898 lines
40 KiB
Plaintext
898 lines
40 KiB
Plaintext
|
||
|
||
****************************************************************************
|
||
>C O M P U T E R U N D E R G R O U N D<
|
||
>D I G E S T<
|
||
*** Volume 2, Issue #2.11 (November 13, 1990) **
|
||
*** SPECIAL ISSUE: SEARCH AFFIDAVIT FOR STEVE JACKSON GAMES ***
|
||
****************************************************************************
|
||
|
||
MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
|
||
ARCHIVISTS: Bob Krause / Alex Smith / Brendan Kehoe
|
||
USENET readers can currently receive CuD as alt.society.cu-digest.
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views. CuD material may be reprinted as long as the source is
|
||
cited. It is assumed that non-personal mail to the moderators may be
|
||
reprinted, unless otherwise specified. Readers are encouraged to submit
|
||
reasoned articles relating to the Computer Underground.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
DISCLAIMER: The views represented herein do not necessarily represent the
|
||
views of the moderators. Contributors assume all responsibility
|
||
for assuring that articles submitted do not violate copyright
|
||
protections.
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
The application and affidavit for the search warrant for Steve Jackson
|
||
Games (Case #A-90-54m), dated February 28, 1990, and signed by U.S.
|
||
Magistrate Stephen H. Capelle in Austin Texas and Special Agent Timothy M.
|
||
Foley of the U.S. Secret Service, has been released. The application
|
||
alleges violations of Title 18 USC Sections 2314 and 1030 and was issued in
|
||
the U.S. District Court (Western District of Texas).
|
||
|
||
We have retyped it, and there may be some typographical errors, but we have
|
||
done our best to recreate it as is.
|
||
|
||
There are several features about the affidavit. First, the bulk of it is
|
||
repititious and simply establishes the credentials of the investigators,
|
||
summarizes basic terms, and provides general background that seems
|
||
inconsequential in linking the persons to be searched to any substantive
|
||
criminal activity. It should also be remembered that the "$79,449.00"
|
||
document in question was shown to contain nothing of substance that is not
|
||
available to the general public for under $14. Further, to our knowledge,
|
||
there is no evidence, contrary to suggestions, that E911 software was
|
||
obtained.
|
||
|
||
Most troublesome is the interpretation given to attached logs from The
|
||
Phoenix Project that creates a conspiratorial scenario from a few ambiguous
|
||
messages. While imaginative use of narrative is admirable in fiction, its
|
||
use as a weapon of power is dangerous. At root, Steve Jackson Games was
|
||
raided because an employee ran a BBS that made available, as perhaps
|
||
thousands of others BBSs nationwide, Phrack. The employee was also accused
|
||
of being part of a "fraud scheme" because he had the temerity to explain
|
||
what a Kermit protocol is in a two line message.
|
||
|
||
Perhaps Agent Foley is competent, but in reviewing this warrant questions
|
||
arise regarding the raid on SJG that should not go unanswered.
|
||
|
||
++++++++++++++++++++++++++++
|
||
|
||
ATTACHMENT A
|
||
|
||
2700 "A" Metcalfe Road is located in the city of Austin, State
|
||
of Texas, County of Travis. Said address is a two-story square
|
||
building measuring approximately 50 feet on a side located on the
|
||
south side of Metcalfe Street.
|
||
|
||
The bottom story is multi-colored brick face and the upper
|
||
story is white wood frame construction.
|
||
|
||
A balcony surrounds the upper story. The address "2700A" is
|
||
on two sides in white letters, and the numbers are approximately
|
||
ten inches high. An outside wooden stairway connects the floors
|
||
on the south side of the building. The driveway is of gravel. A
|
||
large all-metal warehouse-type building is immediately behind the
|
||
address.
|
||
|
||
(End Attachment A)
|
||
|
||
++++++++++++++++
|
||
|
||
ATTACHMENT B
|
||
|
||
Computer hardware (including, but not limited to, central
|
||
processing unit(s), monitors, memory devices, modem(s), programming
|
||
equipment, communication equipment, disks, and prints) {sic} and computer
|
||
software (including but not limited to, memory disks, floppy
|
||
disks, storage media) and written material and documents relating
|
||
to the use of the computer system (including networking access
|
||
files), documentation relating to the attacking of computers and
|
||
advertising the results of computer attacks (including telephone
|
||
numbers and licensing documentation relative to the computer programs and
|
||
equipment at the business known as Steve Jackson Games which
|
||
constitute evidence, instrumentalities and fruits of federal
|
||
crimes, including interstate transportation of stolen property (18
|
||
USC 2314) and interstate transportation of computer access
|
||
information (18 USC 1030 (a)(6)). This warrant is for the seizure
|
||
of the above described computer and computer data and for the
|
||
authorization to read information stored and contained on the above
|
||
described computer and computer data.
|
||
|
||
(End Attachment b)
|
||
|
||
++++++++++++++++++++++++
|
||
|
||
State of Texas )
|
||
) ss
|
||
County of Travis )
|
||
|
||
AFFIDAVIT
|
||
|
||
1. I, Timothy Foley, am a Special Agent of the United States
|
||
Secret Service and have been so employed for the past two years.
