home *** CD-ROM | disk | FTP | other *** search
-
-
- ****************************************************************************
- >C O M P U T E R U N D E R G R O U N D<
- >D I G E S T<
- *** Volume 2, Issue #2.11 (November 13, 1990) **
- *** SPECIAL ISSUE: SEARCH AFFIDAVIT FOR STEVE JACKSON GAMES ***
- ****************************************************************************
-
- MODERATORS: Jim Thomas / Gordon Meyer (TK0JUT2@NIU.bitnet)
- ARCHIVISTS: Bob Krause / Alex Smith / Brendan Kehoe
- USENET readers can currently receive CuD as alt.society.cu-digest.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source is
- cited. It is assumed that non-personal mail to the moderators may be
- reprinted, unless otherwise specified. Readers are encouraged to submit
- reasoned articles relating to the Computer Underground.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- DISCLAIMER: The views represented herein do not necessarily represent the
- views of the moderators. Contributors assume all responsibility
- for assuring that articles submitted do not violate copyright
- protections.
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- The application and affidavit for the search warrant for Steve Jackson
- Games (Case #A-90-54m), dated February 28, 1990, and signed by U.S.
- Magistrate Stephen H. Capelle in Austin Texas and Special Agent Timothy M.
- Foley of the U.S. Secret Service, has been released. The application
- alleges violations of Title 18 USC Sections 2314 and 1030 and was issued in
- the U.S. District Court (Western District of Texas).
-
- We have retyped it, and there may be some typographical errors, but we have
- done our best to recreate it as is.
-
- There are several features about the affidavit. First, the bulk of it is
- repititious and simply establishes the credentials of the investigators,
- summarizes basic terms, and provides general background that seems
- inconsequential in linking the persons to be searched to any substantive
- criminal activity. It should also be remembered that the "$79,449.00"
- document in question was shown to contain nothing of substance that is not
- available to the general public for under $14. Further, to our knowledge,
- there is no evidence, contrary to suggestions, that E911 software was
- obtained.
-
- Most troublesome is the interpretation given to attached logs from The
- Phoenix Project that creates a conspiratorial scenario from a few ambiguous
- messages. While imaginative use of narrative is admirable in fiction, its
- use as a weapon of power is dangerous. At root, Steve Jackson Games was
- raided because an employee ran a BBS that made available, as perhaps
- thousands of others BBSs nationwide, Phrack. The employee was also accused
- of being part of a "fraud scheme" because he had the temerity to explain
- what a Kermit protocol is in a two line message.
-
- Perhaps Agent Foley is competent, but in reviewing this warrant questions
- arise regarding the raid on SJG that should not go unanswered.
-
- ++++++++++++++++++++++++++++
-
- ATTACHMENT A
-
- 2700 "A" Metcalfe Road is located in the city of Austin, State
- of Texas, County of Travis. Said address is a two-story square
- building measuring approximately 50 feet on a side located on the
- south side of Metcalfe Street.
-
- The bottom story is multi-colored brick face and the upper
- story is white wood frame construction.
-
- A balcony surrounds the upper story. The address "2700A" is
- on two sides in white letters, and the numbers are approximately
- ten inches high. An outside wooden stairway connects the floors
- on the south side of the building. The driveway is of gravel. A
- large all-metal warehouse-type building is immediately behind the
- address.
-
- (End Attachment A)
-
- ++++++++++++++++
-
- ATTACHMENT B
-
- Computer hardware (including, but not limited to, central
- processing unit(s), monitors, memory devices, modem(s), programming
- equipment, communication equipment, disks, and prints) {sic} and computer
- software (including but not limited to, memory disks, floppy
- disks, storage media) and written material and documents relating
- to the use of the computer system (including networking access
- files), documentation relating to the attacking of computers and
- advertising the results of computer attacks (including telephone
- numbers and licensing documentation relative to the computer programs and
- equipment at the business known as Steve Jackson Games which
- constitute evidence, instrumentalities and fruits of federal
- crimes, including interstate transportation of stolen property (18
- USC 2314) and interstate transportation of computer access
- information (18 USC 1030 (a)(6)). This warrant is for the seizure
- of the above described computer and computer data and for the
- authorization to read information stored and contained on the above
- described computer and computer data.
-
- (End Attachment b)
-
- ++++++++++++++++++++++++
-
- State of Texas )
- ) ss
- County of Travis )
-
- AFFIDAVIT
-
- 1. I, Timothy Foley, am a Special Agent of the United States
- Secret Service and have been so employed for the past two years.
