Computer underground Digest    Sun  Oct 30, 1994   Volume 6 : Issue 94
                           ISSN  1004-042X

       Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
       Archivist: Brendan Kehoe
       Retiring Shadow Archivist: Stanton McCandlish
       Shadow-Archivists: Dan Carosone / Paul Southworth
                          Ralph Sims / Jyrki Kuoppala
                          Ian Dickinson
       Mini-biscuit editor:  Guy Demau Passant

CONTENTS, #6.94 (Sun, Oct 30, 1994)

File 1--Interview with Erik Bloodaxe (GRAY AREAS REPRINT)
File 2--Cu Digest Header Information (unchanged since 23 Oct 1994)

CuD ADMINISTRATIVE, EDITORIAL, AND SUBSCRIPTION INFORMATION APPEARS IN
THE CONCLUDING FILE AT THE END OF EACH ISSUE.

----------------------------------------------------------------------

Date: Sun, 30 Oct 1994 18:22:12 CDT
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 1--Interview with Erik Bloodaxe (GRAY AREAS REPRINT)
((MODERATORS' NOTE: The following are portions of an interview with
"Erik Bloodaxe" by Netta Gilboa of Gray Areas Magazine.  Gray Areas is
an eclectic arts and culture magazine that focuses on the fringes of
society. It's one of the best sources for information on rock and
alternative music, controversial social issues, computer culture, and
other topics that aren't covered elsewhere. It's a steal  $18 for four
issues, or $50 for three years. For information, write:

   Gray Aras
   PO Box 808
   Broomall, PA 19008-0808

Or, e-mail them at grayarea@well.sf.ca.us

For those new to computer culture, "erik bloodaxe" was a member of
the original "Legion of Doom," a modest media celebrity, and
more recently, the editor of Phrack)).

((Excerpts from interview with Chris Goggans at Pumpcon, 1993. From:
GRAY AREAS, Fall, 1994 (Vol 3, #2): pp 27-50))

(A.K.A. ERIK BLOODAXE)

By Netta Gilboa

Netta Gilboa: What is Phrack magazine?

Chris Goggans: Phrack is the longest running underground publication.
I don't really know how to describe Phrack. Phrack just sort of is.
Phrack is an electronic magazine that deals with topics of interest to
the computer underground; different types of operating systems,
weaknesses in system architectures; telephony; anything of any
relevance to the community in which it was intended for, that being
the computer underground. It has always tried to paint a picture of
the social aspects of the computer underground rather than focus
entirely on technical issues. So in that way it adds a lot of color to
what's going on.

GA: How did you get involved with publishing Phrack?

CG: Well, I got involved when the person who was editing it at the
time, Dispater, got into a motorcycle accident and as a result of
this, had a lot of other financial hardships, so he wasn't going to be
able to do it any longer. Its original editors, Craig Neidorf (Knight
Lightning) and Taran King, had no interest in doing it themselves any
longer for, at least in Craig's case, obvious personal reasons, and
there really was no one else who could take it over.  I was of the
mind set that Phrack had been around so long that it had almost become
something of an institution. I, being so ridiculously nostalgic and
sentimental, didn't want to see it just stop, even though a lot of
people always complain about the content and say, "Oh, Phrack is lame
and this issue didn't have enough info, or Phrack was great this
month, but it really sucked last month." You know, that type of thing.
Even though some people didn't always agree with it and some people
had different viewpoints on it, I really thought someone needed to
continue it and so I kind of volunteered for it.  And there was a
little bit of discussion amongst some people.

First Craig was really hesitant to say, "Yeah, well maybe you should
take it over." A lot of this was being held up by Taran King who said,
"Well, we just don't want your politics getting involved." Because,
apparently, I have some hidden political agenda that differed with
what they thought the role of Phrack should play. Eventually they
decided that there is really no one else who could do a job well
enough to continue it in the spirit in which it had been formed and I
started with issue 42. And I think that one went over very well.  That
issue was pretty hilarious because it had a lot of stuff about packet
switching networks, and it was a big slap in the face to B.T. Tymnet.
I had a whole lot of fun with that issue. Since then, it's gone over
really well, at least from everyone I've talked to. Of course there'
have always been a few dissenters that say, Oh, Phrack sucks, but
these are the same people who won't tell you why.  They're just saying
it to try to get a rise out of me or something, but everybody seems to
appreciate the time and effort that goes into putting this out and
especially since I'm getting nothing out of it.

There's kind of a funny side to that. After I took it over, I went
ahead and I registered it with the Library of Congress and I filed a
DBA as Phrack magazine and for the first issue I put out a license
agreement, sort of, at the beginning saying that any corporate,
government or law enforcement use or possession of this magazine
without prior registration with me was a violation of the Copyright
Law, blah, blah, blah, this and that and Phrack was free to qualified
subscribers; however, in order to qualify as a qualified subscriber,
one must be an amateur computer hobbyist with no ties to such a thing.
And this really went over like a ton of bricks with some people.  A
lot of corporate people immediately sent back, "Please remove my name
from the list." I had a few other people say, well, "We're going to
pay, but don't tell anybody we're going to pay." Of course, they never
did. There was only one person who actually did pay, so, you know, I
used that as wonderful ammunition for the next issue saying that all
of them are lying, cheating scums and they have no respect for our
information so why should they think it odd that we have any respect
for theirs.

GA: And you actually named a few people.

CG: Yeah, I named several people who were not only getting the
magazine but in one case, they were spreading it around and, of
course, none of them even contacted me for registration.  It was all,
I had a riot with it. It was a lot of fun. And, I'm still going to
include that in every issue because I still expect them, if they're
going to be reading my magazine, to please have some shred of decency
and pay the registration fee, since it's a lot less than any other
trade publication that they'd be buying regardless, and certainly a
lot more voluminous and contains a lot more information than they're
going to find in any other magazine dealing with computer security.

