Computer underground Digest Sun May 30 1993 Volume 5 : Issue 39 ISSN 1004-042X Editors: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET) Archivist: Brendan Kehoe Shadow-Archivists: Dan Carosone / Paul Southworth Ralph Sims / Jyrki Kuoppala Ian Dickinson Copy Editor: Etaoin Shrdlu, Senrio CONTENTS, #5.39 (May 30 1993) File 1--The LOD Files - A CuD Critique File 2--Histories of BBSes (excerpts from the LOD files) File 3--LOD Project Summary and Contact Information File 4--An Interview with the LOD Cu-Digest is a weekly electronic journal/newsletter. Subscriptions are available at no cost electronically from tk0jut2@mvs.cso.niu.edu. The editors may be contacted by voice (815-753-6430), fax (815-753-6302) or U.S. mail at: Jim Thomas, Department of Sociology, NIU, DeKalb, IL 60115. Issues of CuD can also be found in the Usenet comp.society.cu-digest news group; on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG, and DL0 and DL12 of TELECOM; on GEnie in the PF*NPC RT libraries and in the VIRUS/SECURITY library; from America Online in the PC Telecom forum under "computing newsletters;" On Delphi in the General Discussion database of the Internet SIG; on the PC-EXEC BBS at (414) 789-4210; and on: Rune Stone BBS (IIRG WHQ) 203-832-8441 NUP:Conspiracy CuD is also available via Fidonet File Request from 1:11/70; unlisted nodes and points welcome. EUROPE: from the ComNet in Luxembourg BBS (++352) 466893; ANONYMOUS FTP SITES: UNITED STATES: ftp.eff.org (192.88.144.4) in /pub/cud uglymouse.css.itd.umich.edu (141.211.182.53) in /pub/CuD/cud halcyon.com( 202.135.191.2) in /pub/mirror/cud AUSTRALIA: ftp.ee.mu.oz.au (128.250.77.2) in /pub/text/CuD. EUROPE: nic.funet.fi in pub/doc/cud. (Finland) ftp.warwick.ac.uk in pub/cud (United Kingdom) Back issues also may be obtained through mailserver at: server@blackwlf.mese.com COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing information among computerists and to the presentation and debate of diverse views. CuD material may be reprinted for non-profit as long as the source is cited. Authors hold a presumptive copyright, and they should be contacted for reprint permission. It is assumed that non-personal mail to the moderators may be reprinted unless otherwise specified. Readers are encouraged to submit reasoned articles relating to computer culture and communication. Articles are preferred to short responses. Please avoid quoting previous posts unless absolutely necessary. DISCLAIMER: The views represented herein do not necessarily represent the views of the moderators. Digest contributors assume all responsibility for ensuring that articles submitted do not violate copyright protections. ---------------------------------------------------------------------- Date: Sat, 29 May 93 14:07:13 EDT From: CuD Moderators Subject: File 1--The LOD Files - A CuD Critique The Legion of Doom (LOD), a group of "hackers" that formed in the mid-1980s, gained public attention in 1990 during the so-called "hacker crackdown." It seemed that every major computer "crime" was attributed to the group, and federal prosecutors seemed intent on linking suspects to it. As we reported in CuD 5.36, most claims were either totally without merit or grossly exaggerated. The LOD has again gained attention because a pretender, reportedly a 20 year-old Canadian, has claimed to be the new leader of the LOD and has actually begun soliciting articles for the "resurrected" LOD/H Technical Journal. Lest there be any confusion, there remains only one LOD, most of its original members are in periodic contact, they have long since become adults, and there is no relationship between the original LOD and any recent individuals or groups claiming the name. But who really cares?? CuD, for one cares. The original LOD remains a cultural icon of the 1980s in computer culture, and--for better or worse--it was the most influential and imitated group whose mystique continues into the mid-90s. This alone is hardly sufficient reason to worry about a label. The identity is important because the original members are becoming involved in projects that reflects their activities of a decade ago, and it becomes confusing when others scurry about trying to associate with that identity. If questions of identity arise, confusion over and doubts about the credibility of the projects arise. One current LOD project has impressed us. The original LOD members are compiling logs from a number of the premier "hacker underground BBSes" of the 1980s. We have obtained excerpts from the project, and we are impressed with the professionalism and comprehensiveness of the material. Working collectively under the name "LOD Communications," former members have scoured their archive for BBS logs from the mid-to-late 1980s. The logs include BBSes such as OSUNY, Twilight Zone, Forgotten Realm, Black Ice Private, Phoenix Project, Face to Face, Alliance, and Plover-NET, among others. Many were the primary boards of the era, and others typify secondary levels of the culture. Both singly and in the aggregate, the collection provides an unprecedented view into a culture that most of us only read about in "Cyberpunk" or "The Hacker Crackdown." We like the material for several reasons. First, as researchers, we find even the limited material we have seen to date as a rich source of data for anybody who wants to understand the culture of time. It is as if somebody had walked thought San Francisco's Haight-Ashbury district with a video-cam during the "Summer of Love" and then released the tapes years later. It's an anthropologists dream, a sociologists data trove, and a historian's archival orgasm. Even law enforcement and security personnel would find it helpful for demystifying many of the misconceptions of "hackers." For others, it's simply fun reading. Other than minor editing, such as obscuring sensitive phone numbers, and minor reformatting from an array of BBS systems into standard ASCII format, the logs from the BBSes that we have seen are unaltered. Rather than seeing a group