- I am presently assigned to the United States Secret Service in
- Chicago. Prior to that I was employed as an attorney practicing
- in the City of Chicago and admitted to practice in the State of
- Illinois. I am submitting this affidavit in support of the search
- warrants for the premises known as: (a) the residence of Loyd Dean
- Blankenship, 1517G Summerstone, Austin, Texas; (b) the employment
- location of Blankenship, the business known as Steve Jackson Games,
- 2700-A Metcalfe Road, Austin Texas; and (c) the residence of Chris
- Goggans, 3524 Graystone #192, Austin, Texas.
-
- SOURCES OF INFORMATION
-
- 2. This affidavit is based on my investigation and
- information provided to me by Special Agent Barbara Golden of the
- Computer Fraud Section of the United States Secret Service in
- Chicago and by other agents of the United States Secret Service.
- 3.I have also received technical information and
- investigative assistance from the experts in the fields of
- telecommunications, computer technology, software development and
- computer security technology, including:
- a. Reed Newlin, a Security Officer of Southwestern
- Bell, who has numerous years of experience in operations,
-
- - 1 -
-
- maintenance and administration of telecommunications systems as an
- employee of the Southwestern Bell Telephone Company.
- b. Henry M. Kluepfel, who has been employed by the Bell
- System or its divested companies for the last twenty-four years.
- Mr. Kluepfel is presently employed by Bell Communications Research,
- (Bellcore) as a district manager responsible for coordinating
- security technology and consultation at Bellcore in support of its
- owners, the seven regional telephone companies, including Bell
- South Telephone Company and Southwestern Bell Telephone Company.
- Mr. Kluepfel has participated in the execution of numerous Federal
- and State search warrants relative to telecommunications and
- computer fraud investigations. In addition, Mr. Kluepfel has
- testified on at least twelve occasions as an expert witness in
- telecommunications and computer-fraud related crimes.
- c. David S. Bauer, who has been employed by Bell
- Communications Research (Bellcore) since April 1987. Mr. Bauer is
- a member of the technical staff responsible for research and
- development in computer security technology and for consultation
- in support of its owners, the seven regional telephone companies,
- including Bell South. Mr. Bauer is an expert in software
- development, communications operating systems, telephone and
- related security technologies. Mr. Bauer has conducted the review
- and analysis of approximately eleven computer hacking
- investigations for Bellcore. He has over nine years professional
- experience in the computer related field.
-
- - 2 -
-
- Violations Involved
-
- 4. 18 USC 2314 provides federal criminal sanctions against
- individuals who knowingly and intentionally transport stolen
- property or property obtained by fraud, valued at $5,000 or more
- ininterstate commerce. My investigation has revealed that on or
- about February 24, 1989, Craig Neidorf transported a stolen or
- fraudulently obtained computerized text file worth approximately
- $79,000.000 from Columbia, Missouri, through Lockport, Illinois to
- Austin, Texas to Loyd Blankenship and Chris Goggans.
- 5. 18 USC 1030 (a)(6) and (b) provide federal criminal
- sanctions against individuals who knowingly and with intent to
- defraud traffic or attempt to traffic, in interstate commerce, in
- passwords or similar information through which a computer may be
- accessed without authorization. My investigation has revealed that
- on or about January 30, 1990, Loyd Blankenship and Chris Goggans
- attempted to traffic in illegally obtained encrypted passwords
- received from other computer hackers. My investigation has further
- revealed that, through the use of sophisticated decryption
- equipment and software, they planned to decrypt the encrypted
- passwords provided by the hackers. They then planned to provide
- the original hackers with the decrypted passwords which they in
- turn could use to illegally access previously guarded computers.
-
- DEFINITIONS
-
- 6. COMPUTER HACKERS/INTRUDERS - Computer hackers or
- intruders are individuals involved with the unauthorized access of
- computer systems by various means. The assumed names used by the
-
- - 3 -
-
- hackers when contacting each other are referred to as "hacker
- handles."
- 7. BULLETIN BOARD SYSTEM (BBS) - A bulletin board system
- (also referred to as a "Bulletin board" or "BBS") is an electronic
- bulletin board accessible by computer. Users of a bulletin board
- may leave messages, data, and software readable by others with
- access to the bulletin board. Bulletin board readers may copy, or
- "download," onto their own machines material that appears on a
- bulletin board. Bulletin boards typically are created and
- maintained by "systems operators" or "system administrators".
- Hackers frequently use bulletin boards to exchange information and
- data relating to the unauthorized use of computers.
