textfiles/magazines/REVIVAL/rvlcissd.002
2021-04-15 13:31:59 -05:00

3311 lines
117 KiB
Plaintext

----=[ CiSSD ]=---- is happy happy joy joy over Issue #2 of
__ /\
|__| \ \ :
_____ _____ _____ _____> \____ __|__ _
| . | __| | > | | > | |
---===[ | /_ __| /| | / _ | |__ ]===---
__|__|__|_____| _/ |__|___/__|__|_____|
| | / | | :
. \/ . : .
.
- WAR! -
=========================================================================
THE CANADIAN INTERNATIONAL SOCIETY FOR SOCIAL DEVIANCY MAR (C) 1993/94
-------------------------------------------------------------------------
"Backstabbers. All of you are traitors..."
Well, that hurt. For two weeks, we all ate & slept fear, of Short
Mans anticipated arrest. We schemed around the clock to stop it, and
shamefully, we even schemed around the clock to make sure he wouldn't
rat. We protected our informants, and we didn't allow ANYBODY to get in
the way of our minute moral fiber that told us this arrest was wrong. I
personally found it hard to believe that the local blink who gets off on
telling 976 operators about his "Steel Penis" (The replacement because of
his mining accident), had enough time, or reason in the world, to run up
a $35000 phone bill for some PBX that isn't even in Canada.
We'd spoken about dissasociating with him before. He was the cause
of 911 pranks galore on our teleconferences.. he was the reason for some
international tension in our hacking circles.. he could even have been
the reason for an FBI investigation that brushed the livelyhood out of
our original 800 meridian, but he didn't understand.. and we never
considered his foolish mistakes an act of war. We liked Short Man..
despite our amazing problems with him, some might even say we loved him.
But it only took one sentence to break it all down.. one person to
say "don't trust them.".. one anti CiSSD comment, to scare Short Man into
submission. Now he's busted, and we all fear prosecution. You can't trust
someone who can't trust you.
- Terminator X(Ed)
WARNING: THE FOLLOWING TEXT CONTAINS MATERIAL WHICH MAY BE
CONSIDERED OFFENSIVE BY SOME. CISSD AND ITS MEMBERS BEAR NO
LIABILITY ON THE PART OF THE READER. READ AT YOUR OWN RISK.
DISCLAIMER: THE INFORMATION PRESENTED IN THE FOLLOWING TEXT IS
NOT INTENDED TO BE USED FOR PURPOSES CONTRARY TO LAWS IN THE
COUNTRY WHERE THE READER RESIDES. DUE TO AN INTERNATIONAL
DISTRIBUTION, OUR CHOSEN TOPICS WILL PROVIDE INFORMATION THAT
COULD POTENTIALLY BE USED FOR PURPOSES ILLEGITIMATE IN NATURE.
CISSD, AND ITS MEMBERS THEREFORE, BEAR NO RESPONSIBILITY FOR
THE ACTIONS OF THE READER, BE THEY A DIRECT, OR INDIRECT RESULT
OF READING THE FOLLOWING TEXT.
NOTE: BY READING BEYOND THIS POINT, YOU ARE AGREEING TO THE
CONDITIONS IN THE ABOVE WARNING, AND DISCLAIMER.
BTW, it should be noted that this file was, for the most part,
written in Canada; a country where freedom of expressions
existance is limited not only by public outcry, but also by
conflicting government legislation. CiSSD will not hesitate to
challenge the conflicting laws should any legal action occour
as a result of our controversial publication.
---
"We seem to be totally defenseless against these people. We have
repeatedly rebuilt system after system and finally management
has told the system support group to ignore the problem. As a
good network citizen, I want to make sure someone at network
security knows that we are being raped in broad daylight. These
people freely walk into our systems and are taking restricted,
confidential and proprietary information." - Digital Employee
---
TABLE OF CONTENTS
ITEM CONTRIBUTOR(S) LINE
==== ============== ====
Editorial Terminator X 16
Warning, Disclaimer -- 45
Table of Contents -- 82
[CiSSD] News and Natterings The Dope Man 142
[CiSSD] Meetings & Materials Terminator X 225
Bell Canada's Intent Towards Hackers The Dictator 278
Save The Scene! The Dope Man 338
Revival Discussion, From The Readers [Echo Of The Damned] 421
Abuse in the Home and School Terminator X 447
Free Calls, Third Billing Terminator X 526
Feature - 'All Systems Secure' 567
: DDN Security Management Lister 580
: Procedures for Host
: Administrators
: Canadian Telecom Safety The Dope Man 2832
: Checklist
News Bytes (and usually bites too) 2931
: Phone fraud bill $100 million Lister 2941
: Bell anxious to compete in Terminator X 3032
: cable, other markets
: $200M plea in TV battle Terminator X 3108
Erratum - Corrections from last issue Terminator X 3188
CiSSD Membership Information Terminator X 3219
Last Words From the Editor Terminator X 3254
119895 ]-[bytes]-------------------------------------------[lines]-[ 3307
---
"A sudden hot sweat had broken out all over Winston's body. His
face remained completely inscrutable. Never show dismay! Never
show resentment! A single flicker of the eyes could give you
away." - George Orwell, Nineteen Eighty Four
---
[CiSSD] NEWS AND NATTERINGS
The Dope Man
NEW MEMBERS
Well, its been a long 3 months since the last issue of REVIVAL, and
a lot has gone on in this time. Apart from the misunderstanding with
Zencor, DNR on a few lines and other such news (which is common to all
area codes), CiSSD has acquired a few new members.
As director of the group, it is my privilege to welcome our two
newest members, The Dictator and Hypnotech. We at CiSSD are confident we
have make good decisions... Both will make submissions to REVIVAL
and we are confident that good choices have been made in both cases.
If YOU feel you might have what it takes to be a CiSSD member, then
let us know! Our phone number appears at the bottom of this text, so
give us a call. Remember , you don 't have to be a Phreak or Hacker to
become a member. CiSSD has many legitimate interests, and talented
applicants may apply.
LAMERS OF THE MONTH
Short Man You've been singing too much Snow to have
turned Informer.
Viral Infector Didn't your mom tell you to think before you
open your mouth? We're waiting for your apology.
Napoleon You used Hypnotech to keep your wannabe Kode
KiDDie virus group alive. Then you had the nerve
to tell him you didn't need his service any
longer. Where are you and your group now?
Silver Foxx You are a moron.. never change the password on
an admin box! You got our 800 taken down cause
of your stupid ass power trip. Look at all the
power you've been left with now!
KLM Computers For being wit' Evan Towle, so to speak. Just
as a little reminder, Evan Towle put our
legitimate business practice under, by
propogating slanderous misinformation about our
product sources.. watch out for Evans under the
counter deals.. <smirk>
Its people like this that kill the scene. Why are they allowed
to exist until shit jumps off? Its inevitable, yet we wait for it to
happen.... We seek to discipline rather than prevent.
It isn't working.
Bruce Sterling said something at the end of "The Hacker Crackdown"
that fits rather well,
"It is the end of the amateurs"
Its both true and necessary. The lame jeopardize our existence.
I don't suggest not letting people learn, everyone must have a
"lame" period of knowing little, but more that those with lame attitudes
must be dealt with in some way. They jeopardize everything, yet can we
censor just as the government does? What do we sacrifice?
Do we go down with our morals intact? Or make a trade-off?
Its a decision that must be made for each individual, yet an issue
that must be dealt with immediately.
---
[CiSSD] MEETINGS & MATERIALS
Terminator X
CiSSD will hold monthly formal meetings for members, and informal
meetings for members and non-members alike. At current, CiSSD public
meetings only take place in Toronto. At current, we are planning a CiSSD
public meeting at the Rennesaince Hotel in Downtown Toronto Ontario,
on Sunday April 18 1993. Dress will be casual, and topics discussed open
to suggestion, as well as a fixed political agenda.
Plans are currently tentative. For confirmation of this meeting,
dial +1 416 417 0214. If you plan to attend, please leave a message, so
we have an idea of how many to expect. Public meetings are new for us,
and positive response can make them happen on an ongoing basis.
Date: Sunday April 18, 1993
Time: x:00 XX EST
Place: Rennesaince Hotel Lobby Downtown
City: Toronto, Ontario -- CANADA
Agenda: Group Membership Recruits and New Members Introductions
: Hacking ethic.. Who's gain, who's loss?
: General discussion, news discussion..
: Hacking info
: Pizza or McDonalds
Info: +1 (416) 417 0214
CiSSD promotional material will be avaliable soon. T-Shirts, Sweat-
Shirts, bearing the CiSSD logo will find a home in your home, if you
let them. As info becomes avaliable it will be released on our hotline;
+1 (416) 417 0214.
---
"Some of the devices used to best the computer are engagingly
simple -- as in the case of a young man who, obviously knowing
something about the ways of computers, applied for and received
a twelve-month installment loan from a New York bank. On
receiving from the bank, together with the loan, the book of
computer coded coupons he was supposed to send in with his
monthly payments, he tore out the last payment coupon in the
book instead of the first and sent it into the bank along with
one month's payment. He then received a computer-generated
letter from the bank thanking him effusively for paying off his
loan so promptly and assuring him of his excellent credit
standing. The young man didn't exactly steal from the bank --
he just left it up to the computer to make the next move."
- Thomas Whiteside, Computer Capers
---
BELL CANADA'S INTENT TOWARDS HACKERS
The Dictator
In a conversation I had recently with two internal members of Bell
Canada, I was priveledged to learn that bell "Frankly doesn't even
recognise a problem of system hackers and Long-Distance Phreakers, apart
from calling-card fraud."
It seems as though Bell Canada (who incedentally profited in excess
of $950 Million last year) doesn't find everyday phreaks a problem, even
going so far as to call 416 686-5890 a 'Fluke'. "The [Bell] Hiearchy is
too short-sighted to realize that there is definately the potential for
repeated hacking of PBX's, seeing how there population has grown to over
1000 in the metro area alone" said one Bell official. This attitude seems
to hold for other segments of H/P/V as well. "We don't even want to catch
the hacker," said a Bell investigations officer, "We just want to find
out how, and more importantly, why they hack." Bell believes Hackers to
be nothing more than bacteria on the phone trunks.
Bell Canada does not intend to alter service any further to deal
with hackers , and believes overseas billing via payphones will be
reinstated before 1994. Also, they have no intentions to stop third-
billing overseas from Non-Millenium (Digital) Payphones. "We can see no
purpose in affecting our customers' service any further."
When it comes to Cam-Net, Unitel, UTI and others' hacking problems,
a bell official simply stated that "They should get used to it. This is
the real world. If you can't forsee hacking of your services, you
shouldn't be offering them." It should also be noted that Bell wished no
part of Short-Man's trial. "Why should we get involved? He's just the
scum hackers scrape off of their shoes in the morning. Nothing would be
gained by prosecuting him. Besides, amassing the evidence would be more
exspensive than what we could possibly hope to charge him with," was the
response of a bell investigations officer.