|
||
I am presently assigned to the United States Secret Service in
|
||
Chicago. Prior to that I was employed as an attorney practicing
|
||
in the City of Chicago and admitted to practice in the State of
|
||
Illinois. I am submitting this affidavit in support of the search
|
||
warrants for the premises known as: (a) the residence of Loyd Dean
|
||
Blankenship, 1517G Summerstone, Austin, Texas; (b) the employment
|
||
location of Blankenship, the business known as Steve Jackson Games,
|
||
2700-A Metcalfe Road, Austin Texas; and (c) the residence of Chris
|
||
Goggans, 3524 Graystone #192, Austin, Texas.
|
||
|
||
SOURCES OF INFORMATION
|
||
|
||
2. This affidavit is based on my investigation and
|
||
information provided to me by Special Agent Barbara Golden of the
|
||
Computer Fraud Section of the United States Secret Service in
|
||
Chicago and by other agents of the United States Secret Service.
|
||
3.I have also received technical information and
|
||
investigative assistance from the experts in the fields of
|
||
telecommunications, computer technology, software development and
|
||
computer security technology, including:
|
||
a. Reed Newlin, a Security Officer of Southwestern
|
||
Bell, who has numerous years of experience in operations,
|
||
|
||
- 1 -
|
||
|
||
maintenance and administration of telecommunications systems as an
|
||
employee of the Southwestern Bell Telephone Company.
|
||
b. Henry M. Kluepfel, who has been employed by the Bell
|
||
System or its divested companies for the last twenty-four years.
|
||
Mr. Kluepfel is presently employed by Bell Communications Research,
|
||
(Bellcore) as a district manager responsible for coordinating
|
||
security technology and consultation at Bellcore in support of its
|
||
owners, the seven regional telephone companies, including Bell
|
||
South Telephone Company and Southwestern Bell Telephone Company.
|
||
Mr. Kluepfel has participated in the execution of numerous Federal
|
||
and State search warrants relative to telecommunications and
|
||
computer fraud investigations. In addition, Mr. Kluepfel has
|
||
testified on at least twelve occasions as an expert witness in
|
||
telecommunications and computer-fraud related crimes.
|
||
c. David S. Bauer, who has been employed by Bell
|
||
Communications Research (Bellcore) since April 1987. Mr. Bauer is
|
||
a member of the technical staff responsible for research and
|
||
development in computer security technology and for consultation
|
||
in support of its owners, the seven regional telephone companies,
|
||
including Bell South. Mr. Bauer is an expert in software
|
||
development, communications operating systems, telephone and
|
||
related security technologies. Mr. Bauer has conducted the review
|
||
and analysis of approximately eleven computer hacking
|
||
investigations for Bellcore. He has over nine years professional
|
||
experience in the computer related field.
|
||
|
||
- 2 -
|
||
|
||
Violations Involved
|
||
|
||
4. 18 USC 2314 provides federal criminal sanctions against
|
||
individuals who knowingly and intentionally transport stolen
|
||
property or property obtained by fraud, valued at $5,000 or more
|
||
ininterstate commerce. My investigation has revealed that on or
|
||
about February 24, 1989, Craig Neidorf transported a stolen or
|
||
fraudulently obtained computerized text file worth approximately
|
||
$79,000.000 from Columbia, Missouri, through Lockport, Illinois to
|
||
Austin, Texas to Loyd Blankenship and Chris Goggans.
|
||
5. 18 USC 1030 (a)(6) and (b) provide federal criminal
|
||
sanctions against individuals who knowingly and with intent to
|
||
defraud traffic or attempt to traffic, in interstate commerce, in
|
||
passwords or similar information through which a computer may be
|
||
accessed without authorization. My investigation has revealed that
|
||
on or about January 30, 1990, Loyd Blankenship and Chris Goggans
|
||
attempted to traffic in illegally obtained encrypted passwords
|
||
received from other computer hackers. My investigation has further
|
||
revealed that, through the use of sophisticated decryption
|
||
equipment and software, they planned to decrypt the encrypted
|
||
passwords provided by the hackers. They then planned to provide
|
||
the original hackers with the decrypted passwords which they in
|
||
turn could use to illegally access previously guarded computers.
|
||
|
||
DEFINITIONS
|
||
|
||
6. COMPUTER HACKERS/INTRUDERS - Computer hackers or
|
||
intruders are individuals involved with the unauthorized access of
|
||
computer systems by various means. The assumed names used by the
|
||
|
||
- 3 -
|
||
|
||
hackers when contacting each other are referred to as "hacker
|
||
handles."
|
||
7. BULLETIN BOARD SYSTEM (BBS) - A bulletin board system
|
||
(also referred to as a "Bulletin board" or "BBS") is an electronic
|
||
bulletin board accessible by computer. Users of a bulletin board
|
||
may leave messages, data, and software readable by others with
|
||
access to the bulletin board. Bulletin board readers may copy, or
|
||
"download," onto their own machines material that appears on a
|
||
bulletin board. Bulletin boards typically are created and
|
||
maintained by "systems operators" or "system administrators".
|
||
Hackers frequently use bulletin boards to exchange information and
|
||
data relating to the unauthorized use of computers.