GA: Is the agenda for that decision to get publicity, to have grounds
to sue people who you don't like, or to gain financially?

CG: Well, I never expected to gain anything financially. You know, a
lot of the people who are still in the so-called "underground" are
also working in various fields which might put them in conflict with
the registration agreements, and we're very liberal about that. I
mean, if someone just because they're working at, let's say...

GA: Gray Areas, Inc.

CG: Yeah, Gray Areas, Inc. or the people who might be independent,
like LAN consultants, you know, just 'cause someone's working in the
field, I'm real flexible about that. Then if someone sends me mail,
and I get a lot like that, which says, "Well, I'm assistant
administrator here at the university and there's no way they'll pay
for it." I'm like, "Don't worry about it." You know, "We'll make an
exemption in your case." But it's the people, the Gene Stafford's of
the world, the Ed DeHart's of the world.  Those are the people who
have always pointed the finger at the people who this information is
intended for and called them bad.  They're the ones who don t register
their subscriptions and the people of their mind set and the people of
their ilk, I guess.

As far as publicity, it didn't gain any publicity. It wasn't any kind
of stunt. My biggest concern in doing this was to try to protect this
information and I didn't want to see it being resold. With the prior
Phracks up 'til 41, there are companies out there, for example Onion
Press who sells hard copies of Phrack, and I don't want anything that
I'm putting time and effort into being resold. I don't want it in the
CD-ROMs. There's are several CD-ROMs out right now with a bunch of
text files from the computer underground.

So, I wanted to copyright this information, put it out. It's a
magazine, I'm doing it, it's my magazine. The DBA is in my name, I
hold the copyright and no one's going to resell this. If it's going to
be presented in some other format, I want to be able to control that.
And, it's not necessarily a kind of power play. It's just I want to
protect it.  I mean, I don't think you'd appreciate people all of a
sudden saying, "Now I'm going to put up the electronic version of Gray
Areas."

                       =======================

GA: Many years ago, Phrack had a problem with a telephone company
regarding a document that they printed, and a lot of people have said
that if it was a paper publication as opposed to an electronic
publication, that might never have happened.

CG: Yeah, well, I mean, that's obvious.  You  look at magazines like
2600 and just because they're black letters on a white page instead of
white letters on a black screen, they get away with a lot of stuff.
They get threatening letters from Bell Cores. They like to publish
them in their magazine, but they haven't been taken to task for any of
that. You don't see them in any sort of court for this and the mere
fact that the very document that they are saying was so proprietary
was available for $19.95 from the Bell Core order line. That sort of
stands to prove that they were just looking for a scapegoat, a
figurehead in the underground community to use as an example for the
rest of the people to say, "Well, we ll take down Phrack.  That'll
show them. That'll scare them."

It's the same kind of thing that they tried to do with The Legion of
Doom.  They said, "Well, we took down the Legion of Doom." I heard it
from one person, you know, you cut off the head, the body will die.
It's like, AT&T or somebody had somebody map out the computer
underground, they had Phrack magazine in the middle of a hub and the
Legion of Doom above that; arrows going and pointing out how the
computer underground networks together, and obviously, these people
think there's a little more structure to it than there is. They don't
realize that it's complete anarchy. I mean, no one's controlling
anybody else's actions. To set out one example and hope that everybody
else is going to learn from that one example is ludicrous.

GA: What sort of problems do you encounter publishing it?

CG: It takes up a lot of my time, my spare time, which is growing
incredibly smaller and, I mean, I've overextended myself on a number
of projects and since I've definitely got a commitment to Phrack, it's
one that I can certainly shirk if I decided to since I'm not indebted
to anybody to do it really. I'm not going to pass it up because I
really want to make sure it continues to be published. That's the
biggest problem I face, time.  Then there are people who say, "Oh, I'm
going to send you a file on this," and they don't. You know, thanks a
lot. And I always rag on those people.  In fact, in the beginning of
Phrack 44, I said, "Yeah, and for the people who said they're going to
send me a file and didn't, you know who you are, and you always have
to live with your own guilt." I mean, it's typical hacker stuff. "I'm
going to do this." And they start it and they forget about it.

GA: It's funny though because I've had incredible cooperation from
those people; more than I've had from any other community that we deal
with.  Do you think it's because I'm a girl or because it's on paper?

CG: Well, it might be a little of both. The kind of files that go in
Phrack, I don't think Gray Areas is going to publish. You know, how to
use the Role 9000 CBX, or here's how to hack system 75's, or secret
sectors and units, or publish C programs. You get a different type of
thing.  Maybe there are people who feel a lot more comfortable writing
cultural type pieces or special interest pieces than they would
writing technical stuff. And to try to compensate for that.  I've put
in a lot more stuff in the issues that I've been dealing with, to deal
with the culture. Like I started something last issue trying to get
people from different countries to write about what it's like in that
country. And I had a file in from Ireland; I had a file in from
Germany; I had a file in from Canada. This issue I've got another one
from a different part of Canada and I've got one from Sweden and I'm
waiting on a couple of others. Because, as the computer underground
goes, it's, people like to have this idea that it's this closely knit
thing of all these hackers working together, and see how they're
trading information. But it's not. I don't know anything that's going
on in other countries except for what the few, select people from
those countries who hang out in the same areas that I do tell me.  But
there's so many people and so many countries doing things.