With all this, Bell still intends to go ahead with their 800-Dialup
service which will allow you to third-bill to any number, regardless of
wether the number accepts the charges or not, by simply offering your
Visa or MC number in case the charges are reversed. "We have no
intention of offering a credit-card dialing service," stated one bell
official, "But we believe that this service will be benificial to our
customers, as well as sucessfully detering hackers.
All in all, Bell stills seems uptight in believing that they can't
be hacked into for any signifigant sum of money. That would seem to
leave most of us in 416 safe for the time being.
---
"Why should we get involved? He's just the scum hackers scrape
off their shoes in the morning. Nothing would be gained by
prosecuting him. Besides, amassing the evidence would be more
expensive than what we could possibly hope to charge him
with," - Bell Investigations Officer <See Above Article>
---
SAVE THE SCENE!
The Dope Man
The computer underground is in a time of crisis. Ten years ago,
being a hacker was an ideal, something that every kid who ever watched
War Games wanted to do, but couldn't. Back then, the scene was tiny and
efficient and busts were scarce. However, in 1993 things have changed.
In fact, one can hardly recognize the underground. Busts are commonplace
and even the average person with a modem can access deviency text files.
However, these developments pale in comparison with the one true issue,
the one thing that will be the end of it all. Hackers are no longer the
good guys.
Over the last few years tens of millions of dollars have been lost
worldwide due to the underground. Much of this figure is theoretical
loss, money that was never taken, but is rather the loss of projected
profit. The unfortunate thing is that the public does not differentiate
between these two types of loss. The media says "Teenage hacker steals
$100 000 in phone service" and it is accepted by the masses without
question. And why should they question?
The corporations and the police give the media the information for
their articles. Their motives for this are plain. These institutions do
not benefit from public sympathy for hackers, and they have both realized
the problem, and how to solve it. The media can only print what they are
told. Thus, we have the articles that condemn even 13 year old phreaks
as organized criminals. There is no mention of the morality of
phreaking, or Bell's over-pricing. Just a simple article reporting on a
criminal. Or, even better, as is the the current trend, feature articles
on the underground (which describe all of the anarchy files, but none of
the ethics). The media, the government, the police, the corporations -
All have it in for the scene, and they seem to be winning.
All is not lost, however. The Underground in its inflated size
spans the world, and encompasses many thousands of people. It may
generally be said that members of the hack and phreak communities tend to
be of an intelligent stock. Thus, we find our solution. They give us
bad media, we give ourselves good media. Its easy to do, and it works.
- Letters to the editor of papers explaining the morals behind the
boy they call a crook.
- Calling in to "answering machines" for radio shows.
- Phone-ins on the radio
- Call your local paper and tell them you will give them the inside
scoop on the computer underground, and guide them through, showing
the positive sides.
All of these activities are relatively easy, none are major
projects. However, on a massive scale, they will make a difference. The
difference between the life and death of the computer underground scene -
something none of us want to see in our life times. Police busts become
less frequent when the public disagrees (and you don't want to be busted
now do you?), and certainly hackers are treated better by police officers
who feel they are arresting a "nice kid who just fools around on his
computer too much".
Cops want to arrest crooks; not kids.
Society wants cops to bust crooks; not kids.
Crook is relative to the morals of the masses. You and I can change
these morals, reverse the damage, save our place in Cyberspace. But I
need your help, and you need mine. If we all work together, the
momentum of the movement will be unstoppable.
We will win - but we must care enough to try.
---
She's always miserable.. rather incomprehensable, and makes no
effort whatsoever to be sociable, but at least no one will ever
rob her of her happiness.
---
REVIVAL DISCUSSION, FROM THE READERS
[Echo Of The Damned] Postings
In the future, this column will be used for reader responses to past
issues of REVIVAL. To become involved in this column, apply to any BBS
system worldwide, supporting the Echo of The Damned network, and post in
the 'REVIVAL! Discussion' base.
All CiSSD HQ boards carry Echo of The Damned, and Echo of The Damned
hubs will also be granted to the most deserving applicant in any given
service area, and hubs will be responsible for activity within their own
area code. To apply as an Echo of The Damned hub, call CiSSD WHQ, The
Downtown Militarized Zone. To apply as a node, post to 'The Dope Man' or
your area hub Sysop, from any Echo of The Damned system.
- Termiantor X(Ed)
---
_
CRIME, krim, n. an act punishable by law; such acts
collectively: an offence, sin.
---
ABUSE IN THE HOME AND SCHOOL
Terminator X
It's a crying shame, believe it or not that 20 - 30% of children
are abused in their own homes, and a far larger number are abused in
their schools. I speak not of cuts and bruises, nor broken teeth and
broken bones, but rather, of a much more lasting pain; that of mental
abuse.
The offenders; Parents, teachers, and administrators. The victims;
our future -- the youth of today.
The figure is staggering. It is also very approximate, but before
you dismiss it, consider the following: What outlet does a child who
feels neglected, or maltreated, have in order to relieve the pain and
suffering.. or the feeling of aloneness? Who is it that sets guidelines,
and shows children where to go when they are hurting. When you were
growing up, or if you still are, who did you go to when you had a problem
you couldn't deal with? Your parents, the abusers? Your best freind..
what if you couldn't see your freind, or talk to him/her? How would you
feel? Surpressed?
Sadly enough, childen who are abused usually have a distinct inner
feeling that the abuser is right, and they are wrong. In an interview
with a young abused girl, she said she thought that maybe her
parents would be less abusive if she followed the rules. When asked what
rules she broke, she responded, "Sometimes, I don't clean up my room,"
She said, "I've never been grounded for more than 2 months, although,
even when I'm not officially [grounded], I can't go out, because I'll get
yelled at when I get home.
"My mom hasn't beat me since I was eight." She is sixteen now. Her
father spends most of his time fighting with her mother, which used to
tear her apart. "I'm used to it. Sometimes I just yell randomly in the
middle of an argument, and then laught riotously! It's the best
entertainment I get." She added, "TV has lost its edge. I'm sick of it.
I could do without it."
"Sex is the best. It's the only escape from the constant
screaming.", she said when asked what she does to relax. She has been on
birth control pills since the age of fourteen, and often has intercourse
without the use of latex protection. "I hope I get AIDS and die.", she
chuckled.
Abuse in the school is also from neglect. Since the advent of the
school designed for mass indoctrination (a.k.a. 'public school system'),
administration has become so impersonal that matters of phsycological
difficulty caused by neglect at home, are treated as disceplinary
problems. The victims are treated as 'delinquents'. They are demited, and
eventually become unemployable. Favorite phrases of administrators
include "I don't want to know" and "only you caused this situation."
We should work to have the school problem solved. The board of
education for your area should be encouraged to hire guidance officials
with phsycology experience. Problems of attendance and deteriorating work
habits should always be approached with the idea that mental problems due
to excessive stress in everyday life, or abuse, could be the underlying
reason for substandard acheivement.
Parental expectations need to be lowered to attainable levels. Not
every child has the capability to perform straight 'A's in all of their
subjects. Not every child has the will, and not every child has the
desire.
In Canada, there are laws against mental abuse, but there is no
sufficient platform for enforcement of these laws by the children who are
most hurt by the cruelty of their 'superiors'.
When asked why disceplinary action for attendance and smoking was so
severe at Thornhill Secondary School, a Vice Principal responded "These
kids simply need to follow the rules. If they can't do it, then they
deal with the consequences. It's not my job to oversee how they live at
home.
Who's job is it?
---
FREE CALLS, THIRD BILLING
Terminator X
In the (416) area code, it has become common practise for many
phreaks to third bill telephone calls to illegaly obtained Voice Mail Box
systems. Recently, however, phreaks are noticing it to be increasingly
difficult to third bill to these boxes.. and they can also no longer have
their boxes accept collect calls. The reason for this is DMS number
blocking.
The switch can be programmed to automatically reject third bill and
collect calls placed to a block of numbers. The system administrator for
the company owning the VMB exchange calls up, and has the phone company,
Bell Canada in our case, install a number screen on the VMB exchange.
DMS number blocking has one significant flaw. It is only capable of
placing a screen on number blocks of 1000 or more. If you are aware of
any VMB exchanges containing 900 or less VMB's, not only does the company
not have blocking, but cannot obtain blocking to prevent you from third
billing.
Another interesting footnote regarding third billing in the (416)
area is that Bell Mobility Cellular has opted for the time being not to
block their exchanges.. if you can hack Bell's, then that's the way to
go.. not that I support any of this at all. Seriously! Other than
emergency situations, third billing illegitimately provides nothing but a
shure-fire way to get caught.
Finally, it might be noted that Bell Mobility has experienced
approximately $20000 of similar fraud every month since this flaw was
uncovered.. That only includes that which DOES get caught. Those who
don't get caught are stealthier.. they spread it around.. and any
customer without detailed billing pays the bill without question.. they
really don't know if they used $500 of phone time this month.. how could
they?
- Terminator X
---
FEATURE: ALL SYSTEMS SECURE
Lister - The Dope Man
This month, CiSSD's independant researchers went off to look for
articles and we came up with a concensus on a single topic.. systems
security.
In addition to the other topics this month, we decided to publish a
few of the documents they found in our feature this issue, 'All Systems
Secure'.
Sourced by: Lister
Topic: DDN Security Management Procedures for Host Administrators
: Volume I of II
Length: 74.7KB
Begin ---*
VOLUME I
1. Purpose. This Circular is the first of two volumes
describing security management procedures for the Defense Data
Network (DDN). Volume I provides operational security
guidance for the DDN and describes the Host Administrator's
management responsibilities. It is based on review of
Government and industry documents on the DDN, local area
networks, and computer security. Volume I establishes methods
and procedures for detecting and reporting unauthorized
activity. It describes the resources and tools available to
the Host Administrator for investigating local incidents.
Additionally, it discusses the procedures and tools needed for
reporting network related incidents to the DDN Network
Security Officer (NSO). Volume II prescribes the policy for
enforcing network operational security and describes the
management responsibilities of the DDN Network Security
Officer (NSO). Volume II will receive limited distribution.
2. Applicability. This Circular applies to DCA Headquarters,
DCA field activities, and Government and commercial activities
using or managing the operation of the DDN.
3. Policy. DCA continually strives to improve its resources
for providing a reasonable level of security for the DDN.
These resources include the network access control system and
its audit trial analysis capabilities for detecting
unauthorized and illegal network activities. These detection
and audit capabilities will be used to identify and prosecute
unauthorized individuals who access or attempt to access
databases or system software of host computers connected to
the DDN. In addition, DCA has created the DDN Security
Coordination Center (SCC) to gather information regarding DDN
security problems and to disseminate problem definition,
status, and resolution information under the direction of the
NSO. These resources and tools alone are not sufficient.