- 8. E911 - E911 means the enhanced 911 telephone service in
- universal use for handling emergency calls (police, fire,
- ambulance, etc.) in municipalities. Dialing 911 provides the
- public with direct access to a municipality's Public Safety
- Answering Point (PSAP). Logistically, E911 runs on the public
- telephone network with regular telephone calls into the telephone
- company switch. However, incoming 911 calls are given priority
- over all other calls. Then the 911 call travels on specially
- dedicated telephone lines from the telephone company's switch to
- the fire, police and emergency reaction departments in the city
- closest to the location of the caller. It is essential for the
- emergency unit to know the location of the caller, so one of the
- most important parts of the system is the Automatic Location
- Identifier (ALI), which automatically locates where the
-
- - 4 -
-
- telephone call originates, and the Automataic Number Identification
- (ANI), which holds the telephone number of the calling party even
- if the caller hangs up. The E911 system of Bell South is described
- in the text of a computerized file program and is highly
- proprietary and closely held by its owner, Bell South. The file
- describes the computerized control, operation and maintenance of
- the E911 system.
- 9. ELECTRONIC MAIL - Electronic mail, also known as
- e-mail, is a common form of communication between individuals on
- the same or on separate computer systems. Persons who may send or
- receive electronic mail are identified by an electronic mail
- address, similar to a postal address. Although a person may have
- more than one electronic mail address, each mail address
- identifies a person uniquely.
- 10. LEGION OF DOOM - At all times relevant herein, the Legion
- of Doom, (LOD), was a closely knit group of computer hackers
- involved in:
- a. Disrupting telecommunications by entering telephone
- switches and changing the routing on the circuits of the computers.
- b. Stealing propriety {sic} computer source code and
- information from individuals that owned the code and information
- c. Stealing credit information on individuals from
- credit bureau computers.
- d. Fraudulently obtaining money and property from
- companies by altering the computerized information used by the
- companies.
-
- - 5 -
-
- e. Disseminating information with respect to their
- methods of attacking computers to other computer hackers in an
- effort to avoid the focus of law enforcement agencies and
- telecommunication security experts.
- 11. PASSWORD ENCRYPTION - A password is a security device
- that controls access to a computer, (log on privileges) or to
- special portions of a computer's memory. Encryption further limits
- access to a computer by converting the ordinary language and/or
- numerical passwords used on a computer into cipher or code.
- Decryption is the procedure used to transform coded text into the
- original ordinary language and/or numerical format.
- 12. TRANSFER PROTOCOL - transfer protocol is a method of
- transferring large files of information from one computer to
- another over telephone lines. Using a transfer protocol a file is
- uploaded (sent) and downloaded (received). This transfer procedure
- breaks blocks of data into smaller packages for transmission and
- insures that each block of data is an error free copy of the
- original data. Transfer protocols may also encode and decode
- transmissions to insure the privacy of the transferred information.
-
- INVESTIGATION OVERVIEW
-
- 13. My investigation to date has disclosed that computer
- hacker Robert Riggs of the Legion of Doom, (LOD), stole the highly
- proprietary and sensitive Bell South E911 Practice text file from
- Bell South in Atlanta, Georgia in about December, 1988 and that
-
- - 6 -
-
- this stolen document was distributed in "hacker" newsletters
- through the use of e-mail. These newsletters included the "Phrack"
- newsletter issue #24 distributed in February, 1989 by Craig Neidorf
- to LOD members, including Loyd Blankenship and Chris Goggans
- of Austin, Texas. The E911 Practice was posted on the "Phoenix
- Project" BBS, in January, 1990, so that anyone with access to the
- BBS could download a copy of the E911 Practice onto any other
- computer. The "Phoenix Project" BBS is run jointly by co-systems
- operators Loyd Blankenship, (hacker handle, The Mentor), and Chris
- Goggans, (hacker handle, Eric {sic} Bloodaxe), who both have sent e-mail
- communications identifying themselves as members of LOD. My
- investigation has also disclosed that Loyd Blankenship and Chris
- Goggans, through their hacker BBS "Phoenix Project," have
- established a password decryption service for hackers who had
- obtained encrypted passwords from computers they had been
- attacking.
-
-
- THEFT OF E911 TEXT FILE
- 14. In March, 1988, Bell South developed a sophisticated new
- program which describes in great detail the operation of the E911
- system and the 911 support computer in Sunrise, Florida that
- controls ALI and ANI information. This program, which was
- enginered at a cost of $79,449.00, was locked in a secure computer
- (AIMSX) in Bell South's corporate headquarters in Atlanta, Georgia.
- The document was and is highly proprietary and contained the
- following warning:
-
- - 7 -
-
- NOTICE: NOT FOR USE OR DISCLOSURE OUTSIDE
- BELL SOUTH OR ANY OF ITS SUBSIDIARIES EXCEPT
- UNDER WRITTEN AGREEMENT.