|
||
8. E911 - E911 means the enhanced 911 telephone service in
|
||
universal use for handling emergency calls (police, fire,
|
||
ambulance, etc.) in municipalities. Dialing 911 provides the
|
||
public with direct access to a municipality's Public Safety
|
||
Answering Point (PSAP). Logistically, E911 runs on the public
|
||
telephone network with regular telephone calls into the telephone
|
||
company switch. However, incoming 911 calls are given priority
|
||
over all other calls. Then the 911 call travels on specially
|
||
dedicated telephone lines from the telephone company's switch to
|
||
the fire, police and emergency reaction departments in the city
|
||
closest to the location of the caller. It is essential for the
|
||
emergency unit to know the location of the caller, so one of the
|
||
most important parts of the system is the Automatic Location
|
||
Identifier (ALI), which automatically locates where the
|
||
|
||
- 4 -
|
||
|
||
telephone call originates, and the Automataic Number Identification
|
||
(ANI), which holds the telephone number of the calling party even
|
||
if the caller hangs up. The E911 system of Bell South is described
|
||
in the text of a computerized file program and is highly
|
||
proprietary and closely held by its owner, Bell South. The file
|
||
describes the computerized control, operation and maintenance of
|
||
the E911 system.
|
||
9. ELECTRONIC MAIL - Electronic mail, also known as
|
||
e-mail, is a common form of communication between individuals on
|
||
the same or on separate computer systems. Persons who may send or
|
||
receive electronic mail are identified by an electronic mail
|
||
address, similar to a postal address. Although a person may have
|
||
more than one electronic mail address, each mail address
|
||
identifies a person uniquely.
|
||
10. LEGION OF DOOM - At all times relevant herein, the Legion
|
||
of Doom, (LOD), was a closely knit group of computer hackers
|
||
involved in:
|
||
a. Disrupting telecommunications by entering telephone
|
||
switches and changing the routing on the circuits of the computers.
|
||
b. Stealing propriety {sic} computer source code and
|
||
information from individuals that owned the code and information
|
||
c. Stealing credit information on individuals from
|
||
credit bureau computers.
|
||
d. Fraudulently obtaining money and property from
|
||
companies by altering the computerized information used by the
|
||
companies.
|
||
|
||
- 5 -
|
||
|
||
e. Disseminating information with respect to their
|
||
methods of attacking computers to other computer hackers in an
|
||
effort to avoid the focus of law enforcement agencies and
|
||
telecommunication security experts.
|
||
11. PASSWORD ENCRYPTION - A password is a security device
|
||
that controls access to a computer, (log on privileges) or to
|
||
special portions of a computer's memory. Encryption further limits
|
||
access to a computer by converting the ordinary language and/or
|
||
numerical passwords used on a computer into cipher or code.
|
||
Decryption is the procedure used to transform coded text into the
|
||
original ordinary language and/or numerical format.
|
||
12. TRANSFER PROTOCOL - transfer protocol is a method of
|
||
transferring large files of information from one computer to
|
||
another over telephone lines. Using a transfer protocol a file is
|
||
uploaded (sent) and downloaded (received). This transfer procedure
|
||
breaks blocks of data into smaller packages for transmission and
|
||
insures that each block of data is an error free copy of the
|
||
original data. Transfer protocols may also encode and decode
|
||
transmissions to insure the privacy of the transferred information.
|
||
|
||
INVESTIGATION OVERVIEW
|
||
|
||
13. My investigation to date has disclosed that computer
|
||
hacker Robert Riggs of the Legion of Doom, (LOD), stole the highly
|
||
proprietary and sensitive Bell South E911 Practice text file from
|
||
Bell South in Atlanta, Georgia in about December, 1988 and that
|
||
|
||
- 6 -
|
||
|
||
this stolen document was distributed in "hacker" newsletters
|
||
through the use of e-mail. These newsletters included the "Phrack"
|
||
newsletter issue #24 distributed in February, 1989 by Craig Neidorf
|
||
to LOD members, including Loyd Blankenship and Chris Goggans
|
||
of Austin, Texas. The E911 Practice was posted on the "Phoenix
|
||
Project" BBS, in January, 1990, so that anyone with access to the
|
||
BBS could download a copy of the E911 Practice onto any other
|
||
computer. The "Phoenix Project" BBS is run jointly by co-systems
|
||
operators Loyd Blankenship, (hacker handle, The Mentor), and Chris
|
||
Goggans, (hacker handle, Eric {sic} Bloodaxe), who both have sent e-mail
|
||
communications identifying themselves as members of LOD. My
|
||
investigation has also disclosed that Loyd Blankenship and Chris
|
||
Goggans, through their hacker BBS "Phoenix Project," have
|
||
established a password decryption service for hackers who had
|
||
obtained encrypted passwords from computers they had been
|
||
attacking.
|
||
|
||
|
||
THEFT OF E911 TEXT FILE
|
||
14. In March, 1988, Bell South developed a sophisticated new
|
||
program which describes in great detail the operation of the E911
|
||
system and the 911 support computer in Sunrise, Florida that
|
||
controls ALI and ANI information. This program, which was
|
||
enginered at a cost of $79,449.00, was locked in a secure computer
|
||
(AIMSX) in Bell South's corporate headquarters in Atlanta, Georgia.
|
||
The document was and is highly proprietary and contained the
|
||
following warning:
|
||
|
||
- 7 -
|
||
|
||
NOTICE: NOT FOR USE OR DISCLOSURE OUTSIDE
|
||
BELL SOUTH OR ANY OF ITS SUBSIDIARIES EXCEPT
|
||
UNDER WRITTEN AGREEMENT.
|
||
15. In July, 1989, Robert Riggs apartment in Decatur, Georgia
|
||
was searched by United States Secret Service agents from Atlanta
|
||
pursuant to a federal search warrant.