Site personnel such as the Host Administrators need to assume
an active role and assure their constituents and the DDN that
they are providing for a reasonable level of protection of the
___________
OPR: DODM
Distribution: B,J,Special
ii DCAC 310-P115-1
network and computing resources under their jurisdiction.
Host Administrators are required to report suspicious
activities to their network manager. Formal investigations of
unauthorized or illegal activities occurring on the DDN must
be coordinated with the DDN Network Security Officer.
Individuals suspected of unauthorized access or use of host
computers over the DDN will be subject to prosecution under
Title 18 of the Federal Criminal Code.
4. Procedures. Chapters 4 and 5 describe the procedures for
performing the security functions of the Host Administrator.
5. Responsibilities. Chapter 1 describes the
responsibilities of the Host Administrator in performing the
security functions.
6. Related_Documents. The following documents are
recommended reference materials to supplement this document.
a. DoD Directive 5200.28, Security_Requirements_for
Automated_Information_Systems_(AISs), dated 21 March 1988.
b. DCAI 630-230-19, Security_Requirements_for_Automated
Information_Systems (draft), dated 18 October 1990.
c. Defense_Data_Network_Subscriber_Guide_to_Security
Services_1986-1992 (includes the DDN Security Classification
Guide at Appendix I).
d. Internet_Site_Security_Policy_Handbook (Internet
Draft). This document can be obtained by contacting the
Network Information Center (NIC), SRI International, 333
Ravenswood Ave., Menlo Park, CA 94025.
e. Computer Security Center (CSC-STD-002-85), Department
of_Defense_Password_Management_Guideline, aka "The Green
Book", dated 12 April 1985.
FOR THE DIRECTOR:
EDWARD J. HENDERSON, JR.
Colonel, USAF
Chief of Staff
DCAC 310-P115-1 iii
CONTENTS
BASIC CIRCULAR Paragraph__Page
Purpose................................. 1 i
Applicability........................... 2 i
Policy.................................. 3 i
Procedures.............................. 4 ii
Responsibilities........................ 5 ii
Related Documents....................... 6 ii
Illustrations........................... v
Glossary of Terms and Definitions....... vii
VOLUME I. DDN SECURITY MANAGEMENT PROCEDURES
FOR HOST ADMINISTRATORS
Chapter Paragraph__Page
1. INTRODUCTION
The DDN Security Resources............ 1 1-1
Responsibilities of the Host
Administrator....................... 2 1-2
Responsibilities of Other Site
Representatives..................... 3 1-2
2. THE DDN SECURITY PROBLEM
General............................... 1 2-1
Attack Points......................... 2 2-1
Categories of Network Abusers......... 3 2-1
Common Penetration Techniques......... 4 2-2
Necessary Precautions................. 5 2-4
3. NETWORK ACCESS SECURITY
General............................... 1 3-1
TAC Access Control System (TACACS).... 2 3-1
4. OPERATIONAL SECURITY MANAGEMENT OF
UNCLASSIFIED NETS
General............................... 1 4-1
Access Vulnerability.................. 2 4-1
Risk Assessment....................... 3 4-2
Security Policies and Procedures...... 4 4-2
Education Program..................... 5 4-5
5. OPERATIONAL SECURITY MANAGEMENT OF
CLASSIFIED NETS
General............................... 1 5-1
Limited Terminal Access Controls...... 2 5-1
Closed Community Characteristics...... 3 5-1
iv DCAC 310-P115-1
Chapter Paragraph__Page
Security Awareness.................... 4 5-1
6. DETECTION OF UNAUTHORIZED HOST ACCESS
General............................... 1 6-1
Detection Training.................... 2 6-1
Logging Events........................ 3 6-1
Peculiar Behavior..................... 4 6-1
Legal Recourse........................ 5 6-2
Prosecution as a Deterrent............ 6 6-2
Incident Reporting by Subscriber...... 7 6-2
Contacts.............................. 8 6-2
What Information To Report............ 9 6-3
Follow-up Information................. 10 6-3
7. TOOLS FOR INVESTIGATING INCIDENTS AT THE
HOST LEVEL
General............................... 1 7-1
Host System Logs...................... 2 7-1
Other Tools........................... 3 7-1
TACACS Reports........................ 4 7-1
8. SUMMARY
Penetration Techniques................ 1 8-1
Other Topics.......................... 2 8-1
DCAC 310-P115-1 v
ILLUSTRATIONS
Table Page
1 Vulnerability Analysis/
Operations Management and
Processing...................... 9-1
2 Vulnerability Analysis/
Communications.................... 9-3
3 Vulnerability Analysis/
Disasters......................... 9-4
4 Vulnerability Analysis/
Personnel......................... 9-5
5 Vulnerability Analysis/
Training.......................... 9-7
6 Vulnerability Analysis/
People Errors and Omissions....... 9-8
7 Tabulation of Vulnerability
Analysis/Self-Assessment
Results.......................... 9-9
vi DCAC 310-P115-1
THIS PAGE INTENTIONALLY LEFT BLANK
DCAC 310-P115-1 vii
GLOSSARY OF TERMS AND DEFINITIONS
ADP Automatic Data Processing.
CERT Computer Emergency Response Team.
DCA Defense Communications Agency.
DCS Defense Communications System.
FBI Federal Bureau of Investigation.
HOTLIST A list of all TAC user identifications which have
been stolen, have expired or which otherwise have
been compromised.
IPTO Information Processing Techniques Office.
LAN Local Area Network.
MILNET Military Network.
NAURS Network Auditing and Usage Reporting System.
NIC Network Information Center.
NSO Network Security Officer. Focal point for network
related operational security matters.
OSI Office of Special Investigations.
SCC DDN Security Coordination Center.
TAC Terminal Access Controller. C/30 computer that
connects end user terminals to the network and
provides an interface to the DDN. In this document
it also refers to a miniTAC which serves the same
function as a TAC.
TACACS TAC Access Control System. A system that controls
terminal access to the MILNET.
TACACS
GUEST
CARDS A temporary TACACS card given to a user who does not
have TACACS privileges but temporarily needs them.
A guest TACACS card may also be given to an
authorized new user who has not yet received a UID
or password.
TAC CARD A card authorizing the user TAC Access to the
MILNET.
viii DCAC 310-P115-1
TAC PORT Point where an end user terminal or modem is
connected to the TAC.
TASO Terminal Area Security Officer. Responsible for
enforcing all security requirements implemented by
the NSO for remote terminal areas. Also responsible
for ensuring that all countermeasures required to
protect the remote areas are in place.
UID User Identification.
WIN WWMCCS Intercomputer Network.
WWMCCS Worldwide Military Command and Control System.
DCAC 310-P115-1 1-1
CHAPTER 1. INTRODUCTION
1. The_DDN_Security_Resources. This Circular is intended to
provide Host Administrators a set of security guidelines to
operate on the Defense Data Network (DDN). This Circular will
assist you in maintaining the security of your local host
computer site, as well as the overall DDN. It does not in any
way supersede any current Service Regulations or Procedures
governing the security of ADP facilities not related to the
DDN. This Chapter provides you with a definition of your
security responsibilities as a Host Administrator. You must
have contact with certain offices to fulfill these
responsibilities. The duties of these offices are discussed
here to assist you in understanding their missions.
a. DDN_NSO_(Network_Security_Officer). The DDN NSO is
the single point of contact for dealing with network-related
operational security issues. The DDN NSO also implements
applicable policies included in DCAI 630-230-19, Security
Requirements for Automated Information Systems. The NSO
recommends security policy affecting the DDN and is
responsible for its general enforcement. The NSO also works
closely with Host Administrators to resolve network and
related computer security problems and incidents affecting
their sites.
b. Host_Administrator. A Host Administrator is the
person who has administrative responsibility for the policies,
practices, and concerns of a host, or hosts, connected to the
DDN, including responsibility for that host's DDN users.
Specifically, the Host Administrator is responsible for the
following activities:
(1) Assisting with network management by ensuring
that network policies and procedures are observed by the
users. Locally administering the TAC access control system
(TACACS), ensuring that all of their host users have been
authorized for DDN and TAC access and are registered in the
NIC user registration database (WHOIS/NICNAME).
(2) Locally managing the network access control
procedures and password system. Reporting network-related
host break-ins and assisting with investigations as needed.
c. NSC_(Node_Site_Coordinator). The NSC has physical
control over hardware and software, and coordination
responsibility for the DDN circuits and equipment located at
the DDN node site.
d. NIC_(Network_Information_Center). The NIC registers
all users in the WHOIS/NICNAME database and operates the
Network Auditing and Usage Reporting System (NAURS) computer
system that produces the MILNET TACACS audit and incident
reports. Call (800) 235-3155 for more information.
1-2 DCAC 310-P115-1
e. DDN_SCC_(Security_Coordination_Center). The SCC
gathers information about DDN computer and network security
incidents and works closely with the NSO to disseminate the
information necessary to contain, control, and resolve these
problems mainly through the DDN Security Bulletins. The
hotline number is (800) 235-3155.
f. CERT_(Computer_Emergency_Response_Team). The CERT
gathers and distributes information about Internet security
incidents. They work closely with the NSO and SCC on DDN-
related security problems. The hotline number is (412) 268-
7090.
2. Responsibilities_of_the_Host_Administrator. Host
administrators have the overall responsibility to provide a
reasonable level of protection to host sites from the
possibility of network compromises. They must act as liaisons
with the NSO, SCC, vendors, law enforcement bodies, and other
appropriate agencies to resolve any outstanding security
problems and prevent their future recurrence. They are
responsible for the enforcement of DDN policy at their site.
Because information acquisition and distribution is such a
vital part of the responsibility of the Host Administrator,
the use of electronic mail is a basic tool to support this
function and should be used whenever possible. Not all Host
Administrators have access to this valuable tool, but given
its value, these sites are strongly encouraged to implement
this capability.
3. Responsibilities_of_Other_Site_Representatives. There are
several other levels of responsibilities for the provision of
security for the DDN. At the most basic level, the individual
users should take the necessary precautions to minimize the
chances that their accounts could be compromised. They bear
the primary responsibility for the protection of their
information. If users took this responsibility seriously and
acted accordingly, the majority of computer incidents could
not occur. System managers have the responsibility to
maintain the resources and procedures to establish an
environment for "safe" computing (e.g., implementing
procedures for proper installation and testing of system
software, adequate backups, and reasonable system monitoring).
Vendors have the responsibility to notify their customers of
problems with their software (especially problems which could
compromise system security) and to distribute timely fixes.
