
||
|
|
||
|
building complex to prevent unauthorised use of the console. The
|
||
|
|
||
|
consoles must be sited so that use may not be overlooked and cabled so
|
||
|
|
||
|
that their traffic cannot be intercepted.
|
||
|
|
||
|
|
||
|
|
||
|
Access to master consoles must be restricted and all operations
|
||
|
|
||
|
recorded. The log or journal should be regularly scrutinised to
|
||
|
|
||
|
identify any signs of irregular or unauthorised usage.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 4.12: USE OF SYSTEM CONSOLES
|
||
|
|
||
|
|
||
|
|
||
|
Procedures concerning the proper use of primary system consoles or
|
||
|
|
||
|
system terminals shall be documented and the application of those
|
||
|
|
||
|
procedures enforced.
|
||
|
|
||
|
|
||
|
|
||
|
4.8 Other terminals
|
||
|
|
||
|
|
||
|
|
||
|
Terminals outside the computer and electronic system room should not
|
||
|
|
||
|
have access to operator or other special privileges. Other users which
|
||
|
|
||
|
might need access to privileged commands might include software
|
||
|
|
||
|
support groups, network management groups and remote software
|
||
|
|
||
|
engineers. If privileged access is required, and the temporary use of
|
||
|
|
||
|
a terminal other than the primary or system console cannot be avoided,
|
||
|
|
||
|
its use should be strictly controlled, supervised and, in some
|
||
|
|
||
|
circumstances, audited.
|
||
|
|
||
|
|
||
|
|
||
|
Terminals located in non-BT buildings deserve special attention to
|
||
|
|
||
|
ensure that their use cannot compromise the security of BT systems to
|
||
|
|
||
|
which they may be connected.
|
||
|
|
||
|
|
||
|
|
||
|
4.9 Communications rooms and equipment
|
||
|
|
||
|
|
||
|
|
||
|
All communications equipment must be sited in a physically secure
|
||
|
|
||
|
environment within the installation and must be subject to their own
|
||
|
|
||
|
restricted access controls. Where it is not possible to locate
|
||
|
|
||
|
communications equipment within dedicated accommodation then the
|
||
|
|
||
|
equipment itself should be physically secured in purpose built
|
||
|
|
||
|
lockable furniture.
|
||
|
|
||
|
|
||
|
|
||
|
Cable entry points, risers and runs shall be provided with adequate
|
||
|
|
||
|
protection to prevent unauthorised access, and accidental or
|
||
|
|
||
|
deliberate damage.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 4.13: COMMUNICATIONS EQUIPMENT PHYSICAL SECURITY
|
||
|
|
||
|
|
||
|
|
||
|
Communications equipment shall be located in its own secure
|
||
|
|
||
|
environment or in secure furniture and subject to restricted access
|
||
|
|
||
|
control appropriate to the sensitivity of the data being communicated.
|
||
|
|
||
|
|
||
|
|
||
|
4.10 Media libraries and disaster stores
|
||
|
|
||
|
|
||
|
|
||
|
Special care must be taken to safeguard media libraries and disaster
|
||
|
|
||
|
stores. Data held in a compact form is particularly vulnerable to
|
||
|
|
||
|
accidental or malicious damage and its security depends on physical
|
||
|
|
||
|
protective measures, access control and staff reliability.
|
||
|
|
||
|
|
||
|
|
||
|
Both the media library and the disaster store must be restricted to
|
||
|
|
||
|
specifically authorised staff.
|
||
|
|
||
|
|
||
|
|
||
|
The disaster store must be sited so that it will be unaffected by any
|
||
|
|
||
|
incident at the computer centre. It must also be sited so that the
|
||
|
|
||
|
contents are not affected by strong electromagnetic influences. See
|
||
|
|
||
|
the Physical Security Handbook for further guidance.
|
||
|
|
||
|
|
||
|
|
||
|
POLICY 4.14: DISASTER STORE
|
||
|
|
||
|
|
||
|
|
||
|
Any disaster store shall be physically protected and remote from the
|
||
|
|
||
|
computer centre. Access to the store shall be governed by local
|
||
|
|
||
|
operational instructions.