- 15. In July, 1989, Robert Riggs apartment in Decatur, Georgia
- was searched by United States Secret Service agents from Atlanta
- pursuant to a federal search warrant.
- 16. At the time of the search, Riggs, (hacker handle, The
- Prophet), was interviewed by Special Agent James Cool of the USSS-
- Atlanta and representatives of Bell South from Atlanta. During
- this extensive interview, Riggs admitted that he illegally gained
- remote access into Bell South's AIMSX computer through an account
- to which access was not secured by a password, and that once on the
- machine he executed a program designed to search for passwords and
- to obtain other account names on the computer. He stated that once
- he was on the computer, he found the E911 protocol document and
- downloaded it from the Bell South computer to his home computer.
- He subsequently uploaded the E911 file from his home computer to
- a computer bulletin board. (He did not give the agents the name
- of the bulletin board).
- 17. Riggs' admissions were corroborated by interviews with
- Rich Andrews, the operator of the computer bulletin board known as
- JOLNET BBS in Lockport, Illinois. Andrews disclosed that in about
- January, 1989, a hacker known to him by the handle PROPHET uploaded
- an E911 program with bell South proprietary markings onto his BBS.
- This program was then downloaded from the BBS to another hacker
- known to him by the handle Knight Lightning (Craig Neidorf).
-
- - 8 -
-
- PHRACK PUBLICATION
- 18. On January 18, 1990, pursuant to a federal grand jury
- subpoena, I received documents from the administration of the
- University of Missouri regarding computer publications of Craig
- Neidorf, a student at University of Missouri and Randly Tishler, a
- former student at University of Missouri, (hacker handle, Taran
- King), which showed that Neidorf and Tishler were publishing the
- computer hacker newsletter entitled "Phrack" which they were
- distributing to computer hackers around the United States through
- the use of the University of Missouri account on a
- telecommunication network called Bitnet.
- 19. On January 18, 1990, Security Officer Reed Newlin of
- Southwestern Bell Telephone and I interviewed Craig Neidorf at the
- Zeta Beta Tau Fraternity House at Columbia, Missouri. During the
- course of the interview, Neidorf admitted to me and Security
- Officer Newlin that he used the hacker handle Knight Lightning;
- that he and Randy Tishler were the publishsers of two hacker
- newsletters entitled "Phrack" and "Pirate."
- 20. Also during the course of this interview, Neidorf
- admitted that he had a copy of a hacker tutorial regarding the
- operation of the E911 system in his room. He admited that he had
- edited the E911 Practice into a hacker tutorial. He also admitted
- that he knew that the E911 Practice had been stolen from a
- telecommunications company by Robert J. Riggs and that the
- tutorial, (the edited E911 Practice File), had been published in
- the Phrack newsletter issue 24. At this point of the interview,
-
- - 9 -
-
- Neidorf excused himself, saying he was going to his room, and he
- returned moments later with a floppy disk containing the copy of
- the E911 document published in Phrack magazine.
- 21. In addition to Neidorf's admission that he knew the E911
- tutorial had been stolen, my investigation has revealed other facts
- reflecting that Neidorf was aware that the E911 data received from
- Riggs in Atlanta was stolen. In July, 1989, I reviewed
- documentation received from Rich Andrews, the system administrator
- of the JOLNET BBS. Included in the documentation was an edited
- version of the E911, the document received from Neidorf, dated
- January 23, 1989, which included the following notation on his
- version:
- NOTICE: NOT FOR USE OR DISCLOSURE OUTSIDE
- BELLSOUTH OR ANY OF ITS SUBSIDIARIES EXCEPT
- UNDER WRITTEN AGREEMENT. (WHOOPS)
- 22. Distribution records of Phrack 24 recovered from Richard
- Andrews in Lockport in July 1989 reflect that copies of this
- newsletter containing the proprietary E911 information and the
- proprietary markings from Bell South were forwarded from Neidorf's
- computer in Colombia {sic}, Missouri to Loyd Blankenship's computer in
- Austin, Texas on or about February 24, 1989.
- 23. I have personally examined the Phrack newsletter number
- 24 and observed that the newsletter does in fact contain a slightly
- edited copy of the stolen Bell South E911 Practice text file with
- the warning:
- NOTICE: NOT FOR USE OR DISCLOSURE OUTSIDE
-
- - 10 -
-
- BELLSOUTH OR ANY OF ITS SUBSIDIARIES EXCEPT
- UNDER WRITTEN AGREEMENT. (WHOOPS)
-
- REPUBLICATION OF E911 BY PHOENIX PROJECT
- 24. On February 26, 1990, Hank Kluepfel of Bellcore advised
- me that the Phoenix Project BBS run by Loyd Blankenship and Chris
- Goggans was in operation on January 15, 1990. Mr. Kluepfel advised
- that he had made this determination by successfully logging on to
- Phoenix Project at telephone number 512-441-0229 on about January
- 30, 1990 and observing messages dated from January 15, 1990 to
- January 30, 1990, on the BBS. Mr. Kluepfel also advised me that the
- BBS system information identified the Mentor and Erik Bloodaxe as
- the system administrators on the BBS.