They've got their own little pirate wares, trading scenes, they've got
their own little virus scenes, they've got their freaking things.
Stuff that works on their own system, only works in their country; and
they have their own secret ways of doing things, and their own
networks that they like to hack, and they all hang out on certain
deals and they have their own little lore about the busts, or super
hackers from their country, and that's the kind of stuff that's just
great to find out. Because, otherwise, you would never know. And it's
really, really interesting to read what these people are up to and no
one names names. They're just talking about what it's like to be a
hacker in their country, and that's the kind of cool stuff that I
want to continue to do.

                       =======================

GA: I suppose we should get into your background and how you became
qualified to run Phrack.

CG: I don't know if it's a qualification to run Phrack...

GA: Well, obviously, there are an awful lot of people who could have
been considered but weren't.

CG: Yeah, well, I guess so.

GA: What sort of stages did you go through?  From the time that you
first discovered computers and so on until today?

CG: I kind of went through an exponential learning curve from the very
beginning and it plateaued out for a while and it's just been a steady
growth since then. At least I tried to maintain that because there's
so many new developments that come out and I try to stay abreast of
everything that's going on. I started messing around with computers a
very long time ago. For any number of reasons, I always have problems
trying to place the exact date.

GA: What sort of computers were there?  That dates it a little.

CG: Well, the very first computer I did anything on with a modem was
an Apple II, and a micro modem II. It was a friend of mine's dad's.
He was a lawyer. He got it so he could get on Dialogue,  because it
was like the brand new service for lawyers. They could go on and look
up legal briefs and it was all exciting. So, this friend of mine was
showing it off, I guess maybe 5th grade, 6th grade, somewhere around
there?  A long time ago. And, in order to get on Dialogue, you had to
dial this special number. Well, we got on, followed the instructions,
got on Dialogue, looked at it, said, "This is really cool." And we
noticed that, "Well, gee, in order to get on Dialogue, you have to
dial this number" which was 415 something. Well, what happens if you
type in a different number? So we typed a different number somewhere
else. And, that was sort of it.

We spent the vast majority of that night trying different addresses on
Telenet and actually got into a system. And, this was the first time I
had ever been on a modem and, I mean, it was just natural. We were
like, wow! We didn't have any concept of what a network was, we
couldn't imagine what this  meant. The concept of being able to call
one little number and connect to computers around the entire country
was so mind boggling, so strange to us that we were sucked into it.

As a little bit of background to this, I had already been messing
around with telephones before this and this is a ridiculous story that
a lot of people give me a lot of s--- about but, I mean, I don't
really care. A friend of mine and I had stolen a dirty magazine from a
convenience store and rifling through it, it was like a High Society
or something like that.

GA: Probably not. There were no such things then. They didn't start
until 1975-76.

CG: Well, this is back in 1980. I'm not that old. I turned 25 in May,
so it wasn't that long ago I guess in the grand scheme of things.
But, to me it was a hell of a long time ago. So anyway, we had stolen
a High Society from them and in it, it said, "Call this number right
now." It was 212-976-2626 or 212-976-2727, a brand new service.  I
said, "We got to call that number. We can't call that number, that's a
long distance number, we'll get in trouble." It was like, "No, we
gotta call that." So, we went back over to his house, and his Mom
works. She was working, it's funny, she was actually working at
Datapoint. She was at work, it was the summer, so we got there and
dialed it up, listened to if for, like you know, some phone sex
recording. Wow! You're a little punk kid, of course, that's just great
to hear some crazy recording like that.

We hung up after it was over and were like, "Man, that's great.  We're
going to have to call that other one.  No we can't call the other
one.  He says, "Well, actually maybe we can, but if we're going to
call it, we need to use this thing that my Mom's got." What thing? He
said, "Well, it's this thing that's supposed to make her phone bill
cheaper."  And, it was a company that started up way back then called
LDS. It was a Watts re-seller and they had a local dial-up number, you
call up and you gave the operator who answered the phone a code, you
read it out to her and she connected the call. I think at that time it
was a four or five digit code.  So we called up, gave it to her, gave
her the number, the call went through. So, next time you call her
back, give her someone else's number. Goes, "nah."  So we called up,
added ten to the number we had and placed the call. It was like,
"Well, that's really cool." And it's funny that I've done that prior
to doing anything on the computer because shortly thereafter, after
being on the computer and discovering networks and after that,
discovering bulletin boards, it became readily apparent to me how the
marriage of the two was inevitable because there was no way in hell
I'd be able to call a bulletin board any place other than down the
street and not get beat to death by my parents for raking up very
large phone bills. And after that, it kind of just shot up
exponentially like I said before. From such humble beginnings.

                       =======================

CG:  Which connected, at the time, I think now they have limits as to
how many people. At the time, it was basically unlimited.  You could
take as many people as you wanted on your conference. And they had a
lot of different features that they don't have now. Like, you could
transfer control. And we used to do all sorts of ridiculous stuff.
One of my favorite tricks was to call up Directory Assistance and, at
the time, I don't think they do this any more, I haven't really
bothered to check in about five years, but at the time, Western
Digital who made all the automatic call distribution systems for
Directory Assistance since they were still the Bell system; they had a
feature in there that would send it into a test mode.  If you called
up and just as the ACD system kicked in, it started to cue a call for
the next available operator if you held down a D tone.  A lot of your
readers might not know this, but on a standard touch tone phone, there
are really four rows and four columns and not three rows and four
columns. There's an extra column that's left out and that's A, B, C,
and D. Well, I had a phone that had A, B, C, and D on it. There's a
number of different ways to build a tone generator, they'll do that
and a lot of modems will make those tones or what have you. But,
anyway, there was a trick at one time by holding down the D tone, if
you called Directory Assistance, it'd throw the ACD into its
maintenance mode. And, one of the features on this was to do a test of
a circuit by establishing basically a loop so, if someone would call,
hold down a D, get thrown into the maintenance mode, get the 5 key,
they'd get onto one side of the mode.  Someone else could call back
in, hold down the D key, hit 6, get on the other side of loop, and
then you could talk.