of dangerous conspirators intent on wreaking havoc upon the nation, we see the workings of the minds of bright, curious kids as they exchange ideas, information, insults, and snippets of their personal lives. Many of the logs' posts are flattering, others are less so. To their credit, the lodcom editors have left it all intact to let the readers see and judge for themselves what occurred on the underground boards. We see the jealousies, anger, creativity, posturing, and--when examined over time--the development of young teenage hackers into increasingly articulate adults. We also see those who do not mature over the years. It's all there, for better or for worse. The logs also include lists of text files, message bases, and other insights into the structure of a "hacker" BBS. Those looking for evidence of hard-core conspiracies won't find it here. Instead, they'll find themselves walking into an amorphous culture of teenagers who are exploring their identity, testing their knowledge, and working out their passage from mid-adolescence into adult hood on the cyber frontier. Sometimes the explorations are silly, sometimes obviously illegal, and sometimes admirably mature. The meticulous formatting and selection of boards gives the reader a sense of actually logging on and participating in the culture. The CuD editors were on some of the boards from the 1980s and have, over the years, obtained logs from others. The LOD collection provides an authentic look into what went on, and reading them gave us a feeling of deja vous all over again. The logs are sufficiently entertaining and useful when each board is read individually. However, the power of the collection comes in reading them as chapters in a novel, as segments at different points in time that combine to give the individual posters and the boards a personality. We find ourselves wanting to know more about some of these people: How did they resolve their problems? Who was the alleged informant on a given board? Can we spot them from the posts? How did that poster resolve his problems? What happened to these people later? Each collection of files comes with a brief history of the board, dubbed the "BBS Pro-Phile", examples of which we have excerpted below. There are some additions and changes we'd like to see as the project continues--the goal is to collect a complete set of the primary boards of the period--but our suggestions in no way detract from the value of the project. First, it would help if the histories are longer. We would suggest that a standard set of questions be put to the former sysops, perhaps by an outsider, and that these questions be more critical and incisive rather than the current standard information. Second, we'd like to know more about the participants. Who were they? What happened to them? A bio-sketch of some of the more active participants would be helpful. Finally, a reflective contemporary commentary by participants would be interesting. How do the currently view their own acts? What would they differently? What did they learn from their experience? Addressing these and other issues would be a formidable project and would greatly expand the project. Perhaps there's another, equally ambitious project lurking within waiting to be developed--a comprehensive oral history of the computer culture of the 1980s. In the accompanying files, we offer snippets from BBS histories, a summary of the project, and an interview with some of the participants. We caution readers that the interview and the historical snippets may not be reproduced or distributed without the explicit permission of LOD Communications. ------------------------------ Date: Sat, 29 May 93 14:07:13 EDT From: CuD Moderators Subject: File 2--Histories of BBSes (excerpts from the LOD files) ((MODERATORS' NOTE: the LODCOM BBS logs include histories of the boards usually written by the sysops. Although not all are equally consistent or uniformly comprehensive, they nonetheless provide a helpful summary of the origins of the boards. Taken together, they are crucial to understanding the "hacker" culture of the 1980s. The following excerpts illustrate some of the material in the histories accompanying each file. NOTE: THE FOLLOWING MAY NOT BE REPRODUCED OR DISTRIBUTED WITHOUT THE EXPLICIT PERMISSION OF LODCOM (lodcom@mindvox.phantom.com)) +++++++++++++ *** {Broadway Show / The Radio Station BBS Pro-Phile} *** The Broadway Show BBS went online in 718 (New York City) in early to mid 1985 and was later renamed the Radio Station in February 1986. The sysop was Broadway Hacker of "Hack-A-Trip" fame. Hack-A-Trip is a bit off the subject of the BBS Pro-Phile, however it is an interesting story which has not been widely told. The purpose of Hack-A-Trip was to entice hackers from all over the U.S. to attend meetings sponsored by the legendary underground newsletter TAP. The meetings were held each Friday in Manhattan NY. Hack-A-Trip was successfully carried out close to a dozen times in the 1984/5 period (most were before the Broadway Show BBS went online). Hack-A-Trip was nothing more than a scheme to obtain free airplane tickets for daring hackers through credit card fraud which was perpetrated by Broadway himself. Although Broadway was not considered a good phreak nor hacker, he did have the BALLS to risk his freedom for other hackers who craved the free exchange of information typical of TAP meetings. Perhaps the 'free-est' exchange of information was when famed NY phreak Bioc Agent 003 attended the meetings--primarily when he loosened his tie, opened his briefcase and handed out neatly printed copies of his many phreaking and hacking primers to anyone who did not have multiple copies already. Attendee's of note (but not necessarily Hack-A-Trip participants) at TAP meetings during 1984-5 were TAP editor Cheshire Catalyst (of course), the ever secretive Number 6, Paul Muad'Dib, TUC, Lex Luthor, Bioc, King Blotto, and various others. Broadway worked as a Disk Jockey and therefore had an interest in Radio, thus, the name