- 25. On February 14, 1990, Mr. Kluepfel advised me that after
- accessing the Phoenix Project BBS, he had gone to the Phrack sub-
- menu of the BBS and observed Phrack 24 on the menu. Mr. Kluepfel
- further advised me that upon review of Phrack 24, he observed that
- the Bell South E911 Practice text file was still in the edition
- carried by the Phoenix Project BBS.
- 26. On February 14, 1990, Mr. Kluepfel advised me that he had
- downloaded a copy of Phoenix Project's user list (its electronic
- mailing list) and that it reflected that seeral of the hackers on
- the list of users were located in the Northern District of
- Illinois.
- PHOENIX PROJECT DECRYPTION SERVICE
-
- - 11 -
-
- 27. On February 14, 1990, Mr. Kluepfel advised me that on
- January 23, 1990, the co-systems administrator on the Phoenix
- Project BBS, Erik Bloodaxe, had published a notice that the BBS was
- beginning a new decryption service. Bloodaxe invited the readers
- of the newsletter to send the BBS encrypted passwords for any UNIX
- or Prime computer system, and the system administrators would
- decrypt the passwords and return them. Bloodaxe also indicated that
- the systemes administrators would probably access the computer using
- the password as well. In a later message on January 26, 1990, The
- Mentor responded to a question about a transfer protocol that had
- been set out, but not explained in Bloodaxe's notice, indicating
- his involvement in the decryption scheme.
- 28. On February 14, 1990, Mr. Kluepfel advised me that the
- password file decryption service offered by the Phoenix Project
- provided computer hackers with information through which a computer
- could be acessed without authorization under the meaning of 18 USC
- 1030 (a)(6) and (b) and constituted a threat to Bellcore's client
- companies including Bell South.
- IDENTIFICATION OF BLANKENSHIP AND GOGGANS
- 29. Among the documents that had been printed out from the
- University of Missouri computers, which I received from the
- University of Missouri computers, which I received from the
- administration of the University of Missouri, were lists of hackers
- and their corresponding real names. On that list were the names
- of Loyd Blankenship and Chris Goggans and their respective hacker
- handles of The Mentor and Erik Bloodaxe.
-
- - 12 -
- 30. Among the documents seized in the search of Neidorf's
- house were phone lists which included the full names of Loyd
- Blankenship and Chris Goggans and identified them as The Mentor and
- Erik Bloodaxe, respectively.
- 31. On February 6, 1990, Mr. Kluepfel provided me with
- copies of a Phrack newsletter which contained a September 23, 1989,
- profile of computer hacker Erik Bloodaxe. The profile indicated
- that the Erik Bloodaxe's real name was Chris, that he was 20 years
- old, 5'10", 130 pounds, that he had blue eyes, brown hair and that
- he used various computers including an Atari 400, various computer
- terminals with limited computing capability that are or can be
- linked to a central computer, and a CompuAid Turbo T. The profile
- reflects that Erik Bloodaxe was a student in computer science at
- the University of Texas in Austin.
- 32. On February 6, 1990, Mr. Kluepfel provided me with a copy
- of Phrack containing a January 18, 1989 profile of the computer
- hacker known as The Mentor. The profile indicated that the
- Mentor's real name was Loyd, that he was 23 years old, 120 pounds,
- 5'10", that he had brown hair, brown eyes and that he had owned a
- TRS-80, an Apple IIe, an Amiga 1000, and a PC/AT.
- 33. The identification of Loyd Blankenship as The Mentor in
- the Phrack profile was corroborated on February 22, 1990, by
- information provided by Larry Coutorie an inspector with campus
- security at the University in Austin, Texas who advised
- me that his review of locator information at the University of
- Texas in Austin disclosed current drivers license information on
-
- - 13 -
-
- Loyd Dean Blankenship reflecting that Blankenship resides at 1517G
- Summerstone, in Austin, Texas, telephone number 512-441-2916 and
- is described as a white, male, 5'10", with brown hair and brown
- eyes. He further advised that Blankenship is employed at Steve
- Jackson Games, 2700-A Metcalfe Road, Austin, Texas where he is a
- computer programmer and where he uses a bulletin board service
- connected to telephone number 512-447-4449.