DCAC 310-P115-1 2-1
CHAPTER 2. THE DDN SECURITY PROBLEM
1. General.
a. A computer network is a telecommunications system
primarily designed to allow a number of independent devices
(i.e., host computers, workstations, terminals, or
peripherals) to communicate with each other. Essentially, the
DDN is a worldwide collection of computer networks. As the
DDN expands its capabilities and resources, and as more
consitituents gain DDN access, the risk increases to the
overall security of the information and data flowing in the
network. Therefore, a major concern is that security problems
will rise in response to this expansion. Additionally, the
possibility of espionage activity also increases as the
network gets larger.
b. On November 2, 1988, Robert Tappan Morris, Jr.,
drastically changed the attitude of network users and
administrators regarding security network and computer
security problems. He unleashed his infamous Internet Worm
which afflicted over 6,000 MILNET and other Internet hosts.
The incident caused a fair amount of panic because most of the
sites were ill-prepared for such a massive scale of
intrusions. It was fortunate that, due to a miscalculation,
the attack was unrestrained. In its original manifestation,
Morris' Worm might have gone undetected at many sites. The
main lesson to be learned from that incident is that everyone
connected with the use of network and computing facilities
must always take into account the vulnerabilities of network
resources to compromise or attack.
2. Attack_Points. The DDN security problem is defined as the
accidental or intentional disclosure, destruction, or
modification of information flowing or accessed through the
DDN. Potential points of attack include terminal-to-network
interface connections, terminal-to-terminal interface
connections, terminal-to-host interface connections, and
interfaces or circuits themselves.
3. Categories_of_Network_Abusers. Identifying the security
problem or threat is a key element in determining security
risks. Consider the fundamental characteristics of the
threats to your assets before you worry about specific
techniques (to be discussed in the following section). For
example:
a. Unauthorized access by persons or programs which
amounts to the use of any network or computer resource without
prior permission. Such unauthorized access may open the door
to other security threats including the use of your facility
to access other sites on a network.
2-2 DCAC 310-P115-1
b. Disclosure or corruption of information. Depending on
the sensitivity of the information, disclosure without
modification may have more damaging consequences if the event
goes unnoticed.
c. Denial of service which prevents users from performing
their work. In fact, an entire network may be made unusable
by a rogue packet, jamming, or by a disabled network
component. (The Morris Worm contained all of these
characteristics. If you have considered options to address
these general characteristics, you may be well-equipped to
handle variations of historic penetration strategies that may
evolve in the future.)
4. Common_Penetration_Techniques. In evaluating the security
relationships between the security of your host computer and
the DDN, you may wish to consider the following penetration
techniques. These are methods that may be used to penetrate
your computers. Therefore, you must take precaution to
prevent the possible success of these types of attacks.
Several techniques exist to aid in the unauthorized access to
computer system components. These techniques are closely
associated with a system's vulnerabilities. Therefore, their
successful application first requires identifying a system's
vulnerabilities. Through analyzing a systems protection
mechanisms (or lack thereof), how they function, and their
deficiencies, consideration can be given to how such
mechanisms can be circumvented, nullified, or deceived. Many
of these techniques can be categorized by the types of
activity they involve and the system vulnerabilities they
exploit. A particular type of technique may be used to
exploit more than one vulnerability, and a vulnerability may
be exploited by more than one technique. Some techniques
leave signatures (i.e., traces of their utilization), others
do not. Such signatures, their detection, and analysis are
fundamental to threat monitoring and security auditing.
a. Browsing. An individual gains unauthorized access to
a user's files by exploiting the vulnerability of a file
access authorization mechanism in the operating system.
"Browsing" requires knowledge of file names and use of a
program, and it characteristically includes the following
operations:
(1) User's program A references a file not authorized
for such use.
(2) The operating system does not check the activity
and permits access.
(3) Program A gains access to the file, reads it, and
formats it for printout, or deposits it into a local file
under the penetrator's control. Unauthorized system users (if
they know all the file names in a system) can use this
DCAC 310-P115-1 2-3
technique numerous times to browse through all the files
looking for classified or sensitive information. This is not
generally possible, however, when files are protected by
passwords.
b. Masquerading. Gaining unauthorized access to a system
component by assuming the identity of another authorized user
is called "masquerading". Success of this technique stems
from a computer system having no means of establishing a
user's identity other than through symbolic identifiers. The
easiest method of masquerading is to obtain the password and
other identifiers of an authorized user from some report or
document that was carelessly left exposed. This situation is
most likely to occur in installations that support remote
terminals where no option exists to have such identifiers
suppressed by the terminal during the SIGN-ON procedure. Even
when a suppression capability is provided by the terminal that
overtypes any such identifiers before or after their printing,
they can still possibly be discerned. A more sophisticated
technique for gaining access to an authorized user's
identifiers is to wiretap the terminal and intercept the
identifiers when they are transmitted in the clear over
communication lines.
c. Scavenging. This penetration technique exploits the
vulnerability of unerased residual data. Both primary and
secondary storage media used for processing sensitive
information may continue to retain that information after
they have been released for reallocation to another use. The
latter may then "scavenge" the information by reading the
storage media before making any other use of it.
d. Unknown_System-State_Exploitation. This method takes
advantage of certain conditions that occur after a partial or
total system crash. For example, some user files may remain
open without an "end-of-file" indication. The user can then
obtain unauthorized access to other files by reading beyond
that indicator when the system resumes operation.
e. Asynchronous_Interrupt. This technique exploits
system vulnerabilities arising from deficiencies in the
interrupt management facilities of an operating system. If a
processor suspends execution of a protection mechanism to
process an interrupt and is then erroneously returned to a
user program without completing the security check then the
protection has been circumvented.
f. Spoofing. Spoofing exploits the inability of a
system's remote terminal users to verify that at any given
time they are actually communicating with the intended system
rather than some masquerading system. This deception, also
known as a "Mockingbird Attack," can be perpetrated by
intercepting the terminal's communication lines and providing
system-like responses to the user. A variation of spoofing is
2-4 DCAC 310-P115-1
the use of an application program to provide responses similar
to the operating system, so the operator will unknowingly
provide the passwords to an applications program and not to
the operating system.
g. Trojan_Horse. In this technique computer processing
is covertly altered by either modifying existing program
instructions or inserting new instructions. Once this has
been accomplished, whenever the altered processes are used the
perpetrator will automatically benefit from unauthorized
functions performed in addition to the routine output. This
modification is usually done by hiding secret instructions in
either the original source-code or the machine-code version of
a lengthy program. An even harder to detect method would be
to alter the operating and utility system programs so that
they make only temporary changes in the target program as it
is executing. The hardware version of the Trojan Horse
technique is relatively rare. However, the replacement of
valid micro-chips with slightly altered counterfeit chips is
entirely possible and would be very hard to detect. In either
the software or hardware Trojan Horse method, only someone
with access to a program or the computer system could become a
perpetrator.
h. Clandestine_Machine_Code_Change. This technique is
closely related to the Trojan Horse technique. This method
allows system programmers to insert code into the system that
creates trapdoors. At specific times based on certain
combinations, these trapdoors can be activated by a user from
the user's program. Individuals who initially design the
system, contract maintenance personnel who fix the system, or
people who are able to gain access to the supervisory state
also have this opportunity. The technique could be as simple
as users stealing job card information on work that has
already gone through the system. They then resubmit this
information to the system on their own job card along with
another program. This particular job may have dealt with
sensitive data and therefore a security violation would have
occurred.
5. Necessary_Precautions. The aforementioned techniques are
only a few ways that unauthorized access or usage of your host
computer system may be obtained. You must enforce proper
access control on remote terminals to prevent unauthorized
personnel from abusing unattended terminals used for input or
data modification. You must also emphasize the physical
protection of the terminal and the administration and control
of password access and use. Terminal users must be instructed
on the importance of protecting their user identification
(UID)/password.
DCAC 310-P115-1 3-1
CHAPTER 3. NETWORK ACCESS SECURITY
1. General. Access control is the primary method of
providing protection from unauthorized access into the DDN.
There are two basic kinds of access control systems -- those
that detect intrusion and those that stop an intruder from
gaining access to the network. Both intrusion detection and
network access control are functions of the TAC Access Control
System (TACACS) which monitors terminal network access. The
security of both the network and connected hosts is greatly
enhanced if the Host Administrator can provide local security
systems which can complement the TACACS. Possibilities
include installing security systems which limit physical
access to terminals connected to their hosts. Another weak
link in the security chain is dial-up access and host-to-host
connections (not under TACACS control). There is a great need
to establish some manner of access control with auditing
capabilities to cover these situations.
2. TAC_Access_Control_System_(TACACS). This section on
TACACS is provided to inform you of the tracking capability
that exists if your computer terminal is connected to a
Terminal Access Controller (TAC). The information obtained by
the TACACS will be quite useful in enforcing proper access
control for those users entering the MILNET through TACs.
TACACS uses a login procedure to control access to MILNET.
When a MILNET user attempts to open a connection to a host,
the TAC prompts for the user's TAC user ID and access code.
TACACS is automatically monitored; a variety of reports are
available for use by the NSO.
a. User_Registration. DCA's Data Network Operations
Division establishes policy for the MILNET and administers the
MILNET TAC access and control system through the Network
Information Center (NIC). TACs are used on MILNET to provide
controlled network access to most locations. The Host
Administrator is responsible for registering all users of
their hosts who have network access and who have been
authorized for MILNET TAC access through MILNET TACS. All of
those users must be registered and given TAC access cards by
the NIC. The access cards are valid for one year at which
time the TAC User must request a renewal from the Host
Administrator. If a password is compromised, the UID/password
can be invalidated (hotlisted).
b. Guest_Accounts. A limited number of temporary guest
cards are available for distribution by each Host
Administrator on MILNET. These cards have a limited lifetime
and are not for permanent use. They are for users without
TACACS privileges who temporarily need network access, or for
new users at startup time before they receive their own UID
and password.
3-2 DCAC 310-P115-1
c. WHOIS/NICNAME_Database. Every request to authorize a
new TAC user or renew an existing TAC user must come from a
MILNET Host Administrator. Information about authorized users
is kept in the WHOIS/NICNAME database on a host at the NIC.
Host Administrators can request information on authorized TAC
users that are changed or deleted from the database. The
WHOIS/NICNAME database can be accessed by anyone on the MILNET
but can be changed only by operators at the NIC.
DCAC 310-P115-1 4-1
CHAPTER 4. OPERATIONAL SECURITY MANAGEMENT OF
UNCLASSIFIED NETS
1. General.
a. This Chapter provides operational guidance on security
management of an unclassified network. Chapter 5 provides
guidance for operating on a classified net. The potential
exists for authorized and unauthorized users to conduct
illegal activities on shared communications networks such as
the DDN. Network abusers fall into three categories:
(1) A person sponsored and authorized on the DDN who
engages in an unauthorized activity.
(2) A person accessing the network illegally.