Well, I used to call Directory Assistance from the conference, hold
down the D key, hit 5, add that into the conference, the loop,
transfer control to Directory Assistance and then call back in on the
other side of the loop and then take control of the conference that
way.  So, if any of the test people who were working on the software
for Alliance and working on getting the bugs worked out of everything,
if any of the engineers would go back to look and see why these
circuits were active and they'd look to see who was running control of
this conference, they'd see it was Directory Assistance and it really
used to confuse the hell out of them.  We got a great deal of mileage
out of that because, you know, I don't really think they knew how, but
somehow it kept going. But anyway, on these conferences, I got hooked
up with a group of really, really, really, really smart people and by
sitting and talking with these people, and learning what they knew,
because like I said before, everyone was really open and everybody
wanted everybody to learn. If more people were working on a project,
everybody had a better chance of learning and succeeding then if just
one person decided to hoard it all to themselves.

>From being on these conferences and talking about to all of these
people and sharing information with all of these people, I was
eventually asked to join a group that was being formed at that time
and it ended up being called The Legion of Doom.

GA: How did it get called Legion of Doom? Who named it?

CG: I don't know. The person whose idea it was to start the group, his
handle was Lex Luther and from the DC Comics, Lex Luther's infamous
group of anti-heroes was The Legion of Doom, so it was pretty a
natural choice.  A lot of stuff has been attributed to it lately, such
as it being a sinister type name. Well, Lex Luther couldn't possibly
have called his group anything other than the Legion of Doom.  Anybody
who has every read a Super Friends comic knows that's exactly what it
was called.

As The Legion of Doom continued on in its growth and its endless quest
of knowledge about different operating systems and networking
technologies and phone systems and everything else, the reps of
everybody involved in the group sort of kind of sky rocketed because
everybody by us all working together, we had a better resource of
knowledge to provide the people and by continuing to do so, everybody,
I guess, built up a sort of respect for the group and some of it has
even lasted to today, even though the group is no longer around. A lot
of things that it affected still linger on in the community.

GA: There's been a lot of debate about who was in that group. Seems
like everybody in the world wanted to be. Ha, ha. So many of the
hackers I meet say they were.

CG: There are always going to be people who want to run around and
say, "Yeah, I was in the Legion of Doom."  And I know everybody who
was in it.  I've got a list of everybody who was in it and written
about everybody who was in it. We all know who was in it, so it really
does not make any difference. If some joker off the street  is going
to come up and say, "I was in The Legion of Doom," who really cares,
you know, what's it going to get him today? It doesn't mean anything,
because the group is not around anymore.  Um, if they know something,
well, their knowledge alone should speak for itself and should not
have to relay on the name of some group that does not exist to try to
perpetrate some sort of false image to other people, so it really
doesn't happen that often. We see people like Ian Murphy, for
instance. I've still got newspaper articles with him in it saying that
he was in Legion of Doom, and in fact, he has told some people, and
some business acquaintances of mine, I guess in some desperate attempt
to generate revenue, that not only was he in Legion of Doom, but he
founded it, ha, ha, so, that's nice and he can continue to delude
himself in a lot of things.  If anybody wants to live in delusion,
well that's their right, I suppose. It doesn't mean anything to me.

GA: Isn't there a new Legion of Doom now?

CG: Well, I really don't want to get into that too much. There was a
young Canadian fellow who decided that it might be a good idea to
start the new Legion of Doom and within like say an hour after that
got posted to the Net, we were on the phone with him, telling him what
a bad idea that was. It was myself and Scott Chasin who called him up
first and he said, "Well, I think The Legion of Doom was a real
important thing for the community and I just want to see it continue"
and this and that. I said, "Who are you to come out of nowhere and
think that not only do you have enough knowledge to say that you could
have been associated with The Legion of Doom, much less to usurp the
name? The name is dead, we put the group to rest and we want it to
stay that way. He said, Well I'm not going to change it and as soon as
you see the type of journal I put out, you will be really impressed."
I said, "If your magazine is good, it will stand on its own merit and
you don't need our name." He said, "Well you retired the name and that
means it's fair game for anybody else." Okay, well so there is no
talking to this guy, so I said, "Well I want to tell you this Cameron,
Scott and I are the first to call you, there will be many others. We
are the nicest. It's not going to be pretty for you and I just want
you to know that."

And let's just say there is no more New Legion of Doom. It was kind of
an interesting experience for everybody because it did get a lot of
the members back in contact with one another. A lot of us had gone our
separate ways. The members grew older.The group was founded in '84 and
here it is almost '94, I mean that's a long time for, you know, a
bunch of people to stay in contact, regardless of whether or not it
was for some silly little computer group to form a net.  So it was
nice to catch back up with a lot of people.  It's really refreshing to
see that damn near everybody who was ever involved in the group is
doing very well for themselves in their chosen careers or professions,
or graduating with high graduate degrees, Ph.D.s, Master Degrees, and
things; it's certainly not what one would expect from the world's most
infamous hacker group, but that certainly is what happened.  But, you
know, the whole Cameron Smith New Legion of Doom thing, it didn't
accomplish anything for him, but it certainly did accomplish something
for us. It got a bunch of us back together again.  I don't want to
sound grateful to him for it, but it worked out pretty well.

GA: How did The Legion of Doom originally break up?