- 34. According to telephone company records the telephone
- number 512-441-0229, the number for the Phoenix Project BBS, is
- assigned to the address 1517 G Summerstone, Austin, Texas, which is
- the residence of Loyd Blankenship.
- 35. Hank Kluepfel has advised me that he has loged on to the
- BBS at 512-447-4449 and that The Mentor is listed as the systems
- operator of the BBS. Mr. Kluepfel further advised me that the user
- list of that BBS contains the name of Loyd Blankenship and others
- known to Mr. Kluepfel has hackers. Also, Mr. Kluepfel observed that
- Loyd Blankenship is a frequent user of the BBS.
- 36. Similarly, the identification of Chris Goggans as the
- Erik Bloodaxe described in the Phrack profile was corroborated on
- February 22, 1990, by Larry Coutorie who advised me that his
- review of locator information at the University of Texas with
- respect to Chris Goggans disclosed that Goggans resides at 3524
- Graystone #192, in AUstin, Texas and that his full name is Erik
- Christian Goggans. Goggans, who goes by the name Chris, is a white,
- male, with blond hair and blue eyes date of birth 5/5/69, 5'9",
- 120 pounds.
-
- - 14 -
-
- 37. On February 19, 1990, I was advised by Margaret Knox,
- Assistant Director of the Computation Center, University of Texas,
- Austin, Texas, that a young man presented himself to her as Chris
- Goggans in response to the University sending a notification of the
- Grand Jury subpoena for University records pertaining to Chris
- Goggans to Chris Goggans at 3524 Graystone #192, Austin, Texas. The
- young man also told her that he was Erik Bloodaxe of the Legion of
- Doom.
-
- Locations to be Searched
- 38. Based on the above information and my own observations,
- I believe that the E911 source code and text file and the
- decryption software program are to be found in the computers
- located at 1517G Summerstone, Austin, Texas, or at 2700-A Metcalfe
- Road, Austin, Texas, or at 3524 Graystone #192, Austin, Texas, or
- in the computers at each of those locations.
- 39. The locations to be searched are described as: the
- premises known as the residence of Loyd Dean Blankenship, 1517G
- Summerstone, Austin, Texas; the employment location of Blankenship,
- the business known as Steve Jackson Games, 2700-A Metcalfe Road,
- AUstin, Texas; and the residence of Chris Goggans, 3524 Graystone
- #192, Austin, Texas. Those locations are further described in
- Attachment A to <this Affidavit for Search Warrant.
- Evidence To Be Found
- 40. On February 2, 1990, Jerry Dalton of AT&T advised me that
- based upon his background, experience and investigation in this
-
- - 15 -
- case and investigating approximately 50 other incidents this year
- involving the unauthorized use of other computer systems, including
- individuals that run computer bulletin boards, these individuals
- typically keep and use the following types of hardware, software
- and documents to execute their fraud schemes and operate their
- computers and computer bulletin boards:
- a. Hardware - a central processing unit, a monitor, a modem,
- a key board, a printer, and storage devices (either
- cartridge tapes, 9-track magnetic tapes, floppy disks or
- axillary {sic} disk units), telephone equipment (including)
- automatic dialing equipment, cables and connectors), tape
- drives and recording equipment.
-
- b. Software - hard disks and floppy disks containing
- computer programs, including, but not limited to software
- data files, electronic mail files, UNIX software and
- other AT&T proprietary software.
-
- c. Documents - computer related manuals, computer related
- textbooks, looseleaf binders, telephone books, computer
- printout, cassette tapes, videotapes and other documents
- used to access computers and record information taken
- from the computers during the above referred breakins.
- Financial and licensing information with respect to the
- computer hardware and software.
-
- 41. Based on the above information and my own observation,
- I believe that at the premises known as the residence of Loyd Dean
- Blankenship, 1571G Summerstone, Austin, Texas; the employment
- location of Blankenship, the business known as Steve Jackson Games,
- 2700-A Metcalfe Road, Austin, Texas; and the residence of Chris
- Goggans, 3524 Graystone, #192, Austin Texas there is computer
- hardware (including central processing unit(s), monitors, memory
- devices, (modem(s), programming equipment, communication equipment,
- disks, prints and computer software (including but not limited to
- memory disks, floppy disks, storage media) and written material and
-
- - 16 -
-
- documents relating to the use of the computer system (including
- networking access files, documentation relating to the attacking
- of computer and advertising the results of the computer attack
- (including telephone numbers and location information). This
- affidavit is for the seizure of the above described computer and
- computer data and for the authorization to read information stored
- and contained on the above described computer and computer data
- which are evidence of violations of 18 USC 2314 and 1030, as well
- as evidence, instrumentalities or fruits of the fraud scheme being
- conducted by the operator of the computer at that location.