(3) A person with access to a host system who need
not log-in through a TAC and engages in unauthorized activity.
b. While your individual databases may be unclassified,
compiling large amounts of unclassified data may result in the
creation of sensitive information. [SENSITIVE UNCLASSIFIED
INFORMATION is defined as any information the loss, misuse, or
unauthorized access to, or modification of which adversely
might affect U.S. national interest, the conduct of DoD
programs, or the privacy of DoD personnel (e.g., FOIA exempt
information and information whose distribution is limited by
DoD Directive 5230.24.)] Network security can only be as
effective as what the local Host Administrator/ADP system
security officer does to enforce strict access control
procedures. Network security is a principle responsibility of
Host Administrators.
c. You may wish to investigate additional authentication
systems to protect local computing assets (i.e., systems such
as smart cards or Kerberos, developed at MIT. This is a
collection of software used in a network to establish a user's
claimed identity and to control access to a large number of
interconnected workstations).
2. Access_Vulnerability. Connection to the DDN will require
a reevaluation of the risk assessment concerning threat and
vulnerability of your host locations. Users accessing these
hosts should be told what level of data security will be
provided. For example, do maintenance contracts exist with
the system software vendors to fix defects that might
otherwise compromise the resources? You should consider what
is the level of sensitivity of data that users should store on
your systems. It would be unwise for users to store very
sensitive information on a vulnerable system whether the
information was classified or not. It is also very important
that your site does not seem to encourage penetration attempts
through the use of a welcome banner as part of the login
4-2 DCAC 310-P115-1
request response of the host. The courts have given great
leeway to intruder defendants who claimed that they were
encouraged to browse by the banner. Additionally, your login
challenge should not include information about the operating
system. It helps a would-be abuser determine which
penetration techniques would probably be most effective.
3. Risk_Assessment. Risk assessment is a requirement of DCAI
630-230-19. A checklist providing guidelines for reevaluating
the threat and vulnerability that results from connecting to
the DDN has been included (see Tables 1-6, Vulnerability
Analysis).
4. Security_Policies_and_Procedures. This section covers
many diverse aspects such as physical security and data
security, authorizations, education, and training.
a. Physical_Security. Physical security includes the
facilities that house computers as well as remote computer
terminals. Within security parameters established by the Host
Administrator, work areas must be restricted with physical
barriers, appropriate placement and storage of equipment and
supplies, and universal wearing of identification badges, as
applicable.
b. Authorization. Another crucial factor that must be
considered in devising a security program is user
authorization. Only people with a "need to know" and with a
realization of proper precautions can be given access to
sensitive or proprietary information or to ADP facilities.
The use of passwords and terminal access restrictions can
provide extra security for highly sensitive information.
Passwords can be used to reduce accidental or non-accidental
modification by authorized personnel by restricting access to
their respective database files.
c. Data_Security. Although it is not foolproof, the best
known identification/authentication scheme is the use of
passwords. The Host Administrator must assure that passwords
are kept secret by their users. The Host Administrator must
also assure that passwords are long enough to thwart
exhaustive attack by changing them often and by adequately
protecting password files. (In the case of MILNET TAC Users,
the TACACS generates passwords with the proper attributes.
The users are not given the option to create their own TAC
passwords.) When creating passwords, the following
restrictions should be observed. Failure to do so will result
in passwords that could be found in a database dictionary, or
otherwise easily discovered.
(1) Don't use words that can be found in a
dictionary.
DCAC 310-P115-1 4-3
(2) Don't use traceable personal data.
(3) Don't allow users to create their own passwords.
(4) Change passwords frequently.
(5) Keep passwords private.
d. One-Time_Passwords. [The following is excerpted from
CSC-STD-002-85.] One-time passwords (i.e., those that are
changed after each use) are useful when the password is not
adequately protected from compromise during login (e.g., the
communication line is suspected of being tapped). The
difficult part of using one-time passwords is in the
distribution of new passwords. If a one-time password is
changed often because of frequent use, the distribution of new
one-time passwords becomes a significant point of
vulnerability. There are products on the market that generate
such passwords through a cryptographic protocol between the
destination host and a hand-held device the user can carry.
e. Failed_Login_Attempt_Limits. [The following is
excerpted from CSC-STD-002-85.] In some instances, it may be
desirable to count the number of unsuccessful login attempts
for each user ID, and base password expiration and user
locking on the actual number of failed attempts. (Changing a
password would reset the count for that user ID to zero.)
f. Monitoring_Terminal_Use. The Host Administrator
should also have some method of monitoring terminal use. A
log-in sheet is convenient to provide an audit trail if the
host has no automated access control and audit capability.
This record should contain such information as login and
logout times, purpose, project being worked on, project
classification, and anything else deemed necessary by you as
the Host Administrator. Additionally, the classification
level at which the terminal may be used should be prominently
displayed at the terminal location. You will need to work
closely with the system manager to assure that host activities
are monitored as well. This information will be extremely
valuable in conjunction with TAC connections and will be the
primary information for incidents where access originated from
an external host and no network audit data is available.
g. Terminal_Usage. You must also ensure that proper
procedures are enforced when using computer terminals. The 4-
following points should be considered:
(1) Automated login procedures that include the use
of stored passwords should not be allowed.
(2) Terminals logged onto the DDN network or to the
host computer should not be left unattended.
4-4 DCAC 310-P115-1
(3) Some form of access control for dial-up telephone
connections, such as dial-back procedures, should be used.
[Note: Dial-back is not acceptable on lines that may be
subject to Call Forwarding.]
(4) Unclassified sensitive information in printed
form or in terminal display should be revealed on a "need to
know" basis only.
(5) Proper disposal of printed information (i.e.,
tearing, shredding, or otherwise obliterating such material)
is mandatory.
(6) Securing of terminals and access lines during
non-business hours.
(7) Securing of software programs and stored data
during non-business hours.
(8) Recording of equipment, custodians, serial
numbers, and equipment locations to aid in identifying lost or
stolen equipment.
h. Electronic_Mail. Any electronic mail host
administrator should have written procedures for users to
follow in the event that any mail in the host is determined to
be classified. The Host Administrator must be notified
immediately to purge any backup files containing the
classified mail, retrieve it from addresses and mail boxes,
and remove it from the active data base. Such an event is an
administrative security violation that must be reported to the
offender's organization security officer immediately.
i. Internal_Controls. Even the most sophisticated access
control system is ineffective if an organization has weak
internal controls. Case studies of commercial firms often
describe abuses made by employees who have resigned from a
company, but still have active user IDs and passwords. It is
just as important for Military or DoD organizations to remove
network access, as well as local host computer access, from
anyone being transferred, retired, or otherwise leaving the
organization. Changing (all of) the password(s) associated
with a user's account(s) should be part of the local exit
procedures. Every Host Administrator should have written
procedures for retiring e-mail accounts. Consideration should
also be given to establishing a procedure to reevaluate an
individual's requirement to access the network when the person
is transferred within the organization. It is the Host
Administrator's responsibility to enact the following:
(1) Procedures to remove individuals' access to the
DDN upon that individual's departure.
DCAC 310-P115-1 4-5
(2) If sponsoring a non-DOD organization's access to
the DDN, procedures must be established to require a written
agreement that the non-DOD organization will have an
individual's access to the DDN removed upon that individual's
departure.
j. Encryption. Another method of securing data is
encryption, a powerful method of protecting information
transmitted between the host computer and remote terminals.
It limits access to information stored in the computer's data
base. An individual user not possessing the proper encryption
key has little chance of gaining usable information from a
computer protected in this manner.
5. Education_Program. Security training is a key element of
a security program. Evaluating the risks within a DDN
environment and implementing an active DDN security program
requires properly trained personnel. An effective training
program will provide both formal and informal instruction.
Depending on the size and complexity of the ADP environment
and the level of data being processed, the instruction will
range from security awareness education for top-level
management, to highly technical security training for DDN
operations personnel. (See DCAI 630-230-19).
a. General_Information. Users of the host system should
be provided with information regarding their computing and
network environment and their responsibilities within that
setting. Users should be made aware of the security problems
associated with access to the systems via local and wide-area
networks. They should be told how to properly manage their
account and workstation. This includes explaining how to
protect files stored on the system, and how to log out or lock
the terminal/workstation. Policy on passwords must be
emphasized. An especially important point that must be
emphasized is that passwords are not to be shared.
b. Specific_Topics. The below listed training areas must
be taught at the appropriate administrative, management, and
staff levels. You must also implement testing plans to assure
that personnel will know their responsibilities in emergency
situations. Drills should be scheduled periodically to
determine that the emergency procedures are adequate for the
threat to be countered. The Host Administrator's security
training program should include specifics in the following
areas as applicable:
(1) General security awareness.
(2) User security.
(3) Security administration.
(4) Transition control and computer abuse.
4-6 DCAC 310-P115-1
(5) Software security.
(6) Telecommunications security.
(7) Terminal/device security.
(8) System design security.
(9) Hardware security.
(10) Physical security.
(11) Personnel security.
(12) Audit.
(13) Data security.
(14) Risk assessment.
(15) Contingency/backup planning.
(16) Disaster recovery.
(17) Security accreditation.
(18) Security test and evaluation (ST&E).
(19) DDN security and contractor interface.
(20) Common penetration techniques.
DCAC 310-P115-1 5-1
CHAPTER 5. OPERATIONAL SECURITY MANAGEMENT OF
CLASSIFIED NETS
1. General. Unauthorized user activities obviously pose a
greater threat to the classified nets. Since the classified
communications nets are closed communities, classified hosts
must maintain their own access control and audit system to
detect and analyze problems. For specific details concerning
security in the WIN Communications System (DSNET 1), refer to
JCS Pub 6-03.7, Security_Policy_for_the_WWMCCS_Intercomputer
Network (Unclas), dated April 88. For specific details
concerning security in the Sensitive Compartmented Information
Network (DSNET 3), refer to the following documents: DIAM 50-
3, Physical_Security_Standards_for_SCI_Facilities (FOUO); DIAM
50-4, Security_of_Compartmented_Computer_Operations (C), dated
June 80; and DCID 1/16, Security_Policy_for_Uniform_Protection
of_Intelligence_Processed_in_Automated_Information_Systems_and
Networks (S), dated July 88.
2. Limited_Terminal_Access_Controls. Terminal access
controllers, when used on the classified subnetworks, are
currently limited to controlling access into the network. The
TACs do not collect and forward audit information of network
activity to a central location for analysis, usage data
collection, and processing as is done on the unclassified
networks. The TAC Access Control System (TACACS), necessary
for dial-in access, has not been implemented on the classified
networks because there is no dial-in access. In the WIN
Communications System, for example, TACs are not used; network
access is controlled by the interconnected hosts. The WWMCCS
Intercomputer Network (WIN) hosts also collect audit data of
user activity at each host location.
3. Closed_Community_Characteristics. Most, if not all, of
the guidance given in Chapter 4 is incorporated in creating a
"closed" community. A major difference in access control of
classified networks is that no dial-up access is allowed.