CG: Well, The Legion of Doom kind of went through three different
waves.  You can kind of chart the history of the computer underground,
it sort of runs parallel to the history of The Legion of Doom, because
you can see as the new members came in, that's when all the busts
happened.  People would either get nervous about the busts and move on
and go to college and try to get a life, or they would be involved in
some of the bust and some of them would leave that way. So it kind of
went through three different membership reorganizations. You can tell
who came in where because of what was going on.  It finally kind of
folded. I had talked to a bunch of members somewhat recently, within
the past three or four years and I said, "Well maybe we ought to try
to do something, we need to get some more members in and try to work
towards a different end." At the time, there was still the infant of
an idea about going into consulting by building together this last
insurgence of Legion of Doom. I talked to  several people and wanted
to try to track down newer people, so I talked to the members who were
still active and asked are you still interested in doing this again,
because we've got some other things that we want to try to focus on
and as stuff starts to progress, something might come out of it. I'm
doing something with some other people, and we got people who are
experts in different types of fields, and we were talking to people
who are experts in mainframes, in telephony, in Unix, and all sorts of
different stuff and as that started to progress, we got a bunch of
people in the last new membership drive for the group, did a few
things, and as that started to go on, most of my main focus started
dealing in with a few people from the last insurgence about trying to
form this consulting company, which ended up being Comsec.

We finally decided that's what we were going to do and we were serious
about it, we said okay well then maybe we should just dissolve the
group, because if we are going to have Comsec, we don't need Legion of
Doom, 'cause this is what we want to do. Instead of spreading the
knowledge around the net in the form of text files free, we were going
to spread the knowledge around the corporate world for money. It
really was a logical progression to us, because, you are not going to
be 35 years old and still trying to break into the systems somewhere;
the thrill doesn't last that long and if it does, well, you need to
get a life or a pet or something. There is no reason why someone who
even has an inkling of maturity, not to say that I do in the least,
should be wasting away their life gathering up how many university
systems they broke into.

So after we finally made the formal decision, we talked to some people
and said well, we were just going to say goodbye to the group.
Everybody who was still active or interested from the group was like
look, you know, when this thing takes off, we want all of you to be
there. When we need more consultants, you're the best, and everyone
was all up for it. That's what happened.

GA: Let's stick with The Legion of Doom for awhile. What was the
relationship between The Legion of Doom Technical Journals and Phrack
and Phun?

CG: Well, it's kind of funny. Originally, I think this was something
that Craig and Lex had done. Originally, there was going to be a
Phrack issue that was going to be the Legion of Doom Phrack Issue. It
was going to be Phrackful, nothing would follow us but Legion of Doom
members and it went on and on and on.  I guess Lex had collected
enough files, he was like, "I don't want to give these to Phrack."
So, he stuck them together in the Legion of Doom Technical Journals,
since it was all Legion of Doom stuff anyway, might as well go ahead
and put it out ourselves. And I don't know if that was something
personal against Craig, I really doubt it because Craig and Lex have
always been friendly enough. I just think that is something he decided
to do. From that there were three others published, so there was a
total of four Tech Journals. They didn't come out in any sort of
organized order, they just sort of came out when they wanted to come
out.  It was like they were done when they were done and they appeared
when we were finished and that's why there were only four for a group
that was around for so long, but they were fairly timely when they
were all released and I guess everybody really appreciated the kind of
knowledge that was in them when they came out.

Looking back, I don't know how much interest someone is going to get
on how to hack Tops 20. I d like to find the Tops 20 right now.  It
doesn't exist. So the knowledge that was in those things is fairly
dated, but at the time, it was very timely and people appreciated it.

                       =======================

GA: You were busted in 1990, right?

CG: Nope.

GA: How did that go down?

CG: On March 1 1990, I was raided by the Secret Service, but I wasn't
busted.  There is a big distinction there. Just because they came in
my house and dug through my stuff, that doesn't mean anything
happened.

Let me give a little preface to that. Several months prior, I received
notification from the University of Texas that my school records
(specifically mentioning my computer accounts) were being subpoenaed
by a federal district court judge in Chicago. I knew very well that
was the district that William Cook was in, so I trotted on down to the
Dean's office at the University of Texas and said, "Hi, I understand
my records have been subpoenaed. I need a copy of that for my lawyer."
So they ran me off a copy of it and sure enough there's William Cook's
name. So, okay, I was right, and I went home and vacuumed the house
and cleaned everything up nice and neat for them, started placing
little notes in various places. I had little notes that said, "Nope,
nothing in here," put that in a drawer and a little note that said,
"Wrong, try again," put that in there and little things everyplace
that someone might look to try to find the secret hacker notes.  I
printed out a copy of the 911 document, nice laser printed copy, laid
that out and fan folded it over my desk. I went down to the Federal
Building, picked up brochures on how to became an FBI agent and a
Secret Service Agent, set those out on my desk. I got a printout of
several different things, laid those out all nice and neat, had some
Phrack issues, I had some messages off of the Phoenix Project, I had
all this stuff laid out. It looked like a little alter, a shrine to
the FBI.