of the second incarnation of the Board. His BBS was primarily frequented by beginners however Broadway's many contacts from his Hack-A-Trip days pulled in a half dozen or so highly knowledgeable users who were kept busy setting facts straight, reading the deluge of 'fan' email, and helping educate the majority. The BBS was run on a Commodore computer with software that allowed users to immediately respond to 'primary messages' that allowed for a fairly coherent dialogue to go back and forth about whichever topic was the subject of the primary message. *** {Twilight Zone BBS Pro-Phile} *** Twilight Zone History: I put up the Twilight Zone in mid 1984, however little remains of posts from that time. The first version of the zone was running on a severely modded version of NETWORKS II, for the APPLE II+. The Zone ran on this fairly flimsy (prone to unexplained crashes) until mid 1984, at which point I switched to Telecat, which was a huge improvement. The main theme of the Zone was Discussion of Telephone and computer systems. The system ran off and on until early 1986. At this point in time due to me being busy with work/school the system was relocated to the home of the Safe-Cracker, and re-named "The Septic Tank". The story behind the naming comes from a sewage treatment system I happened across in a modem carrier scan in (203) that aptly identified itself as: "Northeastern Septic Services - Remote Backflush System (RBS)". This system allowed the user to apply several diagnostic and maintenance routines--one of which was to pump raw sewage all over the Northeastern Connecticut! I had so much fun with this system, I promptly stole their login screen and used it for our welcome message on the BBS, also as kind of a joke we renamed the BBS the "Septic Tank", in honor of this system. The BBS had a fairly knowledgeable user base, but was plagued with living in a poorly (SNET) maintained Step X Step switching system area, so some persons had a hard time connecting to the BBS and if they did connect the line noise could be unbearable at times. The Zone's only real claim to fame was it being the birthplace of the "Bell Shock Force!" which was kind of a "Reverse Group" if you will ;). The Septic Tank was taken down permanently in late 1986, and was never seen again. Sigh. Written March 18, 1993 By The Marauder (Sysop of Twilight Zone/Septic Tank) Legion of Doom! *************************************************************** *** {Plover-NET BBS Pro-Phile} *** Intro by Lodcom: Plover-NET (typically mis-denoted as Plovernet) was one of the most popular and therefore busiest Phreak Boards of all time. The system operator was Quasi Moto (whom was a member of the short lived yet famed Fargo-4A phreak group) and the remote sysop was Lex Luthor (whom later ran the LOD BBS and started the Legion of Doom hacking group). The story behind the start of the Fargo-4A phreak group is a message within the Message Base File. Details by Quasi Moto, system operator: I met Lex in person while we lived in Florida during the Fall of 1983 after corresponding via email on local phreak boards. I was due to move to Long Island, New York (516 Area Code) soon after and asked him about starting up a phreak BBS. He agreed to help and flew up during his Christmas break from school in late December 1983. We worked feverishly for a couple of days to learn the GBBS ][ Bulletin Board software which was to run on my Apple ][+ with a 300 baud Hayes micoSLOWdom {micromodem} and make modifications as necessary. The system accepted its first phone call from Lex in the first week of January 1984 and it became chronically busy soon after. The name Plover-NET came from a conversation I had with GBBS ][ Author Greg Schaefer. I was talking to him about the name of my future BBS and the topic of computer games came up. One of them, the 'Extended Adventure' game which was based on the 'Original Adventure' fantasy computer game was mentioned. This game was available on Compuserve and during game play the magic word PLOVER had to be used. For some reason that name had a nice ring to it and after bouncing a couple of alterations and additions to the word plover, the name Plover-NET was what I agreed upon. The idea behind PNET was to keep the BBS as simple as possible. It had a main phreak board only. Probably the most complicated thing about the board was the login. To be different, Lex suggested we simulate the TELENET packet switching network upon connecting to the BBS. Although Telenet was popular with hackers, some users were confused. As for sub-boards, there were none. There were no high security secret sections of the BBS, just a main phreaking and hacking discussion message base. It was interesting to recall how many users would send me feedback {email to the system operator} asking for access to the 'elite sections of the board'. The only part of the BBS that required additional security was the Phreak Philes section. Putting phreak philes online was an idea ripped off directly from the legendary OSUNY Phreak BBS. Putting G-Philes on hacker systems became universal afterwards but it was not a wide practice at the time. There were three ways to get access to the philes section: 1) Impress me in some way or be recommended by Lex. 2) Write an ORIGINAL file to be put in the section. 