Also, personnel having access to a facility will have, as a
minimum, a system high clearance level for their site. There
are multiple classification levels at some locations. The
Host Administrator must take special precautions to ensure
that the classification of passwords and the access authority
of operating personnel are at or above the classification
level of the operation being performed.
4. Security_Awareness. Because of the nature of classified
systems and the greater threat that security infractions can
cause, it is incumbent that the host administrator assure that
there exists sufficient exposure to security awareness and
training. The listed training areas must be taught at the
appropriate administrative, management, and staff levels. You
must also implement testing plans to assure that personnel
will know their responsibilities in emergency situations.
The Host Administrator's security training program must
5-2 DCAC 310-P115-1
include specifics in the following areas:
(1) General security awareness.
(2) User security.
(3) Security administration.
(4) Transition control and computer abuse.
(5) Software security.
(6) Telecommunication security.
(7) Terminal/device security.
(8) System design security.
(9) Hardware security.
(10) Physical security.
(11) Personnel security.
(12) Audit.
(13) Data security.
(14) Risk assessment.
(15) Contingency/backup planning.
(16) Disaster recovery.
(17) Security accreditation.
(18) Security test and evaluation (ST&E).
(19) DDN security and contractor interface.
(20) Most common penetration techniques.
DCAC 310-P115-1 6-1
CHAPTER 6. DETECTION OF UNAUTHORIZED HOST ACCESS
1. General. Because you, as the Host Administrator, are
responsible for the security of the host computer, early
detection of potential abuse will serve to prohibit losses.
Effective monitoring will also deter potential perpetrators
from attempting to experiment with illegal schemes if the
probability of detection is high. The following points
provide guidance for the types of events you should look for
to detect unauthorized activity:
a. Unexplained use of disk space.
b. Unknown files listed in the directory.
c. Repeated failed attempts to access the host.
d. Unusual log-in times.
e. A file being accessed by someone who has no
authorization to be in that file.
f. Excessive time (hours) on line or a pattern of
unusually short access times (less than one minute).
2. Detection_Training. Detection of unauthorized activities
at host locations is a responsibility shared by all personnel
within the work place. The Host Administrator, however, may
find it necessary to educate personnel on this point and
delegate responsibilities. Apart from the measures taken to
manage the security environment, Host Administrators must act
with diligence regarding technical or quasi-technical areas
affecting security. For example, their responsibilities might
include enforced cycling of password changes,
compartmentalizing proprietary information away from the
generally accessible system and limiting its accessibility to
those with a bona fide "need-to-know," monitoring access logs
and maintaining audit trails to facilitate detection of
unusual activity, and using security systems and services
offered by their network systems and service providers.
3. Logging_Events. Illegal attempts to gain access into
sensitive areas (i.e., trespassing or guessing at passwords in
order to sign on or access files from remote terminals) should
be logged and reviewed regularly. One effective detection of
unauthorized activities is to display the last log-on time and
date on the screen after the user has successfully logged onto
the system. Statistics of access violations should be
collected with regard to details of the particular terminals
being abused and the files being accessed. The results should
be reviewed by the NSO.
4. Peculiar_Behavior. If not typical of or appropriate for
your organization, beware of unsupervised work especially if a
6-2 DCAC 310-P115-1
person regularly volunteers for overtime work and is allowed
to stay on the premises unsupervised. Have two-man control
procedures for sensitive information work. In addition, be
advised that many computer crimes occur during holiday
periods, or during times when host computers are experiencing
low traffic. Pay particular attention to peculiar activities
during these periods.
5. Legal_Recourse. Public Law 98-473, known as the
"Counterfeit Access Device and Computer Fraud and Abuse Act of
1984" added Section 1030 to Title 18 United States Code on
October 12, 1984. It was the first federal computer crime law
that criminalized unauthorized access to classified national
security information or information in certain financial
records. Additionally, it criminalized certain unauthorized
accesses to computers operated on behalf of the Government.
6. Prosecution_as_a_Deterrent. When there is adequate
evidence collected for conviction, the perpetrator should
always be prosecuted. This action would serve as a serious
warning to others contemplating making similar attempts and
can be extremely effective as a deterrent. However, as recent
world events have revealed, this really doesn't deter abuse
adequately. Therefore, you must assure proper protection of
your computer systems.
7. Incident_Reporting_by_Subscriber. The flow of security
incident reporting should be from the end user to the Host
Administrator, or other appropriate individual who determines
if the problem is local or network related. If the problem is
network related, the problem should be referred to the
appropriate Network Manager/Security Officer. The Network
Manager/Security Officer would contact the DDN NSO, if
appropriate, for assistance in obtaining audit trail data from
the NIC for MILNET. Depending on the seriousness of the
incident, the DDN NSO would assure that the appropriate
investigating agency was involved, and support requests for
information for formal investigations.
8. Contacts. To correspond with the DDN NSO, use any one of
the following methods of contact:
a. Via network mail to: SCC@NIC.DDN.MIL or
DCA-MMC@DCA-EMS.DCA.MIL
b. Via U.S. mail to: HQ Defense Communications Agency,
Code: DODM, Attn: DDN-NSO, Washington, DC 20305-2000
c. Via commercial phone to: (800) 451-7413, or
(800) 235-3155 for the SCC
d. Via DSN/AUTOVON to: 312-222-2714/5726
e. Via AUTODIN to: DCA WASHINGTON DC//DODM//
DCAC 310-P115-1 6-3
f. Classified correspondence must be forwarded via
AUTODIN or U.S. mail using procedures appropriate for its
classification level.
9. What_Information_To_Report. Your incident reports must
include certain minimal information to enable the DDN NSO to
take action. The DDN NSO requires a brief, unclassified
description of the incident and the name, telephone number,
and organization of the person reporting the incident. If the
incident's occurrence is classified, the report and any
classified discussions between the DDN NSO and officials at
the affected organization must take place using secure modes
of communication. The following is the minimum information
necessary for an incident report:
a. Date of report (Day-Month-Year, e.g., 01 Jan 87)
b. Date and time period of incident(s) (Zulu time)
c. Personal data of person reporting the incident:
(1) Name
(2) Telephone number
(3) Organization
d. Network involved (e.g., MILNET, DSNET 1, 2, or 3)
e. Did unauthorized access come from the DDN, if known?
(If not, refer reporting person to his/her Host
Administrator).
f. Presumed classification of incident (i.e.,
Unclassified, Confidential, Secret, Top Secret, Top
Secret/Sensitive Compartmented Information. [Note: Contact
the DDN NSO should you have any questions concerning the level
of classification of a particular incident.]
g. Brief description of incident (Unclassified).
10. Follow-up_Information. Follow-up contact with Host
Administrators might be required to obtain more detailed
information that may not have been initially available. The
DDN NSO would try to determine the following factors:
a. Where the activity was initiated (i.e., at another
host or specific TAC)
b. What routines the intruder ran on the host system
c. What files the intruder accessed on the host system
6-4 DCAC 310-P115-1
d. What user identification log-in was used. For
example, was there a password? Was the password the same as
the log-in? Was the account password protected? Did the user
change the password initially provided? Security incidents
that are discovered to be a local problem will be investigated
at the Host Administrator level.
DCAC 310-P115-1 7-1
CHAPTER 7. TOOLS FOR INVESTIGATING INCIDENTS
AT THE HOST LEVEL
1. General. This Chapter will help you, the Host
Administrator, with investigations of security incidents that
are determined to be a local problem. The tools available for
investigating network incidents are products of audit trail
data collected in the TAC Access and Control System for the
unclassified networks and in the audit data collection systems
of the individual hosts (if they exist) in both the classified
and unclassified networks. The network traffic data collected
by the network utilities at the community of interest
monitoring centers is useful for network control and design
purposes, but its use for network security investigative
purposes is limited.
2. Host_System_Logs. The host system can provide a wealth of
information that can complement the network data. Most
operating systems automatically store numerous bits of
information in log files. Examination of these log files on a
regular basis is often the first line of defense in detecting
unauthorized use of the system. Lists of currently logged in
users and past login histories can be compared. Most users
typically log in and out at roughly the same time each day.
An account logged in outside the "normal" time for the account
may be in use by an intruder. System logging facilities, such
as the UNIX "syslog" utility, should be checked for unusual
error messages from system software. For example, a large
number of failed login attempts in a short period of time may
indicate someone trying to guess passwords. Operating system
commands which list currently executing processes can be used
to detect users running programs they are not authorized to
use, as well as to detect unauthorized programs which have
been started by a cracker.
3. Other_Tools. The tools available for conducting an
incident investigation on unclassified nets consist of the
TACACS reports, provided to the DDN NSO, and the Host audit
and log book, if used. Additionally, personnel may be
interviewed to provide necessary insight. The tools available
for conducting an investigation on classified nets include the
Host audit, system logs, physical log book, and personnel as
well. Additionally, the UID/password and the specific
terminal will provide further useful information. No TACACS
reports are available for the classified nets.
4. TACACS_Reports. TACACS incident reports are reviewed by
the DDN NSO for unauthorized network activity. Other TACACS
reports are available to the DDN NSO to help investigate
illegal or unauthorized network activity. You as the Host
administrator can request investigative assistance from the
DDN NSO to obtain TACACS audit data for MILNET. Assistance
may also be requested by the Host Administrator to involve an
investigating agency (e.g., FBI, OSI, NIS, MI, etc.).
7-2 DCAC 310-P115-1
THIS PAGE INTENTIONALLY LEFT BLANK
DCAC 310-P115-1 8-1
CHAPTER 8. SUMMARY
1. Penetration_Techniques. This document has provided you,
as Host Administrators, guidelines for securing your host
computer locations. Security problems arise and espionage
activity may increase as access to computers increases.
Therefore, you must apply these instructions because you are
ultimately responsible for the security of the DDN. This
instruction has covered common penetration techniques you must
guard against.
2. Other_Topics. The major items this document emphasizes
are the following:
a. Proper access control procedures
b. Reevaluation of the risk assessment of your host site
c. Security education training
d. Detection of unauthorized or suspected unauthorized
access
e. Incident reporting
f. Tools for local incident investigation
g. Assistance from the DDN NSO for network incident
investigations
8-2 DCAC 310-P115-1
THIS PAGE INTENTIONALLY LEFT BLANK
DCAC 310-P115-1 9-1
TABLE 1: VULNERABILITY ANALYSIS
-------------------------------------------------------------
**Operations Management and Processing**
-------------------------------------------------------------
Item Response
Comments (Yes, No, N/A)
-------------------------------------------------------------
Has a systems security officer | |
been appointed? | |
-------------------------------------------------------------
Have procedures been developed | |
defining who can access the | |
computer facility, and how and | |
when that access can occur? | |
-------------------------------------------------------------
Have procedures been established | |
to provide physical protection of | |
local and remote terminal access | |
equipment? | |
-------------------------------------------------------------
Have procedures been established | |
to provide physical protection of | |
host computers?