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
+++
|
||
|
|
||
|
EOF
|
||
|
|
||
|
=============================================================================
|
||
|
|
||
|
PHUK MAGAZINE - Phile 9 of 10
|
||
|
|
||
|
=============================================================================
|
||
|
|
||
|
|
||
|
|
||
|
---------------
|
||
|
|
||
|
Notes & Queries
|
||
|
|
||
|
---------------
|
||
|
|
||
|
|
||
|
|
||
|
Note: Notes & Queries is the section where the readers send in any
|
||
|
|
||
|
questions, problems etc that they might have, and other readers can
|
||
|
|
||
|
send in the answers. Obviously, in the first issue of a magazine, this
|
||
|
|
||
|
is not going to work!! However, just to be a pain in the arse, and
|
||
|
|
||
|
just to pad out this section, we have gone to all the trouble to ....
|
||
|
|
||
|
... make some up!!!
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
Q: Does anyone have a full list of BT Star services?
|
||
|
|
||
|
|
||
|
|
||
|
A: It just so happens that I do .....
|
||
|
|
||
|
|
||
|
|
||
|
------------------------------------------------------------------------------
|
||
|
|
||
|
SYSTEM X STAR SERVICES - QUICK REFERENCE SHEET
|
||
|
|
||
|
------------------------------------------------------------------------------
|
||
|
|
||
|
Divert all calls *21*TEL NO# #21# TO CANCEL
|
||
|
|
||
|
Divert on busy *67*TEL NO# #67# TO CANCEL
|
||
|
|
||
|
Divert on no reply *61*NUMBER# #61# TO CANCEL
|
||
|
|
||
|
------------------------------------------------------------------------------
|
||
|
|
||
|
Bar incoming calls *261# #261# TO CANCEL
|
||
|
|
||
|
Bar outgoing call *34X# ; x below: OLD -CODES- NEW
|
||
|
|
||
|
Stop all but 999 & 151 N/A 1
|
||
|
|
||
|
Stop national/international N/A 2
|
||
|
|
||
|
Stop calls starting "0" (non-local) 2 N/A
|
||
|
|
||
|
Stop international "010" 3 3
|
||
|
|
||
|
Stop operator calls/services NOT 151 4 4
|
||
|
|
||
|
Stop star services except this one! 5 5
|
||
|
|
||
|
|
||
|
|
||
|
Cancel outgoing call barring #34X*KEYWORD#
|
||
|
|
||
|
To check outgoing call barring *#34#
|
||
|
|
||
|
------------------------------------------------------------------------------
|
||
|
|
||
|
Storing a code calling number *51*CODE*NUMBER#
|
||
|
|
||
|
Checking a stored code *#51*CODE#
|
||
|
|
||
|
Dialling a stored number **CODE
|
||
|
|
||
|
Repeat Last Called Number **00
|
||
|
|
||
|
------------------------------------------------------------------------------
|
||
|
|
||
|
Reminder call *55*TIME# #55# TO CANCEL
|
||
|
|
||
|
Reminder call (DAY) *56*TIME*X# #56*TIME*X# CANCELS
|
||
|
|
||
|
x=1-Mon, 2-Tue, 3-Wed, 4-Thu, 5-Fri, 6-Sat, 7-Sun, 8-Mon-Fri, 9-Every
|
||
|
|
||
|
Check what reminder calls are active *#56#
|
||
|
|
||
|
------------------------------------------------------------------------------
|
||
|
|
||
|
To hold caller one and make call 2 [R] NUMBER
|
||
|
|
||
|
Shuttle between (holding other) [R] 2
|
||
|
|
||
|
Open a three way conversation [R] 3
|
||
|
|
||
|
End call with current, shuttle to other [R] 1
|
||
|
|
||
|
Disconnect from caller 1 on a three way [R] 5
|
||
|
|
||
|
Disconnect from caller 2 on a three way [R] 7
|
||
|
|
||
|
------------------------------------------------------------------------------
|
||
|
|
||
|
Call waiting *43# #43# TO CANCEL
|
||
|
|
||
|
Reject an incoming call [R] 0
|
||
|
|
||
|
Take a waiting call (After current call) [R] 1
|
||
|
|
||
|
Take a waiting call (hold current caller) [R] 2
|
||
|
|
||
|
Shuttle between callers [R] 2
|
||
|
|
||
|
------------------------------------------------------------------------------
|
||
|
|
||
|
Advice on call cose *40*TEL NO#
|
||
|
|
||
|
Set up for all calls *411# #411# TO CANCEL
|
||
|
|
||
|
------------------------------------------------------------------------------
|
||
|
|
||
|
Check on services currently operating *#001# (Sys X only)
|
||
|
|
||
|
------------------------------------------------------------------------------
|
||
|
|
||
|
|
||
|
|
||
|
--
|
||
|
|
||
|
|
||
|
|
||
|
Q: In the light of the recent BT "hacking" case can anyone tell me
|
||
|
|
||
|
the difference between what the media call "hacking" and what the
|
||
|
|
||
|
lawyers call "Breach of Confidentiality"?