3) Send in $5.00 (which helped defer the cost of running the BBS) The Board initially ran on three apple disk drives. {143 K byte capacity} After a few months of operation, New York hacker Paul Muad'Dib appeared at a TAP meeting being held at "Eddies" in Greenwich Village with a RANA Elite III disk drive in hand. The RANA Elite III had a capacity of about 600 KB which put the total storage capacity of the BBS to just over one Megabyte, fairly large for a phreak board in those days. I gladly accepted the donation but did not ask how he obtained the disk drive. The RANA was later passed on to Lex which he used to house his extensive collection of phreak philes that were available to Legion of Doom BBS users. The location of the overworked RANA is currently unknown although Lex believes he sent it back to PMD in NY around 1986. It wasn't long before Plover-NET's phone number became so busy that users would ask me why I always took the phone of the hook! Some users were forced either have their modems dial for hours on end to get in, or try to log on at 4AM. After a few short months, the userlist grew to over 600. It became THE place to call, and typically the users called using LDX, a long distance phone company that was among the many that resulted from the divestiture of AT&T in 1984. The users abused this poor company so much to call PNET that LDX actually blocked all calls to the BBS phone number! This became rather standard practice in later years for all LD companies but was a surprise in mid-1984. The users of course had a myriad of other methods to call PNET though. The BBS software had a built in command that allowed me to 'Boot' users off the system. Should someone important whom had my VOICE phone number call me, I would type this control-key command and the unsuspecting user would receive an error message and be hung up upon. I would then wait for the 'important' user to call in and then send them a modem carrier so they could get online. A number of the more knowledgeable PNET users were invited by Lex onto his Board. Phreaks like Agrajag the Prolonged, Mark Tabas, Erik Bloodaxe, Bioc Agent 003, Karl Marx, and others were 'stolen' from my BBS ;) I guess after LOD went up they saved all their 'good stuff' for his board. Hmphh Another thing to mention is that Lex met 2600 Magazine editor, Emmanuel Goldstein on the Pirates Cove, another 516 pirate/phreak BBS. He invited EG onto Plover and it wasn't long before we became an 'official' 2600 bbs of sorts. When a user logged off the system, a plug for 2600 was displayed with their subscription prices and addresses. I still like to think that I/Plover-NET was instrumental in helping the fledgling underground newsletter become the fancy magazine it is today. How much influence we really did have is not known though. I took Plover-NET down near the end of the summer because my family moved back to Florida. I put the BBS back up for a couple of months but it seems a lot of old users either found other places to call and/or did not know the new number. Due to the lack of interest I took the board down once and for all which from what I recall was around the beginning of 1985 or so. Quasi Moto, Plover-NET Sysop Written in March of 1993 ------------------------------ Subject: File 3--LOD Project Summary and Contact Information From: lodcom@MINDVOX.PHANTOM.COM (LOD Communications) Date: Thu, 16 May 93 00:50:01 EDT ((MODERATORS NOTE: The following article provides more details on the LOD Communications' project, answers preliminary questions, and provides addresses for obtaining more information such as a set of sample messages from the collection. Note that the actual list of available message bases and the order form were deleted but may be requested by emailing lodcom@mindvox.phantom.com)). The LOD Communications Underground H/P BBS Message Base Project: The Project: ------------ Throughout history, physical objects have been preserved for posterity for the benefit of the next generation of humans. Cyberspace, however, isn't very physical; data contained on floppy diskettes has a finite lifetime as does the technology to retrieve that data. The earliest underground hacker bulletin board systems operated at a time when TRS-80s, Commodore 64s, and Apple ][s were state-of-the-art. Today, it is difficult to find anyone who has one of these machines in operating condition, not to mention the brain cells left to recall how to operate them. :-( LOD Communications has created a historical library of the "dark" portion of Cyberspace. The project's goal is to acquire as much information as possible from underground Hack/Phreak (H/P) bulletin boards that were in operation during a decade long period, dating from the beginnings (in 1980/81 with 8BBS and MOM: Modem Over Manhattan) to the legendary OSUNY, Plover-NET, Legion of Doom!, Metal Shop, etc. up through the Phoenix Project circa 1989/90. Currently, messages from over 50 different BBSes have been retrieved, although very few message bases are 100% complete. However, not having a complete "set" does not diminish their value. Who Benefits From This Information?: ------------------------------------ - PARTICIPANTS who were on the various H/P BBSes may want to see their contribution to history or reminisce about the "golden era" of hacking; - ENTHUSIASTS who came into the "scene" after most of these boards were down may want to see what they missed; - COMPANIES who may want to see if their (or their competitors') phone systems, computers, or networks were compromised; - SECURITY PROFESSIONALS/LAW ENFORCEMENT who may want to see what techniques were used to subvert computer security systems; - SCHOOLS AND UNIVERSITIES (including their libraries) who may want to use the information for research in sociology or computer science as well as for educational purposes in courses such as Computer Law, Computer Ethics, and Computer Security; - AUTHORS/PRESS who may want to finally get the facts straight about "hackers;" and, - THE CURIOUS PUBLIC who may want to sneak a peek into the inner realm of the Computer Underground, especially those Restricted Access BBSes and their Private sub-boards where only a small handful of "the best" resided. Were the individuals involved in the Computer Underground out to start World War III, selling secrets to the Soviets, working with organized crime, conspiring to do evil, or just a bunch of bored teenagers with nothing better to do? How much did they know, and how did they find it out? Did they have the capability to shut down phone service of Area Code portions? Could they ruin someone's credit? Could they "move satellites in the heavens?" Could they monitor packet switching network conversations or YOUR conversations? The answers lie