Well, sure enough a couple months later, there they were. And I also
put some notes on my computer account at UT. I made some really large
files, like cordons and named them dot master, dot password, dot zip,
just stupid names, you know that tack ID's, and left these sitting in
my account. All this noise. And then I made this one that said,
"Secret Info." If anybody would have bothered to read that, it was
like a 10K file of me saying, "Anybody who would take the time to
search through my files and try to find illegal information is a
complete scumbag." Sure enough when they came to visit my house that
morning, I woke up to the sound of people running up my stairs and
their screaming, "Federal Agents - warrant," then they came in my
room, "Out of the bed." Leading the pack is Special Agent Tim Foley,
and he's got his service revolver out, and he's got it pointed at me.
He's a pretty big guy and I'm me. I don't present a menacing figure to
most and especially at 6 in the morning in boxer shorts, ha, ha.  It
just looked like I'm going to jump right out and start ripping
peoples' heads off, so he quickly put his gun away. Nonetheless, he
did have it drawn. I like to point that out. Hackers are a notoriously
violent group of people who are known for their physical prowess, so
guns are definitely always necessary. (said sarcastically)

So, they ordered me downstairs and held me in the kitchen. I
immediately said, "Let me call my lawyer," and they said, "You'll get
your chance." So, they started going through all my stuff. I heard
them up in my room, rifling all though my drawers and about an hour or
so later, one comes down and hands over one of the Secret Service
Brochures that I had.  He says, "So, thinking about joining up?" I
said, "Well, I think I could probably do better than some people."  He
didn't like that remark.  He said, "Well, I think our requirements are
a little more stringent than to let in the likes of you." I said,
"Well, it shows."  He didn't like that very much either. I said, "So,
what's your degree in?"  He said, "Well, I'm not going to tell you."
I said "I'm just making conversation." So they continued on in the
search of my house and when they found absolutely nothing having
anything to do with computers, they started digging through other
stuff. The found a bag of cable and wire and they decided they better
take that, because I might be able to hook up my stereo, so they took
that. I have an arcade size PacMan machine, which of course, one of
the agents  decided was stolen, because a lot of people slip those
into their backpacks on the way home from school. So they started
calling up all the arcade vendors around town trying to see if this
had indeed been stolen. The thought of me wheeling an arcade size
PacMan machine down the street, just didn't occur to them. So,
finally, I said "Look, I bought it, here's the guy, call him."  So
they finally gave that up, so then they started harassing me about
some street signs I had in my house. I had a Stop sign.  I had a No
Dumping sign over the toilet. "You need to get rid of those, it's
state property, if we come back here and you have those, we are taking
you downtown." I go like, "Okay."  So then they started looking for
drugs, and one guy is digging through a big box of, like a jumbo
family size deal of Tide we bought at Sam's, it was about three feet
tall and it was one of the monster size things. This guy is just
digging through it, just scooping it out, his hands are all turning
blue and sudsy from digging through this detergent and Foley walks
over to him and says, "Well, I think we can safely assume that that's
laundry detergent."

So, Foley comes back in to where I'm sitting in the kitchen and I've
been freezing my ass off, so they had let me get a jacket, and put on
some jeans, and he says to me, "Well, I want to show you something."
He whips out some business cards that I had printed up for SummerCon a
few years ago, that said, "Erik Bloodaxe, Hacker." It had a little
treasury logo on it and he says, "Impersonating a Federal official?"
"Well, it doesn't say anywhere on there, 'Chris Goggans, Special
Agent.' It says, 'Erik Bloodaxe, Hacker.' Whoever this Erik Bloodaxe
character is. It might be me, it might not. I'm Chris Goggans and that
says, Erik Bloodaxe, Hacker. Just because the seals there, it doesn't
mean anything." He says, "Well, if you don't tell us everything that
there is to know about all your higher ups, we are going to be
pressing state, local and federal charges against you." I said, "On
what grounds?" He goes, "We want to know everything about your higher
ups." Which I'm thinking, gosh, I'm going to have to turn in the big
man, which is ludicrous, because there is no such thing as a higher
up, but apparently they thought we were a part of some big
organization. So, I said, "Well, I'm not saying anything to you, I'm
calling my lawyer." And I already had told my lawyer previously that I
would be raided shortly and that I would be needing to call him. So I
called him and said, "Hi, this is Chris and the Secret Service is here
and I'd like you to speak to the agent in charge."  And he said that
my client declines any sort of interviews until such a time that I can
arrange to be there to represent him in an official capacity and I'll
need your name and I need all the information. The agent said, "We
will be in touch."  And that was it. They gathered the bag of wire and
the printouts of the 911 document, how to be an FBI agent, the
printouts of the Phoenix Project messages, and they trotted on off. As
they were walking out the door, one of the guys kind of looks over at
my television set and he says, "Hey, why is that video game plugged
into the phone line?" And it was kind of like a Homer Simpson, cause
Foley trots over and I had a 300v terminal, which is what I had been
using to get on bulletin boards with. It was plugged into the phone.
It was a little membrane keyboard box. All it was was a modem. So they
bundled that up and stuck that in there, and they went on their merry
way, and I followed them out to the car, and wished them well, and
wrote down their license plate, and went back into the house, and got
into my car, and went driving around calling up everybody else around
town to see if anybody else had been raided.

GA: Had they?

CG: Yeah, at the same time as what was going on in my house, the house
of Lloyd Blankenship was being raided, The Mentor, as well as the
office place of Steve Jackson Games, where Lloyd worked, which ran
into a huge fiasco later on down the road for these hapless agents,
but that's an entirely different story.

                       =======================

GA: Did you ever do any malicious hacking?

CG: No. To be honest, there were a couple of times I actually
considered such a thing.  At one point in time, we had access to South
African Government computers, like South African Treasury, things like
that and we were thinking, should we take it down? Nah, we better not
do that, can we just change the message of the day to something like
some anti-apartheid statement, some sort of politically correct thing.
It was all a big joke to us, we certainly weren't thinking about that,
we just figured it would really piss them off, but we never did it.
When the Russian x25 network went up, we were right there on it. They
can't bust us for hacking Russia, I mean, who would? What were they
going to say?  It's like, "You should hack them, because they are our
enemies, well maybe you should hack them," so, we were just going
after the Russian network pretty hardcore.