|
||
|
|
||
|
|
||
|
|
||
|
A: Um, No! Can any of our more legal-eagle style readers please
|
||
|
|
||
|
enlighten us?
|
||
|
|
||
|
|
||
|
|
||
|
--
|
||
|
|
||
|
|
||
|
|
||
|
Q: In the light of the recent BT "hacking" case, I was just
|
||
|
|
||
|
wondering, what WAS the oh-so-secret telephone number for the
|
||
|
|
||
|
Queen?
|
||
|
|
||
|
|
||
|
|
||
|
A: Last time I looked the Queen's telephone number was 071-445-2865,
|
||
|
|
||
|
oh and by the way, that oh-so-secret MI5 number was probably
|
||
|
|
||
|
0800-894-410, because they gave everyone a hard time when you rang
|
||
|
|
||
|
it!! (Let's just say that they got all secretive and asked where we
|
||
|
|
||
|
had got this number ......) Just remember ... PHUK magazine ...you
|
||
|
|
||
|
heard it here LAST!!!
|
||
|
|
||
|
|
||
|
|
||
|
--
|
||
|
|
||
|
|
||
|
|
||
|
Q: Can you make up anymore stupid questions before everyone gets
|
||
|
|
||
|
bored?
|
||
|
|
||
|
|
||
|
|
||
|
A: No, we can't! That's why we want YOU the reader to send your
|
||
|
|
||
|
questions and answers to us, at anon93143@anon.penet.fi .... so that
|
||
|
|
||
|
we have more to publish and can keep phukmag goin with the minimum of
|
||
|
|
||
|
effort on our part (of course) so that we can spend more time playing
|
||
|
|
||
|
with computers and less time asking people for the articles they
|
||
|
|
||
|
promised 3 months ago ......
|
||
|
|
||
|
|
||
|
|
||
|
+++
|
||
|
|
||
|
EOF
|
||
|
|
||
|
=============================================================================
|
||
|
|
||
|
PHUK MAGAZINE - Phile 10 of 10
|
||
|
|
||
|
=============================================================================
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
|
||
|
-----
|
||
|
|
||
|
OUTRO
|
||
|
|
||
|
-----
|
||
|
|
||
|
|
||
|
|
||
|
Well, its been fun hasn't it? What's that I hear you say? It hasn't!
|
||
|
|
||
|
What the articles were too biased towards phones and not enough
|
||
|
|
||
|
hacking? You thought the articles were feeble? You think you could do
|
||
|
|
||
|
better!!
|
||
|
|
||
|
|
||
|
|
||
|
Well thats more like it .... if you think you can do better than the
|
||
|
|
||
|
articles in PHUK-zine then write them and send them to us. We always
|
||
|
|
||
|
need snippets of news, articles, code, numbers, hints, tips and
|
||
|
|
||
|
general ideas to keep the ball rolling.
|
||
|
|
||
|
|
||
|
|
||
|
Anyhow, next month we have the following goodies for you ....
|
||
|
|
||
|
|
||
|
|
||
|
Green Boxing - DrKaos & TheGoat
|
||
|
|
||
|
BT Computer Security Manual Part II
|
||
|
|
||
|
Something on Novell Networks ...
|
||
|
|
||
|
Some trash from BT wastebins ....
|
||
|
|
||
|
And maybe something on hacking for a change ....:)
|
||
|
|
||
|
|
||
|
|
||
|
Send all articles, flames, Letters of Comment etc etc to PHUK
|
||
|
|
||
|
magazine, anon93143@anon.penet.fi, OR speak to any of the PHUK crew
|
||
|
|
||
|
at any London 2600 meeting .........
|
||
|
|
||
|
|
||
|
|
||
|
- have PHUN and be careful out there ... it a dangerous world and
|
||
|
|
||
|
getting worse by the minute!
|
||
|
|
||
|
|
||
|
|
||
|
- Phuk-Ed
|
||
|
|
||
|
|
||
|
|
||
|
+++
|
||
|
|
||
|
EOF
|
||
|
|
||
|
|
||
|
|
||
|
.
|
||
|
|