within the messages themselves. Why is LODCOM Charging Money For The Message Bases?: ---------------------------------------------------- As happens with most projects, the effort and monetary investment turned out to be substantially more than originally anticipated. With all of the high-tech equipment available today, people sometimes forget that in the early 1980s, 14.4K baud modems and 250 MB hard drives were just a fantasy for the home computer user. Most messages Lodcom has recovered were downloaded at 300 baud onto 143K disk drives, with each file usually no larger than 15K in size. One could not call a BBS and download the complete message base in 10 minutes and save it into one file. Literally hundreds of man-hours have been spent copying dusty Apple ][ disks, transferring them to IBM (or typing in hard copy versions when electronic versions were unavailable), organizing over one thousand individual files (thus far) according to what BBS the messages were originally posted on, and splicing the files together. Also, after consulting with the appropriate civil liberties organizations and our own legal counsel, a slight editing of the messages (restricted to long distance access codes, phone numbers, and computer passwords) had to be made to ensure that there is nothing illegal contained within the messages. Every effort was made to keep the messages in their pristine condition: 40 columns, ALL CAPS, spelling errors, offensive language, inaccuracies of various kinds, and ALL. Although a fairly comprehensive collection of the goings-on during a decade of public and private computer underground activity has been accomplished, there are more messages out there. It is our wish to continue to document the History of the Computer Underground. In order to do this, and in order to break even on what resources have already been expended (it is a LOT more than most people realize), a dollar value has been attached to each set of message bases. The dollar values were kept as low as possible and range from $1.00 to $8.00 for each H/P BBS Message Base Set. Without your understanding and support, this effort may not be able to sustain itself long enough to complete the project. A large portion of any profits will be recycled for two other projects in the works, whose aim is to provide additional historical background on the Computer Underground Community. That is, no one involved is quitting their day job :-) One additional note: For those who purchase the Metal Shop Private Message Base, 100% of the price ($4.00) will be donated to help pay for Craig Neidorf's (Knight Lightning) Legal Defense bills (due to his successful campaign to protect First Amendment rights for electronic publishing, i.e. the PHRACK/E911 case). How The Prices Were Determined: ------------------------------- Prices were determined based on the following considerations: - The number of years ago that the BBS operated (affected availability); - The total number of messages compiled (required more time to compile); - Its popularity and message content (anticipated demand); - Whether the BBS or portions thereof were deemed "elite" and, therefore, restricted access to a small number of users (affected availability); and, - An additional factor to account for overhead costs such as diskettes, diskette mailing containers, postage, time to fill orders, etc. What Each "Message Base File" Contains: --------------------------------------- - A two page general message explaining H/P BBS terminology and format. - The BBS Pro-Phile: A historical background and description of the BBS either written by the original system operator(s) or those who actually called the BBS when it was in operation (it took months to track the appropriate people down and get them to write these specifically for this project; lesser known BBSes may not contain a Pro-Phile); - Messages posted to the BBS (i.e. the Message Base); - Downloaded Userlists if available; and - Hacking tutorials a.k.a. "G-Philes" that were on-line if available. It is anticipated that most people who are interested in the message bases have never heard of a lot of the BBS names shown in the listing. If you have seen one set of messages, you have NOT seen them ALL. Each system had a unique personality, set of users, and each has something different to offer. If you decide to order the minimum, we recommend that you mix a high-priced base ($7.00 or above) with a couple of medium-priced bases ($4.00 to $6.00) and a few lower-priced bases ($1.00 to $3.00). This will provide you with a feel for what was happening over a broad range of years and message quality. Of course, nothing beats the full set (offered at a discount, see order form). Formats the Message Base Files are Available in: ------------------------------------------------ Due to the large size of the Message Base Files, they will be compressed using the format of your choice. Please note that Lodcom does NOT include the compression/uncompression program (PKZIP, PAK, etc.). ASCII (uncompressed) files will be provided for $2.00 extra to cover additional diskette and shipping costs. The files are available for: - IBM (5.25 or 3.5 inch) - AMIGA (3.5 inch) - APPLE MACINTOSH (3.5 inch) - PAPER versions can be ordered but cost triple (due to increased shipping costs, time to print order, and messages being in 40 column format and therefore wasting lots of paper...save those trees!). Paper versions take twice the time to deliver but are laser printed. Orders are expected to arrive at the requesters' physical mail box in 2-4 weeks upon receipt of the order. ((MODERATORS' NOTE: A substantial "Frequently Asked Questions" list has been omitted along with the list of available BBSes and the actual order form. They can be obtained from lodcom@mindvox.phantom.com)) Hacking/Phreaking Tutorials a.k.a. "G-Philes": ---------------------------------------------- Along with the above H/P BBS Message Bases, LODCOM has collected many of the old "philes" that were written and disseminated over the years. A