-------------------------------------------------------------
Is someone designated as a terminal | |
area security officer? | |
-------------------------------------------------------------
Have procedures been established to | |
positively identify transactions | |
occurring to and from remote | |
locations? | |
-------------------------------------------------------------
Have security procedures been | |
established for the microcomputers | |
which will communicate with the DDN? | |
-------------------------------------------------------------
Have procedures been established | |
for providing physical security over | |
these microcomputers and the data | |
processed by them? | |
-------------------------------------------------------------
Have procedures been established | |
to protect data within the custody | |
of the microcomputer user? | |
-------------------------------------------------------------
Have alternate means of processing | |
been established in the event either | |
the individual or the personal | |
computer is lost? | |
-------------------------------------------------------------
9-2 DCAC 310-P115-1
TABLE 1: VULNERABILITY ANALYSIS (con't)
-------------------------------------------------------------
Item Response
Comments (Yes, No, N/A)
-------------------------------------------------------------
Is the security over the micro- | |
computer environment regularly | |
reviewed? | |
-------------------------------------------------------------
Have the vendor installed pass- | |
words been changed? | |
-------------------------------------------------------------
Does someone verify that all current | |
passwords are different from a list | |
of commonly used or vendor installed | |
passwords? | |
-------------------------------------------------------------
DCAC 310-P115-1 9-3
TABLE 2: VULNERABILITY ANALYSIS
-------------------------------------------------------------
**Communications**
-------------------------------------------------------------
Item Response
Comments (Yes, No, N/A)
-------------------------------------------------------------
Is sensitive information transmitted | |
over common carrier lines protected | |
(e.g., through cryptography)? | |
-------------------------------------------------------------
Can data being transmitted or | |
processed be reconstructed in | |
the event either main processing | |
or remote processing loses integrity?| |
-------------------------------------------------------------
Are processing actions restricted | |
based on the point of origin or the | |
individual making the request? | |
-------------------------------------------------------------
Have procedures been established | |
for providing host connection | |
access control over remote terminals | |
and on-site terminals? | |
-------------------------------------------------------------
Is a log maintained of accesses | |
to computer resources? | |
-------------------------------------------------------------
Do non-employees have access to | |
communications facilities (except | |
where the system specifically is | |
designed for those non-employees)? | |
-------------------------------------------------------------
9-4 DCAC 310-P115-1
TABLE 3: VULNERABILITY ANALYSIS
-------------------------------------------------------------
**Disasters**
-------------------------------------------------------------
Item Response
Comments (Yes, No, N/A)
-------------------------------------------------------------
Have the types of potential | |
disasters been identified? | |
-------------------------------------------------------------
Has equipment been provided to | |
deal with minor disasters, such | |
as fire and water damage? | |
-------------------------------------------------------------
Have alternate processing | |
arrangements been made in the | |
event of a disaster? | |
-------------------------------------------------------------
Have procedures been established | |
to provide back-up equipment or | |
automatic data processing (ADP) | |
processing capabilities in event of | |
loss of primary ADP resources? | |
-------------------------------------------------------------
Have simulated disasters been | |
conducted to ensure that disaster | |
procedures work? | |
-------------------------------------------------------------
Are critical programs and data | |
retained in off-site storage | |
locations? | |
-------------------------------------------------------------
Have users been heavily involved | |
in developing disaster plans for | |
applications that affect their areas?| |
-------------------------------------------------------------
DCAC 310-P115-1 9-5
TABLE 4: VULNERABILITY ANALYSIS
-------------------------------------------------------------
**Personnel**
-------------------------------------------------------------
Item Response
Comments (Yes, No, N/A)
-------------------------------------------------------------
Are formal reports required for | |
each reported instance of computer | |
penetration? | |
-------------------------------------------------------------
Are records maintained on the most | |
common methods of computer | |
penetration? | |
-------------------------------------------------------------
Are records maintained on damage | |
caused to computer equipment and | |
facilities? | |
-------------------------------------------------------------
Is one individual held accountable | |
for each data processing resource? | |
-------------------------------------------------------------
Does management understand threats | |
posed by host connection to DDN? | |
-------------------------------------------------------------
Is management evaluated on its | |
ability to maintain a secure computer| |
facility? | |
-------------------------------------------------------------
Are the activities of any non- | |
employees in the computer center | |
monitored? Is an escort policy | |
enforced? | |
-------------------------------------------------------------
Are contractor personnel subject to | |
the same security procedures as other| |
non-employees? | |
-------------------------------------------------------------
Are procedures installed to restrict | |
personnel without a "need to know"? | |
-------------------------------------------------------------
Have procedures been established | |
to limit the damage, corruption, or | |
destruction of data base information?| |
-------------------------------------------------------------
Has a security incident report form | |
been created? | |
-------------------------------------------------------------
9-6 DCAC 310-P115-1
TABLE 5: VULNERABILITY ANALYSIS
-------------------------------------------------------------
**Training**
-------------------------------------------------------------
Item Response
Comments (Yes, No, N/A)
-------------------------------------------------------------
Are employees instructed on how to | |
deal with inquiries and requests | |
originating from individuals without | |
a "need to know"? | |
-------------------------------------------------------------
Has an adequate training program | |
been devised to ensure that employees| |
are aware of the requirements to pro-| |
tect their equipment from unauthor- | |
ized use or unauthorized purposes? | |
-------------------------------------------------------------
Have personnel been advised on | |
penalties of the Federal Computer | |
Crime Law for unauthorized access to | |
Government ADP systems? | |
-------------------------------------------------------------
DCAC 310-P115-1 9-7
TABLE 6: VULNERABILITY ANALYSIS
-------------------------------------------------------------
**People Errors and Omissions**
-------------------------------------------------------------
Item Response
Comments (Yes, No, N/A)
-------------------------------------------------------------
Are errors made by the computer | |
department categorized by type | |
and frequency, such as programming | |
errors? | |
-------------------------------------------------------------
Are records maintained on the | |
frequency and type of errors | |
incurred by users of data | |
processing systems? | |
-------------------------------------------------------------
Are users provided a summary of | |
the frequency and types of user- | |
caused errors identified by the | |
application system? | |
-------------------------------------------------------------
Are the losses associated with | |
data processing errors quantified? | |
-------------------------------------------------------------
Are records maintained on the | |
frequency and type of problems | |
occurring in operating systems? | |
-------------------------------------------------------------
Are abnormal program terminations | |
on computer software summarized | |
by type and frequency so that | |
appropriate action can be taken? | |
-------------------------------------------------------------
Are personnel trained to recognize | |
attempts to access their system by | |
common penetration techniques? | |
-------------------------------------------------------------
9-8 DCAC 310-P115-1
TABLE 7: TABULATION OF VULNERABILITY ANALYSIS
-------------------------------------------------------------
**Self-Assessment Results**
---------------------------
HOW TO IDENTIFY VULNERABILITIES
-------------------------------------------------------------
| # of | Rank for |
Component | "No's" | Action | Comments
-------------------------------------------------------------
Operations Management | | |
and Processing | | |
-------------------------------------------------------------
| | |
Communications | | |
-------------------------------------------------------------
| | |
Disasters | | |
-------------------------------------------------------------
| | |
Personnel | | |
-------------------------------------------------------------
| | |
Training | | |
-------------------------------------------------------------
People Errors and | | |
Omissions | | |
-------------------------------------------------------------
*--- End
Sourced by: The Dope Man
Topic: Canadian Telecom Safety Checklist
Length: 2.1KB
Begin ---*
SAFETY CHECKLIST (CANADIAN TELECOM Feb 93)
Ultimately, human factors are the weakest link in any protection plan.
Some of these protection steps will cost money and cause inconvenience to
your users, but the only way to eliminate CPE-based toll fraud is to
manage equipment you control.
Your telecommunications equipment can be protected against virtually all
toll fraud if you follow this checklist. You should consult your vendor
to obtain detailed (in writing, if there are liability concerns) about
your equipment.
1. Deny unauthorized access to long-distance trunking
facilities through your voice-mail systems.
- block activation/assign passwords.
2. Secure Direct Inward System Access (DISA) numbers.
- do not publish DISA numbers.
- use long authorization codes.
3. Foil "Dumpster divers".
- shred CDR records.
- switch printouts and other documentation.
4. Change codes frequently.
- delete former employee codes.
5. Secure authorization codes.
- use many digits.
- do not share among employees.
- treat like credit card numbers.
6. Block DISA in all equipment.
- at least restrict nights, weekends,
holidays (prime times for fraud).
7. Monitor call records.
- look for suspicious calling patterns.
- automate exception reporting.
8. Restrict international calls.
- block or selectively allow for certain
country and area codes.
9. Restrict call forward.
- do not permit forwarding to long-distance
or trunking facilities.
10. Secure access codes and passwords.
- discourage employees from having them
in plain view.
- warn of "shoulder surfing".
11. Secure your equipment rooms.
- know who has access to them.
- do not use for janitorial storage.
12. Deactivate ports access.
- block access to remote maintenance ports.
13. Keep telephone numbers private.
- do not discuss number plan outside of company.
- destroy old internal phone books.
*--- End
---
"I saw no man use you at his pleasure. If I had, my weapon
should quickly have been out, I warrant you. I dare draw as
soon as another man, if I see occasion in a good quarrel, and
the law on my side" - William Shakespeare, Romeo & Juliet
---
NEWS BYTES (and usually bites too)
The Dope Man - Lister - Terminator X - Ibex
Special thanks this month go out to Ibex, whose only forms of
communcation with us have been limited to US Post, and messages back and
fourth on a voice mail system. We unfortunately won't be able to publish
your submission this issue, due to time constraints. Sorry.
Sourced by: Lister
Topic: Phone fraud bill $100 million
Length: 3.3KB
Begin ---*
Bell bans overseas card calls from pay booths
By Dana Flavelle/Toronto Star - Toronto, Ontario
Long-distance telephone fraud is an estimated $100 million headache
for Canadian telephone companies and some of their biggest customers --
and it's growing, says a telecommunications industry expert.
"It's become a huge issue in the last year or so in Canada," said
Ian Angus, a consultant who's writing a book on the subject.
At least some long-distance fraud is committed by computer hackers
who gain access to major corporate telephone networks and start ringing
up big bills, he said.
But most of it is "low-tech" credit card and telephone calling card
fraud, Angus said in a telephone interview following yesterday's
announcement by Bell Canada that it will no longer accept overseas card
calls from pay phones.
"We didn't want to do this," Bell spokesperson Una MacNeil said in
an interview. "We know it's an inconvenience. But it's a significant
enough problem that we have to put a plug in it until we work out a
longer-term solution."