|
||
16. At the time of the search, Riggs, (hacker handle, The
|
||
Prophet), was interviewed by Special Agent James Cool of the USSS-
|
||
Atlanta and representatives of Bell South from Atlanta. During
|
||
this extensive interview, Riggs admitted that he illegally gained
|
||
remote access into Bell South's AIMSX computer through an account
|
||
to which access was not secured by a password, and that once on the
|
||
machine he executed a program designed to search for passwords and
|
||
to obtain other account names on the computer. He stated that once
|
||
he was on the computer, he found the E911 protocol document and
|
||
downloaded it from the Bell South computer to his home computer.
|
||
He subsequently uploaded the E911 file from his home computer to
|
||
a computer bulletin board. (He did not give the agents the name
|
||
of the bulletin board).
|
||
17. Riggs' admissions were corroborated by interviews with
|
||
Rich Andrews, the operator of the computer bulletin board known as
|
||
JOLNET BBS in Lockport, Illinois. Andrews disclosed that in about
|
||
January, 1989, a hacker known to him by the handle PROPHET uploaded
|
||
an E911 program with bell South proprietary markings onto his BBS.
|
||
This program was then downloaded from the BBS to another hacker
|
||
known to him by the handle Knight Lightning (Craig Neidorf).
|
||
|
||
- 8 -
|
||
|
||
PHRACK PUBLICATION
|
||
18. On January 18, 1990, pursuant to a federal grand jury
|
||
subpoena, I received documents from the administration of the
|
||
University of Missouri regarding computer publications of Craig
|
||
Neidorf, a student at University of Missouri and Randly Tishler, a
|
||
former student at University of Missouri, (hacker handle, Taran
|
||
King), which showed that Neidorf and Tishler were publishing the
|
||
computer hacker newsletter entitled "Phrack" which they were
|
||
distributing to computer hackers around the United States through
|
||
the use of the University of Missouri account on a
|
||
telecommunication network called Bitnet.
|
||
19. On January 18, 1990, Security Officer Reed Newlin of
|
||
Southwestern Bell Telephone and I interviewed Craig Neidorf at the
|
||
Zeta Beta Tau Fraternity House at Columbia, Missouri. During the
|
||
course of the interview, Neidorf admitted to me and Security
|
||
Officer Newlin that he used the hacker handle Knight Lightning;
|
||
that he and Randy Tishler were the publishsers of two hacker
|
||
newsletters entitled "Phrack" and "Pirate."
|
||
20. Also during the course of this interview, Neidorf
|
||
admitted that he had a copy of a hacker tutorial regarding the
|
||
operation of the E911 system in his room. He admited that he had
|
||
edited the E911 Practice into a hacker tutorial. He also admitted
|
||
that he knew that the E911 Practice had been stolen from a
|
||
telecommunications company by Robert J. Riggs and that the
|
||
tutorial, (the edited E911 Practice File), had been published in
|
||
the Phrack newsletter issue 24. At this point of the interview,
|
||
|
||
- 9 -
|
||
|
||
Neidorf excused himself, saying he was going to his room, and he
|
||
returned moments later with a floppy disk containing the copy of
|
||
the E911 document published in Phrack magazine.
|
||
21. In addition to Neidorf's admission that he knew the E911
|
||
tutorial had been stolen, my investigation has revealed other facts
|
||
reflecting that Neidorf was aware that the E911 data received from
|
||
Riggs in Atlanta was stolen. In July, 1989, I reviewed
|
||
documentation received from Rich Andrews, the system administrator
|
||
of the JOLNET BBS. Included in the documentation was an edited
|
||
version of the E911, the document received from Neidorf, dated
|
||
January 23, 1989, which included the following notation on his
|
||
version:
|
||
NOTICE: NOT FOR USE OR DISCLOSURE OUTSIDE
|
||
BELLSOUTH OR ANY OF ITS SUBSIDIARIES EXCEPT
|
||
UNDER WRITTEN AGREEMENT. (WHOOPS)
|
||
22. Distribution records of Phrack 24 recovered from Richard
|
||
Andrews in Lockport in July 1989 reflect that copies of this
|
||
newsletter containing the proprietary E911 information and the
|
||
proprietary markings from Bell South were forwarded from Neidorf's
|
||
computer in Colombia {sic}, Missouri to Loyd Blankenship's computer in
|
||
Austin, Texas on or about February 24, 1989.
|
||
23. I have personally examined the Phrack newsletter number
|
||
24 and observed that the newsletter does in fact contain a slightly
|
||
edited copy of the stolen Bell South E911 Practice text file with
|
||
the warning:
|
||
NOTICE: NOT FOR USE OR DISCLOSURE OUTSIDE
|
||
|
||
- 10 -
|
||
|
||
BELLSOUTH OR ANY OF ITS SUBSIDIARIES EXCEPT
|
||
UNDER WRITTEN AGREEMENT. (WHOOPS)
|
||
|
||
REPUBLICATION OF E911 BY PHOENIX PROJECT
|
||
24. On February 26, 1990, Hank Kluepfel of Bellcore advised
|
||
me that the Phoenix Project BBS run by Loyd Blankenship and Chris
|
||
Goggans was in operation on January 15, 1990. Mr. Kluepfel advised
|
||
that he had made this determination by successfully logging on to
|
||
Phoenix Project at telephone number 512-441-0229 on about January
|
||
30, 1990 and observing messages dated from January 15, 1990 to
|
||
January 30, 1990, on the BBS. Mr. Kluepfel also advised me that the
|
||
BBS system information identified the Mentor and Erik Bloodaxe as
|
||
the system administrators on the BBS.