list of all of them would take up too much space here, however, we can tell you that the majority are NOT files that were originally written for electronic newsletters such as Phrack, PHUN, ATI, etc. (with the perhaps obvious exception of the LOD/H Technical Journal). Those files/newsletters are readily available from other sources. This hodgepodge of files includes files from Bioc Agent 003, Legion of Doom members, and many others that somehow fell out of widespread circulation. A Table of Contents of the collection is included but the tutorials are all grouped together in four large files of approximately 250K each. This collection will have additions with each update of this file. Additional information, including order forms and pricing, can be obtained from: lodcom@mindvox.phantom.com or by writing: LOD Communications 603 W. 13th Suite 1A-278 Austin, Texas, USA - 78701 Voice Mail: (512) 448-5098 ------------------------------ Date: Thu, 20 May 93 17:55:38 -0500 From: erikb@TIC.COM(Chris Goggans) Subject: File 4--An Interview with the LOD ((NOTE: THE FOLLOWING MAY BE DISTRIBUTED BUT NOT PUBLISHED IN PRINT WITHOUT THE EXPLICIT PERMISSION OF LODCOM (lodcom@mindvox.phantom.com)) CuD: We've been hearing about a project that a few former LOD "members" --is "member" the right term?--have been working on over the last few months. What's up? EB: Essentially, a bunch of us old-timers realized that a significant portion of the history of the computer underground was being lost forever. Due to the virtual nature of data if it is not archived, it vanishes with no trace. We decided that it was time to dig through all our disks and papers to try to recover as much of this lost portion of "cyberspace," as it were, to allow people who haven't been online for 13 years like we have to see what it was like back then. CuD: Who all's involved in this? One question that some might have is: "Are you guys *really "Legion of Doom," or just some wannabies cashing in on the name? EB: Basically those involved are almost all the members of the LOD from its time of creation, and a few friends of the Legion. Yes, we really are the LOD. It's amazing that such a question would ever be raised to question our authenticity. But in light of recent events such as the "Maverick" person in New Jersey who was busying out 911 services in through PBXes, and the fake Lex Luthor running a bbs in 203 called Legion of Doom, and most recently the NEW LOD as announced by a never before heard of Lord Havoc in Canada, I suppose it is fair to ask us that. MARAUDER: I'm proud to have been in LOD, it took me a couple of years just to get admitted in 1986 and now these clowns are tainting the 'name'. I just think they are pitiful. CuD: Why'd you decide to get involved in this project at *this* time? EB: At this time? Well it's something a lot of us had talked about for a long time. It's just at this particular point in time that it happened to materialize. I guess we just all happened to get off our respective butts and make it happen at *this* point in time. LEX: Magnetic media does not have an infinite lifetime. We came to the realization that if someone didn't start preserving this portion of Cyberspace, the 'dark' portion if you will, it may never be recovered. For example, how many people do you know have the computers and disks they used in 1984? How many of these people, actually had the clarity of mind to buffer and save onto those disks the data that was on any bulletin board let alone the Hack/Phreak BBS's? Now ask what subset of this subset have disks that have data that is still retrievable? Our experience has been the answer is: not that many. So far through all our contacts, we have been able to find only ONE source for messages from the very first known Hacker BBS's (Circa 1979/80). And this person hadn't powered up his TRS-80 in over 6 years, didn't remember all the commands to make it work, and wasn't sure where all the files were. This is indicative of what many of the projects' contributors have had to deal with. CuD: The first question we might hear is, "Who cares?" Who's the intended audience, and of what value do you think the the project is for the, uh, "non-hackers" out there? EB: Who Cares? I personally don't care who cares. This project is being done as much for ourselves as for anyone else, so if noone expresses any interest, it's their loss. Who is the target audience? This presents a never before seen glimpse into the birth of the Computer Underground for journalists, researchers, security professionals, law enforcement, and would-be cyperpunkish Mondo-2000 & Wired readers. A lot of people think they know what goes on, and what did go on in our community, but unless they have some direct interaction with it they are doomed to remain clueless. Some of the message bases we have recovered have never been seen outside of the hacker community. CuD: OK, now, let's say that I'm an academic type, or somebody interesting in researching computer culture. How might this stuff help me? EB: This will give you the chance to see for yourself what went on. Nothing else will allow you that experience. People can talk and talk about what it was like, and how hackers trade information, how they think, how they interact, but this is the only way you can see for yourself without trying to track down some semblance of a real hacker bbs today. LEX: I can picture some Computer Ethics class doing a debate with these logs. Students yelling at each other as to whether hacker X did the right thing or some such, whether Company X deserved to get hacked, etc. CuD: It sounds like a lot of work is going into this project. Tell us something about how you went about putting the stuff together? What are some of the problems you faced? EB: Trying to track down our friends was a big problem. Not every hacker from 1980 is still hanging out screaming out his existence on the net like some people. (Ahem) The vast majority of our friends have gone on to have REAL LIVES with REAL JOBS. One doesn't think