💾 Archived View for aphrack.org › issues › phrack31 › 7.gmi captured on 2021-12-03 at 14:04:38. Gemini links have been rewritten to link to archived content
-=-=-=-=-=-=-
==Phrack Inc.== Volume Three, Issue Thirty-one, Phile #7 of 10 COMPANY CONFIDENTIAL INTERIM MEMORANDUM SUBJECT: TYMNET SUPPORT FOR CUSTOMER'S DATA SECURITY PURPOSE: This document provides background, and general procedures and practices used to support customers with suspected security problems. Field Sales is the intended audience but is a general document and may be useful to other customer support personnel. Currently, this document is in a final review. Meanwhile, it is to retain the status of an internal proprietary document. BACKGROUND: BT Tymnet Inc, and its Network Systems Company, believe information integrity is vital to ourselves and our customers. One way TYMNET insures integrity is by providing good security. TYMNET has a baseline security of user name, password, and user access profile available for all customers. Further, there are two security products. One permits the customer to limit password life (password automatically expires after a customer elected time period) and the other permits the end user to change his/her own password. Since we do consider security a key issue, we continue to develop other security features. Also, we work with Security vendors to certify their security products on our network, thus permitting customers to add such products, should they so desire. We have established Network Systems Company Policies which provide a framework for the information contained herein (see NSC Policy 121 and 122. More policies are in distribution as of this writing). It is highly recommended that these policies be reviewed since they represent the framework of this document. Legal considerations are another key issue in any security case. Support, other then providing the customer with related security data, can only occur if law(s) have been broken. The legal issues are complex and only a minimal information is provided herein. At at the heart of this issue is the fact that the customer is the injured party, not TYMNET. Patience and good communication may be required to get the customer to understand this fact. The customers must act for themselves to obtain law enforcement support. TYMNET will support that activity, and help to the degree possible, much as a "friend of the court". THE SUPPORT: We provide security support as a responsible network service provider. The first step in that support is for the field sales representative to act as a security consultant to the customer, at least to the extent explained below. The customer is well advised to plan in advance "what to do when Captain Midnight strikes" -- contingency planning, pure simple. First there are two basic alternatives to choose from: PROTECT AND PROCEED OR PURSUE AND PROSECUTE "Protect and proceed" means 1) determine how the incident occurred, 2) plug the security leak/hole, and 3) go on with business as normal. (Do we want written notification of the Intent to "Pusue and Prosecute" from the "Injured Party?"). "Pursue and prosecute" is just that. The first step is having the customer obtain legal support, and both we and the customer continue to gather evidence until the suspect is apprehended. The next step is the prosecution in a court of law. (The final step is to return to the first alternative, e.g., now protect and proceed.) The customer needs to judge each case on its own merits, but generally the first choice is the wiser one. The second choice involves considerable effort, mostly by the customer and law enforcement agency(s), possible negative publicity for the customer and does not necessarily result in successful prosecution. Good contingency planning also includes becoming familiar with the laws and the local law enforcement people. The starting point is a suspected incident. Herein, we will address the case where the customer has identified a suspected intruder. Generally, that occurs by a customer's detailed review of billing or host based security exception reports. At this point it is essential the field sales representative open a ticket containing at least the following: 1) customer name and CID, 2) host(s) involved, 3) incident start and stop times, and 4) the customer's objective. Add any other information deemed helpful. Other support may be an on-line trace of the call, if the suspect is currently on-line. Field support should do this trace, or alternately, this same help can be obtained by calling network customer support and/or NetCon. In any case it must be done while the suspect is on-line. Such trace information should be included on the ticket. Based on the customer's position; the case will fit either "prevent and proceed" or, "pursue and prosecute". The former is straight forward, in that TYMNET security will research the incidents(s), and provide data (generally user name and point of origin(s) to the customer via Field Sales, with recommendations on how to prevent any further occurrence. We do provide this service as a responsible vendor, although strict interpretation of NSC policy 121 precludes it. However, we do apply the policy if a customer continues to ask for data without taking preventative action. The "pursue and prosecute" case is complex, and is different for each situation. It will be explained by using a typical scenario. After the first step (as above), it is necessary to gather data sufficient to show a pattern of intrusion from a single TYMNET access point. With this information, the customer (the injured party) must contacts law enforcement agency(s), with the one exception noted below. If that intrusion point is through a gateway from a foreign country, for all practical purposes, the customer can do little to prosecute. The law(s) of the foreign country will apply since extradition is most unlikely. Therefore, action will have to be have to be initiated by the network service provider in the foreign country. In this case, TYMNET security will have MIS research the session details to obtain the Network User Identifier, and External Network Support (Jeff Oliveto's organization) will communicate that information to the foreign network for their action (cases involving U.S. government computers may get special treatment - see for example - Communications of the ACM, May, 1988, article on "Stalking the Wiley Hacker"). Most all security incidents on our network are caused by international hackers using X.121 addressing. Frequently, our customer is unaware of the risk of X.121 addressing, and permits it. BE SURE YOUR CUSTOMERS KNOW THAT THEY CAN CHOOSE FULL TYMNET SECURITY FEATURES, THEREBY PRECLUDING SUCH INTRUSIONS FROM X.121 ADDRESSING FROM FOREIGN NETWORKS. For the domestic case, the customer gets law enforcement (attorney general at incoming call location, secret service if credit card fraud is involved, or possibly the FBI, depending on the incident) to open a case. Note, damage in estimated dollars is usually necessary to open a case, and many agencies will not take action on small claims. For example, as of December, 1988, the Los Angeles Attorney will not open a case for less than $10,000 (they have too big a caseload at higher damages). Assuming legal support is provided, a court order for a wire tap and trace will be obtained, thereby determining the caller's phone number (this step can be very involved and time consuming for long distance calls). The next legal action occurs after the calling number is identified. A search warrant is obtained for searching the facility housing the phone location. Normally, this search will gather evidence sufficient for prosecution. Evidence is typically the necessary terminal equipment, printouts, diskettes, etc. Then, at long last the prosecution. Also note, again at the time the calling number is identified, the injured party should use the "protect and proceed" plan. For further information, contact Data Security, TYMNET Validations, or Ontyme NSC.SECURITY. _______________________________________________________________________________