|
||
25. On February 14, 1990, Mr. Kluepfel advised me that after
|
||
accessing the Phoenix Project BBS, he had gone to the Phrack sub-
|
||
menu of the BBS and observed Phrack 24 on the menu. Mr. Kluepfel
|
||
further advised me that upon review of Phrack 24, he observed that
|
||
the Bell South E911 Practice text file was still in the edition
|
||
carried by the Phoenix Project BBS.
|
||
26. On February 14, 1990, Mr. Kluepfel advised me that he had
|
||
downloaded a copy of Phoenix Project's user list (its electronic
|
||
mailing list) and that it reflected that seeral of the hackers on
|
||
the list of users were located in the Northern District of
|
||
Illinois.
|
||
PHOENIX PROJECT DECRYPTION SERVICE
|
||
|
||
- 11 -
|
||
|
||
27. On February 14, 1990, Mr. Kluepfel advised me that on
|
||
January 23, 1990, the co-systems administrator on the Phoenix
|
||
Project BBS, Erik Bloodaxe, had published a notice that the BBS was
|
||
beginning a new decryption service. Bloodaxe invited the readers
|
||
of the newsletter to send the BBS encrypted passwords for any UNIX
|
||
or Prime computer system, and the system administrators would
|
||
decrypt the passwords and return them. Bloodaxe also indicated that
|
||
the systemes administrators would probably access the computer using
|
||
the password as well. In a later message on January 26, 1990, The
|
||
Mentor responded to a question about a transfer protocol that had
|
||
been set out, but not explained in Bloodaxe's notice, indicating
|
||
his involvement in the decryption scheme.
|
||
28. On February 14, 1990, Mr. Kluepfel advised me that the
|
||
password file decryption service offered by the Phoenix Project
|
||
provided computer hackers with information through which a computer
|
||
could be acessed without authorization under the meaning of 18 USC
|
||
1030 (a)(6) and (b) and constituted a threat to Bellcore's client
|
||
companies including Bell South.
|
||
IDENTIFICATION OF BLANKENSHIP AND GOGGANS
|
||
29. Among the documents that had been printed out from the
|
||
University of Missouri computers, which I received from the
|
||
University of Missouri computers, which I received from the
|
||
administration of the University of Missouri, were lists of hackers
|
||
and their corresponding real names. On that list were the names
|
||
of Loyd Blankenship and Chris Goggans and their respective hacker
|
||
handles of The Mentor and Erik Bloodaxe.
|
||
|
||
- 12 -
|
||
30. Among the documents seized in the search of Neidorf's
|
||
house were phone lists which included the full names of Loyd
|
||
Blankenship and Chris Goggans and identified them as The Mentor and
|
||
Erik Bloodaxe, respectively.
|
||
31. On February 6, 1990, Mr. Kluepfel provided me with
|
||
copies of a Phrack newsletter which contained a September 23, 1989,
|
||
profile of computer hacker Erik Bloodaxe. The profile indicated
|
||
that the Erik Bloodaxe's real name was Chris, that he was 20 years
|
||
old, 5'10", 130 pounds, that he had blue eyes, brown hair and that
|
||
he used various computers including an Atari 400, various computer
|
||
terminals with limited computing capability that are or can be
|
||
linked to a central computer, and a CompuAid Turbo T. The profile
|
||
reflects that Erik Bloodaxe was a student in computer science at
|
||
the University of Texas in Austin.
|
||
32. On February 6, 1990, Mr. Kluepfel provided me with a copy
|
||
of Phrack containing a January 18, 1989 profile of the computer
|
||
hacker known as The Mentor. The profile indicated that the
|
||
Mentor's real name was Loyd, that he was 23 years old, 120 pounds,
|
||
5'10", that he had brown hair, brown eyes and that he had owned a
|
||
TRS-80, an Apple IIe, an Amiga 1000, and a PC/AT.
|
||
33. The identification of Loyd Blankenship as The Mentor in
|
||
the Phrack profile was corroborated on February 22, 1990, by
|
||
information provided by Larry Coutorie an inspector with campus
|
||
security at the University in Austin, Texas who advised
|
||
me that his review of locator information at the University of
|
||
Texas in Austin disclosed current drivers license information on
|
||
|
||
- 13 -
|
||
|
||
Loyd Dean Blankenship reflecting that Blankenship resides at 1517G
|
||
Summerstone, in Austin, Texas, telephone number 512-441-2916 and
|
||
is described as a white, male, 5'10", with brown hair and brown
|
||
eyes. He further advised that Blankenship is employed at Steve
|
||
Jackson Games, 2700-A Metcalfe Road, Austin, Texas where he is a
|
||
computer programmer and where he uses a bulletin board service
|
||
connected to telephone number 512-447-4449.
|
||
34. According to telephone company records the telephone
|
||
number 512-441-0229, the number for the Phoenix Project BBS, is
|
||
assigned to the address 1517 G Summerstone, Austin, Texas, which is
|
||
the residence of Loyd Blankenship.