- 42. Request is made herein to search and seize the above
- described computer and computer data and to read the information
- contained in and on the computer and computer data.
-
-
-
- (signature of) Timothy M. Foley
- Special Agent Timothy Foley
- United States Secret Service
-
-
- Sworn and Subscribed to before
- me this 28th day of February, 1990
-
-
- (signature of) Stephen H. Capelle
- UNITED STATES MAGISTRATE
-
-
- - 17 -
-
- (END OF SEARCH AFFIDAVIT)
-
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
-
- A document attached to the search affidavit reproduced 17 messages from The
- Phoenix Project written from Jan. 23 - Jan. 29, 1990. We have retyped
- messages 13/17, but substituted the original posts (18/29) from TPP logs we
- have obtained. The differences in message numbers (eg 13/58 from Henry
- Kluepfel's logs, or our source's logs, eg, 22/47) reflect that the notes
- were captured on different days. We have compared the logs from both our
- source and the document, and they are identical. Hence, the difference in
- capturing dates is of no consequence.
-
- There are several points that should be considered in reading the logs:
-
- 1. The affidavit claims that the logs substantiate the claim that an
- encryption service existed. In fact, they do no such thing. The claim is
- based primarily on message 13 (Jan 23), which includes the comment "What do
- you people think? Bad idea? Good idea? Hell...It is just another attempt by
- me to piss everyone off."
-
- 2. The bulk of these messages are inconsequential general discussions, and
- include brief discussion of transfer protocols.
-
- 3. Timothy Foley's "evidence" that The Mentor is involved in the situation
- is message 23, in which The Mentor is "guilty" of saying that Kermit is a
- 7-bit transfer protocol, is found on mainframes, and works through
- outdials. From this, Foley says:
-
- In a later message on January 26, 1990, the Mentor responded to a
- question about a transfer protocol that been set out, but not
- explained in Bloodaxe's notice, indicating his involvement in the
- decryption scheme (#27, p. 12).
-
- 4. The messages before and after these dates are general, and there is
- little substantive discussion of the "decryption service."
-
- It appears that Loyd Blankenship is "guilty" of posting phracks on The
- Phoenix Project, as are perhaps thousands of other sysops across the
- country, and of the "criminal act" of summarizing Kermit.
-
- We will leave it to others to judge and comment upon the logic and quality
- of the document(s).
-
- +++++++++++++++++++++++++++++++++++++++++++++++++
- (The following is the first page of a 3 page document attached to
- the affidavit. It has been retyped from the original).
- +++++++++++++++++++++++++++++++++++++++++++++++++
-
- New user pw= GUNSHIP
-
- 13/58: things...
- Name: Erik Bloodaxe #2
- Date: Tue Jan 23 22:57:29 1990
- I think it's time for your friend at The Legion of Doom to start a new
- service...(with great help from friends)
- Decryption service! On any unix or Prime, send the etc/passwd file, or the
- UAF file to the sysop directory, and you will be mailed back the encrypted
- UAF file to the sysop directory, and you will be mailed back the encrypted
- passwords...(on UNIX< any pw that the deszip could bust)
- The Prime UAF must be in binary, so kermit it from the site, and xmodem it
- here.
- In return, we will not distribute any information gained from your site, but
- we will probably look around it anyway...but it will remain between you and
- us.
- What do you people think? Bad idea? Good idea? Hell...It is just another
- attempt by me to piss everyone off.
- ->ME
-
- 14/58: aha..!
- Name: Phoenix #17
- Date: Wed Jan 24 01:30:35 1990
- ummm...hmmm
- <doesn't know what to say..>
-
- 15/58: Heck
- Name: The Parmaster #21
- Date: Wed Jan 24 07:48:01 1990
- Personally i like it :-)
- Jason.
-
- 16/58: Decryption
- Name: Grey Owl #10
- Date: Wed Jan 24 19:10:52 1990
- I think it's a great idea. I get a whole shitload of passwd files and some
- UAF files too. |||_______got!
- grey owl
-
- 17/58: Just a couple of questions...
- Name: Konica #47
- Date: Wed Jan 24 23:41:13 1990
- Well since the feds know this is a hacker board whats stopping them from
- tracing every incoming call to Pheonix Project and getting all the #'s, then
- monitoring then for illegal activity?
-
- And just say I was calling through my personal calling card....What would
- they get as the incomming #?
- If I had a DNR on my line is there any way I could find out?
- Sorry about this but I am not as good as most of you (except for the guy that
- keeps posting codes) and the only way I am going to learn is by trying shit
- out and asking questions...
- Hope this is the right sub for these questions....