Malicious hacking pretty much stands against everything that I adhere
to.  You always hear people talking about this so called hacker ethic
and I really do believe that. I would never wipe anything out. I would
never take a system down and delete anything off of a system. Any time
I was ever in a system, I'd look around the system, I'd see how the
system was architectured, see how the directory structures differed
from different types of other operating systems, make notes about this
command being similar to that command on a different type of system,
so it made it easier for me to learn that operating system. Because
back then you couldn't just walk down the street to your University
and jump right on these different computer systems, because they
didn't have them and if they did have them only several classes would
allow you access to them. Given the fact that I was certainly not of
college age, it wasn't really an option. You didn't have public access
to systems. All you had to do was call up and ask for an account and
you'd get one. So, the whole idea of doing anything destructive or
malicious or anything even with malcontents using computer systems to
track information about people or harass people, that just goes
against the grain of anything that's me.  I find it pretty repulsive
and disgusting. I am certainly not blind to the fact that there are
people out there that do it, but obviously these people have a s---ty
upbringing or they are just bad people.

                       =======================

GA: How about books that have come out about hackers?

CG: Well, I'll take a stab at that. The Hacker Crackdown I found to be
a very schizophrenic piece of writing. I still to this day have not
read it completely. I found it very hard to follow and I was there. It
is very hard for me to read that book and follow the chronology.
Everything is on the money and he did a very good job of making sure
the facts were correct, but it's just hard for me to read.  Maybe
that's just a criticism of his writing style.

Approaching Zero, I didn't really care for that too much, more
specifically because they just basically out and out called me a
traitor and said I was keen on selling secrets to the Soviet Union.
Maybe you ought to ask the IRS about all that money I got from the
Soviet Union, because I haven't seen it, but I'm sure I'll be taxed on
that too. But I found that rather disgusting and after that book, I
actually had a conversation with one of the people who was writing the
book. A guy named Brian, actually called us up at Comsec and I talked
to him for about 30-45 minutes about things and next thing I know,
nothing we really said ended up in the book. A bunch of people were
misquoted, left and right. All the stuff about the American hacking
scenes, off the mark.  People were quoted as saying stuff that they
never said, things supposedly from bulletin boards that were not on
bulletin boards. I don't know where this information came from, but
it's really just off the money.  I guess if you know something so
intimately, you are always going to be critical of anything someone
says about it because they don't know it as well as you do, so you are
always going to find fault in something.  So maybe I'm just being
overly critical.

                       =======================

GA: While on the subject of Comsec, you have said that you have gotten
bad press. From where?

CG: Well, I think an article saying that I have been arrested in the
past for breaking into Bell South, or books being published saying
myself of The Legion of Doom destroyed the 911 Network in nine states
just to see if we could do it. Things like that which are just out and
out lies. I'd say that was pretty bad press.

GA: Did Comsec fold because of personality problems, or a lack of
business?

CG: Comsec folded for a number of reasons.  The press aspect weighed
heavy.  We were basically blacklisted by the security community. They
wouldn't allow me a forum to publish any of my articles. It
essentially boiled down to, with the trade magazines, at least, they
were told by certain members of large accounting firms that they would
pull their advertising if they associated with us, and when you are a
trade magazine that is where all of your revenue comes from, because
no one is paying for subscriptions and they can't afford that loss.
They were more interested in making money then they were in spreading
the gospel of truth in security. But hey, it's a business, I guess you
have to take that. I had speaking engagements pulled. A head of a very
large security association promised me a speaking engagement and then
decided to cancel it and didn't bother to tell me until a month before
the conference. I talked to him and he said, "Oh, well I should have
called you." This is like one of the largest security associations in
the country and the second largest. So we had that kind of treatment.

Some of these conferences, since we were not speaking at them, we
could not really justify spending thousand of dollars to fly out there
and attend. We were cut off from a lot of things and since we did not
have a presence at these conferences, a lot of our competitors used
this to target the companies that we were marketing. You would have
these MIS directors from large oil companies out there, and you would
have other people going up to them and saying, "You're from Houston.
You are not dealing with those Comsec folks, are you? Well, you know
that they are nothing but a bunch of crooks out there."  So, one very
large oil company, we had already had all of our paperwork passed
though all of their legal departments and it was just waiting to be
signed; it had already been approved and money was allocated in the
budget and we were ready to rock. This would have meant a large amount
of money over a period of several years.  Well from going though all
of these friendly happy negotiations and papers ready to be signed, to
XYZ oil company does not do business with criminals, Click! Who talked
to this guy? Who feed him this nonsense?

Well, we got a lot of that, certainly that weighed heavy. The fear
that came from companies like DeLloyd Touche.I will single them out
especially because some of their larger consultants were very vocal in
speaking out against us, in the very forums they denied us. They used
the magazines as a place where one particular consultant said
something like, "Can we lie down with dogs and be surprised when we
get up with fleas?" I mean, I don't deserve that type of commentary. I
don't think anybody does. It is certainly not a mature attitude for
somebody who is supposed to be an upstanding ethical consultant to use
a trade publication to vent his frustration against his competition.
But, hey, it's a free market and if he has a forum and they gave him a
column, well I think he can write whatever the hell he wants.

Sure, I was in The Legion of Doom. I have been in everybody's system.
But I have never been arrested. I have never broken anything, I have
never done anything really, really, criminally bad. There is a
difference in doing something illegal, you like walk across the street
at the wrong place and you are committing a crime, but that does not
make you a criminal, and there is a big difference between different
types of behavior. By all these different forces saying so many
negative things about us, we had our work cut out for us.