|
||
35. Hank Kluepfel has advised me that he has loged on to the
|
||
BBS at 512-447-4449 and that The Mentor is listed as the systems
|
||
operator of the BBS. Mr. Kluepfel further advised me that the user
|
||
list of that BBS contains the name of Loyd Blankenship and others
|
||
known to Mr. Kluepfel has hackers. Also, Mr. Kluepfel observed that
|
||
Loyd Blankenship is a frequent user of the BBS.
|
||
36. Similarly, the identification of Chris Goggans as the
|
||
Erik Bloodaxe described in the Phrack profile was corroborated on
|
||
February 22, 1990, by Larry Coutorie who advised me that his
|
||
review of locator information at the University of Texas with
|
||
respect to Chris Goggans disclosed that Goggans resides at 3524
|
||
Graystone #192, in AUstin, Texas and that his full name is Erik
|
||
Christian Goggans. Goggans, who goes by the name Chris, is a white,
|
||
male, with blond hair and blue eyes date of birth 5/5/69, 5'9",
|
||
120 pounds.
|
||
|
||
- 14 -
|
||
|
||
37. On February 19, 1990, I was advised by Margaret Knox,
|
||
Assistant Director of the Computation Center, University of Texas,
|
||
Austin, Texas, that a young man presented himself to her as Chris
|
||
Goggans in response to the University sending a notification of the
|
||
Grand Jury subpoena for University records pertaining to Chris
|
||
Goggans to Chris Goggans at 3524 Graystone #192, Austin, Texas. The
|
||
young man also told her that he was Erik Bloodaxe of the Legion of
|
||
Doom.
|
||
|
||
Locations to be Searched
|
||
38. Based on the above information and my own observations,
|
||
I believe that the E911 source code and text file and the
|
||
decryption software program are to be found in the computers
|
||
located at 1517G Summerstone, Austin, Texas, or at 2700-A Metcalfe
|
||
Road, Austin, Texas, or at 3524 Graystone #192, Austin, Texas, or
|
||
in the computers at each of those locations.
|
||
39. The locations to be searched are described as: the
|
||
premises known as the residence of Loyd Dean Blankenship, 1517G
|
||
Summerstone, Austin, Texas; the employment location of Blankenship,
|
||
the business known as Steve Jackson Games, 2700-A Metcalfe Road,
|
||
AUstin, Texas; and the residence of Chris Goggans, 3524 Graystone
|
||
#192, Austin, Texas. Those locations are further described in
|
||
Attachment A to <this Affidavit for Search Warrant.
|
||
Evidence To Be Found
|
||
40. On February 2, 1990, Jerry Dalton of AT&T advised me that
|
||
based upon his background, experience and investigation in this
|
||
|
||
- 15 -
|
||
case and investigating approximately 50 other incidents this year
|
||
involving the unauthorized use of other computer systems, including
|
||
individuals that run computer bulletin boards, these individuals
|
||
typically keep and use the following types of hardware, software
|
||
and documents to execute their fraud schemes and operate their
|
||
computers and computer bulletin boards:
|
||
a. Hardware - a central processing unit, a monitor, a modem,
|
||
a key board, a printer, and storage devices (either
|
||
cartridge tapes, 9-track magnetic tapes, floppy disks or
|
||
axillary {sic} disk units), telephone equipment (including)
|
||
automatic dialing equipment, cables and connectors), tape
|
||
drives and recording equipment.
|
||
|
||
b. Software - hard disks and floppy disks containing
|
||
computer programs, including, but not limited to software
|
||
data files, electronic mail files, UNIX software and
|
||
other AT&T proprietary software.
|
||
|
||
c. Documents - computer related manuals, computer related
|
||
textbooks, looseleaf binders, telephone books, computer
|
||
printout, cassette tapes, videotapes and other documents
|
||
used to access computers and record information taken
|
||
from the computers during the above referred breakins.
|
||
Financial and licensing information with respect to the
|
||
computer hardware and software.
|
||
|
||
41. Based on the above information and my own observation,
|
||
I believe that at the premises known as the residence of Loyd Dean
|
||
Blankenship, 1571G Summerstone, Austin, Texas; the employment
|
||
location of Blankenship, the business known as Steve Jackson Games,
|
||
2700-A Metcalfe Road, Austin, Texas; and the residence of Chris
|
||
Goggans, 3524 Graystone, #192, Austin Texas there is computer
|
||
hardware (including central processing unit(s), monitors, memory
|
||
devices, (modem(s), programming equipment, communication equipment,
|
||
disks, prints and computer software (including but not limited to
|
||
memory disks, floppy disks, storage media) and written material and
|
||
|
||
- 16 -
|
||
|
||
documents relating to the use of the computer system (including
|
||
networking access files, documentation relating to the attacking
|
||
of computer and advertising the results of the computer attack
|
||
(including telephone numbers and location information). This
|
||
affidavit is for the seizure of the above described computer and
|
||
computer data and for the authorization to read information stored
|
||
and contained on the above described computer and computer data
|
||
which are evidence of violations of 18 USC 2314 and 1030, as well
|
||
as evidence, instrumentalities or fruits of the fraud scheme being
|
||
conducted by the operator of the computer at that location.
|
||
42. Request is made herein to search and seize the above
|
||
described computer and computer data and to read the information
|
||
contained in and on the computer and computer data.