-
- +++++++++++++++
- (The following are the actual logs; Typos were not removed)
- +++++++++++++++
-
-
- 18/47: vv
- Name: Dtmf #27
- Date: Thu Jan 25 03:22:29 1990
-
- RE: Just a couple of questions...
-
- To check the DNR the best bet woud be to call bell security, or the SCC
-
-
- 19/47: well..
- Name: Phoenix #17
- Date: Thu Jan 25 07:27:43 1990
-
- nothing stops them from tracing..
- I dont know how it works there.. but down here all traces are illegal unless
- they are for drug/murder reasons.. <well not traces, but taps are..>
-
-
- 20/47: Feds...
- Name: Erik Bloodaxe #2
- Date: Thu Jan 25 17:05:35 1990
-
- Absolutely nothing would stop them from collecting all local calls, and/or any
- longdistance company records of calls coming into this number...in fact, I
- kind of expect them to at least get all local calls here...hell Austin is all
- ess...most of them 5's...(I think...maybe 1's)
-
- However, I doubt that tapping the data line is worth their while...especially
- when they can just log on and read everything anyway. And the mail just isn't
- that spectacular...
-
- In any case, all calls here made by legal means are legaal, so don't worry
- about it. Just because tee nature of this bbs isn't that of your average
- mainstream bbs, doesn't negate its legality. Information posted here is kept
- legal.
-
- If you are truly worried about it, don't call, and sit home being paranoid.
-
- Hell, I'm local...I call direct...and now I do it at 300 baud. Hell, I can
- almost tell what's being typed at 300 baud while listening to it...forget the
- data tap! Hehe, although a 300 baud data tap is SO simple to playback
- completely error free...at 1200 or 2400 you kind of have to get the recording
- levels just right...but 300 gives you plenty of room for error...
-
- 21/47: ess 1,5
- Name: Dark Sun #11
- Date: Thu Jan 25 20:14:00 1990
-
- hey, whats the diff??? :-)
- DS
-
-
-
-
-
-
- 22/47: decryption
- Name: Silencer #31
- Date: Thu Jan 25 23:35:01 1990
-
- hmmm....like...you mean once you have an account...read the user file and then
- you will deencrypt all the passcodez...sounds good....but what the fuck is
- kermit...
- - Silencer
-
-
-
-
-
-
- 23/47: kermit
- Name: The Mentor #1
- Date: Fri Jan 26 10:11:23 1990
-
- Kermit is a 7-bit transfer protocol that is used to transfer files to/from
- machines. It is mostly found on mainframes (it's a standard command on VAX,
- for instance). Kermit has the added advantage of being able to work through an
- outdial (because it is 7-bit).
-
- Mentor
-
-
-
-
-
-
- 24/47: Kermit
- Name: Sicilumm Thorne #28
- Date: Fri Jan 26 11:20:10 1990
-
- Kermit is merely another transfer protocol like Sealink, Xmodem, Modem7,
- Zmodem, et cetera.
-
- Its relatively slow, but was thought to be better than Xmodem, due to its
- capabilties. (Don't remember what they are, I use Zmodem).
-
- Sic.
-
-
-
-
-
-
- 25/47: my kermit
- Name: Ravage #19
- Date: Fri Jan 26 12:24:21 1990
-
-
- lets me set it at 8 bits also. just another trivial note.
-
-
-
-
-
-
- 26/47: from what I know...
- Name: Dark Sun #11
- Date: Fri Jan 26 16:26:55 1990
-
- kermit was originally designed to allow transmission of data across 2
- computers running with different parity settings.
- DS
-
-
-
-
-
-
- 27/47: and..
- Name: Phoenix #17
- Date: Sat Jan 27 07:28:45 1990
-
- as a major disadvantage.. it is damn slow!
-
- Phoenix
-
-
-
-
-
-
- 28/47: Well....
- Name: Johnny Hicap #45
- Date: Sat Jan 27 21:28:18 1990
-
- No one answered that question (forget who posted it) that if he was calling
- through a calling card is it possible to get the number of the person who
- called even he was calling through hs calling card? What would they get as the
- number comming in? Would they get the card? Of course then they would just see
- who owns it.
-
- JH!
-
-
-
-
-
-
- 29/47: more Kermit BS
- Name: Grey Owl #10
- Date: Sat Jan 27 23:53:57 1990
-
- Kermit is slower than Xmodem, BTW. The packets are smaller (usually 64 bytes)
- and the error-checking is shot to hell with any line noise. It's better than
- ASCII though!
-
- grey owl
-
- (END SEARCH AFFIDAVIT)
-
- ********************************************************************
- ** END OF CuD #2.11 **
- ********************************************************************
-