of the Legion of Doom as Master Degree candidates, Pilots, Software Engineers at big software companies (Think REAL BIG)...people think of LOD as those evil punk kids on the net. Finding them in the real world and getting them interested in this project was a task. LEX: The desired data was/is scattered everywhere. We have searched through more than a thousand diskettes on a number of different computer systems so far. A significant amount of messages could only be found on paper print-outs and therefore had to be typed-in verbatim. We actually had to hire a couple of people to help input messages. Hundreds of hours were spent transferring via modem or direct serial port connection from Apples, TRS-80s, Commodore-64s to IBM format. Over a thousand small files have been recovered so far. These files were organized according to which BBS the messages they contain were posted on. Figuring out what was posted where was quite a challenge. There are still many files we have no idea where they belong....but we are working on it. Once all the files were put in their appropriate sub-directories they had to be spliced together in chronological order. Since we have files from different sources, duplicate messages had to be fished out. This part was rather time consuming as those working on a certain BBS Message Base had to be rather familiar with hundreds of messages and recognize duplications. In addition, it took months and lots of phone calls (yes we do pay for our phone calls these days) to track down many of the Sysops (SYStem OPertorS) that ran these H/P Boards and asked them to write a "BBS Pro-Phile" specifically for the project. The BBS Pro-Phile provides various background information on the different Boards and interesting stories related to them. I enjoyed reading these the most. CuD: Privacy. How did you overcome the privacy problems? What are some of the social, as opposed to technical, problems you faced? EB: Well, the point of this project was to keep everything as real as the law would allow. We've all got enough problems individually so we don't need anyone coming down on us for distributing information containing codes, regardless of the fact that those codes have not worked since 1986. To compensate for this, and to disguise phone numbers (you'd be amazed how many carriers in this information still worked@!#) Marauder wrote a little basic program called SOASS (Save Our ASSes) that went through the text and replaced digits with "X" when needed. This way the messages retain their true flavor, and we don't get any hassles. MARAUDER: One of the biggest "social" problems we faced, was what do we do with the messages containing "confidential" information such as Credit Cards (rare), extender codes, system passwords and the like. Early in the project, we had decided that we would make every effort possible to leave the text in its original form, exactly as it had appeared to us as we peered at our respective Apples and Commodores years before. In doing this, we hope that today's readers will get a better "feel" for what the computer underground was like back then. What we finally decided to do, was to include these so called "touchy" messages intact, and simply render the offending portion invalid. By utilizing our eyes, and a text scanning program I wrote, we sifted through the entire collection of text, and slightly altered the actual codes themselves so as to render them useless, while leaving the visual/reality effect intact. We regret even making these minor alterations, however we believe it was unavoidable. CuD: How about the technical problems? Was this easy to do? EB: Problems? As embarrassing as it is, I forgot how to use my Atari 400. It's kind of a shocker to go from a workstation back down to an 8 bit machine with no operating system. Trying to transfer files from it to my PC proved incredibly frustrating. Does anyone even remember 300 baud? It's amazing to think that 300 baud was all we had and WE LIKED IT! And acoustic couplers back then were so poor that you couldn't play the radio less it interfere with the data and cause you to lose carrier. Watching the data transfer at 300 baud up to the PC from the 400 renewed my respect for the technology I've begun to take for granted. Even once the machines actually began to cooperate, I'm amazed that so many of our disks survived from the early 80's. Many of us lost thousands of files during government sponsored housekeeping episodes so the mere fact that we were able to find so much information and that the data on the disks had not suffered the ravages of the elements is astounding. CuD: I'd imagine that, now that you guys are a decade older, you cringe when you read some of the stuff you wrote when you were teenie-boppers. What's the most embarrassing aspect of making this all public? EB: Haha. I fully expect a huge amount of grief from everyone who knows me when they see what an annoying little punk I was. I had some seriously deranged ways of typing...weird spelling, 40 column uppercase even when I didn't have that limitation, and a classic case of bad attitude. LEX: How much I abused the dollar sign key: '$'! I am surprised it didn't break off of my Apple ][ keyboard. hehe CuD: Which of the boards from the "golden age of hacking" was the most influential? The most fun? The most sophisticated? EB: The most influential was Plovernet. That BBS was so popular it got banned by long distance companies. The high level of activity led a lot of people into a lot of different areas and the information traded was top notch for its time. The most fun was Farmers of Doom. Being run from a payphone gave it that total out and out free for all kind of feeling. Noone gave a damn what they said or did on that bbs, so you can imagine what chaos it was. The most sophisticated was probably Catch-22. You had to jump through all kinds of hoops just to get on. Once online, however, there was an amazing amount of high-level discussions going on. There was even a secret password known to every one of