|
||
|
||
|
||
|
||
(signature of) Timothy M. Foley
|
||
Special Agent Timothy Foley
|
||
United States Secret Service
|
||
|
||
|
||
Sworn and Subscribed to before
|
||
me this 28th day of February, 1990
|
||
|
||
|
||
(signature of) Stephen H. Capelle
|
||
UNITED STATES MAGISTRATE
|
||
|
||
|
||
- 17 -
|
||
|
||
(END OF SEARCH AFFIDAVIT)
|
||
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
A document attached to the search affidavit reproduced 17 messages from The
|
||
Phoenix Project written from Jan. 23 - Jan. 29, 1990. We have retyped
|
||
messages 13/17, but substituted the original posts (18/29) from TPP logs we
|
||
have obtained. The differences in message numbers (eg 13/58 from Henry
|
||
Kluepfel's logs, or our source's logs, eg, 22/47) reflect that the notes
|
||
were captured on different days. We have compared the logs from both our
|
||
source and the document, and they are identical. Hence, the difference in
|
||
capturing dates is of no consequence.
|
||
|
||
There are several points that should be considered in reading the logs:
|
||
|
||
1. The affidavit claims that the logs substantiate the claim that an
|
||
encryption service existed. In fact, they do no such thing. The claim is
|
||
based primarily on message 13 (Jan 23), which includes the comment "What do
|
||
you people think? Bad idea? Good idea? Hell...It is just another attempt by
|
||
me to piss everyone off."
|
||
|
||
2. The bulk of these messages are inconsequential general discussions, and
|
||
include brief discussion of transfer protocols.
|
||
|
||
3. Timothy Foley's "evidence" that The Mentor is involved in the situation
|
||
is message 23, in which The Mentor is "guilty" of saying that Kermit is a
|
||
7-bit transfer protocol, is found on mainframes, and works through
|
||
outdials. From this, Foley says:
|
||
|
||
In a later message on January 26, 1990, the Mentor responded to a
|
||
question about a transfer protocol that been set out, but not
|
||
explained in Bloodaxe's notice, indicating his involvement in the
|
||
decryption scheme (#27, p. 12).
|
||
|
||
4. The messages before and after these dates are general, and there is
|
||
little substantive discussion of the "decryption service."
|
||
|
||
It appears that Loyd Blankenship is "guilty" of posting phracks on The
|
||
Phoenix Project, as are perhaps thousands of other sysops across the
|
||
country, and of the "criminal act" of summarizing Kermit.
|
||
|
||
We will leave it to others to judge and comment upon the logic and quality
|
||
of the document(s).
|
||
|
||
+++++++++++++++++++++++++++++++++++++++++++++++++
|
||
(The following is the first page of a 3 page document attached to
|
||
the affidavit. It has been retyped from the original).
|
||
+++++++++++++++++++++++++++++++++++++++++++++++++
|
||
|
||
New user pw= GUNSHIP
|
||
|
||
13/58: things...
|
||
Name: Erik Bloodaxe #2
|
||
Date: Tue Jan 23 22:57:29 1990
|
||
I think it's time for your friend at The Legion of Doom to start a new
|
||
service...(with great help from friends)
|
||
Decryption service! On any unix or Prime, send the etc/passwd file, or the
|
||
UAF file to the sysop directory, and you will be mailed back the encrypted
|
||
UAF file to the sysop directory, and you will be mailed back the encrypted
|
||
passwords...(on UNIX< any pw that the deszip could bust)
|
||
The Prime UAF must be in binary, so kermit it from the site, and xmodem it
|
||
here.
|
||
In return, we will not distribute any information gained from your site, but
|
||
we will probably look around it anyway...but it will remain between you and
|
||
us.
|
||
What do you people think? Bad idea? Good idea? Hell...It is just another
|
||
attempt by me to piss everyone off.
|
||
->ME
|
||
|
||
14/58: aha..!
|
||
Name: Phoenix #17
|
||
Date: Wed Jan 24 01:30:35 1990
|
||
ummm...hmmm
|
||
<doesn't know what to say..>
|
||
|
||
15/58: Heck
|
||
Name: The Parmaster #21
|
||
Date: Wed Jan 24 07:48:01 1990
|
||
Personally i like it :-)
|
||
Jason.
|
||
|
||
16/58: Decryption
|
||
Name: Grey Owl #10
|
||
Date: Wed Jan 24 19:10:52 1990
|
||
I think it's a great idea. I get a whole shitload of passwd files and some
|
||
UAF files too. |||_______got!
|
||
grey owl
|
||
|
||
17/58: Just a couple of questions...
|
||
Name: Konica #47
|
||
Date: Wed Jan 24 23:41:13 1990
|
||
Well since the feds know this is a hacker board whats stopping them from
|
||
tracing every incoming call to Pheonix Project and getting all the #'s, then
|
||
monitoring then for illegal activity?
|
||
|
||
And just say I was calling through my personal calling card....What would
|
||
they get as the incomming #?
|
||
If I had a DNR on my line is there any way I could find out?
|
||
Sorry about this but I am not as good as most of you (except for the guy that
|
||
keeps posting codes) and the only way I am going to learn is by trying shit
|
||
out and asking questions...
|
||
Hope this is the right sub for these questions....
|
||
|
||
+++++++++++++++
|
||
(The following are the actual logs; Typos were not removed)
|
||
+++++++++++++++
|
||
|
||
|
||
18/47: vv
|
||
Name: Dtmf #27
|
||
Date: Thu Jan 25 03:22:29 1990
|
||
|
||
RE: Just a couple of questions...