To be honest, they had us beat. They had the deep pockets. They could
wait us out. They could keep saying bad things about us forever. They
had hundreds of millions of dollars  so that even if they weren't
making money they could sit on it. We didn't. Eventually we could not
do it any more. I had overextended myself. I sold off all my stock,
all my personal stock. I had a bunch of stock in energy companies and
things like that, that was in the past supposed to be paying for my
college education, and I gambled it away on Comsec and I ran out of
money.  I needed to eat, I needed to get a job, I had to move, I
couldn't afford it anymore. And everybody was basically saying the
same thing. Scott didn't have any money, Rob didn't have any money,
our sales guys were getting really antsy because they were having a
real hard time closing sales, so we just had to shut down.

                       =======================

GA: Any thoughts on where technology is going and how hacking might
change in the next couple of years?

CG: Well, like I said earlier, the Internet is a very scary place with
a very, very limited set of knowledge. One person could take down a
majority of the network and for so much trust and need to be placed in
a network that is so inherently unstable because of the protocol that
drives it.  I mean you don't plan a trip across country in a 1957
jalopy! You go out and get a new car, or you rent a good car, you
don't put all your trust in something that ain't gonna work. And it
works well enough for a lot of things, but for people to trust their
entire enterprise network to stuff over the Internet, they are asking
for trouble. And as people become more familiar with the entire
protocol sweep, they are going to find out that there is a world of
hurt about to happen, and in the next few years, people are going to
be real surprised when stuff starts going down like crazy. That's
going to be the biggest thing to happen.

I would imagine that all the cellular problems are going to disappear
because the advent of digital caller is going to remove all this
problem.  A lot of things are going to change. I imagine people,
hopefully, will once again get more and more into writing software and
doing more productive stuff. With all the wealth of knowledge that is
coming out of every community, even in the underground, because people
are exposing bugs and people are changing things, so eventually people
are going to be able to make all types of systems, robust enough to
survive different things. So out of all this turmoil, some good is
going to come.  And from that, once all the problems have been
corrected, people will be able to direct their energies into a more
positive thing, like developing applications, writing software and
focusing their attention on doing neat, nifty tricks, rather than
doing neat nifty stupid tricks, ha, ha.

You are going to see some really, really cool stuff that is going to
blow your mind and you are going to be able to carry it around in your
hand.  You are never going to be out of touch anywhere in the world,
so, I think that will be very cool.

                       =======================

GA: We should certainly tell people how to subscribe to Phrack, and
the prices on the LOD disks.

CG: Yeah, people who want information about Phrack can mail me at:
Phrack@well.sf.ca.us and for information about the BBS Archive Project
mail:  LODCOM@Mindvox.Phantom.com

GA: Thanks Chris!

G: Thank you.

------------------------------

Date: Sun, 23 Oct 1994 22:51:01 CDT
From: CuD Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: File 2--Cu Digest Header Information (unchanged since 23 Oct 1994)

Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are
available at no cost electronically.

CuD is available as a Usenet newsgroup: comp.society.cu-digest

Or, to subscribe, send a one-line message:  SUB CUDIGEST  your name
Send it to LISTSERV@UIUCVMD.BITNET or LISTSERV@VMD.CSO.UIUC.EDU
The editors may be contacted by voice (815-753-0303), fax (815-753-6302)
or U.S. mail at:  Jim Thomas, Department of Sociology, NIU, DeKalb, IL
60115, USA.

Issues of CuD can also be found in the Usenet comp.society.cu-digest
news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of
LAWSIG, and DL1 of TELECOM; on GEnie in the PF*NPC RT
libraries and in the VIRUS/SECURITY library; from America Online in
the PC Telecom forum under "computing newsletters;"
On Delphi in the General Discussion database of the Internet SIG;
on RIPCO BBS (312) 528-5020 (and via Ripco on  internet);
and on Rune Stone BBS (IIRGWHQ) (203) 832-8441.
CuD is also available via Fidonet File Request from
1:11/70; unlisted nodes and points welcome.

EUROPE:   from the ComNet in LUXEMBOURG BBS (++352) 466893;
          In ITALY: Bits against the Empire BBS: +39-461-980493
          In BELGIUM: Virtual Access BBS:  +32.69.45.51.77 (ringdown)

  UNITED STATES:  etext.archive.umich.edu (192.131.22.8)  in /pub/CuD/
                  ftp.eff.org (192.88.144.4) in /pub/Publications/CuD/
                  aql.gatech.edu (128.61.10.53) in /pub/eff/cud/
                  world.std.com in /src/wuarchive/doc/EFF/Publications/CuD/
                  uceng.uc.edu in /pub/wuarchive/doc/EFF/Publications/CuD/
                  wuarchive.wustl.edu in /doc/EFF/Publications/CuD/
  EUROPE:         nic.funet.fi in pub/doc/cud/ (Finland)
                  ftp.warwick.ac.uk in pub/cud/ (United Kingdom)

  JAPAN:          ftp.glocom.ac.jp /mirror/ftp.eff.org/Publications/CuD

The most recent issues of CuD can be obtained from the NIU Sociology gopher
at:  tk0gphr.corn.cso.niu.edu (navigate to the "acad depts;"
"liberal arts;" "sociology" menus, and it'll be in CuDs.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted for non-profit as long
as the source is cited. Authors hold a presumptive copyright, and
they should be contacted for reprint permission.  It is assumed that
non-personal mail to the moderators may be reprinted unless otherwise
specified.  Readers are encouraged to submit reasoned articles
relating to computer culture and communication.  Articles are
preferred to short responses.  Please avoid quoting previous posts
unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

------------------------------

End of Computer Underground Digest #6.94
************************************