In the past two months, one in five overseas calls made from pay
telephones has been fraudulent, she said. Bell is not revealing the cost
of the fraud for "security" reasons, she said.
Effective yesterday, a customer who tries to use a credit card or
telephone calling card to make an overseas call from a pay phone will be
given the following options by an operator:
[] Go to a non-pay phone to place a card call;
[] Have the call billed to a third party, provided there's someone
avaliable to accept the charges;
[] Make a collect call, except in cases where no collect call
agreement exists between Canada and the coutry being called; or
[] Pay cash.
In addition, Bell has stopped accepting cash calls from certain
kinds of pay phone to five overseas contries: China, Pakistan,
Bangladesh, Macao and Hong Kong.
Situated mainly in airports and major hotels, these are the kind of
pay phones that simply "read" the magnetic strip on the back of the
credit or calling card, and will also accept cash calls.
For reasons Bell officials wouldn't explain, phony cash calls can be
placed from these kinds of telephones to these specific countries.
"We don't like to talk a lot about this issue because we don't want
to give people ideas," MacNeil said.
Credit cards and calling cards can still be used to make pay phone
calls within North America, where fraud hasn't been a big problem, Bell
said.
Most of the fraud is being committed by organized theives, who get
hold of calling card numbers by watching people use their cards in busy
public places like airports, said Angus.
Then, they set up shop around public pay phones using those numbers
to make calls for customers who are charged about $5, he said.
Police in Montreal busted one racket operating in a subway station
earlier this year, he said.
A task force of Bell and Northern Telecom engineers is trying to
devise electronic ways of thwarting such frauds and, better still,
detecting people in the act.
MacNeil was confident full overseas service will eventually be
restored, but couldn't predict when.
"It is a large problem and we have a lot of people working on it."
she said.
*--- End
Sourced by: Terminator X
Topic: Bell anxious to compete in cable, other markets
Length: 2.9KB
Begin ---*
By Kevin Dougherty/Financial Post - Montreal, Quebec
Bell Canada wants to be able to deliver cable television or any
other value-added telecommunications sercice to the homes or offices of
its telephone customers, the utility's president said yesterday.
"The telephone companies must be allowed to fully compete in all
communications markets for the benefit of all Canadians," Robert Kearney
said at a Canadian Club luncheon. "Bell Canada should be able to carry
anything, independant of technology, for any customer anywhere."
While Bell Canada wants the Canadian Radio - television and
Telecommunications Commision to consider it a common carrier, it also
wants "other access carriers, like cable companies" to be designated
common carriers as well.
Kearney said Bell Canada agrees that basic telephone service should
continue to be regulated, paying tribute to the Canadian "social agenda"
that has allowed a 98% penetration rate for telephone service in Canada.
But he said all other services should be deregulated.
The regulatory commission will have to untangle what is competitive
and what is not competitive, he added. The commission began hearings on
broadcasting last week and plans further consultations later this year on
telecommunications.
Kearney said Bell Canada is not prepared to offer its definitions
yet.
But he said that five years from now -- if the issue has not been
resolved -- the cable companies and telecommunications carriers won't be
fighting over technologically irrelevant barriers.
They will be fighting for their survival.
"Everybody should be a common carrier," he told reporters.
More immediately, Bell Canada is pressing the CRTC to grant a rate
increase, hiking charges for local calls for the first time since 1983.
Bell Canada is allowed a rate of return in the 12.5%-to-13.5% band,
he noted, but this year, the return will fall to 10.75% and in 1994 it
will be below 10%.
Resellers, who buy space on Bell Canada wholesale and sell services
at a discount, accounted for 7% of the telecommunications market last
year, not the 2% the CRTC had predicted, he said.
This year, resellers and Unitel Communications Inc., which offers a
competing long-distance service to Bell Canada's will together hold a 15%
market share.
Reflecting Bell Canada's declining revenue, New York bond rating
service Standard & Poor's has lowered the rating on its debt. Kearney
speculated it could take another downgrading before Bell Canada is
allowed an improved rate of return.
He said U.S. telephone companies cross-subsidize local telephone
service 2cents-3cents a minute, while 17cents a minute of Bell Canada's
long-distance revenue, or about $2 billion a year goes to subsidize local
service.
"The subsidy keeps our local rates low, but is an incredible drain
on our competitiveness."
*--- End
Sourced by: Termiantor X
Topic: $200M plea in TV battle
Length: 1.0KB
Begin ---*
Broadcasteres demand cable firms pay for carrying programs
By Richard Siklos/Financial Post - Hull, Quebec
Canada's private broadcasters yesterday appealed to federal
regulators for permission to start charging cable operators up to $200
million a year to carry their signals.
The fee-for-carriage plan put forth by the Canadian Association of
Broadcasters is perhaps the most radical proposal before the four-week
Canadian Radio-television and Telecommunications Commission hearing into
the structure of Canadian television.
From the broadcasters' perspective, it is no longer equitable for
cable to distribute local over-the-air television signals without paying
for permission to do so.
"It's an issue of fairness," CAB chairman Douglas Holtby told the
hearing. "The taking of our signals by cable is fundamentally contrary to
basic Canadian values."
CAB is seeking between 35cents and 80cents a month per local signal
from cable. Its case is supported by an angus reid group Inc. study
showing that most subscribers either believe a portion of the $1.6
billion consumers spend on cable already goes to private TV, or don't
know where the money goes.
Despite the advent of cable only specialty services such as CNN and
The Sports Network, local private broadcasters, such as those owned by
WIC Western International Communications Ltd., CanWest Global
Communications Corp. and Baton Broadcasting Inc., accounted for 52% of
cable viewing in 1992. And it is not fair, the broadcasters argue, that
they shoulder the burden of producing the bulk of Canadian programming
required by regulators.
The broadcasters' plan has met with stiff opposition from cable
operators, who maintain TV owes its success to cable. Maclean Hunter
Cable TV last week said private TV's aregument that it cannot live on
advertising revenues alone is a result of takeovers and the industry's
profligate spending on U.S. programming, which increased from $142
million in 1985 to $248 million in 1991.
The CAB has similarly rejected cable's counter-offer to create a
fund of up to $100 million a year over five years for independant
producers. CAB president Michael McCabe said the cable fund would be an
administrative nightmare that doesn't address the issue of broadcasters'
signals.
McCabe said the broadcast system would be better served by cable
fees, from which at least 33% and as much as 100% would go to
programming. "I'm not impressed by your fears," CRTC charman Keith Spicer
told McCabe, noting independent producers have expressed reservations
about the plan.
The CAB is hoping fee-for-carriage regulations recently instituted
by the U.S. Federal Communications Commission will buoy its case.
However, their cable opponents privately predict the plan is doomed on a
range of fronts.
*--- End
---
Imagine, if it were 1984:
doubleplusungoodthink revivals refs unconcepts.rewrite fullwise
upsub antefiling. make unoldthink and uncrimethink. unrisk
joycamp. revival absolutewise ungood. - Miniluv
---
ERRATUM
I'm not much of an editor, and I don't care.. but there were a few
offensive errors in the last issue.. here are the corresponding
apologies..
IBEX might have been offended that i reffered to him as IDIX
throughout the North America realease of the last issue.. I never did
like global edit(I jest of course). Sorry.
CHAIN was not given proper credit for his dictating of articles last
issue. Thanks for your ongoing contributions which are ongoing(!!)hint,
hint!
As well, there were numerous typos and other stupid errors... too
numerous to mention here.. I will leave those up to you, the reader, to
discover.
- Terminator X
---
If you can't find the solution, maybe you're answering the
wrong question!
---
CiSSD MEMBERSHIP INFORMATION
With a large resurganse in CiSSD activities, we have decided to
begin accepting some members through an application process. Our commune
is not yet large enough to accept the masses without rebellion, but is
open enough to accept those with ideas similar to our own, and open
minded enough to publish comment from those who are opposed to us. Please
write to richfair@eastern.com , and I will publish your comments, and
respond to 'letters to the editor.'
If you are seriously interested in becoming a CiSSD member, you can
download the CiSSD application from any CiSSD Headquarters BBS, and
upload the completed form, or send the completed form E-Mail to
richfair@eastern.com .
In addition to members, CiSSD will honour those who have special
achievements, members, or non members alike. If you know someone you
believe to deserve CiSSD recognition, please write to the same
address(richfair@eastern.com), or leave a message on our voice mail.
---
The Downtown Militarized Zone BBS
(416) 450 7087 Sysop - The Dope Man
[CiSSD] WHQ
The Revolutionary Front BBS
(416) 936 6663 Sysop - Lister
[CiSSD]/HELL/cDc
CiSSD Voice Mail Canada
(416) 417 0214 Users - Terminator X - The Dope Man - Lister
CiSSD Fax Line - Projected for April 18 1993
CiSSD Voice Mail BBS - Projected for July 1 1993 (Canada Day)
---
LAST WORDS FROM THE EDITOR
Terminator X
It's 2:12AM. I should be heading over to Dope's place tommorow.
Sometimes I think his house is a big black hole.. except it's not that
big, and it's rather colourful, but that' s besides the point. It's a
black hole in the sense that while physical objects, and the thought
process remain intact, the ability to be productive is sucked away into
no-where!
The only thing we can consistently produce is a couple of large
pizza's, and a day of joy and happiness.. but then, isn't that what I go
over there for? Certainly, I don't go for the Brampton 'chicks'.. and
there's no way in hell I go for the big beatiful Brampton Downtown.. I
think I go to have fun and pal around with a real freind. If you don't
have one, I suggest you pick one up.
They make great birthday gifts..
CREDITS
The Dope Man Repeat contributor, and CiSSD President. May no-one
CiSSD ever provoke him to think twice, because having him
think once was painful enough for the rest of us!
This is a man with many a creative idea.
Lister Interpersonal relations, Repeat contributor, not to
CiSSD mention system hacker extrordinaire. One might(and
would) attribute his hacking ability to his
independance and persistance.
Dictator Dedicated to provoking a political turnaround, this
CiSSD one has a style and approach all to his own. When
reminded that he wasn't being paid for his efforts,
he informed me that he was. What was I thinking!
Ibex With somewhat of a different thinking approach than
CiSSD the rest of us, he manages to provoke us into
questioning our own views. It's an inspiration, and a
southern accent all in one.
Hypnotech Back on the scene, after a little break from the
CiSSD hustle and bustle of a group lifestyle, he's jumped
right into the mag to add his bricks to our
group foundation. You will see contributions from
him next issue. Good luck in the future.
Terminator X Editor. And a lousy one at that. Enjoys music, and
CiSSD releasing magazines months after their projected
release date. Out for now, Ed.
-------------------------------------------------------------------------
THE CANADIAN INTERNATIONAL SOCIETY FOR SOCIAL DEVIANCY (C) 1993/94
-------------------------------------------------------------------------