|
||
|
||
To check the DNR the best bet woud be to call bell security, or the SCC
|
||
|
||
|
||
19/47: well..
|
||
Name: Phoenix #17
|
||
Date: Thu Jan 25 07:27:43 1990
|
||
|
||
nothing stops them from tracing..
|
||
I dont know how it works there.. but down here all traces are illegal unless
|
||
they are for drug/murder reasons.. <well not traces, but taps are..>
|
||
|
||
|
||
20/47: Feds...
|
||
Name: Erik Bloodaxe #2
|
||
Date: Thu Jan 25 17:05:35 1990
|
||
|
||
Absolutely nothing would stop them from collecting all local calls, and/or any
|
||
longdistance company records of calls coming into this number...in fact, I
|
||
kind of expect them to at least get all local calls here...hell Austin is all
|
||
ess...most of them 5's...(I think...maybe 1's)
|
||
|
||
However, I doubt that tapping the data line is worth their while...especially
|
||
when they can just log on and read everything anyway. And the mail just isn't
|
||
that spectacular...
|
||
|
||
In any case, all calls here made by legal means are legaal, so don't worry
|
||
about it. Just because tee nature of this bbs isn't that of your average
|
||
mainstream bbs, doesn't negate its legality. Information posted here is kept
|
||
legal.
|
||
|
||
If you are truly worried about it, don't call, and sit home being paranoid.
|
||
|
||
Hell, I'm local...I call direct...and now I do it at 300 baud. Hell, I can
|
||
almost tell what's being typed at 300 baud while listening to it...forget the
|
||
data tap! Hehe, although a 300 baud data tap is SO simple to playback
|
||
completely error free...at 1200 or 2400 you kind of have to get the recording
|
||
levels just right...but 300 gives you plenty of room for error...
|
||
|
||
21/47: ess 1,5
|
||
Name: Dark Sun #11
|
||
Date: Thu Jan 25 20:14:00 1990
|
||
|
||
hey, whats the diff??? :-)
|
||
DS
|
||
|
||
|
||
|
||
|
||
|
||
|
||
22/47: decryption
|
||
Name: Silencer #31
|
||
Date: Thu Jan 25 23:35:01 1990
|
||
|
||
hmmm....like...you mean once you have an account...read the user file and then
|
||
you will deencrypt all the passcodez...sounds good....but what the fuck is
|
||
kermit...
|
||
- Silencer
|
||
|
||
|
||
|
||
|
||
|
||
|
||
23/47: kermit
|
||
Name: The Mentor #1
|
||
Date: Fri Jan 26 10:11:23 1990
|
||
|
||
Kermit is a 7-bit transfer protocol that is used to transfer files to/from
|
||
machines. It is mostly found on mainframes (it's a standard command on VAX,
|
||
for instance). Kermit has the added advantage of being able to work through an
|
||
outdial (because it is 7-bit).
|
||
|
||
Mentor
|
||
|
||
|
||
|
||
|
||
|
||
|
||
24/47: Kermit
|
||
Name: Sicilumm Thorne #28
|
||
Date: Fri Jan 26 11:20:10 1990
|
||
|
||
Kermit is merely another transfer protocol like Sealink, Xmodem, Modem7,
|
||
Zmodem, et cetera.
|
||
|
||
Its relatively slow, but was thought to be better than Xmodem, due to its
|
||
capabilties. (Don't remember what they are, I use Zmodem).
|
||
|
||
Sic.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
25/47: my kermit
|
||
Name: Ravage #19
|
||
Date: Fri Jan 26 12:24:21 1990
|
||
|
||
|
||
lets me set it at 8 bits also. just another trivial note.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
26/47: from what I know...
|
||
Name: Dark Sun #11
|
||
Date: Fri Jan 26 16:26:55 1990
|
||
|
||
kermit was originally designed to allow transmission of data across 2
|
||
computers running with different parity settings.
|
||
DS
|
||
|
||
|
||
|
||
|
||
|
||
|
||
27/47: and..
|
||
Name: Phoenix #17
|
||
Date: Sat Jan 27 07:28:45 1990
|
||
|
||
as a major disadvantage.. it is damn slow!
|
||
|
||
Phoenix
|
||
|
||
|
||
|
||
|
||
|
||
|
||
28/47: Well....
|
||
Name: Johnny Hicap #45
|
||
Date: Sat Jan 27 21:28:18 1990
|
||
|
||
No one answered that question (forget who posted it) that if he was calling
|
||
through a calling card is it possible to get the number of the person who
|
||
called even he was calling through hs calling card? What would they get as the
|
||
number comming in? Would they get the card? Of course then they would just see
|
||
who owns it.
|
||
|
||
JH!
|
||
|
||
|
||
|
||
|
||
|
||
|
||
29/47: more Kermit BS
|
||
Name: Grey Owl #10
|
||
Date: Sat Jan 27 23:53:57 1990
|
||
|
||
Kermit is slower than Xmodem, BTW. The packets are smaller (usually 64 bytes)
|
||
and the error-checking is shot to hell with any line noise. It's better than
|
||
ASCII though!
|
||
|
||
grey owl
|
||
|
||
(END SEARCH AFFIDAVIT)
|
||
|
||
********************************************************************
|
||
** END OF CuD #2.11 **
|
||
********************************************************************
|
||
|
||
|