the small group of people who called that, when entered, deleted the users account from the system. That way if someone got busted and was forced to log in, they could type in the special password and not compromise the bbs. LEX: This is rather subjective but here goes anyways: The most influential: OSUNY -- The benchmark for all to aspire to thereafter. The most fun: Plovernet -- Literally a free for all with a ton of users. The best security: Catch-22 -- Better than many mainframes we hacked into ;) The most sophisticated (user-wise): Black Ice Private -- Top Notch Discussion. The most educational (to the newcomers anyways): Phreak Klass 2600 CuD: Sounds like they all were rather important in your lives back then, but which--if they existed today--stands the "test of time?" Which would, by today's standards, be considered (heh) eL33tE? EB: Well, Black Ice and Phoenix Project would both weather the test of time quite well. Phoenix Project always had good information without ever having anything illegal online and could therefore exist again today without any problems. Black Ice just had a lot of serious information and a lot of discussions on what to do next that led to a big jump in the learning curve. MARAUDER: Black Ice and Catch-22. CuD: How did you arrive at the pricing for this? What do people get for their bucks?? EB: The pricing for the bbses was based on the amount captured, the popularity of the bbs, and then drastically reduced from there. The main point of charging anyone at all is to recapture expenses. CuD: Now, here's a bit of a irony, I guess. Some folks might say: "Geez, these guys used to argue that information should be free, and now they want to charge us. Why shouldn't we follow their own philosophy and wait until we can just pull it off an ftp site or a BBS for free?" How would you respond to them? EB: We've gotten some flack from a few people. We know that it's impossible to keep people from spreading it around, but we hope that people will keep this to a minimum. It's not like we are charging hundreds upon hundreds of dollars for the information in an effort to fleece the masses. I hope people realize that this is not a project to get rich. This is a project to archive our collective pasts and asking a few bucks from people interested in sharing in it is hardly unreasonable. A lot of time and money has gone into this project. Trying to track down working components for these computers costs money. It's not like one can just run down to the Comp-USA and pick up disk drives for the Apple II. On top of that, the long distance bills keep piling up tracking down people from way back when. LEX: As you know, most FTP sites will not knowingly allow copyrighted material on their systems. As for a BBS, it is certainly something that cannot be easily policed. Note that we are not charging for the information itself, but rather for all the effort and costs (well over $1000 believe it or not), to get the information into a coherent and organized state. You might say we fought Entropy and won. Every physicist knows that you can't reverse entropy for nothing. Mother nature makes you pay, one way or another. Also, a significant amount of value has been added to the raw information. Value in the way of putting everything from one BBS into one or more large Files and value in the way of getting the SYSOPS to write new material. It should also be noted that there probably were a number of CUD readers who have followed former Phrack editor Knight Lightning's (Craig Neidorf) E911 trial and would have liked to donate to his legal defense fund. He still owes plenty. We are donating all money from sales of the Metal Shop Private BBS Message Base to the fund ie, we will send a check to his lawyer periodically. So this is a round about way for people reading this to help reduce the sting of his ordeal. CuD: Sounds like some of the original group is still in contact. Do you still keep connected to each other? EB: It's kind of funny. The Defunct-LOD is now more alive than ever. Almost the entire group is now back on the Internet talking to each other on a regular basis. Of course, nothing subversive is taking place, just old-friends swapping tales. :) LEX: With the relatively recent explosion in Internet popularity and accessibility, many ex-members of LOD and the Underground Community as a whole have been able to get connected again after all these years. After many people got connected the next question was: Where do we go? Well, fortunately ex-members Lord Digital (Patrick Kroupa) and Dead Lord (Bruce Fancher) started their business: Phantom Access Technologies, and put Mindvox online--a public BBS system with full Internet access. It wasn't too long before word spread to even the most "out of it" ex-hackers and Mindvox became THE place to congregate. The LOD as a hacking group is dead. The LOD as an EX-Hacking group is very much alive. CuD: Do you have any projects lined up for the future? EB: Oh, you know, the LOD line of CyberWear, the Techno Albums, the Virtual Reality Movie, etc.. Truthfully, expect some surprises in the near future. MARAUDER: We have a couple of projects in the works. We are working on some things in print media rather than electronic. CuD: OK. Thanks. Oh...a final question. In looking at yourselves now, and comparing what you see to the guys you were when you wrote these original messages, what are some of the changes ya'll have gone through? LEX: I no longer feel anyone is done a favor by 'testing their security', unless they specifically ask it to be done right EB? EB: My hair is a lot longer, my spelling has improved, and I have a real job. -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.2 mQCNAiwEHN4AAAEEAMtDxWI2HYsAQO8QhDBYhHvmn3fzGpKFbimxl34XiQ5woU/K lqbD53ahfnB9ST22yxEvexXW0VGVVfSp9xiUl7d7RsTm7Uas3OaOOiSFIRCVvcG8 FnWARH0nmELBXYkXXjjvjm2BiCEkn45eFaZPX7KbCuIGVjCe3zltpJGBK2OvAAUR tCRMZXggTHV0aG9yIDxsZXhAbWluZHZveC5waGFudG9tLmNvbT4= =LOXY ----------------------------- End of Computer Underground Digest #5.39